Sciweavers

240 search results - page 19 / 48
» Improving cooperation in peer-to-peer systems using social n...
Sort
View
AEI
2007
119views more  AEI 2007»
13 years 7 months ago
Exploring the CSCW spectrum using process mining
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
Wil M. P. van der Aalst
JSAC
2007
142views more  JSAC 2007»
13 years 7 months ago
Non-Cooperative Resource Competition Game by Virtual Referee in Multi-Cell OFDMA Networks
— In this paper, a distributive non-cooperative game is proposed to perform sub-channel assignment, adaptive modulation, and power control for multi-cell multi-user Orthogonal Fr...
Zhu Han, Zhu Ji, K. J. Ray Liu
BPM
2004
Springer
167views Business» more  BPM 2004»
14 years 27 days ago
Mining Social Networks: Uncovering Interaction Patterns in Business Processes
Increasingly information systems log historic information in a systematic way. Workflow management systems, but also ERP, CRM, SCM, and B2B systems often provide a so-called “ev...
Wil M. P. van der Aalst, Minseok Song
TPDS
2010
194views more  TPDS 2010»
13 years 5 months ago
On the Benefits of Cooperative Proxy Caching for Peer-to-Peer Traffic
—This paper analyzes the potential of cooperative proxy caching for peer-to-peer (P2P) traffic as a means to ease the burden imposed by P2P traffic on Internet Service Providers ...
Mohamed Hefeeda, Behrooz Noorizadeh
ICDM
2007
IEEE
198views Data Mining» more  ICDM 2007»
14 years 1 months ago
Social Network Extraction of Academic Researchers
This paper addresses the issue of extraction of an academic researcher social network. By researcher social network extraction, we are aimed at finding, extracting, and fusing the...
Jie Tang, Duo Zhang, Limin Yao