Block-level packet recovery with network coding for wireless reliable multicast Fulltext Access 14 Pages 2013
Independent links: A new approach to increase spatial reuse in wireless networks Fulltext Access 14 Pages 2013
A systematic approach for detecting and clustering distributed cyber scanning Fulltext Access 14 Pages 2013
MC-MLAS: Multi-channel Minimum Latency Aggregation Scheduling in Wireless Sensor Networks Fulltext Access 14 Pages 2013
On the performance improvement of gossip protocols for content-based publish-subscribe through caching Fulltext Access 14 Pages 2013
RePIDS: A multi tier Real-time Payload-based Intrusion Detection System Fulltext Access 14 Pages 2013
Downlink scheduling for user equipment served by multiple mobile terminals in cellular systems Fulltext Access 14 Pages 2013
Dynamic radio resource and interference management for MIMO–OFDMA mobile broadband wireless access systems Fulltext Access 14 Pages 2013
Performance analysis of IEEE 802.11 WLANs with rate adaptation in time-varying fading channels Fulltext Access 14 Pages 2013
Embedding of virtual network requests over static wireless multihop networks Fulltext Access 14 Pages 2013
Efficient inter-domain traffic engineering with transit-edge hierarchical routing Fulltext Access 14 Pages 2013
Dynamic green self-configuration of 3G base stations using fuzzy cognitive maps Fulltext Access 14 Pages 2013
Novel clock synchronization algorithm of parametric difference for parallel and distributed simulations Fulltext Access 14 Pages 2013
On the features and challenges of security and privacy in distributed internet of things Fulltext Access 14 Pages 2013
Efficient localization for mobile sensor networks based on constraint rules optimized Monte Carlo method Fulltext Access 14 Pages 2013
Performance analysis of CSMA/CA protocols with multi-packet transmission Fulltext Access 14 Pages 2013
Distributed, multi-user, multi-application, and multi-sensor data fusion over named data networks Fulltext Access 14 Pages 2013
PShare: Ensuring location privacy in non-trusted systems through multi-secret sharing Fulltext Access 14 Pages 2013
Analytical performance modeling of shuffle–exchange inspired mesh-based Network-on-Chips Fulltext Access 14 Pages 2013
Analysis and performance of network decoding strategies for cooperative network coding Fulltext Access 14 Pages 2013
A game-based algorithm for fair bandwidth allocation in Fibre-Wireless access networks Fulltext Access 14 Pages 2013
Mathematical analysis of burst transmission scheme for IEEE 802.3az energy efficient Ethernet Fulltext Access 14 Pages 2013
Tandem queueing system with impatient customers as a model of call center with Interactive Voice Response Fulltext Access 14 Pages 2013
Evaluating user preferences for video transfer methods from a mobile device to a TV screen Fulltext Access 14 Pages 2013
Enhancing the performance of indoor localization using multiple steady tags Fulltext Access 14 Pages 2013
A lightweight mechanism for detection of cache pollution attacks in Named Data Networking Fulltext Access 14 Pages 2013
Dynamic spectrum access and network selection in heterogeneous cognitive wireless networks Fulltext Access 14 Pages 2013
Where to go from here? Mobility prediction from instantaneous information Fulltext Access 14 Pages 2013
Effect of network-coding overhead on end-to-end throughput for multihop wireless networks Fulltext Access 14 Pages 2013
Bounds on the deviation of discrete-time Markov chains from their mean-field model Fulltext Access 14 Pages 2013
Design of an efficient communication infrastructure for highly contended locks in many-core CMPs Fulltext Access 14 Pages 2013
Energy and transition-aware runtime task scheduling for multicore processors Fulltext Access 14 Pages 2013
Efficient heterogeneous execution on large multicore and accelerator platforms: Case study using a block tridiagonal solver Fulltext Access 14 Pages 2013
Design space exploration of on-chip ring interconnection for a CPU–GPU heterogeneous architecture Fulltext Access 14 Pages 2013
An effective and efficient parallel approach for random graph generation over GPUs Fulltext Access 14 Pages 2013
Enhancing throughput for streaming applications running on cluster systems Fulltext Access 14 Pages 2013
Black box scheduling for resource intensive virtual machine workloads with interference models Fulltext Access 14 Pages 2013
BlobCR: Virtual disk based checkpoint-restart for HPC applications on IaaS clouds Fulltext Access 14 Pages 2013
An image processing based method for power quality event identification Fulltext Access 14 Pages 2013
Classification of disturbances in hybrid DG system using modular PNN and SVM Fulltext Access 14 Pages 2013
Pattern analysis and classification for security evaluation in power networks Fulltext Access 14 Pages 2013
A queue-based interval-fuzzy programming approach for electric-power systems planning Fulltext Access 14 Pages 2013
A fuzzified multi objective Interactive Honey Bee Mating Optimization for Environmental/Economic Power Dispatch with valve point effect Fulltext Access 14 Pages 2013
AC constrained hydro-thermal generation scheduling problem: Application of Benders decomposition method improved by BFPSO Fulltext Access 14 Pages 2013
Transient stability assessment of power systems described with detailed models using neural networks Fulltext Access 14 Pages 2013
Improvement of low frequency oscillation damping by allocation and design of power system stabilizers in the multi-machine power system Fulltext Access 14 Pages 2013
A hybrid mechanism for heterogeneous e-procurement involving a combinatorial auction and bargaining Fulltext Access 14 Pages 2013
DTLS based security and two-way authentication for the Internet of Things Fulltext Access 14 Pages 2013
A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems Fulltext Access 14 Pages 2013
Evaluating inter-arrival time in general random waypoint mobility model Fulltext Access 14 Pages 2013
A new adaptive receiver-initiated scheme for mitigating starvation in wireless networks Fulltext Access 14 Pages 2013
Design and performance evaluation of a PMIPv6 solution for geonetworking-based VANETs Fulltext Access 14 Pages 2013
A novel batch-based group key management protocol applied to the Internet of Things Fulltext Access 14 Pages 2013
Optimization-based decision support for scenario analysis in electronic sourcing markets with volume discounts Fulltext Access 14 Pages 2013
Detection of malicious users in cognitive radio ad hoc networks: A non-parametric statistical approach Fulltext Access 14 Pages 2013
Joint route selection and resource allocation in multihop wireless networks based on a game theoretic approach Fulltext Access 14 Pages 2013
Localized and configurable topology control in lossy wireless sensor networks Fulltext Access 14 Pages 2013
Three-dimensional greedy routing in large-scale random wireless sensor networks Fulltext Access 14 Pages 2013
Efficient broadcasting in multi-hop wireless networks with a realistic physical layer Fulltext Access 14 Pages 2013
The rise and fall of spatio-temporal clusters in mobile ad hoc networks Fulltext Access 14 Pages 2013
Combinatorial auction-based allocation of virtual machine instances in clouds Fulltext Access 14 Pages 2013