Peer-to-peer

View this topic in
Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. (Wikipedia.org)






Conferences related to Peer-to-peer

Back to Top

2018 14th IEEE International Conference on Signal Processing (ICSP)

ICSP2018 includes sessions on all aspects of theory, design and applications of signal processing. Prospective authors are invited to propose papers in any of the following areas, but not limited to: A. Digital Signal Processing (DSP)B. Spectrum Estimation & ModelingC. TF Spectrum Analysis & WaveletD. Higher Order Spectral AnalysisE. Adaptive Filtering &SPF. Array Signal ProcessingG. Hardware Implementation for Signal ProcessingH Speech and Audio CodingI. Speech Synthesis & RecognitionJ. Image Processing & UnderstandingK. PDE for Image ProcessingL.Video compression &StreamingM. Computer Vision & VRN. Multimedia & Human-computer InteractionO. Statistic Learning & Pattern RecognitionP. AI & Neural NetworksQ. Communication Signal processingR. SP for Internet and Wireless CommunicationsS. Biometrics & AuthentificationT. SP for Bio-medical & Cognitive ScienceU


2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2018 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions


2018 20th International Conference on Advanced Communication Technology (ICACT)

With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GIRI

  • 2017 19th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by

  • 2016 18th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2015 17th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2014 16th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging system, standard, service, and variety of application on the area of telecommunications. ICACT 2014 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communication technologies.

  • 2013 15th International Conference on Advanced Communication Technology (ICACT)

    Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2009 11th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2008 10th International Conference Advanced Communication Technology (ICACT)

  • 2007 9th International Conference Advanced Communication Technology (ICACT)

  • 2006 8th International Conference Advanced Communication Technology (ICACT)

  • 2005 7th International Conference Advanced Communication Technology (ICACT)

  • 2004 6th International Conference Advanced Communication Technology (ICACT)


2018 24th International Conference on Pattern Recognition (ICPR)

ICPR will be an international forum for discussions on recent advances in the fields of Pattern Recognition, Machine Learning and Computer Vision, and on applications of these technologies in various fields

  • 2016 23rd International Conference on Pattern Recognition (ICPR)

    ICPR'2016 will be an international forum for discussions on recent advances in the fields of Pattern Recognition, Machine Learning and Computer Vision, and on applications of these technologies in various fields.

  • 2014 22nd International Conference on Pattern Recognition (ICPR)

    ICPR 2014 will be an international forum for discussions on recent advances in the fields of Pattern Recognition; Machine Learning and Computer Vision; and on applications of these technologies in various fields.

  • 2012 21st International Conference on Pattern Recognition (ICPR)

    ICPR is the largest international conference which covers pattern recognition, computer vision, signal processing, and machine learning and their applications. This has been organized every two years by main sponsorship of IAPR, and has recently been with the technical sponsorship of IEEE-CS. The related research fields are also covered by many societies of IEEE including IEEE-CS, therefore the technical sponsorship of IEEE-CS will provide huge benefit to a lot of members of IEEE. Archiving into IEEE Xplore will also provide significant benefit to the all members of IEEE.

  • 2010 20th International Conference on Pattern Recognition (ICPR)

    ICPR 2010 will be an international forum for discussions on recent advances in the fields of Computer Vision; Pattern Recognition and Machine Learning; Signal, Speech, Image and Video Processing; Biometrics and Human Computer Interaction; Multimedia and Document Analysis, Processing and Retrieval; Medical Imaging and Visualization.

  • 2008 19th International Conferences on Pattern Recognition (ICPR)

    The ICPR 2008 will be an international forum for discussions on recent advances in the fields of Computer vision, Pattern recognition (theory, methods and algorithms), Image, speech and signal analysis, Multimedia and video analysis, Biometrics, Document analysis, and Bioinformatics and biomedical applications.

  • 2002 16th International Conference on Pattern Recognition


2018 25th IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE Signal Processing Society, is the premier forum for the presentation of technological advances and research results in the fields of theoretical, experimental, and applied image and video processing. ICIP 2018, the 25th in the series that has been held annually since 1994, brings together leading engineers and scientists in image and video processing from around the world.


More Conferences

Periodicals related to Peer-to-peer

Back to Top

Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Broadcasting, IEEE Transactions on

Broadcast technology, including devices, equipment, techniques, and systems related to broadcast technology, including the production, distribution, transmission, and propagation aspects.


