Methods of traffic regulation and user reputation handling in the bittorrent peer-to-peer Networks

Methods for regulating traffic and handling user reputation in the context of BitTorrent networks. An overview of various methods for calculating user reputation in networks and methods for differentiating the quality of service based on them.

Подобные документы

  • Acquaintance with methods of data processing and transmission in computer mathematics. Consideration of the features of teaching computer skills in computer mathematics. General characteristics of the stages of development of a conceptual database schema.

    статья, добавлен 29.05.2021

  • Simulation modeling for solving problems of mathematical physics. Usage cellular neural networks as means of modeling. Usage locally asynchronous methods as algorithmic software and tool optimization of neural network. The block diagram of the software.

    статья, добавлен 26.06.2016

  • Using Duraton-Overman test to study detailed location patterns of the forestry and agricultural industry in Russia. Data analysis package. The first article on geocoding. Methods for measuring localization. Distance-based localization measurement.

    курсовая работа, добавлен 11.02.2017

  • A negligibility-based framework to model network-centric security problems in mobile ad hoc networks. Modeling network-centric security in a negligibility-based framework with network scale as the input parameter and anti-disruption secure routing.

    статья, добавлен 15.09.2012

  • Definition of information security. Methods and means of information protection. Access Control - information protection regulation of the use of all resources of IP and IT. Protection of data and programs from unauthorized access, copying, modification.

    реферат, добавлен 04.04.2016

  • Using C ++ Builder to create a binary file. The development of a dynamic array structure of the binary data using the individual functions, located in the library user. The general analysis of the data. Create screensaver with information about the task.

    курсовая работа, добавлен 13.07.2014

  • The opportunities that create application of computer visualization using mathematical software to improve the quality of interactive teaching of students. Visualization of numerical solution of problems of mathematical physics by finite element method.

    статья, добавлен 20.01.2016

  • Методы User Story как база артефактов проектирования требований при разработке программного обеспечения. Оценка его эффективности для описания целей системы. Анализ генеративного метода представления требований к разработке программного обеспечения.

    статья, добавлен 10.05.2022

  • Peculiarities of implementing methods of cognitive intelligence. Recommendations on the hardware, mathematical and software parts of the approach to the implementation of such systems, indicating the strengths and weaknesses of the chosen methods.

    статья, добавлен 16.06.2024

  • Sensor - a device that measures physical quantity and converts it into a signal. The context-aware systems a combination of hardware and software that analyze the state of the user and the environment and adapt their work to the changing condition.

    статья, добавлен 30.04.2019

  • The classical methods of active identification and adaptation of automatic control systems (ACS) were used. Test of ACS.Transient process which allows to obtain parameters of the object transfer function and calculate the conventional adjustment knob.

    статья, добавлен 30.07.2016

  • Reveal and compare modern methods of information search in digital environment. Characterization of the features of the rapid development of information technologies, which shapes spheres of human life, as well as the process of information provision.

    статья, добавлен 22.03.2023

  • Description of technology of off-wire computer networks with the productivity 100 Mb/s in the point of output and maintenance of information. Description of parameters of middle access and determination of multiple entrance. Physical layer, radio, WLAN.

    методичка, добавлен 10.08.2011

  • Revolutionary changes in the intellectual development of mankind. The emergence of a second human signaling system, awareness of the nature of the formation of cognitive abilities of the human brain and the formation of highly intelligent neural networks.

    статья, добавлен 15.04.2024

  • Under current conditions telecommunication as the most rapidly-developing branch of engineering. Functional scheme digital commutation system for building communication networks. Distinctive features of hardware tools which are used in the system.

    статья, добавлен 27.06.2016

  • The role of analysis in enterprise management. An overview of the workflow methods used to solve cloud-based enterprise operations management tasks. Substantiation of the relevance of the introduction of cloud technologies based on serverless computing.

    статья, добавлен 22.02.2023

  • The technical aspects of building a solution to our problem of predicting advertisement banner efficiency. Rectified Linear Units activation function. A simple neural network architecture, trustworthy model. Visualizing convolutional neural networks.

    дипломная работа, добавлен 13.07.2020

  • The creating and operating an arbitrary Database in computer mathematics. The conceptual design acts as the construction of an information model of the subject area of the. The definition of the objects of the subject area of the DB, their properties.

    статья, добавлен 17.02.2021

  • Cryptography from the perspective of security and mechanisms to implement them: discussing issues such as e-mail security, public-key architecture, virtual private networks, Web services security, wireless security, and confidentiality and integrity.

    книга, добавлен 08.03.2014

  • Алгоритм навчання класифікатора за незбалансованими неоднорідними навчальними вибірками в практичних задачах моніторингу мережевого трафіка. Розв’язання задачі ідентифікації зашифрованого мережевого трафіка на прикладі додатків VoIP, SSH та BitTorrent.

    статья, добавлен 13.01.2017

  • Переваги та недоліки використання BitTorrent протоколу у комп'ютерних мережах. Характеристика сучаних графічних редакторів. Вивчення програмного продукту V-Ray Chaos Group. Аналіз процесу фотореалістичної візуалізації та рендерингу лісосушильної камери.

    статья, добавлен 30.03.2020

  • Піринговий мережевий протокол для кооперативного обміну файлами через Інтернет. Деталі використання та налагодження "сесії", перехват пакетів. Аналіз обміну пакетів з протоколом BT-uTP. Переваги, недоліки та вразливість використання протоколу BitTorrent.

    курсовая работа, добавлен 06.02.2014

  • Facebook as a social networking service launched in February 2004. Facts and expert’s opinion concerning using it. Join common-interest user groups or organized by workplace. Update like enough to keep your page interesting. Questions for beginners.

    презентация, добавлен 25.01.2014

  • Value of the term "information warfare". Analiz the concept information warfare. The social network "Facebook" in information war. Establishment existence of promotion in a social network. Types of propaganda in social networks. Propaganda against Russia.

    реферат, добавлен 26.12.2014

  • Analysis of existing methods and means of remote work with breadboard Arduino. The advantages of the Tinkercad Internet service in comparison with other tools of remote work. The service capability for microprocessor systems design has been considered.

    статья, добавлен 23.07.2023

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.