Welcome![Sign In][Sign Up]
Location:
Search - peer to peer networks

Search list

[ICQ-IM-Chatp2pphone

Description: 网络视频电话 p2p基于 vc开发的-video telephony peer-to-peer networks based on the development of the vc
Platform: | Size: 1720496 | Author: 小小 | Hits:

[WinSock-NDISliantian

Description: 基于UDP穿透Symmetric NAT 实现不同内网间通讯的P2P网络聊天系统-based on UDP penetrating Symmetric NAT achieve different internal communication network of peer-to-peer networks Chat System
Platform: | Size: 259423 | Author: 吴阳辉 | Hits:

[WinSock-NDISQQS&C

Description: 本软件要在网络中实现点对点的实时对话,主要的工作大约有: A).软件界面的实现。 B).两台主机通过Socket进行通信的实现。 C).如何从本机接收到要发送给对方的消息与如何接收到从对方来的消息并显示的过程。 D).进行异常处理。-the software in peer-to-peer networks to achieve real-time dialogue, the main work around : A). Software interface is achieved. B). Two mainframe through Socket communication is achieved. C). How receive from the machine to be sent to the other party and how to receive news from the other side of the news and display process. D). For Exception Handling.
Platform: | Size: 145659 | Author: 邓春燕 | Hits:

[Internet-NetworkQQS&C

Description: 本软件要在网络中实现点对点的实时对话,主要的工作大约有: A).软件界面的实现。 B).两台主机通过Socket进行通信的实现。 C).如何从本机接收到要发送给对方的消息与如何接收到从对方来的消息并显示的过程。 D).进行异常处理。-the software in peer-to-peer networks to achieve real-time dialogue, the main work around : A). Software interface is achieved. B). Two mainframe through Socket communication is achieved. C). How receive from the machine to be sent to the other party and how to receive news from the other side of the news and display process. D). For Exception Handling.
Platform: | Size: 145408 | Author: 邓春燕 | Hits:

[ICQ-IM-Chatp2pphone

Description: 网络视频电话 p2p基于 vc开发的-video telephony peer-to-peer networks based on the development of the vc
Platform: | Size: 3795968 | Author: 小小 | Hits:

[Internet-Networkliantian

Description: 基于UDP穿透Symmetric NAT 实现不同内网间通讯的P2P网络聊天系统-based on UDP penetrating Symmetric NAT achieve different internal communication network of peer-to-peer networks Chat System
Platform: | Size: 259072 | Author: 吴阳辉 | Hits:

[OtherP2P(pdf)

Description: p2p技术已经是主流,而这些p2p技术方面的读物想必可以给你点提示-p2p technology has been the mainstream, which p2p technical aspects of the books definitely can give you clues
Platform: | Size: 3365888 | Author: 小蔡 | Hits:

[P2PShareaza_2.1.0.0_source

Description: Shareaza2.1.0.0 Shareaza is the most luxurious and sophisticated file sharing system you ll find. It can harness the power of up to four separate peer-to-peer (P2P) networks, including EDonkey2000, Gnutella, BitTorrent and Shareaza s native network, Gnutella2 (G2).-Shareaza2.1.0.0 Shareaza is the most luxu rious and sophisticated file sharing system yo u'll find. It can harness the power of up to four se parate peer-to-peer (P2P) networks, including EDonkey2000, Gnutella, BitTorrent and Shareaza's native network, Gnutella2 (G2).
Platform: | Size: 2348032 | Author: lococo | Hits:

[ScannerBroadCast

Description: 聊天室的实现,网络间点对点的传输文件,监听IP地址的端口.-The realization of chat rooms, peer-to-peer networks to transfer files, monitor port IP address.
Platform: | Size: 2189312 | Author: byf | Hits:

[P2PresearchInP2p

Description: 对等网络的研究与应用 对等网络的研究与应用-Peer-to-peer networks research and application of peer-to-peer research and application
Platform: | Size: 207872 | Author: 田家雨 | Hits:

[Software Engineering5

Description: Fault-Tolerant Mechanism for Removing Polluted Files in Peer-to-Peer Networks.pdf
Platform: | Size: 1362944 | Author: alex fatc | Hits:

[P2PGeoLPM_TJA_2005

Description: One of the major weaknesses of existing peer-to-peer networks is that their overlay structures do not reflect the underlying Internet topology, resulting in unnecessary consumption of network resources. We propose a Geographical Longest Prefix Matching (Geo- LPM) scheme to self-organise nodes into clusters using IP prefixes and network metric measurements. Geo- LPM efficiently locates nodes to produce superior overlays while optimising the usage of network resources. It is simple, scalable and self-organising.
Platform: | Size: 254976 | Author: hanh | Hits:

[Program docGeoLPM_ATNAC_2004

Description: One of the major weakness of existing peer-to-peer networks is that their overlay structures do not match well with the physical underlying network topology. In this paper, we present a Geographical Longest Prefix Matching (Geo-LPM) scheme whereby nodes selforganise themselves into clusters such that nodes in the same cluster are close to each other in terms of network latency and membership. Geo-LPM combines IP prefixes and network metric measurements to quickly and easily locate nodes in the geographical space. It is simple, scalable, self-organising and distributed with no form of global knowledge
Platform: | Size: 132096 | Author: hanh | Hits:

[P2Pincentive

Description: 设计一种激励机制鼓励节点分享它们所拥有的资源是p2p网络中一个关键的挑战,这里搜集了很多关于p2p激励机制的英文文献,-One of the key challenges in peer-to-peer networks is the design of incentives to encourage peers to share their resources.There are many essays about incentives in p2p network
Platform: | Size: 6404096 | Author: jing | Hits:

[JSP/Java7.-Minimizing-File-Download-Time-in-Stochastic-Pe

Description: Final year project on Minimizing File Download Time in Stochastic Peer-to-Peer Networks
Platform: | Size: 3432448 | Author: Anuj | Hits:

[Windows DevelopSecurity-Issues-in-Ad-Hoc-Networks

Description: Mobile wireless ad hoc network security issue. Mobile ad hoc network is an emerging area of mobile computing and is gradually becoming a new paradigm of wireless network. In mobile ad hoc networks, mobile nodes communicate directly with each other in a peer-to-peer manner and form a network on-the-fly, carrying out basic
Platform: | Size: 201728 | Author: badraac | Hits:

[P2Pton-p2p

Description: minimizing file download time in stochastic peer-to-peer networks
Platform: | Size: 292864 | Author: djking | Hits:

[Windows DevelopSecurity-Issues-in-Ad-Hoc-Networks

Description: Mobile wireless ad hoc network security issue. Mobile ad hoc network is an emerging area of mobile computing and isgradually becoming a new paradigm of wireless network. In mobile ad hoc networks, mobile nodes communicate directly with eachother in a peer-to-peer manner and form a network on-the-fly, carrying outbasic
Platform: | Size: 201728 | Author: movePr | Hits:

[Successful incentiveCASE-STUDY-OF-P2P-NETWORKS

Description: Case Study of Peer-to-Peer Networks (Past, Present and Future Paradigms)
Platform: | Size: 95232 | Author: usama | Hits:

[Network DevelopComputer Network

Description: This book is now in its fifth edition. Each edition has corresponded to a dif ferent phase in the way computer networks were used. When the first edition ap peared in 1980, networks were an academic curiosity. When the second edition appeared in 1988, networks were used by universities and large businesses. When the third edition appeared in 1996, computer networks, especially the Internet, had become a daily reality for millions of people. By the fourth edition, in 2003, wire less networks and mobile computers had become commonplace for accessing the Web and the Internet. Now, in the fifth edition, networks are about content dis tribution (especially videos using CDNs and peer-to-peer networks) and mobile phones are small computers on the Internet. New in the Fifth Edition Among the many changes in this book, the most important one is the addition of Prof. David J. Wetherall as a co-author. David brings a rich background in net working, having cut his teeth designing metropolitan-area networks more than 20 years ago. He has worked with the Internet and wireless networks ever since and is a professor at the University of Washington, where he has been teaching and doing research on computer networks and related topics for the past decade. Of course, the book also has many changes to keep up with the: ever-changing world of computer networks. Among these are revised and new material on Wireless networks (802.12 and 802.16) The 3G networks used by smart phones RFID and sensor networks Content distribution using CDNs Peer-to-peer networks Real-time media (from stored, streaming, and live sources) Internet telephony (voice over IP) Delay-tolerant networks
Platform: | Size: 6765433 | Author: tareqemeish@gmail.com | Hits:
« 12 3 »

CodeBus www.codebus.net