File sharing networks

Results: 1172



#Item
711Concurrent computing / Internet privacy / I2P / File sharing networks / Proxy server / Garlic routing / .onion / Anonymity / Kad network / Software / Computing / Cross-platform software

Darknets and hidden servers: Identifying the true IP/network identity of I2P service hosts Adrian Crenshaw Abstract: This paper will present research into

Add to Reading List

Source URL: www.irongeek.com

Language: English - Date: 2012-02-19 09:51:38
712File sharing networks / Cross-platform software / Oracle Database / Oracle Corporation / Internet / Peer-to-peer / Routing / Wireless sensor network / Scalability / Computing / Concurrent computing / Distributed computing

The Network Oracle Joseph M. Hellerstein∗ † Vern Paxson‡ Larry Peterson§

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2005-06-13 18:28:53
713Mental health / Peer-to-peer / Mind / Peer support / Recruitment / Behavior / Skill / Education / Educational psychology / Human resource management / File sharing networks

Building Blocks to Peer Program Success: A toolkit for developing HIV peer programs

Add to Reading List

Source URL: peer.hdwg.org

Language: English - Date: 2014-08-29 13:21:57
714Internet broadcasting / Internet television / File sharing networks / Digital television / Multimedia / Content delivery network / Video on demand / Web portal / Streaming media / Concurrent computing / Computing / Digital media

PRISM, an IP-based architecture for broadband access to TV and other streaming media∗ - a work-in-progress report - A. Basso, C. D. Cranor, R. Gopalakrishnan, M. Green, C. Kalmanek, D. Shur, S. Sibal, C. Sreenan† and

Add to Reading List

Source URL: chuck.cranor.org

Language: English - Date: 2005-08-08 21:58:23
715Concurrent computing / Peer-to-peer / Freenet / ANts P2P / GiFT / Chord / Node / Supernode / Gnutella / File sharing networks / Computing / Software

Denial-of-Service Resilience in Peer-to-Peer File Sharing Systems  

Add to Reading List

Source URL: www.cs.northwestern.edu

Language: English - Date: 2005-03-28 16:40:39
716Distributed computing / Peer-to-peer / EMule / ANts P2P / HTTP / Social peer-to-peer processes / Kad network / BitTorrent / PeerGuardian / Computing / Concurrent computing / File sharing networks

Measurement and Diagnosis of Address Misconfigured P2P Traffic Zhichun Li, Anup Goyal†, Yan Chen, Aleksandar Kuzmanovic †Yahoo! Inc., Sunnyvale, CA, USA Northwestern University, Evanston, IL, USA

Add to Reading List

Source URL: networks.cs.northwestern.edu

Language: English - Date: 2011-04-04 20:37:02
717File sharing networks / Intellectual property law / File sharing / Distributed data storage / Peer-to-peer computing / Peer-to-peer / Copyright infringement / Social peer-to-peer processes / Copyright / Computing / Software / Concurrent computing

How and Why I Should Avoid Using Peer to Peer Networks? What is a Peer to Peer Network? Clay Shirky, the author of the article “What is P2P … and What Isn’t?” defines a Peer to Peer network as “a class of appli

Add to Reading List

Source URL: groups.haas.berkeley.edu

Language: English - Date: 2006-09-21 13:18:51
718File sharing networks / File sharing / Distributed data storage / Peer-to-peer computing / BitTorrent / Peer-to-peer / Content delivery network / Leech / ANts P2P / Computing / Concurrent computing / Distributed computing

Dear Dr. Fonseca, we thank you and the referees for reviewing our paper. Below we provide detailed answers to the reviewers’ comments. Our responses are marked by (*). We highlight the changes in the manuscript using b

Add to Reading List

Source URL: www.cs.northwestern.edu

Language: English - Date: 2012-02-21 19:43:12
719File sharing networks / Peer-to-peer / Segmented downloading / Comparison of BitTorrent clients / Leech / Super-seeding / BitTyrant / Software / BitTorrent / Computing

Dear Dr. Fonseca, we thank you and the referees for reviewing our paper. Below we provide detailed answers to the reviewers’ comments. Our responses are marked by (*). We highlight the changes in the manuscript using b

Add to Reading List

Source URL: www.cs.northwestern.edu

Language: English - Date: 2012-05-25 17:29:37
720Computer network security / Distributed data storage / Proxy server / Denial-of-service attack / Approx / Peer-to-peer / Web cache / Squid / Content delivery network / Computing / Cache / File sharing networks

Internet Cache Pollution Attacks and Countermeasures Yan Gao, Leiwen Deng, Aleksandar Kuzmanovic, and Yan Chen Department of Electrical Engineering and Computer Science Northwestern University, Evanston, IL 60208 {ygao,

Add to Reading List

Source URL: www.cs.northwestern.edu

Language: English - Date: 2006-08-11 17:41:19
UPDATE