Works matching BitTorrent
Results: 179
A multi-faced measurement study on a large private BitTorrent community.
- Published in:
- Peer-to-Peer Networking & Applications, 2015, v. 8, n. 1, p. 32, doi. 10.1007/s12083-013-0207-5
- By:
- Publication type:
- Article
A Methodology and Tool for Investigation of Artifacts Left by the BitTorrent Client.
- Published in:
- Symmetry (20738994), 2016, v. 8, n. 6, p. 40, doi. 10.3390/sym8060040
- By:
- Publication type:
- Article
BitTorious volunteer: server-side extensions for centrally-managed volunteer storage in BitTorrent swarms.
- Published in:
- BMC Bioinformatics, 2015, v. 16, p. 1, doi. 10.1186/s12859-015-0779-6
- By:
- Publication type:
- Article
BitTorious: global controlled genomics data publication, research and archiving via BitTorrent extensions.
- Published in:
- BMC Bioinformatics, 2014, v. 15, n. 1, p. 734, doi. 10.1186/s12859-014-0424-9
- By:
- Publication type:
- Article
Methodology to Investigate BitTorrent Sync Protocol.
- Published in:
- Computer Science & Information Systems, 2017, v. 14, n. 1, p. 197, doi. 10.2298/CSIS160212032V
- By:
- Publication type:
- Article
Improving sustainability of BitTorrent darknets.
- Published in:
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 4, p. 539, doi. 10.1007/s12083-012-0149-3
- By:
- Publication type:
- Article
Empirical investigation of BitTorrent community graphs.
- Published in:
- Computing, 2016, v. 98, n. 6, p. 567, doi. 10.1007/s00607-015-0470-9
- By:
- Publication type:
- Article
Connectivity properties of real BitTorrent swarms.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 9, p. 2246, doi. 10.3837/tiis.2013.09.010
- By:
- Publication type:
- Article
On the Presence of Child Sex Abuse in BitTorrent Networks.
- Published in:
- IEEE Internet Computing, 2013, v. 17, n. 3, p. 60, doi. 10.1109/MIC.2013.2
- By:
- Publication type:
- Article
On the Mobility Scenario Implementation Using a Graphical P2P Discrete Event Simulator for the Bittorrent Protocol.
- Published in:
- Journal of Algorithms & Computational Technology, 2013, v. 7, n. 4, p. 449, doi. 10.1260/1748-3018.7.4.449
- By:
- Publication type:
- Article
Methodology and implementation for tracking the file sharers using BitTorrent.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 1, p. 271, doi. 10.1007/s11042-013-1760-x
- By:
- Publication type:
- Article
WuKong: a practical video streaming service based on native BitTorrent and scalable video coding.
- Published in:
- Multimedia Tools & Applications, 2012, v. 60, n. 1, p. 47, doi. 10.1007/s11042-011-0793-2
- By:
- Publication type:
- Article
Performance analysis and improvement for BitTorrent-like file sharing systems.
- Published in:
- Concurrency & Computation: Practice & Experience, 2007, v. 19, n. 13, p. 1811, doi. 10.1002/cpe.1209
- By:
- Publication type:
- Article
Bitmap-based steganographic handshake and hidden communication in BitTorrent network.
- Published in:
- IEEJ Transactions on Electrical & Electronic Engineering, 2017, v. 12, n. 5, p. 721, doi. 10.1002/tee.22458
- By:
- Publication type:
- Article
Quality enhancement of video on demand implementation in peer-to-peer networks by optimum chunk length in the BitTorrent.
- Published in:
- Peer-to-Peer Networking & Applications, 2017, v. 10, n. 4, p. 1051, doi. 10.1007/s12083-016-0467-y
- By:
- Publication type:
- Article
Infringing Nations: Predicting Software Piracy Rates, BitTorrent Tracker Hosting, and P2P File Sharing Client Downloads Between Countries.
- Published in:
- International Journal of Cyber Criminology, 2013, v. 7, n. 1, p. 62
- By:
- Publication type:
- Article
LEVERAGING DECENTRALIZATION TO EXTEND THE DIGITAL EVIDENCE ACQUISITION WINDOW: CASE STUDY ON BITTORRENT SYNC.
- Published in:
- 2014
- By:
- Publication type:
- Case Study
Modeling the initial stage of a file sharing process on a BitTorrent network.
