Alejandro Canovas Solbes | 27 Jan 12:17 2013
Picon

Last Days: CONTENT 2013 || May 27 - June 1, 2013 - Valencia, Spain


INVITATION:

=================

Please consider to contribute to and/or forward to the appropriate groups the following opportunity to
submit and publish original scientific results to CONTENT 2013.

The submission deadline is January 29, 2013.

Authors of selected papers will be invited to submit extended article versions to one of the IARIA
Journals: http://www.iariajournals.org

=================

============== CONTENT 2013 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

CONTENT 2013, The Fifth International Conference on Creative Content Technologies

May 27 - June 1, 2013 - Valencia, Spain

General page: http://www.iaria.org/conferences2013/CONTENT13.html

Call for Papers: http://www.iaria.org/conferences2013/CfPCONTENT13.html

- regular papers

- short papers (work in progress)
(Continue reading)

Alejandro Canovas Solbes | 11 Jan 23:54 2013
Picon

Last Mile: CONTENT 2013 || May 27 - June 1, 2013 - Valencia, Spain


INVITATION:

=================

Please consider to contribute to and/or forward to the appropriate groups the following opportunity to
submit and publish original scientific results to CONTENT 2013.

The submission deadline is January 27, 2013.

Authors of selected papers will be invited to submit extended article versions to one of the IARIA
Journals: http://www.iariajournals.org

=================

============== CONTENT 2013 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

CONTENT 2013, The Fifth International Conference on Creative Content Technologies

May 27 - June 1, 2013 - Valencia, Spain

General page: http://www.iaria.org/conferences2013/CONTENT13.html

Call for Papers: http://www.iaria.org/conferences2013/CfPCONTENT13.html

- regular papers

- short papers (work in progress)
(Continue reading)

Picon

Deadline extension: CONTENT 2013 || May 27 - June 1, 2013 - Valencia, Spain


INVITATION:

=================

Please consider to contribute to and/or forward to the appropriate groups the following opportunity to
submit and publish original scientific results to CONTENT 2013.

The submission deadline is January 22, 2013.

Authors of selected papers will be invited to submit extended article versions to one of the IARIA
Journals: http://www.iariajournals.org

=================

============== CONTENT 2013 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

CONTENT 2013, The Fifth International Conference on Creative Content Technologies

May 27 - June 1, 2013 - Valencia, Spain

General page: http://www.iaria.org/conferences2013/CONTENT13.html

Call for Papers: http://www.iaria.org/conferences2013/CfPCONTENT13.html

- regular papers

- short papers (work in progress)
(Continue reading)

Brendan Noonan | 6 Aug 19:29 2012
Picon

Bit Torrent Plus

I subscribed to bit torrent plus and had to then replace my hard disc, I reloaded bit torrent but can’t find an e-mail or way to reinitiate bit torrent plus – anyone had a similar problem?

Thanks

BPN

_______________________________________________
BitTorrent mailing list
BitTorrent <at> lists.ibiblio.org
http://lists.ibiblio.org/mailman/listinfo/bittorrent
Harold Feit | 11 May 21:05 2012

Fwd: Re: Puzzled by the ed2k and filehash in torrent file



-------- Original Message -------- Subject: Date: From: To:
Re: [bittorrent] Puzzled by the ed2k and filehash in torrent file
Fri, 11 May 2012 16:04:42 -0300
Harold Feit <dwknight <at> depthstrike.com>
Allan Ruin <boxoxod <at> gmail.com>


It's typically used by supporting clients to obtain the specific file from the torrent via the ed2k or gnutella networks used by emule and other clients.

Proper behavior when dealing with it is to include it in the calculation of the infohash (since it's included in the info dictionary) and NOT discard it.

http://wiki.depthstrike.com/index.php/P2P:Protocol:Specifications:Optional_Hashes covers what ones exist and what they're used for.

Harold Feit
Depthstrike Entertainment
https://depthstrike.com

On 5/11/2012 11:21 AM, Allan Ruin wrote:
Hello every, I am writing a tracker, and I found that some torrent file have ed2k and filehash fields ,I read this http://wiki.theory.org/Talk:BitTorrentSpecification , but still not sure what's the purpose of ed2k and filehash field. I guess it's used for some software to covert torrent to a ed2k link? 

