Peer-to-peer

View this topic in
Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. (Wikipedia.org)






Conferences related to Peer-to-peer

Back to Top

ICASSP 2017 - 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.


2016 IEEE International Conference on Image Processing (ICIP)

Signal processing, image processing, biomedical imaging, multimedia, video, multidemensional.


ICC 2015 - 2015 IEEE International Conference on Communications

IEEE ICC is one of the two flagship IEEE conferences in the field of communications; London is to host this conference in 2015. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicise themselves and their products among the leaders of communications industries from all over the world.

  • ICC 2014 - 2014 IEEE International Conference on Communications

    The International Conference on Communications (ICC) is one of the two flagship conferences of the IEEE Communications Society, together with IEEE Globecom. Each year the ICC conference attracts about 2-3.000 submitted scientific papers, a technical program committee involving about 1.500 experts provides more than 10.000 reviews, the conference being finally attended by 1.500 - 2.000 professionals from all around the world. IEEE ICC is therefore one of the most significant scientific events of the networking and communications community, a must-attend forum for both industrials and academics working in this area.

  • ICC 2013 - 2013 IEEE International Conference on Communications

    A full programs of technical and professional activities spanning the entire range of hot topics in voice, data, image, quality of service, home networking, signal processing, wireless, optical, and multimedia communications

  • ICC 2012 - 2012 IEEE International Conference on Communications

    Full programs of technical and professional activities spanning the entire range of hot topics in voice, data, image, quality of service, home networking, signal processing, wireless, optical, and multimedia communications

  • ICC 2011 - 2011 IEEE International Conference on Communications

    A full programs of technical and professional activities spanning the entire range of hot topics in voice, data, image, quality of service, home networking, signal processing, wireless, optical, and multimedia communications.

  • ICC 2010 - 2010 IEEE International Conference on Communications

    Telecommunications


2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)

IEEE Consumer Communications and Networking Conference, sponsored by IEEE Communications Society, is a major annual international conference organized with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of consumer communications and networking.


2014 IEEE Information Theory Workshop (ITW)

ITW2014 is a forum for technical exchange among scientists and engineers working on the fundamentals of information theory. The agenda is broad and will cover the diverse topics that information theory presently impacts. There will be both invited and contributed sessions.

  • 2012 IEEE Information Theory Workshop (ITW 2012)

    The past decade has seen an exponential increase in the data stored in distributed locations in various forms including corporate & personal data, multimedia, and medical data in repositories. The grand challenge is to store, process and transfer this massive amount of data, efficiently and securely over heterogeneous communication networks.

  • 2010 IEEE Information Theory Workshop (ITW 2010)

    Algebraic Methods in Communications Technology

  • 2009 IEEE Information Theory Workshop (ITW 2009)

    Covers the most relevant topics in Information Theory and Coding Theory of interest to the most recent applications to wireless networks, sensor networks, and biology

  • 2008 IEEE Information Theory Workshop (ITW 2008)

    This workshop will take a brief look into the recent information theory past to commemorate the 60th anniversary of Shannon's landmark paper, and then proceed to explore opportunities for information theory research in quantum computation, biology, statistics, and computer science.

  • 2006 IEEE Information Theory Workshop (ITW 2006)


More Conferences

Periodicals related to Peer-to-peer

Back to Top

Broadcasting, IEEE Transactions on

Broadcast technology, including devices, equipment, techniques, and systems related to broadcast technology, including the production, distribution, transmission, and propagation aspects.


Knowledge and Data Engineering, IEEE Transactions on

Artificial intelligence techniques, including speech, voice, graphics, images, and documents; knowledge and data engineering tools and techniques; parallel and distributed processing; real-time distributed processing; system architectures, integration, and modeling; database design, modeling, and management; query design, and implementation languages; distributed database control; statistical databases; algorithms for data and knowledge management; performance evaluation of algorithms and systems; data communications aspects; system ...


Parallel and Distributed Systems, IEEE Transactions on

IEEE Transactions on Parallel and Distributed Systems (TPDS) is published monthly. Topic areas include, but are not limited to the following: a) architectures: design, analysis, and implementation of multiple-processor systems (including multi-processors, multicomputers, and networks); impact of VLSI on system design; interprocessor communications; b) software: parallel languages and compilers; scheduling and task partitioning; databases, operating systems, and programming environments for ...


Vehicular Technology, IEEE Transactions on

IEEE Transactions on Vehicular Technology was one of the most-cited journals, ranking number-six (tying with IEEE Communications Letters) in telecommunications in 2002, according to the annual Journal Citation Report (2002 edition) published by the Institute for Scientific Information. This periodical covers land, airborne, and maritime mobile services; portable or hand-carried and citizens' communications services, when used as an adjunct to ...




