Poster: A Dataset on Peering Policies of Autonomous Systems
Abstract
References
Index Terms
- Poster: A Dataset on Peering Policies of Autonomous Systems
Recommendations
A mobile robot with autonomous climbing and descending of stairs
Mobile robots are used to operate in urban environments, for surveillance, reconnaissance, and inspection, as well as for military operations and in hazardous environments. Some are intended for exploration of only natural terrains, but others also for ...
Poster: Destabilizing BitTorrent's clusters to attack high bandwidth leechers
CCS '11: Proceedings of the 18th ACM conference on Computer and communications securityBitTorrent protocol incentivizes sharing through its choking algorithm. BitTorrent choking algorithm creates clusters of leechers with similar upload capacity to achieve higher overall transfer rates. We show that a malicious peer can exploit BitTorrent'...
Peer-to-Peer Content Delivery System with Bounded Traffic between Autonomous Systems
CANDAR '13: Proceedings of the 2013 First International Symposium on Computing and NetworkingIn this paper, we propose a hybrid Peer-to-Peer (P2P) architecture for Content Delivery Networks (CDNs). The basic idea of the proposed method is to prepare a P2P overlay for each Autonomous System (AS) and to map nodes to the P2P overlays by referring ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chairs:
- Narseo Vallina-Rodríguez,
- Guillermo Suarez-Tángil,
- Program Chairs:
- Dave Levin,
- Cristel Pelsser
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Poster
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 53Total Downloads
- Downloads (Last 12 months)53
- Downloads (Last 6 weeks)33
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in