Sciweavers

950 search results - page 86 / 190
» presence 2008
Sort
View
SIROCCO
2008
14 years 11 months ago
Centralized Communication in Radio Networks with Strong Interference
We study communication in known topology radio networks with the presence of interference constraints. We consider a real-world situation, when a transmission of a node produces an...
Frantisek Galcík
SNPD
2008
14 years 11 months ago
Aggregate Congestion Control for Peer-to-Peer File Sharing Applications
Peer-to-Peer file sharing applications, which enable peers to establish multiple TCP connections between other peers to transfer data, pose new challenge to congestion control. Si...
Wei Li, Shanzhi Chen, Yaning Liu, Xin Li
TRECVID
2008
14 years 11 months ago
Surveillance Event Detection
We have developed and evaluated three generalized systems for event detection. The first system is a simple brute force search method, where each space-time location in the video ...
Mert Dikmen, Huazhong Ning, Dennis J. Lin, Liangli...
WICSA
2008
14 years 11 months ago
Using Types to Enforce Architectural Structure
The right software architecture is critical to achieving essential quality attributes, but these qualities are only realized if the program as implemented conforms to its intended...
Jonathan Aldrich
IADIS
2004
14 years 11 months ago
Marketing capability and E-business performance: a case study of a retail bank
This paper addresses the significance of marketing capability for e-business performance in retail banking. A conceptual framework was built on the marketing and strategic managem...
Helena Ahola, Johanna Ahola