Results 11 to 20 of about 132,813 (243)

A Security Framework for JXTA-Overlay [PDF]

open access: yes, 2009
En l'actualitat, la maduresa del camp de la investigació P2P empès a través de nous problemes, relacionats amb la seguretat. Per aquesta raó, la seguretat comença a convertir-se en una de les qüestions clau en l'avaluació d'un sistema P2P, i és important
Arnedo Moreno, Joan   +3 more
core   +3 more sources

Monitoring Challenges and Approaches for P2P File-Sharing Systems [PDF]

open access: yes, 2006
Since the release of Napster in 1999, P2P file-sharing has enjoyed a dramatic rise in popularity. A 2000 study by Plonka on the University of Wisconsin campus network found that file-sharing accounted for a comparable volume of traffic to HTTP, while a ...
Hughes, D., Lee, K., Walkerdine, J.
core   +2 more sources

Kontestasi Abangan-Santri Pasca Orde Baru di Pedesaan Jawa

open access: yesJSP: Jurnal Ilmu Sosial dan Ilmu Politik, 2010
In 1981 Clifford Geertz delivered the famous typology of Javanese society. He devided Javanese society into three categories; santri, priyayi and abangan. The relations among them are not only in harmonic but also conflictual relations.
Yogi Setya Permana
doaj   +1 more source

A framework for P2P application development [PDF]

open access: yes, 2008
Although Peer-to-Peer (P2P) computing has become increasingly popular over recent years, there still exist only a very small number of application domains that have exploited it on a large scale.
Gilleade, Kiel   +6 more
core   +1 more source

Aktivisme Kelas Menengah Berbasis Media Sosial: Munculnya Relawan dalam Pemilu 2014

open access: yesJSP: Jurnal Ilmu Sosial dan Ilmu Politik, 2017
Emergence of voluntarism power that occured in 2014 election have indicated new form of middle class in Indonesia. Analyse on middle class always posited as either "leisure class" or "depedent class".
Wasisto Raharjo Jati
doaj   +1 more source

Peer-to-peer:is deviant behavior the norm on P2P file-sharing networks? [PDF]

open access: yes, 2006
P2P file-sharing networks such as Kazaa, eDonkey, and Limewire boast millions of users. Because of scalability concerns and legal issues, such networks are moving away from the semicentralized approach that Napster typifies toward more scalable and ...
Coulson, G.   +3 more
core   +1 more source

Maintaining unlinkability in group based P2P environments [PDF]

open access: yes, 2009
In the wake of the success of Peer-to-Peer (P2P) networking, security has arisen as one of its main concerns, becoming a key issue when evaluating a P2P system.
Arnedo Moreno, Joan   +1 more
core   +1 more source

WHY ARE YOUTH INTENT ON INVESTING THROUGH PEER TO PEER LENDING? EVIDENCE FROM INDONESIA

open access: yesJournal of Islamic Monetary Economics and Finance, 2019
This study aims to analyse the factors that influence the intention of youths/millennials in Jakarta, the capital of Indonesia, to invest in Peer to Peer (P2P) lending.
Ichwan Ichwan, Rachmatina Kasri
doaj   +1 more source

Predicting the Impact of Measures Against P2P Networks on the Transient Behaviors [PDF]

open access: yes, 2010
The paper has two objectives. The first is to study rigorously the transient behavior of some P2P networks whenever information is replicated and disseminated according to epidemic-like dynamics.
Altman, Eitan   +3 more
core   +7 more sources

A Holistic Study on the Use of Blockchain Technology in CPS and IoT Architectures Maintaining the CIA Triad in Data Communication

open access: yesInternational Journal of Applied Mathematics and Computer Science, 2022
Blockchain-based cyber-physical systems (CPSs) and the blockchain Internet of things (BIoT) are two major focuses of the modern technological revolution.
Bhattacharjya Aniruddha
doaj   +1 more source

Home - About - Disclaimer - Privacy