Sciweavers

2518 search results - page 443 / 504
» Using Communication Objects During Requirements Analysis
Sort
View
IWCMC
2006
ACM
15 years 8 months ago
Voice capacity under quality constraints for IEEE 802.11a based WLANs
The communication of voice over wireless local area networks (WLANs) is influenced by the choice of speech codec, packetization interval and PHY layer bit rates. These choices aï...
Niranjan Shetty, Sayantan Choudhury, Jerry D. Gibs...
NOMS
2010
IEEE
180views Communications» more  NOMS 2010»
15 years 1 months ago
Exploiting non-dedicated resources for cloud computing
—Popular web services and applications such as Google Apps, DropBox, and Go.Pc introduce a wasteful imbalance of processing resources. Each host operated by a provider serves hun...
Artur Andrzejak, Derrick Kondo, David P. Anderson
KDD
2009
ACM
180views Data Mining» more  KDD 2009»
16 years 3 months ago
Mining social networks for personalized email prioritization
Email is one of the most prevalent communication tools today, and solving the email overload problem is pressingly urgent. A good way to alleviate email overload is to automatical...
Shinjae Yoo, Yiming Yang, Frank Lin, Il-Chul Moon
BMEI
2008
IEEE
15 years 9 months ago
Development of Epicardial Mapping System for Studying Atrial Fibrillation
Epicardial mapping system is an important tool for studying electrophysiological characteristics of atrial fibrillation (AF). AF is the most common arrhythmia and is becoming more...
Cuiwei Yang, Weijia Lu, Tuo Zhou, Xiaomei Wu, Zuxi...
126
Voted
IMC
2004
ACM
15 years 8 months ago
Characterizing the query behavior in peer-to-peer file sharing systems
This paper characterizes the query behavior of peers in a peer-topeer (P2P) file sharing system. In contrast to previous work, which provides various aggregate workload statistics...
Alexander Klemm, Christoph Lindemann, Mary K. Vern...