Parasitic Computing
#1

[attachment=202]
[attachment=203]
The Net is a fertile place and where new ideas/products surface quite often. We have already come across many innovative ideas such as Peer-to-Peer file sharing, distributed computing and the like. Parasitic computing, which harnesses the computing power of machines that spread across the Net to accomplish complex computing tasks, is new in this category. The successor to distributed computing has opened up a whole new can of worms. It works by exploiting a weakness in the TCP/IP system's error checking system. The problem is that forcing target machines into performing calculations puts a greater load on them than a regular packet would, and the server owner has not agreed to take part - in effect the technique is stealing processing power, but without breaking any laws. Although the technique is too slow to have much practical value at present, it does raise questions for the future
Reply
#2

to get information about the topic PARASITIC COMPUTING full report ppt and related topic refer the page link bellow

http://seminarsprojects.in/attachment.php?aid=203

http://studentbank.in/report-parasitic-c...ull-report

http://seminarsprojects.in/attachment.php?aid=202

http://studentbank.in/report-ppt-on-parasitic-computing

http://studentbank.in/report-parasitic-computing--4303

http://studentbank.in/report-parasitic-computing

http://studentbank.in/report-parasitic-computing--3785
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: parasitic computing ppt download, download seminar topic parasitic computing ppt, parasitic computing ppts, ppt parasitic computing, history of parasitic computing, ppt on topic parasitic computing, seminar topic on parasitic computing,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  A SEMINAR REPORT on GRID COMPUTING Computer Science Clay 5 16,211 09-03-2015, 04:48 PM
Last Post: iyjwtfxgj
  Soft Computing seminar surveyer 2 11,146 29-10-2013, 03:50 PM
Last Post: kavitaswami93gmail.com
  Modular Computing seminars report computer science crazy 4 21,448 08-10-2013, 04:32 PM
Last Post: Guest
  self managing computing system full report computer science technology 5 14,135 18-05-2013, 09:48 AM
Last Post: computer topic
  Unicode And Multilingual Computing computer science crazy 2 8,233 06-05-2013, 11:18 AM
Last Post: computer topic
  What Networking of Information Can Do for Cloud Computing project topics 1 8,197 29-03-2013, 01:03 AM
Last Post: Guest
  pervasive computing full report computer science technology 11 18,402 02-03-2013, 11:34 AM
Last Post: seminar details
  Nanocell Logic Gates For Molecular Computing full report seminar presentation 3 10,074 02-01-2013, 10:21 AM
Last Post: seminar details
  GREEN COMPUTING A SEMINAR REPORT Computer Science Clay 10 31,711 31-12-2012, 10:40 AM
Last Post: seminar details
  mobile computing full report seminar topics 11 15,870 13-12-2012, 01:35 PM
Last Post: seminar details

Forum Jump: