1,767 results on '"BitTorrent"'
Search Results
2. Predicting content consumption from content-to-content relationships
- Author
-
Han, Jinyoung, Choi, Daejin, Chung, Taejoong, Chuah, Chen-Nee, Kim, Hyun-chul, and Kwon, Ted Taekyoung
- Subjects
Data Management and Data Science ,Information and Computing Sciences ,Content sharing ,Peer-to-peer ,BitTorrent ,Distributed Computing ,Communications Technologies ,Networking & Telecommunications ,Communications engineering ,Cybersecurity and privacy ,Distributed computing and systems software - Abstract
As the majority of Internet traffic today is attributed to content-centric applications, there has been ever-increasing demand for highly scalable and efficient content delivery. An accurate prediction on future content consumption is essential for such demand. To address such an issue, this paper introduces a new computational approach, Content Network (CN) that can capture the relations among contents, and its potential applications. We conduct a measurement study to investigate how contents are inter-related from the viewpoint of content spreading on one of the popular BitTorrent portals: The Pirate Bay. Based on the large-scale dataset that contains 18 K torrents and 9 M users, we construct the CN and investigate its structural properties. Our key finding is that contents in the same community in the CN (i) belong to the same content category with 94% probability, (ii) are uploaded by the same content publisher with 76% probability, and (iii) have the similar titles with 51% probability, which implies that contents in the same community collectively contain common (shared) interests of users. Our trace-driven study demonstrates that the proposed CN model is useful in (i) content recommendation for increasing sales and (ii) content caching for networking efficiency. We believe our work can provide an important insight for content stakeholders, e.g., content providers for efficient publishing strategies, network engineers for networking efficiency, or content marketers for accurate recommendation.
- Published
- 2019
3. Blockchain-based distributed database management technology.
- Author
-
Ali, Maryam Ghazi
- Subjects
DATABASE management ,DISTRIBUTED databases ,BANKING industry ,DIGITAL currency ,TECHNOLOGY management ,BLOCKCHAINS ,CRYPTOCURRENCIES - Abstract
currently, the development of a new class of software called "decentralized applications" is gaining popularity. Its foundations were laid by the technologies of Bitcoin and BitTorrent, aroused the interest of developers in the methods of their implementation. Over the past few years, the whole world has been excited by the explosion in popularity of cryptocurrencies, which has brought blockchain technology into the spotlight. its application is not limited to the creation of electronic money and platforms for their exchange. One of the promising areas for the introduction of blockchain technology is its use in the banking sector to improve the security of operations and reduce costs. This paper focuses on Blockchain technology and investigates its applications, implementations, and constituents. and how blockchain applications enhancing database management. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
4. Super Generation Network Coding for Peer-to-Peer Content Distribution Networks
- Author
-
Anas Ahmad Abudaqa, Ashraf Mahmoud, Marwan Abu-Amara, and Tarek R. Sheltami
- Subjects
Content distribution networks ,peer-to-peer computing ,network coding ,file sharing ,bittorrent ,piece scheduling policies ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
In peer-to-peer (P2P) content distribution systems, network coding is known as a helpful method for increasing the content availability, accelerating the download process, and robustness against churn. Originally, dense network coding (DNC) has been proposed and theoretically considered as an optimal solution. However, due to its huge computational overhead, it is not viable for real-world systems. Subsequently, sparse, generations, and overlapped generations network coding schemes are proposed as possible alternatives but at reduced performance compared to that provided by the DNC. Further in this article, an improved applicable network coding scheme for P2P content distribution systems referred to therein as Super Generation Network Coding (SGNC) is proposed. SGNC maximizes the generation size so that it is as close as possible to the optimal size without adding computational overhead. Theoretical analysis and experimental work show that SGNC outperforms classical and all previous coding based schemes for P2P content distribution systems in terms of content availability, download time, overhead, and decodability for all piece scheduling policies.
