11![Secure Latency Estimation with Treeple Eric Chan-Tin and Nicholas Hopper University of Minnesota Minneapolis, MN USA {dchantin, hopper}@cs.umn.edu Secure Latency Estimation with Treeple Eric Chan-Tin and Nicholas Hopper University of Minnesota Minneapolis, MN USA {dchantin, hopper}@cs.umn.edu](https://www.pdfsearch.io/img/f04a7b1fef36ebb4f37dd71cf4a0177e.jpg) | Add to Reading ListSource URL: www.cs.okstate.eduLanguage: English - Date: 2011-08-15 19:32:41
|
---|
12![Towards a More Functional and Secure Network Infrastructure Daniel Adkins Karthik Lakshminarayanan Adrian Perrig Ion Stoica UC Berkeley UC Berkeley CMU Towards a More Functional and Secure Network Infrastructure Daniel Adkins Karthik Lakshminarayanan Adrian Perrig Ion Stoica UC Berkeley UC Berkeley CMU](https://www.pdfsearch.io/img/732677ed9ba866bb053a14dca4a43a4d.jpg) | Add to Reading ListSource URL: sahara.cs.berkeley.eduLanguage: English - Date: 2003-06-05 12:41:23
|
---|
13![Z:WNMMSpaper
iguresarabasi20K_regression_line.eps Z:WNMMSpaper
iguresarabasi20K_regression_line.eps](https://www.pdfsearch.io/img/fd2fafe2a31cea1318dc77a5f7129cbe.jpg) | Add to Reading ListSource URL: sahara.cs.berkeley.eduLanguage: English - Date: 2004-06-01 13:43:33
|
---|
14![Noname manuscript No. (will be inserted by the editor) A Survey on Peer-to-Peer Video Streaming Systems Yong Liu · Yang Guo · Chao Liang Noname manuscript No. (will be inserted by the editor) A Survey on Peer-to-Peer Video Streaming Systems Yong Liu · Yang Guo · Chao Liang](https://www.pdfsearch.io/img/a77daa09ffe7d9d182045a6ee1bc2b70.jpg) | Add to Reading ListSource URL: eeweb.poly.eduLanguage: English - Date: 2008-08-01 14:50:16
|
---|
15![SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high](https://www.pdfsearch.io/img/ce53eff882714135fd68431c419fc43d.jpg) | Add to Reading ListSource URL: randombits.ioLanguage: English - Date: 2015-06-29 10:17:00
|
---|
16![SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high](https://www.pdfsearch.io/img/e697586249fad1d25429ef196b184adc.jpg) | Add to Reading ListSource URL: www.cs.okstate.eduLanguage: English - Date: 2011-08-15 19:32:40
|
---|
17![Overlay Network Measurements with Distribution Evolution and Geographical Visualization Andri Lareida, Sebastian Schrepfer, Thomas Bocek, Burkhard Stiller Communication Systems Group CSG@IfI, University of Zurich Binzmü Overlay Network Measurements with Distribution Evolution and Geographical Visualization Andri Lareida, Sebastian Schrepfer, Thomas Bocek, Burkhard Stiller Communication Systems Group CSG@IfI, University of Zurich Binzmü](https://www.pdfsearch.io/img/ff6dba7c52aca78f2b66bd9072360b5f.jpg) | Add to Reading ListSource URL: files.ifi.uzh.chLanguage: English - Date: 2016-01-18 03:29:54
|
---|
18![European Network of Excellence on the Management of Internet Technologies and Complex Services NEWSLETTER #6 February 29th, 2008 European Network of Excellence on the Management of Internet Technologies and Complex Services NEWSLETTER #6 February 29th, 2008](https://www.pdfsearch.io/img/91180ccd10e8d71ab00a1789723068e3.jpg) | Add to Reading ListSource URL: emanics.orgLanguage: English - Date: 2008-03-05 04:24:37
|
---|
19![File: Title: Authors: Date: File: Title: Authors: Date:](https://www.pdfsearch.io/img/060b9e21fd8cd08a10f0ea42be632fc2.jpg) | Add to Reading ListSource URL: member.wide.ad.jpLanguage: English - Date: 2005-01-30 17:39:30
|
---|