Search Results - (((((((ant OR kkantis) OR wants) OR hints) OR cantor) OR anne) OR file) OR wanting) algorithms.

  1. 281
  2. 282

    Legitimate applications of peer to peer networks by Verma, Dinesh C.

    Published 2004
    Table of Contents: “…-- Organization of the Book -- 1 The Peer-to-Peer Architecture -- 1.1 Distributed Applications -- 1.1.1 A Distributed Computing Example -- 1.1.2 Client-Server Architecture -- 1.1.3 Peer-to-Peer Architecture -- 1.2 The Peer-to-Peer Software Structure -- 1.2.1 Base Overlay Layer -- 1.2.2 Middleware Functions -- 1.2.3 Application Layer -- 1.3 Comparison of Architectures -- 1.3.1 Ease of Development -- 1.3.2 Manageability -- 1.3.3 Scalability -- 1.3.4 Administrative Domains -- 1.3.5 Security -- 1.3.6 Reliability -- 2 Peer Discovery and Overlay Formation -- 2.1 Discovery -- 2.1.1 Static Configuration -- 2.1.2 Centralized Directory -- 2.1.3 Using the Domain Name Service -- 2.1.4 Member Propagation Techniques with Initial Member Discovery -- 2.2 Overlay Formation -- 2.2.1 Creating an Overlay Link -- 2.3 Topology Selection -- 2.3.1 Random Mesh Formation -- 2.3.2 Tiered Formation -- 2.3.3 Ordered Lattices -- 3 Application-Layer Multicast -- 3.1 General Multicast Techniques -- 3.1.1 Group Addressing -- 3.1.2 Group Maintenance -- 3.1.3 Message Forwarding Scheme -- 3.1.4 Multicast Routing -- 3.1.5 Secure Multicast -- 3.1.6 Reliable Multicast -- 3.1.7 Multicast Flow and Congestion Control -- 3.2 Network-Layer Multicast"IP Multicast -- 3.2.1 Problems with IP-Layer Multicast -- 3.3 Application-Layer Multicast -- 3.3.1 Broadcast Mechanisms in Peer-to-Peer Networks -- 3.3.2 Multicast in Peer-to-Peer Overlays -- 4 File-Sharing Applications -- 4.1 File-Sharing Overview -- 4.1.1 Disk Space Management -- 4.1.2 File Indexing -- 4.1.3 File Search/Retrieval -- 4.1.4 Access Control and Security -- 4.1.5 Anonymous File Retrieval -- 4.1.6 Search Acceleration Techniques -- 4.1.7 Digital Rights Management -- 4.2 Usage of File-Sharing Applications -- 4.2.1 Limitations of File-Sharing Applications -- 4.3 Preventing Unauthorized File Sharing -- 4.3.1 Firewall-Based Techniques -- 4.3.2 Asset Inventory -- 4.3.3 Port Scanning -- 4.3.4 Usage-Based Rate Control -- 4.3.5 Malicious Participation -- 5 File Storage Service -- 5.1 Handle Management -- 5.2 Retrieving Files with Handles -- 5.2.1 Circular Ring Routing -- 5.2.2 Plaxton Scheme -- 5.2.3 CAN Routing Algorithm -- 5.2.4 Modified Network Routing Schemes -- 5.2.5 Modified Broadcast -- 5.3 Miscellaneous Functions -- 5.3.1 Access Control -- 5.3.2 Availability and Reliability -- 5.4 Usage Scenarios -- 5.4.1 Distributed File Systems -- 5.4.2 Anonymous Publishing -- 6 Data Backup Service -- 6.1 The Traditional Data Management System -- 6.2 The Peer-to-Peer Data Management System -- 6.2.1 The Backup/Restore Manager -- 6.2.2 The Peer Searcher -- 6.2.3 The File Searcher -- 6.2.4 The Properties Manager -- 6.2.5 The Data Manager -- 6.2.6 The Schedule Manager -- 6.3 Security Issues -- 6.4 Hybrid Data Management Approach -- 6.5 Feasibility of Peer-to-Peer Data Backup Service -- 7 Peer-to-Peer Directory System -- 7.1 LDAP Dir.…”
    Full text (MFA users only)
    Electronic eBook
  3. 283

    Anesthesia student survival guide : a case-based approach

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  4. 284

    Computers and information processing technologies I : selected, peer reviewed papers from the 2014 International Conference on Computers and Information Processing Technologies (IC...

    Published 2014
    Table of Contents: “…Computers and Information Processing Technologies I; Preface and Conference Organization; Table of Contents; Chapter 1: Advanced Computing Technology and Mathematical Modeling; A Dirichlet-Neumann Alternating Algorithm Using Elliptical Arc Artificial Boundary for Exterior Problems with a Concave Angle; A Large-Scale and Flexible BMS Design; A Quantitative Evaluation Method Based on Hierarchical Architecture Model of Cloud Service Availability; Research on MapReduce Task Dynamic Balancing Strategy Based on File Label; Researches on Data Privacy in Cloud Computing Based on Game Theory.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  5. 285
  6. 286

    Materials Informatics : Methods, Tools, and Applications

    Published 2019
    Full text (MFA users only)
    Electronic eBook
  7. 287

    Mastering SciPy. by Blanco-Silva, Francisco J.

    Published 2015
    Full text (MFA users only)
    Electronic eBook
  8. 288

    Introduction to graph theory by Voloshin, Vitaly I. (Vitaly Ivanovich), 1954-

    Published 2009
    Table of Contents: “…What Is Mathematical Induction; 7.2. Graph Theory Algorithms and Their Complexity; 7.3. Answers and Hints to Selected Exercises; 7.4. …”
    Full text (MFA users only)
    Electronic eBook
  9. 289
  10. 290
  11. 291

    Modelling for coastal hydraulics and engineering by Chau, Kwok Wing

    Published 2010
    Full text (MFA users only)
    Electronic eBook
  12. 292
  13. 293
  14. 294
  15. 295

    Applied mechatronics and android robotics : selected, peer reviewed papers from the International Conference on Applied Mechatronics and Android Robotics (ICAMAR 2013), July 13-14,...

    Published 2013
    Table of Contents: “…Applied Mechatronics and Android Robotics; Preface, Committees and Sponsors; Table of Contents; Chapter 1: Robot Design, Motion Planning and Robot Control; Design of a Master Manipulator with Dynamical Simplification for Master-Slave Robot; Parameter Self-Adjusting Path Tracking Algorithm of Mobile Robots; Global Path Planning for Mobile Robot Based on Improved Ant Colony Algorithms; A Study of Robot Platform Based on WiFi Remote Control; Fire Detection System Based-On Mobile Robots; Phase Plane Analysis of Battery Series Balancing on Robot…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  16. 296

    Sage Beginner's Guide. by Finch, Craig

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  17. 297
  18. 298
  19. 299

    Programming MapReduce with Scalding : a practical guide to designing, testing, and implementing complex MapReduce applications in Scala by Chalkiopoulos, Antonios

    Published 2014
    Table of Contents: “…The Late Bound Dependency patternSummary; Testing and TDD; Introduction to testing; MapReduce testing challenges; Development lifecycle with testing strategy; TDD for Scalding developers; Implementing the TDD methodology; Decomposing the algorithm; Defining acceptance tests; Implementing integration tests; Implementing unit tests; Implementing the MapReduce logic; Defining and performing system tests; Black box testing; Summary; Running Scalding in Production; Executing Scalding in a Hadoop cluster; Scheduling execution; Coordinating job execution; Configuring using a property file…”
    Full text (MFA users only)
    Electronic eBook
  20. 300

    Computational biology and genome informatics

    Published 2003
    Full text (MFA users only)
    Electronic eBook