Abstract. Verification of programs with invocations to unknown procedures is a practical problem, because in many scenarios not all codes of programs to be verified are available...
—Real-time access to key performance indicators is necessary to ensure timeliness and effectiveness of operational business processes. The concept of Business Activity Monitoring...
Jan-Philipp Friedenstab, Christian Janiesch, Marti...
We propose an application-driven multi-user resource allocation and frame scheduling concept for wireless video streaming. Our approach is based on joint optimization of the applic...
Yang Peng, Shoaib Khan, Eckehard G. Steinbach, Mar...
Abstract—Integrated circuits for very high-speed telecommunication protocols often use ASICs, due to their strict timing constraints. This scenario is changing, since modern FPGA...
Abstract. All search happens in a particular context—such as the particular collection of a digital library, its associated search tasks, and its associated users. Information re...