Xplore Articles related to Peer-to-peer

Back to Top

Current benefits and future directions of NFC services

Kerem Ok; Vedat Coskun; Mehmet N. Aydin; Busra Ozdenizci 2010 International Conference on Education and Management Technology, 2010

Near Field Communication (NFC), as an emerging and promising technology, is an integration of Radio Frequency Identification (RFID) technology with mobile devices. NFC-enabled mobile devices can act as contactless smart cards and are also capable to read and write data from/to those cards. Research endeavours concerning NFC appear to focus mainly on development of NFC enabled services and applications. On ...


A trust brokering system and its application to resource management in public-resource grids

F. Azzedin; Muthucumaru Maheswaran 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings., 2004

Summary form only given. We present a trust brokering system that operates in a peer-to-peer manner. The network of trust brokers operate by providing peer reviews in the form of recommendations regarding potential resource targets. One of the distinguishing features of our work is that it separately models the accuracy and honesty concepts. By separately modeling these concepts, our model ...


Measuring P2P network topology through geo-location-aware distributed crawlers

Pratama Putra; Akihiro Nakao 8th Asia-Pacific Symposium on Information and Telecommunication Technologies, 2010

Network topology information of peer-to-peer applications is useful for examining their characteristics as well as defining an accurate model to simulate their behaviors. Unfortunately, dynamic behaviors of peers such as join and leave make it difficult to obtain the accurate network topology information. In this paper, we propose a method to accurately measure the topology of a Winny network even ...


A Design of Generalized Peer-to-Peer Based IPTV System Using Multiple Chain Architecture

Jihoon Kim; Younghan Kim 2009 Proceedings of 18th International Conference on Computer Communications and Networks, 2009

In this paper, we propose a P2P-based IPTV system using a multiple chain architecture. The proposed system robustly accommodates peer churn. As opposed to the Internet, the IPTV network managed by a single ISP has fewer bandwidth constraints and guarantees stability. Therefore, we emphasize preferentially the robustness of a P2P network in an IPTV environment. A single chain structure, which ...


HiPEC: A Hybrid P2P Model for Electronic Commerce

Guiyi Wei; Mande Xie; Guanglan Zhou 2008 IEEE Symposium on Advanced Management of Information for Globalized Enterprises (AMIGE), 2008

Decentralized and unstructured peer-to-peer (P2P) network system is becoming one of the most popular file sharing systems on the Internet. Due to its prominent merit, a P2P network becomes an effective distribution channel for selling digital products on the Internet. But there are still many constraints curbing electronic commerce on P2P networks. The main problem is that peers can not ...


More Xplore Articles

Educational Resources on Peer-to-peer

Back to Top

eLearning

Current benefits and future directions of NFC services

Kerem Ok; Vedat Coskun; Mehmet N. Aydin; Busra Ozdenizci 2010 International Conference on Education and Management Technology, 2010

Near Field Communication (NFC), as an emerging and promising technology, is an integration of Radio Frequency Identification (RFID) technology with mobile devices. NFC-enabled mobile devices can act as contactless smart cards and are also capable to read and write data from/to those cards. Research endeavours concerning NFC appear to focus mainly on development of NFC enabled services and applications. On ...


A trust brokering system and its application to resource management in public-resource grids

F. Azzedin; Muthucumaru Maheswaran 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings., 2004

Summary form only given. We present a trust brokering system that operates in a peer-to-peer manner. The network of trust brokers operate by providing peer reviews in the form of recommendations regarding potential resource targets. One of the distinguishing features of our work is that it separately models the accuracy and honesty concepts. By separately modeling these concepts, our model ...


Measuring P2P network topology through geo-location-aware distributed crawlers

Pratama Putra; Akihiro Nakao 8th Asia-Pacific Symposium on Information and Telecommunication Technologies, 2010

Network topology information of peer-to-peer applications is useful for examining their characteristics as well as defining an accurate model to simulate their behaviors. Unfortunately, dynamic behaviors of peers such as join and leave make it difficult to obtain the accurate network topology information. In this paper, we propose a method to accurately measure the topology of a Winny network even ...


A Design of Generalized Peer-to-Peer Based IPTV System Using Multiple Chain Architecture

Jihoon Kim; Younghan Kim 2009 Proceedings of 18th International Conference on Computer Communications and Networks, 2009

In this paper, we propose a P2P-based IPTV system using a multiple chain architecture. The proposed system robustly accommodates peer churn. As opposed to the Internet, the IPTV network managed by a single ISP has fewer bandwidth constraints and guarantees stability. Therefore, we emphasize preferentially the robustness of a P2P network in an IPTV environment. A single chain structure, which ...


