Methods of traffic regulation and user reputation handling in the bittorrent peer-to-peer networks
Examining various methods of traffic throttling and user reputation handling in the context of Bittorrent networks. An overview of the main methods for calculating user reputation and ways to differentiate the quality of services based on them.
Подобные документы
Types of knowledge-based systems. Logic, rules and representation. The use of registered names, trademarks in engineering. Expert systems, neural networks, genetic algorithms, case-based reasoning systems and methodologies of intelligent agents.
книга, добавлен 04.10.2014Standards and the Standardization Process: International, National and Industrial organizations. Cryptographic evaluation bodies. Security Mechanisms and Services. Encryption and Modes of Operation for Block Ciphers. Cryptographic Hash Functions.
книга, добавлен 08.03.2014Comprehensive consideration of the relevance of password use. Analysis of current password statistics, detailed study of methods for hacking accounts. Description of alternative authentication methods and additional steps of multi-factor authentication.
статья, добавлен 20.03.2024The use firewalls to create a demilitarized zone to protect the servers from unauthorized access. The versions of creation of virtual private networks that can combine some geographically distant networks in one network using global information space.
статья, добавлен 27.07.2016The analysis of the existing training methods of multilayer neural network of computing structures is carried out. Recommendations of selected methods usage by examples of multilayer approximation tasks for technology of beneficiation were given.
статья, добавлен 28.02.2016Using Duraton-Overman test to study detailed location patterns of the forestry and agricultural industry in Russia. Data analysis package. The first article on geocoding. Methods for measuring localization. Distance-based localization measurement.
курсовая работа, добавлен 11.02.2017Features of testing on the usability, functionality and acceptability of an interactive system. Some approaches, based on expert evaluation: review, query techniques, analytic and model-based methods. Principles of choosing ways of measurements.
презентация, добавлен 28.12.2013Definition of information security. Methods and means of information protection. Access Control - information protection regulation of the use of all resources of IP and IT. Protection of data and programs from unauthorized access, copying, modification.
реферат, добавлен 04.04.2016Acquaintance with methods of data processing and transmission in computer mathematics. Consideration of the features of teaching computer skills in computer mathematics. General characteristics of the stages of development of a conceptual database schema.
статья, добавлен 29.05.2021Password authentication is one of essential services in our life for protecting data. In other words, we may loose a lot of money, sensitive data, if passwords leak out. We have to understand clearly what is important for creating or changing passwords.
статья, добавлен 23.06.2016The opportunities that create application of computer visualization using mathematical software to improve the quality of interactive teaching of students. Visualization of numerical solution of problems of mathematical physics by finite element method.
статья, добавлен 20.01.2016Error correction and the cascade protocol. Individual attacks in an realistic environment. Dynamic initial block-size. Statistical analysis of QKD networks in real-life environment. Quantum-cryptographic networks from a prototype to the citizen.
книга, добавлен 08.03.2014Concept and prototype for an "assembling" IT intergration portal to be used in higher education. Solution, to use Elgg as an information portal and social media platform. The gap between the closed nature of university IT infrastructure and user-friendly.
статья, добавлен 30.08.2016The role of analysis in enterprise management. An overview of the workflow methods used to solve cloud-based enterprise operations management tasks. Substantiation of the relevance of the introduction of cloud technologies based on serverless computing.
статья, добавлен 22.02.2023Possibilities and features of artificial neural networks. Areas of practical application of artificial neural networks. Voice interface distribution and visual serach. Learning neural networks. The following visualization. Direct error propagation.
презентация, добавлен 06.02.2019Web Service Composition (WSC) is a process that helps to save much programming and cost effort by reusing existing components – web services. This paper presents an overview of current state-of-the-art Web Service Discovery and Selection methods.
статья, добавлен 07.12.2016A negligibility-based framework to model network-centric security problems in mobile ad hoc networks. Modeling network-centric security in a negligibility-based framework with network scale as the input parameter and anti-disruption secure routing.
статья, добавлен 15.09.2012International recommendations on Using error control coding at different network layers. The complexity of decoding in the channel with independent errors. Providing security of data in a network with the help of coding methods. Public-key cryptography.
книга, добавлен 08.03.2014Simulation modeling for solving problems of mathematical physics. Usage cellular neural networks as means of modeling. Usage locally asynchronous methods as algorithmic software and tool optimization of neural network. The block diagram of the software.
статья, добавлен 26.06.2016- 45. Optional devices
Description of the main optional devices. TabletPC, processing power and hard drive. Scanner is an input device to the PC color or black and white images from paper. Basic user data: resolving power, scan speed, specifications. Printer, mouse, keyboard.
презентация, добавлен 26.03.2013 Control the computer's resources, the hardware, software as one of the operating systems main tasks. The use of a graphical user interface that eliminates the need to learn complex commands - a feature of the operating systems of the Windows family.
презентация, добавлен 20.04.2016Development of an integrated S-O-R model taking into account cognitive-affective-conative aspects, which adds a new direction to the research of trust in UGC. Life satisfaction and Internet satisfaction as two main mechanisms of online content exchange.
статья, добавлен 23.05.2023Peculiarities of implementing methods of cognitive intelligence. Recommendations on the hardware, mathematical and software parts of the approach to the implementation of such systems, indicating the strengths and weaknesses of the chosen methods.
статья, добавлен 16.06.2024The software which automates the process of air-traffic situations generation. The set includes: airspace sector editor, dynamic situation generator. Reducing the generation time and increasing the quantities of practical tasks due to automation.
статья, добавлен 27.06.2016Негативные последствия, которые могут привести от недостаточного обеспечения сохранности и защиты информации. Особенности организации прокси-сервера, его функции и общие сведения о способах взаимодействия в сети. Описание и функции Traffic inspector.
курсовая работа, добавлен 24.02.2019