networking p2p search p2p grids unstructured p2p networks wireless ad-hoc network computerscience engineering computer science structured p2p systems wireless sensor network peer to peer peer-to-peer networks peer clustering information technology computer networks social networking unstructured p2p peer –to-peer information sharing ad hoc and sensor networks social networks live streaming query routing • ad hoc and sensor networks • social networks peer to peer (p2p) network theory network robustness p2p information retrieval trust bloom filters semantic search retaliation rule local reconfiguration • mobile p2p internet of things iot wireless sensor network (wsn) local monitoring identity delegation colluding collision misrouting replication load balancing node movement social network • p2p information retrieval adhoc sensor netwoks cloud computing network distributed computing elliptic curve cryptography performance evaluation. static failure fault-tolerance ad hoc networks congestion control peer-to-peer leach cc cluster head selection network life time leach c leach reputation and fairness routing • security in p2p systems • p2p economics • p2p grids information information security p2p access policy. attribute based encryption p2p computing p2p networks security ad-hoc networks region –based key agreement timestamp route record ip peer selection topology awareness network applications mobile and wireless networks security in p2p systems p2p economics mobile p2p iot-based medical deviceand applications. dsdv ex-dsr and ns2.34 aodv mobility models push-pull mesh structure video streaming residual energy. energy monitoring dynamic tariff touch screen. arduino amr permission critical resource. complete binary tree mutual exclusion distributed algorithm security and privacy for iot higher-level query support in p2p applications and services delay-tolerant p2p systems overlay architectures block chain connectivity sensor networks networks blockchain privacy blockchain foundations inormation technology computer robotics real time systems fpga based systems machine learning embedded information processing video processing speech processing image processing signal processing mobile networks software testing software engineering kademlia pastry dht peerfactsim data mining. bandwidth allocation scalable monitoring polygon approximation. adaptive mesh tracking encryption optical character recognition (ocr) support vector machine (svm) paleography epigraphy inscription real time application peer defensive mechanism detection attacks physical simulation peer-to-peer streaming multi-streaming mesh-pull approach fault tolerance. redundancy and network traffic access latency decentralized replica placement peer-to-peer network distributed computing network overlay multicasting network services and applications protocols and services permission based algorithm token based algorithm lazy replication eager replication dynamic primary copy fault tolerance data replication distributed database reputation and fairness in p2p systems p2p and wireless convergence commercial applications advances in theoretical foundations of p2p peer-to-peer networking internet of things (iot) big data connectivity and networking deep learning big data management big data analytics 5g and networks for big data wireless multimedia systems network security signal processing for iot electronics deployment scenarios experimental results iot services iot applications entrepreneurship iot-enabled innovation mobile computing wireless networks theory of parallel software systems optical computing networking and architectures grid computing bioinformatics algorithms and applications virtualization on platforms in nosql data stores cloud storage and file systems cloud computing architecture parallel processing case studies and theories protocols and algorithms computing data mining text mining  pos tagging morphology phonology ontology linguistic information retrieval discourse dialog systems nlp satellite communications cryptography social media electronics and signal processing security and privacy visualization switching data allocation mobile ad hoc ubiquitous networks wireless communications mobile & broadband wireless internet switching and addressing techniques high speed networks block chain issues and trends iot connectivity and networking iot security and privacy blockchain scalability iot applications and services blockchain new design blockchain • protocols and algorithms • p2p systems over mobile networks internet wireless sotware engineer software development • p2p technology and sensors timestamps consistency epidemic based update protocols network protocol multimedia software chord. can chord adhoc networks p2p system schema group splitting compatibility coefficient hybrid reputation networks and communications 5g/6g cellular systems and heterogeneous networks • applied & fiber optics • plasma physics • spectroscopy • quantum physics traditional licensure training technology integration pre-service technology training best practices train-the-teacher elgamal insider outsider digital signature schnorr signcryption academic performance decision tree educational data mining (edm) social network analysis tree and mesh topology. video on demand (vod) residual energy ubiquitous networks & cloud computing network security and privacy policy of trust in e-leaning systems social networks & web 2.0 trust management emerging technologies for next generation network future internet architecture network operation and management discrete algorithms and discrete modeling communication network protocols communication network architectures and design • network applications • mobile and wireless networks • future internet architecture • emerging technologies for next generation networ • discrete algorithms and discrete modeling • communication network protocols • communication network architectures and design • network operation and management • mobile and wireless networks • network applicati p2p workload characterization and simulation p2p technology and sensors cooperation and collaboration in p2p systems and cloud computing mobile ad hoc network human-notion of trust k-means algorithm lambda architecture real time intrusion system data security overlay multicast
Mehr anzeigen