- Published
- 2020
- Full Text
- View/download PDF
5. A Competitive Analysis of BitTorrent-like Algorithms for Interactive Video-on-Demand Streaming over MANETs.
- Author
-
Da Silva Rodrigues, Carlo Kleber and Rocha, Vladimir
- Abstract
This article carries out a competitive analysis between BitTorrent-like algorithms for interactive video-on-demand streaming over mobile ad hoc networks. To this end, we herein mainly delve into five recent proposals of this kind, and assess the operational download (DO) and the discontinuity-time (DT) performance metrics in different scenarios by means of simulations, considering two client interactivity profiles, two mobility models, and various network sizes. Although final results indicate that all five proposals may provide suitable system quality of service and client quality of experience in certain scenarios, the one named as BitTorrent Interactive Broadcast - Network is overall the most competitive one. For instance, compared to other literature proposals, it may provide optimizations of up to 106% and 86% at the DO and DT metrics, respectively, thus confirming its attractive performance. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
6. Scaling the Deployment of Virtual Machines in UnaCloud
- Author
-
Chavarriaga, Jaime, Forero-González, César, Padilla-Agudelo, Jesse, Muñoz, Andrés, Cáliz-Ospino, Rodolfo, Castro, Harold, Barbosa, Simone Diniz Junqueira, Series editor, Chen, Phoebe, Series editor, Filipe, Joaquim, Series editor, Kotenko, Igor, Series editor, Sivalingam, Krishna M., Series editor, Washio, Takashi, Series editor, Yuan, Junsong, Series editor, Zhou, Lizhu, Series editor, Mocskos, Esteban, editor, and Nesmachnow, Sergio, editor
- Published
- 2018
- Full Text
- View/download PDF
7. Performance Evaluation of a P2P System in Underlay Cognitive Radio Network
- Author
-
Báez Esquivel, Edgar Eduardo, Fernández Vázquez, Alfonso, Rivero-Angeles, Mario Eduardo, Orea-Flores, Izlian Y., Barbosa, Simone Diniz Junqueira, Series Editor, Filipe, Joaquim, Series Editor, Kotenko, Igor, Series Editor, Sivalingam, Krishna M., Series Editor, Washio, Takashi, Series Editor, Yuan, Junsong, Series Editor, Zhou, Lizhu, Series Editor, Ghosh, Ashish, Series Editor, Mata-Rivera, Miguel Felix, editor, and Zagal-Flores, Roberto, editor
- Published
- 2018
- Full Text
- View/download PDF
8. Analysing Distribution of Copyrighted Files by Tracking BitTorrent Network
- Author
-
Sidpara, Chintan B., patel, Darshana H., Khimani, Kunal U., Upadhyay, Darshan, Vasant, Avani R., Kacprzyk, Janusz, Series editor, Yang, Xin-She, editor, Nagar, Atulya K., editor, and Joshi, Amit, editor
- Published
- 2018
- Full Text
- View/download PDF
9. Interception of P2P Traffic in a Campus Network
- Author
-
Merouane MEHDI
- Subjects
Intranet ,P2P traffic ,BitTorrent ,µtorrent ,Bandwidth ,Automation ,T59.5 ,Information technology ,T58.5-58.64 - Abstract
Nowadays, many universities face bandwidth saturation problem caused by several origins. These include youtube abusively use, online games and especially illegal downloading that makes havoc to Peer-toPeer protocol e.g. BitTorrent. The latter is often associated with data piracy and copyright violation. This article aims at presenting on one hand the impact of the use of Peer-to-Peer file sharing traffic on campus bandwidth by observation of BitTorrent traffic and on the other a method for limiting the illicit access to this kind of networks. For this purpose, we used a set of open source tools like wireshak sniffer software to capture Bitorrent traffic. Additionally, using the well-known Snort intrusion detection system with a number of adequate and new rules one can reduce bandwidth saturation problem. This solution allowed in our case, a bandwidth saturation reduction of 35%.
- Published
- 2019
- Full Text
- View/download PDF
10. Distributed Computer Systems
- Author
-
Hales, David, Abarbanel, Henry D.I., Series Editor, Braha, Dan, Series Editor, Érdi, Péter, Series Editor, Friston, Karl J, Series Editor, Haken, Hermann, Series Editor, Jirsa, Viktor, Series Editor, Kacprzyk, Janusz, Series Editor, Kaneko, Kunihiko, Series Editor, Kelso, Scott, Series Editor, Kirkilionis, Markus, Series Editor, Kurths, Jürgen, Series Editor, Menezes, Ronaldo, Series Editor, Nowak, Andrzej, Series Editor, Qudrat-Ullah, Hassan, Series Editor, Reichl, Linda, Series Editor, Schuster, Peter, Series Editor, Schweitzer, Frank, Series Editor, Sornette, Didier, Series Editor, Thurner, Stefan, Series Editor, Edmonds, Bruce, editor, and Meyer, Ruth, editor
- Published
- 2017
- Full Text
- View/download PDF
11. A sleep‐and‐wake technique for reducing energy consumption in BitTorrent networks.
- Author
-
Marozzo, Fabrizio, Talia, Domenico, and Trunfio, Paolo
- Subjects
ENERGY consumption ,PEER-to-peer architecture (Computer networks) ,COMPUTER network architectures ,FILES (Records) - Abstract
Summary: File sharing is one of the leading Internet applications of P2P technology. Given the high number of computer nodes involved in peer‐to‐peer networks, reducing their aggregate energy consumption is an important challenge to be faced. In this paper, we show how the sleep‐and‐wake energy saving approach can be exploited to reduce energy consumption in BitTorrent, one of the most popular file sharing peer‐to‐peer networks. We describe BitTorrentSW, a sleep‐and‐wake approach for BitTorrent networks that allows seeders (ie, peers that hold complete files) to cyclically switch between wake and sleep modes to save energy while ensuring good file sharing performance. The decision to switch to sleep mode is taken independently by each seeder based on local information about the composition of the peer‐to‐peer network. BitTorrentSW has been evaluated through PeerSim using real BitTorrent traces. The simulation results show that, in all the configurations under analysis, the percentage of energy saved by BitTorrentSW is much higher than the percentage of increase in download time. For instance, in a network with 50% of seeders, about 20% of energy is saved using BitTorrentSW, with an increase of only 7% of the average time needed to complete a file download compared to a standard BitTorrent network in which all seeders are always powered on. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
12. A New Stable Peer-to-Peer Protocol With Non-Persistent Peers: The Group Suppression Protocol.
- Author
-
Bilgen, Omer and Wagner, Aaron B.
