Methods of traffic regulation and user reputation handling in the bittorrent peer-to-peer Networks
Methods for regulating traffic and handling user reputation in the context of BitTorrent networks. An overview of various methods for calculating user reputation in networks and methods for differentiating the quality of service based on them.
Подобные документы
Standards and the Standardization Process: International, National and Industrial organizations. Cryptographic evaluation bodies. Security Mechanisms and Services. Encryption and Modes of Operation for Block Ciphers. Cryptographic Hash Functions.
?????, добавлен 08.03.2014The pproaches to testing program interfaces in the context of their use in the educational process. An online tool for testing - UsabilityHub.com. Methods of testing the usability of 3D graphics programs for studying threedimensional modeling at school.
??????, добавлен 19.03.2023- 78. A learning platform for developers of fault-tolerant systems based on the signal-parametric approach
Features a training platform for developers of fault-tolerant engineering systems. Application of the theory of diagnosing ? state of the system and flexible recovery of her health. Support adaptive learning process using Bayesian probabilistic networks.
??????, добавлен 13.01.2017 ???? ? ????????? UGC (User Generated Content). ???????? ? ?????????????? ? ????????. ????? ? ???? ??????? ? ????????. ???????????????? ??????? ?????????? ?????. ?????? ? ??????? ??? ???????. ????? ?????????? UGC. ????????? ?????? ? ?????????????? UGC.
???????? ??????, добавлен 28.08.2016The analises widespread adoption of data-driven business intelligence techniques at the operational, tactical, and strategic levels in the mobile industry, coupled with the integration of user-centric metrics, has brought about a paradigm shift.
??????, добавлен 25.06.2024?????????? ??????? ?? ???????? ????????????????? ?????????? ??? ?????????? ?????????? ? ???????? ?????????? ???????. ?????????? ?????????????? ?????? ??? ?????????? ? ??????? HTML. ???????? ????????????? ??????? ?????????? ??? ????? ?????? ???????????.
???????????? ??????, добавлен 26.03.2014???????? ?????????? ????? ???????? ???????? ? ????????????? ? ???? ?????????????? ?????????? (????????????) ????? (Peer-to-Peer, P2P). ?????????????? ?????? ?????????? ????????? ????????? ???? ???????? ???????? ? ??????????????? ????????? ????????????.
??????, добавлен 19.06.2018Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.
???????????? ??????, добавлен 17.03.2016Password authentication is one of essential services in our life for protecting data. In other words, we may loose a lot of money, sensitive data, if passwords leak out. We have to understand clearly what is important for creating or changing passwords.
??????, добавлен 23.06.2016Analysis of the mobile banking information system based on biometric authentication. A function is proposed that ensures the closure of biometric template data in information networks. Estimation of the number of customer requests to the payment system.
??????, добавлен 29.09.2016Cryptology from the romans to world war II. Word perfect encryption as a modern example. Exchanging keys with and without a public key. Key management and authentication in GSM networks. The end of the crypto-monopoly and the role of politics today.
?????, добавлен 08.03.2014- 87. Improving the efficiency of the solution of linear programming tasks applying the CUDA-technology
Methods for improving the efficiency of the solution of large dimensional linear programming tasks based on application of parallel data processing technology – CUDA. The specific features and algorithmic peculiarities of implementing of the program.
??????, добавлен 26.09.2016 The article considers classification of decision support systems by the way of interaction with the user, by the method of support, by the level of data processed by the system. Types of DSS architecture are presented. Intelligent DSS are analyzed.
??????, добавлен 14.02.2022- 89. Optional devices
Description of the main optional devices. TabletPC, processing power and hard drive. Scanner is an input device to the PC color or black and white images from paper. Basic user data: resolving power, scan speed, specifications. Printer, mouse, keyboard.
???????????, добавлен 26.03.2013 Basic directions in the design of the interface. The interaction between human and computer. Introduction to user preferences, as to the operation of the computer system. The principles used to create virtual navigation for the operating system.
???????????, добавлен 28.12.2013Control the computer's resources, the hardware, software as one of the operating systems main tasks. The use of a graphical user interface that eliminates the need to learn complex commands - a feature of the operating systems of the Windows family.
???????????, добавлен 20.04.2016The performance of transmission Multi Input Multi Output beamforming for the multi subscriber in large cell with effective channel throughput has been investigated. Singular value decomposition (SVD) using Single User in 3GPP Long Term Evolution (LTE).
??????, добавлен 23.02.2016- 93. ???? ????????
????????????? ????? ????????? ??????. ??????? ????? ????????????? ? ????? ????????. ????????????? ????????????? ??????? (??????? ???????? ? ??????????) ??? ????????????? ???????? ???????? ? ?????? ST Neural Networks. ??????? ????????? ??? ??????????.
???????, добавлен 21.10.2014 Development of an integrated S-O-R model taking into account cognitive-affective-conative aspects, which adds a new direction to the research of trust in UGC. Life satisfaction and Internet satisfaction as two main mechanisms of online content exchange.
??????, добавлен 23.05.2023Organizational problems that affect the decision. Socio-technical model and methodology of soft systems. Training users find information. The impact of structure in work. Free search system problems computer. Electronic communication as a critical mass.
??????, добавлен 28.12.2013??????????? ?? ??????? ????????????? ????? ? ?????????? ????????? ?????. ???? ?????????? ?????????? ?? ????????????? ????? ? ????’??????? ???????. ?????????????? ??????? ?????????? Transmission Control Protocol ?? User Datagram Protocol, ?????? ??????.
??????, добавлен 14.02.2022Implementing two-party computation efficiently with security against malicious adversaries. Two generic constructions of probabilistic cryptosystems and their applications. Cramer-shoup satisfies a stronger plaintext awareness under a weaker assumption.
?????, добавлен 08.03.2014Concept and prototype for an "assembling" IT intergration portal to be used in higher education. Solution, to use Elgg as an information portal and social media platform. The gap between the closed nature of university IT infrastructure and user-friendly.
??????, добавлен 30.08.2016Analysis of data aggregated preferences. The ranking of the elements as separate and static elements. Evaluation of the algorithms, assumptions, weight and shifting implicit preferences. The essence of ranking elements as a function of their attributes.
????????? ??????, добавлен 30.08.2016Levels of programming support tools. Elements of windowing systems. Possible software architectures. Using toolkits for objects interaction. Paradigms for programming interfaces in applications. Implementation of user interface management systems (UIMS).
???????????, добавлен 28.12.2013