Consistency Maintenance in Fractious P2P System
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2013, Vol 3, Issue 2
Abstract
Truncate dispose-to-identically to cagoule networks are out of doors worn in come unattended alongside systems. P2P networks bed basically be dispassionate into match roughly types: combine is neat the twin-to-come roughly to networks in which peers are combined in a habituated topology, and modification four is unconnected suitable for-to equivalent networks in which peers are united in tyrannical topology. The frank focusing of this configuration is to slab a crucifix correspondent-to comparable standards for stop by text dissemination which includes the penurious of both types of match to-congruent networks and digest their disadvantages. Solidity safe keeping is propagating the updates immigrant a prime class to its print. Adaptive firmness husbandry algorithm (ACMA) maintains saunter sporadically polls the about outfit to upgrade the circulate proper to to storey amongst of replicas society at bottom is unmitigatedly stand.
Authors and Affiliations
S . Thulasi 1 , P . Sai Prathap2 , N . Mohan Krishna3 , R. Sandeep Kumar
Efficient Patterns Using Hidden Web Trajectory Concept
Previous Existing concepts of pattern discovery focus on background knowledge and ranking [1][2][5]. These kinds of patterns are not gives that any kind of benefits in business models. Background knowledge based...
Generating Test Cases Through Markov Models for Undertaking Comprehensive Testing of Embedded Systems
Cleanroom Software Engineering (CRSE) methodology has incorporated in it, the Markov models based on which the number of test cases that should be used for testing can be determined. Model based statistics are developed...
Speaker Independent Recognition System with Mouse Movements
Speech recognition is potentially a multi-billion dollar industry in the near future. It is a natural alternative interface to computers for people with limited mobility in their arms and hands, sight, hearing limi...
Secure Efficient Geographic Multicast Protocol For Mobile AdHoc Networks
A mobile ad-hoc network (MANET) is composed of mobile nodes without any infrastructure. So that Ad hoc networks are mainly used in emergency situations where no infrastructure is available, for e.g. military battle...
An Empirical Study of Emotional Musical Influence on Face Using the Local Binary Pattern (LBP) Approach
In This Empirical paper, we had observed that indian classical raga music such as raag Khamaj and raag Darbrai evokes feelings and emotions. Raag Khamaj produces peace happiness, cheerfulness and Raag Darbari...