<--- Back to Details
First PageDocument Content
Concurrent computing / Peer-to-peer / EMule / BitTorrent / Social peer-to-peer processes / ANts P2P / Kad network / File sharing / P2P caching / File sharing networks / Computing / Software
Date: 2011-05-25 14:37:48
Concurrent computing
Peer-to-peer
EMule
BitTorrent
Social peer-to-peer processes
ANts P2P
Kad network
File sharing
P2P caching
File sharing networks
Computing
Software

LI LAYOUT[removed]:24 PM

Add to Reading List

Source URL: networks.cs.northwestern.edu

Download Document from Source Website

File Size: 103,40 KB

Share Document on Facebook

Similar Documents

Software / Computing / BitTorrent / Concurrent computing / Goalbit / Peer-to-peer / Torrent file / Peer-to-Peer Assisted Streaming Solution / EMule / Ares Galaxy / BitTorrent protocol encryption / Torrent poisoning

GoalBit: The First Free and Open Source Peer-to-Peer Streaming Network MarĂ­a Elisa Bertinat Daniel De Vera

DocID: 1rh3L - View Document

File sharing networks / Computing / Software / File sharing / EDonkey network / Kad network / EMule / Peer-to-peer / Gnutella / Distributed hash table / Kademlia / BitTorrent

A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {.

DocID: 1r92H - View Document

File sharing networks / Software / Computing / File sharing / EDonkey network / Kad network / EMule / Peer-to-peer / Distributed hash table / Kademlia / BitTorrent / Gnutella

Poisoning the Kad Network

DocID: 1r1lv - View Document

Distributed data storage / Computing / Concurrent computing / File sharing networks / Distributed computing / File sharing / Kademlia / Kad network / Distributed computing architecture / Peer-to-peer / Overlay network / EMule

SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high

DocID: 1qHqY - View Document

Distributed data storage / Computing / Concurrent computing / File sharing networks / Distributed computing / File sharing / Kademlia / Kad network / Distributed computing architecture / Peer-to-peer / Overlay network / EMule

SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high

DocID: 1qCno - View Document