下载  >  网络技术  >  网络基础  > Peer-to-Peer Computing

Peer-to-Peer Computing 评分:

Peer to peer 网络的方方面面,从概念到安全,E文的。

...展开详情
2007-08-18 上传 大小:6.47MB
举报 收藏
分享
PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake

论文:PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake 论文结构: Introduction Coin Age Proof-of-Stake Minting based on Proof-of-Stake Main Chain Protocol Checkpoint: Protection of History Block Signatures and Duplicate Stake Protocol Energy Efficiency Other Considerations Conclusion

立即下载
A Survey of Peer-to-Peer File Sharing Technologies

A Survey of Peer-to-Peer File Sharing Technologies --Written by Stephanos Androutsellis-Theotokis

立即下载
real-time-communication-with-webrtc-peer-to-peer-in-the-browser

webrtc入门经典书籍,《real-time-communication-with-webrtc-peer-to-peer-in-the-browser》

立即下载
Measurements and Mitigation of Peer-to-Peer-based Botnets - A Case Study on Storm Worm

Botnets, i.e., networks of compromised machines under a common control infrastructure, are commonly controlled by an attacker with the help of a central server: all compromised machines connect to the central server and wait for commands. However, the first botnets that use peer-to-peer (P2P) netw

立即下载
Peer-to-Peer Simulators

Peer-to-Peer SimulatorsPeer-to-Peer SimulatorsPeer-to-Peer SimulatorsPeer-to-Peer Simulators

立即下载
P2P - Peer-to-Peer Computing

P2P - Peer-to-Peer Computing

立即下载
Modeling Peer-to-Peer Botnets

Peer-to-peer botnets are a relatively new yet rapidly growing Internet threat. In the year since its introduction in January 2007, the Storm Worm peer-to-peer botnet has become the largest botnet on the Internet. Unlike previous botnets operating over IRC channels, the Storm Worm botnet uses a decen

立即下载
Peer-to-Peer.Computing

Peer-to-Peer.Computing.Applications,.Architecture,.Protocols,.and.Challenges,.Yu-Kwong.Ricky.Kwok,.CRC,.2012

立即下载
Resilient Peer-to-Peer Streaming

Resilient Peer-to-Peer Streaming.

立即下载
p2p,网络,peer-to-peer

p2p,网络,peer-to-peer,p2p,网络,peer-to-peer

立即下载
Peer-to-Peer Video Streaming

介绍Peer-to-Peer Video Streaming的很好的书籍,2007年由Eric Setton撰写

立即下载
Peer-to-Peer Computing

Peer to peer 网络的方方面面,从概念到安全,E文的。

立即下载
Peer-to-Peer Systems and Applications

Peer-to-Peer Systems and Applications LNCS 3485, 658 pages, ISBN 3-540-29192-X, Springer, Sept. 2005

立即下载
A Survey of Peer-to-Peer Network Simulators

A Survey of Peer-to-Peer Network SimulatorsA Survey of Peer-to-Peer Network Simulators

立即下载
A LIGHTWEIGHT FRAMEWORK FOR PEER-TO-PEER programming

A LIGHTWEIGHT FRAMEWORK FOR PEER-TO-PEER programming.pdf A LIGHTWEIGHT FRAMEWORK FOR PEER-TO-PEER programming.pdf

立即下载
Peer-to-Peer File Sharing Gnutella Style

Peer-to-Peer File Sharing Gnutella Style

立即下载
Detecting peer-to-peer botnets

Spam, DDoS and phishing are common problems on the Internet nowadays. In the past, attackers tended to use centralized high bandwidth connections to accomplish their tasks. Now that home users have high bandwidth internet connections, attackers have started infecting and using these home computers i

立即下载
Handbook of Peer-to-Peer Networking

This book is written for researchers, professionals, and computer science and engineering students at the advanced undergraduate level and higher who are familiar with networking and network protocol concepts and basic ideas about algorithms. For the more advanced parts of the book, the reader shoul

立即下载
TFCalc镀膜软件

TFCalc光学镀膜软件,免安装版,即下即用,方便快捷。。

立即下载
西电研究生数值分析课件以及答案

西电研究生数值分析课程课件以及习题答案,非常齐全!

立即下载