Search

Your search keyword '"Peer-to-peer networks"' showing total 730 results

Search Constraints

Start Over You searched for: Descriptor "Peer-to-peer networks" Remove constraint Descriptor: "Peer-to-peer networks"
730 results on '"Peer-to-peer networks"'

Search Results

1. Brief Announcement: A Self-* and Persistent Hub Sampling Service

2. Application of Graph Theory and Variants of Greedy Graph Coloring Algorithms for Optimization of Distributed Peer-to-Peer Blockchain Networks.

4. The essential necessity to invest in the cultivation of peer recovery specialists as organizational leaders

5. The adoption of conservation practices in the Corn Belt: the role of one formal farmer network, Practical Farmers of Iowa.

6. "Half of the Node Records Are Forged?": The Problem of Node Records Forgery in Ethereum Network.

8. The Problem of Node Records Forgery in Ethereum Network

9. Application of Graph Theory and Variants of Greedy Graph Coloring Algorithms for Optimization of Distributed Peer-to-Peer Blockchain Networks

10. Randomized protocols for resilient peer-to-peer networks.

11. “Half of the Node Records Are Forged?”: The Problem of Node Records Forgery in Ethereum Network.

12. DEVELOPING A METHOD FOR THE DETECTION AND IDENTIFICATION OF ROOTSTOCK BLOCKCHAIN NETWORK NODES.

14. Community-Based Gossip Algorithm for Distributed Averaging

15. Data flow dissemination in a network.

16. The adoption of conservation practices in the Corn Belt: the role of one formal farmer network, Practical Farmers of Iowa.

18. Helios.TALK: A decentralised messaging framework that preserves the privacy of users [version 2; peer review: 1 approved, 5 approved with reservations, 1 not approved]

19. ANALYZING THE INFLUENCE OF AGENTS IN TRUST NETWORKS: APPLYING NONSMOOTH EIGENSENSITIVITY THEORY TO A GRAPH CENTRALITY PROBLEM.

20. Practical Provably Secure Flooding for Blockchains

23. Polygon Formation in Distributed Multi-Agent Systems.

24. Teletraffic Analysis of DoS and Malware Cyber Attacks on P2P Networks under Exponential Assumptions.

25. Privacy-friendly Discovery of Common Friends in P2P Networks

26. A fuzzy based hierarchical flash crowd controller for live video streaming in P2P network.

29. Assessing the credibility of online social network messages

30. A Novel Hypercube-based Approach to Overlay Design Algorithms on Topic Distribution Networks.

34. NCtorrent: Peer to Peer File Sharing Over Named Data Networking Using Network Coding

35. Towards Communication-Efficient Peer-To-Peer Networks

36. Developing a method for the detection and identification of rootstock blockchain network nodes

37. Secure and Privacy-Enhancing Decentralized Location-based Services : An over-the-Internet P2P connectivity location-based service, leveraging pseudonyms for privacy enhancement.

38. Time- and Communication-Efficient Overlay Network Construction via Gossip

39. CRYPTOCURRENCY AS A PRIORITY MEANS OF TERRORISM FINANCING IN THE DIGITAL ECONOMY.

40. Formal verification of a peer-to-peer streaming protocol

41. Teletraffic Analysis of DoS and Malware Cyber Attacks on P2P Networks under Exponential Assumptions

42. Applications

44. An HCI Perspective on Distributed Ledger Technologies for Peer-to-Peer Energy Trading

45. Mode-Suppression: A Simple, Stable and Scalable Chunk-Sharing Algorithm for P2P Networks.

46. Peer-to-Peer Networks and Agricultural Conservation

47. Federating Smart Cluster Energy Grids for Peer-to-Peer Energy Sharing and Trading

48. A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won’t Do

50. Client-Server versus Peer-to-Peer.

Catalog

Books, media, physical & digital resources