Search results for "BitTorrent"
showing 10 items of 10 documents
Online Multi-Person Tracking by Tracker Hierarchy
2012
Tracking-by-detection is a widely used paradigm for multi-person tracking but is affected by variations in crowd density, obstacles in the scene, varying illumination, human pose variation, scale changes, etc. We propose an improved tracking-by-detection framework for multi-person tracking where the appearance model is formulated as a template ensemble updated online given detections provided by a pedestrian detector. We employ a hierarchy of trackers to select the most effective tracking strategy and an algorithm to adapt the conditions for trackers' initialization and termination. Our formulation is online and does not require calibration information. In experiments with four pedestrian t…
MCD: Overcoming the Data Download Bottleneck in Data Centers
2013
The data download problem in data centers describes the increasingly common task of coordinated loading of identical data to a large number of nodes. Data download is seen as a significant problem in exascale HPC applications. Uncoor-dinated reading from a central file server creates contention at the file server and its network interconnect. We propose and evaluation a reliable multicast based approach to solve the data download problem. The MCD system builds a logical multi-rooted tree based on the physical network topology and uses the logical view for a two-phase approach. In the first phase, the data is multicasted to all nodes. In the second phase, the logical tree is used for an effi…
P2P-PL: A pattern language to design efficient and robust peer-to-peer systems
2017
To design peer-to-peer (P2P) software systems is a challenging task, because of their highly decentralized nature, which may cause unexpected emergent global behaviors. The last fifteen years have seen many P2P applications to come out and win favor with millions of users. From success histories of applications like BitTorrent, Skype, MyP2P we have learnt a number of useful design patterns. Thus, in this article we present a P2P pattern language (shortly, P2P-PL) which encompasses all the aspects that a fully effective and efficient P2P software system should provide, namely consistency of stored data, redundancy, load balancing, coping with asymmetric bandwidth, decentralized security. The…
Hibrīd-decentralizēta vienādranga failu apmaiņa Interneta pārlūkprogrammās
2018
Nodrošinot failu apmaiņas tiešsaistes pakalpojumus, būtisku resursu patēriņu rada tīkla slodze uz pakalpojuma sniedzēja infrastruktūru. Šobrīd lielākā daļa šādu pakalpojumu izmanto centralizētu klienta-servera arhitektūru. Lai samazinātu slodzi, ir iespējams aizvietot klasisko klienta-servera arhitektūru ar hibrīd-decentralizētu vienādranga arhitektūru. Tādējādi tiktu izmantoti klientu resursi pakalpojuma sniegšanā. Darba mērķis ir teorētiski analizēt iespējas un ierobežojumus hibrīd-decentralizētai vienādranga failu apmaiņai Interneta pārlūkprogrammās un praktiski realizēt šādu lietotni. Darbā ir izstrādāta lietotne, izmantojot BitTorrent un WebRTC protokolus, un ir ieviesta ražošanā esošā…
On Constructing Persistent Identifiers with Persistent Resolution Targets
2016
Persistent Identifiers (PID) are the foundation referencing digital assets in scientific publications, books, and digital repositories. In its realization, PIDs contain metadata and resolving targets in form of URLs that point to data sets located on the network. In contrast to PIDs, the target URLs are typically changing over time; thus, PIDs need continuous maintenance -- an effort that is increasing tremendously with the advancement of e-Science and the advent of the Internet-of-Things (IoT). Nowadays, billions of sensors and data sets are subject of PID assignment. This paper presents a new approach of embedding location independent targets into PIDs that allows the creation of maintena…
A Network Formation Game Approach to Study BitTorrent Tit-for-Tat
2007
The Tit-for-Tat strategy implemented in BitTorrent (BT) clients is generally considered robust to selfish behaviours. The authors of [1] support this belief studying how Tit-for-Tat can affect selfish peers who are able to set their upload bandwidth. They show that there is a "good" Nash Equilibrium at which each peer uploads at the maximum rate. In this paper we consider a different game where BT clients can change the number of connections to open in order to improve their performance. We study this game using the analytical framework of network formation games [2]. In particular we characterize the set of pairwise stable networks the peers can form and how the peers can dynamically reach…
Availability in BitTorrent Systems
2007
In this paper, we investigate the problem of highly available, massive-scale file distribution in the Internet. To this end, we conduct a large-scale measurement study of BitTorrent, a popular class of systems that use swarms of actively downloading peers to assist each other in file distribution. The first generation of BitTorrent systems used a central tracker to enable coordination among peers, resulting in low availability due to the tracker's single point of failure. Our study analyzes the prevalence and impact of two recent trends to improve BitTorrent availability: (i) use of multiple trackers, and (ii) use of Distributed Hash Tables (DHTs), both of which also help to balance load be…
On Unstructured File Sharing Networks
2007
We study the interaction among users of unstructured file sharing applications, who compete for available network resources (link bandwidth or capacity) by opening multiple connections on multiple paths so as to accelerate data transfer. We model this interaction with an unstructured file sharing game. Users are players and their strategies are the numbers of sessions on available paths. We consider a general bandwidth sharing framework proposed by Kelly [1] and Mo and Walrand [2], with TCP as a special case. Furthermore, we incorporate the Tit-for-Tat strategy (adopted by BitTorrent [3] networks) into the unstructured file sharing game to model the competition in which a connection can be …
<title>Eye movements during silent and oral reading with stabilized versus free head movement and different eye-trackers</title>
2008
Eye movement research of reading has been done on a battery of eye-tracking setups during last decades. We compared reading data of the same group of six students, their eyes were tracked by a video-based helmet-mounted system with the data sampling frequency of 50 Hz and a setup with a chin-rest at 240 Hz. We found that not only the number of fixations may decrease after reading practice, but so does also the mean duration of fixations. In spite of the short duration of saccades, their distributions and changes in them are similarly reported in the two experimental conditions. Lack of significant correlation in the HED data testifies to the result variability due to measurement technique. …
Test-retest reliability of survey items on ownership and use of physical activity trackers
2019
Background: Researchers are interested in using digital tools, such as physical activity trackers (PAT), to promote and measure physical activity. PAT is a fast-growing research area that measures movement therefore, reliable questions on the ownership and use of PATs among adolescent populations need to be developed. Objective: The aim of this study was to conduct an intra-rater test-retest reliability study on PAT survey items used for surveillance purposes among young adolescents in ownership and use of smartphone applications (apps) and heart rate monitors (HRM). Methods: Young adolescents (N = 755; 11-, 13-, and 15-year-olds) in the Olomouc region of the Czech Republic were recruited t…