Limpar
46 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Capítulo de livro Acesso aberto Revisado por pares

Kurt Tutschku,

... traffic sources in the Internet. In particular, the eDonkey file sharing system and its derivatives are causing ... of traffic volume in today’s networks. The eDonkey system is typically used for exchanging very large ... provide a measurement based traffic profile of the eDonkey service. Furthermore, we discuss how this type of ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2004 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto Revisado por pares

Raphaël Fournier, Thibault Cholez, Matthieu Latapy, Isabelle Chrisment, Clémence Magnien, Olivier Festor, Ivan Daniloff,

... We design a methodology for comparing KAD and eDonkey, two P2P systems among the most prominent ones and with different anonymity levels. We monitor two eDonkey servers and the KAD network during several days ... significantly fewer pedophile queries in KAD than in eDonkey (approximately 0.09% vs. 0.25%).

Tópico(s): Spam and Phishing Detection

2014 - Multidisciplinary Digital Publishing Institute | Social Sciences

Capítulo de livro Revisado por pares

Oliver Heckmann, Nicolas Liebau, Vasilios Darlagiannis, Axel Bock, Andreas Mauthe, Ralf Steinmetz,

... used as an alternative for content distribution. The eDonkey file-sharing network is one of the most ... to-peer file-sharing networks, especially in Germany. eDonkey forms a hybrid network that capitalizes both on ... its architecture. In this paper, we describe the eDonkey protocol, the constructed overlay network, the critical operations ... the client software and with an open-source eDonkey server we extended explicitly for these measurements. Our study shows that eDonkey is particularly well suited for content distribution and ...

Tópico(s): Multimedia Communication and Technology

2005 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto Revisado por pares

Fan Pan, Lifa Wu, Hong Zheng, Huabo Li, Haiguang Lai, Chen-Hui Zheng,

... evaluated it over real-world implementations of DNS, eDonkey, FTP, HTTP and McAfee ePO protocols.Experimental results ...

Tópico(s): Network Security and Intrusion Detection

2013 - Korea Society of Internet Information | KSII Transactions on Internet and Information Systems

Artigo Acesso aberto Revisado por pares

Matthieu Latapy, Clémence Magnien, Raphaël Fournier,

... We consider here a widely used P2P system, eDonkey, and focus on two key statistics: the fraction ...

Tópico(s): Spam and Phishing Detection

2012 - Elsevier BV | Information Processing & Management

Artigo Revisado por pares

Stevens Le Blond, Fabrice Le Fessant, Erwan Le Merrer,

... file storage , over a new trace of the eDonkey network, the largest one with availability information. We ...

Tópico(s): Distributed and Parallel Computing Systems

2012 - Association for Computing Machinery | ACM Transactions on Autonomous and Adaptive Systems

Capítulo de livro Acesso aberto Revisado por pares

Prithula Dhungel, Keith W. Ross, Moritz Steiner, Ye Tian, Xiaojun Hei,

... such as megaupload and hotfile), the BitTorrent and eDonkey file-sharing systems, as well as with other ...

Tópico(s): Digital Rights Management and Security

2012 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

Yunzhao Li, Don Gruenbacher, Caterina Scoglio,

Tópico(s): Blockchain Technology Applications and Security

2011 - Springer Nature | Peer-to-Peer Networking and Applications

Artigo Revisado por pares

Thomas Locher, Stefan Schmid, Roger Wattenhofer,

This article reports on the results of our measurement study of the Kad network. Although several fully decentralized peer-to-peer systems have been proposed in the literature, most existing systems still employ a centralized architecture. The Kad ne

Tópico(s): Internet Traffic Analysis and Secure E-voting

2011 - IOS Press | Fundamenta Informaticae

Capítulo de livro Revisado por pares

Peter Dorfinger, Georg Panholzer, Wolfgang John,

... traces. Encrypted traffic such as Skype, or encrypted eDonkey traffic are detected as encrypted with probability higher ...

Tópico(s): Advanced Malware Detection Techniques

2011 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

Ricardo Lopes Pereira, Teresa Vazão, Rodrigo Rodrigues,

... our proposal with extensive simulation studies, using the eDonkey/eMule protocol on SSFNet. These show a 19 ...

Tópico(s): Network Traffic and Congestion Control

2011 - Elsevier BV | Computer Networks

Artigo Revisado por pares

Lyndon Harris,

... it we must, because the decentralized revolution - from eDonkey to al Qaeda - is having a significant impact ...

2011 - SAGE Publishing | Anglican Theological Review

Capítulo de livro Revisado por pares

Irfan Ul Haq, Sardar Ali, Hassan Aqeel Khan, Syed Ali Khayam,

... with BitTorrent, Vuze, Flashget, μTorrent, Deluge, BitComet, Halite, eDonkey and Kademlia clients) to empirically quantify the impact ...

