A Pareto-based hybrid multiobjective evolutionary approach for constrained multipath traffic engineering optimization in MPLS/GMPLS networks Fulltext Access 12 Pages 2013
Fault tolerance in wireless sensor network using hand-off and dynamic power adjustment approach Fulltext Access 12 Pages 2013
A high performance link layer mobility management strategy for professional private broadband networks Fulltext Access 12 Pages 2013
Self adaptive routing for dynamic spectrum access in cognitive radio networks Fulltext Access 12 Pages 2013
Augmenting Vehicle-to-Roadside connectivity in multi-channel vehicular Ad Hoc Networks Fulltext Access 12 Pages 2013
An agent-based hybrid service delivery for coordinating internet of things and 3rd party service providers Fulltext Access 12 Pages 2013
Cooperative scheduling mechanism for large-scale peer-to-peer computing systems Fulltext Access 12 Pages 2013
Behavioral classification and detection of malware through HTTP user agent anomalies Fulltext Access 12 Pages 2013
Secure computations on non-integer values with applications to privacy-preserving sequence analysis Fulltext Access 12 Pages 2013
Share with strangers: Privacy bubbles as user-centered privacy control for mobile content sharing applications Fulltext Access 12 Pages 2013
HiPoLDS: A Hierarchical Security Policy Language for Distributed Systems Fulltext Access 12 Pages 2013
A novel service-oriented intelligent seamless migration algorithm and application for pervasive computing environments Fulltext Access 12 Pages 2013
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs Fulltext Access 12 Pages 2013
Analyses of two end-user software vulnerability exposure metrics (extended version) Fulltext Access 12 Pages 2013
A Machine Learning-based Triage methodology for automated categorization of digital media Fulltext Access 12 Pages 2013
Efficient image duplicated region detection model using sequential block clustering Fulltext Access 12 Pages 2013
An empirical comparison of data recovered from mobile forensic toolkits Fulltext Access 12 Pages 2013
Hierarchical neural networks based prediction and control of dynamic reconfiguration for multilevel embedded systems Fulltext Access 12 Pages 2013
A template system for the efficient compilation of domain abstractions onto reconfigurable computers Fulltext Access 12 Pages 2013
Apple-CORE: Harnessing general-purpose many-cores with hardware concurrency management Fulltext Access 12 Pages 2013
A formal study on topology and floorplan characteristics of mesh and torus-based optical networks-on-chip Fulltext Access 12 Pages 2013
Automated design debugging in a testbench-based verification environment Fulltext Access 12 Pages 2013
Considering the effect of process variations during the ISA extension design flow Fulltext Access 12 Pages 2013
An environment for (re)configuration and execution management of heterogeneous flexible radio platforms Fulltext Access 12 Pages 2013
Design of a novel differential on-chip wave-pipelined serial interconnect with surfing Fulltext Access 12 Pages 2013
Sensing task assignment via sensor selection for maximum target coverage in WSNs Fulltext Access 12 Pages 2013
Relay technologies and technical issues in IEEE 802.16j Mobile Multi-hop Relay (MMR) networks Fulltext Access 12 Pages 2013
Research on social relations cognitive model of mobile nodes in Internet of Things Fulltext Access 12 Pages 2013
Intelligent multi-sensor control system based on innovative technology integration via ZigBee and Wi-Fi networks Fulltext Access 12 Pages 2013
A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs Fulltext Access 12 Pages 2013
Combination of data replication and scheduling algorithm for improving data availability in Data Grids Fulltext Access 12 Pages 2013
G-Hadoop: MapReduce across distributed data centers for data-intensive computing Fulltext Access 12 Pages 2013
Locally divergence-free central discontinuous Galerkin methods for ideal MHD equations Fulltext Access 12 Pages 2013
A discontinuous Galerkin method for solutions of the Euler equations on Cartesian grids with embedded geometries Fulltext Access 12 Pages 2013
Cooperative stalking of transient nomadic resources on overlay networks Fulltext Access 12 Pages 2013
