Found: 60
Select item for more details and to access through your institution.
Methodology and implementation for tracking the file sharers using BitTorrent.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 1, p. 271, doi. 10.1007/s11042-013-1760-x
- By:
- Publication type:
- Article
WuKong: a practical video streaming service based on native BitTorrent and scalable video coding.
- Published in:
- Multimedia Tools & Applications, 2012, v. 60, n. 1, p. 47, doi. 10.1007/s11042-011-0793-2
- By:
- Publication type:
- Article
Video block device for user-friendly delivery in IaaS clouds.
- Published in:
- Journal of Supercomputing, 2014, v. 68, n. 1, p. 136, doi. 10.1007/s11227-013-1032-6
- By:
- Publication type:
- Article
Stable and scalable universal swarms.
- Published in:
- Distributed Computing, 2015, v. 28, n. 6, p. 391, doi. 10.1007/s00446-014-0228-1
- By:
- Publication type:
- Article
The Wolf and the Caribou: Coexistence of Decentralized Economies and Competitive Markets.
- Published in:
- Journal of Risk & Financial Management, 2018, v. 11, n. 2, p. 1, doi. 10.3390/jrfm11020026
- By:
- Publication type:
- Article
Detecting Sybil Attacks in Cloud Computing Environments Based on Fail-Stop Signature.
- Published in:
- Symmetry (20738994), 2017, v. 9, n. 3, p. 35, doi. 10.3390/sym9030035
- By:
- Publication type:
- Article
A Methodology and Tool for Investigation of Artifacts Left by the BitTorrent Client.
- Published in:
- Symmetry (20738994), 2016, v. 8, n. 6, p. 40, doi. 10.3390/sym8060040
- By:
- Publication type:
- Article
Caveat emptor, computational social science: Large-scale missing data in a widely-published Reddit corpus.
- Published in:
- PLoS ONE, 2018, p. 1, doi. 10.1371/journal.pone.0200162
- By:
- Publication type:
- Article
Peer-to-Peer File Sharing and Copyright: What Could Be the Role of Collective Management?
- Published in:
- Columbia Journal of Law & the Arts, 2011, v. 34, n. 4, p. 809
- By:
- Publication type:
- Article
Improving fairness in peer-to-peer networks by separating the role of seeders in network infrastructures.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2016, v. 24, n. 4, p. 2255, doi. 10.3906/elk-1402-304
- By:
- Publication type:
- Article
Efficient and reliable network tomography in heterogeneous networks using BitTorrent broadcasts and clustering algorithms.
- Published in:
- Scientific Programming, 2013, v. 21, n. 4, p. 79, doi. 10.1155/2013/746524
- By:
- Publication type:
- Article
Efficient and reliable network tomography in heterogeneous networks using BitTorrent broadcasts and clustering algorithms.
- Published in:
- Scientific Programming, 2013, v. 21, n. 3, p. 79, doi. 10.1155/2013/746524
- By:
- Publication type:
- Article
iRep: indirect reciprocity reputation based efficient content delivery in BT-like systems.
- Published in:
- Telecommunication Systems, 2013, v. 54, n. 1, p. 47, doi. 10.1007/s11235-013-9715-0
- By:
- Publication type:
- Article
Design of a method for encrypted P2P traffic identification using K-means algorithm.
- Published in:
- Telecommunication Systems, 2013, v. 53, n. 1, p. 163, doi. 10.1007/s11235-013-9690-5
- By:
- Publication type:
- Article
Linear Programming Method for Solving Semi-Latticized Fuzzy Relation Geometric Programming with Max-Min Composition.
- Published in:
- International Journal of Uncertainty, Fuzziness & Knowledge-Based Systems, 2015, v. 23, n. 5, p. 781, doi. 10.1142/S0218488515500348
- By:
- Publication type:
- Article
Connectivity properties of real BitTorrent swarms.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 9, p. 2246, doi. 10.3837/tiis.2013.09.010
- By:
- Publication type:
- Article
PROBLEMS WITH BITTORRENT LITIGATION IN THE UNITED STATES: PERSONAL JURISDICTION, JOINDER, EVIDENTIARY ISSUES, AND WHY THE DUTCH HAVE A BETTER SYSTEM.
- Published in:
- Washington University Global Studies Law Review, 2014, v. 13, n. 1, p. 127
- By:
- Publication type:
- Article
BitTorious volunteer: server-side extensions for centrally-managed volunteer storage in BitTorrent swarms.
- Published in:
- BMC Bioinformatics, 2015, v. 16, p. 1, doi. 10.1186/s12859-015-0779-6
- By:
- Publication type:
- Article
BitTorious: global controlled genomics data publication, research and archiving via BitTorrent extensions.
- Published in:
- BMC Bioinformatics, 2014, v. 15, n. 1, p. 734, doi. 10.1186/s12859-014-0424-9
- By:
- Publication type:
- Article
A Novel Massive Deployment Solution Based on the Peer-to-Peer Protocol.
- Published in:
- Applied Sciences (2076-3417), 2019, v. 9, n. 2, p. 296, doi. 10.3390/app9020296
- By:
- Publication type:
- Article
Analysis and modelling of resources shared in the BitTorrent network.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2015, v. 26, n. 10, p. 1189, doi. 10.1002/ett.2859
- By:
- Publication type:
- Article
Bitmap-based steganographic handshake and hidden communication in BitTorrent network.
- Published in:
- IEEJ Transactions on Electrical & Electronic Engineering, 2017, v. 12, n. 5, p. 721, doi. 10.1002/tee.22458
- By:
- Publication type:
- Article
LEVERAGING DECENTRALIZATION TO EXTEND THE DIGITAL EVIDENCE ACQUISITION WINDOW: CASE STUDY ON BITTORRENT SYNC.
- Published in:
- 2014
- By:
- Publication type:
- Case Study
CYBER BUCCANEERS, PUBLIC AND PIRATE SPHERES: THE PHENOMENON OF BITTORRENT DOWNLOADS IN THE TRANSFORMING TERRAIN OF INDIAN CINEMA.
- Published in:
- Media International Australia (8/1/07-current), 2014, n. 152, p. 108, doi. 10.1177/1329878X1415200112
- By:
- Publication type:
- Article
The Uncertifiable Swarm: Why Defendant Class Actions and Mass BitTorrent Copyright Litigation Don't Mix.
- Published in:
- New York Law School Law Review, 2013, v. 58, n. 4, p. 931
- By:
- Publication type:
- Article
SECURE KEY ISSUING SCHEME IN BIT-TORRENT NETWORK.
- Published in:
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 2, p. 19, doi. 10.26483/ijarcs.v9i2.5534
- By:
- Publication type:
- Article
Smart Cloud Seeding for BitTorrent in Datacenters.
- Published in:
- IEEE Internet Computing, 2014, v. 18, n. 4, p. 47, doi. 10.1109/MIC.2014.43
- By:
- Publication type:
- Article
On the Presence of Child Sex Abuse in BitTorrent Networks.
- Published in:
- IEEE Internet Computing, 2013, v. 17, n. 3, p. 60, doi. 10.1109/MIC.2013.2
- By:
- Publication type:
- Article
Infringing Nations: Predicting Software Piracy Rates, BitTorrent Tracker Hosting, and P2P File Sharing Client Downloads Between Countries.
- Published in:
- International Journal of Cyber Criminology, 2013, v. 7, n. 1, p. 62
- By:
- Publication type:
- Article
JOINDER AND EARLY DISCOVERY IN BITTORRENT COPYRIGHT INFRINGEMENT LAWSUITS.
- Published in:
- Cardozo Arts & Entertainment Law Journal, 2014, v. 33, n. 1, p. 89
- By:
- Publication type:
- Article
Performance analysis and improvement for BitTorrent-like file sharing systems.
- Published in:
- Concurrency & Computation: Practice & Experience, 2007, v. 19, n. 13, p. 1811, doi. 10.1002/cpe.1209
- By:
- Publication type:
- Article
AN UNCOMFORTABLE THREESOME: PERMISSIVE PARTY JOINDER, BITTORRENT, AND PORNOGRAPHY.
- Published in:
- Emory Law Journal, 2014, v. 63, n. 5, p. 1211
- By:
- Publication type:
- Article
Auto Distribution of Tag Table in P2P Control System.
- Published in:
- Journal of Donghua University (English Edition), 2010, v. 27, n. 2, p. 277
- By:
- Publication type:
- Article
Methodology to Investigate BitTorrent Sync Protocol.
