Results 51 to 60 of about 132,813 (243)

HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree [PDF]

open access: yes, 2011
Small-world phenomena have been observed in existing peer-to-peer (P2P) networks which has proved useful in the design of P2P file-sharing systems. Most studies of constructing small world behaviours on P2P are based on the concept of clustering peer ...
A. Ahmed   +25 more
core   +2 more sources

A Review of Black Phosphorus‐Based Materials: From Preparation Strategies to Characterization Techniques

open access: yesENERGY &ENVIRONMENTAL MATERIALS, EarlyView.
The structure, properties, preparation methods, and characterization techniques of BP. As a typical 2D layered material, black phosphorus (BP) demonstrates exceptional promise in various fields, particularly in energy storage for alkali metal‐ion batteries. However, its distinctive structure and properties, together with the compositional complexity of
Yunqing Wang   +7 more
wiley   +1 more source

Time‐ and State‐Dependent Damage Accumulation Due to Aftershocks Under an M9.0 Megathrust Earthquake in the Cascadia Subduction Zone

open access: yesEarthquake Engineering &Structural Dynamics, EarlyView.
ABSTRACT This study develops a comprehensive framework for assessing time and state‐dependent aftershock damage accumulation under an M9.0 megathrust interface earthquake in the Cascadia Subduction Zone (CSZ). The framework integrates aftershock probabilistic seismic hazard analysis (APSHA) and state‐dependent fragility analysis (SDFA) within a ...
Hongzhou Zhang, Yazhou Xie
wiley   +1 more source

Unstructured P2P Network Load Balance Strategy Based on Multilevel Partitioning of Hypergraph

open access: yesOpen Physics, 2017
With rapid development of computer performance and distributed technology, P2P-based resource sharing mode plays important role in Internet. P2P network users continued to increase so the high dynamic characteristics of the system determine that it is ...
Feng Lv, Chunlin Gao, Kaiyang Ma
doaj   +1 more source

Evolutionary Game Analysis of Three Players on Behavioural Strategy of P2P Lending Participants: A Sustainable Operations Perspective

open access: yesComplexity, 2021
In China, most of peer-to-peer (P2P) lending platforms do not possess operational sustainability due to excessive defaults. To address this problem, the conflict of interests among P2P lending participants is discussed using a stakeholder approach.
Ge You   +3 more
doaj   +1 more source

A Robust Logical and Computational Characterisation of Peer-to-Peer Database Systems [PDF]

open access: yes, 2003
In this paper we give a robust logical and computational characterisation of peer-to-peer (p2p) database systems. We first define a precise model-theoretic semantics of a p2p system, which allows for local inconsistency handling. We then characterise the
Franconi, Enrico   +3 more
core   +3 more sources

How Does Vulnerability Framing by Microfinance Institutions Leverage Funding Success in Crowdfunding?

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT This study draws on framing theory to investigate how microfinance institutions (MFIs) strategically construct a vulnerability‐oriented organisational identity and how this framing influences their funding decisions during the pre‐campaign phase of prosocial crowdfunding.
Ana Paula Matias Gama   +3 more
wiley   +1 more source

SEJARAH LOKAL ADALAH SEJARAH MARITIM (NASIONAL) INDONESIA?

open access: yesSejarah dan Budaya: Jurnal Sejarah, Budaya, dan Pengajarannya, 2017
Abstrak: Penulisan sejarah atau historiografi di Indonesia terus mengalami perkembangan sejak masa kolonial. Berawal dari historiografi bercorak Nerlando-sentis yang kemudian bergerak menjadi Indonesiasentris yang kemudian didominasi oleh penulisan ...
Imam Syafii
doaj  

Towards Trustworthy Energy Efficient P2P Networks: A New Method for Validating Computing Results in Decentralized Networks

open access: yesComputers
Decentralized P2P networks have emerged as robust instruments to execute computing tasks, with enhanced security and transparency. Solutions such as Blockchain have proved to be successful in a large catalog of critical applications such as ...
Fernando Rodríguez-Sela, Borja Bordel
doaj   +1 more source

Verified, Shared, Modular, and Provenance Based Research Communication with the Dat Protocol

open access: yesPublications, 2019
A scholarly communication system needs to register, distribute, certify, archive, and incentivize knowledge production. The current article-based system technically fulfills these functions, but suboptimally.
Chris Hartgerink
doaj   +1 more source

Home - About - Disclaimer - Privacy