Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,432,831 papers from all fields of science
Search
Sign In
Create Free Account
File sharing
Known as:
Music swapping
, File sharing protocol
, Filesharing
Expand
File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Cloud computing
Computer data storage
Denial-of-service attack
Digital media
Expand
Broader (1)
Instant messaging
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
Analysis of PPLive through active and passive measurements
S. Spoto
,
R. Gaeta
,
Marco Grangetto
,
M. Sereno
IEEE International Symposium on Parallel…
2009
Corpus ID: 8227921
The P2P-IPTV is an emerging class of Internet applications that is becoming very popular. The growing popularity of these rather…
Expand
2007
2007
HiNRG Technical Report: 01-10-2007 Measuring the Storm Worm Network
S. Sarat
,
A. Terzis
2007
Corpus ID: 17889337
The Storm worm is a botnet which appeared in the early months of 2007. Its prolific growth, the use of decentralized command and…
Expand
Highly Cited
2006
Highly Cited
2006
Malware prevalence in the KaZaA file-sharing network
Seungwon Shin
,
Jaeyeon Jung
,
H. Balakrishnan
ACM/SIGCOMM Internet Measurement Conference
2006
Corpus ID: 2976102
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation…
Expand
2006
2006
Stochastic Analysis and File Availability Enhancement for BT-like File Sharing Systems
Bin Fan
,
D. Chiu
,
John C.S. Lui
200614th IEEE International Workshop on Quality…
2006
Corpus ID: 6893752
In this paper, we present the mathematical analysis of two important performance measures for a BitTorrent (BT) like P2P file…
Expand
2006
2006
Analysing Countermeasures Against Privacy-Invasive Software
Martin Boldt
,
B. Carlsson
International Conference on Software Engineering…
2006
Corpus ID: 17130690
User privacy is widely affected by the occurrence of privacy-invasive software (PIS) on the Internet. Various forms of…
Expand
Highly Cited
2005
Highly Cited
2005
Pirates or Explorers? Analysis of Music Consumption in French Graduate Schools
D. Bounie
,
M. Bourreau
,
P. Waelbroeck
2005
Corpus ID: 15425946
A release device is actuated to release a workpiece by operation of either of two elongated shape memory metal alloy (SMMA…
Expand
2004
2004
Flow-based Characteristic Analysis of Internet Application Traffic
Myung-Sup Kim
,
Young J. Won
,
Hyungkoo Lee
,
J. W. Hong
,
R. Boutaba
2004
Corpus ID: 33539704
The necessity of IP traffic analysis is growing dramatically in many areas. With increasing network demands from individual users…
Expand
2004
2004
The Honeywall CD-ROM
George Chamales
IEEE Security and Privacy
2004
Corpus ID: 17057548
The Honeynet Project is a non-profit research organization of security professionals dedicated to information security on the…
Expand
Review
2003
Review
2003
Bayesian Network-Based Trust Model in Peer-to-Peer Networks
Yao Wang
,
Julita Vassileva
2003
Corpus ID: 6043009
In this paper, we first review trust and reputation mechanisms from different perspectives. Then we propose a Bayesian network…
Expand
2001
2001
A Performance Model for Peer to Peer File Sharing Services
K. Kant
,
R. Iyer
2001
Corpus ID: 17054670
In this paper we introduce a random-graph based model for studying the evolution of ad hoc peer-to-peer (P2P) communities such as…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required