HiPEC: A Hybrid P2P Model for Electronic Commerce

Guiyi Wei; Mande Xie; Guanglan Zhou 2008 IEEE Symposium on Advanced Management of Information for Globalized Enterprises (AMIGE), 2008

Decentralized and unstructured peer-to-peer (P2P) network system is becoming one of the most popular file sharing systems on the Internet. Due to its prominent merit, a P2P network becomes an effective distribution channel for selling digital products on the Internet. But there are still many constraints curbing electronic commerce on P2P networks. The main problem is that peers can not ...


More eLearning Resources

IEEE-USA E-Books

  • The Economic Impacts of Crowd-Based Capitalism

    This chapter contains sections titled: The Trouble with GDP, Additional Measurement Challenges in the Digital Economy, Four Key Economic Effects, A Deep Dive into Peer-to-Peer Rental Markets

  • Concluding Thoughts

    Sharing isn't new. Giving someone a ride, having a guest in your spare room, running errands for someone, participating in a supper club -- these are not revolutionary concepts. What is new, in the "sharing economy," is that you are not helping a friend for free; you are providing these services to a stranger for money. In this book, Arun Sundararajan, an expert on the sharing economy, explains the transition to what he describes as "crowd-based capitalism" -- a new way of organizing economic activity that may supplant the traditional corporate-centered model. As peer-to-peer commercial exchange blurs the lines between the personal and the professional, how will the economy, government regulation, what it means to have a job, and our social fabric be affected? Drawing on extensive research and numerous real-world examples -- including Airbnb, Lyft, Uber, Etsy, TaskRabbit, France's BlaBlaCar, China's Didi Kuaidi, and India's Ola, Sundararajan explains the basics of crowd-b sed capitalism. He describes the intriguing mix of "gift" and "market" in its transactions, demystifies emerging blockchain technologies, and clarifies the dizzying array of emerging on-demand platforms. He considers how this new paradigm changes economic growth and the future of work. Will we live in a world of empowered entrepreneurs who enjoy professional flexibility and independence? Or will we become disenfranchised digital laborers scurrying between platforms in search of the next wedge of piecework? Sundararajan highlights the important policy choices and suggests possible new directions for self-regulatory organizations, labor law, and funding our social safety net.

  • TRANSPORT AND APPLICATION SECURITY DESIGN AND USE

    This chapter considers security mechanisms/tools within protocols and application frameworks. The fundamentals of the available security protocols deployable within the transport layer are transport layer security protocol (TLSv1.2) used over transmission control protocol (TCP), secure sockets Layer protocol (SSLv3) used over TCP, secure shell protocol (SSH) used over TCP, and datagram transport layer security protocol (DTLSvl) used over user datagram protocol (UDP). Service application protocols are used to provide communication between application client programs, frequently called user agents (UAs), and application servers. These protocols include the following: electronic mail (email), World Wide Web (web) and Identity Management (IdM), voice over internet protocol (VoIP), and instant messaging (IM). The protocols also include peer-to-peer networks and applications, Java for distributed applications, .NET for distributed applications, CORBA for distributed applications and DCE for distributed applications.

  • Paying for Public Goods

    This chapter contains sections titled: Introduction, Competitive Intermediators, Compensating Artists in a Word with Peer-to-Peer Filing Sharing, Listeners Would Have to Pay, But Could Choose Who They Paid, Experiment, Evaluate, and Learn, Supporting Health Care R & D, Matching Funds --eBay Meets the Public Domain, How It Would Work, Conclusion, Acknowledgments, Notes, References

  • Networks and Governance

    When the prevailing system of governing divides the planet into mutually exclusive territorial monopolies of force, what institutions can govern the Internet, with its transnational scope, boundless scale, and distributed control? Given filtering-censorship by states and concerns over national cyber-security, it is often assumed that the Internet will inevitably be subordinated to the traditional system of nation-states. In Networks and States, Milton Mueller counters this, showing how Internet governance poses novel and fascinating governance issues that give rise to a global politics and new transnational institutions. Drawing on theories of networked governance, Mueller provides a broad overview of Internet governance from the formation of ICANN to the clash at the World Summit on the Information Society (WSIS), the formation of the Internet Governance Forum, the global assault on peer-to-peer file sharing and the rise of national-level Internet control and security concerns. Mueller identifies four areas of conflict and coordination that are generating a global politics of Internet governance: intellectual property, cyber-security, content regulation, and the control of critical Internet resources (domain names and IP addresses). He investigates how recent theories about networked governance and peer production can be applied to the Internet, offers case studies that illustrate the Internet's unique governance problems, and charts the historical evolution of global Internet governance institutions, including the formation of a transnational policy network around the WSIS. Internet governance has become a source of conflict in international relations. Networks and States explores the important role that emerging transnational institutions could play in fostering global governance of communication-information policy.

