Sciweavers

171 search results - page 2 / 35
» Evaluating the limitations of and alternatives in beaconing
Sort
View
ISCC
2009
IEEE
130views Communications» more  ISCC 2009»
14 years 14 hour ago
Context-aware publish-subscribe: Model, implementation, and evaluation
Complex communication patterns often need to take into account the situation in which the information to be communicated is produced or consumed. Publish-subscribe, and particular...
Gianpaolo Cugola, Alessandro Margara, Matteo Migli...
ICAIL
2003
ACM
13 years 10 months ago
A Comparative Evaluation of Name-Matching Algorithms
Name matching—recognizing when two different strings are likely to denote the same entity—is an important task in many legal information systems, such as case-management syste...
Karl Branting
ENVSOFT
2006
144views more  ENVSOFT 2006»
13 years 5 months ago
Ten iterative steps in development and evaluation of environmental models
Models are increasingly being relied upon to inform and support natural resource management. They are incorporating an ever broader range of disciplines and now often confront peo...
Anthony J. Jakeman, Rebecca A. Letcher, John P. No...
SIGMETRICS
2000
ACM
217views Hardware» more  SIGMETRICS 2000»
13 years 5 months ago
Experimenting with an Ad Hoc wireless network on campus: insights and experiences
Ad hoc wireless networks are new communication networks that can be dynamically formed and deformed onthe- y, anytime and anywhere. User data is routed with the help of an ad hoc ...
Chai-Keong Toh, Richard Chen, Minar Delwar, Donald...
IMC
2005
ACM
13 years 11 months ago
Facilitating Access Point Selection in IEEE 802.11 Wireless Networks
The performance experienced by wireless clients in IEEE 802.11 wireless networks heavily depends on the clients’ ability to identify the Access Point (AP) that will offer the be...
Sudarshan Vasudevan, Konstantina Papagiannaki, Chr...