- Abstract
Recent studies have suggested that the stability of peer-to-peer networks may rely on persistent peers, who dwell on the network after they obtain the entire file. In the absence of such peers, one piece becomes extremely rare in the network, which leads to instability. Technological developments, however, are poised to reduce the incidence of persistent peers, giving rise to a need for a protocol that guarantees stability with non-persistent peers. We propose a novel peer-to-peer protocol, the group suppression protocol, to ensure the stability of peer-to-peer networks under the scenario that all the peers adopt non-persistent behavior. Using a suitable Lyapunov potential function, the group suppression protocol is proven to be stable when the file is broken into two pieces, and detailed experiments demonstrate the stability of the protocol for arbitrary number of pieces. We define and simulate a decentralized version of this protocol for practical applications. Straightforward incorporation of the group suppression protocol into BitTorrent while retaining most of BitTorrent’s core mechanisms is also presented. Subsequent simulations show that under certain assumptions, BitTorrent with the official protocol cannot escape from the missing piece syndrome, but BitTorrent with group suppression does. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
13. Efficiency and Fairness in Resource Exchange
- Author
-
Xiang Yan and Wei Zhu
- Subjects
Mathematical optimization ,Computer Networks and Communications ,business.industry ,Computer science ,Cloud computing ,computer.file_format ,Bottleneck ,Computer Science Applications ,Resource (project management) ,Hardware and Architecture ,Decomposition (computer science) ,Graph (abstract data type) ,The Internet ,business ,BitTorrent ,computer ,Time complexity ,Software ,Information Systems - Abstract
With the rapid growth of Internet, plenty of applications has been implemented for users to exchange resources with each other over networks. As a result, it has been a critical challenge to efficiently and fairly allocate resource among participating agents. Motivated by the famous BitTorrent system, a BD Mechanism for resource exchange allocation is proposed, which is based on a combinatorial structure called bottleneck decomposition. The mechanism has been shown to lead to market equilibrium, a state optimizing each individual's utility, and to be truthful, that is robust against agents' strategic behaviors. However, the crux on how to compute a bottleneck decomposition of any graph remains untouched. In this paper, we focus on the computation of bottleneck decomposition to fill the blanks and prove that the bottleneck decomposition of a network can be computed in O(n^6\log(nU)) time, where n and U are the number of agents and the maximal amount of resource any agent has in the network. Based on the bottleneck decomposition, a fair allocation in a resource exchange network can be obtained in polynomial time. We further carefully discuss the fairness in resource exchange scenario, showing the derived allocation satisfies several common fairness notions simultaneously.
- Published
- 2022
14. Program za razmjenu datoteke u mreži ravnopravnih sudionika
- Author
-
Vlaić, Marko and Mikuc, Miljenko
- Subjects
TECHNICAL SCIENCES. Computing ,TEHNIČKE ZNANOSTI. Računarstvo ,BITTORRENT ,OBLIKOVANJE PROGRAMSKE POTPORE ,SOFTWARE DESIGN ,PEER-TO-PEER NETWORKS ,MREŽA RAVNOPRAVNIH SUDIONIKA - Abstract
BitTorrent protokol propisuje tehnike za dijeljenje velikog broja velikih datoteka velikom broju korisnika, u mreži ravnopravnih sudionika. Ovaj rad opisuje oblikovanje i implementaciju jednostavnog BitTorrent klijenta, uporabom programskog jezika c++ i biblioteka otvorenog koda. The BitTorrent protocol specifies the techniques for distribution of a large number of large files to a large amount of users in a peer to peer network. This paper provides insight into the design and implementation of a simple BitTorrent client, using the c++ programming language and open-source libraries.
- Published
- 2023
15. BitWorker, a Decentralized Distributed Computing System Based on BitTorrent
- Author
-
Durand, Arnaud, Gasparian, Mikael, Rouvinez, Thomas, Aad, Imad, Braun, Torsten, Trinh, Tuan Anh, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Aguayo-Torres, Mari Carmen, editor, Gómez, Gerardo, editor, and Poncela, Javier, editor
- Published
- 2015
- Full Text
- View/download PDF
16. Estimating and Controlling the Traffic Impact of a Collaborative P2P System
- Author
-
Sousa, Pedro, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Kobsa, Alfred, editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Weikum, Gerhard, editor, Murgante, Beniamino, editor, Misra, Sanjay, editor, Rocha, Ana Maria A. C., editor, Torre, Carmelo, editor, Rocha, Jorge Gustavo, editor, Falcão, Maria Irene, editor, Taniar, David, editor, Apduhan, Bernady O., editor, and Gervasi, Osvaldo, editor
- Published
- 2014
- Full Text
- View/download PDF
17. A hamming distance and fuzzy logic-based algorithm for P2P content distribution in enterprise networks.
- Author
-
Aguilar, Alberto, Lozoya, Camilo, and Orona, Luis M.
- Subjects
HAMMING distance ,FUZZY algorithms ,COMPUTER network architectures ,CLOUD storage ,SOFTWARE upgrades ,FUZZY logic ,PEER-to-peer architecture (Computer networks) - Abstract
The rise in cloud storage and services in enterprise networks requires agile methods of content distribution, such as general-purpose files, software patches, image files, and other information. The work in this paper proposes a peer selection algorithm in BitTorrent to distribute content in enterprise networks. Peers execute this algorithm with a new special role called Internal Swarm Coordinator, ISC for short. Additions to the protocol allow peers from an Internal Swarm to cooperate in a coordinated manner, with an ISC acting as an orchestra director for a given broadcast domain. The proposed scheme uses two approaches: a Hamming distance to select the best peers enforcing productive connections between hosts, and fuzzy logic to handle peer load. This work includes a UDP-based protocol to select ISCs, and a procedure to define the behavior of this unique host. Also, to ensure backward compatibility, a description of how other peers can interact with this special role is given. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
