First Page | Document Content | |
---|---|---|
![]() Date: 2009-03-17 14:13:56Computing Concurrent computing Distributed data storage Computer network security Multi-agent systems Spamming File sharing networks Botnet Storm botnet Peer-to-Peer Protocol Kademlia Distributed hash table | Source URL: www-users.cs.umn.eduDownload Document from Source WebsiteFile Size: 499,95 KBShare Document on Facebook |