- Published in:
- Computer Science & Information Systems, 2017, v. 14, n. 1, p. 197, doi. 10.2298/CSIS160212032V
- By:
- Publication type:
- Article
JOINDER IS COMING: WHY DENYING SWARM JOINDER IN BITTORRENT CASES MAY DO MORE HARM THAN GOOD.
- Published in:
- University of Cincinnati Law Review, 2018, v. 87, n. 2, p. 611
- By:
- Publication type:
- Article
THE BORDERLESS TORRENTS: INFRINGING THE COPYRIGHT LAWS AROUND THE WORLD.
- Published in:
- IDEA: The Intellectual Property Law Review, 2017, v. 57, n. 2, p. 281
- By:
- Publication type:
- Article
BITTORRENT COPYRIGHT TROLLS: A DEFICIENCY IN THE FEDERAL RULES OF CIVIL PROCEDURE?
- Published in:
- Rutgers Computer & Technology Law Journal, 2014, v. 40, n. 2, p. 190
- By:
- Publication type:
- Article
Profit Leak? Pre-Release File Sharing and the Music Industry.
- Published in:
- Southern Economic Journal, 2014, v. 81, n. 2, p. 387, doi. 10.4284/0038-4038-2013.059
- By:
- Publication type:
- Article
LIGHT AT THE END OF THE NARROW TUNNEL.
- Published in:
- DePaul Journal of Art, Technology & Intellectual Property Law, 2014, v. 24, n. 2, p. 425
- By:
- Publication type:
- Article
DMCA SAFE HARBORS FOR VIRTUAL PRIVATE SERVER PROVIDERS HOSTING BITTORRENT CLIENTS.
- Published in:
- Duke Law & Technology Review, 2015, v. 14, n. 1, p. 163
- By:
- Publication type:
- Article
Give and ye shall receive! The copyright implications of BitTorrent.
- Published in:
- Journal of Intellectual Property Rights, 2005, v. 10, n. 6, p. 517
- Publication type:
- Article
Modeling max-min fair bandwidth allocation in BitTorrent communities.
- Published in:
- Computational Optimization & Applications, 2017, v. 66, n. 2, p. 383, doi. 10.1007/s10589-016-9866-5
- By:
- Publication type:
- Article
Content Management Systems, Bittorrent Trackers, and Large-Scale Rhetorical Genres.
- Published in:
- Journal of Technical Writing & Communication, 2016, v. 46, n. 1, p. 4, doi. 10.1177/0047281615600634
- By:
- Publication type:
- Article
Inaccuracy in Private BitTorrent Measurements.
- Published in:
- International Journal of Parallel Programming, 2015, v. 43, n. 3, p. 528, doi. 10.1007/s10766-013-0282-5
- By:
- Publication type:
- Article
Pirates, Blackmailers and Rule 20.
- Published in:
- Texas Review of Entertainment & Sports Law, 2014, v. 15, n. 2, p. 147
- By:
- Publication type:
- Article
On the Mobility Scenario Implementation Using a Graphical P2P Discrete Event Simulator for the Bittorrent Protocol.
- Published in:
- Journal of Algorithms & Computational Technology, 2013, v. 7, n. 4, p. 449, doi. 10.1260/1748-3018.7.4.449
- By:
- Publication type:
- Article
The Effect of Subscription Video-on-Demand on Piracy: Evidence from a Household-Level Randomized Experiment.
- Published in:
- Management Science, 2018, v. 64, p. 5610, doi. 10.1287/mnsc.2017.2875
- By:
- Publication type:
- Article
Democracy or autonomy? Indymedia and the contradictions of global social movement networks.
- Published in:
- Global Networks, 2013, v. 13, n. 3, p. 410, doi. 10.1111/glob.12030
- By:
- Publication type:
- Article
Empirical investigation of BitTorrent community graphs.
- Published in:
- Computing, 2016, v. 98, n. 6, p. 567, doi. 10.1007/s00607-015-0470-9
- By:
- Publication type:
- Article
Robust Reputation in Decentralized Markets.
- Published in:
- Computational Intelligence, 2015, v. 31, n. 4, p. 569, doi. 10.1111/coin.12036
- By:
- Publication type:
- Article