Methods of traffic regulation and user reputation handling in the bittorrent peer-to-peer networks

Examining various methods of traffic throttling and user reputation handling in the context of Bittorrent networks. An overview of the main methods for calculating user reputation and ways to differentiate the quality of services based on them.

Подобные документы

  • Description of technology of off-wire computer networks with the productivity 100 Mb/s in the point of output and maintenance of information. Description of parameters of middle access and determination of multiple entrance. Physical layer, radio, WLAN.

    ?????????, добавлен 10.08.2011

  • Revolutionary changes in the intellectual development of mankind. The emergence of a second human signaling system, awareness of the nature of the formation of cognitive abilities of the human brain and the formation of highly intelligent neural networks.

    ??????, добавлен 15.04.2024

  • Under current conditions telecommunication as the most rapidly-developing branch of engineering. Functional scheme digital commutation system for building communication networks. Distinctive features of hardware tools which are used in the system.

    ??????, добавлен 27.06.2016

  • The problem of protecting information by transforming it, precluding its reading an outsider. Cryptographic methods of data protection - special encryption, encoding or a conversion. Architecture, devices and addresses applications of cryptography.

    ?????, добавлен 18.09.2012

  • The technical aspects of building a solution to our problem of predicting advertisement banner efficiency. Rectified Linear Units activation function. A simple neural network architecture, trustworthy model. Visualizing convolutional neural networks.

    ????????? ??????, добавлен 13.07.2020

  • Studies show that despite the existence of a large number of monitoring methods used in the evaluation of the technical condition of generators on a real-time basis in modern times, they create certain limits in the evaluation of some parts or parameters.

    ??????, добавлен 08.12.2024

  • An overview of machine learning applications for analyzing genome data. Molecular medicine and gene therapy. DNA and RNA are mobile genetic elements. Possible applications of transposons. Cross check software algorithm. Recognition of relocatable items.

    ????????? ??????, добавлен 10.12.2019

  • Analysis of information modeling processes and tasks, and options for improvement using extensive programming capabilities. Characteristics of the main methods of automating and speeding up the design process using programming and their properties.

    ??????, добавлен 30.08.2022

  • The value of cluster analysis to explain a number of phenomena. Consideration clustering algorithms computational intelligence, particularly based on neural networks and kernel-based learning. Review their application to five's real world problems.

    ??????, добавлен 08.02.2013

  • Choice relationship database system, a cloud platform and a software platform for implementing and deploying the relational database system, resource and service agents; software module market risk. User interface for outputting the received information.

    ???????? ??????, добавлен 12.08.2018

  • The possibility of forming an algorithm that allows reconstructing the lost works of easel painting by outstanding masters of the Ancient world is being investigated. The study used methods of computer modeling and analysis, which increased accuracy.

    ??????, добавлен 04.09.2022

  • Mathematical methods for finding object boundaries and measuring the size, color, speed of bubbles in the flotation foam. The possibility of the search for this signature by measuring the deviations of the center of mass of a number of sequential images.

    ??????, добавлен 14.01.2017

  • ?he main authorization methods for the web used to develop and build the logical structure of sites. Justification of the method of secure integration of users of a local network into web authorization, the ability to log in with personal local data.

    ??????, добавлен 09.10.2018

  • Major machine translation methods designed to speed up the process of multilingual text translation by using a computer software. Analysis of the performance of rule-based machine translation, statistical models, hybrid and neural machine translation.

    ??????, добавлен 16.08.2022

  • The article deals with the notion of concept and cognitive conceptual components in the Internet users' names. The basis conceptual spheres and concrete concepts created by the Internet users in the process of communication have been identified.

    ??????, добавлен 09.05.2020

  • Value of the term "information warfare". Analiz the concept information warfare. The social network "Facebook" in information war. Establishment existence of promotion in a social network. Types of propaganda in social networks. Propaganda against Russia.

    ???????, добавлен 26.12.2014

  • Auction and contract networks as coordination mechanisms in multi-agent systems based on Foundation for Intelligent Physical Agents protocols. Structural elements of mechanisms in the socio-economic and political contexts of the use in cybersecurity.

    ??????, добавлен 09.09.2021

  • Antivirus is used to prevent, detect and remove malware, including computer viruses and worms. Such programs may also prevent and remove adware, spyware and other forms of malware. Identification methods: signature based detection and file emulation.

    ??????, добавлен 04.12.2011

  • The development and use of new, progressive information technologies based on the widespread use of superproductive and reliable dual-use computer systems and components. Consideration of the problem of the Fourier transform and its application.

    ??????, добавлен 01.11.2021

  • Development of new ways to ensure the security of data transmission through telecommunication networks. Hardware protection of information from unauthorized access. Organization of hidden channels of common use. The method of authentication of images.

    ??????, добавлен 29.11.2016

  • The pproaches to testing program interfaces in the context of their use in the educational process. An online tool for testing - UsabilityHub.com. Methods of testing the usability of 3D graphics programs for studying threedimensional modeling at school.

    ??????, добавлен 19.03.2023

  • ??????? ???????? ?????????? ?????, ?? ?????????? ? ???????? ????????????. ???????? ???????????????? Bittorrent. ????????? ???????????? ?????. ????????? ?????? ???????? ??????. ????????????? ????, ??????????? ?? ???????? "??????-??????" ? "??????-??????".

    ???????? ??????, добавлен 02.02.2014

  • Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.

    ?????, добавлен 08.03.2014

  • Python ??? ??????????????? ???? ????????????????. ??? ????? ???????? ?? Python. ???? ??????. BitTorrent ??????. ???????? ??????? ??? ?????????, ??? ???????? ??????????????, ?????????? ? MicrosoftOffice. ?????????? Delphi. ???? ???????????????? ?++.

    ??????, добавлен 18.02.2022

  • Research entities of the software defined networking which is currently one of the most promising technologies in mobile backhaul networks based on the open flow protocol. Characteristic apply Mininet software to verify the open flow protocol messages.

    ??????, добавлен 29.07.2016

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.