Sciweavers

236 search results - page 28 / 48
» el 2007
Sort
View
CN
2007
129views more  CN 2007»
14 years 9 months ago
Machine-learnt versus analytical models of TCP throughput
We first study the accuracy of two well-known analytical models of the average throughput of long-term TCP flows, namely the so-called SQRT and PFTK models, and show that these ...
Ibtissam El Khayat, Pierre Geurts, Guy Leduc
BPSC
2009
200views Business» more  BPSC 2009»
14 years 10 months ago
A Semantic Framework for Compliance Management in Business Process Management
: In process-centric enterprises, business processes (BPs) are at the center of value-creating activities. Governing enterprise BPs requires the ability to control and guide BP beh...
Marwane El Kharbili, Elke Pulvermüller
DAGSTUHL
2006
14 years 11 months ago
Rule-based Model Extraction from Source Code
Abstract. In the context of an approach for reengineering legacy software systems at the architectural level, we present in this paper a reverse engineering methodology that uses a...
Rui Correia, Carlos M. P. Matos, Mohammad El-Ramly...
NETWORKING
2004
14 years 11 months ago
Loss Strategies for Competing TCP/IP Connections
We study in this paper two competing TCP connections that share a common bottleneck link. When congestion occurs, one (or both) connections will suffer a loss that will cause its t...
Eitan Altman, Rachid El Azouzi, David Ros, Bruno T...
CLA
2006
14 years 11 months ago
Using FCA to Suggest Refactorings to Correct Design Defects
Abstract. Design defects are poor design choices resulting in a hard-tomaintain software, hence their detection and correction are key steps of a disciplined software process aimed...
Naouel Moha, Jihene Rezgui, Yann-Gaël Gu&eacu...