Sciweavers

815 search results - page 73 / 163
» Using non-functional requirements to systematically support ...
Sort
View
SCAM
2003
IEEE
14 years 2 months ago
Managing Multi-Billion Dollar IT Budgets using Source Code Analysis
We present a quantitative approach for IT portfolio management. This is an approach that CMM level 1 organizations can use to obtain a corporate wide impression of the state of th...
Chris Verhoef
COMCOM
2007
115views more  COMCOM 2007»
13 years 9 months ago
New bluetooth interconnection methods: Overlaid Bluetooth Piconets (OBP) and Temporary Scatternets (TS)
In a large scale Bluetooth network, the permanent Scatternet is regarded as the only method to interconnect Piconets. But, many Bluetooth devices do not support Scatternet. When t...
Sewook Jung, Alexander Chang, Mario Gerla
IPCCC
2005
IEEE
14 years 2 months ago
DualRTT: detecting spurious timeouts in wireless mobile environments
Abstract— Retransmission ambiguity, arising from delay spikes in a wireless mobile environment, results in poor TCP performance. Eifel improves the performance of TCP by using th...
Shaojian Fu, Mohammed Atiquzzaman
KDD
2008
ACM
138views Data Mining» more  KDD 2008»
14 years 9 months ago
Quantitative evaluation of approximate frequent pattern mining algorithms
Traditional association mining algorithms use a strict definition of support that requires every item in a frequent itemset to occur in each supporting transaction. In real-life d...
Rohit Gupta, Gang Fang, Blayne Field, Michael Stei...
INFOCOM
2005
IEEE
14 years 2 months ago
Bounding the power rate function of wireless ad hoc networks
Abstract— Given a wireless ad hoc network and an endto-end traffic pattern, the power rate function refers to the minimum total power required to support different throughput un...
Yunnan Wu, Qian Zhang, Wenwu Zhu, Sun-Yuan Kung