P2P

Results: 881



#Item
201

A Pull-Based Approach for a VoD Service in P2P Networks Anwar Al Hamra, Ernst W. Biersack, Guillaume Urvoy-Keller Institut Eur´ecom B.PSophia Antipolis - FRANCE {alhamra, erbi, urvoy}@eurecom.fr

Add to Reading List

Source URL: www.e-biersack.eu

Language: English - Date: 2012-10-03 06:39:01
    202

    What is P2P? Person-to-Person (P2P) payments allow customers to transfer funds from a cardholder’s bank account to another person or small business via Generations Bank’s online bill pay service. This transmission ca

    Add to Reading List

    Source URL: mygenbank.com

    Language: English
      203

      A Trusted Infrastructure for P2P-Based Marketplaces Tien Tuan Anh Dinh, Tom Chothia, Mark Ryan School of Computer Science, University of Birmingham, United Kingdom {ttd,tpc,mdr}@cs.bham.ac.uk Abstract

      Add to Reading List

      Source URL: www.cs.bham.ac.uk.

      Language: English - Date: 2009-10-30 10:03:47
        204

        Call for Papers for Selected Areas in Communications Symposium P2P Networking Track Symposium Co-Chair Hongwei Li, University of Electronic Science and Technology of China, China,

        Add to Reading List

        Source URL: globecom2015.ieee-globecom.org

        Language: English - Date: 2015-01-24 18:39:23
          205

          平成 22 年 12 月 14 日 お客様各位 三重データ通信株式会社 三重インターネットサービス P2P アプリケーション利用時の通信速度の制限について

          Add to Reading List

          Source URL: www.mint.or.jp

          Language: Japanese - Date: 2010-12-13 23:38:53
            206

            A New Method of High Speed P2P File Transfer using SD Card and TransferJet Technology White Paper | September 2014

            Add to Reading List

            Source URL: www.sdcard.org

            Language: English
              207

              A Model for Opportunistic Network Exploits: The Case of P2P Worms∗ Michael Collins CERT/NetSA, Carnegie Mellon University

              Add to Reading List

              Source URL: weis2006.econinfosec.org

              Language: English
                208

                Analyzing heavily protected P2P voice over IP software G´erard Wagener October 18, 2007 Introduction

                Add to Reading List

                Source URL: archive.hack.lu

                Language: English - Date: 2008-06-15 13:27:09
                  209Tapestry / File sharing / Distributed hash table / Globally unique identifier / Peer-to-peer / Routing / Decentralized object location and routing / ANts P2P / Tulip Overlay / Distributed data storage / Computing / Concurrent computing

                  Appears in Proc. of ACM/IFIP/USENIX Intl. Middleware Conf. (MiddlewareApproximate Object Location and Spam Filtering on Peer-to-peer Systems Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph, and J

                  Add to Reading List

                  Source URL: oceanstore.cs.berkeley.edu

                  Language: English - Date: 2003-03-14 22:52:22
                  UPDATE