نتایج جستجو برای: pastry

تعداد نتایج: 391  

Journal: :Syntax Idea 2022

Beet flour is used in the manufacture of steamed brownies to be an alternative as a natural dye, increase variety beet products, reduce use wheat flour, and functional local food. This study aims analyze effect substitution on physical quality consumer acceptance. research was conducted at Pastry Bakery Processing Laboratory Culinary Education Study Program, State University Jakarta. The time s...

2004
Anurag Garg Roberto Battiti Gianni Costanzi

In this paper, we present a feedback-based system for managing trust and detecting malicious behavior in autonomically behaving networks. The two crucial insights that motivate our work are the notion of quality of a trust rating and the recognition as separate entities of the trust placed in a node and of the trust placed in the recommendations made by a node. These variables allow nodes to de...

2009
Paris Carbone Vana Kalogeraki

Streaming a live music concert over the Internet is a challenging task as it requires real-time, high-quality data delivery over a large number of geographically distributed nodes. In this paper we propose MusiCast, a real-time peer-to-peer multicast system for streaming midi events and compressed audio data. We present a scalable and distributed tree construction algorithm where nodes across t...

Journal: :CoRR 2010
Emmanuelle Anceaume Xavier Défago Maria Gradinariu Potop-Butucaru Matthieu Roy

This paper aims at providing a rigorous definition of selforganization, one of the most desired properties for dynamic systems (e.g., peer-to-peer systems, sensor networks, cooperative robotics, or ad-hoc networks). We characterize different classes of self-organization through liveness and safety properties that both capture information regarding the system entropy. We illustrate these classes...

2012
Zied Trifa

The survey and classification of the different security attacks in structured peer-to-peer (P2P) overlay networks can be useful to computer system designers, programmers, administrators, and users. In this paper, we attempt to provide a taxonomy of structured P2P overlay networks security attacks. We have specially focused on the way these attacks can arise at each level of the network. Moreove...

Journal: :JCM 2015
Qinghe Dong Qian He Huaxin Chai Yong Wang Shengtao He

It is important for a government unit or a company to monitor the intranet security and staffs’ activities during the working time. Collecting and processing massive user behaviors is difficult in the distributed intranet with thousands of hosts. In view of this, this paper proposes a P2P and MongoDB based Intranet User Behavior Control system (PM-IUBC) which consists of the user terminal, the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید