Found: 60
Select item for more details and to access through your institution.
Detecting Sybil Attacks in Cloud Computing Environments Based on Fail-Stop Signature.
- Published in:
- Symmetry (20738994), 2017, v. 9, n. 3, p. 35, doi. 10.3390/sym9030035
- By:
- Publication type:
- Article
A Methodology and Tool for Investigation of Artifacts Left by the BitTorrent Client.
- Published in:
- Symmetry (20738994), 2016, v. 8, n. 6, p. 40, doi. 10.3390/sym8060040
- By:
- Publication type:
- Article
Connectivity properties of real BitTorrent swarms.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 9, p. 2246, doi. 10.3837/tiis.2013.09.010
- By:
- Publication type:
- Article
CYBER BUCCANEERS, PUBLIC AND PIRATE SPHERES: THE PHENOMENON OF BITTORRENT DOWNLOADS IN THE TRANSFORMING TERRAIN OF INDIAN CINEMA.
- Published in:
- Media International Australia (8/1/07-current), 2014, n. 152, p. 108, doi. 10.1177/1329878X1415200112
- By:
- Publication type:
- Article
O-Torrent: A fair, robust, and free riding resistant P2P content distribution mechanism.
- Published in:
- Peer-to-Peer Networking & Applications, 2018, v. 11, n. 3, p. 579, doi. 10.1007/s12083-017-0563-7
- By:
- Publication type:
- Article
Quality enhancement of video on demand implementation in peer-to-peer networks by optimum chunk length in the BitTorrent.
- Published in:
- Peer-to-Peer Networking & Applications, 2017, v. 10, n. 4, p. 1051, doi. 10.1007/s12083-016-0467-y
- By:
- Publication type:
- Article
UR-aware: Streaming videos over BitTorrent with balanced playback urgency and rareness distribution.
- Published in:
- Peer-to-Peer Networking & Applications, 2016, v. 9, n. 6, p. 1114, doi. 10.1007/s12083-015-0399-y
- By:
- Publication type:
- Article
Analysis of user's behavior and resource characteristics for private trackers.
- Published in:
- Peer-to-Peer Networking & Applications, 2015, v. 8, n. 3, p. 432, doi. 10.1007/s12083-014-0266-2
- By:
- Publication type:
- Article
A multi-faced measurement study on a large private BitTorrent community.
- Published in:
- Peer-to-Peer Networking & Applications, 2015, v. 8, n. 1, p. 32, doi. 10.1007/s12083-013-0207-5
- By:
- Publication type:
- Article
A verifiable hierarchical circular shift cipher scheme for P2P chunk exchanges.
- Published in:
- Peer-to-Peer Networking & Applications, 2015, v. 8, n. 1, p. 103, doi. 10.1007/s12083-013-0225-3
- By:
- Publication type:
- Article
Modeling the initial stage of a file sharing process on a BitTorrent network.
- Published in:
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 4, p. 311, doi. 10.1007/s12083-011-0118-2
- By:
- Publication type:
- Article
Improving sustainability of BitTorrent darknets.
- Published in:
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 4, p. 539, doi. 10.1007/s12083-012-0149-3
- By:
- Publication type:
- Article
On the collaboration of different peer-to-peer traffic management schemas.
- Published in:
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 4, p. 459, doi. 10.1007/s12083-012-0168-0
- By:
- Publication type:
- Article
PROBLEMS WITH BITTORRENT LITIGATION IN THE UNITED STATES: PERSONAL JURISDICTION, JOINDER, EVIDENTIARY ISSUES, AND WHY THE DUTCH HAVE A BETTER SYSTEM.
- Published in:
- Washington University Global Studies Law Review, 2014, v. 13, n. 1, p. 127
- By:
- Publication type:
- Article
The Effect of Subscription Video-on-Demand on Piracy: Evidence from a Household-Level Randomized Experiment.
- Published in:
- Management Science, 2018, v. 64, n. 12, p. 5610, doi. 10.1287/mnsc.2017.2875
- By:
- Publication type:
- Article
The Wolf and the Caribou: Coexistence of Decentralized Economies and Competitive Markets.
- Published in:
- Journal of Risk & Financial Management, 2018, v. 11, n. 2, p. 1, doi. 10.3390/jrfm11020026
- By:
- Publication type:
- Article
Inaccuracy in Private BitTorrent Measurements.
