Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 217,973,505 papers from all fields of science
Search
Sign In
Create Free Account
Leech (computing)
Known as:
Leeching (computing)
, Bandwidth leeching
, Leech (disambiguation)
Expand
In computing and specifically Internet, a leech is one who benefits, usually deliberately, from others' information or effort but does not offer…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
BitTorrent
Client (computing)
Direct download link
EDonkey network
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Public and private BitTorrent communities: a measurement study
M. Meulpolder
,
L. D'Acunto
,
+4 authors
H. Sips
International Workshop on Peer-to-Peer Systems
2010
Corpus ID: 3199533
BitTorrent communities, both public and private, are immensely popular in the Internet, with tens of millions of users…
Expand
Highly Cited
2007
Highly Cited
2007
Free-riding in BitTorrent Networks with the Large View Exploit
Michael Sirivianos
,
Jong Han Park
,
Rex Chen
,
Xiaowei Yang
International Workshop on Peer-to-Peer Systems
2007
Corpus ID: 14170674
This paper presents an experimental study on the behavior of BitTorrent networks when selfish peers attempt to maintain high…
Expand
Highly Cited
2006
Highly Cited
2006
Analyzing and Improving a BitTorrent Networks Performance Mechanisms
Ashwin R. Bharambe
,
Cormac Herley
,
V. Padmanabhan
Proceedings IEEE INFOCOM . 25TH IEEE…
2006
Corpus ID: 6694042
In recent years, BitTorrent has emerged as a very scalable peer-to-peer file distribution mechanism. While early measurement and…
Expand
Highly Cited
2006
Highly Cited
2006
BiToS: Enhancing BitTorrent for Supporting Streaming Applications
Angelos Vlavianos
,
Marios Iliofotou
,
M. Faloutsos
Proceedings IEEE INFOCOM . 25TH IEEE…
2006
Corpus ID: 672161
BitTorrent (BT) in the last years has been one of the most effective mechanisms for P2P content distribution. Although BT was…
Expand
Highly Cited
2005
Highly Cited
2005
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard
Z. Kfir
,
A. Wool
Security and Privacy in Communication Networks
2005
Corpus ID: 15723591
A contactless smartcard is a smartcard that can communicate with other devices without any physical connection, using Radio…
Expand
Highly Cited
2005
Highly Cited
2005
Analyzing and Improving BitTorrent Performance
Ashwin R. Bharambe
,
Cormac Herley
,
V. Padmanabhan
2005
Corpus ID: 14924785
In recent years, BitTorrent has emerged as a very popular and scalable peer-to-peer file distribution mechanism. It has been…
Expand
Review
2003
Review
2003
Public Opinion Surveys and the Formation of Privacy Policy
O. Gandy
2003
Corpus ID: 144358615
The laws that condition the boundaries that separate the public from the private spheres shape our expectations of privacy…
Expand
Review
2003
Review
2003
Explaining cross-cultural pragmatic findings: moving from politeness maxims to sociopragmatic interactional principles (SIPs)
H. Spencer-Oatey
,
Wenying Jiang
2003
Corpus ID: 53866777
Highly Cited
1998
Highly Cited
1998
The computer learner corpus: a versatile new source of data for SLA research
S. Granger
1998
Corpus ID: 17277611
Since making its first appearance in the 1960s, the computer corpus has infiltrated all fields of language-related research, from…
Expand
Highly Cited
1981
Highly Cited
1981
Neurobiology of the Leech
K. J. Muller
,
J. Nicholls
,
G. Stent
1981
Corpus ID: 82240377
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE