Showing 1 - 20 results of 34,746 for search '(peer OR (her OR (check OR (chen OR ((chern OR coherent) OR ((heng OR cheng) OR leong))))))*', query time: 0.15s Refine Results
  1. 1

    Skala ketagihan internet Chen (CIAS) by Al-Ani, Ali Sabri Radeef, Faisal, Ghasak Ghazi

    Published 2020
    “…Bahasa Malaysia translated version of Chen internet addiction scale…”
    Get full text
    Get full text
    Copyright
  2. 2

    PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA by Wei, Xianglin, Ahmed, Tarem, Chen, Ming, Pathan, Al-Sakib Khan

    Published 2012
    “…Many reputation management schemes have been introduced to assist peers to choose the most trustworthy collaborators in P2P environment where honest peers coexist with malicious ones. …”
    Get full text
    Proceeding Paper
  3. 3

    Linearizing peer-to-peer systems with Oracles by Mohd. Nor, Rizal, Nesterenko, Mikhail, Tixeuil, Sébastien

    Published 2013
    “…We study distributed linearization or topological sorting in peer-to-peer networks. We define strict and eventual variants of the problem. …”
    Get full text
    Proceeding Paper
  4. 4
  5. 5

    Application of multistage homotopy-perturbation method for the solutions of the Chen system by Chowdhury, Md. Sazzad Hossien, Hashim, Ishak

    Published 2009
    “…In this paper, a new reliable algorithm based on an adaptation of the standard homotopy-perturbation method (HPM) is applied to the Chen system which is a three-dimensional system of ODEs with quadratic nonlinearities. …”
    Get full text
    Article
  6. 6

    Peer-to-peer video-on-demand in future internet by Fouda, Mostafa M., Fadlullah, Zubair Md., Pathan, Al-Sakib Khan, Kato, Nei

    Published 2013
    “…We highlight that the Peer-to-Peer (P2P) protocol is one of the most popular techniques for downloading data, viewing online channels, and/or watching Video-on-Demand (VoD) movies. …”
    Get full text
    Book Chapter
  7. 7
  8. 8
  9. 9

    Self- and Peer-Assessment: the case of Peer Supervision in Counselling Psychology by Cross, Alexandra

    Published 2011
    “…Peer supervision is widely recognised within health services vocational training as a rich source of learning for clinical trainees. …”
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    PMDA: A malicious peer detection algorithm for P2P systems by Wei, Xianglin, Ahmed, Tarem, Chen, Ming, Pathan, Al-Sakib Khan

    Published 2011
    “…Many reputation management schemes have been introduced to assist peers in choosing trustworthy collaborators in P2P environments where honest peers coexist with malicious ones. …”
    Get full text
    Article
  15. 15
  16. 16

    Discovering Doris Lessing: convergences between Islam and her thoughts by Hasan, Md. Mahmudul

    Published 2016
    “…The 2007 Nobel literature laureate Doris Lessing (1919-2013) is one of the twentieth century’s most prolific and versatile British writers. Her literary career is marked by the robustness and diversity of her ideas. …”
    Get full text
    Article
  17. 17

    Securing peer-to-peer mobile communications using public key cryptography: new security strategy by Al- Bakri, S.H., Mat Kiah, M.L., Zaidan , A. A., Zaidan, B.B., Alam, Gazi Mahabubul

    Published 2011
    “…Third party servers were used to check the certificates, authenticating the communicating parties, key distribution, etc. …”
    Get full text
    Article
  18. 18

    Developing a coherent theoretical framework for Forest School in the UK by Knight, Sara Ann

    Published 2022
    “…This work is set within the context of other research on FS, an examination of which leads to the proposition that what is missing from this whole body of research is a coherent theoretical framework. This thesis draws out that framework and presents it as a systematic and synthesised interdisciplinary whole. …”
    Get full text
    Thesis
  19. 19

    Two dimensional array based overlay network for balancing load of peer-to-peer live video streaming by Ibrahimy, Abdullah Faruq Ibn, Islam, Md. Rafiqul, Anwar, Farhat, Ibrahimy, Muhammad Ibn

    Published 2013
    “…In case of departure of a peer with additional upload bandwidth, the overlay network becomes very vulnerable to chur n. …”
    Get full text
    Proceeding Paper
  20. 20

    Two dimensional array based overlay network for balancing load of peer-to-peer live video streaming by Ibn Ibrahimy, Abdullah Faruq, Islam, Md Rafiqul, Anwar, Farhat, Ibrahimy, Muhammad Ibn

    Published 2013
    “…In case of departure of a peer with additional upload bandwidth, the overlay network becomes very vulnerable to churn. …”
    Get full text
    Get full text
    Article