Peer-to-peer

View this topic in
Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. (Wikipedia.org)






Conferences related to Peer-to-peer

Back to Top

ICASSP 2017 - 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.


2016 IEEE International Conference on Image Processing (ICIP)

Signal processing, image processing, biomedical imaging, multimedia, video, multidemensional.


ICC 2015 - 2015 IEEE International Conference on Communications

IEEE ICC is one of the two flagship IEEE conferences in the field of communications; London is to host this conference in 2015. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicise themselves and their products among the leaders of communications industries from all over the world.

  • ICC 2014 - 2014 IEEE International Conference on Communications

    The International Conference on Communications (ICC) is one of the two flagship conferences of the IEEE Communications Society, together with IEEE Globecom. Each year the ICC conference attracts about 2-3.000 submitted scientific papers, a technical program committee involving about 1.500 experts provides more than 10.000 reviews, the conference being finally attended by 1.500 - 2.000 professionals from all around the world. IEEE ICC is therefore one of the most significant scientific events of the networking and communications community, a must-attend forum for both industrials and academics working in this area.

  • ICC 2013 - 2013 IEEE International Conference on Communications

    A full programs of technical and professional activities spanning the entire range of hot topics in voice, data, image, quality of service, home networking, signal processing, wireless, optical, and multimedia communications

  • ICC 2012 - 2012 IEEE International Conference on Communications

    Full programs of technical and professional activities spanning the entire range of hot topics in voice, data, image, quality of service, home networking, signal processing, wireless, optical, and multimedia communications

  • ICC 2011 - 2011 IEEE International Conference on Communications

    A full programs of technical and professional activities spanning the entire range of hot topics in voice, data, image, quality of service, home networking, signal processing, wireless, optical, and multimedia communications.

  • ICC 2010 - 2010 IEEE International Conference on Communications

    Telecommunications


2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)

IEEE Consumer Communications and Networking Conference, sponsored by IEEE Communications Society, is a major annual international conference organized with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of consumer communications and networking.


2014 IEEE Information Theory Workshop (ITW)

ITW2014 is a forum for technical exchange among scientists and engineers working on the fundamentals of information theory. The agenda is broad and will cover the diverse topics that information theory presently impacts. There will be both invited and contributed sessions.

  • 2012 IEEE Information Theory Workshop (ITW 2012)

    The past decade has seen an exponential increase in the data stored in distributed locations in various forms including corporate & personal data, multimedia, and medical data in repositories. The grand challenge is to store, process and transfer this massive amount of data, efficiently and securely over heterogeneous communication networks.

  • 2010 IEEE Information Theory Workshop (ITW 2010)

    Algebraic Methods in Communications Technology

  • 2009 IEEE Information Theory Workshop (ITW 2009)

    Covers the most relevant topics in Information Theory and Coding Theory of interest to the most recent applications to wireless networks, sensor networks, and biology

  • 2008 IEEE Information Theory Workshop (ITW 2008)

    This workshop will take a brief look into the recent information theory past to commemorate the 60th anniversary of Shannon's landmark paper, and then proceed to explore opportunities for information theory research in quantum computation, biology, statistics, and computer science.

  • 2006 IEEE Information Theory Workshop (ITW 2006)


More Conferences

Periodicals related to Peer-to-peer

Back to Top

Broadcasting, IEEE Transactions on

Broadcast technology, including devices, equipment, techniques, and systems related to broadcast technology, including the production, distribution, transmission, and propagation aspects.


Knowledge and Data Engineering, IEEE Transactions on

Artificial intelligence techniques, including speech, voice, graphics, images, and documents; knowledge and data engineering tools and techniques; parallel and distributed processing; real-time distributed processing; system architectures, integration, and modeling; database design, modeling, and management; query design, and implementation languages; distributed database control; statistical databases; algorithms for data and knowledge management; performance evaluation of algorithms and systems; data communications aspects; system ...


Parallel and Distributed Systems, IEEE Transactions on

IEEE Transactions on Parallel and Distributed Systems (TPDS) is published monthly. Topic areas include, but are not limited to the following: a) architectures: design, analysis, and implementation of multiple-processor systems (including multi-processors, multicomputers, and networks); impact of VLSI on system design; interprocessor communications; b) software: parallel languages and compilers; scheduling and task partitioning; databases, operating systems, and programming environments for ...


