Sciweavers

1517 search results - page 287 / 304
» Time and Location Based Services with Access Control
Sort
View
ICDM
2008
IEEE
186views Data Mining» more  ICDM 2008»
14 years 3 months ago
xCrawl: A High-Recall Crawling Method for Web Mining
Web Mining Systems exploit the redundancy of data published on the Web to automatically extract information from existing web documents. The first step in the Information Extract...
Kostyantyn M. Shchekotykhin, Dietmar Jannach, Gerh...
LEGE
2003
94views Education» more  LEGE 2003»
13 years 10 months ago
Dynamic Learning Agents and Enhanced Presence on the Grid
Human Learning on the Grid will be based on the synergies between advanced software and Human agents. These synergies will be possible to the extent that conversational protocols ...
Stefano A. Cerri, Marc Eisenstadt, Clement Jonquet
ICC
2007
IEEE
129views Communications» more  ICC 2007»
14 years 3 months ago
Performance Evaluation of CDMA Cellular Systems Considering both the Soft Capacity Constraint and Users' Smooth Random Mobility
— A new call admission control (CAC) strategy based on the soft capacity constraint (SCC) concept is proposed for CDMA cellular systems. The use of the SCC concept allows maximiz...
Carmen B. Rodríguez-Estrello, Felipe A. Cru...
RTAS
2006
IEEE
14 years 2 months ago
Impact of Upper Layer Adaptation on End-to-end Delay Management in Wireless Ad Hoc Networks
A good amount of research has been developed to support QoS issues in IEEE 802.11 ad hoc networks, such as QoS routing, MAC layer QoS support, and cross-layer QoS design. However,...
Wenbo He, Klara Nahrstedt
CCGRID
2005
IEEE
14 years 2 months ago
Logistical multicast for data distribution
This paper describes a simple scheduling procedure for use in multicast data distribution within a logistical networking infrastructure. The goal of our scheduler is to generate a...
Jason Zurawski, D. Martin Swany, Micah Beck, Ying ...