The impact of file sharing based on the peer-to-peer technology
The development of ICT had enabled file sharing to be implemented easily. The file sharing technology is being developed due to the vast growth of information. However, there are some drawbacks such as data collision, file copying, security and others. This paper focuses precisely on the Peer-To-Pee...
| Main Authors: | Raja Shaharuddin, Raja Aida, Abdullah, Habsah |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Universiti Teknologi Malaysia
2002
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/9887/ http://eprints.utm.my/9887/1/RajaAidaRajaShaharuddin2002_TheImpactofFileSharingBased.pdf |
Similar Items
Models of Interaction as a Grounding for Peer to Peer Knowledge Sharing
by: Robertson, D., et al.
Published: (2008)
by: Robertson, D., et al.
Published: (2008)
Linearizing peer-to-peer systems with Oracles
by: Mohd. Nor, Rizal, et al.
Published: (2013)
by: Mohd. Nor, Rizal, et al.
Published: (2013)
Peer-to-peer video-on-demand in future internet
by: Fouda, Mostafa M., et al.
Published: (2013)
by: Fouda, Mostafa M., et al.
Published: (2013)
Implementing peer to peer technology for ISE virtual community knowledge sharing / Shafizol Bakhtiar Mokhtar
by: Mokhtar, Shafizol Bakhtiar
Published: (2006)
by: Mokhtar, Shafizol Bakhtiar
Published: (2006)
Query routing using query feedback and similarity in unstructured peer to peer networks
by: Ishak, Iskandar, et al.
Published: (2008)
by: Ishak, Iskandar, et al.
Published: (2008)
Peer-to-peer application using Microsoft .Net Framework / Tan Boon Yin
by: Tan, Boon Yin
Published: (2004)
by: Tan, Boon Yin
Published: (2004)
Adaptable Topology For Peer-To-Peer Live Video
Streaming
by: Mahmood, Ammar Waysi
Published: (2015)
by: Mahmood, Ammar Waysi
Published: (2015)
Minimization of Internet Service Providers' inability to control peer-to-peer traffic by using peer-to-peer and software defined network based web search engine (TOC, Abstract, Chapter 1 and Reference only)
by: Chang , Choong Ching
Published: (2014)
by: Chang , Choong Ching
Published: (2014)
Peer-to-peer file-sharing: psychological reactance and the theory of planned behaviour
by: Allen, Peter, et al.
Published: (2010)
by: Allen, Peter, et al.
Published: (2010)
Internet call delay on peer to peer and phone to phone VoIP network
by: A.M., Said, et al.
Published: (2009)
by: A.M., Said, et al.
Published: (2009)
PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA
by: Wei, Xianglin, et al.
Published: (2012)
by: Wei, Xianglin, et al.
Published: (2012)
A systematic review of file sharing in mobile devices using peer-to-peer systems
by: Yasin, Waheed, et al.
Published: (2011)
by: Yasin, Waheed, et al.
Published: (2011)
Quality of service for video packet over peer to peer network using active measurement
by: Joni, Muhammad Affan
Published: (2008)
by: Joni, Muhammad Affan
Published: (2008)
SMART: a subspace based malicious peers detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2013)
by: Wei, Xianglin, et al.
Published: (2013)
The Adaptation of Cloud Solution for Peer Collaboration Work among Teachers in Maktab Nasional Secondary School
by: Romella Marie Sipaul,
Published: (2021)
by: Romella Marie Sipaul,
Published: (2021)
Study of intelligence peer selection in enhancing p2p using artificial neural network
by: Cham, Hui
Published: (2014)
by: Cham, Hui
Published: (2014)
PMDA: A malicious peer detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2011)
by: Wei, Xianglin, et al.
Published: (2011)
Sending the output to a print file
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Information hiding in multimedia files : a literature review
by: Ali Ja’far, Abdullah Mohammed Abdo, et al.
Published: (2006)
by: Ali Ja’far, Abdullah Mohammed Abdo, et al.
Published: (2006)
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Protecting an Internet Web File using Java
by: Taha, Imad, et al.
Published: (2004)
by: Taha, Imad, et al.
Published: (2004)
Agent-Based Resource Discovery In Peer-To-Peer Networks
by: Sedaghat, Mina
Published: (2010)
by: Sedaghat, Mina
Published: (2010)
Dynamics of watermark position in audio watermarked
files using neural networks
by: Abubakar, Adamu, et al.
Published: (2017)
by: Abubakar, Adamu, et al.
Published: (2017)
A community-based peer-to-peer model based on social networks
by: Modarresi, Amir, et al.
Published: (2008)
by: Modarresi, Amir, et al.
Published: (2008)
Mobile Peer-to-Peer Application for Resource Sharing
by: Lee, Jia Yi
Published: (2016)
by: Lee, Jia Yi
Published: (2016)
Trusting Cloud Computing for Personal Files
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Implications of caching for JXTA peers
by: Rozlina, Mohamed
Published: (2014)
by: Rozlina, Mohamed
Published: (2014)
Security Framework Based on Reputation Mechanism for Peer-To-Peer Systems
by: Sinnanaidu, Subba Rao
Published: (2004)
by: Sinnanaidu, Subba Rao
Published: (2004)
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
by: Zahedeh, Zamanian
Published: (2019)
by: Zahedeh, Zamanian
Published: (2019)
An adaptive wrapper algorithm for file transfer applications to support optimal large file transfers
by: Ghobadi, Alireza, et al.
Published: (2009)
by: Ghobadi, Alireza, et al.
Published: (2009)
A Social Network-Based Peer-To-Peer Model For Resource Discovery
by: Modarresi, Amir
Published: (2009)
by: Modarresi, Amir
Published: (2009)
An Analysis of Node/Peer Discovery Approach and Routing Algorithms in Mobile & Traditional Peer-to-Peer Networks
by: Abdullahi, Mohamed Omar
Published: (2012)
by: Abdullahi, Mohamed Omar
Published: (2012)
Visualization of automated plate cutting operation using DXF file
by: Abd. Rahim, Norazura
Published: (2008)
by: Abd. Rahim, Norazura
Published: (2008)
Static and self-scalable filter range selection algorithms for peer-to-peer networks
by: Kweh, Yeah Lun
Published: (2011)
by: Kweh, Yeah Lun
Published: (2011)
Throughput-Received Power Relationship for File Transfer Protocol (FTP) Service in Wireless Mesh Network (WMN)
by: Zakaria, Mohd Sharim, et al.
Published: (2010)
by: Zakaria, Mohd Sharim, et al.
Published: (2010)
Brand Community Building in Peer-to-Peer sharing – The case of Blablacar
by: JACQUE, Laura
Published: (2014)
by: JACQUE, Laura
Published: (2014)
A holistic approach in developing an ensemble mobile peer-to-peer computing
by: Che Mohamed Arif, Ahmad Suki, et al.
Published: (2013)
by: Che Mohamed Arif, Ahmad Suki, et al.
Published: (2013)
Constructing secret sharing schemes based on cyclic
by: Hoo, Mei Hui
Published: (2014)
by: Hoo, Mei Hui
Published: (2014)
Peer review interactions for Malaysian journals: The revamped open-peer review process
by: Ahmad, Jasni, et al.
Published: (2008)
by: Ahmad, Jasni, et al.
Published: (2008)
A novel peer-to-peer personalized advertising framework using ad hoc wireless communication
by: Lok, Jing Ming, et al.
Published: (2005)
by: Lok, Jing Ming, et al.
Published: (2005)
Similar Items
-
Models of Interaction as a Grounding for Peer to Peer Knowledge Sharing
by: Robertson, D., et al.
Published: (2008) -
Linearizing peer-to-peer systems with Oracles
by: Mohd. Nor, Rizal, et al.
Published: (2013) -
Peer-to-peer video-on-demand in future internet
by: Fouda, Mostafa M., et al.
Published: (2013) -
Implementing peer to peer technology for ISE virtual community knowledge sharing / Shafizol Bakhtiar Mokhtar
by: Mokhtar, Shafizol Bakhtiar
Published: (2006) -
Query routing using query feedback and similarity in unstructured peer to peer networks
by: Ishak, Iskandar, et al.
Published: (2008)