Sciweavers

146 search results - page 19 / 30
» Determining model accuracy of network traces
Sort
View
EDBT
2002
ACM
159views Database» more  EDBT 2002»
14 years 7 months ago
Cut-and-Pick Transactions for Proxy Log Mining
Web logs collected by proxy servers, referred to as proxy logs or proxy traces, contain information about Web document accesses by many users against many Web sites. This "man...
Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang
ICCCN
1997
IEEE
13 years 11 months ago
Time dependent priority scheduling for guaranteed QoS systems
With the advances in server technology, and the advent of fast Gigabit networks, it has become possible to support multi-media applications. To support the requirements for the tr...
Shailender Chaudhry, Alok N. Choudhary
IUI
2004
ACM
14 years 25 days ago
Sheepdog: learning procedures for technical support
Technical support procedures are typically very complex. Users often have trouble following printed instructions describing how to perform these procedures, and these instructions...
Tessa A. Lau, Lawrence D. Bergman, Vittorio Castel...
LOCA
2005
Springer
14 years 27 days ago
Classifying the Mobility of Users and the Popularity of Access Points
Abstract. There is increasing interest in location-aware systems and applications. It is important for any designer of such systems and applications to understand the nature of use...
Minkyong Kim, David Kotz
INFOCOM
2008
IEEE
14 years 1 months ago
Wireless Medium Access via Adaptive Backoff: Delay and Loss Minimization
— We consider packet transmission scheduling at the MAC-layer via adaptive backoff algorithms that are favorable in terms of queue occupancies in a wireless network. General netw...
Gardar Hauksson, Murat Alanyali