Users and developers require some way to identify by human readable names the many resources that comprise a ubiquitous computing environment. In addition, naming in such environm...
We present a WLAN location determination technique, the Joint Clustering technique, that uses (1) signal strength probability distributions to address the noisy wireless channel, ...
The main scientific event for academics working in the field of Business Process Management is the International BPM Conference. In this paper, social network analysis techniques...
Hajo A. Reijers, Minseok Song, Heidi Romero, Umesh...
Abstract—In this tutorial paper we analyze the capacity of bitinterleaved coded modulation (BICM) with quadrature amplitude modulation (QAM) constellations, and we pay special at...
Soft state in the middle tier is key to enabling scalable and responsive three tier service architectures. While softstate can be reconstructed upon failure, replicating it across...
Tudor Marian, Mahesh Balakrishnan, Ken Birman, Rob...