_______________________________________________ BitTorrent mailing list BitTorrent <at> lists.ibiblio.org http://lists.ibiblio.org/mailman/listinfo/bittorrent


_______________________________________________
BitTorrent mailing list
BitTorrent <at> lists.ibiblio.org
http://lists.ibiblio.org/mailman/listinfo/bittorrent
Allan Ruin | 11 May 16:21 2012
Picon

Puzzled by the ed2k and filehash in torrent file

Hello every, I am writing a tracker, and I found that some torrent file have ed2k and filehash fields ,I read this http://wiki.theory.org/Talk:BitTorrentSpecification , but still not sure what's the purpose of ed2k and filehash field. I guess it's used for some software to covert torrent to a ed2k link? 

_______________________________________________
BitTorrent mailing list
BitTorrent <at> lists.ibiblio.org
http://lists.ibiblio.org/mailman/listinfo/bittorrent
Adrian Ulrich | 7 May 20:08 2012
Picon

Question about uTorrent extensions (vote and ut_comment)

Hello,

I have some questions about the uTorrent dht-vote and the ut_comment extensions.

It would be great if someone of the uTorrent team could shed some light into this:

#1: Vote:

I've noticed that some uTorrent peers seem to re-send their (non-zero) vote quite often: Some peers even
re-send the vote each 60 seconds.
Is this intentional?

#2: ut_comment:

msg_type=0 : What's the meaning of the 64 byte 'filter' value?

msg_type=1:

The reply that i get looks like this:

          "comments" => [
                          {
                            "like" => 0,
                            "owner" => "",
                            "timestamp" => "1331283959",
                            "text" => "great"
                          },
                          {
                            "like" => 0,
                            "owner" => "",
                            "timestamp" => 25193189,
                            "text" => "yeah!"
                          }
                        ],
          "msg_type" => 1

Ok: msg_type, like and text are obvious, but what is the purpose of 'owner' and what is the meaning of
'timestamp' ?

The value of timestamp seems to be very variable and doesn't look like a real (unix-)timestamp: it ranges
from 500000 up to 4000000000000000000.

Thanks and regards,
 Adrian

--

-- 
 RFC 1925:
   (11) Every old idea will be proposed again with a different name and
        a different presentation, regardless of whether it works.
Adrian Ulrich | 9 Apr 09:11 2012
X-Face
Picon

DHT: 'Zo' Client

Hello,

I've noticed a strange client that identifies itself as 'Zo\x00\x05' (and sometimes \x04).
Does someone have an idea on what this client is?

The client creates quite some DHT traffic and seems to like IPv6 for some strange reason:
More than 50% of all queries received via IPv6 are sent by this client.
(However: Most source IPs are Teredo addresses).

These clients are also sending announces with bogus info hashes (google doesn't know about them -> they
don't seem to belong to a real torrent).
such as '8eaaaba009ce93f2a678d9fb6dcd39170c5fc1e0':

All clients 'announced' to this info_hash are also using the ZO brand and seem to speak some sort of the
BitTorrent protocol...
..but they do not support ut_metadata :-/

So what is this? Is it some kind of Botnet?

The DHT-Queries look normal:

          "y" => "q",
          "a" => {
                   "id" => "7\335\234H\340\177\235\374\332\246\325\341Tc\303\373\203`WK",
                   "token" => "r\22!\ <at> #q\231#\26\$\$\230\30%\203\ <at> W",
                   "port" => 30121,
                   "info_hash" => "\217\223\353\301O\376\27\nk/\371\352I\314]n\312\21\276\237",
                   "seed" => 1
                 },
          "q" => "announce_peer",
          "v" => "Zo\0\5",
          "t" => "\37n"
        };

          "y" => "q",
          "a" => {
                   "want" => [
                               "n6"
                             ],
                   "id" => "L\236\332%\242\264kW\347b\220\256\237\354\310s\271\225}\20",
                   "noseed" => 1,
                   "info_hash" => "\216\252\253\240\t\316\223\362\246x\331\373m\3159\27\f_\301\340",
                   "scrape" => 1
                 },
          "q" => "get_peers",
          "v" => "Zo\0\5",
          "t" => "D\220"
        };

Regards,
 Adrian

--

-- 
 RFC 1925:
   (11) Every old idea will be proposed again with a different name and
        a different presentation, regardless of whether it works.
Arnaud Legout | 27 Oct 18:41 2011
Picon
Picon

Privacy issues with P2P protocols

Hi,

I would like to point you to a recent work we made that we believe
might be of interest to the BitTorrent/P2P community.

In this work that will be presented at IMC'11, we show what we believe
to be a significant privacy issue for most P2P protocols.

-We show that leveraging on Skype, we can map a social identity (name,
age, location, email address, etc.) to an IP address fully
inconspicuously. This attack works for all (500M) Skype users. This is
severe as an attacker does not need the ISP support (that an
individual cannot usually get) to retrieve the social identity linked
to an IP address.

-We show that we can then follow the mobility of a Skype user, and we
  found that we can indeed observe real mobility patterns for a large
  fraction of Skype users.

-Finally, we were able to link a Skype identity to a list of
  BitTorrent downloads even if the user is behind a NAT or a proxy (we
  use the predictability of the IP-ID in IP headers to make sure that
  two different applications are running on the same host).

That attack described uses Skype, but would also work with several
other popular VoIP systems.

All details are available here:

http://hal.inria.fr/inria-00632780/en/

Regards,
Arnaud.
Alejandro Cรกnovas | 24 Dec 00:32 2011
Picon

The submission deadline of the 2nd IEEE Internacional Workshop of Smart Communication Protocols and Algorithms (IEEE SCPA 2012 - Summer)" has been extended to 07 January 2012.


To be in line with other IEEE ICC 2012 workshops, the submission deadline of the 2nd IEEE Internacional
Workshop of Smart Communication Protocols and Algorithms (IEEE SCPA 2012 - Summer)" has been extended to
07 January 2012.

If you have already submitted a paper to the workshop, you can update your paper bebore the new submission deadline.

-------------------- CALL FOR PAPERS -----------------

The 2nd IEEE Internacional Workshop of Smart Communication Protocols and Algorithms (IEEE SCPA 2012 - Summer)
June 10-15, 2012, Ottawa, CANADA
In conjunction with IEEE ICC 2012
http://scpa.it.ubi.pt/2012

Selected papers will be invited to the Special Issue on Smart Protocols and Algorithms of the
International Journal Network Protocols and Algorithms (ISSN 1943-3581)

Communication protocols and algorithms are needed to communicate network devices and exchange data
between them. The appearance of new technologies usually comes with a protocol procedure and
communication rules that allows data communication while taking profit of this new technology. Recent
advances in hardware and communication mediums allow proposing new rules, conventions and data
structures which could be used by network devices to communicate across the network. Moreover, devices
with higher processing capacity let us include more complex algorithms that can be used by the network
device to enhance the communication procedure.

Smart communication protocols and algorithms make use of several methods and techniques (such as machine
learning techniques, decision making techniques, knowledge representation, network management,
network optimization, problem solution techniques, and so on), to communicate the network devices to
transfer data between them. They can be used to perceive the network conditions, or the user behavior, in
order to dynamically plan, adapt, decide, take the appropriate actions, and learn from the consequences
of its actions. The algorithms can make use of the information gathered from the protocol in order to sense
the environment, plan actions according to the input, take consciousness of what is happening in the
environment, and take the appropriate decisions using a reasoning engine. Goals 
 such as decide which scenario fits best its end-to-end purpose, or environment prediction, can be
achieved with smart protocols and algorithms. Moreover, they could learn from the past and !
 use this knowledge to improve futur
e decisions.

In this workshop, researchers are encouraged to submit papers focused on the design, development,
analysis or optimization of smart communication protocols or algorithms at any communication layer.
Algorithms and protocols based on artificial intelligence techniques for network management, network
monitoring, quality of service enhancement, performance optimization and network secure are included
in the workshop. 

We welcome technical papers presenting analytical research, simulations, practical results, position
papers addressing the pros and cons of specific proposals, and papers addressing the key problems and
solutions. The topics suggested by the conference can be discussed in term of concepts, state of the art,
standards, deployments, implementations, running experiments and applications. 

Topics of interest:
Authors are invited to submit complete unpublished papers, which are not under review in any other
conference or journal, including, but are not limited to, the following topic areas:
• Smart network protocols and algorithms for multimedia delivery
• Application layer, transport layer and network layer cognitive protocols
• Cognitive radio network protocols and algorithms
• Automatic protocols and algorithms for environment prediction.
• Algorithms and protocols to predict data network states. 
• Intelligent synchronization techniques for network protocols and algorithms
• Smart protocols and algorithms for e-health
• Software applications for smart algorithms design and development.
• Dynamic protocols based on the perception of their performance 
• Smart protocols and algorithms for Smartgrids
• Protocols and algorithms focused on building conclusions for taking the appropriate actions.
• Smart Automatic and self-autonomous ad-hoc and sensor networks.
• Artificial intelligence applied in protocols and algorithms for wireless, mobile and dynamic networks.
• Smart security protocols and algorithms
• Smart cryptographic algorithms for communication
• Artificial intelligence applied to power efficiency and energy saving protocols and algorithms
• Smart routing and switching protocols and algorithms
• Cognitive protocol and algorithm models for saving communication costs.
• Any kind of intelligent technique applied to QoS, content delivery, network Monitoring and network management.
• Smart collaborative protocols and algorithms
• Problem recognition and problem solving protocols 
• Genetic algorithms, fuzzy logic and neural networks applied to communication protocols and algorithms

Important Dates
Submission Deadline (Extended): January 7, 2012 (FIRM)
Acceptance Notification: February 1, 2012
Camera Ready Deadline: March 1, 2012

Submission guidelines:
All submissions must be full papers in PDF format and uploaded on EDAS (http://edas.info//N11477).
All submissions should be written in English with a maximum paper length of five (5) printed pages
(10-point font) including figures without incurring additional page charges.

General Chairs
Jaime Lloret, Univ. Politecnica Valencia, Spain
Joel Rodrigues, Inst. of Telecommunications, Univ. of Beira Interior, Pt

TPC Chairs
Ivan Stojmenovic, University of Ottawa, Canada
Kai Lin, Dalian University of Technology, China

Poster Chairs
Binod Vaidya, University of Ottawa, Canada
Bin Wei, AT&T, USA

Industry Chairs
Haohong Wang, Cisco
Chi-Ming Chen, AT&T, USA

Keynote Chair
Mbaye B. Sene, Cheikh Anta Diop University, Dakar, Senegal

Publicity Chairs
Sandra Sendra, Univ. Politecnica Valencia, Spain
Alejandro Canovas, Univ. Politecnica Valencia, Spain

Web Chair
Miguel Garcia, Univ. Politecnica Valencia, Spain
_______________________________________________
BitTorrent mailing list
BitTorrent <at> lists.ibiblio.org
http://lists.ibiblio.org/mailman/listinfo/bittorrent
Alejandro Canovas | 10 Dec 09:37 2011
Picon

[ICC'12 WS] Last 10 Days - 2nd IEEE SCPA 2012 - Dec. 20


-------------------- CALL FOR PAPERS -----------------

The 2nd IEEE Internacional Workshop of Smart Communication Protocols and Algorithms (IEEE SCPA 2012 - Summer)
June 10-15, 2012, Ottawa, CANADA
In conjunction with IEEE ICC 2012
http://scpa.it.ubi.pt/2012

Selected papers will be invited to the Special Issue on Smart Protocols and Algorithms of the
International Journal Network Protocols and Algorithms (ISSN 1943-3581)

Communication protocols and algorithms are needed to communicate network devices and exchange data
between them. The appearance of new technologies usually comes with a protocol procedure and
communication rules that allows data communication while taking profit of this new technology. Recent
advances in hardware and communication mediums allow proposing new rules, conventions and data
structures which could be used by network devices to communicate across the network. Moreover, devices
with higher processing capacity let us include more complex algorithms that can be used by the network
device to enhance the communication procedure.

