Peer-to-Peer Protocol

Results: 361



#Item
241Knowledge / Science / Peer review / Professional certification / Hotshot / Certification / Academia / Standards / Wildland fire suppression / Interagency hotshot crew

OPERATIONS COMMITTEE IHC PROTOCOL The intent of the Operations Committee is to allow for an exchange of ideas and offer recommendations for operational issues with the Rocky Mountain Area IHCs as indicated in our charter

Add to Reading List

Source URL: gacc.nifc.gov

Language: English - Date: 2014-06-20 16:19:24
242United Nations Framework Convention on Climate Change / Global warming / Academic literature / Peer review / Scientific method / Adaptation to global warming / Post–Kyoto Protocol negotiations on greenhouse gas emissions / Social vulnerability / Global warming controversy / Climate change / Environment / Climate change policy

editorial Blind faith Many believe that double-blind peer review reduces referee bias, real or perceived. Beginning this month, this journal (along with our sister journal Nature Geoscience)

Add to Reading List

Source URL: www.nature.com

Language: English - Date: 2013-05-29 05:38:30
243File sharing networks / Internet / Computer network security / Internet protocols / Traffic classification / Peer-to-peer / Deep packet inspection / Port / Simple Mail Transfer Protocol / Computing / Network architecture / Network performance

total_bytes_per_ip_marnet_nosample_per.eps

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-01-01 13:05:39
244Information / LOBSTER / Computer network security / Deep packet inspection / Traffic classification / Peer-to-peer / Computer network / Communications protocol / Computer networking / Computing / Data

When AppMon met Stager Nikos Nikiforakis, Demetres Antoniades, Evangelos P. Markatos, Sotiris Ioannidis Institute of Computer Science Foundation for Research & Technology – Hellas {nikifor,danton,markatos,sotiris}@ics.

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-01-01 13:06:14
245Computing / Bitcoin / Peer-to-peer computing / Cryptographic hash functions / Error detection and correction / Proof-of-work system / Cryptographic nonce / Stakeholder / Transmission Control Protocol / Cryptography / Software / Hashing

Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake Iddo Bentov∗ Charles Lee Alex Mizrahi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-06-11 22:53:58
246Computing / Algorithm / Mathematical logic / Peer-to-peer / Routing / Randomized algorithm / Graph theory / Wireless sensor network / Gossip protocol / Theoretical computer science / Applied mathematics / Mathematics

R Foundations and Trends in Networking Vol. 3, No[removed]–125 c 2009 D. Shah

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2009-05-23 09:37:04
247Distributed hash table / Chord / Computer architecture / Peer-to-peer / Gossip protocol / Gnutella / Flooding / Kademlia / Distributed data storage / File sharing networks / Computing

Gossip-based Search Selection in Hybrid Peer-to-Peer Networks M. Zaharia and S. Keshav School of Computer Science, University of Waterloo, Waterloo, ON, Canada [removed], [removed] SUMMARY We present GAB,

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-12-31 23:51:28
248Computing / Client–server model / Peer-to-peer / Trusted Computing / Communications protocol / Secure two-party computation / Secure multi-party computation / Cryptographic protocols / Data / Information

Exploring Privacy in Location-based Services Using Cryptographic Protocols

Add to Reading List

Source URL: nsl.cse.unt.edu

Language: English - Date: 2012-01-10 15:06:54
249Technology / Email / Internet culture / Cross-platform software / Extensible Messaging and Presence Protocol / Instant messaging / Internet / Text messaging / Peer-to-peer / Computing / Computer-mediated communication / Online chat

DOC Document

Add to Reading List

Source URL: nouncer.com

Language: English - Date: 2014-08-16 15:40:22
250Computer network / Telecommunications engineering / Communications protocol / Peer-to-peer / Denial-of-service attack / Internet / Data / Information / Computing

Enabling an Energy-Efficient Future Internet Through Selectively Connected End Systems † Mark Allman† , Ken Christensen‡ , Bruce Nordman¶ , Vern Paxson†,¶ International Computer Science Institute, ‡ Universit

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2007-10-29 08:55:04
UPDATE