Vehicular Technology, IEEE Transactions on

IEEE Transactions on Vehicular Technology was one of the most-cited journals, ranking number-six (tying with IEEE Communications Letters) in telecommunications in 2002, according to the annual Journal Citation Report (2002 edition) published by the Institute for Scientific Information. This periodical covers land, airborne, and maritime mobile services; portable or hand-carried and citizens' communications services, when used as an adjunct to ...




Xplore Articles related to Peer-to-peer

Back to Top

Data Delivery Properties of Human Contact Networks

Nishanth Sastry; D. Manjunath; Karen Sollins; Jon Crowcroft IEEE Transactions on Mobile Computing, 2011

Pocket Switched Networks take advantage of social contacts to opportunistically create data paths over time. This work employs empirical traces to examine the effect of the human contact process on data delivery in such networks. The contact occurrence distribution is found to be highly uneven: contacts between a few node pairs occur too frequently, leading to inadequate mixing in the ...


Playback Delay in Mesh-Based Peer-to-Peer Systems with Random Packet Forwarding

Viktoria Fodor; Ilias Chatzidrossos 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies, 2008

In meshed-based peer-to-peer streaming systems peers forward packets to their neighbors based on local scheduling decisions. The local decisions affect how packets get distributed in the mesh, the probability of duplicates and the distribution of the transmission delays. In this paper we propose an analytic framework that allows the evaluation of various scheduling algorithms. We consider two solutions where scheduling ...


A Preliminary Investigation on Angular Parameters Estimation in a Simplified IR-UWB Indoor Multipath Scenario

V. La Tosa; B. Denis; B. Uguen 2009 IEEE Wireless Communications and Networking Conference, 2009

This paper presents an algorithm that interprets the waveforms associated with received mutipath components in order to estimate their Direction of Arrival (DoA), Direction of Departure (DoD) and Incident Angle to the Indoor Surface (IAIS) in the context of Impulse Radio - Ultra Wide Band (IR-UWB) communications. The proposed solution combines a deterministic description of the filtering effects of antennas ...


Impact of Limited Feedback on Multiple Relay Zero-Forcing Precoding Systems

E. Zeng; S. Zhu; M. Xu 2008 IEEE International Conference on Communications, 2008

In recent literature, it has been shown that in a relaying network utilizing multiple relay precoding, the signal-to- noise ratio (SNR) at each destination node will scale linearly with the number of relays K, which is referred to as the distributed array gain (DAG) K. Different from the prior studies which assume perfect channel state information (CSI) at each of ...


An Identity-Based Key Management Framework for Personal Networks

Khaled Masmoudi; Hossam Afifi Advanced Information Networking and Applications Workshops, 2007, AINAW '07. 21st International Conference on, 2007

Personal networks and PN federations are new networking paradigms that merge concepts from ad hoc, P2P and wireless networks, built around user's needs. Even though they are a promise of a practical achievement of ubiquitous computing, managing security associations in these frameworks proves to be a challenge. We present in this paper a security architecture, including a uniform personal namespace ...


More Xplore Articles

Educational Resources on Peer-to-peer

Back to Top

eLearning

Data Delivery Properties of Human Contact Networks

Nishanth Sastry; D. Manjunath; Karen Sollins; Jon Crowcroft IEEE Transactions on Mobile Computing, 2011

Pocket Switched Networks take advantage of social contacts to opportunistically create data paths over time. This work employs empirical traces to examine the effect of the human contact process on data delivery in such networks. The contact occurrence distribution is found to be highly uneven: contacts between a few node pairs occur too frequently, leading to inadequate mixing in the ...


Playback Delay in Mesh-Based Peer-to-Peer Systems with Random Packet Forwarding

Viktoria Fodor; Ilias Chatzidrossos 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies, 2008

In meshed-based peer-to-peer streaming systems peers forward packets to their neighbors based on local scheduling decisions. The local decisions affect how packets get distributed in the mesh, the probability of duplicates and the distribution of the transmission delays. In this paper we propose an analytic framework that allows the evaluation of various scheduling algorithms. We consider two solutions where scheduling ...


A Preliminary Investigation on Angular Parameters Estimation in a Simplified IR-UWB Indoor Multipath Scenario

V. La Tosa; B. Denis; B. Uguen 2009 IEEE Wireless Communications and Networking Conference, 2009

This paper presents an algorithm that interprets the waveforms associated with received mutipath components in order to estimate their Direction of Arrival (DoA), Direction of Departure (DoD) and Incident Angle to the Indoor Surface (IAIS) in the context of Impulse Radio - Ultra Wide Band (IR-UWB) communications. The proposed solution combines a deterministic description of the filtering effects of antennas ...


Impact of Limited Feedback on Multiple Relay Zero-Forcing Precoding Systems

E. Zeng; S. Zhu; M. Xu 2008 IEEE International Conference on Communications, 2008

In recent literature, it has been shown that in a relaying network utilizing multiple relay precoding, the signal-to- noise ratio (SNR) at each destination node will scale linearly with the number of relays K, which is referred to as the distributed array gain (DAG) K. Different from the prior studies which assume perfect channel state information (CSI) at each of ...


An Identity-Based Key Management Framework for Personal Networks

Khaled Masmoudi; Hossam Afifi Advanced Information Networking and Applications Workshops, 2007, AINAW '07. 21st International Conference on, 2007

Personal networks and PN federations are new networking paradigms that merge concepts from ad hoc, P2P and wireless networks, built around user's needs. Even though they are a promise of a practical achievement of ubiquitous computing, managing security associations in these frameworks proves to be a challenge. We present in this paper a security architecture, including a uniform personal namespace ...


More eLearning Resources

IEEE-USA E-Books

  • Concluding Thoughts

    Sharing isn't new. Giving someone a ride, having a guest in your spare room, running errands for someone, participating in a supper club -- these are not revolutionary concepts. What is new, in the "sharing economy," is that you are not helping a friend for free; you are providing these services to a stranger for money. In this book, Arun Sundararajan, an expert on the sharing economy, explains the transition to what he describes as "crowd-based capitalism" -- a new way of organizing economic activity that may supplant the traditional corporate-centered model. As peer-to-peer commercial exchange blurs the lines between the personal and the professional, how will the economy, government regulation, what it means to have a job, and our social fabric be affected? Drawing on extensive research and numerous real-world examples -- including Airbnb, Lyft, Uber, Etsy, TaskRabbit, France's BlaBlaCar, China's Didi Kuaidi, and India's Ola, Sundararajan explains the basics of crowd-b sed capitalism. He describes the intriguing mix of "gift" and "market" in its transactions, demystifies emerging blockchain technologies, and clarifies the dizzying array of emerging on-demand platforms. He considers how this new paradigm changes economic growth and the future of work. Will we live in a world of empowered entrepreneurs who enjoy professional flexibility and independence? Or will we become disenfranchised digital laborers scurrying between platforms in search of the next wedge of piecework? Sundararajan highlights the important policy choices and suggests possible new directions for self-regulatory organizations, labor law, and funding our social safety net.

  • Index

    Sharing isn't new. Giving someone a ride, having a guest in your spare room, running errands for someone, participating in a supper club -- these are not revolutionary concepts. What is new, in the "sharing economy," is that you are not helping a friend for free; you are providing these services to a stranger for money. In this book, Arun Sundararajan, an expert on the sharing economy, explains the transition to what he describes as "crowd-based capitalism" -- a new way of organizing economic activity that may supplant the traditional corporate-centered model. As peer-to-peer commercial exchange blurs the lines between the personal and the professional, how will the economy, government regulation, what it means to have a job, and our social fabric be affected? Drawing on extensive research and numerous real-world examples -- including Airbnb, Lyft, Uber, Etsy, TaskRabbit, France's BlaBlaCar, China's Didi Kuaidi, and India's Ola, Sundararajan explains the basics of crowd-b sed capitalism. He describes the intriguing mix of "gift" and "market" in its transactions, demystifies emerging blockchain technologies, and clarifies the dizzying array of emerging on-demand platforms. He considers how this new paradigm changes economic growth and the future of work. Will we live in a world of empowered entrepreneurs who enjoy professional flexibility and independence? Or will we become disenfranchised digital laborers scurrying between platforms in search of the next wedge of piecework? Sundararajan highlights the important policy choices and suggests possible new directions for self-regulatory organizations, labor law, and funding our social safety net.