18. Performance analysis of a locality-aware BitTorrent protocol in enterprise networks.
- Author
-
D'Alessandro Costa, Marco Antonio and Gonçalves Rubinstein, Marcelo
- Subjects
COMPUTER network protocols ,TCP/IP ,INTERNET protocol address ,PEER-to-peer architecture (Computer networks) ,DOWNLOADING - Abstract
Nowadays, distributions of large volumes of data over enterprise TCP/IP networks bring problems such as high network and server utilizations, long periods for completion, and greater sensitivity to flaws in network infrastructure. These problems can be reduced with the use of Peer-to-Peer (P2P) networks, but the standard BitTorrent protocol does not perform well in some scenarios such as the one related to enterprise networks. This work proposes a modification in the BitTorrent protocol that uses locality-awareness to reduce traffic on long distance links of enterprise networks. In this modification, the tracker identifies the peer IP address requesting the list of IP addresses of the swarm and sends only those addresses that belong to the same LAN and to the original seeder. The performance of the proposal has been assessed by simulations. In typical enterprise scenarios, results show that the change is able to reduce bandwidth consumption and time of downloads compared with standard BitTorrent, and gives greater robustness to the distribution in case of failure of WAN links. Results also show that in more complex network environments, with many clients and where the bandwidth restriction on long distance links causes congestion and packet drops, the proposed modification consistently improves distribution performance. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
19. Interception of P2P Traffic in a Campus Network.
- Author
-
MEHDI, Merouane
- Subjects
PIRACY (Copyright) ,VIDEO games ,COMPUTER file sharing ,PEER-to-peer architecture (Computer networks) ,COLLEGE campuses ,NUMBER systems ,UNIVERSITIES & colleges - Abstract
Nowadays, many universities face bandwidth saturation problem caused by several origins. These include youtube abusively use, online games and especially illegal downloading that makes havoc to Peer-to- Peer protocol e.g. BitTorrent. The latter is often associated with data piracy and copyright violation. This article aims at presenting on one hand the impact of the use of Peer-to-Peer file sharing traffic on campus bandwidth by observation of BitTorrent traffic and on the other a method for limiting the illicit access to this kind of networks. For this purpose, we used a set of open source tools like wireshak sniffer software to capture Bitorrent traffic. Additionally, using the well-known Snort intrusion detection system with a number of adequate and new rules one can reduce bandwidth saturation problem. This solution allowed in our case, a bandwidth saturation reduction of 35%. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
20. BT-MANET: A Novel BitTorrent-Like Algorithm for Video On-Demand Streaming over MANETs.
- Author
-
da Silva Rodrigues, Carlo Kleber and Moreira Rocha, Vladimir Emiliano
- Abstract
This paper proposes a novel BitTorrent-like algorithm for video-on-demand streaming over mobile ad hoc networks: the BT-MANET algorithm. Its conceptual innovations mainly lie on (i) a flexible data-transmission scheme between direct neighbors and on (ii) a sliding window to prioritize data request, settling a compromise between data diversity and playing continuity. Through a number of simulations and assessing four different competitive metrics, we are able to validate our proposal and confirm its attractive performance for on-demand streaming. For instance, it is shown that BT-MANET may support twice the bit rate of a nominal theoretical scheme, besides being reasonably competitive when compared to an alternative wired implementation. Within this context, the key contribution of this paper is to provide valuable insights for real protocol designs targeted at multimedia on-demand streaming over mobile ad hoc networks. General conclusions and avenues for further research are included at the end of this paper. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
21. The Effect of Subscription Video-on-Demand on Piracy: Evidence from a Household-Level Randomized Experiment.
- Author
-
Godinho de Matos, Miguel, Ferreira, Pedro, and Smith, Michael D.
- Subjects
TELECOMMUNICATION ,VIDEO on demand ,BITTORRENT (Computer network protocol) ,HOUSEHOLDS - Abstract
