Sciweavers

1384 search results - page 261 / 277
» Protocol Models of Human-Computer Interaction
Sort
View
KDD
1997
ACM
111views Data Mining» more  KDD 1997»
15 years 1 months ago
SIPping from the Data Firehose
When mining large databases, the data extraction problem and the interface between the database and data mining algorithm become important issues. Rather than giving a mining algo...
George H. John, Brian Lent
IJCOMSYS
2007
88views more  IJCOMSYS 2007»
14 years 9 months ago
Potential performance bottleneck in Linux TCP
TCP is the most widely used transport protocol on the Internet today. Over the years, especially recently, due to requirements of high bandwidth transmission, various approaches h...
Wenji Wu, Matt Crawford
SENSYS
2003
ACM
15 years 3 months ago
TOSSIM: accurate and scalable simulation of entire tinyOS applications
Accurate and scalable simulation has historically been a key enabling factor for systems research. We present TOSSIM, a simulator for TinyOS wireless sensor networks. By exploitin...
Philip Levis, Nelson Lee, Matt Welsh, David E. Cul...
PERCOM
2008
ACM
14 years 9 months ago
P2P multicast for pervasive ad hoc networks
Integrating p2p services in multi-hop ad hoc networks is today a hot topic. General multi-hop , and pervasive systems in particular, can greatly benefit from high-level middleware...
Franca Delmastro, Andrea Passarella, Marco Conti
MSWIM
2005
ACM
15 years 3 months ago
Using statistical design of experiments for analyzing mobile ad hoc networks
The performance of mobile ad hoc networks can be influenced by numerous factors, including protocol design at every layer; parameter settings such as retransmission limits and ti...
Michael W. Totaro, Dmitri D. Perkins