Sciweavers

7607 search results - page 1457 / 1522
» informs 2006
Sort
View
IMC
2006
ACM
14 years 3 months ago
Rarest first and choke algorithms are enough
The performance of peer-to-peer file replication comes from its piece and peer selection strategies. Two such strategies have been introduced by the BitTorrent protocol: the rare...
Arnaud Legout, Guillaume Urvoy-Keller, Pietro Mich...
IMC
2006
ACM
14 years 3 months ago
Understanding churn in peer-to-peer networks
The dynamics of peer participation, or churn, are an inherent property of Peer-to-Peer (P2P) systems and critical for design and evaluation. Accurately characterizing churn requir...
Daniel Stutzbach, Reza Rejaie
INFOSCALE
2006
ACM
14 years 3 months ago
Storage load balancing via local interactions among peers in unstructured P2P networks
— The present paper introduces a replication method that is meant to balance the storage load of peers in unstructured peer-to-peer (P2P) networks for file sharing and to provid...
Kei Ohnishi, Hiroshi Yamamoto, Kento Ichikawa, Mas...
ISSTA
2006
ACM
14 years 3 months ago
Coverage and adequacy in software product line testing
Software product line modeling has received a great deal of attention for its potential in fostering reuse of software artifacts across development phases. Research on the testing...
Myra B. Cohen, Matthew B. Dwyer, Jiangfan Shi
ITICSE
2006
ACM
14 years 3 months ago
Once she makes it, she is there: gender differences in computer science study
When you sit in a Computer Science lecture at any university in the western world, what are the chances that the person sitting next to you will be a woman? Furthermore, what are ...
Tamar Vilner, Ela Zur
« Prev « First page 1457 / 1522 Last » Next »