Contention-based forwarding with multi-hop connectivity awareness in vehicular ad-hoc networks Fulltext Access 17 Pages 2013
Proportional and double imitation rules for spectrum access in cognitive radio networks Fulltext Access 17 Pages 2013
An adaptive risk management and access control framework to mitigate insider threats Fulltext Access 18 Pages 2013
An embedded implementation of the Generalized Predictive Control algorithm applied to automotive active suspension systems Fulltext Access 18 Pages 2013
Recurrent modified Elman neural network control of PM synchronous generator system using wind turbine emulator of PM synchronous servo motor drive Fulltext Access 18 Pages 2013
An elaborate chronological and spatial analysis of energy hole for wireless sensor networks Fulltext Access 18 Pages 2013
The grammatical approach: A syntax-directed declarative specification method for XML processing tasks Fulltext Access 18 Pages 2013
Modeling users on the World Wide Web based on cognitive factors, navigation behavior and clustering techniques Fulltext Access 18 Pages 2013
The SIC botnet lifecycle model: A step beyond traditional epidemiological models Fulltext Access 18 Pages 2013
A decision support framework for metrics selection in goal-based measurement programs: GQM-DSFMS Fulltext Access 18 Pages 2013
Bloom filter applications in network security: A state-of-the-art survey Fulltext Access 18 Pages 2013
Metamodel-driven definition of a visual modeling language for specifying interactive groupware applications: An empirical study Fulltext Access 18 Pages 2013
VMPlanner: Optimizing virtual machine placement and traffic flow routing to reduce network power costs in cloud data centers Fulltext Access 18 Pages 2013
Automated test data generation for branch testing using genetic algorithm: An improved approach using branch ordering, memory and elitism Fulltext Access 18 Pages 2013
SimplyRep: A simple and effective reputation system to fight pollution in P2P live streaming Fulltext Access 18 Pages 2013
Petri net based techniques for constructing reliable service composition Fulltext Access 18 Pages 2013
Analysis of Secure LEACH-Based Clustering Protocols in Wireless Sensor Networks Fulltext Access 18 Pages 2013
A novel paths algebra-based strategy to flexibly solve the link mapping stage of VNE problems Fulltext Access 18 Pages 2013
A survey and tutorial of wireless relay network protocols based on network coding Fulltext Access 18 Pages 2013
A new triage model conforming to the needs of selective search and seizure of electronic evidence Fulltext Access 18 Pages 2013
An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations Fulltext Access 18 Pages 2013
Building semi-intelligent web cache systems with lightweight machine learning techniques Fulltext Access 18 Pages 2013
A lane level positioning-based cooperative vehicle conflict resolution algorithm for unsignalized intersection collisions Fulltext Access 18 Pages 2013
Multi-hop communications on wireless network-on-chip using optimized phased-array antennas Fulltext Access 18 Pages 2013
Efficient 2D and 3D watershed on graphics processing unit: block-asynchronous approaches based on cellular automata Fulltext Access 18 Pages 2013
Simple tight approximations of the error performance for dual-hop MIMO relay systems in Rayleigh fading Fulltext Access 18 Pages 2013
A reference architecture for organizing the internal structure of metadata-based frameworks Fulltext Access 18 Pages 2013
On combining network coding with duty-cycling in flood-based wireless sensor networks Fulltext Access 18 Pages 2013
Self-coexistence among interference-aware IEEE 802.22 networks with enhanced air-interface Fulltext Access 18 Pages 2013
Evaluation of realtime people tracking for indoor environments using ubiquitous motion sensors and limited wireless network infrastructure Fulltext Access 18 Pages 2013
Rate management in multiuser detection based MAC design for ad hoc networks Fulltext Access 18 Pages 2013
IRIS: Integrated data gathering and interest dissemination system for wireless sensor networks Fulltext Access 18 Pages 2013
A convex optimization approach for clone detection in wireless sensor networks Fulltext Access 18 Pages 2013
Designing robust network topologies for wireless sensor networks in adversarial environments Fulltext Access 18 Pages 2013
TC-BAC: A trust and centrality degree based access control model in wireless sensor networks Fulltext Access 18 Pages 2013
