نتایج جستجو برای: bittorrent

تعداد نتایج: 914  

Journal: :IEEE Transactions on Parallel and Distributed Systems 2011

Journal: :Journal of the Korea Institute of Information Security and Cryptology 2013

Journal: :International Journal of Advanced Computer Science and Applications 2015

Journal: :CoRR 2011
Seth James Nielson Dan S. Wallach

The very nature of operations in peer-to-peer systems such as BitTorrent exposes information about participants to their peers. Nodes desiring anonymity, therefore, often chose to route their peer-to-peer traffic through anonymity relays, such as Tor. Unfortunately, these relays have little incentive for contribution and struggle to scale with the high loads that P2P traffic foists upon them. W...

2008
Prithula Dhungel Di Wu Xiaojun Hei Brad Schonhorst Keith W. Ross

Anti-P2P companies have begun to launch Internet attacks against BitTorrent swarms. We use passive and active Internet measurements to study how successful these attacks are at curtailing the distribution of targeted content. For our active measurements, we develop a crawler that contacts all the peers in any given torrent, determines whether leechers in the torrent are under attack, and identi...

2009
Bernhard Ager Fabian Schneider Anja Feldmann

The application considered responsible for most of the Internet traffic volume is file-sharing. Among the popular file-sharing applications are P2P-based ones, using e. g., the BitTorrent protocol, Web based offers by direct download services (DDS), e. g., rapidshare.com, and NNTP based services, e. g., giganews.com. To cope with the ever growing bandwidth demands ISPs are exploring various opt...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید