Design and optimization of adaptable BCH codecs for NAND flash memories Fulltext Access 13 Pages 2013
High performance scalable elliptic curve cryptosystem processor for Koblitz curves Fulltext Access 13 Pages 2013
A flash-aware write buffer scheme to enhance the performance of superblock-based NAND flash storage systems Fulltext Access 13 Pages 2013
Hardware implementation of DIRLS mismatched compressor applied to a pulse-Doppler radar system Fulltext Access 13 Pages 2013
Improving feature location using structural similarity and iterative graph mapping Fulltext Access 13 Pages 2013
A unified link-layer fault-tolerant architecture for network-based many-core embedded systems Fulltext Access 13 Pages 2013
Space optimal solution for data reordering in streaming applications on NoC based MPSoC Fulltext Access 13 Pages 2013
Collusion resilient spread spectrum watermarking in M-band wavelets using GA-fuzzy hybridization Fulltext Access 13 Pages 2013
Improving Graph Cuts algorithm to transform sequence of stereo image to depth map Fulltext Access 13 Pages 2013
PS-QUASAR: A publish/subscribe QoS aware middleware for Wireless Sensor and Actor Networks Fulltext Access 13 Pages 2013
The ACROSS MPSoC – A new generation of multi-core processors designed for safety–critical embedded systems Fulltext Access 13 Pages 2013
Compositional real-time scheduling framework for periodic reward-based task model Fulltext Access 13 Pages 2013
Scheduling of scientific workflow in non-dedicated heterogeneous multicluster platform Fulltext Access 13 Pages 2013
A groupware system to support collaborative programming: Design and experiences Fulltext Access 13 Pages 2013
Setting the best view of a virtual teacher in a mixed reality physical-task learning support system Fulltext Access 13 Pages 2013
ABC optimized neural network model for image deblurring with its FPGA implementation Fulltext Access 13 Pages 2013
Developing Domain-Knowledge Evolutionary Algorithms for Network-on-Chip Application Mapping Fulltext Access 14 Pages 2013
Design and implementation of reconfigurable FIFOs for Voltage/Frequency Island-based Networks-on-Chip Fulltext Access 14 Pages 2013
A scalable, non-interfering, synthesizable Network-on-Chip monitor – Extended version Fulltext Access 14 Pages 2013
Design and testbed evaluation of RDMA-based middleware for high-performance data transfer applications Fulltext Access 14 Pages 2013
Using task migration to improve non-contiguous processor allocation in NoC-based CMPs Fulltext Access 14 Pages 2013
A shortest path adaptive routing technique for minimizing path collisions in hybrid optical network-on-chip Fulltext Access 14 Pages 2013
Polychronous modeling, analysis, verification and simulation for timed software architectures Fulltext Access 14 Pages 2013
Performance of IP-forwarding of Linux hosts with multiple network interfaces Fulltext Access 14 Pages 2013
Adapting system execution traces to support analysis of software system performance properties Fulltext Access 14 Pages 2013
Influences of media on social movements: Problematizing hyperbolic inferences about impacts Fulltext Access 14 Pages 2013
An adaptable and scalable group access control scheme for managing wireless sensor networks Fulltext Access 14 Pages 2013
Formal equivalence verification and debugging techniques with auto-correction mechanism for RTL designs Fulltext Access 14 Pages 2013
Concurrent and comparative fault simulation in SystemC and its application in robustness evaluation Fulltext Access 14 Pages 2013
A high performance, area efficient TTA-like vertex shader architecture with optimized floating point arithmetic unit for embedded graphics applications Fulltext Access 14 Pages 2013
Analytical architecture-based performability evaluation of real-time software systems Fulltext Access 14 Pages 2013
Energy-aware preemptive scheduling algorithm for sporadic tasks on DVS platform Fulltext Access 14 Pages 2013
AFChecker: Effective model checking for context-aware adaptive applications Fulltext Access 14 Pages 2013
FORTUNA—A framework for the design and development of hardware-based secure systems Fulltext Access 14 Pages 2013
Enabling accurate modeling of power and energy consumption in an ARM-based System-on-Chip Fulltext Access 14 Pages 2013
Deriving an NCD file from an FPGA bitstream: Methodology, architecture and evaluation Fulltext Access 14 Pages 2013
Offshore insourcing in software development: Structuring the decision-making process Fulltext Access 14 Pages 2013
A language-independent approach to black-box testing using Erlang as test specification language Fulltext Access 14 Pages 2013