We partner with a major multinational telecommunications provider to analyze the effect of subscription video-on-demand (SVoD) services on digital piracy. For a period of 45 consecutive days, a group of randomly selected households who used BitTorrent in the past were gifted with a bundle of TV channels with movies and TV shows that could be streamed as in SVoD. We find that, on average, households that received the gift increased overall TV consumption by 4.6% and reduced Internet downloads and uploads by 4.2% and 4.5%, respectively. However, and also on average, treated households did not change their likelihood of using BitTorrent during the experiment. Our findings are heterogeneous across households and are mediated by the fit between the preferences of households in our sample for movies and the content available as part of the gifted channels. Households with preferences aligned with the gifted content reduced their probability of using BitTorrent during the experiment by 18% and decreased their amount of upload traffic by 45%. We also show using simulation that the size of the SVoD catalog and licensing window restrictions limit significantly the ability of content providers to match SVoD offerings to the preferences of BitTorrent users. Finally, we estimate that households in our sample are willing to pay at most $3.25 USD per month to access a SVoD catalog as large as Netflix's in the United States. Together, our results show that, as a stand-alone strategy, using legal SVoD to curtail piracy will require, at the minimum, offering content much earlier and at much lower prices than those currently offered in the marketplace, changes that are likely to reduce industry revenue and that may damage overall incentives to produce new content while, at the same time, curbing only a small share of piracy. The online appendix is available at https://doi.org/10.1287/mnsc.2017.2875. This paper was accepted by Chris Forman, information systems. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
22. Infrastructureless wallet backed up with P2P technology
- Author
-
Martínez Casanovas, Lluís, Universitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica, and Hernández Serrano, Juan
- Subjects
P2P ,Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors [Àrees temàtiques de la UPC] ,Computació en núvol ,Wallet ,Cloud computing ,BitTorrent ,Computer networks ,Ordinadors, Xarxes d' - Abstract
Con el aumento de la popularidad de la nube, en los últimos años se han desarrollado muchas nuevas aplicaciones. Un ejemplo son los almacenes de datos, que se utilizan para almacenar de forma segura los archivos más preciosos de los usuarios en servidores basados en la nube. El uso de este tipo de aplicaciones requiere un alto grado de confianza por parte del usuario, ya que si existe alguna vulnerabilidad los archivos se podrían filtrar o si el servicio no está disponible es posible que los usuarios no puedan acceder en los archivos. Este proyecto propone una alternativa al uso de servidores centralizados mediante redes P2P. Las redes P2P consisten en un grupo de ordenadores que comparten recursos entre sí con los mismos permisos y responsabilidades. Mediante este tipo de redes, por ejemplo BitTorrent, los usuarios pueden acceder a estos recursos desde un dispositivo remoto sin necesidad de almacenarlos en servidores remotos, ofreciendo una alternativa a otras soluciones basadas en la nube. Amb l'augment de la popularitat del núvol, en els darrers anys s'han desenvolupat moltes aplicacions noves. Un exemple són els magatzems de dades, que s'utilitzen per emmagatzemar de manera segura els fitxers més preciosos dels usuaris en servidors basats en el núvol. L'ús d'aquest tipus d'aplicacions requereix un alt grau de confiança per part de l'usuari, ja que si hi ha alguna vulnerabilitat els fitxers es podrien filtrar o si el servei no està disponible és possible que els usuaris no puguin accedir als fitxers. Aquest projecte proposa una alternativa a l'ús de servidors centralitzats mitjançant xarxes P2P. Les xarxes P2P consisteixen en un grup d'ordinadors que comparteixen recursos entre ells amb els mateixos permisos i responsabilitats. Mitjançant aquest tipus de xarxes, per exemple BitTorrent, els usuaris poden accedir a aquests recursos des d'un dispositiu remot sense necessitat d'emmagatzemar-los en servidors remots, oferint una alternativa a altres solucions basades en el núvol With the rise in popularity of the cloud, many new applications have been developed in recent years. An example are data vaults, used to securely store user's most precious files in cloud-based servers. The use of this type of applications requires a high degree of trust from the user, because if there is any vulnerability the files containing highly sensitive information could be leaked or if the service is unavailable users may not be able to access the files. This project proposes an alternative to using central servers by using P2P networks. P2P networks consist on a group of computers that share resources among them with the same permissions and responsibilities. By using this type of networks, BitTorrent for example, users are still able to access these resources from a remote device without the need to store them in remote servers, offering an alternative to other cloud-based solutions.
- Published
- 2023
23. Martin Paul Eve: Warez: The Infrastructure and Aesthetics of Piracy