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


More Periodicals

Most published Xplore authors for Peer-to-peer

Back to Top

Xplore Articles related to Peer-to-peer

Back to Top

Research on V2V Communication Based on Peer to Peer Network

[{u'author_order': 1, u'affiliation': u'College of Electronic Engineering and Automation, Guilin University of Electronic Technology, 1st Jinji Road, Guilin, 541004, China', u'full_name': u'Liuqing Yang'}, {u'author_order': 2, u'affiliation': u'College of Electronic Engineering and Automation, Guilin University of Electronic Technology, 1st Jinji Road, Guilin, 541004, China', u'full_name': u'Taiping Mo'}, {u'author_order': 3, u'affiliation': u'Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Shenzhen, 518055, China', u'full_name': u'Huiyun Li'}] 2018 International Conference on Intelligent Autonomous Systems (ICoIAS), None

Vehicle networking is an important part of modern intelligent transportation system. Most of the existing vehicle networking is based on the central structure, this structure is prone to single point of failure, resulting in paralysis of the entire system. Therefore, in order to increase the network fault tolerance and maintain the stability of the network system, this paper proposes a ...


On the Applicability of Distributed Ledger Architectures to Peer-to-Peer Energy Trading Framework

[{u'author_order': 1, u'affiliation': u'University Grenoble Alpes, Grenoble INP, CNRS, G2Elab, Grenoble, F-38000, France', u'full_name': u'Van Hoa Nguyen'}, {u'author_order': 2, u'affiliation': u'University Grenoble Alpes, Grenoble INP, CNRS, G2Elab, Grenoble, F-38000, France', u'full_name': u'Yvon Besanger'}, {u'author_order': 3, u'affiliation': u'CEA-INES, 50 Avenue du Lac Léman, Le Bourget-du-lac, 73370, France', u'full_name': u'Quoc Tuan Tran'}, {u'author_order': 4, u'affiliation': u'CEA-INES, 50 Avenue du Lac Léman, Le Bourget-du-lac, 73370, France', u'full_name': u'Minh Tri Le'}] 2018 IEEE International Conference on Environment and Electrical Engineering and 2018 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe), None

As more and more distributed renewable energy resources are integrated to the grid, the traditional consumers have become the prosumers who can sell back their surplus energy to the others who are in energy shortage. This peer-to- peer (P2P) energy transaction framework benefits the end users, financially and in term of energy security; and the network operators, in term of ...


Design and Implementation of an HCI Based Peer to Peer APDU Protocol

[{u'author_order': 1, u'full_name': u'Lukas Gressl'}, {u'author_order': 2, u'full_name': u'Ulrich Neffe'}, {u'author_order': 3, u'full_name': u'Christian Steger'}] 2018 21st Euromicro Conference on Digital System Design (DSD), None

An ever increasing number of System on Chips need secure storage of key material or confidential data, therefore relying on the usage of Secure Elements (SEs). In traditional systems, the SE is a passive device, communicating with the other system's components via a master-slave topology. As applications running on SEs tend to become more involved in the interaction with other ...


Heterogeneous Ensemble for Default Prediction of Peer-to-Peer Lending in China

[{u'author_order': 1, u'affiliation': u'School of Management, Hefei University of Technology, Hefei, China', u'full_name': u'Wei Li'}, {u'author_order': 2, u'affiliation': u'School of Management, Hefei University of Technology, Hefei, China', u'full_name': u'Shuai Ding'}, {u'author_order': 3, u'affiliation': u'School of Management, Hefei University of Technology, Hefei, China', u'full_name': u'Yi Chen'}, {u'author_order': 4, u'affiliation': u'School of Management, Hefei University of Technology, Hefei, China', u'full_name': u'Shanlin Yang'}] IEEE Access, 2018

As a novel financing method, peer-to-peer (P2P) lending has drawn extensive attention as it provides those financers who cannot participate in the traditional financial market with funds. In P2P lending marketplaces, one of the crucial challenges that P2P online lending platforms are facing is to accurately predict the default risk of each loan by tapping into default prediction models, thus ...


Game-Theoretic Approach to Group Learning Enhancement Through Peer-to-Peer Explanation and Competition

[{u'author_order': 1, u'affiliation': u'Department of Electrical and Computer Engineering, Isfahan University of Technology, Isfahan, Iran', u'full_name': u'Seyede Fatemeh Noorani'}, {u'author_order': 2, u'affiliation': u'Department of Electrical and Computer Engineering, Isfahan University of Technology, Isfahan, Iran', u'full_name': u'Mohammad Hossein Manshaei'}, {u'author_order': 3, u'affiliation': u'Department of Electrical and Computer Engineering, Isfahan University of Technology, Isfahan, Iran', u'full_name': u'Mohammad Ali Montazeri'}, {u'author_order': 4, u'affiliation': u'Department of Electrical and Computer Engineering, New York University, Brooklyn, NY, USA', u'full_name': u'Quanyan Zhu'}] IEEE Access, 2018

Learners may not be motivated to actively participate in the stages of learning. This paper aims to motivate learners to get effectively involved in the learning process, i.e., they learn both directly from an instructor and by learning from and teaching each other in an interactive manner. Hence, we introduce a game with a purpose that motivates learners to become ...


