Sciweavers

2120 search results - page 273 / 424
» Mapping the Gnutella Network
Sort
View
PERCOM
2008
ACM
16 years 12 days ago
Non-anchored Unified Naming for Ubiquitous Computing Environments
Users and developers require some way to identify by human readable names the many resources that comprise a ubiquitous computing environment. In addition, naming in such environm...
Yoo Chul Chung, Dongman Lee
84
Voted
PERCOM
2003
ACM
16 years 12 days ago
WLAN Location Determination via Clustering and Probability Distributions
We present a WLAN location determination technique, the Joint Clustering technique, that uses (1) signal strength probability distributions to address the noisy wireless channel, ...
Ashok K. Agrawala, A. Udaya Shankar
84
Voted
BPM
2009
Springer
148views Business» more  BPM 2009»
15 years 7 months ago
A Collaboration and Productiveness Analysis of the BPM Community
The main scientific event for academics working in the field of Business Process Management is the International BPM Conference. In this paper, social network analysis techniques...
Hajo A. Reijers, Minseok Song, Heidi Romero, Umesh...
113
Voted
IWCMC
2009
ACM
15 years 7 months ago
On the capacity of BICM with QAM constellations
Abstract—In this tutorial paper we analyze the capacity of bitinterleaved coded modulation (BICM) with quadrature amplitude modulation (QAM) constellations, and we pay special at...
Alex Alvarado, Erik Agrell, Arne Svensson
92
Voted
DSN
2008
IEEE
15 years 7 months ago
Tempest: Soft state replication in the service tier
Soft state in the middle tier is key to enabling scalable and responsive three tier service architectures. While softstate can be reconstructed upon failure, replicating it across...
Tudor Marian, Mahesh Balakrishnan, Ken Birman, Rob...