On the tradeoff between altruism and selfishness in MANET trust management Fulltext Access 18 Pages 2013
Analysis of a two-layered network by means of the power-series algorithm Fulltext Access 18 Pages 2013
Efficient local search on the GPU—Investigations on the vehicle routing problem Fulltext Access 18 Pages 2013
A family of heuristics for agent-based elastic Cloud bag-of-tasks concurrent scheduling Fulltext Access 18 Pages 2013
Two-stage economic and environmental load dispatching framework using particle filtering Fulltext Access 18 Pages 2013
Performance evaluation and service rate provisioning for a queue with fractional Brownian input Fulltext Access 18 Pages 2013
TeMNOT: A test methodology for the non-intrusive online testing of FPGA with hardwired network on chip Fulltext Access 18 Pages 2013
Toward an efficient and scalable feature selection approach for internet traffic classification Fulltext Access 18 Pages 2013
An approach to provide a network layer security model with QR code generated with shuffled GPS parameters as embedded keys traveling over Internet using existing IPv4 mechanism Fulltext Access 18 Pages 2013
Virtualized Web server cluster self-configuration to optimize resource and power use Fulltext Access 18 Pages 2013
MOO: An architectural framework for runtime optimization of multiple system objectives in embedded control software Fulltext Access 18 Pages 2013
Performance analysis of in-network caching for content-centric networking Fulltext Access 18 Pages 2013
Realising an application environment for information-centric networking Fulltext Access 18 Pages 2013
Design of massively parallel hardware multi-processors for highly-demanding embedded applications Fulltext Access 18 Pages 2013
Swarm optimisation algorithms applied to large balanced communication networks Fulltext Access 19 Pages 2013
A hybrid approach to minimize state space explosion problem for the solution of two stage tandem queues Fulltext Access 19 Pages 2013
Feature interaction in a federated communications-enabled collaboration platform Fulltext Access 19 Pages 2013
A new approach for optimal capacitor placement and sizing in unbalanced distorted distribution systems using hybrid honey bee colony algorithm Fulltext Access 19 Pages 2013
Foundations of distributed multiscale computing: Formalization, specification, and analysis Fulltext Access 19 Pages 2013
Trust prediction and trust-based source routing in mobile ad hoc networks Fulltext Access 19 Pages 2013
Exploring geographic context awareness for data dissemination on mobile ad hoc networks Fulltext Access 19 Pages 2013
Optimal trajectory determination of a single moving beacon for efficient localization in a mobile ad-hoc network Fulltext Access 19 Pages 2013
A survey on applications of IEEE 802.21 Media Independent Handover framework in next generation wireless networks Fulltext Access 19 Pages 2013
A flexible optical switch architecture for efficient transmission of optical bursts Fulltext Access 19 Pages 2013
Performance analysis of Virtual Mobility Domain scheme vs. IPv6 mobility protocols Fulltext Access 19 Pages 2013
Safeguarding ad hoc networks with a self-organized membership control system Fulltext Access 19 Pages 2013
Zero-Degree algorithm for Internet GateWay placement in backbone wireless mesh networks Fulltext Access 19 Pages 2013
An underwater acoustic MAC protocol using reverse opportunistic packet appending Fulltext Access 19 Pages 2013
An access protocol for efficiency optimization in WDM networks: A propagation delay and collisions avoidance analysis Fulltext Access 19 Pages 2013
Collaborative approach to mitigating ARP poisoning-based Man-in-the-Middle attacks Fulltext Access 19 Pages 2013
On the optimal, fair and channel-aware cognitive radio network reconfiguration Fulltext Access 19 Pages 2013
Botnet command and control based on Short Message Service and human mobility Fulltext Access 19 Pages 2013
A privacy-aware access control model for distributed network monitoring Fulltext Access 19 Pages 2013
A new parallel recomputing code design methodology for fast failure recovery Fulltext Access 19 Pages 2013
Face recognition using Gabor-based direct linear discriminant analysis and support vector machine Fulltext Access 19 Pages 2013
Using network-based text analysis to analyze trends in Microsoft's security innovations Fulltext Access 19 Pages 2013