Intended for network-wide dissemination of commands, configurations and code binaries, flooding has been investigated extensively in wireless networks. However, little work has ...
Defect prediction is an important task in the mining of software repositories, but the quality of predictions varies strongly within and across software projects. In this paper we...
Jayalath Ekanayake, Jonas Tappolet, Harald Gall, A...
—In this paper, we study the problem of utility maximization in Peer-to-Peer (P2P) systems, in which aggregate utilities are maximized by running distributed algorithms on P2P no...
Minghua Chen, Sudipta Sengupta, Miroslav Ponec, Ph...
Networked virtual environments (NVEs) are computergenerated virtual worlds where users interact by exchanging messages via network connections. Each NVE user often pays attention ...
—This paper presents a systematic in-depth study on the existence, importance, and application of stable nodes in peerto-peer live video streaming. Using traces from a real large...