Results 1 - 10
of
13,556
Effects with Random Assignment: Results for Dartmouth Roommates
, 2001
"... This paper uses a unique data set to measure peer effects among college roommates. Freshman year roommates and dormmates are randomly assigned at Dartmouth College. I find that peers have an impact on grade point average and on decisions to join social groups such as fraternities. Residential peer e ..."
Abstract
-
Cited by 554 (6 self)
- Add to MetaCart
This paper uses a unique data set to measure peer effects among college roommates. Freshman year roommates and dormmates are randomly assigned at Dartmouth College. I find that peers have an impact on grade point average and on decisions to join social groups such as fraternities. Residential peer
Modeling and performance analysis of bittorrentlike peer-to-peer networks
- In SIGCOMM
, 2004
"... In this paper, we develop simple models to study the performance of BitTorrent, a second generation peerto-peer (P2P) application. We first present a simple fluid model and study the scalability, performance and efficiency of such a file-sharing mechanism. We then consider the built-in incentive mec ..."
Abstract
-
Cited by 574 (3 self)
- Add to MetaCart
In this paper, we develop simple models to study the performance of BitTorrent, a second generation peerto-peer (P2P) application. We first present a simple fluid model and study the scalability, performance and efficiency of such a file-sharing mechanism. We then consider the built-in incentive
MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks
- In Proc. IEEE INFOCOM
, 2006
"... Abstract — Disruption-tolerant networks (DTNs) attempt to route network messages via intermittently connected nodes. Routing in such environments is difficult because peers have little information about the state of the partitioned network and transfer opportunities between peers are of limited dura ..."
Abstract
-
Cited by 488 (12 self)
- Add to MetaCart
duration. In this paper, we propose MaxProp, a protocol for effective routing of DTN messages. MaxProp is based on prioritizing both the schedule of packets transmitted to other peers and the schedule of packets to be dropped. These priorities are based on the path likelihoods to peers according
Intrusion Detection in Wireless Ad-Hoc Networks
, 2000
"... As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized ..."
Abstract
-
Cited by 415 (4 self)
- Add to MetaCart
of centralized monitoring and management point, and lack of a clear line of defense. Many of the intrusion detection techniques developed on a xed wired network are not applicable in this new environment. How to do it dierently and effectively is a challenging research problem. In this paper, we rst examine
Replication Strategies in Unstructured Peer-to-Peer Networks
, 2002
"... The Peer-to-Peer (P2P) architectures that are most prevalent in today's Internet are decentralized and unstructured. Search is blind in that it is independent of the query and is thus not more effective than probing randomly chosen peers. One technique to improve the effectiveness of blind sear ..."
Abstract
-
Cited by 324 (6 self)
- Add to MetaCart
The Peer-to-Peer (P2P) architectures that are most prevalent in today's Internet are decentralized and unstructured. Search is blind in that it is independent of the query and is thus not more effective than probing randomly chosen peers. One technique to improve the effectiveness of blind
Peer Effects in the Classroom: Learning from Gender and Race Variation
, 2000
"... Peer effects are potentially important for understanding the optimal organization of schools, jobs, and neighborhoods, but finding evidence is difficult because people are selected into peer groups based, in part, on their unobservable characteristics. I identify the effects of peers whom a child en ..."
Abstract
-
Cited by 335 (4 self)
- Add to MetaCart
Peer effects are potentially important for understanding the optimal organization of schools, jobs, and neighborhoods, but finding evidence is difficult because people are selected into peer groups based, in part, on their unobservable characteristics. I identify the effects of peers whom a child
ZIGZAG: An efficient peer-to-peer scheme for media streaming
- IN PROC. OF IEEE INFOCOM
, 2003
"... We design a peer-to-peer technique called ZIGZAG for single-source media streaming. ZIGZAG allows the media server to distribute content to many clients by organizing them into an appropriate tree rooted at the server. This applicationlayer multicast tree has a height logarithmic with the number o ..."
Abstract
-
Cited by 279 (5 self)
- Add to MetaCart
We design a peer-to-peer technique called ZIGZAG for single-source media streaming. ZIGZAG allows the media server to distribute content to many clients by organizing them into an appropriate tree rooted at the server. This applicationlayer multicast tree has a height logarithmic with the number
The Neighborhoods They Live In: The Effects of Neighborhood Residence on Child and Adolescent Outcomes
- Psychological Bulletin
, 2000
"... This article provides a comprehensive review of research on the effects of neighborhood residence on child and adolescent well-being. The first section reviews key methodological issues. The following section considers links between neighborhood characteristics and child outcomes and suggests the im ..."
Abstract
-
Cited by 309 (10 self)
- Add to MetaCart
This article provides a comprehensive review of research on the effects of neighborhood residence on child and adolescent well-being. The first section reviews key methodological issues. The following section considers links between neighborhood characteristics and child outcomes and suggests
Sybilguard: Defending against sybil attacks via social networks
- In ACM SIGCOMM ’06
, 2006
"... Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities and pretends to be multiple, distinct nodes in the system. By controlling a large fraction of the nodes in the syst ..."
Abstract
-
Cited by 331 (6 self)
- Add to MetaCart
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities and pretends to be multiple, distinct nodes in the system. By controlling a large fraction of the nodes
The gender difference of peer influence in higher education”,
- Economics of Education Review,
, 2009
"... a b s t r a c t Investigations of the existence of residential peer effects in higher education has shown mixed results. Using data from a Chinese college, we find no evidence of robust residential peer effects. Using the same data we find evidence that females respond to peer influences, whereas m ..."
Abstract
-
Cited by 12 (0 self)
- Add to MetaCart
a b s t r a c t Investigations of the existence of residential peer effects in higher education has shown mixed results. Using data from a Chinese college, we find no evidence of robust residential peer effects. Using the same data we find evidence that females respond to peer influences, whereas
Results 1 - 10
of
13,556