Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Peer-to-Peer (P2P) Model

Encyclopedia of Information Science and Technology, Second Edition
A communication way where each node has the same authority and communication capability. They create a virtual network, overlaid on the Internet. Its members organize themselves into a topology for data transmission.
Published in Chapter:
A Content-Sensitive Approach to Search in Shared File Storages
Gábor Richly (Budapest University of Technology and Economics, Hungary), Gábor Hosszú (Budapest University of Technology and Economics, Hungary), and Ferenc Kovács (Budapest University of Technology and Economics, Hungary)
DOI: 10.4018/978-1-60566-026-4.ch123
Abstract
The article presents a novel approach to search in shared audio file storages such as P2P-based systems. The proposed method enables the recognition of specific patterns in the audio contents, in such a way it extends the searching possibility from the description-based model to the content- based model. The targeted shared file storages seam to change contents rather unexpectedly. This volatile nature led our development to use real-time capable methods for the search process. The importance of the real-time pattern recognition algorithms that are used on audio data for content-sensitive searching in stream media has been growing over a decade (Liu, Wang, & Chen, 1998). The main problem of many algorithms is the optimal selection of the reference patterns (soundprints in our approach) used in the recognition procedure. This proposed method is based on distance maximization and is able to choose the pattern that later will be used as reference by the pattern recognition algorithms quickly (Richly, Kozma, Kovács & Hosszú, 2001). The presented method called EMESE (Experimental MEdia-Stream rEcognizer) is an important part of a lightweight content-searching method, which is suitable for the investigation of the network-wide shared file storages. This method was initially applied for real-time monitoring of the occurrence of known sound materials in broadcast audio. The experimental measurement data showed in the article demonstrate the efficiency of the procedure that was the reason for using it in shared audio database environment.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
A Novel Application of the P2P Technology for Intrusion Detection
A communication way where each node has the same authority and communication capability. They create a virtual network, overlaid on the Internet. Its members organize themselves into a topology for data transmission.
Full Text Chapter Download: US $37.50 Add to Cart
Application of the P2P Model for Adaptive Host Protection
A communication way where each node has the same authority and communication capability. They create a virtual network, overlaid on the Internet. Its members organize themselves into a topology for data transmission. Each peer provides services the others can use, and each peer sends requests to other ones.
Full Text Chapter Download: US $37.50 Add to Cart
Peer-to-Peer Methods for Operating System Security
A communication way where each node has the same authority and communication capability. These nodes create a virtual network, overlaid on the Internet. The members of the overlay organize themselves into a topology for data transmission.
Full Text Chapter Download: US $37.50 Add to Cart
Light-Weight Content-Based Search for File Sharing Systems
A communication model where each node has the same authority and communication capability. They create a virtual network, overlaid on the Internet. Its members organize themselves into a topology for data transmission.
Full Text Chapter Download: US $37.50 Add to Cart
Pattern-Based Identification in P2P Systems
A communication way where each node has the same authority and communication capability. They create a virtual network, overlaid on the Internet. Its members organize themselves into a topology for data transmission.
Full Text Chapter Download: US $37.50 Add to Cart
Intrusion Detection Based on P2P Software
A communication way where each node has the same authority and communication capability. They create a virtual network, overlaid on the Internet. Its members organize themselves into a topology for data transmission.
Full Text Chapter Download: US $37.50 Add to Cart
A Proposed Scalable Environment for Medical Data Processing and Evaluation
A communication way where each node has the same authority and communication capability. They create a virtual network, overlaid on the Internet. Its members organize themselves into a topology for data transmission. Each peer provides services the others can use, and each peer sends requests to other ones.
Full Text Chapter Download: US $37.50 Add to Cart
Content-Based Searching in Group Communication Systems
Communication method where each node has the same authority and communication capability. They create a virtual network, overlaid on the Internet. Its members organize themselves into a topology for data transmission.
Full Text Chapter Download: US $37.50 Add to Cart
On the Stability of Peer-to-Peer Networks in Real-World Environments
A communication way where each node has the same authority and communication capability. They create a virtual network, overlaid on the Internet. Its members organize themselves into a topology for data transmission.
Full Text Chapter Download: US $37.50 Add to Cart
E-Collaboration Enhanced Host Security
A communication way where each node has the same authority and communication capability. Each peer provides services the others can use, and each peer sends requests to other ones.
Full Text Chapter Download: US $37.50 Add to Cart
Network-Based Intrusion Detection
A communication way where each node has the same authority and communication capability. They create a virtual network, overlaid on the Internet. Its members organize themselves into a topology for data transmission. Each peer provides services the others can use, and each peer sends requests to other ones.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR