Methods of traffic regulation and user reputation handling in the bittorrent peer-to-peer networks

Examining various methods of traffic throttling and user reputation handling in the context of Bittorrent networks. An overview of the main methods for calculating user reputation and ways to differentiate the quality of services based on them.

Подобные документы

  • Provide structured information on user identification, presents an overview of today’s security landscape and the specific threats to user authentication. Outlines the process of controlled access to resources by means of authorization and accounting.

    книга, добавлен 08.03.2014

  • A structured language as one of a variety of programming possibilities. Unions, enumerations, and user-defined types systems the standard function library. Exception handling and miscellaneous classes. An object-oriented expression parser in program.

    учебное пособие, добавлен 08.03.2014

  • The methodological, technical approaches are considered to construct the agent-based model with built-in artificial neural networks. This model describes the user's behavior of electronic, distance learning in a virtual environment of one of universities.

    статья, добавлен 23.06.2016

  • The model and structure of the intrusion detection system, which is built on the basis of immunological principles. Detecting the network traffic status. The decision rules for the classification of States of network traffic of a computer network.

    статья, добавлен 24.03.2016

  • Theoretical bases of construction of geographically distributed networks and mechanisms to ensure quality of service (QoS) in such networks. Principles of construction of networks with guaranteed quality of service. The main types of interfaces.

    методичка, добавлен 11.10.2014

  • Rapid application development - a software approach of construction of end-user products in conditions of changing user requirements and limited time resources. Specific features of high-level description of Framework for domain data organization.

    дипломная работа, добавлен 13.07.2020

  • Allocation and Sizing of Distribution Transformers and Feeders. Planning of Distribution Networks under Load Growth. Optimization Methods for Power System Problems. List of Tables, Principle Symbols and Acronyms. Statement of Original Authorship.

    реферат, добавлен 05.01.2014

  • Requirements for users support. Approaches to user modeling. Problems of adaptive help. Techniques for knowledge representation. Implementation of advisory strategies. Demands for effective presentation. The need for system-oriented documentation.

    презентация, добавлен 28.12.2013

  • Automation of the process of keeping a diary and converting it into digital form. Software solutions that allow the user to systematize their hobby experience and find something new for themselves. Evaluation of the functionality of compared systems.

    статья, добавлен 19.03.2024

  • Goal and task hierarchies. The model aspects of users: understanding, knowledge, intentions, processing. The study of complexity theory. Use rules of production. Device generalized transition networks. Four rules to model problem architectural spaces.

    лекция, добавлен 28.12.2013

  • Using C ++ Builder to create a binary file. The development of a dynamic array structure of the binary data using the individual functions, located in the library user. The general analysis of the data. Create screensaver with information about the task.

    курсовая работа, добавлен 13.07.2014

  • Implementation of cloud storage on the Internet. New types of Internet security and ways to prevent hacker attacks. Methods of legal regulation of information security practices. Application of the methods of active defense. Combating cybercrime.

    статья, добавлен 18.02.2015

  • Search for numerical encoding methods for lossless binary message. Consideration of methods for compressing digital data using binomial coefficients. Using the decomposition of the Bernoulli information source and calculating the maximum value of entropy.

    статья, добавлен 02.10.2024

  • Методы User Story как база артефактов проектирования требований при разработке программного обеспечения. Оценка его эффективности для описания целей системы. Анализ генеративного метода представления требований к разработке программного обеспечения.

    статья, добавлен 10.05.2022

  • An analysis of some of the main methods and approaches of machine translation, which is designed to speed up the pace of translation of multilingual text. Review of the main functions of artificial neural networks used in neural machine translation.

    статья, добавлен 12.01.2023

  • Sensor - a device that measures physical quantity and converts it into a signal. The context-aware systems a combination of hardware and software that analyze the state of the user and the environment and adapt their work to the changing condition.

    статья, добавлен 30.04.2019

  • Study of method of the adaptive shaping of flows of network traffic and method of tuning of the control systems with an indirect feedback. Analysis of algorithm of multivariable adaptation of shaper to changing the set of parameters of input traffic.

    статья, добавлен 27.12.2016

  • The methods for adaptive, knowledge-based learning, such as online incremental feature selection, spiking neural networks, adaptive data and model integration, and artificial life systems, particle swarm optimisation, ensembles of evolving systems.

    книга, добавлен 09.04.2013

  • Алгоритм навчання класифікатора за незбалансованими неоднорідними навчальними вибірками в практичних задачах моніторингу мережевого трафіка. Розв’язання задачі ідентифікації зашифрованого мережевого трафіка на прикладі додатків VoIP, SSH та BitTorrent.

    статья, добавлен 13.01.2017

  • Переваги та недоліки використання BitTorrent протоколу у комп'ютерних мережах. Характеристика сучаних графічних редакторів. Вивчення програмного продукту V-Ray Chaos Group. Аналіз процесу фотореалістичної візуалізації та рендерингу лісосушильної камери.

    статья, добавлен 30.03.2020

  • Intellectual information systems as hybrid neural networks. Using the topology of neural networks based on a fuzzy perceptron, ANFIS, TSK, Wang & Mendel’s network to solve diagnostic problems in medicine. Influence of the fuzzy rule on output signal.

    статья, добавлен 22.12.2016

  • Піринговий мережевий протокол для кооперативного обміну файлами через Інтернет. Деталі використання та налагодження "сесії", перехват пакетів. Аналіз обміну пакетів з протоколом BT-uTP. Переваги, недоліки та вразливість використання протоколу BitTorrent.

    курсовая работа, добавлен 06.02.2014

  • Cryptography from the perspective of security and mechanisms to implement them: discussing issues such as e-mail security, public-key architecture, virtual private networks, Web services security, wireless security, and confidentiality and integrity.

    книга, добавлен 08.03.2014

  • Types of knowledge-based systems. Logic, rules and representation. The use of registered names, trademarks in engineering. Expert systems, neural networks, genetic algorithms, case-based reasoning systems and methodologies of intelligent agents.

    книга, добавлен 04.10.2014

  • Standards and the Standardization Process: International, National and Industrial organizations. Cryptographic evaluation bodies. Security Mechanisms and Services. Encryption and Modes of Operation for Block Ciphers. Cryptographic Hash Functions.

    книга, добавлен 08.03.2014

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.