Search results for "BitTorrent"

showing 10 items of 10 documents

Online Multi-Person Tracking by Tracker Hierarchy

2012

Tracking-by-detection is a widely used paradigm for multi-person tracking but is affected by variations in crowd density, obstacles in the scene, varying illumination, human pose variation, scale changes, etc. We propose an improved tracking-by-detection framework for multi-person tracking where the appearance model is formulated as a template ensemble updated online given detections provided by a pedestrian detector. We employ a hierarchy of trackers to select the most effective tracking strategy and an algorithm to adapt the conditions for trackers' initialization and termination. Our formulation is online and does not require calibration information. In experiments with four pedestrian t…

Computer scienceBitTorrent trackerbusiness.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONInitializationTracking systemTracking (particle physics)Object detectionActive appearance modelVideo trackingTracking Experts DetectorComputer visionArtificial intelligenceMean-shiftbusiness
researchProduct

MCD: Overcoming the Data Download Bottleneck in Data Centers

2013

The data download problem in data centers describes the increasingly common task of coordinated loading of identical data to a large number of nodes. Data download is seen as a significant problem in exascale HPC applications. Uncoor-dinated reading from a central file server creates contention at the file server and its network interconnect. We propose and evaluation a reliable multicast based approach to solve the data download problem. The MCD system builds a logical multi-rooted tree based on the physical network topology and uses the logical view for a two-phase approach. In the first phase, the data is multicasted to all nodes. In the second phase, the logical tree is used for an effi…

Computer scienceDownloadbusiness.industryDistributed computingcomputer.file_formatNetwork topologyBottleneckFile serverPacket lossServerReliable multicastbusinessBitTorrentcomputerComputer network2013 IEEE Eighth International Conference on Networking, Architecture and Storage
researchProduct

P2P-PL: A pattern language to design efficient and robust peer-to-peer systems

2017

To design peer-to-peer (P2P) software systems is a challenging task, because of their highly decentralized nature, which may cause unexpected emergent global behaviors. The last fifteen years have seen many P2P applications to come out and win favor with millions of users. From success histories of applications like BitTorrent, Skype, MyP2P we have learnt a number of useful design patterns. Thus, in this article we present a P2P pattern language (shortly, P2P-PL) which encompasses all the aspects that a fully effective and efficient P2P software system should provide, namely consistency of stored data, redundancy, load balancing, coping with asymmetric bandwidth, decentralized security. The…

FOS: Computer and information sciencesPattern languageComputer Networks and CommunicationsComputer sciencebusiness.industryDistributed computing020206 networking & telecommunications02 engineering and technologycomputer.file_formatPeer-to-peerLoad balancing (computing)computer.software_genreSoftwareComputer Science - Distributed Parallel and Cluster ComputingRobustness (computer science)Software design patternC.2.40202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingDistributed Parallel and Cluster Computing (cs.DC)Software systembusinesscomputerBitTorrentSoftwarePeer-to-Peer Networking and Applications
researchProduct

Hibrīd-decentralizēta vienādranga failu apmaiņa Interneta pārlūkprogrammās

2018

Nodrošinot failu apmaiņas tiešsaistes pakalpojumus, būtisku resursu patēriņu rada tīkla slodze uz pakalpojuma sniedzēja infrastruktūru. Šobrīd lielākā daļa šādu pakalpojumu izmanto centralizētu klienta-servera arhitektūru. Lai samazinātu slodzi, ir iespējams aizvietot klasisko klienta-servera arhitektūru ar hibrīd-decentralizētu vienādranga arhitektūru. Tādējādi tiktu izmantoti klientu resursi pakalpojuma sniegšanā. Darba mērķis ir teorētiski analizēt iespējas un ierobežojumus hibrīd-decentralizētai vienādranga failu apmaiņai Interneta pārlūkprogrammās un praktiski realizēt šādu lietotni. Darbā ir izstrādāta lietotne, izmantojot BitTorrent un WebRTC protokolus, un ir ieviesta ražošanā esošā…

Interneta pārlūkprogrammaDatorzinātneBitTorrentvienādrangahibrīd-decentralizēta arhitektūrafailu apmaiņa
researchProduct

On Constructing Persistent Identifiers with Persistent Resolution Targets

2016

Persistent Identifiers (PID) are the foundation referencing digital assets in scientific publications, books, and digital repositories. In its realization, PIDs contain metadata and resolving targets in form of URLs that point to data sets located on the network. In contrast to PIDs, the target URLs are typically changing over time; thus, PIDs need continuous maintenance -- an effort that is increasing tremendously with the advancement of e-Science and the advent of the Internet-of-Things (IoT). Nowadays, billions of sensors and data sets are subject of PID assignment. This paper presents a new approach of embedding location independent targets into PIDs that allows the creation of maintena…