Re-engineering legacy Web applications into RIAs by aligning modernization requirements, patterns and RIA features Fulltext Access 14 Pages 2013
On the extent of correlation in BGP updates in the Internet and what it tells us about locality of BGP routing events Fulltext Access 14 Pages 2013
Preventing deadlocks and starvation in distributed object oriented systems Fulltext Access 14 Pages 2013
An optimized reconfigurable power spectral density converter for real-time shrew DDoS attacks detection Fulltext Access 14 Pages 2013
A novel kernel-based limited-view computerized tomography reconstruction via anisotropic diffusion Fulltext Access 14 Pages 2013
Multimodal interaction for information retrieval using natural language Fulltext Access 14 Pages 2013
Business-to-government application integration framework: A case study of the high technology industry in Taiwan Fulltext Access 14 Pages 2013
Efficient deployment of wireless sensor networks targeting environment monitoring applications Fulltext Access 14 Pages 2013
Connected dominating sets in wireless ad hoc and sensor networks – A comprehensive survey Fulltext Access 14 Pages 2013
ADMIRE: Anomaly detection method using entropy-based PCA with three-step sketches Fulltext Access 14 Pages 2013
A scalable network forensics mechanism for stealthy self-propagating attacks Fulltext Access 14 Pages 2013
VANET QoS-OLSR: QoS-based clustering protocol for Vehicular Ad hoc Networks Fulltext Access 14 Pages 2013
Efficient feedback scheme based on compressed sensing in MIMO wireless networks Fulltext Access 14 Pages 2013
Hierarchical DHT-based name resolution for information-centric networks Fulltext Access 14 Pages 2013
Referrer Graph: A cost-effective algorithm and pruning method for predicting web accesses Fulltext Access 14 Pages 2013
Economic incentive-based brokerage schemes for improving data availability in mobile-P2P networks Fulltext Access 14 Pages 2013
SURF: A distributed channel selection strategy for data dissemination in multi-hop cognitive radio networks Fulltext Access 14 Pages 2013
Robustness study of emerged communities from exchanges in peer-to-peer networks Fulltext Access 14 Pages 2013
Satisfying demands in a multicellular network: A universal power allocation algorithm Fulltext Access 14 Pages 2013
Scalability study of molecular dynamics simulation on Godson-T many-core architecture Fulltext Access 14 Pages 2013
Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks Fulltext Access 14 Pages 2013
Model-driven approach supporting formal verification for web service composition protocols Fulltext Access 14 Pages 2013
Modeling and performance analysis of product development process network Fulltext Access 14 Pages 2013
Analyzing settings for social identity management on Social Networking Sites: Classification, current state, and proposed developments Fulltext Access 14 Pages 2013
Resource management for multimedia applications, distributed in open and heterogeneous home networks Fulltext Access 14 Pages 2013
Scene-based non-uniformity correction: From algorithm to implementation on a smart camera Fulltext Access 14 Pages 2013
A gradient based routing scheme for street lighting wireless sensor networks Fulltext Access 14 Pages 2013
A novel agent-based approach to detect sinkhole attacks in wireless sensor networks Fulltext Access 14 Pages 2013
A robust digital watermarking algorithm in undecimated discrete wavelet transform domain Fulltext Access 14 Pages 2013
Classification of evoked potentials of familiar and unfamiliar face stimuli using multi-resolution approximation based on excitatory post-synaptic potential waveform Fulltext Access 14 Pages 2013
Toward smart utilization of two X-ray images for 2-D/3-D registration applied to abdominal aortic aneurysm interventions Fulltext Access 14 Pages 2013
Program-based dynamic precision selection framework with a dual-mode unified shader for mobile GPUs Fulltext Access 14 Pages 2013
Model-based control of a class of voltage-driven robot manipulators with non-passive dynamics Fulltext Access 14 Pages 2013
Recalling instructions from idling threads to maximize resource utilization for simultaneous multi-threading processors Fulltext Access 14 Pages 2013
Estimation of backlog and delay in OFDM/TDMA systems with traffic policing using Network Calculus Fulltext Access 14 Pages 2013
Bridging fault detection in cluster based FPGA by using Muller C element Fulltext Access 14 Pages 2013
Performance analysis of multivariate cryptosystem schemes for wireless sensor network Fulltext Access 14 Pages 2013