Methods of traffic regulation and user reputation handling in the bittorrent peer-to-peer Networks

Methods for regulating traffic and handling user reputation in the context of BitTorrent networks. An overview of various methods for calculating user reputation in networks and methods for differentiating the quality of service based on them.

Подобные документы

  • The methodological, technical approaches are considered to construct the agent-based model with built-in artificial neural networks. This model describes the user's behavior of electronic, distance learning in a virtual environment of one of universities.

    статья, добавлен 23.06.2016

  • Theoretical bases of construction of geographically distributed networks and mechanisms to ensure quality of service (QoS) in such networks. Principles of construction of networks with guaranteed quality of service. The main types of interfaces.

    методичка, добавлен 11.10.2014

  • Provide structured information on user identification, presents an overview of today’s security landscape and the specific threats to user authentication. Outlines the process of controlled access to resources by means of authorization and accounting.

    книга, добавлен 08.03.2014

  • Allocation and Sizing of Distribution Transformers and Feeders. Planning of Distribution Networks under Load Growth. Optimization Methods for Power System Problems. List of Tables, Principle Symbols and Acronyms. Statement of Original Authorship.

    реферат, добавлен 05.01.2014

  • A structured language as one of a variety of programming possibilities. Unions, enumerations, and user-defined types systems the standard function library. Exception handling and miscellaneous classes. An object-oriented expression parser in program.

    учебное пособие, добавлен 08.03.2014

  • The model and structure of the intrusion detection system, which is built on the basis of immunological principles. Detecting the network traffic status. The decision rules for the classification of States of network traffic of a computer network.

    статья, добавлен 24.03.2016

  • The use firewalls to create a demilitarized zone to protect the servers from unauthorized access. The versions of creation of virtual private networks that can combine some geographically distant networks in one network using global information space.

    статья, добавлен 27.07.2016

  • Intellectual information systems as hybrid neural networks. Using the topology of neural networks based on a fuzzy perceptron, ANFIS, TSK, Wang & Mendel’s network to solve diagnostic problems in medicine. Influence of the fuzzy rule on output signal.

    статья, добавлен 22.12.2016

  • Goal and task hierarchies. The model aspects of users: understanding, knowledge, intentions, processing. The study of complexity theory. Use rules of production. Device generalized transition networks. Four rules to model problem architectural spaces.

    лекция, добавлен 28.12.2013

  • The methods for adaptive, knowledge-based learning, such as online incremental feature selection, spiking neural networks, adaptive data and model integration, and artificial life systems, particle swarm optimisation, ensembles of evolving systems.

    книга, добавлен 09.04.2013

  • Error correction and the cascade protocol. Individual attacks in an realistic environment. Dynamic initial block-size. Statistical analysis of QKD networks in real-life environment. Quantum-cryptographic networks from a prototype to the citizen.

    книга, добавлен 08.03.2014

  • Possibilities and features of artificial neural networks. Areas of practical application of artificial neural networks. Voice interface distribution and visual serach. Learning neural networks. The following visualization. Direct error propagation.

    презентация, добавлен 06.02.2019

  • Types of knowledge-based systems. Logic, rules and representation. The use of registered names, trademarks in engineering. Expert systems, neural networks, genetic algorithms, case-based reasoning systems and methodologies of intelligent agents.

    книга, добавлен 04.10.2014

  • Web Service Composition (WSC) is a process that helps to save much programming and cost effort by reusing existing components – web services. This paper presents an overview of current state-of-the-art Web Service Discovery and Selection methods.

    статья, добавлен 07.12.2016

  • New cross-layer scheduling algorithm to quality of service. The modern methods for improving bit error and throughput program for the management of resources. The assessment of service quality, modulation and coding scheme in the resource block.

    статья, добавлен 26.06.2016

  • Rapid application development - a software approach of construction of end-user products in conditions of changing user requirements and limited time resources. Specific features of high-level description of Framework for domain data organization.

    дипломная работа, добавлен 13.07.2020

  • Comprehensive consideration of the relevance of password use. Analysis of current password statistics, detailed study of methods for hacking accounts. Description of alternative authentication methods and additional steps of multi-factor authentication.

    статья, добавлен 20.03.2024

  • The analysis of the existing training methods of multilayer neural network of computing structures is carried out. Recommendations of selected methods usage by examples of multilayer approximation tasks for technology of beneficiation were given.

    статья, добавлен 28.02.2016

  • Implementation of cloud storage on the Internet. New types of Internet security and ways to prevent hacker attacks. Methods of legal regulation of information security practices. Application of the methods of active defense. Combating cybercrime.

    статья, добавлен 18.02.2015

  • Study of method of the adaptive shaping of flows of network traffic and method of tuning of the control systems with an indirect feedback. Analysis of algorithm of multivariable adaptation of shaper to changing the set of parameters of input traffic.

    статья, добавлен 27.12.2016

  • Requirements for users support. Approaches to user modeling. Problems of adaptive help. Techniques for knowledge representation. Implementation of advisory strategies. Demands for effective presentation. The need for system-oriented documentation.

    презентация, добавлен 28.12.2013

  • Automation of the process of keeping a diary and converting it into digital form. Software solutions that allow the user to systematize their hobby experience and find something new for themselves. Evaluation of the functionality of compared systems.

    статья, добавлен 19.03.2024

  • An analysis of some of the main methods and approaches of machine translation, which is designed to speed up the pace of translation of multilingual text. Review of the main functions of artificial neural networks used in neural machine translation.

    статья, добавлен 12.01.2023

  • International recommendations on Using error control coding at different network layers. The complexity of decoding in the channel with independent errors. Providing security of data in a network with the help of coding methods. Public-key cryptography.

    книга, добавлен 08.03.2014

  • Acquaintance with methods of data processing and transmission in computer mathematics. Consideration of the features of teaching computer skills in computer mathematics. General characteristics of the stages of development of a conceptual database schema.

    статья, добавлен 29.05.2021

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.