Found: 273
Select item for more details and to access through your institution.
Distributed classification for image spam detection.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 11, p. 13249, doi. 10.1007/s11042-017-4944-y
- By:
- Publication type:
- Article
Load balancing in wireless networks using reputation-ReDS in the magnified distributed hash table.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 8, p. 10347, doi. 10.1007/s11042-018-5620-6
- By:
- Publication type:
- Article
WhatsUpNow: urban social application with real-time peer-to-peer ambient and sensory data exchanges.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 21, p. 13349, doi. 10.1007/s11042-015-2846-4
- By:
- Publication type:
- Article
Self-adaptive morphable model based collaborative multi-view 3d face reconstruction in visual sensor network.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 18, p. 11469, doi. 10.1007/s11042-015-2864-2
- By:
- Publication type:
- Article
An anonymous DRM scheme for sharing multimedia files in P2P networks.
- Published in:
- Multimedia Tools & Applications, 2014, v. 69, n. 3, p. 1041, doi. 10.1007/s11042-012-1166-1
- By:
- Publication type:
- Article
A dependable multisource streaming system for peer-to-peer -based video on demand services provisioning.
- Published in:
- Multimedia Tools & Applications, 2012, v. 59, n. 1, p. 169, doi. 10.1007/s11042-011-0755-8
- By:
- Publication type:
- Article
A performance study of incentive schemes in peer-to-peer file-sharing systems.
- Published in:
- Journal of Supercomputing, 2016, v. 72, n. 3, p. 1152, doi. 10.1007/s11227-016-1648-4
- By:
- Publication type:
- Article
Direction-aware resource discovery in large-scale distributed computing environments.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 1, p. 229, doi. 10.1007/s11227-013-0899-6
- By:
- Publication type:
- Article
HyperTree for self-stabilizing peer-to-peer systems.
- Published in:
- Distributed Computing, 2008, v. 20, n. 5, p. 375, doi. 10.1007/s00446-007-0038-9
- By:
- Publication type:
- Article
Understanding social media data for disaster management.
- Published in:
- Natural Hazards, 2015, v. 79, n. 3, p. 1663, doi. 10.1007/s11069-015-1918-0
- By:
- Publication type:
- Article
Dynamic Analysis of an Institutional Conflict: Copyright Owners against Online File Sharing.
- Published in:
- Journal of Economic Issues (Association for Evolutionary Economics), 2005, v. 39, n. 3, p. 633, doi. 10.1080/00213624.2005.11506838
- By:
- Publication type:
- Article
Author's rights in the digital age: how Internet and peer-to-peer file sharing technology shape the perception of copyrights and copywrongs.
- Published in:
- Libellarium, 2015, v. 8, n. 2, p. 27, doi. 10.15291/libellarium.v0i0.232
- By:
- Publication type:
- Article
Piracy and the Nigerian Copyright Law: A Re-Appraisal.
- Published in:
- Library Philosophy & Practice, 2021, p. 1
- By:
- Publication type:
- Article
China's New Developments in Crackdown on Criminal Copyright Infringement in the Digital Era.
- Published in:
- Asian Journal of Law & Economics, 2022, v. 13, n. 1, p. 123, doi. 10.1515/ajle-2021-0053
- By:
- Publication type:
- Article
Secondary Liability for Copyright Infringement: BitTorrent as a Vehicle for Establishing a New Copyright Definition for Staple Articles of Commerce.
- Published in:
- Columbia Journal of Law & Social Problems, 2006, v. 40, n. 1, p. 1
- By:
- Publication type:
- Article
Time-Shifting in the Internet Age: Peer-to-Peer Sharing of Television Content.
- Published in:
- Columbia Journal of Law & Social Problems, 2005, v. 38, n. 4, p. 415
- By:
- Publication type:
- Article
File Sharing and Film Revenues: Estimates of Sales Displacement at the Box Office.
- Published in:
- B.E. Journal of Economic Analysis & Policy, 2016, v. 16, n. 1, p. 25, doi. 10.1515/bejeap-2015-0004
- By:
- Publication type:
- Article
Efficient Content Location Using Semantic Small World in Peer-to-Peer Networks.
- Published in:
- Telkomnika, 2013, v. 11, n. 2, p. 223, doi. 10.12928/telkomnika.v11i2.909
- By:
- Publication type:
- Article
Detecting Sybil Attacks in Cloud Computing Environments Based on Fail-Stop Signature.
- Published in:
- Symmetry (20738994), 2017, v. 9, n. 3, p. 35, doi. 10.3390/sym9030035
- By:
- Publication type:
- Article
Statistical Selection Algoritlun for Peer-to-Peer System.
- Published in:
- Pertanika Journal of Science & Technology, 2008, v. 16, n. 2, p. 177
- By:
- Publication type:
- Article
The Implications of Roadshow v iiNet for Authorisation Liability in Copyright Law.
- Published in:
- Sydney Law Review, 2013, v. 35, n. 2, p. 467
- By:
- Publication type:
- Article
P2P's Significance for eBusiness: Towards a Research Agenda.
- Published in:
- Journal of Theoretical & Applied Electronic Commerce Research, 2006, v. 1, n. 3, p. 42, doi. 10.3390/jtaer1030021
- By:
- Publication type:
- Article
An International-Comparative Perspective on Peer-to-Peer File-Sharing and Third Party Liability in Copyright Law: Framing the Past, Present, and Next Generations' Questions.
- Published in:
- Vanderbilt Journal of Transnational Law, 2007, v. 40, n. 1, p. 87
- By:
- Publication type:
- Article
A LEGAL MATTER:1 PEER-TO-PEER FILE SHARING, THE DIGITAL MILLENNIUM COPYRIGHT ACT, AND THE HIGHER EDUCATION OPPORTUNITY ACT: HOW CONGRESS AND THE ENTERTAINMENT INDUSTRY MISSED AN OPPORTUNITY TO STEM COPYRIGHT INFRINGEMENT.
- Published in:
- Albany Law Review, 2011, v. 74, n. 1, p. 313
- By:
- Publication type:
- Article
Evaluating Graduated Response.
- Published in:
- Columbia Journal of Law & the Arts, 2014, v. 37, n. 2, p. 147
- By:
- Publication type:
- Article
Physical World Assumptions and Software World Realities (and Why There are More P2P Software Providers than Ever Before).
- Published in:
- Columbia Journal of Law & the Arts, 2011, v. 35, n. 1, p. 57
- By:
- Publication type:
- Article
Peer-to-Peer File Sharing and Copyright: What Could Be the Role of Collective Management?
- Published in:
- Columbia Journal of Law & the Arts, 2011, v. 34, n. 4, p. 809
- By:
- Publication type:
- Article
The Power of Peers.
- Published in:
- Government Technology, 2013, v. 26, n. 10, p. 42
- By:
- Publication type:
- Article
Smart Spider.
- Published in:
- Government Technology, 2006, v. 19, n. 11, p. 42
- By:
- Publication type:
- Article
Cloud‐edge collaboration based peer to peer services redirection strategy for passive optical network.
- Published in:
- IET Communications (Wiley-Blackwell), 2022, v. 16, n. 8, p. 902, doi. 10.1049/cmu2.12394
- By:
- Publication type:
- Article
A new mechanism to improve video streaming in P2P networks using helper nodes.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2017, v. 25, n. 2, p. 877, doi. 10.3906/elk-1506-2
- By:
- Publication type:
- Article
Relationship Between Interest Rate and Risk of P2P Lending in China Based on the Skew-Normal Panel Data Model.
- Published in:
- SAGE Open, 2023, v. 13, n. 4, p. 1, doi. 10.1177/21582440231201378
- By:
- Publication type:
- Article
The Evolution of a Professional Practice Forum: Balancing Peer-to-Peer Learning With Course Objectives.
- Published in:
- Journal of Medical Internet Research, 2014, v. 16, n. 10, p. 1, doi. 10.2196/resprot.3287
- By:
- Publication type:
- Article
P2P Watch: Personal Health Information Detection in Peer-to-Peer File-Sharing Networks.
- Published in:
- Journal of Medical Internet Research, 2012, v. 14, n. 4, p. 18, doi. 10.2196/jmir.1898
- By:
- Publication type:
- Article
TARGETED QUANTUM SEARCH:: REDUCES THE TIME AND COST FOR SEARCHING FOR OBJECTS IN MULTIPLE-SERVER PEER-TO-PEER NETWORKS.