- Published in:
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 4, p. 311, doi. 10.1007/s12083-011-0118-2
- By:
- Publication type:
- Article
Smart Cloud Seeding for BitTorrent in Datacenters.
- Published in:
- IEEE Internet Computing, 2014, v. 18, n. 4, p. 47, doi. 10.1109/MIC.2014.43
- By:
- Publication type:
- Article
UR-aware: Streaming videos over BitTorrent with balanced playback urgency and rareness distribution.
- Published in:
- Peer-to-Peer Networking & Applications, 2016, v. 9, n. 6, p. 1114, doi. 10.1007/s12083-015-0399-y
- By:
- Publication type:
- Article
Inaccuracy in Private BitTorrent Measurements.
- Published in:
- International Journal of Parallel Programming, 2015, v. 43, n. 3, p. 528, doi. 10.1007/s10766-013-0282-5
- By:
- Publication type:
- Article
Modeling max-min fair bandwidth allocation in BitTorrent communities.
- Published in:
- Computational Optimization & Applications, 2017, v. 66, n. 2, p. 383, doi. 10.1007/s10589-016-9866-5
- By:
- Publication type:
- Article
PROBLEMS WITH BITTORRENT LITIGATION IN THE UNITED STATES: PERSONAL JURISDICTION, JOINDER, EVIDENTIARY ISSUES, AND WHY THE DUTCH HAVE A BETTER SYSTEM.
- Published in:
- Washington University Global Studies Law Review, 2014, v. 13, n. 1, p. 127
- By:
- Publication type:
- Article
CYBER BUCCANEERS, PUBLIC AND PIRATE SPHERES: THE PHENOMENON OF BITTORRENT DOWNLOADS IN THE TRANSFORMING TERRAIN OF INDIAN CINEMA.
- Published in:
- Media International Australia (8/1/07-current), 2014, n. 152, p. 108, doi. 10.1177/1329878X1415200112
- By:
- Publication type:
- Article
AN UNCOMFORTABLE THREESOME: PERMISSIVE PARTY JOINDER, BITTORRENT, AND PORNOGRAPHY.
- Published in:
- Emory Law Journal, 2014, v. 63, n. 5, p. 1211
- By:
- Publication type:
- Article
DMCA SAFE HARBORS FOR VIRTUAL PRIVATE SERVER PROVIDERS HOSTING BITTORRENT CLIENTS.
- Published in:
- Duke Law & Technology Review, 2015, v. 14, n. 1, p. 163
- By:
- Publication type:
- Article
Give and ye shall receive! The copyright implications of BitTorrent.
- Published in:
- Journal of Intellectual Property Rights, 2005, v. 10, n. 6, p. 517
- Publication type:
- Article
一种针对BitTorrent协议中have消息的隐写分析方法.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2019, v. 36, n. 3, p. 918, doi. 10.19734/j.issn.1001-3695.2017.10.0939
- By:
- Publication type:
- Article
Analysis and modelling of resources shared in the BitTorrent network.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2015, v. 26, n. 10, p. 1189, doi. 10.1002/ett.2859
- By:
- Publication type:
- Article
JOINDER IS COMING: WHY DENYING SWARM JOINDER IN BITTORRENT CASES MAY DO MORE HARM THAN GOOD.
- Published in:
- University of Cincinnati Law Review, 2018, v. 87, n. 2, p. 611
- By:
- Publication type:
- Article
BITTORRENT COPYRIGHT TROLLS: A DEFICIENCY IN THE FEDERAL RULES OF CIVIL PROCEDURE?
- Published in:
- Rutgers Computer & Technology Law Journal, 2014, v. 40, n. 2, p. 190
- By:
- Publication type:
- Article
Content Management Systems, Bittorrent Trackers, and Large-Scale Rhetorical Genres.
- Published in:
- Journal of Technical Writing & Communication, 2016, v. 46, n. 1, p. 4, doi. 10.1177/0047281615600634
- By:
- Publication type:
- Article
The Uncertifiable Swarm: Why Defendant Class Actions and Mass BitTorrent Copyright Litigation Don't Mix.
- Published in:
- New York Law School Law Review, 2013, v. 58, n. 4, p. 931
- By:
- Publication type:
- Article
JOINDER AND EARLY DISCOVERY IN BITTORRENT COPYRIGHT INFRINGEMENT LAWSUITS.
