Sciweavers

343 search results - page 53 / 69
» User experience evaluation: do you know which method to use
Sort
View
ICDE
2008
IEEE
148views Database» more  ICDE 2008»
14 years 2 months ago
Automated physical design in database caches
Abstract— Performance of proxy caches for database federations that serve a large number of users is crucially dependent on its physical design. Current techniques, automated or ...
Tanu Malik, Xiaodan Wang, Randal C. Burns, Debabra...
MMB
1999
Springer
249views Communications» more  MMB 1999»
14 years 3 days ago
A Development Platform for the Design and Optimization of Mobile Radio Networks
The rapidly increasing traffic demand from mobile users forces network operators and service providers to extend and optimize existing networks as well as to plan entirely new mo...
Jürgen Deissner, Gerhard Fettweis, Jörg ...
WOWMOM
2005
ACM
129views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
The Wireless Hierarchical Token Bucket: A Channel Aware Scheduler for 802.11 Networks
The paper proposes an architecture for a scheduling algorithm, to be integrated in IEEE 802.11 Access Points (AP), able to take into account, besides the transport service class r...
Rosario Giuseppe Garroppo, Stefano Giordano, Stefa...
QEST
2006
IEEE
14 years 1 months ago
Exploring correctness and accuracy of solutions to matrix polynomial equations in queues
Spectral expansion and matrix analytic methods are important solution mechanisms for matrix polynomial equations. These equations are encountered in the steady-state analysis of M...
David Thornley, Harf Zatschler
ICMLA
2008
13 years 9 months ago
Comparison with Parametric Optimization in Credit Card Fraud Detection
We apply five classification methods, Neural Nets(NN), Bayesian Nets(BN), Naive Bayes(NB), Artificial Immune Systems(AIS) [4] and Decision Trees(DT), to credit card fraud detectio...
Manoel Fernando Alonso Gadi, Xidi Wang, Alair Pere...