First Page | Document Content | |
---|---|---|
Date: 2015-05-18 12:15:55BitTorrent File sharing networks Information theory Error detection and correction Tit for tat Seeding Linear network coding EigenTrust Leech Peer-to-peer Matrix Hash list | Rescuing Tit-for-Tat with Source Coding Thomas Locher, Stefan Schmid, Roger Wattenhofer {lochert, schmiste, wattenhofer}@tik.ee.ethz.ch Computer Engineering and Networks Laboratory (TIK), ETH Zurich, 8092 Zurich, SwitzerAdd to Reading ListSource URL: www.tik.ee.ethz.chDownload Document from Source WebsiteFile Size: 206,01 KBShare Document on Facebook |
How to Calculate P(O) Calculating P(O) Forward Algorithm Backward AlgorithmDocID: 1rsaS - View Document | |
Daniels_meeting_cover.epsDocID: 1rphC - View Document | |
1 Underdesigned and Opportunistic Computing in Presence of Hardware Variability Puneet Gupta1 , Member, IEEE, Yuvraj Agarwal2 , Member, IEEE, Lara Dolecek1 , Member, IEEE, Nikil Dutt6 , Fellow, IEEE, Rajesh K. Gupta2 ,DocID: 1roDZ - View Document | |
PROBABILISTIC ALGORITHM FOR LIST VITERBI DECODING by Janani KalyanamDocID: 1rlYO - View Document |