نتایج جستجو برای: file sharing

تعداد نتایج: 140500  

2004
Matei A. Zaharia Srinivasan Keshav

such as file-sharing applications. We analyze the characteristics of this system theoretically, and also present an efficient simulator and simulation results.

Journal: :Social Science Research Network 2021

Illegal downloading of copyright materials by end-users had its heyday in the early 2000s, with music, television, and film studios desperately searching for a way to curb tide sharing. This chapter uses example Capitol Records v Jammie Thomas-Rasset, first file-sharing case be tried before civil jury United States, demonstrate disproportionate penalties associated P2P file-sharing. The matter ...

1998
Lorenzo Alvisi Sriram Rao Harrick M. Vin

In this paper, we quantify the adverse effect of file sharing on the performance of reliable distributed applications. We demonstrate that file sharing incurs significant overhead, which is likely to triple over the next five years. We present a novel approach that eliminates this overhead. Our approach (1) tracks causal dependencies resulting from file sharing using determinants, (2) efficient...

2004
Thomas E. Portegys

Spores is a push and pull peer-to-peer method of file sharing and storage, making use of publicly available space on the network. A user stores a file by pushing it to a set of peers. The file then becomes visible and available to peers that search for it. Spores allows the exchange of folders as well as individual files. To ensure a file operation references a specific file or folder by conten...

2004
Hairong Jin Shanping Li Gang Peng Tianchi Ma

Hint-based Locating & Routing Mechanism (HBLR) derives from the locating & routing mechanism in Freenet. HBLR uses file location hint to enhance the performance of file searching and downloading. In comparison with its ancestor, HBLR saves storage space and reduces file request latency. However, because of the inherent fallibility of hint, employing location hint naively for file locating in P2...

2004
J. A. Pouwelse P. Garbacki D.H.J. Epema H. J. Sips

P2P systems for sharing content have become very popular over the last few years. However, despite the increasing attention of both the research community and large numbers of users, the actual behavior of these systems over prolonged periods of time is still poorly understood. This paper presents a detailed measurement study over a period of eight months of BitTorrent/Suprnova, a P2P file-shar...

2009
Heikki Kokkinen Janne Nöyränen

This paper presents how to detect MP3 files that have been downloaded from peer-to-peer networks to a user hard disk. The technology can be used for forensics of copyright infringements related to peer-to-peer file sharing, and for copyright payment services. We selected 23 indicators, which show peer-to-peer history for a MP3 file. We developed software to record the indicator values. A group ...

2012
Mayank Raj Krishna Kant Sajal K. Das

Peer to peer (P2P) file sharing applications have gained considerable popularity and are quite bandwidth and energy intensive. With the increased usage of P2P applications on mobile devices, its battery life has become of significant concern. In this paper, we propose a novel mechanism for energy adaptation in P2P file sharing protocols to significantly enhance the possibility of a client compl...

2003
Konstantinos G. Zerfiridis Helen D. Karatza

The widespread use of broadband networks and the evolution of Peer-to-Peer systems changed dramatically the way Internet is used today. P2P file sharing networks are one of the most popular ways of sharing and distributing new content. But along with the benefits of these networks, certain patterns became apparent. It could take a long period of time for new, highly anticipated files to become ...

2005
Christopher Walton

In this paper we present a technique which enables agents to participate in peer-to-peer (P2P) systems, such as file-sharing networks. Our technique is founded on the definition of lightweight protocols which specify the interactions required by the agent for a specific P2P network. The protocols that we define are executable specifications and can be directly implemented and independently veri...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید