Sciweavers

13895 search results - page 2455 / 2779
» Exploring
Sort
View
IMC
2006
ACM
15 years 10 months ago
Semi-automated discovery of application session structure
While the problem of analyzing network traffic at the granularity of individual connections has seen considerable previous work and tool development, understanding traffic at a ...
Jayanthkumar Kannan, Jaeyeon Jung, Vern Paxson, Ca...
IMC
2006
ACM
15 years 10 months ago
Understanding churn in peer-to-peer networks
The dynamics of peer participation, or churn, are an inherent property of Peer-to-Peer (P2P) systems and critical for design and evaluation. Accurately characterizing churn requir...
Daniel Stutzbach, Reza Rejaie
ISLPED
2006
ACM
117views Hardware» more  ISLPED 2006»
15 years 10 months ago
Energy/power breakdown of pipelined nanometer caches (90nm/65nm/45nm/32nm)
As transistors continue to scale down into the nanometer regime, device leakage currents are becoming the dominant cause of power dissipation in nanometer caches, making it essent...
Samuel Rodríguez, Bruce L. Jacob
ITICSE
2006
ACM
15 years 10 months ago
Implementing the jigsaw model in CS1 closed labs
We apply the Jigsaw cooperative learning model to our CS1 closed labs. The Jigsaw cooperative learning model assigns students into main groups in which each group member is respon...
Leen-Kiat Soh
ITICSE
2006
ACM
15 years 10 months ago
Gender gap in computer science does not exist in one former soviet republic: results of a study
It is well known that women’s involvement in the field of Computer Science is very low in the USA. This is viewed as a significant problem and has become a great concern to educ...
Hasmik Gharibyan, Stephan Gunsaulus
« Prev « First page 2455 / 2779 Last » Next »