Sciweavers

70 search results - page 9 / 14
» Understanding the Limitations of Causally and Totally Ordere...
Sort
View
SEMWEB
2007
Springer
14 years 3 months ago
mle: Enhancing the Exploration of Mailing List Archives Through Making Semantics Explicit
Following and understanding discussions on mailing lists is a prevalent task for executives and policy makers in order to get an impression of one’s company image. However, exist...
Michael Hausenblas, Herwig Rehatschek
CSREASAM
2006
13 years 10 months ago
A Visual Environment for Characterization of State Changes in Computer Systems
: Traditional state modeling techniques have several limitations. One of these is the reduced ability to model a large number of variables simultaneously. Another limitation is tha...
Gregory Vert, Sergiu M. Dascalu, Frederick C. Harr...
EUROPAR
2007
Springer
14 years 3 months ago
On the Connectivity of Bluetooth-Based Ad Hoc Networks
We study the connectivity properties of a family of random graphs which closely model the Bluetooth’s device discovery process, where each device tries to connect to other device...
Pilu Crescenzi, Carlo Nocentini, Andrea Pietracapr...
INFOCOM
1996
IEEE
14 years 1 months ago
Maintaining High Throughput during Overload in ATM Switches
This report analyzes two popular heuristics for ensuring packet integrity in ATM switching systems. In particular, we analyze the behavior of packet tail discarding, in order to u...
Jonathan S. Turner
ISCC
2007
IEEE
136views Communications» more  ISCC 2007»
14 years 3 months ago
Analysis of the IPv4 Address Space Delegation Structure
The Internet has grown tremendously in terms of the number of users who rely on it and the number of organizations that are connected to it. Characterizing how this growth affects...
Anusha Sriraman, Kevin R. B. Butler, Patrick Drew ...