- Published in:
- International Journal of Parallel Programming, 2015, v. 43, n. 3, p. 528, doi. 10.1007/s10766-013-0282-5
- By:
- Publication type:
- Article
Democracy or autonomy? Indymedia and the contradictions of global social movement networks.
- Published in:
- Global Networks, 2013, v. 13, n. 3, p. 410, doi. 10.1111/glob.12030
- By:
- Publication type:
- Article
Performance analysis and improvement for BitTorrent-like file sharing systems.
- Published in:
- Concurrency & Computation: Practice & Experience, 2007, v. 19, n. 13, p. 1811, doi. 10.1002/cpe.1209
- By:
- Publication type:
- Article
Bitmap-based steganographic handshake and hidden communication in BitTorrent network.
- Published in:
- IEEJ Transactions on Electrical & Electronic Engineering, 2017, v. 12, n. 5, p. 721, doi. 10.1002/tee.22458
- By:
- Publication type:
- Article
JOINDER AND EARLY DISCOVERY IN BITTORRENT COPYRIGHT INFRINGEMENT LAWSUITS.
- Published in:
- Cardozo Arts & Entertainment Law Journal, 2014, v. 33, n. 1, p. 89
- By:
- Publication type:
- Article
Methodology and implementation for tracking the file sharers using BitTorrent.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 1, p. 271, doi. 10.1007/s11042-013-1760-x
- By:
- Publication type:
- Article
WuKong: a practical video streaming service based on native BitTorrent and scalable video coding.
- Published in:
- Multimedia Tools & Applications, 2012, v. 60, n. 1, p. 47, doi. 10.1007/s11042-011-0793-2
- By:
- Publication type:
- Article
Linear Programming Method for Solving Semi-Latticized Fuzzy Relation Geometric Programming with Max-Min Composition.
- Published in:
- International Journal of Uncertainty, Fuzziness & Knowledge-Based Systems, 2015, v. 23, n. 5, p. 781, doi. 10.1142/S0218488515500348
- By:
- Publication type:
- Article
DMCA SAFE HARBORS FOR VIRTUAL PRIVATE SERVER PROVIDERS HOSTING BITTORRENT CLIENTS.
- Published in:
- Duke Law & Technology Review, 2015, v. 14, n. 1, p. 163
- By:
- Publication type:
- Article
On the Mobility Scenario Implementation Using a Graphical P2P Discrete Event Simulator for the Bittorrent Protocol.
- Published in:
- Journal of Algorithms & Computational Technology, 2013, v. 7, n. 4, p. 449, doi. 10.1260/1748-3018.7.4.449
- By:
- Publication type:
- Article
BitTorious volunteer: server-side extensions for centrally-managed volunteer storage in BitTorrent swarms.
- Published in:
- BMC Bioinformatics, 2015, v. 16, p. 1, doi. 10.1186/s12859-015-0779-6
- By:
- Publication type:
- Article
BitTorious: global controlled genomics data publication, research and archiving via BitTorrent extensions.
- Published in:
- BMC Bioinformatics, 2014, v. 15, n. 1, p. 734, doi. 10.1186/s12859-014-0424-9
- By:
- Publication type:
- Article
Profit Leak? Pre-Release File Sharing and the Music Industry.
- Published in:
- Southern Economic Journal, 2014, v. 81, n. 2, p. 387, doi. 10.4284/0038-4038-2013.059
- By:
- Publication type:
- Article
Content Management Systems, Bittorrent Trackers, and Large-Scale Rhetorical Genres.
- Published in:
- Journal of Technical Writing & Communication, 2016, v. 46, n. 1, p. 4, doi. 10.1177/0047281615600634
- By:
- Publication type:
- Article
Analysis and modelling of resources shared in the BitTorrent network.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2015, v. 26, n. 10, p. 1189, doi. 10.1002/ett.2859
- By:
- Publication type:
- Article
Pirates, Blackmailers and Rule 20.
- Published in:
- Texas Review of Entertainment & Sports Law, 2014, v. 15, n. 2, p. 147
- By:
- Publication type:
- Article
Empirical investigation of BitTorrent community graphs.
- Published in:
- Computing, 2016, v. 98, n. 6, p. 567, doi. 10.1007/s00607-015-0470-9
- By:
- Publication type:
- Article
Methodology to Investigate BitTorrent Sync Protocol.
- Published in:
- Computer Science & Information Systems, 2017, v. 14, n. 1, p. 197, doi. 10.2298/CSIS160212032V
- By:
- Publication type:
- Article
The Uncertifiable Swarm: Why Defendant Class Actions and Mass BitTorrent Copyright Litigation Don't Mix.
- Published in:
- New York Law School Law Review, 2013, v. 58, n. 4, p. 931
- By:
- Publication type:
- Article
BITTORRENT COPYRIGHT TROLLS: A DEFICIENCY IN THE FEDERAL RULES OF CIVIL PROCEDURE?
- Published in:
- Rutgers Computer & Technology Law Journal, 2014, v. 40, n. 2, p. 190
- By:
- Publication type:
- Article
A Novel Massive Deployment Solution Based on the Peer-to-Peer Protocol.
- Published in:
- Applied Sciences (2076-3417), 2019, v. 9, n. 2, p. 296, doi. 10.3390/app9020296
- By:
- Publication type:
- Article
LIGHT AT THE END OF THE NARROW TUNNEL.
- Published in:
- DePaul Journal of Art, Technology & Intellectual Property Law, 2014, v. 24, n. 2, p. 425
- By:
- Publication type:
- Article
AN UNCOMFORTABLE THREESOME: PERMISSIVE PARTY JOINDER, BITTORRENT, AND PORNOGRAPHY.
- Published in:
- Emory Law Journal, 2014, v. 63, n. 5, p. 1211
- By:
- Publication type:
- Article
Video block device for user-friendly delivery in IaaS clouds.
- Published in:
- Journal of Supercomputing, 2014, v. 68, n. 1, p. 136, doi. 10.1007/s11227-013-1032-6
- By:
- Publication type:
- Article
Modeling max-min fair bandwidth allocation in BitTorrent communities.
- Published in:
- Computational Optimization & Applications, 2017, v. 66, n. 2, p. 383, doi. 10.1007/s10589-016-9866-5
- By:
- Publication type:
- Article
Improving fairness in peer-to-peer networks by separating the role of seeders in network infrastructures.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2016, v. 24, n. 4, p. 2255, doi. 10.3906/elk-1402-304
- By:
- Publication type:
- Article
iRep: indirect reciprocity reputation based efficient content delivery in BT-like systems.
- Published in:
- Telecommunication Systems, 2013, v. 54, n. 1, p. 47, doi. 10.1007/s11235-013-9715-0
- By:
- Publication type:
- Article
Design of a method for encrypted P2P traffic identification using K-means algorithm.
- Published in:
- Telecommunication Systems, 2013, v. 53, n. 1, p. 163, doi. 10.1007/s11235-013-9690-5
- By:
- Publication type:
- Article
Robust Reputation in Decentralized Markets.
- Published in:
- Computational Intelligence, 2015, v. 31, n. 4, p. 569, doi. 10.1111/coin.12036
- By:
- Publication type:
- Article
LEVERAGING DECENTRALIZATION TO EXTEND THE DIGITAL EVIDENCE ACQUISITION WINDOW: CASE STUDY ON BITTORRENT SYNC.
- Published in:
- 2014
- By:
- Publication type:
- Case Study
Smart Cloud Seeding for BitTorrent in Datacenters.
- Published in:
- IEEE Internet Computing, 2014, v. 18, n. 4, p. 47, doi. 10.1109/MIC.2014.43
- By:
- Publication type:
- Article
On the Presence of Child Sex Abuse in BitTorrent Networks.
- Published in:
- IEEE Internet Computing, 2013, v. 17, n. 3, p. 60, doi. 10.1109/MIC.2013.2
- By:
- Publication type:
- Article
Infringing Nations: Predicting Software Piracy Rates, BitTorrent Tracker Hosting, and P2P File Sharing Client Downloads Between Countries.
- Published in:
- International Journal of Cyber Criminology, 2013, v. 7, n. 1, p. 62
- By:
- Publication type:
- Article
THE BORDERLESS TORRENTS: INFRINGING THE COPYRIGHT LAWS AROUND THE WORLD.
- Published in:
- IDEA: The Intellectual Property Law Review, 2017, v. 57, n. 2, p. 281
- By:
- Publication type:
- Article