Sciweavers

1996 search results - page 51 / 400
» Financial Theory 2
Sort
View
INFOSCALE
2006
ACM
14 years 3 months ago
Storage load balancing via local interactions among peers in unstructured P2P networks
— The present paper introduces a replication method that is meant to balance the storage load of peers in unstructured peer-to-peer (P2P) networks for file sharing and to provid...
Kei Ohnishi, Hiroshi Yamamoto, Kento Ichikawa, Mas...
SIGSOFT
2012
ACM
12 years 5 months ago
Report from the 2nd international workshop on replication in empirical software engineering research (RESER 2011)
The RESER workshop provides a venue in which empirical software engineering researchers can discuss the theoretical foundations and methods of replication, as well as present the ...
Jonathan L. Krein, Charles D. Knutson, Lutz Preche...
APAL
2006
94views more  APAL 2006»
13 years 10 months ago
Classifiable theories without finitary invariants
: It follows directly from Shelah's structure theory that if T is a classifiable theory, then the isomorphism type of any model of T is determined by the theory of that model ...
Elisabeth Bouscaren, Ehud Hrushovski
BIRTHDAY
2010
Springer
13 years 11 months ago
Halting and Equivalence of Program Schemes in Models of Arbitrary Theories
In this note we consider the following decision problems. Let be a fixed first-order signature. (i) Given a first-order theory or ground theory T over of Turing degree , a program...
Dexter Kozen
JASIS
2008
94views more  JASIS 2008»
13 years 10 months ago
Toward a theory of network gatekeeping: A framework for exploring information control
Gatekeeping theories have been a popular heuristic for describing information control for years, but none have attained a full theoretical status in the context of networks. This ...
Karine Barzilai-Nahon