  • No title

    This book results from many years of teaching an upper division course on communication networks in the EECS department at University of California, Berkeley. It is motivated by the perceived need for an easily accessible textbook that puts emphasis on the core concepts behind current and next generation networks. After an overview of how today's Internet works and a discussion of the main principles behind its architecture, we discuss the key ideas behind Ethernet, WiFi networks, routing, internetworking and TCP. To make the book as self contained as possible, brief discussions of probability and Markov chain concepts are included in the appendices. This is followed by a brief discussion of mathematical models that provide insight into the operations of network protocols. Next, the main ideas behind the new generation of wireless networks based on WiMAX and LTE, and the notion of QoS are presented. A concise discussion of the physical layer technologies underlying various networks i also included. Finally, a sampling of topics is presented that may have significant influence on the future evolution of networks including overlay networks like content delivery and peer-to-peer networks, sensor networks, distributed algorithms, Byzantine agreement and source compression. Table of Contents: The Internet / Principles / Ethernet / WiFi / Routing / Internetworking / Transport / Models / WiMAX & LTE / QOS / Physical Layer / Additional Topics

  • No title

    As an alternative to traditional client-server systems, Peer-to-Peer (P2P) systems provide major advantages in terms of scalability, autonomy and dynamic behavior of peers, and decentralization of control. Thus, they are well suited for large-scale data sharing in distributed environments. Most of the existing P2P approaches for data sharing rely on either structured networks (e.g., DHTs) for efficient indexing, or unstructured networks for ease of deployment, or some combination. However, these approaches have some limitations, such as lack of freedom for data placement in DHTs, and high latency and high network traffic in unstructured networks. To address these limitations, gossip protocols which are easy to deploy and scale well, can be exploited. In this book, we will give an overview of these different P2P techniques and architectures, discuss their trade-offs, and illustrate their use for decentralizing several large-scale data sharing applications. Table of Contents: P2P Overla s, Query Routing, and Gossiping / Content Distribution in P2P Systems / Recommendation Systems / Top-k Query Processing in P2P Systems

  • The Space of Flows, Timeless Time, and Mobile Networks

    Wireless networks are the fastest growing communications technology in history. Are mobile phones expressions of identity, fashionable gadgets, tools for life--or all of the above? Mobile Communication and Society looks at how the possibility of multimodal communication from anywhere to anywhere at any time affects everyday life at home, at work, and at school, and raises broader concerns about politics and culture both global and local.Drawing on data gathered from around the world, the authors explore who has access to wireless technology, and why, and analyze the patterns of social differentiation seen in unequal access. They explore the social effects of wireless communication-- what it means for family life, for example, when everyone is constantly in touch, or for the idea of an office when workers can work anywhere. Is the technological ability to multitask further compressing time in our already hurried existence?The authors consider the rise of a mobile youth culture based on peer-to-peer networks, with its own language of texting, and its own values. They examine the phenomenon of flash mobs, and the possible political implications. And they look at the relationship between communication and development and the possibility that developing countries could "leapfrog" directly to wireless and satellite technology. This sweeping book--moving easily in its analysis from the United States to China, from Europe to Latin America and Africa--answers the key questions about our transformation into a mobile network society.

  • Index

    When the prevailing system of governing divides the planet into mutually exclusive territorial monopolies of force, what institutions can govern the Internet, with its transnational scope, boundless scale, and distributed control? Given filtering-censorship by states and concerns over national cyber-security, it is often assumed that the Internet will inevitably be subordinated to the traditional system of nation-states. In Networks and States, Milton Mueller counters this, showing how Internet governance poses novel and fascinating governance issues that give rise to a global politics and new transnational institutions. Drawing on theories of networked governance, Mueller provides a broad overview of Internet governance from the formation of ICANN to the clash at the World Summit on the Information Society (WSIS), the formation of the Internet Governance Forum, the global assault on peer-to-peer file sharing and the rise of national-level Internet control and security concerns. Mueller identifies four areas of conflict and coordination that are generating a global politics of Internet governance: intellectual property, cyber-security, content regulation, and the control of critical Internet resources (domain names and IP addresses). He investigates how recent theories about networked governance and peer production can be applied to the Internet, offers case studies that illustrate the Internet's unique governance problems, and charts the historical evolution of global Internet governance institutions, including the formation of a transnational policy network around the WSIS. Internet governance has become a source of conflict in international relations. Networks and States explores the important role that emerging transnational institutions could play in fostering global governance of communication-information policy.

