Sciweavers

5344 search results - page 937 / 1069
» Privacy-Preserving Set Operations
Sort
View
COMCOM
2004
145views more  COMCOM 2004»
15 years 3 months ago
Framework based on stochastic L-Systems for modeling IP traffic with multifractal behavior
In a previous work we have introduced a multifractal traffic model based on so-called stochastic L-Systems, which were introduced by biologist A. Lindenmayer as a method to model ...
Paulo Salvador, António Nogueira, Rui T. Va...
136
Voted
CSCW
2002
ACM
15 years 3 months ago
NetWORKers and their Activity in Intensional Networks
Through ethnographic research, we document the rise of personal social networks in the workplace, which we call intensional networks. Paradoxically, we find that the most fundament...
Bonnie A. Nardi, Steve Whittaker, Heinrich Schwarz
138
Voted
JHSN
2000
112views more  JHSN 2000»
15 years 3 months ago
A hierarchical Quality of Service control architecture for configurable multimedia applications
In order to achieve the best application-level Quality-of-Service (QoS), multimedia applications need to be dynamically tuned and reconfigured to adapt to fluctuating computing an...
Baochun Li, William Kalter, Klara Nahrstedt
122
Voted
IDA
2002
Springer
15 years 3 months ago
Classification with sparse grids using simplicial basis functions
Recently we presented a new approach [20] to the classification problem arising in data mining. It is based on the regularization network approach but in contrast to other methods...
Jochen Garcke, Michael Griebel
168
Voted
LOGCOM
1998
178views more  LOGCOM 1998»
15 years 3 months ago
Applying the Mu-Calculus in Planning and Reasoning about Action
Planning algorithms have traditionally been geared toward achievement goals in single-agent environments. Such algorithms essentially produce plans to reach one of a specified se...
Munindar P. Singh