  • Efficiency of Caching and Content Delivery in Broadband Access Networks

    This chapter discusses the efficiency aspects of caching systems. It explains the applications and performance aspects of caching. This is followed by a discussion on user request pattern for Internet content that can be characterized by Zipf laws with positive effect on cache hit rates. Traditionally, there are two main application areas for caching: Caching by operation systems of computers in fast storage in order to shorten delays in data access, and Web caching in order to shorten transport paths. The chapter evaluates the influence of caching strategies on the hit rate and reveals large differences between simple approaches and more elaborate methods, which combine statistics on requests in the past with adaption capability to changing popularity of objects. It concludes with a discussion on traffic management and optimization via content delivery (CDN) and peer???to???peer (P2P) overlays on the network infrastructure.

  • The Space of Flows, Timeless Time, and Mobile Networks

    Wireless networks are the fastest growing communications technology in history. Are mobile phones expressions of identity, fashionable gadgets, tools for life--or all of the above? Mobile Communication and Society looks at how the possibility of multimodal communication from anywhere to anywhere at any time affects everyday life at home, at work, and at school, and raises broader concerns about politics and culture both global and local.Drawing on data gathered from around the world, the authors explore who has access to wireless technology, and why, and analyze the patterns of social differentiation seen in unequal access. They explore the social effects of wireless communication-- what it means for family life, for example, when everyone is constantly in touch, or for the idea of an office when workers can work anywhere. Is the technological ability to multitask further compressing time in our already hurried existence?The authors consider the rise of a mobile youth culture based on peer-to-peer networks, with its own language of texting, and its own values. They examine the phenomenon of flash mobs, and the possible political implications. And they look at the relationship between communication and development and the possibility that developing countries could "leapfrog" directly to wireless and satellite technology. This sweeping book--moving easily in its analysis from the United States to China, from Europe to Latin America and Africa--answers the key questions about our transformation into a mobile network society.

  • Blockchain Economies: The Crowd as the Market Maker

    This chapter contains sections titled: Understanding Decentralized Peer-to- Peer Exchange, Value Creation and Capture in Decentralized Exchange, Some Challenges and Opportunities

  • New DDBE Architectures

    This chapter contains sections titled: Cooperative DBEs Peer-to-Peer DDBEs Comparing COOP and P2P Summary Glossary References Exercises

  • Index

    Sharing isn't new. Giving someone a ride, having a guest in your spare room, running errands for someone, participating in a supper club -- these are not revolutionary concepts. What is new, in the "sharing economy," is that you are not helping a friend for free; you are providing these services to a stranger for money. In this book, Arun Sundararajan, an expert on the sharing economy, explains the transition to what he describes as "crowd-based capitalism" -- a new way of organizing economic activity that may supplant the traditional corporate-centered model. As peer-to-peer commercial exchange blurs the lines between the personal and the professional, how will the economy, government regulation, what it means to have a job, and our social fabric be affected? Drawing on extensive research and numerous real-world examples -- including Airbnb, Lyft, Uber, Etsy, TaskRabbit, France's BlaBlaCar, China's Didi Kuaidi, and India's Ola, Sundararajan explains the basics of crowd-b sed capitalism. He describes the intriguing mix of "gift" and "market" in its transactions, demystifies emerging blockchain technologies, and clarifies the dizzying array of emerging on-demand platforms. He considers how this new paradigm changes economic growth and the future of work. Will we live in a world of empowered entrepreneurs who enjoy professional flexibility and independence? Or will we become disenfranchised digital laborers scurrying between platforms in search of the next wedge of piecework? Sundararajan highlights the important policy choices and suggests possible new directions for self-regulatory organizations, labor law, and funding our social safety net.



Standards related to Peer-to-peer

Back to Top

IEEE Standard for a High Performance Serial Bus Peer-to-Peer Data Transport Protocol (PPDT)

This is a full-use standard whose scope is the definition of a peer-to-peer data transport protocol between Serial Bus devices that implement ANSI NCITS 325-1998, Serial Bus Protocol 2. The facilities specified include, but are not limited to device and service discovery, self-configurable (plug and play) binding of software device drivers to PPDT devices and service connection management.



Jobs related to Peer-to-peer

Back to Top