Sciweavers

633 search results - page 42 / 127
» What's in a Service
Sort
View
MANSCI
2008
62views more  MANSCI 2008»
13 years 10 months ago
Service-Level Agreements in Call Centers: Perils and Prescriptions
A call center with both contract and non-contract customers was giving priority to the contract customers only in off-peak hours, precisely when having priority was least importan...
Joseph M. Milner, Tava Lennon Olsen
GIS
2009
ACM
13 years 7 months ago
LBS (k, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users
We propose a location-based query anonymization technique, LBS (k,T)-anonymization, that ensures anonymity of user's query in a specific time window against what we call know...
Amirreza Masoumzadeh, James Joshi, Hassan A. Karim...
MMNS
2007
133views Multimedia» more  MMNS 2007»
13 years 11 months ago
Distributed Self Fault-Diagnosis for SIP Multimedia Applications
IP real-time multimedia applications present a challenging environment for network and service management, which requires a new approach. DYSWIS (Do You See What I See), proposed i...
Kai X. Miao, Henning Schulzrinne, Vishal Kumar Sin...
USENIX
2008
14 years 11 days ago
Evaluating Distributed Systems: Does Background Traffic Matter?
Evaluating novel networked protocols and services requires subjecting the target system to realistic Internet conditions. However, there is no common understanding of what is requ...
Kashi Venkatesh Vishwanath, Amin Vahdat
INFOCOM
2003
IEEE
14 years 3 months ago
Core-stateless Guaranteed Throughput Networks
— End-to-end throughput guarantee is an important service semantics that network providers would like to offer to their customers. A network provider can offer such service seman...
Jasleen Kaur, Harrick M. Vin