| 000 | 03816nam a22005055i 4500 | ||
|---|---|---|---|
| 001 | 978-3-642-03514-2 | ||
| 003 | DE-He213 | ||
| 005 | 20140220084525.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100301s2010 gw | s |||| 0|eng d | ||
| 020 |
_a9783642035142 _9978-3-642-03514-2 |
||
| 024 | 7 |
_a10.1007/978-3-642-03514-2 _2doi |
|
| 050 | 4 | _aTK5105.5-5105.9 | |
| 072 | 7 |
_aUKN _2bicssc |
|
| 072 | 7 |
_aCOM075000 _2bisacsh |
|
| 082 | 0 | 4 |
_a004.6 _223 |
| 100 | 1 |
_aVu, Quang Hieu. _eauthor. |
|
| 245 | 1 | 0 |
_aPeer-to-Peer Computing _h[electronic resource] : _bPrinciples and Applications / _cby Quang Hieu Vu, Mihai Lupu, Beng Chin Ooi. |
| 264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2010. |
|
| 300 | _bonline resource. | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 505 | 0 | _aArchitecture of Peer-to-Peer Systems -- Routing in Peer-to-Peer Networks -- Data-Centric Applications -- Load Balancing and Replication -- Security in Peer-to-Peer Networks -- Trust and Reputation -- P2P Programming Tools -- Systems and Applications -- Conclusions. | |
| 520 | _aPeer-to-peer (P2P) technology, or peer computing, is a paradigm that is viewed as a potential technology for redesigning distributed architectures and, consequently, distributed processing. Yet the scale and dynamism that characterize P2P systems demand that we reexamine traditional distributed technologies. A paradigm shift that includes self-reorganization, adaptation and resilience is called for. On the other hand, the increased computational power of such networks opens up completely new applications, such as in digital content sharing, scientific computation, gaming, or collaborative work environments. In this book, Vu, Lupu and Ooi present the technical challenges offered by P2P systems, and the means that have been proposed to address them. They provide a thorough and comprehensive review of recent advances on routing and discovery methods; load balancing and replication techniques; security, accountability and anonymity, as well as trust and reputation schemes; programming models and P2P systems and projects. Besides surveying existing methods and systems, they also compare and evaluate some of the more promising schemes. The need for such a book is evident. It provides a single source for practitioners, researchers and students on the state of the art. For practitioners, this book explains best practice, guiding selection of appropriate techniques for each application. For researchers, this book provides a foundation for the development of new and more effective methods. For students, it is an overview of the wide range of advanced techniques for realizing effective P2P systems, and it can easily be used as a text for an advanced course on Peer-to-Peer Computing and Technologies, or as a companion text for courses on various subjects, such as distributed systems, and grid and cluster computing. | ||
| 650 | 0 | _aComputer science. | |
| 650 | 0 | _aComputer Communication Networks. | |
| 650 | 0 | _aOperating systems (Computers). | |
| 650 | 0 | _aInformation storage and retrieval systems. | |
| 650 | 0 | _aInformation Systems. | |
| 650 | 1 | 4 | _aComputer Science. |
| 650 | 2 | 4 | _aComputer Communication Networks. |
| 650 | 2 | 4 | _aInformation Storage and Retrieval. |
| 650 | 2 | 4 | _aOperating Systems. |
| 650 | 2 | 4 | _aManagement of Computing and Information Systems. |
| 700 | 1 |
_aLupu, Mihai. _eauthor. |
|
| 700 | 1 |
_aOoi, Beng Chin. _eauthor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783642035135 |
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-03514-2 |
| 912 | _aZDB-2-SCS | ||
| 999 |
_c111509 _d111509 |
||