Sciweavers

4679 search results - page 826 / 936
» Modeling When Connections Are the Problem
Sort
View
HICSS
2003
IEEE
102views Biometrics» more  HICSS 2003»
15 years 3 months ago
Economics of Technology Standards: Implications for Offline Movie Piracy in a Global Context
Reduced sizes of music files due to compression technologies has allowed for piracy to become a rampant problem on the Internet even in the absence of significant bandwidth. Howev...
Ramnath K. Chellappa, Shivendu Shivendu
HICSS
2003
IEEE
153views Biometrics» more  HICSS 2003»
15 years 3 months ago
Automatic Mediation between Incompatible Component Interaction Styles
Incompatibility of component interaction styles is identified as a major obstacle to interoperability when using off-the-shelf components or dealing with legacy software in compos...
Klaus-Peter Löhr
ICDM
2003
IEEE
92views Data Mining» more  ICDM 2003»
15 years 3 months ago
Postprocessing Decision Trees to Extract Actionable Knowledge
Most data mining algorithms and tools stop at discovered customer models, producing distribution information on customer profiles. Such techniques, when applied to industrial pro...
Qiang Yang, Jie Yin, Charles X. Ling, Tielin Chen
SRDS
2003
IEEE
15 years 3 months ago
Autonomous Replication for High Availability in Unstructured P2P Systems
We consider the problem of increasing the availability of shared data in peer-to-peer (P2P) systems so that users can access any content, regardless of the current subset of onlin...
Francisco Matias Cuenca-Acuna, Richard P. Martin, ...
SPAA
2003
ACM
15 years 3 months ago
Cycle stealing under immediate dispatch task assignment
We consider the practical problem of task assignment in a server farm, where each arriving job is immediately dispatched to a server in the farm. We look at the benefit of cycle ...
Mor Harchol-Balter, Cuihong Li, Takayuki Osogami, ...