Sciweavers

6198 search results - page 1064 / 1240
» Multi-Paradigm Process Management
Sort
View
112
Voted
INFOSCALE
2007
ACM
15 years 4 months ago
A model-based WiFi localization method
—Due to the proliferation of WiFi access points, indoor localization methods based on WiFi signal strengths are becoming more and more attractive because they don’t require add...
Dik Lun Lee, Qiuxia Chen
125
Voted
ISSRE
2007
IEEE
15 years 4 months ago
Data Mining Techniques for Building Fault-proneness Models in Telecom Java Software
This paper describes a study performed in an industrial setting that attempts to build predictive models to identify parts of a Java system with a high probability of fault. The s...
Erik Arisholm, Lionel C. Briand, Magnus Fuglerud
150
Voted
ACSW
2007
15 years 4 months ago
A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based Services
Over the past years Mobile Business has gained significant progress not only because of higher transfer rates as well as advanced processing power and memory capabilities of netw...
Oliver Jorns, Gerald Quirchmayr, Oliver Jung
CASCON
2008
111views Education» more  CASCON 2008»
15 years 4 months ago
DBMS workload control using throttling: experimental insights
Today's database management systems (DBMSs) are required to handle diverse, mixed workloads and to provide differentiated levels of service to ensure that critical work takes...
Wendy Powley, Patrick Martin, Paul Bird
142
Voted
COMAD
2008
15 years 4 months ago
Concurrency Control in Distributed MRA Index Structure
Answering aggregate queries like sum, count, min, max over regions containing moving objects is often needed for virtual world applications, real-time monitoring systems, etc. Sin...
Neha Singh, S. Sudarshan
« Prev « First page 1064 / 1240 Last » Next »