- 浏览: 2078567 次
- 性别:
- 来自: 北京
最新评论
-
伍大都督:
解释太到位了,感谢分享
理解Linux系统中的load average(图文版) -
rfjian123:
非常感谢,用你的方法解决了问题。
Server sent unexpected return value (403 Forbidden) in response to OPTIONS -
yuhaifei12:
今天遇到同样的问题了。设置的是每分钟执行一次。结果发现每分钟执 ...
解决Linux下crontab同一时间重复执行问题 -
BigBird2012:
想问一下,使用ExecutorService每次都要调用 sh ...
spring quartz使用多线程并发“陷阱” -
zhuqx1130:
有用,谢谢
解决Sublime Text 3中文显示乱码(tab中文方块)问题
相关推荐
论文:PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake 论文结构: Introduction Coin Age Proof-of-Stake Minting based on Proof-of-Stake Main Chain Protocol Checkpoint: Protection of History ...
Kademlia 原理论文,还没仔细看过
大牛的文章,chord的起源,就不多说了!
Title:Peer to Peer Application Development: Cracking the Code URL:http://www.amazon.com/exec/obidos/ASIN/0764549049/qid%3D1041485413/sr%3D11-1/ref%3Dsr%5F11%5F1/104-2059835-4815920 ISBN:0764549049 ...
A Survey of Peer-to-Peer Network SimulatorsA Survey of Peer-to-Peer Network Simulators
vmware unlocker205 for mac os . vmware 安装 mac os 最新插件。2015.6.18更新
Peer-to-Peer SimulatorsPeer-to-Peer SimulatorsPeer-to-Peer SimulatorsPeer-to-Peer Simulators
Peer-to-peer botnets are a relatively new yet rapidly growing Internet threat. In the year since its introduction in January 2007, the Storm Worm peer-to-peer botnet has become the largest botnet on ...
Peer-to-Peer Computing,P2P经典著作
p2p,网络,peer-to-peer,p2p,网络,peer-to-peer
The Handbook of Peer-to-Peer Networking is intended to provide readers with a comprehensive reference for the most current developments in the field. It offers broad coverage P2P networking with fifty...
HP 存储 3PAR高可用性解决方案 Peer Persistence for VMware
Botnets pose a great threat to all resources connected to the Internet. Systems not properly secured may potentially become part of a botnet army, while all systems are potential targets of a botnet ...
1.A Measurement of a large-scale Peer-to-Peer Live Video Streaming System 2.An Empirical Study of the Coolstreaming System 3.Coolstreaming Design, Theory and Practice 4.Inferring Network-Wide Quality ...
Peer-to-Peer File Sharing Gnutella Style
The Handbook of Peer-to-Peer Networking is a comprehensive and unified repository of the various models, applications, methodologies, trends, and challenges of peer-to-peer computing, making it an ...
PeerIS:基于Peer-to-Peer的信息检索系统,周傲英,凌波,本文介绍了对等计算(Peer-to-Peer,简称P2P)的特征、潜在优势和应用范围,指出了当前P2P数据共享系统存在仅支持弱语义(甚至缺乏语义)和�
chitecting peer-to-peer overlays called Peer-to-peer Receiver- driven Overlay (or PRO). PRO is designed for non-interactive streaming applications and its primary design goal is to max- imize ...
The State of Peer_to_Peer Simulators and Simulations