- Published in:
- International Journal of Quantum Information, 2009, v. 7, n. 1, p. 413, doi. 10.1142/S021974990900458X
- By:
- Publication type:
- Article
Delay and capacity analysis of structured P2P overlay for lookup service.
- Published in:
- Telecommunication Systems, 2015, v. 58, n. 1, p. 33, doi. 10.1007/s11235-014-9872-9
- By:
- Publication type:
- Article
Design of a method for encrypted P2P traffic identification using K-means algorithm.
- Published in:
- Telecommunication Systems, 2013, v. 53, n. 1, p. 163, doi. 10.1007/s11235-013-9690-5
- By:
- Publication type:
- Article
Pirates of the Internet, At Intellectual Property's End With Torrents and Challenges for Choice of Law.
- Published in:
- International Journal of Law & Information Technology, 2009, v. 17, n. 3, p. 282, doi. 10.1093/ijlit/ean010
- By:
- Publication type:
- Article
UNLAWFUL? INNOVATIVE? UNSTOPPABLE?
- Published in:
- International Journal of Law & Information Technology, 2006, v. 14, n. 2, p. 195, doi. 10.1093/ijlit/eai028
- By:
- Publication type:
- Article
On P2P File-Sharing: A Major Problem--A Chinese Perspective.
- Published in:
- Journal of Business Ethics, 2006, v. 63, n. 1, p. 63, doi. 10.1007/s10551-005-1130-3
- By:
- Publication type:
- Article
Structured peer-to-peer-based publication and sharing of ontologies to automatically process SPARQL query on a semantic sensor network.
- Published in:
- International Journal of Distributed Sensor Networks, 2018, v. 14, n. 10, p. 1, doi. 10.1177/1550147718797581
- By:
- Publication type:
- Article
In Search of a Place in the Sun: The Shadow Banking System with Chinese Characteristics.
- Published in:
- European Business Organization Law Review, 2014, v. 15, n. 3, p. 387, doi. 10.1017/S1566752914001189
- By:
- Publication type:
- Article
Linear Programming Method for Solving Semi-Latticized Fuzzy Relation Geometric Programming with Max-Min Composition.
- Published in:
- International Journal of Uncertainty, Fuzziness & Knowledge-Based Systems, 2015, v. 23, n. 5, p. 781, doi. 10.1142/S0218488515500348
- By:
- Publication type:
- Article
Load Balancing Strategy for P2P VoD Systems.
- Published in:
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 9, p. 4207, doi. 10.3837/tiis.2016.09.010
- By:
- Publication type:
- Article
A Device Authentication Mechanism Reducing Performance Cost in Mobile P2P Networks.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 4, p. 923, doi. 10.3837/tiis.2013.04.019
- By:
- Publication type:
- Article
Further Analyzing the Sybil Attack in Mitigating Peer-to-Peer Botnets.
- Published in:
- KSII Transactions on Internet & Information Systems, 2012, v. 6, n. 10, p. 2731, doi. 10.3837/tiis.2012.10.00
- By:
- Publication type:
- Article
A Resource Discovery with Data Dissemination over Unstructured Mobile P2P Networks.
- Published in:
- KSII Transactions on Internet & Information Systems, 2012, v. 6, n. 3, p. 815, doi. 10.3837/tiis.2012.03.003
- By:
- Publication type:
- Article
ELiSyR: Efficient, Lightweight and Sybil-Resilient File Search in P2P Networks.
- Published in:
- KSII Transactions on Internet & Information Systems, 2010, v. 4, n. 6, p. 1311, doi. 10.3837/tiis.2010.12.019
- By:
- Publication type:
- Article
An Efficient Overlay for Unstructured P2P File Sharing over MANET using Underlying Cluster-based Routing.
- Published in:
- KSII Transactions on Internet & Information Systems, 2010, v. 4, n. 5, p. 799, doi. 10.3837/tiis.2010.10.006
- By:
- Publication type:
- Article
Fair Peer Assignment Scheme for Peer-to-Peer File Sharing.
- Published in:
- KSII Transactions on Internet & Information Systems, 2010, v. 4, n. 5, p. 709, doi. 10.3837/tiis.2010.10.002
- By:
- Publication type:
- Article