A distributed scheduling framework based on selfish autonomous agents for federated cloud environments Fulltext Access 12 Pages 2013
A unified framework for the deployment, exposure and access of HPC applications as services in clouds Fulltext Access 12 Pages 2013
Bus and memory protection through chain-generated and tree-verified IV for multiprocessors systems Fulltext Access 12 Pages 2013
Fast computation of the performance evaluation of biometric systems: Application to multibiometrics Fulltext Access 12 Pages 2013
Bacterial foraging based hyper-heuristic for resource scheduling in grid computing Fulltext Access 12 Pages 2013
A hierarchical vision processing architecture oriented to 3D integration of smart camera chips Fulltext Access 12 Pages 2013
Developing front-end Web 2.0 technologies to access services, content and things in the future Internet Fulltext Access 12 Pages 2013
Decreasing power consumption with energy efficient data aware strategies Fulltext Access 12 Pages 2013
Scheduling linear chain streaming applications on heterogeneous systems with failures Fulltext Access 12 Pages 2013
Decentralized orchestration of data-centric workflows in Cloud environments Fulltext Access 12 Pages 2013
Distributed, application-level monitoring for heterogeneous clouds using stream processing Fulltext Access 12 Pages 2013
Characterizing workflow-based activity on a production e-infrastructure using provenance data Fulltext Access 12 Pages 2013
Group-based protocol and mobility model for VANETs to offer internet access Fulltext Access 12 Pages 2013
Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata? Fulltext Access 12 Pages 2013
A novel classification model for data theft detection using advanced pattern mining Fulltext Access 13 Pages 2013
Secret image sharing using grayscale payload decomposition and irreversible image steganography Fulltext Access 13 Pages 2013
Applicability of position-based routing for VANET in highways and urban environment Fulltext Access 13 Pages 2013
A practical and robust approach to coping with large volumes of data submitted for digital forensic examination Fulltext Access 13 Pages 2013
Protection based on backup radios and backup fibers for survivable Fiber-Wireless (FiWi) access network Fulltext Access 13 Pages 2013
Using mobile node speed changes for movement direction change prediction in a realistic category of mobility models Fulltext Access 13 Pages 2013
All-IP communication between wireless sensor networks and IPv6 networks based on location information Fulltext Access 13 Pages 2013
Traffic congestion detection in large-scale scenarios using vehicle-to-vehicle communications Fulltext Access 13 Pages 2013
Performance evaluation of user applications in the ITS scenario: An analytical assessment of the NeMHIP Fulltext Access 13 Pages 2013
Privacy preserving broadcast message authentication protocol for VANETs Fulltext Access 13 Pages 2013
A maturity model for the Spanish software industry based on ISO standards Fulltext Access 13 Pages 2013
A network accountability based verification mechanism for detecting inter-domain routing path inconsistency Fulltext Access 13 Pages 2013
Research on an active knowledge push service based on collaborative intent capture Fulltext Access 13 Pages 2013
Hadamard transform based adaptive visible/invisible watermarking scheme for digital images Fulltext Access 13 Pages 2013
Automated context dissemination for autonomic collaborative networks through semantic subscription filter generation Fulltext Access 13 Pages 2013
Topology forming and optimization framework for heterogeneous wireless back-haul networks supporting unidirectional technologies Fulltext Access 13 Pages 2013
Message transmission and key establishment: General equality for weak and strong capacities Fulltext Access 13 Pages 2013
On the security of certain e-communication types: Risks, user awareness and recommendations Fulltext Access 13 Pages 2013
Re-examining the performance bottleneck in a NIDS with detailed profiling Fulltext Access 13 Pages 2013
On a family of run length limited, block decodable codes to prevent payload-induced jitter in Controller Area Networks Fulltext Access 13 Pages 2013