<--- Back to Details
First PageDocument Content
BitTorrent / File sharing networks / Information theory / Error detection and correction / Tit for tat / Seeding / Linear network coding / EigenTrust / Leech / Peer-to-peer / Matrix / Hash list
Date: 2015-05-18 12:15:55
BitTorrent
File sharing networks
Information theory
Error detection and correction
Tit for tat
Seeding
Linear network coding
EigenTrust
Leech
Peer-to-peer
Matrix
Hash list

Rescuing Tit-for-Tat with Source Coding Thomas Locher, Stefan Schmid, Roger Wattenhofer {lochert, schmiste, wattenhofer}@tik.ee.ethz.ch Computer Engineering and Networks Laboratory (TIK), ETH Zurich, 8092 Zurich, Switzer

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Download Document from Source Website

File Size: 206,01 KB

Share Document on Facebook

Similar Documents

How to Calculate P(O) Calculating P(O) Forward Algorithm Backward Algorithm

How to Calculate P(O) Calculating P(O) Forward Algorithm Backward Algorithm

DocID: 1rsaS - View Document

Daniels_meeting_cover.eps

Daniels_meeting_cover.eps

DocID: 1rphC - View Document

1  Underdesigned and Opportunistic Computing in Presence of Hardware Variability Puneet Gupta1 , Member, IEEE, Yuvraj Agarwal2 , Member, IEEE, Lara Dolecek1 , Member, IEEE, Nikil Dutt6 , Fellow, IEEE, Rajesh K. Gupta2 ,

1 Underdesigned and Opportunistic Computing in Presence of Hardware Variability Puneet Gupta1 , Member, IEEE, Yuvraj Agarwal2 , Member, IEEE, Lara Dolecek1 , Member, IEEE, Nikil Dutt6 , Fellow, IEEE, Rajesh K. Gupta2 ,

DocID: 1roDZ - View Document

PROBABILISTIC ALGORITHM FOR LIST VITERBI DECODING by Janani Kalyanam

PROBABILISTIC ALGORITHM FOR LIST VITERBI DECODING by Janani Kalyanam

DocID: 1rlYO - View Document