File sharing

Results: 2429



#Item
411Computing / Distributed data storage / Concurrent computing / File sharing / Distributed computing architecture / Network architecture / Dark web / Distributed hash table / Freenet / Sybil attack / Kademlia / Overlay network

PDF Document

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2009-08-11 22:57:58
412BitTorrent / Software / Computing / File sharing / Leech / Seeding / Comparison of BitTorrent clients / Peer-to-peer / Vuze / Segmented file transfer / Libtorrent / BitComet

PDF Document

Add to Reading List

Source URL: www.disco.ethz.ch

Language: English
413Computing / Distributed data storage / Software / Concurrent computing / File sharing / Distributed hash table / GNUnet / Freenet / Chord / Peer-to-peer / BitTorrent / Hash table

PDF Document

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2012-07-17 21:56:07
414BitTorrent / Distributed data storage / Vuze / OneSwarm / Comet / File sharing / Distributed hash table

PDF Document

Add to Reading List

Source URL: amitlevy.com

Language: English - Date: 2012-07-22 12:12:57
415Disk file systems / Unix / Inter-process communication / C POSIX library / File system / Inode / Computer file / NTFS / File descriptor / Computing / System software / Software

The UNIX Time-Sharing System* D. M. Ritchie and K. Thompson ABSTRACT UNIX† is a general-purpose, multi-user, interactive operating system for the larger Digital Equipment Corporation PDP-11 and the Interdata 8/32 compu

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2009-12-29 17:31:13
416Tapestry / File sharing / Distributed hash table / Globally unique identifier / Peer-to-peer / Routing / Decentralized object location and routing / ANts P2P / Tulip Overlay / Distributed data storage / Computing / Concurrent computing

Appears in Proc. of ACM/IFIP/USENIX Intl. Middleware Conf. (MiddlewareApproximate Object Location and Spam Filtering on Peer-to-peer Systems Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph, and J

Add to Reading List

Source URL: oceanstore.cs.berkeley.edu

Language: English - Date: 2003-03-14 22:52:22
417Data synchronization / File hosting / Cloud applications / Computer file / Internet privacy / Dropbox / Accellion /  Inc. / Encrypting File System / Cloud computing / Computing / Software

SOLUTION BRIEF - GOVERNMENT 100% PRIVATE FILE SHARING THAT MEETS COMPLIANCE FOR GOVERNMENT APPLICATIONS The Challenge – Maintaining Data Privacy While Enabling File Sharing for a Mobile Workforce

Add to Reading List

Source URL: connecteddata.wpengine.netdna-cdn.com

Language: English
418Music industry / Online music stores / Intellectual property law / Copyright law / The Pirate Bay / Copyright infringement / AllOfMP3 / Warez / Anti-piracy / Law / Computing / File sharing

THE RECORDING INDUSTRYPIRACY REPORT PROTECTING CREATIVITY IN MUSIC CONTENTS

Add to Reading List

Source URL: www.ifpi.com

Language: English - Date: 2010-12-19 20:13:48
419Inter-process communication / Transporter / File sharing / File system / Internet / Internet privacy / Technology / Intellectual property law / Computing / Computer file

Transporter for Business Case Study: Yancey County Overview Yancey County, North Carolina is home to the highest point in the United States east of the Mississippi River. Tucked in the scenic Appalachian Mountains regio

Add to Reading List

Source URL: connecteddata.wpengine.netdna-cdn.com

Language: English
420Distributed data storage / File sharing networks / File sharing / Distributed computing architecture / Overlay network / Peer-to-peer / 6bone / Mbone / Distributed hash table / Computing / Concurrent computing / Network architecture

Peer-to-peer networks and Distributed Hash Tables George Porter CSE 124 Mar 10, 2015

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-03-10 13:05:48
UPDATE