Welcome![Sign In][Sign Up]
Location:
Search - Peer to Peer

Search list

[CommunicationAnthill-20020829

Description: Recent peer-to-peer (P2P) systems are characterized by decentralized control, large scale and extreme dynamism of their operating environment. As such, they can be seen as instances of complex adaptive systems (CAS) typically found in biological and social sciences. Anthill is a framework to support the design, implementation and evaluation of P2P applications based on ideas such as multi-agent and evolutionary programming borrowed from CAS. An Anthill system consists of a dynamic network of peer nodes societies of adaptive agents travel through this network, interacting with nodes and cooperating with other agents in order to solve complex problems. Anthill can be used to construct different classes of P2P services that exhibit resilience, adaptation and self-organization properties.
Platform: | Size: 5886976 | Author: ada | Hits:

[ARM-PowerPC-ColdFire-MIPSCC2430_point_to_point_communication

Description: CC2430点对点通信程序,该程序可以演示一个基本的Zigbee网络系统。-CC2430 peer-to-peer communication program, the program can demo a basic Zigbee network system.
Platform: | Size: 215040 | Author: dxvc | Hits:

[VOIP programpeers-0.1.1-src

Description: 用JAVA实现的点对点的SIP协议通讯,SIP学习的不错的源码-Using JAVA realize the SIP peer-to-peer communication protocol, SIP good source of learning
Platform: | Size: 1909760 | Author: EStar | Hits:

[ICQ-IM-ChatChatting

Description: 由Java写的聊天peer to peer网络程序,可供各位学习网络程序设计的朋友参考。-Written by Java chat peer to peer network program for learning network programming that friend reference.
Platform: | Size: 177152 | Author: evan | Hits:

[P2PCsharpP2P

Description: c#写的文件共享程序,该程序可以实现不同主机之间的文件共享功能.这个应用程序可以和IIS或任意Web服务器工作,关键是选择任意的自由端口。-c# written in file-sharing programs, the program can be achieved between the different host file-sharing features. this application and IIS or arbitrary Web servers work, the key is the freedom to choose arbitrary port.
Platform: | Size: 36864 | Author: 小张 | Hits:

[Multimedia Developstreamer_source_123

Description: Streamer is a peer-to-peer internet radio. It is NOT a file sharing network. Streamer promotes GOOD use of p2p networking technology.
Platform: | Size: 380928 | Author: 北科 | Hits:

[Internet-NetworkP2P

Description: 点对点P2P文件共享客户端源码.点对点 P2P文件共享客户端源码.点对点P2P文件共享客户端源码.-Peer-to-peer P2P file sharing client source. Peer-to-peer P2P file sharing client source. Peer-to-peer P2P file sharing client source.
Platform: | Size: 75776 | Author: 周会祥 | Hits:

[P2Ppeertopeer

Description: 本程序为一个真正点对点通讯示范程序:) 实现内网到内网的直接连接(QQ用的技术) 使用Delphi实现。在网上未看到类似的程序,特此发布提供喜欢的朋友参考。 通过UDP来实现穿透NAT的点对点通讯-This procedure for a truly peer-to-peer communication model program:) to achieve within the network to connect directly with the network (QQ with the technology) to achieve the use of Delphi. Online do not see a similar process, hereby release like a friend to provide a reference. UDP through NAT to achieve penetration of the point-to-point communications
Platform: | Size: 857088 | Author: dd | Hits:

[Windows DevelopShortMessagePeertoPeer

Description: Short Message Peer to Peer Protocol Specification v3.4-Short Message Peer to PeerProtocol Specification v3.4
Platform: | Size: 634880 | Author: dengzhiqiang | Hits:

[Internet-Networkp2p

Description: 一个简单的p2p共享文件的程序,用c语言开发,包括server端和peer端,自定义了一套应用层的传输协议,对于理解socket编程有很大的帮助-A simple procedure for p2p file sharing, using c language development, including peer client and server-side, since the definition of a set of application-layer transport protocol, for understanding the socket programming of great help
Platform: | Size: 28672 | Author: lucy | Hits:

[OtherPeer_to_Peer_Video_Streaming

Description: Peer-to-Peer Video Streaming
Platform: | Size: 3341312 | Author: Daniel | Hits:

[Internet-NetworkKadC

Description: Kademlia协议(以下简称Kad)是美国纽约大学的PetarP. Maymounkov和David Mazieres. 在2002年发布的一项研究结果《Kademlia: A peerto -peer information system based on the XOR metric》。 简单的说,Kad 是一种分布式哈希表(DHT)技术,不过和其他DHT 实现技术比较,如 Chord、CAN、Pastry 等,Kad 通过独特的以异或算法(XOR)为距离度量基础,建立了一种 全新的DHT拓扑结构,相比于其他算法,大大提高了路由查询速度。 在2005 年5 月著名的BiTtorrent 在4.1.0 版实现基于Kademlia 协议的DHT 技术后, 很快国内的BitComet 和BitSpirit 也实现了和BitTorrent 兼容的DHT 技术,实现 trackerless下载方式。 另外,emule 中也很早就实现了基于Kademlia类似的技术(BT中叫DHT,emule中也叫 Kad,注意和本文简称的Kad 区别),和BT 软件使用的Kad 技术的区别在于key、value 和 node ID 的计算方法不同。-We describe a peer-to-peer system which has provable consistency and performance in a fault-prone environment. Our system routes queries and locates nodes using a novel XOR-based metric topology that simplifies the algorithm and facilitates our proof. The topology has the property that every message exchanged conveys or reinforces useful contact information. The system exploits this information to send parallel, asynchronous query messages that tolerate node failures without imposing timeout delays on users.
Platform: | Size: 509952 | Author: libing | Hits:

[Internet-NetworkNetworkrealtimecommunication

Description: 网络实时通讯软件的设计与实现,本系统将实现局/广域网下Peer-to-Peer即时通讯功能,C/S模式,主要架构分为三个主模块:Client端,Server端-Network real-time communication software design and implementation, the system will achieve the Board/WAN under the Peer-to-Peer instant messaging features, C/S mode, the main architecture is divided into three main modules: Client client, Server-side
Platform: | Size: 8942592 | Author: zhang | Hits:

[P2Pjxse2.5

Description: JXTA™ is a set of open, generalized peer-to-peer (P2P) protocols that allow any networked device — sensors, cell phones, PDAs, laptops, workstations, servers and supercomputers — to communicate and collaborate mutually as peers-JXTA™ is a set of open, generalized peer-to-peer (P2P) protocols that allow any networked device — sensors, cell phones, PDAs, laptops, workstations, servers and supercomputers — to communicate and collaborate mutually as peers
Platform: | Size: 3156992 | Author: Tuan Anh | Hits:

[JSP/JavaResolverServiceTest

Description: JXTA™ is a set of open, generalized peer-to-peer (P2P) protocols that allow any networked device — sensors, cell phones, PDAs, laptops, workstations, servers and supercomputers — to communicate and collaborate mutually as peers-JXTA™ is a set of open, generalized peer-to-peer (P2P) protocols that allow any networked device — sensors, cell phones, PDAs, laptops, workstations, servers and supercomputers — to communicate and collaborate mutually as peers
Platform: | Size: 38912 | Author: Tuan Anh | Hits:

[JSP/Javajxse-src-2.5

Description: JXTA™ is a set of open, generalized peer-to-peer (P2P) protocols that allow any networked device — sensors, cell phones, PDAs, laptops, workstations, servers and supercomputers — to communicate and collaborate mutually as peers-JXTA™ is a set of open, generalized peer-to-peer (P2P) protocols that allow any networked device — sensors, cell phones, PDAs, laptops, workstations, servers and supercomputers — to communicate and collaborate mutually as peers
Platform: | Size: 4369408 | Author: Tuan Anh | Hits:

[Bookssip2p.081_released.tar

Description: a open source project in linux for peer to peer on seep
Platform: | Size: 509952 | Author: zahra dehghan | Hits:

[P2Psecurityp2p

Description: ppt for security in peer to peer network
Platform: | Size: 30720 | Author: sonam | Hits:

[Internet-NetworkP2P

Description: 程序实现局域网的点对点大型文件传输,用户可以增加本地的共享文件到程序中,对方就可以在远程文件框中看到这些文件夹的所在目录,通过点击相应的文件目录可以实现下载文件到自己主机-Procedures for large-scale peer-to-peer LAN file transfer, users can share files local to the process, the other party can file on the remote box to see where the directory folder, by clicking on the appropriate file directory can download the file to their host
Platform: | Size: 45056 | Author: 王儒伟 | Hits:

[P2Presearch_of_security_and_authentication_protocol_f

Description: 文章提出了一种在P2P网络中安全分发密钥和进行对等点身份认证的方法。这种方法采用的认证协议同时结合了公钥加密和密钥加密技术。我们还通过一种认证测试的方法证明了该方法使用的安全认证协议的正确性。-This paper presents a P2P network in the distribution of key security and authentication of the peer approach. This method of authentication protocol used in connection with a public key encryption and key encryption technology. We are also certified through a method of testing proved that the method used in the correctness of the security authentication protocol.
Platform: | Size: 185344 | Author: leilei | Hits:
« 1 2 3 45 6 7 8 9 10 ... 50 »

CodeBus www.codebus.net