BitTorrent: extra-locality P2P approach for grid content distribution networks
Since the advent of peer-to-peer (P2P) services and applications,they have kept on growing in popularity and more and more people are using them as time progresses. Currently P2P traffic occupies a significant fraction of nearly 70% internet traffic. With the traffic demand for P2P applications bein...
| Main Authors: | Mantoro, Teddy, Shoukat Ali, Haroon |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
ACM
2009
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/108/ http://irep.iium.edu.my/108/1/2._Bit_Torrent-_Extra-locality_P2P_Approach_for_Grid_Content_Distribution_Networks.pdf |
Similar Items
Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study
by: Teing, Yee Yang, et al.
Published: (2017)
by: Teing, Yee Yang, et al.
Published: (2017)
Reducing Cost and Contention of P2P Live
Streaming through Locality and Piece Selection
by: Md. Shah, W., et al.
Published: (2011)
by: Md. Shah, W., et al.
Published: (2011)
Distributed context processing for intelligent environments
by: Mantoro, Teddy
Published: (2010)
by: Mantoro, Teddy
Published: (2010)
Spiral bit-map signature for content-based images retrieval
by: Wang, Hui Hui
Published: (2003)
by: Wang, Hui Hui
Published: (2003)
Study of intelligence peer selection in enhancing p2p using artificial neural network
by: Cham, Hui
Published: (2014)
by: Cham, Hui
Published: (2014)
P2P Workspace / Sheik Azhar Bux Sheik Azmi Bux
by: Sheik Azhar Bux, Sheik Azmi Bux
Published: (2004)
by: Sheik Azhar Bux, Sheik Azmi Bux
Published: (2004)
PMDA: A malicious peer detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2011)
by: Wei, Xianglin, et al.
Published: (2011)
Metrics evaluation for context-aware computing
by: Mantoro, Teddy
Published: (2009)
by: Mantoro, Teddy
Published: (2009)
MODUL P&P: DAT20903 Principles of Dot Net Programming
by: Berahim, Mazniha, et al.
Published: (2017)
by: Berahim, Mazniha, et al.
Published: (2017)
SMART: a subspace based malicious peers detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2013)
by: Wei, Xianglin, et al.
Published: (2013)
CST333 – Distributed & Grid Computing (Perkomputeran Teragih & Grid)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
Management system for managing P1 and P2 students in counselling unit
by: Nur Syafiqah, Mohamad Sasudin
Published: (2018)
by: Nur Syafiqah, Mohamad Sasudin
Published: (2018)
Face recognition by neural network using bit-planes extracted from an image
by: Ting, K.C, et al.
Published: (2013)
by: Ting, K.C, et al.
Published: (2013)
PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA
by: Wei, Xianglin, et al.
Published: (2012)
by: Wei, Xianglin, et al.
Published: (2012)
An Efficient Image Compression Technique using Tchebichef Bit Allocation
by: Ernawan, Ferda, et al.
Published: (2017)
by: Ernawan, Ferda, et al.
Published: (2017)
iLukBa ver 1.1 : indoor user location system with speech recognition for mobile users
by: Mantoro, Teddy, et al.
Published: (2010)
by: Mantoro, Teddy, et al.
Published: (2010)
The comparison of tardiness in scheduling techniques for task distribution using grid simulation tool
by: Stapa @ Mustapa, Muhamad Azhar
Published: (2008)
by: Stapa @ Mustapa, Muhamad Azhar
Published: (2008)
An intermediate significant bit (ISB) watermarking technique using neural networks
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Improving the security of LBlock lightweight algorithm using bit permutation
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
Bit Allocation Strategy Based on Psychovisual Threshold in Image Compression
by: Ernawan, Ferda, et al.
Published: (2017)
by: Ernawan, Ferda, et al.
Published: (2017)
Unveiling the support of 3D representation in mobile devices for pedestrians navigation aid
by: Abubakar, Adamu, et al.
