Sciweavers

14670 search results - page 2852 / 2934
» The Systems Modeling Language for Products and Systems Devel...
Sort
View
ICDM
2006
IEEE
176views Data Mining» more  ICDM 2006»
14 years 2 months ago
Razor: mining distance-constrained embedded subtrees
Due to their capability for expressing semantics and relationships among data objects, semi-structured documents have become a common way of representing domain knowledge. Compari...
Henry Tan, Tharam S. Dillon, Fedja Hadzic, Elizabe...
LCN
2006
IEEE
14 years 2 months ago
Performance Limits and Analysis of Contention-based IEEE 802.11 MAC
— Recent advance in IEEE 802.11 based standard has pushed the wireless bandwidth up to 600Mbps while keeping the same wireless medium access control (MAC) schemes for full backwa...
Shao-Cheng Wang, Ahmed Helmy
NOSSDAV
2005
Springer
14 years 1 months ago
Real-time monitoring of video quality in IP networks
This paper investigates the problem of assessing the quality of video transmitted over IP networks. Our goal is to develop a methodology that is both reasonably accurate and simpl...
Shu Tao, John G. Apostolopoulos, Roch Guéri...
HICSS
2002
IEEE
106views Biometrics» more  HICSS 2002»
14 years 1 months ago
Satisfaction with Internet-Based Services
: This research develops, operationalizes, and empirically tests a model for explaining/predicting the satisfaction of customers with Internet-based services in the context of an o...
Mohamed Khalifa, Vanessa Liu
IWDC
2001
Springer
101views Communications» more  IWDC 2001»
14 years 18 days ago
Resource Stealing in Endpoint Controlled Multi-class Networks
Abstract. Endpoint admission control is a mechanism for achieving scalable services by pushing quality-of-service functionality to end hosts. In particular, hosts probe the network...
Susana Sargento, Rui Valadas, Edward W. Knightly
« Prev « First page 2852 / 2934 Last » Next »