File sharing

Results: 2429



#Item
781Peer-to-peer / Continual improvement process / Business / File sharing networks / Benchmarking / Strategic management

Gartner Consulting Case Study: Agricultural Services Organization Maintains a Foundation for Continual Improvement Client Context Client Challenges

Add to Reading List

Source URL: www.gartner.com

Language: English - Date: 2011-11-04 14:00:51
782Computing / Distributed computing / Peer-to-peer / BitTorrent / Gnutella / Ono / Breadth-first search / Network coding / Distributed hash table / File sharing networks / Distributed data storage / Concurrent computing

Microsoft Word - CCD_p-to-q_JSACPaper_TechnicalReport.doc

Add to Reading List

Source URL: www.eee.hku.hk

Language: English - Date: 2012-06-13 00:42:15
783File sharing networks / WS-Security / SOAP / Web service / Load balancing / Grid computing / Peer-to-peer / Client–server model / Computer cluster / Computing / Concurrent computing / Remote procedure call

Web Services Security and Load Balancing in Grid Environment Liang Fang, Aleksander Slominski, and Dennis Gannon Computer Science Dept, Indiana University Bloomington, IN, 47403 USA {lifang, aslom, gannon}@cs.indiana.edu

Add to Reading List

Source URL: www.extreme.indiana.edu

Language: English - Date: 2005-06-23 15:15:45
784Security / Health Insurance Portability and Accountability Act / Privacy law / Protected health information / Medical informatics / Computer security / Information security / Privacy / Internet privacy / Ethics / Data privacy / Health

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013 Patient Data in the Cloud

Add to Reading List

Source URL: www.mdanderson.org

Language: English - Date: 2015-05-09 06:47:02
785Internet protocols / Internet standards / File sharing networks / Peer-to-peer / Peering / Border Gateway Protocol / Internet transit / Cooperative Association for Internet Data Analysis / Routing / Internet / Network architecture / Computing

Characterizing AS Relationships by Recursive Analysis of AS Adjacency Matrix Hirochika Asai Hiroshi Esaki The University of Tokyo

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:43:54
786Law / Computer law / File sharing / Doe subpoena / Recording Industry Association of America / Pacific Century International /  Ltd. v. Does / Lawsuit / John Doe / Internet service provider

• IN THE CIRCUIT COURT OF THE liTH JUDICIAL DISTRICT IN AND FOR MIAMI-DADE COUNTY, FLORIDA CASE NO.

Add to Reading List

Source URL: citpsite.s3.amazonaws.com

Language: English - Date: 2011-11-21 12:53:26
787File sharing networks / Technology / Computer networking / Peer-to-peer / PlanetLab / David Culler / Intel / ROS / Node / Computing / Concurrent computing / Distributed data storage

Towards a Distributed Test-Lab for Planetary-Scale Services David Culler UC Berkeley Intel Research @ Berkeley

Add to Reading List

Source URL: www.planet-lab.org

Language: English - Date: 2011-02-22 16:10:24
788File sharing networks / Computing / Internet / Ethology / Peer-to-peer file sharing / Peer-to-peer / File sharing / Social peer-to-peer processes / Theory of reasoned action / Intellectual property law / Behavior / Theory of planned behavior

IRIE International Review of Information Ethics VolEric Kyper and Roger Blake:

Add to Reading List

Source URL: www.i-r-i-e.net

Language: English - Date: 2012-02-19 15:09:42
789Computing / File sharing / 105th United States Congress / United States / Digital Millennium Copyright Act / Copyright law of the United States / Copyright / Peer-to-peer file sharing / Legal aspects of file sharing / Law / Intellectual property law / Computer law

Olivet Nazarene University Compliance with the Higher Education Opportunity Act Peer-to-Peer File Sharing Requirements Introduction H.R 4137, the Higher Education Opportunity Act (HEOA), is a reauthorization of the Highe

Add to Reading List

Source URL: library.olivet.edu

Language: English - Date: 2014-05-08 08:55:59
790File sharing / Tor / Comparison of BitTorrent clients / Magnet URI scheme / Peer exchange / Peer-to-peer / The Pirate Bay / Distributed hash table / Anonymous P2P / BitTorrent / Software / Computing

One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users Stevens Le Blond Pere Manils Abdelberi Chaabane Mohamed Ali Kaafar Claude Castelluccia Arnaud Legout Walid Dabbous I.N.R.I.A, Fra

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-03-08 10:07:59
UPDATE