Essays about: "heterogeneous peer-to-peer networks"
Found 4 essays containing the words heterogeneous peer-to-peer networks.
-
1. LEIA: The Live Evidence Information Aggregator : A Scalable Distributed Hypervisor‐based Peer‐2‐Peer Aggregator of Information for Cyber‐Law Enforcement I
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : The Internet in its most basic form is a complex information sharing organism. There are billions of interconnected elements with varying capabilities that work together supporting numerous activities (services) through this information sharing. READ MORE
-
2. Managing high data availability in dynamic distributed derived data management system (D4M) under Churn
University essay from KTH/Kommunikationssystem, CoSAbstract : The popularity of decentralized systems is increasing day by day. These decentralized systems are preferable to centralized systems for many reasons, specifically they are more reliable and more resource efficient. READ MORE
-
3. Distributed Reinforcement Learning for Overlay Networks
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : In this thesis, we study Collaborative Reinforcement Learning (CRL) in the context of Information Retrieval in unstructured distributed systems. Collaborative reinforcement learning is an extension to reinforcement learning to support multiple agents that both share value functions and cooperate to solve tasks. READ MORE
-
4. Optimization of Transport Security for Securing Peer-to-Peer Communication in Heterogeneous Networks
University essay from KTH/Mikroelektronik och Informationsteknik, IMITAbstract : This thesis concerns the security of tomorrow’s peer-to-peer real-time communication in heterogeneous networks. Because of the additional delay caused by inband handshake and the poor compatibilities of some transport protocols, it was determined that existing security protocols such as transport layer security (TLS) and datagram transport layer security (DTLS) are not suitable in such a user scenario and a new security protocol should be designed. READ MORE