Peer-to-peer file sharing

Results: 1162



#Item
51Computing / Distributed data storage / Concurrent computing / Distributed computing / File sharing networks / Internet television / Peer-to-peer computing / File sharing / Ono / Peer-to-peer / P4P / P2P

Optimal Bandwidth Allocation in mesh-based Peer-to-Peer Streaming Networks Mar´ıa Elisa Bertinat, Dar´ıo Padula, Franco Robledo Amoza, Pablo Rodr´ıguez-Bocca and Pablo Romero Abstract The design of efficient proto

Add to Reading List

Source URL: goalbit-solutions.com

Language: English - Date: 2016-02-19 12:51:10
52File sharing networks / File sharing / Distributed data storage / Computing / Peer-to-peer / Gnutella / Chord / Digital audio / Digital rights / Privacy in file sharing networks / Distributed hash table

Answering Similarity Queries in Peer-to-Peer Networks ? Panos Kalnis ∗ Wee Siong Ng Beng Chin Ooi Kian-Lee Tan Department of Computer Science National University of Singapore 3 Science Drive 2, Singapore

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2004-11-23 03:44:44
53Computing / File sharing / Distributed data storage / Data management / XML databases / Distributed hash table / Peer-to-peer / Query language / Database / EXist / XQuery

RESEARCH REPORT N° 7812 November 2011 Project-Team Leo

Add to Reading List

Source URL: www.user.tu-berlin.de

Language: English - Date: 2016-07-21 07:25:51
54File sharing networks / Computing / File sharing / Concurrent computing / Peer-to-peer / Gnutella / BitTorrent / Freenet / EigenTrust / Anonymous P2P

Reputation Management in P2P Systems Pradipta Mitra Nov 18, 2003

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2006-01-05 22:30:19
55File sharing networks / Computing / Distributed data storage / Software / Digital media / File sharing / Distributed computing / Cross-platform software / Peer-to-peer / Routing / Network topology / GiFT

WIDE Technical-Report inA Role-Based Peer-to-Peer Approach to Application-Oriented Measurement Platforms wide-tr-mawi-ntaprole-00.pdf

Add to Reading List

Source URL: member.wide.ad.jp

Language: English - Date: 2008-01-08 03:28:16
56File sharing networks / File sharing / Software / Cross-platform software / Computing / Analytic geometry / Coordinate system / Peer-to-peer / Node / GiFT

The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems Eric Chan-Tin, Daniel Feldman, Nicholas Hopper, Yongdae Kim {dchantin, feldman, hopper, kyd}@cs.umn.edu University of Minnes

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:40
57Computing / Distributed data storage / File sharing / Concurrent computing / Distributed computing / Distributed hash table / BitTorrent / Peer-to-peer / Scalability / Kademlia / Package manager / Two-phase commit protocol

Lock-Free Decentralized Storage for Transactional Upgrade Rollback∗ Boris Mej´ıas, Gustavo Guti´errez, Peter Van Roy Universit´e catholique de Louvain Abstract

Add to Reading List

Source URL: www.mancoosi.org

Language: English - Date: 2012-12-16 04:54:55
58Computing / Humancomputer interaction / Human communication / File system / Usability / Interpersonal communication / User interface / Computer file / User / Peer-to-peer file sharing / Workspace

Seeing Further: Extending Visualization as a Basis for Usable Security † Jennifer Rode, Carolina Johansson , Paul DiGioia, Roberto Silva Filho, Kari Nies, David H. Nguyen, Jie Ren, Paul Dourish, and David Redmiles

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-05-26 17:26:12
59Computing / Reputation management / Collaboration / Distributed data storage / File sharing / Peer-to-peer computing / Concurrent computing / EigenTrust / Intellectual property law / Peer-to-peer / Distributed hash table / Scalability

The EigenTrust Algorithm for Reputation Management in P2P Networks Sepandar D. Kamvar Mario T. Schlosser

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2013-11-08 11:14:15
60Computing / File sharing / Concurrent computing / Distributed computing / Network architecture / Peer-to-peer / Telecommunications engineering / Distributed hash table / Social peer-to-peer processes / Overlay network / Computer network / Mesh networking

itDecentralized Communication against Surveillance and Privacy Violation Kalman Graffi

Add to Reading List

Source URL: junior-fellows.gi.de

Language: English - Date: 2016-05-17 12:18:49
UPDATE