More Xplore Articles

Educational Resources on Peer-to-peer

Back to Top

eLearning

No eLearning Articles are currently tagged "Peer-to-peer"

IEEE-USA E-Books

  • Introduction to Network Coding for Mobile Peer to Peer (P2P)

    In this chapter we introduce the concept of network coding and how it can be used in a network. We illustrate the potential of network coding with a simple example that shows how network coding can negate the effect of a bottleneck in the network. Network coding can be especially useful in cooperative scenarios, and therefore we compare the performance of different approaches for data transmission in a small network. To allow for first‐hand experience with network coding, we provide an example implementation of a small messaging program. Based on this example, the reader should be able to implement network coding in other applications.

  • Peer-to-Peer Data Management

    This lecture introduces systematically into the problem of managing large data collections in peer-to-peer systems. Search over large datasets has always been a key problem in peer-to-peer systems and the peer-to-peer paradigm has incited novel directions in the field of data management. This resulted in many novel peer-to-peer data management concepts and algorithms, for supporting data management tasks in a wider sense, including data integration, document management and text retrieval. The lecture covers four different types of peer-to-peer data management systems that are characterized by the type of data they manage and the search capabilities they support. The first type are structured peer-to-peer data management systems which support structured query capabilities for standard data models. The second type are peer-to-peer data integration systems for querying of heterogeneous databases without requiring a common global schema. The third type are peer-to-peer document retrieval ystems that enable document search based both on the textual content and the document structure. Finally, we introduce semantic overlay networks, which support similarity search on information represented in hierarchically organized and multi-dimensional semantic spaces. Topics that go beyond data representation and search are summarized at the end of the lecture. Table of Contents: Introduction / Structured Peer-to-Peer Databases / Peer-to-peer Data Integration / Peer-to-peer Retrieval / Semantic Overlay Networks / Conclusion

  • An Introduction to Models of Online Peer-to-Peer Social Networking

    This book concerns peer-to-peer applications and mechanisms operating on the Internet, particularly those that are not fully automated and involve significant human interaction. So, the realm of interest is the intersection of distributed systems and online social networking. Generally, simple models are described to clarify the ideas. Beginning with short overviews of caching, graph theory and game theory, we cover the basic ideas of structured and unstructured search. We then describe a simple framework for reputations and for iterated referrals and consensus. This framework is applied to a problem of sybil identity management. The fundamental result for iterated Byzantine consensus for a relatively important issue is also given. Finally, a straight- forward epidemic model is used to describe the propagation of malware on-line and for BitTorrent-style file-sharing. This short book can be used as a preliminary orientation to this subject matter. References are given for the interested student to papers with good survey and tutorial content and to those with more advanced treatments of specific topics. For an instructor, this book is suitable for a one-semester seminar course. Alternatively, it could be the framework for a semester's worth of lectures where the instructor would supplement each chapter with additional lectures on related or more advanced subject matter. A basic background is required in the areas of computer networking, probability theory, stochastic processes, and queueing. Table of Contents: Networking overview / Graphs / Games / Search in structured networks / Search in unstructured networks / Transactions, reputations, and referrals / False Referrals / Peer-to-peer file sharing / Consensus in dynamical belief systems / Byzantine consensus / Epidemics

  • Index

    **Explore the potential of mobile P2P networks** _Mobile Peer to Peer (P2P): A Tutorial Guide_ discusses the potential of wireless communication among mobile devices forming mobile peer to peer networks. This book provides the basic programming skills required to set up wireless communication links between mobile devices, offering a guide to the development process of mobile peer to peer networks. Divided into three sections, Part I briefly introduces the basics of wireless technologies, mobile architectures, and communication protocols. Detailed descriptions of Bluetooth, IEEE802.11, and cellular communication link are given and applied to potential communication architectures. Part II focuses on programming for individual wireless technologies, and gives an understanding of the programming environment for individual wireless technologies. In addition, Part III provides advanced examples for mobile peer to peer networks. * Introduces the basics of short-r nge/wireless technologies (such as Bluetooth and IEEE 802.11 Wireless LAN), mobile architectures, and communication protocols * Explains the basic programming environment and the basic wireless communication technologies such as Bluetooth, WiFi (IEEE802.11), and cellular communication examples * Discusses the advancements in meshed networks, mobile social networks and cooperative networks * Provides detailed examples of mobile peer to peer communication including, social mobile networking, cooperative wireless networking, network coding, and mobile gaming * Includes an accompanying website containing programming examples as source code _Mobile Peer to Peer (P2P): A Tutorial Guide_is an invaluable reference for advanced students on wireless/mobile communications courses, and researchers in various areas of mobile communications (mashups, social mobile networks, network coding, etc.) Undergraduate students and practitioners wishing to learn how to build mobile peer to peer networks will also find this book of interest.

