First Page | Document Content | |
---|---|---|
![]() Date: 2008-11-30 14:08:38File sharing Computing Intellectual property law Concurrent computing Gnutella Peer-to-peer BitTorrent EDonkey2000 Social peer-to-peer processes Privacy in file sharing networks Proactive network provider participation for P2P | Add to Reading List |
![]() | A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {.DocID: 1oOlY - View Document |
![]() | ../fig/ton-2006-sampling/empirical.texDocID: 1neV9 - View Document |
![]() | Information Seeking Behavior in Peer-to-Peer Networks: An Exploratory StudyDocID: 18EKf - View Document |
![]() | Epidemiological Modelling of Peer-to-Peer Viruses and Pollution Richard Thommes and Mark Coates Department of Electrical and Computer Engineering McGill University 3480 University StDocID: 18dZq - View Document |
![]() | Modeling Virus Propagation in Peer-to-Peer Networks R.W. Thommes M.J. CoatesDocID: 183tI - View Document |