Sciweavers

2162 search results - page 82 / 433
» E-Crime Investigative Technologies
Sort
View
INFOCOM
2010
IEEE
13 years 8 months ago
Pricing under Constraints in Access Networks: Revenue Maximization and Congestion Management
Abstract—This paper investigates pricing of Internet connectivity services in the context of a monopoly ISP selling broadband access to consumers. We first study the optimal com...
Prashanth Hande, Mung Chiang, A. Robert Calderbank...
IPPS
2010
IEEE
13 years 7 months ago
Clustering JVMs with software transactional memory support
Affordable transparent clustering solutions to scale non-HPC applications on commodity clusters (such as Terracotta) are emerging for Java Virtual Machines (JVMs). Working in this ...
Christos Kotselidis, Mikel Luján, Mohammad ...
IJAC
2011
13 years 1 months ago
The Subword Reversing Method
We summarize the main known results involving subword reversing, a method of semigroup theory for constructing van Kampen diagrams by referring to a preferred direction. In good ca...
Patrick Dehornoy
PERVASIVE
2007
Springer
14 years 3 months ago
Assessing the Suitability of Context Information for Ambient Display
With the advance of pervasive technology, information from both the physical and virtual world is increasingly accessible to developers. Context -aware applications may consume re...
Steve Neely, Graeme Stevenson, Paddy Nixon
AH
2000
Springer
14 years 2 months ago
A Connectionist Approach for Supporting Personalized Learning in a Web-Based Learning Environment
The paper investigates the use of computational intelligence for adaptive lesson presentation in a Web-based learning environment. A specialized connectionist architecture is devel...
Kyparisia A. Papanikolaou, George D. Magoulas, Mar...