First Page | Document Content | |
---|---|---|
Date: 2011-08-15 19:32:41Computing Internet Network architecture File sharing Computer networking Distributed computing architecture Overlay network Routing Round-trip delay time Peer-to-peer Sybil attack Tor | Secure Latency Estimation with Treeple Eric Chan-Tin and Nicholas Hopper University of Minnesota Minneapolis, MN USA {dchantin, hopper}@cs.umn.eduAdd to Reading ListSource URL: www.cs.okstate.eduDownload Document from Source WebsiteFile Size: 109,20 KBShare Document on Facebook |