Smart communication protocols and algorithms make use of several methods and techniques (such as machine
learning techniques, decision making techniques, knowledge representation, network management,
network optimization, problem solution techniques, and so on), to communicate the network devices to
transfer data between them. They can be used to perceive the network conditions, or the user behavior, in
order to dynamically plan, adapt, decide, take the appropriate actions, and learn from the consequences
of its actions. The algorithms can make use of the information gathered from the protocol in order to sense
the environment, plan actions according to the input, take consciousness of what is happening in the
environment, and take the appropriate decisions using a reasoning engine. Goals 
 such as decide which scenario fits best its end-to-end purpose, or environment prediction, can be
achieved with smart protocols and algorithms. Moreover, they could learn from the past and !
 use this knowledge to improve futur
e decisions.

In this workshop, researchers are encouraged to submit papers focused on the design, development,
analysis or optimization of smart communication protocols or algorithms at any communication layer.
Algorithms and protocols based on artificial intelligence techniques for network management, network
monitoring, quality of service enhancement, performance optimization and network secure are included
in the workshop. 

We welcome technical papers presenting analytical research, simulations, practical results, position
papers addressing the pros and cons of specific proposals, and papers addressing the key problems and
solutions. The topics suggested by the conference can be discussed in term of concepts, state of the art,
standards, deployments, implementations, running experiments and applications. 

Topics of interest:
Authors are invited to submit complete unpublished papers, which are not under review in any other
conference or journal, including, but are not limited to, the following topic areas:
• Smart network protocols and algorithms for multimedia delivery
• Application layer, transport layer and network layer cognitive protocols
• Cognitive radio network protocols and algorithms
• Automatic protocols and algorithms for environment prediction.
• Algorithms and protocols to predict data network states. 
• Intelligent synchronization techniques for network protocols and algorithms
• Smart protocols and algorithms for e-health
• Software applications for smart algorithms design and development.
• Dynamic protocols based on the perception of their performance 
• Smart protocols and algorithms for Smartgrids
• Protocols and algorithms focused on building conclusions for taking the appropriate actions.
• Smart Automatic and self-autonomous ad-hoc and sensor networks.
• Artificial intelligence applied in protocols and algorithms for wireless, mobile and dynamic networks.
• Smart security protocols and algorithms
• Smart cryptographic algorithms for communication
• Artificial intelligence applied to power efficiency and energy saving protocols and algorithms
• Smart routing and switching protocols and algorithms
• Cognitive protocol and algorithm models for saving communication costs.
• Any kind of intelligent technique applied to QoS, content delivery, network Monitoring and network management.
• Smart collaborative protocols and algorithms
• Problem recognition and problem solving protocols 
• Genetic algorithms, fuzzy logic and neural networks applied to communication protocols and algorithms

Important Dates
Submission Deadline (Extended): December 20, 2011
Acceptance Notification: February 10, 2012
Camera Ready Deadline: March 1, 2012

Submission guidelines:
All submissions must be full papers in PDF format and uploaded on EDAS (http://edas.info//N11477).
All submissions should be written in English with a maximum paper length of five (5) printed pages
(10-point font) including figures without incurring additional page charges.

General Chairs
Jaime Lloret, Univ. Politecnica Valencia, Spain
Joel Rodrigues, Inst. of Telecommunications, Univ. of Beira Interior, Pt

TPC Chairs
Ivan Stojmenovic, University of Ottawa, Canada
Kai Lin, Dalian University of Technology, China

Poster Chairs
Binod Vaidya, University of Ottawa, Canada
Bin Wei, AT&T, USA

Industry Chairs
Haohong Wang, Cisco
Chi-Ming Chen, AT&T, USA

Keynote Chair
Mbaye B. Sene, Cheikh Anta Diop University, Dakar, Senegal

Publicity Chairs
Sandra Sendra, Univ. Politecnica Valencia, Spain
Alejandro Canovas, Univ. Politecnica Valencia, Spain

Web Chair
Miguel Garcia, Univ. Politecnica Valencia, Spain
_______________________________________________
BitTorrent mailing list
BitTorrent <at> lists.ibiblio.org
http://lists.ibiblio.org/mailman/listinfo/bittorrent

Gmane