Search

Your search keyword '"PEER-to-peer file sharing"' showing total 358 results

Search Constraints

Start Over You searched for: Descriptor "PEER-to-peer file sharing" Remove constraint Descriptor: "PEER-to-peer file sharing"
358 results on '"PEER-to-peer file sharing"'

Search Results

1. Eigenproblems in addition-min algebra1.

2. Relationship Between Interest Rate and Risk of P2P Lending in China Based on the Skew-Normal Panel Data Model.

3. CYBERTERRORISM AND SOCIAL ENGINEERING - METHODS AND COUNTERMEASURES.

4. DECENTRALIZED SYSTEM FOR CONSTRUCTION PROJECTS DATA MANAGEMENT USING BLOCKCHAIN AND IPFS.

5. DIGITAL ASSET REGULATION: PEERING INTO THE PAST, PEERING INTO THE FUTURE.

7. Mapping Surveillance Capitalism in South American Higher Education.

8. NordVPN: Fast and packed with features.

9. Performance analysis of P2P networks with malicious nodes.

10. Strategic pricing, lifespan choices and environmental implications of peer-to-peer sharing.

11. To the InterPlanetary File System--and Betond! Peer-to-peer file sharing would make the Internet far more efficient.

12. Cloud‐edge collaboration based peer to peer services redirection strategy for passive optical network.

13. How to use file sharing on your Mac.

14. Piracy and the Nigerian Copyright Law: A Re-Appraisal.

15. NordVPN: Fast and feature-packed VPN for power users.

16. ProtonVPN: Easy to understand, fast, and full of features.

17. A Dialogue on Therapeutic Peer-to-Peer Models for Trans and Nonbinary Surgical Support.

18. WHAT'S GOING ON WITH COPYRIGHT TROLLS?

19. Peer-to-Peer streaming and right of communication to the public in Australia.

23. NordVPN: Incredible speeds, and built for power users and newbies.

24. Fuzzy relation lexicographic programming for modelling P2P file sharing system.

25. Consumer motives for peer-to-peer sharing.

26. Hybrid Trust Model for Worm Mitigation in P2P Networks.

27. The role of privacy concerns in the sharing economy.

28. A mechanism of bandwidth allocation for peer-to-peer file-sharing networks via particle swarm optimization.

29. Peer-to-Peer Systems.

30. Why File Sharing Networks Are Dangerous?

31. An ELITE service model: Creating and implementing a peer-to-peer library tech support team.

32. ‘BorrowMyDoggy.Com’: Rethinking Peer‐to‐peer Exchange for Genuine Sharing.

33. What makes a sustainable business model successful? An empirical comparison of two peer-to-peer goods-sharing platforms.

34. Selecting efficient correlated equilibria through distributed learning.

35. Truthful Mechanisms for Message Dissemination via Device-to-Device Communications.

36. Petroleum Refinery Mesh Network Propagation Measurements.

37. Bitmap-based steganographic handshake and hidden communication in BitTorrent network.

38. Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model.

39. THE RIAA'S PLATINUM ANNIVERSARY.

40. A new mechanism to improve video streaming in P2P networks using helper nodes.

41. Detecting Sybil Attacks in Cloud Computing Environments Based on Fail-Stop Signature.

42. Fast and Furious (at Publishers): The Motivations behind Crowdsourced Research Sharing.

43. COPYRIGHT AND COGNITION: MUSICAL PRACTICE AND MUSIC PERCEPTION.

44. THE DATA LIBERATION MOVEMENT: REGULATION OF CLINICAL TRIAL DATA SHARING IN THE EUROPEAN UNION AND THE UNITED STATES.

45. Intellectual Property From Outside the Box: The Curious Case of Internet From Space.

46. CRIMINALIZATION DOWNLOADS EVIL: REEXAMINING THE APPROACH TO ELECTRONIC POSSESSION WHEN CHILD PORNOGRAPHY GOES INTERNATIONAL.

47. Predicting the level of cooperation in a Peer-to-Peer live streaming application.

48. A performance study of incentive schemes in peer-to-peer file-sharing systems.

49. ETNOGRAFÍA CONECTIVA DE UNA PRÁCTICA DE INTERCAMBIO DE ARCHIVOS: EL CASO BÚLGARO.

50. Improving Network Coding Based File Sharing for Unstructured Peer-to-Peer Networks.

Catalog

Books, media, physical & digital resources