Published: (2012)
by: Abubakar, Adamu, et al.
Published: (2012)
Web application development process
by: Ibrahim, Adamu Abubakar, et al.
Published: (2011)
by: Ibrahim, Adamu Abubakar, et al.
Published: (2011)
CST333 – DISTRIBUTED & GRID COMPUTING [PERKOMPUTERAN TERAGIH & GRID] DEC. 2016 - JAN. 2017
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2017)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2017)
CST333 – DISTRIBUTED & GRID COMPUTING [PERKOMPUTERAN TERAGIH & GRID] DEC. 2015 - JAN. 2016
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2016)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2016)
CST333 – DISTRIBUTED & GRID COMPUTING [PERKOMPUTERAN TERAGIH & GRID] DEC. 2014 - JAN. 2015
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2015)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2015)
Some applications of Two-Generator p-Groups of Nilpotency class two
by: Sarmin, Nor Haniza, et al.
Published: (2001)
by: Sarmin, Nor Haniza, et al.
Published: (2001)
Software defined networking (SDN) and its security issues
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
Improving the lifetime of wireless sensor networks based on routing power factor
by: Alkalbani, Abdullah Said, et al.
Published: (2012)
by: Alkalbani, Abdullah Said, et al.
Published: (2012)
CST333 - DISTRIBUTED & GRID COMPUTING APRIL 08.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
CST333 – Distributed & Grid Computing January 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
by: PPSKOM, Pusat Pengajian Sains Komputer
Controller performance of P,PI and neral network control in vinyl acetate monomer process.
by: Faizal Nazareth, Ibrahim
Published: (2008)
by: Faizal Nazareth, Ibrahim
Published: (2008)
Novel face recognition approach using bit-level information and dummy blank images in feedforward neural network
by: Boon, David Liang Bong, et al.
Published: (2009)
by: Boon, David Liang Bong, et al.
Published: (2009)
User centered approach for designing a travel website for the elderly / Sumathi a/p Balakrishnan
by: Balakrishnan, Sumathi
Published: (2008)
by: Balakrishnan, Sumathi
Published: (2008)
Current impulse response of thin InP p+–i–n+ diodes
by: YOU, A, et al.
Published: (2006)
by: YOU, A, et al.
Published: (2006)
A novel binary vote assignment grid quorum algorithm for distributed database fragmentation
by: Ainul Azila, Che Fauzi, et al.
Published: (2011)
by: Ainul Azila, Che Fauzi, et al.
Published: (2011)
Map interactive guide using palm Kuala Lumpur (MIGuP-KL) / Noor Azly Mohamed
by: Noor Azly, Mohamed
Published: (2003)
by: Noor Azly, Mohamed
Published: (2003)
Watermarking technique based on ISB (Intermediate Significant Bit)
by: Zeki, Akram M., et al.
Published: (2010)
by: Zeki, Akram M., et al.
Published: (2010)
Embedded web client in LPC2129 16/32 bit ARM7TDMI-S
by: Loh, Lim Chye
Published: (2007)
by: Loh, Lim Chye
Published: (2007)
CST333 – Distributed & Grid Computing (December 2019 / January 2020)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2020)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2020)
32-bit memory controller design: design of memory controller for micron SDR SDRAM
by: Chin, Chun Lek
Published: (2015)
by: Chin, Chun Lek
Published: (2015)
Similar Items
-
Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study
by: Teing, Yee Yang, et al.
Published: (2017) -
Reducing Cost and Contention of P2P Live
Streaming through Locality and Piece Selection
by: Md. Shah, W., et al.
Published: (2011) -
Distributed context processing for intelligent environments
by: Mantoro, Teddy
Published: (2010) -
Spiral bit-map signature for content-based images retrieval
by: Wang, Hui Hui
Published: (2003) -
Study of intelligence peer selection in enhancing p2p using artificial neural network
by: Cham, Hui
Published: (2014)