Sciweavers

55 search results - page 1 / 11
» Features Based Approach to Identify the P2P File Sharing
Sort
View
CISSE
2008
Springer
14 years 20 days ago
Features Based Approach to Identify the P2P File Sharing
With the improvement of computer network and the growth of bandwidth, the types of Internet traffic have been changed. The P2P file sharing application became the significant sour...
Jian-Bo Chen
VLDB
2004
ACM
173views Database» more  VLDB 2004»
14 years 4 months ago
Enhancing P2P File-Sharing with an Internet-Scale Query Processor
In this paper, we address the problem of designing a scalable, accurate query processor for peerto-peer filesharing and similar distributed keyword search systems. Using a global...
Boon Thau Loo, Joseph M. Hellerstein, Ryan Huebsch...
KDD
2008
ACM
146views Data Mining» more  KDD 2008»
14 years 11 months ago
Spotting out emerging artists using geo-aware analysis of P2P query strings
Record label companies would like to identify potential artists as early as possible in their careers, before other companies approach the artists with competing contracts. The va...
Noam Koenigstein, Yuval Shavitt, Tomer Tankel
USS
2008
14 years 1 months ago
Challenges and Directions for Monitoring P2P File Sharing Networks - or - Why My Printer Received a DMCA Takedown Notice
We reverse engineer copyright enforcement in the popular BitTorrent file sharing network and find that a common approach for identifying infringing users is not conclusive. We desc...
Michael Piatek, Tadayoshi Kohno, Arvind Krishnamur...
ICDCS
2010
IEEE
14 years 2 months ago
Are Your Hosts Trading or Plotting? Telling P2P File-Sharing and Bots Apart
—Peer-to-peer (P2P) substrates are now widely used for both file-sharing and botnet command-andcontrol. Despite the commonality of their substrates, we show that the different g...
Ting-Fang Yen, Michael K. Reiter