Peer-to-peer Computing: The Evolution of a Disruptive TechnologyRamesh Subramanian, Brian D. Goodman Idea Group Inc (IGI), 2005. gada 1. janv. - 308 lappuses Peer to Peer Computing: The Evolution of a Disruptive Technology takes a holistic approach to the affects P2P Computing has on a number a disciplines. Some of those areas covered within this book include grid computing, web services, bioinformatics, security, finance and economics, collaboration, and legal issues. Unique in its approach, Peer to Peer Computing includes current articles from academics as well as IT practitioners and consultants from around the world. As a result, the book strikes a balance for many readers. Neither too technical or too managerial, Peer to Peer Computing appeals to the needs of both researchers and practitioners who are trying to gain a more thorough understanding of current P2P technologies and their emerging ramifications. |
No grāmatas satura
1.–5. rezultāts no 26.
11. lappuse
... received and replicated these files. This concept is most frequently applied in the areas of streaming (for example, PeerCast [“PeerCast”, n.d.], P2PCopyright © 2005, Idea Group Inc. Copying or distributing in print or electronic forms ...
... received and replicated these files. This concept is most frequently applied in the areas of streaming (for example, PeerCast [“PeerCast”, n.d.], P2PCopyright © 2005, Idea Group Inc. Copying or distributing in print or electronic forms ...
12. lappuse
... receiving the information, each peer instantaneously acts as a provider and forwards the information to other peers. Application areas in which such designs can be implemented are the distribution of eLearning courseware in an intranet ...
... receiving the information, each peer instantaneously acts as a provider and forwards the information to other peers. Application areas in which such designs can be implemented are the distribution of eLearning courseware in an intranet ...
13. lappuse
... received from these peers before accepting the result as correct. By means of file replication and random distribution of identification numbers to peers using a hash function, the P2P storage network automatically ensures that various ...
... received from these peers before accepting the result as correct. By means of file replication and random distribution of identification numbers to peers using a hash function, the P2P storage network automatically ensures that various ...
45. lappuse
Esat sasniedzis šīs grāmatas aplūkošanas reižu limitu.
Esat sasniedzis šīs grāmatas aplūkošanas reižu limitu.
46. lappuse
Esat sasniedzis šīs grāmatas aplūkošanas reižu limitu.
Esat sasniedzis šīs grāmatas aplūkošanas reižu limitu.
Saturs
Systems and Assets Issues Arising from Decentralized Networks in Security and Law | 113 |
P2P Domain Proliferation Perspectives and Influences of Peer Concepts on Collaboration Web Services and Grid Computing | 194 |
About the Editors | 296 |
About the Authors | 298 |
Index | 305 |
Citi izdevumi - Skatīt visu
Peer-to-peer Computing: The Evolution of a Disruptive Technology Ramesh Subramanian,Brian D. Goodman Ierobežota priekšskatīšana - 2005 |
Peer-to-peer Computing: The Evolution of a Disruptive Technology Ramesh Subramanian,Brian D. Goodman Ierobežota priekšskatīšana - 2005 |
Bieži izmantoti vārdi un frāzes
activity allow applications approach architecture authors bioinformatics central chapter client collaboration communication computing connected consistency Copying or distributing Copyright cost court create database described discovery discussion distributing in print dynamic e-mail electronic forms entities environment example exchange existing FastTrack Figure file sharing forms without written function Gnutella grid Idea Group Inc identifier implementation infrastructure infringement interaction interest Internet issues keywords knowledge maintain markets mechanism Napster node offer operations organization overlay P2P networks P2P systems peer peer-to-peer networks performance possible present print or electronic problem Proceedings protocol query received request result Retrieved routing servent server shared objects sharing space storage stored structure topology trust types University users