- Author
-
Cuntz-Leng, Vera
- Subjects
Warez ,BitTorrent ,Piraterie ,Kopie ,Internetpiraterie ,Subkultur - Published
- 2023
- Full Text
- View/download PDF
24. Anonymous communication method on an untrusted distributed network
- Subjects
untrusted distributed network ,data transfer ,недовеÑÐµÐ½Ð½Ð°Ñ ÑаÑпÑÐµÐ´ÐµÐ»ÐµÐ½Ð½Ð°Ñ ÑеÑÑ ,anonimity ,анонимноÑÑÑ ,BitTorrent ,пеÑедаÑа даннÑÑ - Abstract
Тема вÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ: «ÐеÑод анонимной пеÑедаÑи даннÑÑ Ð² недовеÑенной ÑаÑпÑеделенной ÑеÑи».ЦелÑÑ ÑабоÑÑ ÑвлÑеÑÑÑ ÑазÑабоÑка меÑода анонимной пеÑедаÑи даннÑÑ Ð² недовеÑенной ÑаÑпÑеделенной ÑеÑи. ÐÑедмеÑом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑвлÑÑÑÑÑ Ð¼ÐµÑÐ¾Ð´Ñ Ð¾Ð±ÐµÑпеÑÐµÐ½Ð¸Ñ Ð°Ð½Ð¾Ð½Ð¸Ð¼Ð½Ð¾ÑÑи в недовеÑенной ÑаÑпÑеделенной ÑеÑи. ÐадаÑи, ÑеÑаемÑе в Ñ Ð¾Ð´Ðµ иÑÑледованиÑ:ÐÑÑледование пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð°Ð½Ð¾Ð½Ð¸Ð¼Ð½Ð¾ÑÑи агенÑов в ÑаÑпÑеделенной honeypot-ÑиÑÑеме.СÑавнение ÑаÑпÑеделеннÑÑ ÑеÑей Ñ ÑоÑки зÑÐµÐ½Ð¸Ñ ÑеализаÑии меÑода анонимизаÑии.РазÑабоÑка меÑода анонимной пеÑедаÑи даннÑÑ Ð² вÑбÑанной ÑаÑпÑеделенной ÑеÑи.Создание пÑоÑоÑипа пÑогÑаммного ÑÑедÑÑва, ÑеализÑÑÑего пÑедложеннÑй меÑод, и пÑовеÑка его ÑабоÑоÑпоÑобноÑÑи.Рдипломной ÑабоÑе пÑедÑÑÐ°Ð²Ð»ÐµÐ½Ñ Ð¸ÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÐºÐ°ÑаÑÑиеÑÑ Ð¿ÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð°Ð½Ð¾Ð½Ð¸Ð¼Ð½Ð¾ÑÑи агенÑов ÑаÑпÑеделенной honeypot-ÑиÑÑемÑ, ÑабоÑаÑÑей в недовеÑенной ÑеÑи. ÐÑоведено ÑÑавнение ÑаÑпÑеделеннÑÑ ÑеÑей и вÑÐ±Ð¾Ñ Ð½Ð°Ð¸Ð±Ð¾Ð»ÐµÐµ Ð¿Ð¾Ð´Ñ Ð¾Ð´ÑÑей Ð´Ð»Ñ ÑеализаÑии меÑода анонимизаÑии. ÐÑедложен новÑй меÑод анонимизаÑии в ÑеÑи BitTorrent, оÑнованнÑй на ÑиÑоковеÑаÑелÑной ÑÑеганогÑаÑии.Ð ÑезÑлÑÑаÑе ÑабоÑÑ Ñоздан пÑоÑоÑип пÑогÑаммного ÑÑедÑÑва, обеÑпеÑиваÑÑего анонимноÑÑÑ Ð¿Ð¾Ð»ÑÑаÑÐµÐ»Ñ Ñ Ð¸ÑполÑзованием ÑазÑабоÑанного меÑода, бÑла пÑодемонÑÑÑиÑована ÑабоÑоÑпоÑобноÑÑÑ Ð¼ÐµÑода.ÐолÑÑеннÑе ÑезÑлÑÑаÑÑ Ð¼Ð¾Ð³ÑÑ Ð±ÑÑÑ Ð¸ÑполÑÐ·Ð¾Ð²Ð°Ð½Ñ Ð´Ð»Ñ Ð¾Ð±ÐµÑпеÑÐµÐ½Ð¸Ñ Ð°Ð½Ð¾Ð½Ð¸Ð¼Ð½Ð¾ÑÑи агенÑов ÑиÑÑем заÑиÑÑ, ÑабоÑаÑÑÐ¸Ñ Ð² недовеÑеннÑÑ ÑеÑÑÑ ., The topic of the graduate qualification work is «Anonymous communication method on an untrusted distributed network».The goal of the study is to create a method for anonymous communication on an untrusted distributed network. The subject of the work is modern methods of preserving anonymity in an untrusted distributed network. The research set out the following tasks:Study of the problem of agent anonymity in a distributed honeypot system.Comparison of distributed networks in terms of implementation of the anonymization method.Development of a method for anonymous communication in the selected distributed network.Creation of a prototype of a software tool that implements the proposed method and testing its performance.During the work, the problem of the anonymity of agents of a distributed honeypot system was studied. Distributed networks were compared to each other, and the most suitable for anonymization method development was selected. An anonymous communication method on the BitTorrent network based on broadcast steganography is proposed.As a result of the work, a prototype of a software tool was created. It preserves receiver anonymity using the proposed method. The operability of the method was demonstrated.The obtained results can be used to provide anonymity to distributed defense system agents operating on an untrusted network.
- Published
- 2023
- Full Text
- View/download PDF
25. Finding δ-Closure Property of BitTorrent System and Applications Based on This Property
- Author
-
Kun, Wang, Ying, Sha, Jian-long, Tan, Li, Guo, yang, Li, Yuan, Yuyu, editor, Wu, Xu, editor, and Lu, Yueming, editor
- Published
- 2013
- Full Text
- View/download PDF
26. The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent
- Author
-
Chothia, Tom, Cova, Marco, Novakovic, Chris, Toro, Camilo González, Akan, Ozgur, Series editor, Bellavista, Paolo, Series editor, Cao, Jiannong, Series editor, Dressler, Falko, Series editor, Ferrari, Domenico, Series editor, Gerla, Mario, Series editor, Kobayashi, Hisashi, Series editor, Palazzo, Sergio, Series editor, Sahni, Sartaj, Series editor, Shen, Xuemin (Sherman), Series editor, Stan, Mircea, Series editor, Xiaohua, Jia, Series editor, Zomaya, Albert, Series editor, Coulson, Geoffrey, Series editor, Keromytis, Angelos D., editor, and Di Pietro, Roberto, editor
- Published
- 2013
- Full Text
- View/download PDF
27. A Study on Traceback of Illegal Users Using Anonymity Technology in BitTorrent
- Author
-
Heo, Geon II, Kim, Nam Hun, Jo, Ah Ra, Choi, Sae In, Park, Won Hyung, SAE-China, FISITA, Kim, Kuinam J., editor, and Chung, Kyung-Yong, editor
- Published
- 2013
- Full Text
- View/download PDF
28. Congestion Distance Based BitTorrent-Like P2P Traffic Optimization
- Author
-
He, Qian, Shang, Yanlei, Wang, Yong, Huang, Guimin, Lu, Wei, editor, Cai, Guoqiang, editor, Liu, Weibin, editor, and Xing, Weiwei, editor
