• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 6,085
Next 10 →

Table 1: Comparison of Peer-to-peer Models Conclusion Many enterprises are waiting for vendors to come up with software products that allow them to share CPU power with each other. Existing web server technologies can be

in Client/Server vs. Peer-to-peer The Future of Peer-to-peer Computing 1
by Alfred Loo

Table 2. Items included in the peer-to-peer evaluation.

in freshmen take Engineering Design I, and all sophomores enroll in Engineering Design II. Each
by Kazuya Takemata, Masakatsu Matsuishi, Shigeo Matsumoto, Tetsurou Furukawa
"... In PAGE 2: ... The peer- to-peer evaluations took into consideration five items related to teamwork. Table2 contains the items of the peer-to-peer evaluation. Figure 3 shows the standard deviation of the peer-to-peer evaluation for seven teams.... ..."

Table 1: Features and properties of related peer-to-peer systems.

in A distributed, value-oriented XML store
by Tine Thorn, Anders Baumann, Mikkel Fennestad, Peter Sestoft
"... In PAGE 5: ... The XML Store, CFS, PAST and OceanStore all scale well, due to the routing and location schemes that they use. Table1 gives an overview of the most important prop- erties and features of the discussed peer-to-peer systems CFS, PAST, OceanStore, Napster, Gnutella and the XML Store. A more detailed survey of related work in the field of peer-to-peer storage systems can be found in [20].... ..."

Table 1: Features and properties of related peer-to-peer systems.

in A peer-to-peer, value-oriented XML Store
by Tine Thorn, Anders Baumann, Mikkel Fennestad, Peter Sestoft
"... In PAGE 3: ... The XML Store, CFS, PAST and OceanStore all scale well, due to the routing and location schemes that they use. Table1 gives an overview of the most important properties and features of the discussed peer-to-peer systems CFS, PAST, OceanStore, Napster, Gnutella and the XML Store. A more detailed survey of related work in the field of peer-to-peer storage systems can be found in [20].... ..."

Table 5. Peer-to-peer LBS protocol.

in Trusted Server Model for Privacy-Enhanced Location Based Services
by Leonardo A. Martucci, Christer Andersson, Wim Schreurs, Simone Fischer-hübner
"... In PAGE 9: ... For peer-to-peer LBS applications, the LBS provider offers geo- graphical data only, such as maps. In Table5 we present the protocol used by a user uj for pinpointing another user ui. First, in msg1 the user uj sends a service request sreq to ti to localize ui.... ..."

Table 10. Comparison of Different Peer-to-Peer File System

in unknown title
by unknown authors 2005
Cited by 4

Table 1: The architecture of deployed private peer-to-peer networks

in How to Disappear Completely: A Survey of Private Peer-to-Peer Networks
by Michael Rogers, Saleem Bhatti 2007
Cited by 1

Table 1. The architecture of deployed private peer-to-peer networks.

in S: “How to Disappear Completely: A Survey of Private Peer-to-Peer Networks
by Michael Rogers, Saleem Bhatti 2007
Cited by 1

TABLE II PSEUDOCODE FOR PEER-TO-PEER COMMUNICATION

in A cooperative ais framework for intrusion detection
by Katja Luther, Rainer Bye, et al. 2007
Cited by 1

TABLE III PEER-TO-PEER CONNECTIONS VS. FORWARDING

in Peer-to-peer Communications to Prevent Broadcast Diffusion from Feedback Implosion
by P. Delannoy, V. Gauthier, M. Becker
Next 10 →
Results 1 - 10 of 6,085
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University