Sciweavers

906 search results - page 136 / 182
» Chain Dominated Orders
Sort
View
INFOCOM
2009
IEEE
15 years 6 months ago
Effective Delay Control in Online Network Coding
—Motivated by streaming applications with stringent delay constraints, we consider the design of online network coding algorithms with timely delivery guarantees. Assuming that t...
João Barros, Rui A. Costa, Daniele Munarett...
BPM
2009
Springer
175views Business» more  BPM 2009»
15 years 6 months ago
Understanding Spaghetti Models with Sequence Clustering for ProM
The goal of process mining is to discover process models from event logs. However, for processes that are not well structured and have a lot of diverse behavior, existing process m...
Gabriel M. Veiga, Diogo R. Ferreira
WEBI
2009
Springer
15 years 6 months ago
Rigorous Probabilistic Trust-Inference with Applications to Clustering
The World Wide Web has transformed into an environment where users both produce and consume information. In order to judge the validity of information, it is important to know how...
Thomas DuBois, Jennifer Golbeck, Aravind Srinivasa...
ANSS
2008
IEEE
15 years 6 months ago
SCAR - Scattering, Concealing and Recovering Data within a DHT
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...
Bryan N. Mills, Taieb Znati
HICSS
2008
IEEE
120views Biometrics» more  HICSS 2008»
15 years 6 months ago
Optimizing the Supplier Selection and Service Portfolio of a SOA Service Integrator
The Service-Oriented Architecture (SOA) paradigm promises to enable software vendors to compose software systems using services purchased from various suppliers. In this paper, we...
Jan Christian Lang, Thomas Widjaja, Peter Buxmann,...