P2P

Results: 881



#Item
341Cryptographic hash functions / Error detection and correction / File sharing networks / Computer programming / Hash tree / Distributed hash table / Kademlia / Hash list / BitTorrent / Distributed data storage / Hashing / Computing

IPFS - Content Addressed, Versioned, P2P File System (DRAFT 3) Juan Benet ABSTRACT

Add to Reading List

Source URL: static.benet.ai

Language: English - Date: 2014-07-24 07:13:01
342Spamming / File sharing networks / Concurrent computing / Botnets / Storm botnet / Peer-to-peer / Kad network / Malware / DoSnet / Multi-agent systems / Computer network security / Computing

Botnet detection revisited: Theory and Practice of Finding Malicious P2P Networks via Internet Connection Graphs Stefan Ruehrup, Pierfrancesco Urbano, Andreas Berger, Alessandro D’Alconzo FTW, Vienna, Austria

Add to Reading List

Source URL: infocom.di.unimi.it

Language: English - Date: 2013-04-29 06:32:55
343Game theory / Road transport / Internet service provider / Traffic congestion / Replicator equation / Technology / Problem solving / P2P caching / File sharing networks / Peer-to-peer / Evolutionary game theory

Designing ISP-Friendly P2P Using Game-based Control Srinivas Shakkottai Texas A&M University

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-02-02 18:46:05
344Bitcoin / Peer-to-peer computing / Computer networking / File sharing networks / Peer-to-peer / Node / Cryptographic nonce / Proxy server / Tor / Computing / Software / Internet privacy

Deanonymisation of Clients in Bitcoin P2P Network Alex Biryukov Dmitry Khovratovich Ivan Pustogarov

Add to Reading List

Source URL: orbilu.uni.lu

Language: English - Date: 2014-11-05 11:20:27
345Software testing / Distributed data storage / Peer-to-peer / Virtual machine / Tapestry / VM / System software / Software / PlanetLab

PlanetLab: A Distributed Test Lab for Planetary Scale Network Services Opportunities • Emerging “Killer Apps”: – CDNs and P2P networks are first examples – Application spreads itself over the Internet

Add to Reading List

Source URL: www.planet-lab.org

Language: English - Date: 2011-02-22 16:10:24
346Deadline / EdVenture

  P2P: Challenging Extremism Program Timeline January 5, 2015

Add to Reading List

Source URL: ece.curtin.edu.au

Language: English - Date: 2015-03-25 04:00:31
347Finance / Debt / Banking / Loans / Lending Club / Person-to-person lending / Prosper Marketplace / Interest / Financial economics / Credit / Economics

P2P Loan Performance on Lending Club Peter Jin November 25, 2014

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2014-11-26 17:51:19
348Spamming / Botnets / Internet Relay Chat / Storm botnet / Peer-to-peer / Internet Relay Chat bot / Fast flux / Denial-of-service attack / Storm Worm / Computing / Computer network security / Multi-agent systems

Discovery techniques for P2P botnets David Dittrich Applied Physics Laboratory University of Washington

Add to Reading List

Source URL: jjcweb.jjay.cuny.edu

Language: English - Date: 2014-12-03 00:00:08
349Peer-to-peer / Bloom filter / Cyberwarfare / Cryptographic hash function / Detective / Denial-of-service attack / ANts P2P / Computer security / Hashing / File sharing networks / Computing

Fighting Coordinated Attackers with Cross-Organizational Information Sharing Mark Allman† , Ethan Blanton‡ , Vern Paxson† , Scott Shenker† Computer Science Institute, ‡ Purdue University † International

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2006-11-16 13:20:37
350Creativity / Psychology / Education / Mind / Curtin College / Educational psychology / Association of Commonwealth Universities / Curtin University

Your chance to stand out! Incredible opportunity! Program description Curtin University Perth participates in a “P2P: Challenge Extremism” competition which involves over 20 universities worldwide to develop creative

Add to Reading List

Source URL: ece.curtin.edu.au

Language: English - Date: 2015-03-25 04:01:41
UPDATE