• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 13,556
Next 10 →

Effects with Random Assignment: Results for Dartmouth Roommates

by Bruce Sacerdote , 2001
"... This paper uses a unique data set to measure peer effects among college roommates. Freshman year roommates and dormmates are randomly assigned at Dartmouth College. I find that peers have an impact on grade point average and on decisions to join social groups such as fraternities. Residential peer e ..."
Abstract - Cited by 554 (6 self) - Add to MetaCart
This paper uses a unique data set to measure peer effects among college roommates. Freshman year roommates and dormmates are randomly assigned at Dartmouth College. I find that peers have an impact on grade point average and on decisions to join social groups such as fraternities. Residential peer

Modeling and performance analysis of bittorrentlike peer-to-peer networks

by Dongyu Qiu, R. Srikant - In SIGCOMM , 2004
"... In this paper, we develop simple models to study the performance of BitTorrent, a second generation peerto-peer (P2P) application. We first present a simple fluid model and study the scalability, performance and efficiency of such a file-sharing mechanism. We then consider the built-in incentive mec ..."
Abstract - Cited by 574 (3 self) - Add to MetaCart
In this paper, we develop simple models to study the performance of BitTorrent, a second generation peerto-peer (P2P) application. We first present a simple fluid model and study the scalability, performance and efficiency of such a file-sharing mechanism. We then consider the built-in incentive

MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks

by John Burgess, Brian Gallagher, David Jensen, Brian Neil Levine - In Proc. IEEE INFOCOM , 2006
"... Abstract — Disruption-tolerant networks (DTNs) attempt to route network messages via intermittently connected nodes. Routing in such environments is difficult because peers have little information about the state of the partitioned network and transfer opportunities between peers are of limited dura ..."
Abstract - Cited by 488 (12 self) - Add to MetaCart
duration. In this paper, we propose MaxProp, a protocol for effective routing of DTN messages. MaxProp is based on prioritizing both the schedule of packets transmitted to other peers and the schedule of packets to be dropped. These priorities are based on the path likelihoods to peers according

Intrusion Detection in Wireless Ad-Hoc Networks

by Yongguang Zhang, Wenke Lee , 2000
"... As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized ..."
Abstract - Cited by 415 (4 self) - Add to MetaCart
of centralized monitoring and management point, and lack of a clear line of defense. Many of the intrusion detection techniques developed on a xed wired network are not applicable in this new environment. How to do it dierently and effectively is a challenging research problem. In this paper, we rst examine

Replication Strategies in Unstructured Peer-to-Peer Networks

by Edith Cohen, Scott Shenker , 2002
"... The Peer-to-Peer (P2P) architectures that are most prevalent in today's Internet are decentralized and unstructured. Search is blind in that it is independent of the query and is thus not more effective than probing randomly chosen peers. One technique to improve the effectiveness of blind sear ..."
Abstract - Cited by 324 (6 self) - Add to MetaCart
The Peer-to-Peer (P2P) architectures that are most prevalent in today's Internet are decentralized and unstructured. Search is blind in that it is independent of the query and is thus not more effective than probing randomly chosen peers. One technique to improve the effectiveness of blind

Peer Effects in the Classroom: Learning from Gender and Race Variation

by Caroline M. Hoxby , 2000
"... Peer effects are potentially important for understanding the optimal organization of schools, jobs, and neighborhoods, but finding evidence is difficult because people are selected into peer groups based, in part, on their unobservable characteristics. I identify the effects of peers whom a child en ..."
Abstract - Cited by 335 (4 self) - Add to MetaCart
Peer effects are potentially important for understanding the optimal organization of schools, jobs, and neighborhoods, but finding evidence is difficult because people are selected into peer groups based, in part, on their unobservable characteristics. I identify the effects of peers whom a child

ZIGZAG: An efficient peer-to-peer scheme for media streaming

by Duc A. Tran, et al. - IN PROC. OF IEEE INFOCOM , 2003
"... We design a peer-to-peer technique called ZIGZAG for single-source media streaming. ZIGZAG allows the media server to distribute content to many clients by organizing them into an appropriate tree rooted at the server. This applicationlayer multicast tree has a height logarithmic with the number o ..."
Abstract - Cited by 279 (5 self) - Add to MetaCart
We design a peer-to-peer technique called ZIGZAG for single-source media streaming. ZIGZAG allows the media server to distribute content to many clients by organizing them into an appropriate tree rooted at the server. This applicationlayer multicast tree has a height logarithmic with the number

The Neighborhoods They Live In: The Effects of Neighborhood Residence on Child and Adolescent Outcomes

by Tama Leventhal, Jeanne Brooks-gunn - Psychological Bulletin , 2000
"... This article provides a comprehensive review of research on the effects of neighborhood residence on child and adolescent well-being. The first section reviews key methodological issues. The following section considers links between neighborhood characteristics and child outcomes and suggests the im ..."
Abstract - Cited by 309 (10 self) - Add to MetaCart
This article provides a comprehensive review of research on the effects of neighborhood residence on child and adolescent well-being. The first section reviews key methodological issues. The following section considers links between neighborhood characteristics and child outcomes and suggests

Sybilguard: Defending against sybil attacks via social networks

by Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman - In ACM SIGCOMM ’06 , 2006
"... Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities and pretends to be multiple, distinct nodes in the system. By controlling a large fraction of the nodes in the syst ..."
Abstract - Cited by 331 (6 self) - Add to MetaCart
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities and pretends to be multiple, distinct nodes in the system. By controlling a large fraction of the nodes

The gender difference of peer influence in higher education”,

by Li Han , Tao Li - Economics of Education Review, , 2009
"... a b s t r a c t Investigations of the existence of residential peer effects in higher education has shown mixed results. Using data from a Chinese college, we find no evidence of robust residential peer effects. Using the same data we find evidence that females respond to peer influences, whereas m ..."
Abstract - Cited by 12 (0 self) - Add to MetaCart
a b s t r a c t Investigations of the existence of residential peer effects in higher education has shown mixed results. Using data from a Chinese college, we find no evidence of robust residential peer effects. Using the same data we find evidence that females respond to peer influences, whereas
Next 10 →
Results 1 - 10 of 13,556
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University