<--- Back to Details
First PageDocument Content
Virtual communities / Internet / Internet Relay Chat bot / IRCd / Netsplit / Force-based algorithms / Freenode / Internet Relay Chat services / IRC-Galleria / Internet Relay Chat / Computing / Graph drawing
Date: 2004-06-17 09:40:57
Virtual communities
Internet
Internet Relay Chat bot
IRCd
Netsplit
Force-based algorithms
Freenode
Internet Relay Chat services
IRC-Galleria
Internet Relay Chat
Computing
Graph drawing

Add to Reading List

Source URL: www.cs.kent.ac.uk

Download Document from Source Website

File Size: 451,03 KB

Share Document on Facebook

Similar Documents

Internet privacy / Computing / Privacy / Internet Relay Chat / Software / Digital media / Privacy concerns with social networking services / Recommender system

C:/Users/Bin Zan/Documents/frinedlocator/conference2/friendlocator.dvi

DocID: 1r1sy - View Document

Computing / Remote desktop / Software / System software / Application server / Server / X Window System / Citrix Systems / Internet Relay Chat / Remote Desktop Services / Remote Desktop Protocol

USING THE COMMON CRITERIA IN PRACTICE Mike Nash Gamma Secure Systems Limited Camberley, UK

DocID: 1pXrM - View Document

Denial-of-service attacks / Cyberwarfare / Domain name system / Computing / Internet / Radio-frequency identification / Verisign / Internet Relay Chat / Denial-of-service attack / Software / Eve Online / .net

Online games developer CCP Games uses Verisign DDoS Protection Services to keep its award-winning products up and running. Leading online multiplayer game developer uses Verisign solution to combat DDoS attacks. An awar

DocID: 1pSEf - View Document

Content-control software / Virtual communities / Internet privacy / Social networking services / Internet censorship circumvention / Internet security / Facebook / Reddit / Internet censorship / Internet Relay Chat

rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation Qiyan Wang Department of Computer Science University of Illinois at Urbana-Champaign

DocID: 1jQMK - View Document

Software / File sharing networks / Geolocation / Peer-to-peer / Location-based service / Client–server model / Tor / Internet Relay Chat / Cloaking / Computing / Internet privacy / Internet

Cloaking Locations for Anonymous Location Based Services: A Hybrid Approach Chengyang Zhang and Yan Huang Computer Science and Engineering Department University of North Texas

DocID: 1fCg7 - View Document