Zobrazeno 1 - 10
of 38
pro vyhledávání: '"Download rate"'
Autor:
Ge Zhang, Xianfu Meng
Publikováno v:
Peer-to-Peer Networking and Applications. 13:175-189
With the increases of P2P applications and their users, the attacks on P2P networks have also increased significantly. To handle the problem, researchers have proposed many kinds of P2P trust management models, in which the feedback-based ones took t
We consider the problem of ON-OFF privacy in which a user is interested in the latest message generated by one of n sources available at a server. The user has the choice to turn privacy ON or OFF depending on whether he wants to hide his interest at
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5b5d2f246895281a4d6164b7a73adbc0
Autor:
Asako Chiba
Publikováno v:
PLoS ONE, Vol 16, Iss 9, p e0256151 (2021)
PLoS ONE
PLoS ONE
This study simulates the spread of the coronavirus disease (COVID-19) using a detailed agent-based model and the census data of Japan to provide a comprehensive analysis of the effects of contact-tracing apps. The model assumes two types of response
Publikováno v:
Polarimetric Microwave Imaging ISBN: 9789811588969
Polarimetric SAR can obtain more abundant target information compared to ordinary single-polarized synthetic aperture radar. However, the addition of polarimetric ability increases the complexity of SAR system greatly, which imposes demanding require
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5494c2958551854430c02ffe7f5aaf2c
https://doi.org/10.1007/978-981-15-8897-6_5
https://doi.org/10.1007/978-981-15-8897-6_5
Publikováno v:
2020 Management Science Informatization and Economic Innovation Development Conference (MSIEID).
Millimeter wave is one of the main frequency bands of 5G. At present, the commercial use of millimeter wave has become a hot spot in the communication industry of various countries. This paper introduces the distribution of 5G millimeter wave spectru
Autor:
Najem Moussa, Mohamed Amine Rguibi
Publikováno v:
Journal of Information Security and Applications. 43:21-36
Passive worms spread so quickly in P2P networks that they can cause significant damage and serious security problems. To mitigate worm spreading, we used two classes of trust models: file-based trust and peer-based trust models. Peer-based trust prov
Autor:
Chai Kiat Yeo, Da Zhang
Publikováno v:
Vehicular Communications. 13:13-26
We consider a vehicular content replication system which makes use of the deployed Access Points (APs) to maximize the vehicular download progress of delay-tolerant contents through replication in the APs' local storage. The replication system for ve
Publikováno v:
ACM Transactions on Multimedia Computing, Communications, and Applications. 13:1-20
Traditionally, video adaptive algorithms aim to select the representation that better fits to the current download rate. In recent years, a number of new approaches appeared that take into account the buffer occupancy and the probability of video reb
Autor:
Xianfu Meng
Publikováno v:
Peer-to-Peer Networking and Applications. 11:619-631
With the growth of P2P applications, more and more trust models have been proposed for curbing malicious behavior, most of which are suitable for pure P2P networks, including the structured P2P networks and the unstructured P2P networks. This paper p
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811527760
BlockSys
BlockSys
Blockchain is first introduced in Bitcoin and has good performance in cryptocurrencies. With the growth of chain, the height of blockchain in Bitcoin has reached five hundred thousand, and the entire capacity of chain is more than 500 GB. If a light
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5ab2a5fb97c0fd293ed43c6569b3736b
https://doi.org/10.1007/978-981-15-2777-7_3
https://doi.org/10.1007/978-981-15-2777-7_3