Sciweavers

606 search results - page 79 / 122
» Privacy-Enabled Services for Enterprises
Sort
View
SIGCOMM
2009
ACM
15 years 6 months ago
SmartRE: an architecture for coordinated network-wide redundancy elimination
Application-independent Redundancy Elimination (RE), or identifying and removing repeated content from network transfers, has been used with great success for improving network pe...
Ashok Anand, Vyas Sekar, Aditya Akella
ECBS
2008
IEEE
116views Hardware» more  ECBS 2008»
15 years 6 months ago
CiCUTS: Combining System Execution Modeling Tools with Continuous Integration Environments
System execution modeling (SEM) tools provide an effective means to evaluate the quality of service (QoS) of enterprise distributed real-time and embedded (DRE) systems. SEM tools...
James H. Hill, Douglas C. Schmidt, Adam A. Porter,...
ECWEB
2004
Springer
179views ECommerce» more  ECWEB 2004»
15 years 5 months ago
Applying Text Mining on Electronic Messages for Competitive Intelligence
This paper presents how text -mining techniques can be used to analyze an enterprise’s external environment searching for competitors, related products and services, marketing st...
José Palazzo Moreira de Oliveira, Stanley L...
WSC
2007
15 years 2 months ago
A model for contact center analysis and simulation
In this paper we depart from a set of simple assumptions regarding the behavior of a pool of customers associated with an enterprise’s contact center. We assume that the pool of...
Juan M. Huerta
WSC
1997
15 years 1 months ago
Structured Models and Dynamic Systems Analysis: The Integration of the IDEF0/IDEF3 Modeling Methods and Discrete Event Simulatio
The role of modeling and simulation is receiving much press of late. However, the lack of practice in employing a link between the two is alarming. A static model is used to under...
Larry Whitman, Brian L. Huff, Adrien Presley