- Published in:
- Cardozo Arts & Entertainment Law Journal, 2014, v. 33, n. 1, p. 89
- By:
- Publication type:
- Article
A DISPERSÃO DE DADOS COMO CRITÉRIO PARA A POLÍTICA DE SELEÇÃO DE PEERS EM UMA REDE BITTORRENT PARA STREAMING SOB DEMANDA INTERATIVO.
- Published in:
- Computing & System Journal (C&S) / Revista de Sistemas e Computação (RSC), 2017, v. 7, n. 1, p. 36
- By:
- Publication type:
- Article
基于 Tit-for-Tat 的 BitTorrent 网络经济模型.
- Published in:
- Journal of Northeastern University (Natural Science), 2016, v. 37, n. 6, p. 780, doi. 10.3969/j.issn.1005-3026.2016.06.005
- By:
- Publication type:
- Article
Improving fairness in peer-to-peer networks by separating the role of seeders in network infrastructures.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2016, v. 24, n. 4, p. 2255, doi. 10.3906/elk-1402-304
- By:
- Publication type:
- Article
A verifiable hierarchical circular shift cipher scheme for P2P chunk exchanges.
- Published in:
- Peer-to-Peer Networking & Applications, 2015, v. 8, n. 1, p. 103, doi. 10.1007/s12083-013-0225-3
- By:
- Publication type:
- Article
Securing BitTorrent using a new reputation-based trust management system.
- Published in:
- Peer-to-Peer Networking & Applications, 2013, v. 6, n. 1, p. 86, doi. 10.1007/s12083-012-0141-y
- By:
- Publication type:
- Article
Downloading trace study for BitTorrent P2P performance measurement and analysis.
- Published in:
- Peer-to-Peer Networking & Applications, 2012, v. 5, n. 4, p. 384, doi. 10.1007/s12083-012-0146-6
- By:
- Publication type:
- Article
Modeling resource constrained BitTorrent proxies for energy efficient mobile content sharing.
- Published in:
- Peer-to-Peer Networking & Applications, 2012, v. 5, n. 2, p. 163, doi. 10.1007/s12083-011-0107-5
- By:
- Publication type:
- Article
Investigation on software‐defined networks' reactive routing against BitTorrent.
- Published in:
- IET Networks (Wiley-Blackwell), 2015, v. 4, n. 5, p. 249, doi. 10.1049/iet-net.2014.0105
- By:
- Publication type:
- Article
Exploring the robustness of BitTorrent peer-to-peer content distribution systems.
- Published in:
- Concurrency & Computation: Practice & Experience, 2008, v. 20, n. 2, p. 179, doi. 10.1002/cpe.1187
- By:
- Publication type:
- Article
SECURE KEY ISSUING SCHEME IN BIT-TORRENT NETWORK.
- Published in:
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 2, p. 19, doi. 10.26483/ijarcs.v9i2.5534
- By:
- Publication type:
- Article
The Effect of Subscription Video-on-Demand on Piracy: Evidence from a Household-Level Randomized Experiment.
- Published in:
- Management Science, 2018, v. 64, n. 12, p. 5610, doi. 10.1287/mnsc.2017.2875
- By:
- Publication type:
- Article
Performance analysis of a locality-aware BitTorrent protocol in enterprise networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2019, v. 12, n. 4, p. 751, doi. 10.1007/s12083-018-0674-9
- By:
- Publication type:
- Article
O-Torrent: A fair, robust, and free riding resistant P2P content distribution mechanism.
- Published in:
- Peer-to-Peer Networking & Applications, 2018, v. 11, n. 3, p. 579, doi. 10.1007/s12083-017-0563-7
- By:
- Publication type:
- Article
A new worm propagation threat in BitTorrent: modeling and analysis.
- Published in:
- Telecommunication Systems, 2010, v. 45, n. 2/3, p. 95, doi. 10.1007/s11235-009-9241-2
- By:
- Publication type:
- Article
On the collaboration of different peer-to-peer traffic management schemas.
- Published in:
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 4, p. 459, doi. 10.1007/s12083-012-0168-0
- By:
- Publication type:
- Article
File size models for shared content over the BitTorrent Peer-to-Peer network.
- Published in:
- Peer-to-Peer Networking & Applications, 2012, v. 5, n. 3, p. 279, doi. 10.1007/s12083-011-0122-6
- By:
- Publication type:
- Article