On the numerical approximation of one-dimensional nonconservative hyperbolic systems Fulltext Access 14 Pages 2013
Gossiping for resource discovering: An analysis based on complex network theory Fulltext Access 14 Pages 2013
Scalable parallel computing on clouds using Twister4Azure iterative MapReduce Fulltext Access 14 Pages 2013
A histogram-based dominant wavelet domain feature selection algorithm for palm-print recognition Fulltext Access 15 Pages 2013
FPGA implementation of particle swarm optimization for Bayesian network learning Fulltext Access 15 Pages 2013
Spectrum sharing optimization with QoS guarantee in cognitive radio networks Fulltext Access 15 Pages 2013
Using PSO in a spatial domain based image hiding scheme with distortion tolerance Fulltext Access 15 Pages 2013
A new a priori net length estimation technique for integrated circuits using radial basis functions Fulltext Access 15 Pages 2013
Adaptable system based on Scalable Video Coding for high-quality video service Fulltext Access 15 Pages 2013
Assessing security threat scenarios for utility-based reputation model in grids Fulltext Access 15 Pages 2013
New payment methods: A review of 2010–2012 FATF mutual evaluation reports Fulltext Access 15 Pages 2013
A new coding- and interference-aware routing protocol in wireless mesh networks Fulltext Access 15 Pages 2013
Contributions to the emergence and consolidation of Agent-oriented Software Engineering Fulltext Access 15 Pages 2013
Design of priority-based active queue management for a high-performance IP switch Fulltext Access 15 Pages 2013
Creditability-based weighted voting for reducing false positives and negatives in intrusion detection Fulltext Access 15 Pages 2013
Trust management system design for the Internet of Things: A context-aware and multi-service approach Fulltext Access 15 Pages 2013
An integrated framework combining Bio-Hashed minutiae template and PKCS15 compliant card for a better secure management of fingerprint cancelable templates Fulltext Access 15 Pages 2013
Don't make excuses! Discouraging neutralization to reduce IT policy violation Fulltext Access 15 Pages 2013
An international analysis of the extensions to the IEEE LOMv1.0 metadata standard Fulltext Access 15 Pages 2013
Network of Information (NetInf) – An information-centric networking architecture Fulltext Access 15 Pages 2013
Detecting Web requirements conflicts and inconsistencies under a model-based perspective Fulltext Access 15 Pages 2013
Predictors of television and online video platform use: A coexistence model of old and new video platforms Fulltext Access 15 Pages 2013
A system-level approach to adaptivity and fault-tolerance in NoC-based MPSoCs: The MADNESS project Fulltext Access 15 Pages 2013
The COMPLEX reference framework for HW/SW co-design and power management supporting platform-based design-space exploration Fulltext Access 15 Pages 2013
Code smells as system-level indicators of maintainability: An empirical study Fulltext Access 15 Pages 2013
Quality-driven optimization of system architecture: Industrial case study on an automotive sub-system Fulltext Access 15 Pages 2013
Beyond ATAM: Early architecture evaluation method for large-scale distributed systems Fulltext Access 15 Pages 2013
Sirius: A heuristic-based framework for measuring web usability adapted to the type of website Fulltext Access 15 Pages 2013
A novel methodology for accelerating bitstream relocation in partially reconfigurable systems Fulltext Access 15 Pages 2013
An efficient tree-based algorithm for mining sequential patterns with multiple minimum supports Fulltext Access 15 Pages 2013
Testing Real-Time Embedded Systems using Timed Automata based approaches Fulltext Access 15 Pages 2013
A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA Fulltext Access 15 Pages 2013
Improving flexibility and fault-management in CAN-based “Shared-Clock” architectures Fulltext Access 15 Pages 2013
Deadlock-free generic routing algorithms for 3-dimensional Networks-on-Chip with reduced vertical link density topologies Fulltext Access 15 Pages 2013
Intelligent Adjustment Forwarding: A compromise between end-to-end and hop-by-hop transmissions in VANET environments Fulltext Access 15 Pages 2013
HyBR: A Hybrid Bio-inspired Bee swarm Routing protocol for safety applications in Vehicular Ad hoc NETworks (VANETs) Fulltext Access 15 Pages 2013
