Overlay network

Results: 286



#Item
11Secure Latency Estimation with Treeple Eric Chan-Tin and Nicholas Hopper University of Minnesota Minneapolis, MN USA {dchantin, hopper}@cs.umn.edu

Secure Latency Estimation with Treeple Eric Chan-Tin and Nicholas Hopper University of Minnesota Minneapolis, MN USA {dchantin, hopper}@cs.umn.edu

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:41
12Towards a More Functional and Secure Network Infrastructure  Daniel Adkins Karthik Lakshminarayanan Adrian Perrig Ion Stoica UC Berkeley UC Berkeley CMU

Towards a More Functional and Secure Network Infrastructure Daniel Adkins Karthik Lakshminarayanan Adrian Perrig Ion Stoica UC Berkeley UC Berkeley CMU

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2003-06-05 12:41:23
13Z:WNMMSpaperiguresarabasi20K_regression_line.eps

Z:WNMMSpaper iguresarabasi20K_regression_line.eps

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-06-01 13:43:33
14Noname manuscript No. (will be inserted by the editor) A Survey on Peer-to-Peer Video Streaming Systems Yong Liu · Yang Guo · Chao Liang

Noname manuscript No. (will be inserted by the editor) A Survey on Peer-to-Peer Video Streaming Systems Yong Liu · Yang Guo · Chao Liang

Add to Reading List

Source URL: eeweb.poly.edu

Language: English - Date: 2008-08-01 14:50:16
15SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172  Attacking the Kad network---real world evaluation and high

SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high

Add to Reading List

Source URL: randombits.io

Language: English - Date: 2015-06-29 10:17:00
16SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172  Attacking the Kad network---real world evaluation and high

SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:40
17Overlay Network Measurements with Distribution Evolution and Geographical Visualization Andri Lareida, Sebastian Schrepfer, Thomas Bocek, Burkhard Stiller Communication Systems Group CSG@IfI, University of Zurich Binzmü

Overlay Network Measurements with Distribution Evolution and Geographical Visualization Andri Lareida, Sebastian Schrepfer, Thomas Bocek, Burkhard Stiller Communication Systems Group CSG@IfI, University of Zurich Binzmü

Add to Reading List

Source URL: files.ifi.uzh.ch

Language: English - Date: 2016-01-18 03:29:54
18European Network of Excellence on the Management of Internet Technologies and Complex Services NEWSLETTER #6 February 29th, 2008

European Network of Excellence on the Management of Internet Technologies and Complex Services NEWSLETTER #6 February 29th, 2008

Add to Reading List

Source URL: emanics.org

Language: English - Date: 2008-03-05 04:24:37
19File: Title: Authors: Date:

File: Title: Authors: Date:

Add to Reading List

Source URL: member.wide.ad.jp

Language: English - Date: 2005-01-30 17:39:30