- Published
- 2013
- Full Text
- View/download PDF
29. RETRACTED CHAPTER: An Enhanced BitTorrent Protocol Supporting Multiple Network Accesses
- Author
-
Yifei, Xue, SAE-China, FISITA, and Zhong, Zhicai, editor
- Published
- 2013
- Full Text
- View/download PDF
30. D3S – A Distributed Storage Service
- Author
-
Lopes, Rui Pedro, Sernadela, Pedro, Kacprzyk, Janusz, Series editor, Pérez, Javier Bajo, editor, Rodríguez, Juan M. Corchado, editor, Fähndrich, Johannes, editor, Mathieu, Philippe, editor, Campbell, Andrew, editor, Suarez-Figueroa, Mari Carmen, editor, Ortega, Alfonso, editor, Adam, Emmanuel, editor, Navarro, Elena, editor, Hermoso, Ramon, editor, and Moreno, María N., editor
- Published
- 2013
- Full Text
- View/download PDF
31. On Using Bittorrent for File Sharing in Mobile Ad-Hoc Networks
- Author
-
Englert, Burkhard, Pourezza, Souroush, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Pathan, Mukaddim, editor, Wei, Guiyi, editor, and Fortino, Giancarlo, editor
- Published
- 2013
- Full Text
- View/download PDF
32. Large Scale Analysis of BitTorrent Proxy for Green Internet File Sharing
- Author
-
Cebeci, Sena, Ozkasap, Oznur, Anastasi, Giuseppe, Pierson, Jean-Marc, editor, Da Costa, Georges, editor, and Dittmann, Lars, editor
- Published
- 2013
- Full Text
- View/download PDF
33. MPI vs. BitTorrent: Switching between Large-Message Broadcast Algorithms in the Presence of Bottleneck Links
- Author
-
Dichev, Kiril, Lastovetsky, Alexey, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Caragiannis, Ioannis, editor, Alexander, Michael, editor, Badia, Rosa Maria, editor, Cannataro, Mario, editor, Costan, Alexandru, editor, Danelutto, Marco, editor, Desprez, Frédéric, editor, Krammer, Bettina, editor, Sahuquillo, Julio, editor, Scott, Stephen L., editor, and Weidendorfer, Josef, editor
- Published
- 2013
- Full Text
- View/download PDF
34. Energy Adaptive Mechanism for P2P File Sharing Protocols
- Author
-
Raj, Mayank, Kant, Krishna, Das, Sajal K., Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Caragiannis, Ioannis, editor, Alexander, Michael, editor, Badia, Rosa Maria, editor, Cannataro, Mario, editor, Costan, Alexandru, editor, Danelutto, Marco, editor, Desprez, Frédéric, editor, Krammer, Bettina, editor, Sahuquillo, Julio, editor, Scott, Stephen L., editor, and Weidendorfer, Josef, editor
- Published
- 2013
- Full Text
- View/download PDF
35. A Novel Approach to Energy Efficient Content Distribution with BitTorrent
- Author
-
Forshaw, Matthew, Thomas, Nigel, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Tribastone, Mirco, editor, and Gilmore, Stephen, editor
- Published
- 2013
- Full Text
- View/download PDF
36. Incentivizing Cooperation in P2P File Sharing : Indirect Interaction as an Incentive to Seed
- Author
-
Noroozian, Arman, de Weerdt, Mathijs, Witteveen, Cees, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Goebel, Randy, editor, Siekmann, Jörg, editor, Wahlster, Wolfgang, editor, Cao, Longbing, editor, Zeng, Yifeng, editor, Symeonidis, Andreas L., editor, Gorodetsky, Vladimir I., editor, Yu, Philip S., editor, and Singh, Munindar P, editor
- Published
- 2013
- Full Text
- View/download PDF
37. Modeling of a Copyright Protection System for the BitTorrent Environment
- Author
-
Lee, Jungjae, Kim, Jongweon, Kim, Tai-hoon, editor, Stoica, Adrian, editor, Fang, Wai-chi, editor, Vasilakos, Thanos, editor, Villalba, Javier García, editor, Arnett, Kirk P., editor, Khan, Muhammad Khurram, editor, and Kang, Byeong-Ho, editor
- Published
- 2012
- Full Text
- View/download PDF
38. Efficient Semi-supervised Learning BitTorrent Traffic Detection with Deep Packet and Deep Flow Inspections
- Author
-
Wong, Raymond Siulai, Moh, Teng-Sheng, Moh, Melody, Dua, Sumeet, editor, Gangopadhyay, Aryya, editor, Thulasiraman, Parimala, editor, Straccia, Umberto, editor, Shepherd, Michael, editor, and Stein, Benno, editor
- Published
- 2012
- Full Text
- View/download PDF
39. Two Propositions about Geographical Distributions of BitTorrent File Resources
- Author
-
Chen, Ming, Yu, Lidong, Bai, Huali, Kacprzyk, Janusz, editor, and Jiang, Liangzhong, editor
- Published
- 2012
- Full Text
- View/download PDF
40. Content Publishing and Downloading Practice in BitTorrent
- Author
-
Kim, Seungbae, Han, Jinyoung, Chung, Taejoong, Kim, Hyun-chul, Kwon, Ted “Taekyoung”, Choi, Yanghee, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Bestak, Robert, editor, Kencl, Lukas, editor, Li, Li Erran, editor, Widmer, Joerg, editor, and Yin, Hao, editor
- Published
- 2012
- Full Text
- View/download PDF
41. Enhancing Traffic Locality in BitTorrent via Shared Trackers
- Author
-
Wang, Haiyang, Wang, Feng, Liu, Jiangchuan, Xu, Ke, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Bestak, Robert, editor, Kencl, Lukas, editor, Li, Li Erran, editor, Widmer, Joerg, editor, and Yin, Hao, editor
- Published
- 2012
- Full Text