Tópico(s): Spam and Phishing Detection

2010 - Springer Science+Business Media | Lecture notes in computer science

Capítulo de livro Revisado por pares

Thomas Locher, David Mysicka, Stefan Schmid, Roger Wattenhofer,

... over the next few years as, unlike the eDonkey network, it does not depend on central servers, ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2010 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

Patrick Brown, Sanja Andrić Petrović,

Tópico(s): Peer-to-Peer Network Technologies

2010 - Springer Nature | Annals of Telecommunications

Capítulo de livro Acesso aberto Revisado por pares

Stevens Le Blond, Fabrice Le Fessant, Erwan Le Merrer,

... file storage, over a new trace of the eDonkey network, the largest available with availability information. We ...

Tópico(s): Opportunistic and Delay-Tolerant Networks

2009 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

Prithula Dhungel, Di Wu, Keith W. Ross,

... of P2P file-sharing systems, including Kazaa and eDonkey. More recently, anti-P2P companies have begun to ...

Tópico(s): Caching and Content Delivery

2009 - Elsevier BV | Computer Communications

Capítulo de livro Revisado por pares

Mikko Heikkinen, Antero Kivi, Hannu Verkasalo,

... is visible in GSM/UMTS networks, BitTorrent and eDonkey being the most popular protocols. In the panel ...

Tópico(s): Caching and Content Delivery

2009 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

Moritz Steiner, Taoufik En-Najjary, Ernst W. Biersack,

... DHT based on Kademlia, which is part of eDonkey, a peer-to-peer file sharing system with ...

Tópico(s): Advanced Data Storage Technologies

2009 - Institute of Electrical and Electronics Engineers | IEEE/ACM Transactions on Networking

Artigo Revisado por pares

Xiaosong Lou, Kai Hwang,

... achieved 85-98 percent prevention rate on eMule, eDonkey, Morpheus, etc. The scheme is shown less effective ...

Tópico(s): Digital Rights Management and Security

2009 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Computers

Artigo Acesso aberto Revisado por pares

Peng Wang, James Tyra, Eric Chan‐Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim,

... of the Kademlia DHT protocol, supports the popular eDonkey peer‐to‐peer file sharing network and has ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2009 - Hindawi Publishing Corporation | Security and Communication Networks

Artigo

Moritz Steiner, Taoufik En-Najjary, Ernst W. Biersack,

... file sharing have been Napster, FastTrack, BitTorrent, and eDonkey, each one counting a million or more users ...

Tópico(s): Advanced Data Storage Technologies

2007 - Association for Computing Machinery | ACM SIGCOMM Computer Communication Review

Artigo

Sophie Hautphenne, Kenji Leibnitz, Marie-Ange Remiche,

... source in the Internet. P2P applications, such as eDonkey, Kazaa, or BitTorrent, form overlay networks on the ...

Tópico(s): Advanced Data Storage Technologies

2006 - Association for Computing Machinery | ACM SIGMETRICS Performance Evaluation Review

Artigo

D. Hughes, James Walkerdine, G. Coulson, Steven A. Gibson,

P2P file-sharing networks such as Kazaa, eDonkey, and Limewire boast millions of users. Because of scalability concerns and legal issues, such networks are moving away from the semicentralized approach that ...

Tópico(s): Peer-to-Peer Network Technologies

2006 - IEEE Computer Society | IEEE Distributed Systems Online

Capítulo de livro Revisado por pares

Jens O. Oberender, Frank‐Uwe Andersen, Hermann de Meer, Ivan Dedinski, Tobias Hoßfeld, Cornelia Kappler, Andreas Mäder, Kurt Tutschku,

... performance. The architecture is based on the popular eDonkey protocol and is enhanced by additional caching entities ...

Tópico(s): Advanced Data Storage Technologies

2005 - Springer Science+Business Media | Lecture notes in computer science

Capítulo de livro Acesso aberto Revisado por pares

Stevens Le Blond, Jean‐Loup Guillaume, Matthieu Latapy,

... view of the exchanges processed in a running eDonkey system. We focus on correlation in term of ...

Tópico(s): Complex Network Analysis Techniques

2005 - Springer Science+Business Media | Lecture notes in computer science

Capítulo de livro Acesso aberto Revisado por pares

Jean‐Loup Guillaume, Matthieu Latapy, Stevens Le-Blond,

... running environment using a semi-centralised p2p system (eDonkey). To achieve this, we use a trace of ...

Tópico(s): Caching and Content Delivery

2004 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

Bryn Loban,

... information systems: Napster with its clones OpenNap and eDonkey, and Gnutella and FastTrack (i.e., Kazaa). A ...

Tópico(s): Digital Rights Management and Security

2004 - University of Illinois at Chicago | First Monday

Capítulo de livro Revisado por pares

Rafael A. Rodríguez‐Gómez, Gabriel Macía-Fernández, Pedro García‐Teodoro,

... modeling any network service, we apply it to eDonkey traffic classification as a case study. After successfully ...

Tópico(s): Spam and Phishing Detection

2013 - Springer Science+Business Media | Lecture notes in computer science