Showing 1 - 20 results of 35,914 for search '(peer OR (cher OR (checks OR (((were OR cowere) OR shern) OR (chenn OR see)))))*', query time: 0.13s Refine Results
  1. 1
  2. 2

    Linearizing peer-to-peer systems with Oracles by Mohd. Nor, Rizal, Nesterenko, Mikhail, Tixeuil, Sébastien

    Published 2013
    “…We study distributed linearization or topological sorting in peer-to-peer networks. We define strict and eventual variants of the problem. …”
    Get full text
    Proceeding Paper
  3. 3

    Peer-to-peer video-on-demand in future internet by Fouda, Mostafa M., Fadlullah, Zubair Md., Pathan, Al-Sakib Khan, Kato, Nei

    Published 2013
    “…We highlight that the Peer-to-Peer (P2P) protocol is one of the most popular techniques for downloading data, viewing online channels, and/or watching Video-on-Demand (VoD) movies. …”
    Get full text
    Book Chapter
  4. 4
  5. 5

    The astronomical seeing measurements at Langkawi National Observatory by Ahmad, Nazhatulshima, Chin, Wei Loon, Syukor, Muhammad Shamin, Haron, Saedah, Zainuddin, Mohd. Zambri, Md Tahar, Muhammad Redzuan

    Published 2015
    “…We present seeing measurements of Langkawi National Observatory during the period from 2014 May 6 to 2015 March 26. …”
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Self- and Peer-Assessment: the case of Peer Supervision in Counselling Psychology by Cross, Alexandra

    Published 2011
    “…Peer supervision is widely recognised within health services vocational training as a rich source of learning for clinical trainees. …”
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Securing peer-to-peer mobile communications using public key cryptography: new security strategy by Al- Bakri, S.H., Mat Kiah, M.L., Zaidan , A. A., Zaidan, B.B., Alam, Gazi Mahabubul

    Published 2011
    “…Several researchers have proposed server-based architectures public key cryptography solution to secure the mobile communications. Third party servers were used to check the certificates, authenticating the communicating parties, key distribution, etc. …”
    Get full text
    Article
  12. 12

    Seeing sadness: comorbid effects of loneliness and depression on emotional face processing by Cheeta, Survjit, Beevers, Joseph, Chambers, Sophie, Szameitat, Andre, Chandler, Chris

    Published 2021
    “…Methods: 502 participants were recruited and screened for loneliness (UCLA Loneliness Scale) and depression (Beck Depression Inventory). …”
    Get full text
    Article
  13. 13

    Two dimensional array based overlay network for balancing load of peer-to-peer live video streaming by Ibrahimy, Abdullah Faruq Ibn, Islam, Md. Rafiqul, Anwar, Farhat, Ibrahimy, Muhammad Ibn

    Published 2013
    “…In case of departure of a peer with additional upload bandwidth, the overlay network becomes very vulnerable to chur n. …”
    Get full text
    Proceeding Paper
  14. 14

    Two dimensional array based overlay network for balancing load of peer-to-peer live video streaming by Ibn Ibrahimy, Abdullah Faruq, Islam, Md Rafiqul, Anwar, Farhat, Ibrahimy, Muhammad Ibn

    Published 2013
    “…In case of departure of a peer with additional upload bandwidth, the overlay network becomes very vulnerable to churn. …”
    Get full text
    Get full text
    Article
  15. 15

    PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA by Wei, Xianglin, Ahmed, Tarem, Chen, Ming, Pathan, Al-Sakib Khan

    Published 2012
    “…Many reputation management schemes have been introduced to assist peers to choose the most trustworthy collaborators in P2P environment where honest peers coexist with malicious ones. …”
    Get full text
    Proceeding Paper
  16. 16

    Peer-led learning: Challenges and opportunities by Abegglen, Sandra, Morris, Anne M.

    Published 2015
    “…This is an academic review of a research report by the Higher Education Academy (HEA) published in November 2014, which focuses on peer-led learning (PLL) in Higher Education (HE). …”
    Get full text
    Article
  17. 17

    The Benefits of a Peer Facilitation Programme by Adams, Christian, Cormack, Isabel

    Published 2007
    “…The student peer support scheme has been running for all years that London Metropolitan University has been in existence, and previously to this in different forms at the heritage institutions. …”
    Get full text
    Article
  18. 18
  19. 19

    Checking noise correlations for safer two-way quantum key distribution by Shamsul Shaari, Jesni, Lucamarini, Marco, Mancini, Stefano

    Published 2014
    “…We check for noise correlations between forward and backward paths in two-way quantum key distribution, which leads to reduced potentialities for an eavesdropper since she can only hide herself behind uncorrelated (natural) noise. …”
    Get full text
    Get full text
    Article
  20. 20