Sciweavers

1076 search results - page 97 / 216
» Quantifying WiMAX Performance
Sort
View
ICEB
2004
175views Business» more  ICEB 2004»
13 years 10 months ago
Privacy-Preserving Data Mining in Electronic Surveys
Electronic surveys are an important resource in data mining. However, how to protect respondents' data privacy during the survey is a challenge to the security and privacy co...
Justin Z. Zhan, Stan Matwin
MASCOTS
2004
13 years 10 months ago
Modeling the Burstiness of TCP
In this paper we investigate the burstiness of the Transmission Control Protocol (TCP) and its impact on a network of finite TCP connections. A detailed TCP and network model is d...
Peter Dimopoulos, Panlop Zeephongsekul, Zahir Tari
NETWORKING
2004
13 years 10 months ago
The Role of Information Update in Flow Control
A common feature of congestion control protocols is the presence of information packets used to signal congestion. We address here the question of how frequently such protocols nee...
Eitan Altman, Tamer Basar, Naceur Malouch
NIPS
2004
13 years 10 months ago
Euclidean Embedding of Co-Occurrence Data
Embedding algorithms search for low dimensional structure in complex data, but most algorithms only handle objects of a single type for which pairwise distances are specified. Thi...
Amir Globerson, Gal Chechik, Fernando C. Pereira, ...
PICS
2001
13 years 10 months ago
Diagnostics for Digital Capture Using MTF
The modulation transfer function (MTF) has long been used as a diagnostic tool for analog image capture, by tracking frequency response caused by aperture, field position, or defo...
Don R. Williams, Peter D. Burns