Networking and Internet Architecture (cs.NI)FOS: Computer and information scienceslcsh:T58.5-58.64lcsh:Information technologyComputer sciencebusiness.industryOverlay network020206 networking & telecommunications02 engineering and technologycomputer.file_formatMaintenance engineeringlcsh:QA75.5-76.95IdentifierMetadataComputer Science - Networking and Internet ArchitectureData accessEncoding (memory)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processinglcsh:Electronic computers. Computer sciencebusinessDisseminationBitTorrentcomputerComputer network
researchProduct

A Network Formation Game Approach to Study BitTorrent Tit-for-Tat

2007

The Tit-for-Tat strategy implemented in BitTorrent (BT) clients is generally considered robust to selfish behaviours. The authors of [1] support this belief studying how Tit-for-Tat can affect selfish peers who are able to set their upload bandwidth. They show that there is a "good" Nash Equilibrium at which each peer uploads at the maximum rate. In this paper we consider a different game where BT clients can change the number of connections to open in order to improve their performance. We study this game using the analytical framework of network formation games [2]. In particular we characterize the set of pairwise stable networks the peers can form and how the peers can dynamically reach…

Star networkComputer sciencebusiness.industryDistributed computingcomputer.file_formatNetwork formationTit for tatUploadsymbols.namesakeNash equilibriumsymbolsPairwise comparisonSet (psychology)businessBitTorrentcomputerComputer network
researchProduct

Availability in BitTorrent Systems

2007

In this paper, we investigate the problem of highly available, massive-scale file distribution in the Internet. To this end, we conduct a large-scale measurement study of BitTorrent, a popular class of systems that use swarms of actively downloading peers to assist each other in file distribution. The first generation of BitTorrent systems used a central tracker to enable coordination among peers, resulting in low availability due to the tracker's single point of failure. Our study analyzes the prevalence and impact of two recent trends to improve BitTorrent availability: (i) use of multiple trackers, and (ii) use of Distributed Hash Tables (DHTs), both of which also help to balance load be…

UploadBitTorrent trackerbusiness.industryComputer scienceDistributed computingThe Internetcomputer.file_formatLoad balancing (computing)businessBitTorrentcomputerHash tableComputer network
researchProduct

On Unstructured File Sharing Networks

2007

We study the interaction among users of unstructured file sharing applications, who compete for available network resources (link bandwidth or capacity) by opening multiple connections on multiple paths so as to accelerate data transfer. We model this interaction with an unstructured file sharing game. Users are players and their strategies are the numbers of sessions on available paths. We consider a general bandwidth sharing framework proposed by Kelly [1] and Mo and Walrand [2], with TCP as a special case. Furthermore, we incorporate the Tit-for-Tat strategy (adopted by BitTorrent [3] networks) into the unstructured file sharing game to model the competition in which a connection can be …

business.industryComputer scienceDistributed computingcomputer.file_formatTit for tatsymbols.namesakeBandwidth allocationFile sharingNash equilibriumsymbolsResource allocationThe InternetbusinessBitTorrentcomputerGame theoryComputer network
researchProduct

<title>Eye movements during silent and oral reading with stabilized versus free head movement and different eye-trackers</title>

2008

Eye movement research of reading has been done on a battery of eye-tracking setups during last decades. We compared reading data of the same group of six students, their eyes were tracked by a video-based helmet-mounted system with the data sampling frequency of 50 Hz and a setup with a chin-rest at 240 Hz. We found that not only the number of fixations may decrease after reading practice, but so does also the mean duration of fixations. In spite of the short duration of saccades, their distributions and changes in them are similarly reported in the two experimental conditions. Lack of significant correlation in the HED data testifies to the result variability due to measurement technique. …

medicine.medical_specialtyVideo-oculographyHead (linguistics)BitTorrent trackerbusiness.industryMovement (music)media_common.quotation_subjectEye movementAudiologyDuration (music)Reading (process)medicineEye trackingComputer visionsense organsArtificial intelligencePsychologybusinessmedia_commonSPIE Proceedings
researchProduct

Test-retest reliability of survey items on ownership and use of physical activity trackers

2019

Background: Researchers are interested in using digital tools, such as physical activity trackers (PAT), to promote and measure physical activity. PAT is a fast-growing research area that measures movement therefore, reliable questions on the ownership and use of PATs among adolescent populations need to be developed. Objective: The aim of this study was to conduct an intra-rater test-retest reliability study on PAT survey items used for surveillance purposes among young adolescents in ownership and use of smartphone applications (apps) and heart rate monitors (HRM). Methods: Young adolescents (N = 755; 11-, 13-, and 15-year-olds) in the Olomouc region of the Czech Republic were recruited t…

survey instrumentliikuntateknologiaschool-age populationBitTorrent trackerhealth promotionApplied psychologyActivity trackerPhysical activityPhysical Therapy Sports Therapy and RehabilitationTest (assessment)terveyden edistäminenCohen's kappaHealth promotionwearable technologykouluikäisetchildrenactivity trackerslcsh:Sports medicinelcsh:RC1200-1245PsychologyReliability (statistics)Kappafyysinen aktiivisuussurvey-tutkimusreliabiliteetti
researchProduct