Most current-generation P2P content distribution protocols use fine-granularity blocks to distribute content to all the peers in a decentralized fashion. Such protocols often suffer from a significant degree of imbalance in block distributions, especially when the users are highly dynamic. As certain blocks become rare or even unavailable, content availability and download efficiency are adversely […]
On the Robustness of BitTorrent Swarms to Greedy Peers
The success of BitTorrent has fostered the development of variants to its basic components. Some of the variants adopt greedy approaches aiming at exploiting the intrinsic altruism of the original version of BitTorrent in order to maximize the benefit of participating to a torrent. In this work, we study BitTyrant, a recently proposed strategic client. […]
On the Market Power of Network Coding in P2P Content Distribution Systems
Network coding is emerging as a promising alternative to traditional content distribution approaches in P2P networks. By allowing information mixture and randomized block selection, it simplifies the block scheduling problem, resulting in more efficient data delivery. Existing protocols have validated such advantages assuming altruistic and obedient peers. In this paper, we develop an analytical framework […]
Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
This study is a quasi-experiment comparing the software defect rates and implementation costs of two methods of software defect reduction: code inspection and test-driven development. We divided participants, consisting of junior and senior computer science students at a large Southwestern university, into four groups using a two-by-two, between-subjects, factorial design and asked them to complete […]
Facilitating Trust in Privacy-preserving E-learning Environments
This research explores a new model for facilitating trust in online e-learning activities. We begin by protecting the privacy of learners through identity management, where personal information can be protected through some degree of participant anonymity or pseudonymity. In order to expect learners to trust other pseudonymous participants, we realize that a reliable mechanism is […]
Software Module Clustering as a Multi-Objective Search Problem
Software module clustering is the problem of automatically organizing software units into modules to improve program structure. There has been a great deal of recent interest in search-based formulations of this problem in which module boundaries are identified by automated search, guided by a fitness function that captures the twin objectives of high cohesion and […]
Plat_Forms: A Web Development Platform Comparison by an Exploratory Experiment Searching for Emergent Platform Properties
Background: For developing Web-based applications, there exist several competing and widely used technological platforms (consisting of a programming language, framework(s), components, and tools), each with an accompanying development culture and style. Research question: Do Web development projects exhibit emergent process or product properties that are characteristic and consistent within a platform, but show relevant substantial […]
ABACS: An Attribute-Based Access Control System for Emergency Services over Vehicular Ad Hoc Networks
we propose an Attribute-Based Access Control System (ABACS) for emergency services with security assurance over Vehicular Ad Hoc Networks (VANETs). ABACS aims to improve the efficiency of rescues mobilized via emergency communications over VANETs. By adopting fuzzy identity-based encryption, ABACS can select the emergency vehicles that can most appropriately deal with an emergency and securely […]
Reputation-Based Trust for a Cooperative Agent-Based Backup Protection Scheme
This paper explores integrating a reputation-based trust mechanism with an agent-based backup protection system to help protect against malicious or byzantine failures. A distributed cooperative trust system has the potential to add an additional layer of protection designed to operate with greater autonomy. This trust component enables the agents in the system to make assessments […]
Scheduling Grid Tasks in Face of Uncertain Communication Demands
Grid scheduling is essential to Quality of Service provisioning as well as to efficient management of grid resources. Grid scheduling usually considers the state of the grid resources as well application demands. However, such demands are generally unknown for highly demanding applications, since these often generate data which will be transferred during their execution. Without […]
- « Previous Page
- 1
- …
- 4
- 5
- 6
- 7
- 8
- …
- 28
- Next Page »