نتایج جستجو برای: napster

تعداد نتایج: 225  

Journal: :IJACI 2011
Mark Scanlon Alan Hannaway M. Tahar Kechadi

The popularity of Peer-to-Peer (P2P) Internet communication technologies being exploited to aid cybercrime is ever increasing. P2P systems can be used or exploited to aid in the execution of a large number of online criminal activities, e.g., copyright infringement, fraud, malware and virus distribution, botnet creation, and control. P2P technology is perhaps most famous for the unauthorised di...

2003
Yunfei Zhang Lianhong Lei Changjia Chen

In this paper we, to the best of our knowledge, for the first time, launch a peer-to-peer network traffic measurement across the Internet backbone in China. Different from the existing studies, our data are derived from core routers on the Internet. Our study focuses on the three periodic peak value groups in the aggregation flow traffic, the heavy-tailed property in the distribution of traffic...

2001
V. Scarlata Brian Neil Levine Clay Shields

Data transfer over TCP/IP provides no privacy for network users. Previous research in anonymity has focused on the provision of initiator anonymity. We explore methods of adapting existing initiator-anonymous protocols to provide responder anonymity and mutual anonymity. We present Anonymous Peer-to-peer File Sharing (APFS) protocols, which provide mutual anonymity for peer-to-peer file sharing...

2006
Esther Palomar Juan E. Tapiador Julio César Hernández Castro Arturo Ribagorda

A fundamental feature of Peer-to-Peer (P2P) networks is the honest collaboration among an heterogeneous community of participants. After Napster success –the first P2P file sharing application massively used–, advances in this area have been intense, with the proposal of many newarchitectures and applications for content and computing sharing, and collaborative working environments. However, th...

2007
Karl R. Lang

While existing research on peer-to-peer (P2P) file-sharing services has increased our understanding in many respects, it has not yet supplied a comprehensive theoretical framework that explains business failures of P2P file-sharing network service models. We develop an analytical model based on seven specific market constraints — technical, economic, structural, legal, political, cognitive, and...

2002
Kwangwook Shin Seunghak Lee Geunhwi Lim Hyunsoo Yoon Joong Soo Ma

Peer-to-peer systems and applications are distributed systems without any centralized control. The core operation in most peer-to-peer systems is efficient location of data items. The current well-known peer-topeer systems like Napster and Gnutella have scalability problem in location of data items. To solve the scalability problem, some scalable peer-to-peer lookup services show up, such as CA...

2002
Julita Vassileva

One of the most important prerequisites for the success of a peer to peer system is the availability of participants willing to provide resources (files, computational cycles, time and effort to the community). Free riders may not do any harm in file-sharing peer to peer applications, like NAPSTER, because of the nature of electronic data. It can be reproduced at no cost; downloading a copy doe...

2002
Girish Suryanarayana Richard N. Taylor

Peer-to-peer (P2P) applications are composed of a distributed collection of peers that cooperate in order to perform some common task. Though P2P applications have attracted the attention of researchers, there has been little exploration of the deep issues; rather initial attention has been on widely known but technically shallow applications such as found in Napster and Gnutella. One particula...

Journal: :IEEE Micro 2004
Richard H. Stern

When is it proper to hold one person liable for the harm caused by the acts of another person? How should courts decide that? Let’s consider that in the context of manufacturers and disseminators of innovative products such as player-piano rolls, copiers, videocassette recorders (VCRs), TiVo, and Grokster. Each of these technological advances has challenged copyright law. Courts had to decide, ...

2011
Wendy Seltzer

U.S. policymakers proclaim their commitment to Internet freedom while simultaneously endorsing restrictions on Internet exchange. Unfortunately, the tools – legal and technical – built to block copyright infringement, counterfeit sales, online gambling, or indecency, often find use to censor lawful expression here and abroad. In particular, the United States and its entertainment industries hav...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید