Sciweavers

4276 search results - page 800 / 856
» Techniques for Empirical Validation
Sort
View
MOBIHOC
2009
ACM
14 years 9 months ago
Characterizing the exit process of a non-saturated IEEE 802.11 wireless network
In this paper, we consider a non-saturated IEEE 802.11 based wireless network. We use a three-way fixed point to model the node behavior with Bernoulli packet arrivals and determi...
Punit Rathod, Onkar Dabeer, Abhay Karandikar, Anir...
KDD
2006
ACM
173views Data Mining» more  KDD 2006»
14 years 9 months ago
Robust information-theoretic clustering
How do we find a natural clustering of a real world point set, which contains an unknown number of clusters with different shapes, and which may be contaminated by noise? Most clu...
Christian Böhm, Christos Faloutsos, Claudia P...
KDD
2002
ACM
175views Data Mining» more  KDD 2002»
14 years 9 months ago
Mining product reputations on the Web
Knowing the reputations of your own and/or competitors' products is important for marketing and customer relationship management. It is, however, very costly to collect and a...
Satoshi Morinaga, Kenji Yamanishi, Kenji Tateishi,...
CHI
2007
ACM
14 years 9 months ago
Evaluating experience-focused HCI
A growing trend in the field is the development of experience-focused HCI, which emphasizes the experience of using the technology, rather than the focus on the task that is chara...
Joseph Kaye
HPCA
2006
IEEE
14 years 9 months ago
Completely verifying memory consistency of test program executions
An important means of validating the design of commercial-grade shared memory multiprocessors is to run a large number of pseudo-random test programs on them. However, when intent...
Chaiyasit Manovit, Sudheendra Hangal