×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [p2p applications]
MP2P –IP Multicast and P2P Technology Huo Yusong
218 views
Research Activities PlanetLab/GENI Aki Nakao Univ. of Tokyo / NICT 1AsianFI 2008 Summer School
214 views
IETF 80 th Problem Statement for Operational IPv6/IPv4 Co-existence 3/31/2011 Chongfeng Xie (
[email protected]
) Qiong Sun (
[email protected]
)
212 views
Next Generation FWs Against Modern Malware and Threads Hakan Unsal – Technical Security Consultant Tunc Cokkeser – Regional Sales Manager
213 views
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
218 views
COMPLYING WITH PRIVACY AND SECURITY REGULATIONS Overview MHC Privacy and Security Committee Revised 1/17/11
212 views
Www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat ManagementCyberoam
215 views
Distributed Hash Tables David Tam Patrick Pang Presentation Outline What is DHT (Distributed Hash Table)? Why DHTs? Applications How lookup works? Alternatives
220 views
Optimal Capacity Sharing of Networks with Multiple Overlays Zheng Ma, Jiang Chen, Yang Richard Yang and Arvind Krishnamurthy Yale University University
212 views
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture peer-to-peer is a network architecture where computer resources and services
222 views
annual r eport
628 views
slides
179 views
< Prev
Next >