- View/download PDF
42. Efficient Semi-supervised Learning BitTorrent Traffic Detection - An Extended Summary : (Poster Paper)
- Author
-
Wong, Raymond Siulai, Moh, Teng-Sheng, Moh, Melody, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Bononi, Luciano, editor, Datta, Ajoy K., editor, Devismes, Stéphane, editor, and Misra, Archan, editor
- Published
- 2012
- Full Text
- View/download PDF
43. Semi-Structured BitTorrent Protocol with Application to Efficient P2P Video Streaming
- Author
-
Satoshi Fujita
- Subjects
Computer science ,business.industry ,computer.file_format ,Artificial Intelligence ,Hardware and Architecture ,Computer Vision and Pattern Recognition ,Video streaming ,Electrical and Electronic Engineering ,business ,BitTorrent ,computer ,Protocol (object-oriented programming) ,Software ,Computer network - Published
- 2021
44. A Competitive Analysis of BitTorrent-like Algorithms for Interactive Video-on-Demand Streaming over MANETs
- Author
-
Carlo Kleber da Silva Rodrigues and Vladimir Rocha
- Subjects
Mobility model ,General Computer Science ,Competitive analysis ,Computer science ,Wireless ad hoc network ,Interactive video ,Mobile computing ,Mobile ad hoc network ,computer.file_format ,Quality of experience ,Electrical and Electronic Engineering ,Algorithm ,BitTorrent ,computer - Abstract
This article carries out a competitive analysis between BitTorrent-like algorithms for interactive video-on-demand streaming over mobile ad hoc networks. To this end, we herein mainly delve into five recent proposals of this kind, and assess the operational download (DO) and the discontinuity-time (DT) performance metrics in different scenarios by means of simulations, considering two client interactivity profiles, two mobility models, and various network sizes. Although final results indicate that all five proposals may provide suitable system quality of service and client quality of experience in certain scenarios, the one named as BitTorrent Interactive Broadcast - Network is overall the most competitive one. For instance, compared to other literature proposals, it may provide optimizations of up to 106% and 86% at the DO and DT metrics, respectively, thus confirming its attractive performance.
- Published
- 2021
45. Characterization of BitTorrent Traffic in a Broadband Access Network
- Author
-
Móczár, Zoltán, Molnár, Sándor, Akan, Ozgur, Series editor, Bellavista, Paolo, Series editor, Cao, Jiannong, Series editor, Dressler, Falko, Series editor, Ferrari, Domenico, Series editor, Gerla, Mario, Series editor, Kobayashi, Hisashi, Series editor, Palazzo, Sergio, Series editor, Sahni, Sartaj, Series editor, Shen, Xuemin (Sherman), Series editor, Stan, Mircea, Series editor, Xiaohua, Jia, Series editor, Zomaya, Albert, Series editor, Coulson, Geoffrey, Series editor, Szabó, Róbert, editor, Zhu, Hua, editor, Imre, Sándor, editor, and Chaparadza, Ranganai, editor
- Published
- 2011
- Full Text
- View/download PDF
46. Multiaccess NetInf: A Prototype and Simulations
- Author
-
Rautio, Teemu, Mämmelä, Olli, Mäkelä, Jukka, Akan, Ozgur, Series editor, Bellavista, Paolo, Series editor, Cao, Jiannong, Series editor, Dressler, Falko, Series editor, Ferrari, Domenico, Series editor, Gerla, Mario, Series editor, Kobayashi, Hisashi, Series editor, Palazzo, Sergio, Series editor, Sahni, Sartaj, Series editor, Shen, Xuemin (Sherman), Series editor, Stan, Mircea, Series editor, Xiaohua, Jia, Series editor, Zomaya, Albert, Series editor, Coulson, Geoffrey, Series editor, Magedanz, Thomas, editor, Gavras, Anastasius, editor, Thanh, Nguyen Huu, editor, and Chase, Jeffry S., editor
- Published
- 2011
- Full Text
- View/download PDF
47. Comparative Traffic Analysis Study of Popular Applications
- Author
-
Móczár, Zoltán, Molnár, Sándor, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, and Lehnert, Ralf, editor
- Published
- 2011
- Full Text
- View/download PDF
48. Enhancing Peer-to-Peer Traffic Locality through Selective Tracker Blocking
- Author
-
Wang, Haiyang, Wang, Feng, Liu, Jiangchuan, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Domingo-Pascual, Jordi, editor, Manzoni, Pietro, editor, Palazzo, Sergio, editor, Pont, Ana, editor, and Scoglio, Caterina, editor
- Published
- 2011
- Full Text
- View/download PDF
49. Defending against Sybil Nodes in BitTorrent
- Author
-
So, Jung Ki, Reeves, Douglas S., Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Domingo-Pascual, Jordi, editor, Manzoni, Pietro, editor, Palazzo, Sergio, editor, Pont, Ana, editor, and Scoglio, Caterina, editor
- Published
- 2011
- Full Text
- View/download PDF
50. Unveiling the BitTorrent Performance in Mobile WiMAX Networks
- Author
-
Wang, Xiaofei, Kim, Seungbae, Kwon, Ted “Taekyoung”, Kim, Hyun-chul, Choi, Yanghee, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Spring, Neil, editor, and Riley, George F., editor
- Published
- 2011
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.