Sciweavers

1122 search results - page 222 / 225
» Behavioral Extensions of Institutions
Sort
View
ICDM
2010
IEEE
115views Data Mining» more  ICDM 2010»
13 years 5 months ago
Polishing the Right Apple: Anytime Classification Also Benefits Data Streams with Constant Arrival Times
Classification of items taken from data streams requires algorithms that operate in time sensitive and computationally constrained environments. Often, the available time for class...
Jin Shieh, Eamonn J. Keogh
IMC
2010
ACM
13 years 5 months ago
Internet background radiation revisited
The monitoring of packets destined for reachable, yet unused, Internet addresses has proven to be a useful technique for measuring a variety of specific Internet phenomenon (e.g.,...
Eric Wustrow, Manish Karir, Michael Bailey, Farnam...
TMA
2010
Springer
120views Management» more  TMA 2010»
13 years 5 months ago
DeSRTO: An Effective Algorithm for SRTO Detection in TCP Connections
Spurious Retransmission Timeouts in TCP connections have been extensively studied in the scientific literature, particularly for their relevance in cellular mobile networks. At the...
Antonio Barbuzzi, Gennaro Boggia, Luigi Alfredo Gr...
ECBS
2009
IEEE
193views Hardware» more  ECBS 2009»
13 years 5 months ago
CQML: Aspect-Oriented Modeling for Modularizing and Weaving QoS Concerns in Component-Based Systems
Current domain-specific modeling (DSM) frameworks for designing component-based systems often consider the system's structural and behavioral concerns as the two dominant con...
Sumant Tambe, Akshay Dabholkar, Aniruddha S. Gokha...
ICFEM
2009
Springer
13 years 5 months ago
Graded-CTL: Satisfiability and Symbolic Model Checking
In this paper we continue the study of a strict extension of the Computation Tree Logic, called graded-CTL, recently introduced by the same authors. This new logic augments the sta...
Alessandro Ferrante, Margherita Napoli, Mimmo Pare...