Sciweavers

2940 search results - page 522 / 588
» Behavioral Constraints for Services
Sort
View
CCGRID
2005
IEEE
14 years 1 months ago
Performance evaluation of JXTA communication layers
— The arrival of the P2P model has opened many new avenues for research within the field of distributed computing. This is mainly due to important practical features (such as su...
Gabriel Antoniu, Philip J. Hatcher, Mathieu Jan, D...
QEST
2005
IEEE
14 years 1 months ago
Workload Propagation - Overload in Bursty Servers
Internet servers are developing into complex but central components in the information infrastructure and are accessed by an ever-increasing and diversified user population. As s...
Qi Zhang, Alma Riska, Erik Riedel
ICCSA
2005
Springer
14 years 1 months ago
Reflective Middleware for Location-Aware Application Adaptation
Today mobile computing is pervasively taking over the traditional desktop computing. Mobile devices are characterized by abrupt and unannounced changes in execution context. The ap...
Uzair Ahmad, S. Y. Lee, Mahrin Iqbal, Uzma Nasir, ...
HICSS
2003
IEEE
214views Biometrics» more  HICSS 2003»
14 years 1 months ago
An Event Driven Approach to Customer Relationship Management in e-Brokerage Industry
Customer Relationship Management (CRM) is critical to the success of a business. Recent work in CRM has focused on the mining of customer-related data and the construction of cust...
Dickson K. W. Chiu, Wesley C. W. Chan, Gary K. W. ...
MMB
2010
Springer
194views Communications» more  MMB 2010»
14 years 19 days ago
Searching for Tight Performance Bounds in Feed-Forward Networks
Abstract. Computing tight performance bounds in feed-forward networks under general assumptions about arrival and server models has turned out to be a challenging problem. Recently...
Andreas Kiefer, Nicos Gollan, Jens B. Schmitt