Sciweavers

3984 search results - page 453 / 797
» Using linked data for systems management
Sort
View
167
Voted
CDC
2008
IEEE
187views Control Systems» more  CDC 2008»
15 years 10 months ago
Controlled random access MAC for network utility maximization in wireless networks
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...
Robert J. McCabe, Nikolaos M. Freris, P. R. Kumar
148
Voted
EUC
2008
Springer
15 years 5 months ago
Design and Analysis of a Stable Queue Control Scheme for the Internet
The recently proposed Active Queue Management (AQM) is an effective method used in Internet routers for congestion control, and to achieve a tradeoff between link utilization and ...
Naixue Xiong, Laurence Tianruo Yang, Yaoxue Zhang,...
139
Voted
ISSTA
2009
ACM
15 years 10 months ago
Advanced code coverage analysis using substring holes
Code coverage is a common aid in the testing process. It is generally used for marking the source code segments that were executed and, more importantly, those that were not execu...
Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pel...
148
Voted
BIODATAMINING
2008
117views more  BIODATAMINING 2008»
15 years 3 months ago
Search extension transforms Wiki into a relational system: A case for flavonoid metabolite database
Background: In computer science, database systems are based on the relational model founded by Edgar Codd in 1970. On the other hand, in the area of biology the word 'databas...
Masanori Arita, Kazuhiro Suwa
165
Voted
CIKM
2009
Springer
15 years 8 months ago
A novel approach for privacy mining of generic basic association rules
Data mining can extract important knowledge from large data collections - but sometimes these collections are split among various parties. Privacy concerns may prevent the parties...
Moez Waddey, Pascal Poncelet, Sadok Ben Yahia