Sciweavers

42388 search results - page 8414 / 8478
» Classification Using Information
Sort
View
CN
2007
98views more  CN 2007»
13 years 10 months ago
Analysis of point-to-point packet delay in an operational network
— In this paper we perform a detailed analysis of point-to-point packet delay in an operational tier-1 network. The point-to-point delay is the time between a packet entering a r...
Baek-Young Choi, Sue B. Moon, Zhi-Li Zhang, Konsta...
CN
2007
111views more  CN 2007»
13 years 10 months ago
An auction mechanism for allocating the bandwidth of networks to their users
We present a mechanism for auctioning bandwidth on a network-wide basis to end users or ISPs that will utilize it for the same time period. This mechanism consists of a set of sim...
Manos Dramitinos, George D. Stamoulis, Costas Cour...
IS
2008
13 years 10 months ago
Conformance checking of processes based on monitoring real behavior
Many companies have adopted Process-aware Information Systems (PAIS) to support their business processes in some form. On the one hand these systems typically log events (e.g., in ...
Anne Rozinat, Wil M. P. van der Aalst
COMCOM
2007
82views more  COMCOM 2007»
13 years 10 months ago
On application-level load balancing in FastReplica
— In the paper, we consider the problem of distributing large-size content to a fixed set of nodes. In contrast with the most existing end-system solutions to this problem, Fast...
Jangwon Lee, Gustavo de Veciana
ISCI
2008
166views more  ISCI 2008»
13 years 10 months ago
Incremental and interactive mining of web traversal patterns
Web mining involves the application of data mining techniques to large amounts of web-related data in order to improve web services. Web traversal pattern mining involves discover...
Yue-Shi Lee, Show-Jane Yen
« Prev « First page 8414 / 8478 Last » Next »