Tracking and mitigating piracy
暂无分享,去创建一个
[1] Lorrie Faith Cranor,et al. Analysis of security vulnerabilities in the movie production and distribution process , 2003, DRM '03.
[2] Matthieu Latapy,et al. Combining the Use of Clustering and Scale-Free Nature of User Exchanges into a Simple and Efficient P2P System , 2005, Euro-Par.
[3] Eitan Altman,et al. Braess Paradox and Properties of Wardrop Equilibrium in Some Multiservice Networks , 2005 .
[4] Charles R. Crowell,et al. Moral Psychology and Information Ethics: Psychological Distance and the Components of Moral Behavior in a Digital World , 2005 .
[5] Edith Cohen,et al. Search and replication in unstructured peer-to-peer networks , 2002, ICS '02.
[6] Jean-Pierre Eckmann,et al. Curvature of co-links uncovers hidden thematic layers in the World Wide Web , 2001, Proceedings of the National Academy of Sciences of the United States of America.
[7] Karl Aberer,et al. On Small World Graphs in Non-uniformly Distributed Key Spaces , 2005, 21st International Conference on Data Engineering Workshops (ICDEW'05).
[8] Ramesh Govindan,et al. Using the small-world model to improve freenet performance , 2002, CCRV.
[9] E. Jonckheere,et al. Geometry of network security , 2004, Proceedings of the 2004 American Control Conference.
[10] Eitan Altman,et al. Non-cooperative routing in loss networks , 2002, Perform. Evaluation.
[11] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[12] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[13] Yafei Dai,et al. A Measurement Study of the Structured Overlay Network in P2P File-Sharing Systems , 2007, Adv. Multim..
[14] Ramesh Govindan,et al. Using the small-world model to improve Freenet performance , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.