Sciweavers

1683 search results - page 82 / 337
» A Needed Narrowing Strategy
Sort
View
INFOCOM
2011
IEEE
13 years 1 months ago
Privacy analysis of user association logs in a large-scale wireless LAN
User association logs collected from a large-scale wireless LAN record where and when a user has used the network. Such information plays an important role in wireless network res...
Keren Tan, Guanhua Yan, Jihwang Yeo, David Kotz
MOBISYS
2011
ACM
13 years 24 days ago
AccuLoc: practical localization of performance measurements in 3G networks
Operators of 3G data networks need to distinguish the performance of each geographic area in their 3G networks to detect and resolve local network problems. This is because the qu...
Qiang Xu, Alexandre Gerber, Zhuoqing Morley Mao, J...
KES
2004
Springer
14 years 3 months ago
ADS as Information Management Service in an M-Learning Environment
Leveraging the potential power of even small handheld devices able to communicate wirelessly requires dedicated support. In particular, collaborative applications need sophisticate...
Matthias R. Brust, Daniel Görgen, Christian H...
CAISE
2006
Springer
14 years 1 months ago
Defining Requirements for Business Process Flexibility
The recent work on business process flexibility focuses primarily on defining and classifying business process flexibility and developing strategies, architectures, and tactics for...
Kuldeep Kumar, Murali Mohan Narasipuram
COMAD
2008
13 years 11 months ago
Runtime Optimization of Continuous Queries
In data stream processing systems, Quality of Service (or QoS) requirements, as specified by users, are extremely important. Unlike in a database management system (DBMS), a query...
Balakumar Kendai, Sharma Chakravarthy