Sciweavers

2275 search results - page 307 / 455
» A Deployment System for Pervasive Computing
Sort
View
SPE
1998
129views more  SPE 1998»
15 years 4 months ago
Timing Trials, or the Trials of Timing: Experiments with Scripting and User-Interface Languages
This paper describes some basic experiments to see how fast various popular scripting and user-interface languages run on a spectrum of representative tasks. We found enormous var...
Brian W. Kernighan, Christopher J. Van Wyk
PROMISE
2010
14 years 11 months ago
Prediction of defect distribution based on project characteristics for proactive project management
As software has been pervasive and various software projects have been executed since the 1970s, software project management has played a significant role in software industry. Th...
Youngki Hong, Wondae Kim, Jeongsoo Joo
IPPS
2005
IEEE
15 years 10 months ago
A Mutual Anonymous Peer-to-Peer Protocol Design
Peer-to-Peer (P2P) computing has become a popular application model because of its easy resource sharing pattern and powerful query search scheme. However, decentralized P2P archi...
Jinsong Han, Yunhao Liu, Li Xiao, Renyi Xiao, Lion...
ACHI
2008
IEEE
15 years 11 months ago
Turning Web 2.0 Social Software into Versatile Collaborative Learning Solutions
—In the framework of the European Integrated Project PALETTE, the École Polytechnique Fédérale de Lausanne (EPFL) is developing the eLogbook Web 2.0 social software. The purpo...
Denis Gillet, Sandy El Helou, Chiu-Man Yu, Christo...
ICPP
2007
IEEE
15 years 10 months ago
Defending P2Ps from Overlay Flooding-based DDoS
A flooding-based search mechanism is often used in unstructured P2P systems. Although a flooding-based search mechanism is simple and easy to implement, it is vulnerable to overla...
Yunhao Liu, Xiaomei Liu, Chen Wang, Li Xiao