  • No title

    Cooperative network supercomputing is becoming increasingly popular for harnessing the power of the global Internet computing platform. A typical Internet supercomputer consists of a master computer or server and a large number of computers called workers, performing computation on behalf of the master. Despite the simplicity and benefits of a single master approach, as the scale of such computing environments grows, it becomes unrealistic to assume the existence of the infallible master that is able to coordinate the activities of multitudes of workers. Large-scale distributed systems are inherently dynamic and are subject to perturbations, such as failures of computers and network links, thus it is also necessary to consider fully distributed peer-to-peer solutions. We present a study of cooperative computing with the focus on modeling distributed computing settings, algorithmic techniques enabling one to combine efficiency and fault-tolerance in distributed systems, and the exposit on of trade-offs between efficiency and fault-tolerance for robust cooperative computing. The focus of the exposition is on the abstract problem, called Do-All, and formulated in terms of a system of cooperating processors that together need to perform a collection of tasks in the presence of adversity. Our presentation deals with models, algorithmic techniques, and analysis. Our goal is to present the most interesting approaches to algorithm design and analysis leading to many fundamental results in cooperative distributed computing. The algorithms selected for inclusion are among the most efficient that additionally serve as good pedagogical examples. Each chapter concludes with exercises and bibliographic notes that include a wealth of references to related work and relevant advanced results. Table of Contents: Introduction / Distributed Cooperation and Adversity / Paradigms and Techniques / Shared-Memory Algorithms / Message-Passing Algorithms / The Do-All Problem in Other Setting / Bibliography / Authors' Biographies

  • TRANSPORT AND APPLICATION SECURITY DESIGN AND USE

    This chapter considers security mechanisms/tools within protocols and application frameworks. The fundamentals of the available security protocols deployable within the transport layer are transport layer security protocol (TLSv1.2) used over transmission control protocol (TCP), secure sockets Layer protocol (SSLv3) used over TCP, secure shell protocol (SSH) used over TCP, and datagram transport layer security protocol (DTLSvl) used over user datagram protocol (UDP). Service application protocols are used to provide communication between application client programs, frequently called user agents (UAs), and application servers. These protocols include the following: electronic mail (email), World Wide Web (web) and Identity Management (IdM), voice over internet protocol (VoIP), and instant messaging (IM). The protocols also include peer-to-peer networks and applications, Java for distributed applications, .NET for distributed applications, CORBA for distributed applications and DCE for distributed applications.

  • Network Functionality

    This chapter contains sections titled: Feature Overview Upper Layer Network Formation Policies And Algorithms The Star Network Peer-to-Peer Networks The Network Topology Decision

  • No title

    This lecture introduces systematically into the problem of managing large data collections in peer-to-peer systems. Search over large datasets has always been a key problem in peer-to-peer systems and the peer-to-peer paradigm has incited novel directions in the field of data management. This resulted in many novel peer-to-peer data management concepts and algorithms, for supporting data management tasks in a wider sense, including data integration, document management and text retrieval. The lecture covers four different types of peer-to-peer data management systems that are characterized by the type of data they manage and the search capabilities they support. The first type are structured peer-to-peer data management systems which support structured query capabilities for standard data models. The second type are peer-to-peer data integration systems for querying of heterogeneous databases without requiring a common global schema. The third type are peer-to-peer document retrieval ystems that enable document search based both on the textual content and the document structure. Finally, we introduce semantic overlay networks, which support similarity search on information represented in hierarchically organized and multi-dimensional semantic spaces. Topics that go beyond data representation and search are summarized at the end of the lecture. Table of Contents: Introduction / Structured Peer-to-Peer Databases / Peer-to-peer Data Integration / Peer-to-peer Retrieval / Semantic Overlay Networks / Conclusion



Standards related to Peer-to-peer

Back to Top

IEEE Standard for a High Performance Serial Bus Peer-to-Peer Data Transport Protocol (PPDT)

This is a full-use standard whose scope is the definition of a peer-to-peer data transport protocol between Serial Bus devices that implement ANSI NCITS 325-1998, Serial Bus Protocol 2. The facilities specified include, but are not limited to device and service discovery, self-configurable (plug and play) binding of software device drivers to PPDT devices and service connection management.



Jobs related to Peer-to-peer

Back to Top