Peer-to-peer file sharing

Results: 1162



#Item
51Optimal Bandwidth Allocation in mesh-based Peer-to-Peer Streaming Networks Mar´ıa Elisa Bertinat, Dar´ıo Padula, Franco Robledo Amoza, Pablo Rodr´ıguez-Bocca and Pablo Romero  Abstract The design of efficient proto

Optimal Bandwidth Allocation in mesh-based Peer-to-Peer Streaming Networks Mar´ıa Elisa Bertinat, Dar´ıo Padula, Franco Robledo Amoza, Pablo Rodr´ıguez-Bocca and Pablo Romero Abstract The design of efficient proto

Add to Reading List

Source URL: goalbit-solutions.com

Language: English - Date: 2016-02-19 12:51:10
52Answering Similarity Queries in Peer-to-Peer Networks ? Panos Kalnis ∗ Wee Siong Ng Beng Chin Ooi Kian-Lee Tan Department of Computer Science National University of Singapore 3 Science Drive 2, Singapore

Answering Similarity Queries in Peer-to-Peer Networks ? Panos Kalnis ∗ Wee Siong Ng Beng Chin Ooi Kian-Lee Tan Department of Computer Science National University of Singapore 3 Science Drive 2, Singapore

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2004-11-23 03:44:44
53RESEARCH REPORT N° 7812 November 2011 Project-Team Leo

RESEARCH REPORT N° 7812 November 2011 Project-Team Leo

Add to Reading List

Source URL: www.user.tu-berlin.de

Language: English - Date: 2016-07-21 07:25:51
54Reputation Management in P2P Systems Pradipta Mitra Nov 18, 2003

Reputation Management in P2P Systems Pradipta Mitra Nov 18, 2003

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2006-01-05 22:30:19
55WIDE Technical-Report inA Role-Based Peer-to-Peer Approach to Application-Oriented Measurement Platforms wide-tr-mawi-ntaprole-00.pdf

WIDE Technical-Report inA Role-Based Peer-to-Peer Approach to Application-Oriented Measurement Platforms wide-tr-mawi-ntaprole-00.pdf

Add to Reading List

Source URL: member.wide.ad.jp

Language: English - Date: 2008-01-08 03:28:16
56The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems Eric Chan-Tin, Daniel Feldman, Nicholas Hopper, Yongdae Kim {dchantin, feldman, hopper, kyd}@cs.umn.edu University of Minnes

The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems Eric Chan-Tin, Daniel Feldman, Nicholas Hopper, Yongdae Kim {dchantin, feldman, hopper, kyd}@cs.umn.edu University of Minnes

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:40
57Lock-Free Decentralized Storage for Transactional Upgrade Rollback∗ Boris Mej´ıas, Gustavo Guti´errez, Peter Van Roy Universit´e catholique de Louvain   Abstract

Lock-Free Decentralized Storage for Transactional Upgrade Rollback∗ Boris Mej´ıas, Gustavo Guti´errez, Peter Van Roy Universit´e catholique de Louvain Abstract

Add to Reading List

Source URL: www.mancoosi.org

Language: English - Date: 2012-12-16 04:54:55
58Seeing Further: Extending Visualization as a Basis for Usable Security † Jennifer Rode, Carolina Johansson , Paul DiGioia, Roberto Silva Filho, Kari Nies, David H. Nguyen, Jie Ren, Paul Dourish, and David Redmiles

Seeing Further: Extending Visualization as a Basis for Usable Security † Jennifer Rode, Carolina Johansson , Paul DiGioia, Roberto Silva Filho, Kari Nies, David H. Nguyen, Jie Ren, Paul Dourish, and David Redmiles

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-05-26 17:26:12
59The EigenTrust Algorithm for Reputation Management in P2P Networks Sepandar D. Kamvar Mario T. Schlosser

The EigenTrust Algorithm for Reputation Management in P2P Networks Sepandar D. Kamvar Mario T. Schlosser

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2013-11-08 11:14:15
60itDecentralized Communication against Surveillance and Privacy Violation Kalman Graffi

itDecentralized Communication against Surveillance and Privacy Violation Kalman Graffi

Add to Reading List

Source URL: junior-fellows.gi.de

Language: English - Date: 2016-05-17 12:18:49