Comparing approaches to analyze refactoring activity on software repositories Fulltext Access 17 Pages 2013
Avoiding semantic and temporal gaps in developing software intensive systems Fulltext Access 17 Pages 2013
Relevance, benefits, and problems of software modelling and model driven techniques—A survey in the Italian industry Fulltext Access 17 Pages 2013
SPAPE: A semantic-preserving amorphous procedure extraction method for near-miss clones Fulltext Access 17 Pages 2013
An FPGA based high performance optical flow hardware design for computer vision applications Fulltext Access 17 Pages 2013
Enriching MATLAB with aspect-oriented features for developing embedded systems Fulltext Access 17 Pages 2013
PASES: An energy-aware design space exploration framework for wireless sensor networks Fulltext Access 17 Pages 2013
Software-based serverless endpoint video combiner architecture for high-definition multiparty video conferencing Fulltext Access 17 Pages 2013
An intrusion detection and prevention system in cloud computing: A systematic review Fulltext Access 17 Pages 2013
A scoping study on the 25 years of research into software testing in Brazil and an outlook on the future of the area Fulltext Access 17 Pages 2013
New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm Fulltext Access 17 Pages 2013
Reducing cache and TLB power by exploiting memory region and privilege level semantics Fulltext Access 17 Pages 2013
Behavior-based tracking: Exploiting characteristic patterns in DNS traffic Fulltext Access 17 Pages 2013
Phishing detection and impersonated entity discovery using Conditional Random Field and Latent Dirichlet Allocation Fulltext Access 17 Pages 2013
Quality assessment of the packet transport of peer-to-peer video traffic in high-speed networks Fulltext Access 17 Pages 2013
Model and comparative analysis of reduced-complexity receiver designs for the LTE-advanced SC-FDMA uplink Fulltext Access 17 Pages 2013
New assembly techniques and fast reservation protocols for optical burst switched networks based on traffic prediction Fulltext Access 17 Pages 2013
Departure process analysis of the multi-type MMAP[K]/PH[K]/1 FCFS queue Fulltext Access 17 Pages 2013
Visual analysis of social networks in space and time using smartphone logs Fulltext Access 17 Pages 2013
Analysis of a versatile batch-service queueing model with correlation in the arrival process Fulltext Access 17 Pages 2013
A vision-based blind spot warning system for daytime and nighttime driver assistance Fulltext Access 17 Pages 2013
Towards an early software estimation using log-linear regression and a multilayer perceptron model Fulltext Access 17 Pages 2013
Refactoring legacy AJAX applications to improve the efficiency of the data exchange component Fulltext Access 17 Pages 2013
A simulation model for strategic management process of software projects Fulltext Access 17 Pages 2013
Hybrid multi-attribute QoS optimization in component based software systems Fulltext Access 17 Pages 2013
Model-based cache-aware dispatching of object-oriented software for multicore systems Fulltext Access 17 Pages 2013
Minimizing test-point allocation to improve diagnosability in business process models Fulltext Access 17 Pages 2013
Clustering and power management for virtual MIMO communications in wireless sensor networks Fulltext Access 17 Pages 2013
Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems Fulltext Access 17 Pages 2013
Enabling efficient reprogramming through reduction of executable modules in networked embedded systems Fulltext Access 17 Pages 2013
A dual scheme for compression and restoration of sequentially transmitted images over Wireless Sensor Networks Fulltext Access 17 Pages 2013
Efficient rate allocation, routing and channel assignment in wireless mesh networks supporting dynamic traffic flows Fulltext Access 17 Pages 2013
Energy minimization by exploiting data redundancy in real-time wireless sensor networks Fulltext Access 17 Pages 2013
Privacy-preserving and accountable on-the-road prosecution of invalid vehicular mandatory authorizations Fulltext Access 17 Pages 2013
A dual-mode energy efficient encryption protocol for wireless sensor networks Fulltext Access 17 Pages 2013
Impacts of user-selfishness on cooperative content caching in social wireless networks Fulltext Access 17 Pages 2013
Admission control on multipath routing in 802.11-based wireless mesh networks Fulltext Access 17 Pages 2013
Polarization-based cooperative directional MAC protocol for ad hoc networks Fulltext Access 17 Pages 2013
Design novel weighted rating of multiple attributes scheme to enhance handoff efficiency in heterogeneous wireless networks Fulltext Access 17 Pages 2013
Energy monitoring in residential spaces with audio sensor nodes: TinyEARS Fulltext Access 17 Pages 2013
Parallel Bayesian inference of range and reflectance from LaDAR profiles Fulltext Access 17 Pages 2013
Comparisons of air traffic control implementations on an associative processor with a MIMD and consequences for parallel computing Fulltext Access 17 Pages 2013
Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling Fulltext Access 17 Pages 2013
Continuous data aggregation and capacity in probabilistic wireless sensor networks Fulltext Access 17 Pages 2013
Locality principle revisited: A probability-based quantitative approach Fulltext Access 17 Pages 2013
CP2: Cryptographic privacy protection framework for online social networks Fulltext Access 17 Pages 2013
Overhead and underground MIMO low voltage broadband over power lines networks and EMI regulations: Towards greener capacity performances Fulltext Access 17 Pages 2013
Energy efficient and QoS aware routing protocol for Clustered Wireless Sensor Network Fulltext Access 17 Pages 2013
Interference-aware cooperative QoS routing in multi-hop wireless networks Fulltext Access 17 Pages 2013
A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES Fulltext Access 17 Pages 2013
Hierarchy-oriented modeling of enterprise architecture using reference-model of open distributed processing Fulltext Access 17 Pages 2013
Statistical speech translation system based on voice recognition optimization using multimodal sources of knowledge and characteristics vectors Fulltext Access 17 Pages 2013
Optimal opportunistic routing and network coding for bidirectional wireless flows Fulltext Access 17 Pages 2013
FaRNet: Fast recognition of high-dimensional patterns from big network traffic data Fulltext Access 17 Pages 2013
Multi-portal association based dispatching and a virtual-queue method in wireless mesh networks Fulltext Access 17 Pages 2013
An efficient critical protection scheme for intra-domain routing using link characteristics Fulltext Access 17 Pages 2013
Estimation of the available bandwidth ratio of a remote link or path segments Fulltext Access 17 Pages 2013
Energy efficiency of femtocell deployment in combined wireless/optical access networks Fulltext Access 17 Pages 2013
Mean–variance relationship of the number of flows in traffic aggregation and its application to traffic management Fulltext Access 17 Pages 2013
Performance evaluation of multisource Application Layer Multicast (ALM): Theoretical and simulative aspects Fulltext Access 17 Pages 2013
Stochastic modelling of peer-assisted VoD streaming in managed networks Fulltext Access 17 Pages 2013