Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering and Applications》 2010-01
Add to Favorite Get Latest Update

P2P incentive mechanism based on dynamic programming algorithm

PAN Hua-qiang1,LIU Yu-hua1,XU Kai-hua2,LI Yu-ling11.Computer Science Department,Huazhong Normal University,Wuhan 430079,China 2.College of Physical Science and Technology,Huazhong Normal University,Wuhan 430079,China  
As free-riding is so popular in P2P network,this paper proposes incentive mechanism in a P2P storage sharing system based on dynamic programming algorithms.In this mechanism,the provider allocates the resource based on this mechanism,and maximizes its sharing files by the optimum policy.And also the social utility of free-riding is analysed.Analyses and simulations show that the incentive mechanism is fair and effective,and it can discard the free-rider from P2P system effectively so that it can earn more reward.
【Fund】: 国家自然科学基金No.60673163~~
【CateGory Index】: TP393.01
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 1 Hits
1 TAO Shao-hua1,LIU Yu-hua1,XU Kai-hua2,TAN De-mao11.Computer Science Department,Huazhong Normal University,Wuhan 430079,China2.Research Center of Education Information,Huazhong Normal University,Wuhan 430079,China;Strategies against vulnerability of hubs in complex networks[J];Computer Engineering and Applications;2007-02
Chinese Journal Full-text Database 7 Hits
1 GU Hong-bo1,3,WAN Xi2,WANG Zhi-yuan3(1.College of Economics and Business Administration,Chongqing University,Chongqing 400044,China;2.School of Economics & Management,Chongqing University of Science & Technology,Chongqing 401331,China;3.Logistical Engineering University,Chongqing 401311,China);The Topology Optimization and Simulation to Resist Demages to Communication Networks Based on Redundant Links[J];Systems Engineering;2010-03
2 ZHANG Jing-jing,DA Xin-min(College of Computer and Information Engineering,Xinjiang Agriculture University,Wulumuqi 830052,China);Special Analysis of Vulnerability Based on Network Models[J];Computer and Modernization;2009-08
3 RAO Hao1,YANG Chun2,TAO Shao-hua3(1.Dept.of Computer Science,Shaoguan University,Shaoguan Guangdong 512005,China;2.Dept.of Computer Science,Huazhong Normal University,Wuhan 430079,China;3.Dept.of Computer Science & Technology,Xuchang University,Xuchang Henan 461000,China);Distributed controlling model for hubs in P2P networks[J];Application Research of Computers;2009-12
4 GAO Yong,ZHAO Zhen-dong,LOU Yun-yong.Department of Electronic and Communication Engineering,North China Electric Power University,Baoding,Hebei 071003,China;Study on strategies against control of hubs in scale-free networks[J];Computer Engineering and Applications;2009-34
5 ZHANG Yi-zhai ①,GUO Ping ②,ZHAO Juan ①,LI Xiao-lin ③(①Dep.of Information,Chongqing 400016,China;②Dep.of Training,LEU,Chongqing 400016,China;③PLA Unit 76112,Chenzhou Hunan,423029,China);Topology Optimization of Scale-free Network with Redundant Links[J];Communications Technology;2009-03
6 QIU Hang-ping1,HE Ming1,2,XIAO Deng-hai1,LIAN Xiang-lei1(1 Institute of Command Automation,PLA Science and Technology University,Nanjing 210007,China;2 Institute of Information Science and Engineering,Southeast University,Nanjing 210096,China);Research on Method for Evaluating Invulnerability of Scale-free Networks[J];Microelectronics & Computer;2009-09
7 HUANG Jian-hua~(1,2) (1.College of Public Administration,Fuzhou University,Fuzhou 350002,China;2.Institute of Systems Engineering,Dalian University of Technology,Liaoning 116024,China);Analysis on the Complexity and Robustness of Express Distribution Network——A Case Study of an Express Enterprise[J];Journal of Southwest Jiaotong University(Social Sciences);2009-06
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved