Sciweavers

424 search results - page 82 / 85
» Requirements Prioritization Challenges in Practice
Sort
View
123
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
Improving QoS in BitTorrent-like VoD Systems
—In recent years a number of research efforts have focused on effective use of P2P-based systems in providing large scale video streaming services. In particular, live streaming ...
Yan Yang, Alix L. H. Chow, Leana Golubchik, Daniel...
130
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
Distance Estimation by Constructing The Virtual Ruler in Anisotropic Sensor Networks
Abstract—Distance estimation is fundamental for many functionalities of wireless sensor networks and has been studied intensively in recent years. A critical challenge in distanc...
Yun Wang, Kai Li, Jie Wu
126
Voted
KDD
2010
ACM
208views Data Mining» more  KDD 2010»
15 years 2 months ago
Towards mobility-based clustering
Identifying hot spots of moving vehicles in an urban area is essential to many smart city applications. The practical research on hot spots in smart city presents many unique feat...
Siyuan Liu, Yunhuai Liu, Lionel M. Ni, Jianping Fa...
132
Voted
PVLDB
2010
158views more  PVLDB 2010»
15 years 2 months ago
MEET DB2: Automated Database Migration Evaluation
Commercial databases compete for market share, which is composed of not only net-new sales to those purchasing a database for the first time, but also competitive “win-backs”...
Reynold Xin, Patrick Dantressangle, Sam Lightstone...
151
Voted
CCS
2010
ACM
15 years 1 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...