• Nem Talált Eredményt

18 eredmény a kulcsszóra: 'framework mobile agents peer peer networks design implementation'

Budapest University of Technology and Economics Department of Automation and Applied Informatics ANALYSIS AND PERFORMANCE EVALUATION OF MOBILE RELATED SOCIAL NETWORKS MOBIL KÉSZÜLÉKEKET TÁMOGATÓ KÖZÖSSÉGI HÁLÓZATOK TELJESÍTMÉNY- ÉS HATÉKONYSÁGVIZSGÁLATA

After it, the chapter contains the architecture of a general hybrid peer-to-peer content sharing solution and highlights that it is applicable even in mobile related social

Protected

N/A

141
0
0
2023
Investigating collaborative and mobility networks: reflections on the core missions of universities

The proposed aggregated (multilayer) centrality strongly correlates with mobility net- works’ centrality and weakly correlates with publication impacts, rather constituting a

Protected

N/A

14
0
0
2022
Időskori szeméremcsonttörések, okkult hátsó gyűrű sérülések vizsgálataDR. GÁRGYÁN ISTVÁN1, DR. CSONKA ÁKOS1, DR. KÓSZÓ BALÁZS1,DR. VÁGI ZSOLT1, DR. BERÉNYI ZSOLT2, DR. VARGA ENDRE1

Az időskori medencegyűrű törések jellemzően kis energiájú sérülések, spontán vagy mini­3. mális traumára jönnek

Protected

N/A

7
0
0
2022
PIC – a Peer-to-Peer Protocol for Mobile Devices

This makes it necessary to adopt a different approach from the case of open user groups, when virtually everybody can become member of the network, like in the case of Gnutella

Protected

N/A

1
0
0
2022
Mobil platformok támogatása modellvezérelt megoldásokkal: Habilitációs tézisfüzet

Charaf, Analytical model for semantic overlay networks in peer-to-peer systems, 4th WSEAS International Conference on Software Engineering, Parallel

Protected

N/A

30
0
0
2023
Charaf Hassan M M

Charaf, Analytical model for semantic overlay networks in peer-to-peer systems, 4th WSEAS International Conference on Software Engineering, Parallel

Protected

N/A

32
0
0
2022
Distributed Clustering of Linear Bandits in Peer to Peer Networks

Moreover, since the algorithm resets to its local informa- tion each time a pruning occurs, once the true clusters have been identified, each cluster shares only information gath-

Protected

N/A

9
0
0
2022
Asynchronous privacy-preserving iterative computation on peer-to-peer networks

Our contribution is twofold: (1) we present a privacy preserving al- gorithm for distributed iteration that is extremely fault tolerant and has a low privacy-related overhead and (2)

Protected

N/A

21
0
0
2022
Distributed Clustering of Linear Bandits in Peer to Peer Networks

Moreover, since the algorithm resets to its local informa- tion each time a pruning occurs, once the true clusters have been identified, each cluster shares only information gath-

Protected

N/A

15
0
0
2022
Budapest University of Technology and Economics Department of Automation and Applied Informatics SEMANTIC INFORMATION RETRIEVAL IN MOBILE PEER-TO-PEER NETWORKS SZEMANTIKUS INFORMÁCIÓ-VISSZAKERESÉS MOBIL PEER-TO-PEER HÁLÓZATOKBAN

We need the analytical model to obtain the ex- pectable hit rate in a semantic overlay network with different network and protocol parameters, and also to analyze the performance

Protected

N/A

144
0
0
2023
RESOURCE OPTIMIZATION IN OPTICAL NETWORKS AND PEER-TO-PEER TRAFFIC IDENTIFICATION IN IP NETWORKS

My theses cover two different areas of telecommunication, namely configuration and resource optimization of optical networks, and traffic identification and analysis of

Protected

N/A

35
0
0
2023
Introducing intelligent search/indexing techniques we can reduce the amount of traffic in the network and balance user load (with some additional cost of implementation complexity)

To summarize, our goul is to create a peer-to-peer protocol, which can be used in a mobile environment for content sharing (requires low bandwidth and processing capabilities),

Protected

N/A

13
0
0
2022
Budapest University of Technology and Economics Department of Automation and Applied Informatics ENERGY EFFICIENT MOBILE PEER-TO-PEER SYSTEMS ENERGIHATÉKONY MOBIL PEER-TO-PEER RENDSZEREK

I have implemented a mobile Kademlia client and shown with measurements that by dropping incoming messages with a fixed probability P drop , the message traffic and the

Protected

N/A

152
0
0
2023
Towards data mining in large and fully distributed peer-to-peer overlay networks

We present distributed algorithms for effectively calculating basic statistics of data using the recently introduced newscast model of computation and we demonstrate how to

Protected

N/A

6
0
0
2022
Háborús pedagógia

német nemzeti és hazafias, most azonban azt kívánják tőle, hogy még németebb legyen, még jobban uralkodjék benne a nemzeti szellem.. Német embereket akarnak nevelni s

Protected

N/A

8
0
0
2022
LOCAL ELECTRICITY MARKET DESIGN FOR PEER-TO-PEER TRANSACTIONS WITH DYNAMIC GRID USAGE PRICING

The marketplace considers network constraints to ensure technical feasibility of local market transactions and the grid effect of the trades are priced by a dynamic network

Protected

N/A

4
0
0
2022
Peer-to-Peer Multi-Class Boosting

An online version of AdaBoost [11] is introduced in [8] that requires a random subset from the training data for each boosting iteration, and the base learner is trained on this

Protected

N/A

13
0
0
2022
Dependable Peer-to-Peer SCADA Architecture

This is particularly obvious in infrastructural SCADA applications (from power distribution, through oil, gas and water transport and distribution systems to even smart

Protected

N/A

13
0
0
2022

Töltsön fel további dokumentumokat, és töltse le azonnal az anyagtanulmányokat!