  • Developing Java Games on Symbian OS‐Based Mobile Devices

    Games are one of the most popular applications on mobile phones. Even the first mobile phones with a monochrome screen had different types of game such as Tetris and Snake. Developing games for mobile phones differs from game development for desktop computers, as the capabilities of mobile phones are limited. For instance, it is hard to handle the keyboard, there is no mouse‐like pointing device, and the screen size of the mobile phone is small, which makes it difficult to display the game area effectively. Besides this, people usually play with mobile games in different conditions, such as on a bus or metro while travelling. This shows that developing games for mobile phones requires creativity from developers. One of the most popular platforms for mobile game development is Java ME. This chapter first discusses Java ME implementation on Symbian OS from the game development point of view. The processing power of mobile applications is then demonstrated via a small measurement. In the second part of the chapter, a complex interactive game is described, called MobSensor. MobSensor basically turns the mobile phone into a motion and noise detector and enables a sensor network to be created from mobile phones via ad hoc WLAN communication. MobSensor has several uses including actual game play, where the task of one player is to build up a sensor network from a specific number of mobile phones in a large area and the task of the other is to go through the area without being detected.

  • Introduction to Bluetooth Communication on Mobile Devices

    This chapter describes the Bluetooth APIs offered by the Symbian OS. The main focus lies on basic Bluetooth communication issues. Furthermore, the chapter gives several examples covering the most important Bluetooth functionality, such as client discovery and communication issues.

  • SymTorrent and GridTorrent: Developing BitTorrent Clients on the Symbian Platform

    This chapter aims to give an insight into how a complex peer‐to‐peer (P2P) application can be created on Symbian OS using C++. It focuses on BitTorent, which is one of today's most important P2P protocols. In addition to giving a short overview of the main concepts behind BitTorrent, two actual Symbian OS clients are introduced. SymTorrent and GridTorrent are the only Symbian OS BitTorrent clients to date. Through code snippets from these applications, many programming topics are covered, such as networking, sockets, and using the HTTP framework of Symbian OS. Since we do not go into the actual protocol implementation, but instead focus on the more general concepts, most of the topics covered here can be reused in any application using networking.

  • Mobile Peer‐to‐Peer Networks: An Introduction to the Tutorial Guide

    The first chapter demonstrates the importance of mobile peer‐to‐peer networks. Starting from the very first communication architectures, the evolution towards mobile peer‐to‐peer networks is described. Different forms of mobile peer‐to‐peer networking are explained by means of examples such as cooperative networking and social mobile networking. The chapter also gives an overview of existing and future wireless and mobile communication technologies, covering WiFi, Bluetooth in its current and future forms, and cellular systems such as UMTS, HSDPA, and WiMAX/LTE.

  • The Symbian C++ Programming Environment

    This chapter familiarizes the reader with the programming environment of the Symbian C++ programming language. This should enable the reader to understand the examples given in the following chapters. After setting up the development environment, we will test the set‐up by building a helloworld application and then run it using the emulator and mobile device.

  • Developing Network‐Capable Applications

    The network capabilities of mobile phones are increasing rapidly. Mobile software platforms enable applications to retrieve information related to current network status and allow different types of network connections to be established. This means that mobile applications can now connect across the Internet in much the same way as applications developed for personal computers. The first part of this chapter demonstrates how we can retrieve relevant mobile network data on Symbian OS, such as the operator name or the signal strength. An additional example shows how the method introduced can also be used to retrieve mobile‐device‐related information such as battery level. The second part of the chapter discusses an advanced example where we demonstrate how we can connect a mobile client to a simple webshop. This part basically describes general methods for connecting mobile applications to websites, and they can be used in other solutions as well.



Standards related to Peer-to-peer

Back to Top

IEEE Standard for a High Performance Serial Bus Peer-to-Peer Data Transport Protocol (PPDT)

This is a full-use standard whose scope is the definition of a peer-to-peer data transport protocol between Serial Bus devices that implement ANSI NCITS 325-1998, Serial Bus Protocol 2. The facilities specified include, but are not limited to device and service discovery, self-configurable (plug and play) binding of software device drivers to PPDT devices and service connection management.


Standard for Utility Industry End Device Data Tables

To develop a standard for utility end device application layer communications protocol and the functional data structures which it transports. It is to allow operation of end devices for utility distribution and customer applications.



Jobs related to Peer-to-peer

Back to Top