Sciweavers

2400 search results - page 315 / 480
» Systems Failures
Sort
View
131
Voted
IEEEARES
2006
IEEE
15 years 8 months ago
Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the netwo...
Matthew Leslie, Jim Davies, Todd Huffman
P2P
2006
IEEE
120views Communications» more  P2P 2006»
15 years 8 months ago
Risk Driven Semantic P2P Service Retrieval
In this paper, we present a novel approach, named RS2D, to risk driven semantic service query routing in unstructured, so called pure P2P networks. Following the RS2D protocol, ea...
Matthias Klusch, Ulrich Basters
VTC
2006
IEEE
15 years 8 months ago
A Relay Skipping Method for a Multi-Hop DS-CDMA Virtual Cellular Network
— A multi-hop virtual cellular network (VCN) was proposed for future mobile communication systems. In VCN, the transmitted signal from a mobile terminal is relayed via multi-hop ...
Lalla Soundous El Alami, Eisuke Kudoh, Fumiyuki Ad...
SIGCSE
2006
ACM
119views Education» more  SIGCSE 2006»
15 years 8 months ago
Practice what you preach: full separation of concerns in CS1/CS2
We argue that the failure to separate the concerns in CS1 is the leading cause of difficulty in teaching OOP in the first year. We show how the concerns can be detangled and prese...
Hamzeh Roumani
HICSS
2005
IEEE
127views Biometrics» more  HICSS 2005»
15 years 8 months ago
An Evaluation of Australian and Swiss E-Shops in the Grocery Sector
The Extended Web Assessment Method (EWAM) is an evaluation tool specifically created for the assessment of electronic commerce applications. The method is based on an evaluation g...
Sherah Kurnia, Uwe Leimstoll, Petra Schubert