A Lightweight Model for Mobile Peer-to-Peer File Sharing Systems
暂无分享,去创建一个
George Stephan | Badieh Traboulsi | Rabih Dbouk | Sanaa Sharafeddine | S. Sharafeddine | Georges Stephan | Badieh Traboulsi | R. Dbouk
[1] David W. Binkley,et al. Program slicing , 2008, 2008 Frontiers of Software Maintenance.
[2] Yuguang Fang,et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[3] Anand Jeyaraj,et al. A review of the predictors, linkages, and biases in IT innovation adoption research , 2006, J. Inf. Technol..
[4] Frank Bellosa,et al. Balancing power consumption in multiprocessor systems , 2006, EuroSys.
[5] Keith Brian Gallagher,et al. Using Program Slicing in Software Maintenance , 1991, IEEE Trans. Software Eng..
[6] Charles Poirier,et al. RFID Strategic Implementation and ROI: A Practical Roadmap to Success , 2006 .
[7] Wolfgang Kellerer,et al. Extension to Ubiquitous: Mobile Peer‐To‐Peer , 2008 .
[8] Mariam Kamkar,et al. An overview and comparative classification of program slicing techniques , 1995, J. Syst. Softw..
[9] Linda Mary Wills,et al. Automated program recognition by graph parsing , 1992 .
[10] 坂倉 省吾,et al. Technology Review : 抄録雑誌の概要 , 1987 .
[11] A.C.M. Fong,et al. Using a tree algorithm to determine the average synchronisation delay of self-synchronising T-codes , 2002 .
[12] L. G. Tornatzky,et al. Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings , 1982, IEEE Transactions on Engineering Management.
[13] Niraj K. Jha,et al. Energy efficiency of handheld computer interfaces: limits, characterization and practice , 2005, MobiSys '05.
[14] Brian Subirana,et al. Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond , 2004 .
[15] Santha Vaithilingam,et al. Mapping global money laundering trends: Lessons from the pace setters , 2009 .
[16] Varun Grover,et al. Information technology innovations: general diffusion patterns and its relationships to innovation characteristics , 2002, IEEE Trans. Engineering Management.
[17] John Heidemann,et al. Estimating P2P Traffic Volume at USC , 2007 .
[18] Mikio Hasegawa,et al. Energy Consumption Measurement of Wireless Interfaces in Multi-Service User Terminals for Heterogeneous Wireless Networks , 2005, IEICE Trans. Commun..
[19] Izak Benbasat,et al. Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..
[20] Nicolas Edwin Gold,et al. Hypothesis-based concept assignment to support software maintenance , 2001, Proceedings IEEE International Conference on Software Maintenance. ICSM 2001.
[21] Gajaraj Dhanarajan. Distance Education: Promise, performance and potential , 2001 .
[22] Patricia Adams,et al. Programming Languages: Principles and Practice , 1993 .
[23] Ben Y. Zhao,et al. Energy consumption and conservation in mobile peer-to-peer systems , 2006, MobiShare '06.
[24] Paramvir Bahl,et al. Wake on wireless: an event driven energy saving strategy for battery operated devices , 2002, MobiCom '02.
[25] Tomas Olovsson,et al. Trends and Differences in Connection-Behavior within Classes of Internet Backbone Traffic , 2008, PAM.
[26] Krishna M. Sivalingam,et al. Design and analysis of low‐power access protocols for wireless and mobile ATM networks , 2000, Wirel. Networks.
[27] Izak Benbasat,et al. Electronic Data Interchange and Small Organizations: Adoption and Impact of Technology , 1995, MIS Q..
[28] Lawrence Loh,et al. Diffusion of Information Technology Outsourcing: Influence Sources and the Kodak Effect , 1992, Inf. Syst. Res..
[29] Ted J. Biggerstaff,et al. The concept assignment problem in program understanding , 1993, [1993] Proceedings Working Conference on Reverse Engineering.
[30] Suresh Singh,et al. PAMAS—power aware multi-access protocol with signalling for ad hoc networks , 1998, CCRV.
[31] Varun Grover,et al. The Initiation, Adoption, and Implementation of Telecommunications Technologies in U.S. Organizations , 1993, J. Manag. Inf. Syst..
[32] Johan A. Pouwelse,et al. The Bittorrent P2P File-Sharing System: Measurements and Analysis , 2005, IPTPS.
[33] Frank Tip,et al. A survey of program slicing techniques , 1994, J. Program. Lang..
[34] Daniel M. Dobkin,et al. The RF in RFID: Passive UHF RFID in Practice , 2007 .
[35] Barry W. Boehm,et al. Software Engineering Economics , 1993, IEEE Transactions on Software Engineering.
[36] E. Burton Swanson,et al. Characteristics of application software maintenance , 1978, CACM.
[37] Vachara Peansupap,et al. Factors Enabling Information and Communication Technology Diffusion and Actual Implementation in Construction Organisations , 2005, J. Inf. Technol. Constr..
[38] Premkumar T. Devanbu,et al. LaSSIE—a knowledge-based software information system , 1991, ICSE '90.
[39] Norman Wilde,et al. The role of concepts in program comprehension , 2002, Proceedings 10th International Workshop on Program Comprehension.
[40] Keqiu Li,et al. Energy Efficient Methods and Techniques for Mobile Computing , 2007, Third International Conference on Semantics, Knowledge and Grid (SKG 2007).
[41] Amin Vahdat,et al. ECOSystem: managing energy as a first class operating system resource , 2002, ASPLOS X.
[42] Yasuhiro Takishima,et al. Error states and synchronization recovery for variable length codes , 1994, IEEE Trans. Commun..
[43] J. Flinn,et al. Energy-aware adaptation for mobile applications , 1999, SOSP.
[44] G. R. Higgie. Database of best T-codes , 1996 .
[45] Manish Bhuptani,et al. RFID Field Guide: Deploying Radio Frequency Identification Systems , 2005 .
[46] Mark Harman,et al. Program comprehension assisted by slicing and transformation , 1995 .
[47] M. Gibson,et al. Beyond ANOVA: Basics of Applied Statistics. , 1986 .
[48] Vassileios Karakostas,et al. Intelligent search and acquisition of business knowledge from programs , 1992, J. Softw. Maintenance Res. Pract..
[49] Suresh Singh,et al. M-TCP: TCP for mobile cellular networks , 1997, CCRV.
[50] Zhen Zhang,et al. Synchronization recovery of variable-length codes , 2002, IEEE Trans. Inf. Theory.
[51] Rayadurgam Srikant,et al. Modeling and performance analysis of BitTorrent-like peer-to-peer networks , 2004, SIGCOMM 2004.
[52] Oliver Spatscheck,et al. Accurate, scalable in-network identification of p2p traffic using application signatures , 2004, WWW '04.
[53] Andrea De Lucia,et al. Understanding function behaviors through program slicing , 1996, WPC '96. 4th Workshop on Program Comprehension.
[54] Thomas M. Pigoski. Practical Software Maintenance: Best Practices for Managing Your Software Investment , 1996 .
[55] Matthias Schumann,et al. RFID – Radio Frequency Identification , 2008, Informatik-Spektrum.
[56] Beulah Rudner. Construction of minimum-redundance codes with an optimum synchronizing property , 1971, IEEE Trans. Inf. Theory.
[57] Donghun Yoon. The trend and user behaviors of Japan's IC-Card system , 2009, 2009 International Waveform Diversity and Design Conference.
[58] Frank Thornton. How to Cheat at Deploying and Securing RFID , 2007 .
[59] Mark R. Titchener. The synchronization of variable-length codes , 1997, IEEE Trans. Inf. Theory.
[60] Carey L. Williamson,et al. Identifying and discriminating between web and peer-to-peer traffic in the network core , 2007, WWW '07.
[61] E. Rogers. New Product Adoption and Diffusion , 1976 .
[62] Damith C. Ranasinghe,et al. Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting , 2010 .
[63] Rebecca Grant,et al. Implementing Computer Technology in Educational Settings , 1991 .
[64] Michalis Faloutsos,et al. Is P2P dying or just hiding? [P2P traffic measurement] , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[65] A. Simpson,et al. Using CSP to model the synchronisation process of variable length codes , 2006 .
[66] UKMalcolm. Munro. Program Comprehension in a Reuse Reengineering Environment , 1995 .
[67] Robin Kravets,et al. Application‐driven power management for mobile communication , 2000, Wirel. Networks.
[68] David Parry,et al. Auto-Identification and Ubiquitous Computing Applications , 2009 .
[69] Arun Rai,et al. Propagating CASE usage for software development: An empirical investigation of key organizational correlates , 1994 .
[70] Mikel Izal,et al. Dissecting BitTorrent: Five Months in a Torrent's Lifetime , 2004, PAM.
[71] C. A. R. Hoare,et al. Communicating Sequential Processes (Reprint) , 1983, Commun. ACM.
[72] Weisong Shi,et al. Non-commercial Research and Educational Use including without Limitation Use in Instruction at Your Institution, Sending It to Specific Colleagues That You Know, and Providing a Copy to Your Institution's Administrator. All Other Uses, Reproduction and Distribution, including without Limitation Comm , 2022 .
[73] Mark Weiser,et al. Programmers use slices when debugging , 1982, CACM.
[74] Randy Frank. Understanding Smart Sensors , 1995 .
[75] Mark Harman,et al. A survey of empirical results on program slicing , 2004, Adv. Comput..