Sciweavers

625 search results - page 82 / 125
» Semi-preemptive routing on trees
Sort
View
RSFDGRC
2005
Springer
112views Data Mining» more  RSFDGRC 2005»
14 years 2 months ago
Discovering Characteristic Individual Accessing Behaviors in Web Environment
Abstract. Discovering diverse individual accessing behaviors in web environment is required before mining the valuable patterns from behaviors of groups of visitors. In this paper,...
Long Wang 0002, Christoph Meinel, Chunnian Liu
SEKE
2005
Springer
14 years 2 months ago
Recovering Individual Accessing Behaviour from Web Logs
In this paper, we present a new view on the data preparation in web usage mining. We concentrate on recovering individual usage behaviour from accessing records on web site. We de...
Long Wang 0002, Christoph Meinel
SWAT
2004
Springer
120views Algorithms» more  SWAT 2004»
14 years 1 months ago
Railway Delay Management: Exploring Its Algorithmic Complexity
We consider delay management in railway systems. Given delayed trains, we want to find a waiting policy for the connecting trains minimizing the weighted total passenger delay. If...
Michael Gatto, Björn Glaus, Riko Jacob, Leon ...
INFORMS
2008
241views more  INFORMS 2008»
13 years 8 months ago
Solving the Capacitated Local Access Network Design Problem
We propose an exact solution method for a routing and capacity installation problem in networks. Given an input graph, the problem is to route traffic from a set of source nodes t...
F. Sibel Salman, R. Ravi, John N. Hooker
ISPA
2005
Springer
14 years 2 months ago
Ethernet as a Lossless Deadlock Free System Area Network
The way conventional Ethernet is used today differs in two aspects from how dedicated system area networks are used. Firstly, dedicated system area networks are lossless and only d...
Sven-Arne Reinemo, Tor Skeie