Sciweavers

5722 search results - page 1099 / 1145
» Security Function Interactions
Sort
View
ICC
2008
IEEE
14 years 4 months ago
GORA: Goodput Optimal Rate Adaptation for 802.11 Using Medium Status Estimation
Abstract—Rate Adaptation for 802.11 has been deeply investigated in the past, but the problem of achieving optimal Rate Adaptation with respect not only to channel-related errors...
Nicola Baldo, Federico Maguolo, Simone Merlin, And...
AH
2008
Springer
14 years 4 months ago
A Validation Framework for Formal Models in Adaptive Work-Integrated Learning
The focus of my thesis is on the development of a multi-method framework for the validation of formal models (domain model, user model, and teaching model) for adaptive work-integr...
Barbara Kump
BIBM
2007
IEEE
137views Bioinformatics» more  BIBM 2007»
14 years 4 months ago
A Multi-metric Similarity Based Analysis of Microarray Data
Clustering has been shown to be effective in analyzing functional relationships of genes. However, no single clustering method with single distance metric is capable of capturing ...
Fatih Altiparmak, Selnur Erdal, Ozgur Ozturk, Haka...
CGO
2007
IEEE
14 years 4 months ago
Microarchitecture Sensitive Empirical Models for Compiler Optimizations
This paper proposes the use of empirical modeling techniques for building microarchitecture sensitive models for compiler optimizations. The models we build relate program perform...
Kapil Vaswani, Matthew J. Thazhuthaveetil, Y. N. S...
ICEBE
2007
IEEE
126views Business» more  ICEBE 2007»
14 years 4 months ago
Consumer-Centric Web Services Discovery and Subscription
Nowadays, there are a number of similar web services over the internet or intranet. They provide consumers with more choices according to their personalized QoS requirements. Howe...
Xuanzhe Liu, Li Zhou, Gang Huang, Hong Mei
« Prev « First page 1099 / 1145 Last » Next »