A unified execution model for multiple computation models of streaming applications on a composable MPSoC Fulltext Access 15 Pages 2013
On the impact of trace-based feature location in the performance of software maintainers Fulltext Access 15 Pages 2013
Search Based Software Engineering: Review and analysis of the field in Brazil Fulltext Access 15 Pages 2013
Proportional fairness in MAC layer channel access of IEEE 802.11s EDCA based wireless mesh networks Fulltext Access 15 Pages 2013
Incremental service level agreements violation handling with time impact analysis Fulltext Access 15 Pages 2013
Double auction-inspired meta-scheduling of parallel applications on global grids Fulltext Access 15 Pages 2013
Resource-efficient authentic key establishment in heterogeneous wireless sensor networks Fulltext Access 15 Pages 2013
Reliability and performance optimization of pipelined real-time systems Fulltext Access 15 Pages 2013
Design, implementation, and evaluation of a low-complexity vector-core for executing scalar/vector instructions Fulltext Access 15 Pages 2013
A multicast reprogramming protocol for wireless sensor networks based on small world concepts Fulltext Access 15 Pages 2013
On minimizing the resource consumption of cloud applications using process migrations Fulltext Access 15 Pages 2013
Combining multi-core and GPU computing for solving combinatorial optimization problems Fulltext Access 15 Pages 2013
MatchTree: Flexible, scalable, and fault-tolerant wide-area resource discovery with distributed matchmaking and aggregation Fulltext Access 15 Pages 2013
Towards a community-based, social network-driven framework for Web services management Fulltext Access 15 Pages 2013
A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients Fulltext Access 15 Pages 2013
Designing a parallel cloud based comparative genomics workflow to improve phylogenetic analyses Fulltext Access 15 Pages 2013
Architecture design of a user-orientated electronic laboratory notebook: A case study within an atmospheric chemistry community Fulltext Access 15 Pages 2013
On the powerful use of simulations in the Quake-Catcher Network to efficiently position low-cost earthquake sensors Fulltext Access 15 Pages 2013
A service framework for energy-aware monitoring and VM management in Clouds Fulltext Access 15 Pages 2013
Cross-layer network formation for energy-efficient IEEE 802.15.4/ZigBee Wireless Sensor Networks Fulltext Access 15 Pages 2013
Egocentric online social networks: Analysis of key features and prediction of tie strength in Facebook Fulltext Access 15 Pages 2013
A survey on in-network querying and tracking services for wireless sensor networks Fulltext Access 15 Pages 2013
Enhanced calibration technique for RSSI-based ranging in body area networks Fulltext Access 15 Pages 2013
A scalable joint routing and scheduling scheme for large-scale wireless sensor networks Fulltext Access 15 Pages 2013
Distributed semi-synchronous channel coordination for multi-channel wireless networks Fulltext Access 15 Pages 2013
An efficient handover decision method based on frame retransmission and data rate for multi-rate WLANs Fulltext Access 15 Pages 2013
Packet-centric approach to distributed sparse-graph coding in wireless ad hoc networks Fulltext Access 15 Pages 2013
An integrated system based on wireless sensor networks for patient monitoring, localization and tracking Fulltext Access 15 Pages 2013
Reliability analysis of a channel restoration mechanism for opportunistic spectrum access Fulltext Access 15 Pages 2013
On the scheduling, multiplexing and diversity trade-off in MIMO ad hoc networks: A unified framework Fulltext Access 15 Pages 2013
Energy and spectrum-aware MAC protocol for perpetual wireless nanosensor networks in the Terahertz Band Fulltext Access 15 Pages 2013
Improving scalability in vehicular communication using one-way hash chain method Fulltext Access 15 Pages 2013
Improving vehicular safety message delivery through the implementation of a cognitive vehicular network Fulltext Access 15 Pages 2013
Load balancing techniques for lifetime maximizing in wireless sensor networks Fulltext Access 15 Pages 2013
A distributed data storage protocol for heterogeneous wireless sensor networks with mobile sinks Fulltext Access 15 Pages 2013