Etiquetas
networking
p2p grids
p2p search
unstructured p2p networks
wireless ad-hoc network
computerscience engineering
computer science
structured p2p systems
wireless sensor network
peer to peer
peer-to-peer networks
peer clustering
information technology
computer networks
ad hoc and sensor networks
social networking
unstructured p2p
peer –to-peer information sharing
social networks
live streaming
query routing
• ad hoc and sensor networks
• social networks
peer to peer (p2p)
network theory
network robustness
p2p information retrieval
trust
bloom filters
semantic search
retaliation rule
local reconfiguration
• mobile p2p
internet of things
iot
wireless sensor network (wsn)
local monitoring
identity delegation
colluding collision
misrouting
replication
load balancing
node movement
social network
• p2p information retrieval
adhoc sensor netwoks
cloud computing
network
distributed computing
p2p
elliptic curve cryptography
performance evaluation.
static failure
fault-tolerance
p2p economics
mobile p2p
ad hoc networks
congestion control
peer-to-peer
leach cc
cluster head selection
network life time
leach c
leach
p2p applications and services
reputation and fairness
routing
• security in p2p systems
• p2p economics
• p2p grids
information
information security
kademlia
pastry
dht
peerfactsim
access policy.
attribute based encryption
p2p computing
p2p networks
security
ad-hoc networks
region –based key agreement
timestamp
route record
ip
peer selection
topology awareness
network applications
mobile and wireless networks
security in p2p systems
commercial applications
iot-based medical deviceand applications.
dsdv
ex-dsr and ns2.34
aodv
mobility models
push-pull
mesh structure
video streaming
residual energy.
energy monitoring
dynamic tariff
touch screen.
arduino
amr
permission
critical resource.
complete binary tree
mutual exclusion
distributed algorithm
security and privacy for iot
higher-level query support in
delay-tolerant p2p systems
overlay architectures
block chain
connectivity
sensor networks
networks
blockchain privacy
blockchain foundations
inormation technology
computer
robotics
real time systems
fpga based systems
machine learning
embedded
information processing
video processing
speech processing
image processing
signal processing
mobile networks
software testing
software engineering
can
chord
data mining.
bandwidth allocation
scalable monitoring
polygon approximation.
adaptive mesh
tracking
encryption
optical character recognition (ocr)
support vector machine (svm)
paleography
epigraphy
inscription
real time application
peer
defensive mechanism
detection
attacks
physical
simulation
peer-to-peer streaming
multi-streaming
mesh-pull approach
fault tolerance.
redundancy
and network traffic
access latency
decentralized
replica placement
peer-to-peer network
distributed computing network
overlay multicasting
network services and applications
protocols and services
permission based algorithm
token based algorithm
lazy replication
eager replication
dynamic primary copy
fault tolerance
data replication
distributed database
reputation and fairness in p2p systems
p2p and wireless convergence
advances in theoretical foundations of p2p
peer-to-peer networking
internet of things (iot)
big data
connectivity and networking
deep learning
big data management
big data analytics
5g and networks for big data
wireless multimedia systems
network security
signal processing for iot
electronics
deployment scenarios
experimental results
iot services
iot applications
entrepreneurship
iot-enabled innovation
mobile computing
wireless networks
theory of parallel
software systems
optical computing
networking and architectures
grid computing
bioinformatics
algorithms and applications
virtualization on platforms in
nosql data stores
cloud storage and file systems
cloud computing architecture
parallel processing
case studies and theories
protocols and algorithms
computing
data mining
text mining
pos tagging
morphology
phonology
ontology
linguistic
information retrieval
discourse
dialog systems
nlp
satellite communications
cryptography
social media
electronics and signal processing
security and privacy
visualization
switching
data allocation
mobile ad hoc
ubiquitous networks
wireless communications
mobile & broadband
wireless internet
switching and addressing techniques
high speed networks
block chain issues and trends
iot connectivity and networking
iot security and privacy
blockchain scalability
iot applications and services
blockchain new design
blockchain
• protocols and algorithms
• p2p systems over mobile networks
internet
wireless
sotware engineer
software development
• p2p technology and sensors
timestamps
consistency
epidemic based update protocols
network protocol
multimedia
software
chord.
adhoc networks
p2p system
schema
group splitting
compatibility coefficient
hybrid reputation
networks and communications
5g/6g cellular systems and heterogeneous networks
• applied & fiber optics
• plasma physics
• spectroscopy
• quantum physics
traditional licensure training
technology integration
pre-service technology training
best practices
train-the-teacher
elgamal
insider
outsider
digital signature
schnorr
signcryption
academic performance
decision tree
educational data mining (edm)
social network analysis
tree and mesh topology.
video on demand (vod)
residual energy
ubiquitous networks & cloud computing
network security and privacy
policy of trust in e-leaning systems
social networks & web 2.0 trust management
emerging technologies for next generation network
future internet architecture
network operation and management
discrete algorithms and discrete modeling
communication network protocols
communication network architectures and design
• network applications
• mobile and wireless networks
• future internet architecture
• emerging technologies for next generation networ
• discrete algorithms and discrete modeling
• communication network protocols
• communication network architectures and design
• network operation and management
• mobile and wireless networks • network applicati
p2p workload characterization and simulation
p2p technology and sensors
cooperation and collaboration in p2p systems
and cloud computing
mobile ad hoc network
human-notion of trust
k-means algorithm
lambda architecture
real time intrusion system
data security
overlay multicast
Ver más
- Presentaciones
- Documentos
- Infografías