IIDWBA algorithm for integrated hybrid PON with wireless technologies for next generation broadband access networks Fulltext Access 19 Pages 2013
Evidence of software inspection on feature specification for software product lines Fulltext Access 19 Pages 2013
Measuring the impact of changes to the complexity and coupling properties of automotive software systems Fulltext Access 19 Pages 2013
A mixed-method approach for the empirical evaluation of the issue-based variability modeling Fulltext Access 19 Pages 2013
From chaos to the systematic harmonization of multiple reference models: A harmonization framework applied in two case studies Fulltext Access 19 Pages 2013
A direct method for optimal VLSI realization of deeply nested n-D loop problems Fulltext Access 19 Pages 2013
On the numerical solution of Kronecker-based infinite level-dependent QBD processes Fulltext Access 19 Pages 2013
IncogniSense: An anonymity-preserving reputation framework for participatory sensing applications Fulltext Access 19 Pages 2013
A new self-diagnosing approach based on petri nets and correlation graphs for fault management in wireless sensor networks Fulltext Access 19 Pages 2013
Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration Fulltext Access 19 Pages 2013
Evaluation studies of software testing research in Brazil and in the world: A survey of two premier software engineering conferences Fulltext Access 19 Pages 2013
Efficient coupled PHY and MAC use of physical Bursts in WiMAX/IEEE 802.16e networks Fulltext Access 19 Pages 2013
A general scalable and accurate decentralized level monitoring method for large-scale dynamic service provision in hybrid clouds Fulltext Access 19 Pages 2013
Formal approach to agent-based dynamic reconfiguration in Networks-On-Chip Fulltext Access 20 Pages 2013
What are the roles of software product managers? An empirical investigation Fulltext Access 20 Pages 2013
Dynamic distribution of robot control components under hard realtime constraints – Modeling, experimental results and practical considerations Fulltext Access 20 Pages 2013
Software generated device exception for more intensive device-related software testing: An industrial field study Fulltext Access 20 Pages 2013
Supporting concept location through identifier parsing and ontology extraction Fulltext Access 20 Pages 2013
Supporting end-to-end quality of service properties in OMG data distribution service publish/subscribe middleware over wide area networks Fulltext Access 20 Pages 2013
On the interaction between TCP-like sources and throughput-efficient scheduling policies Fulltext Access 20 Pages 2013
From big smartphone data to worldwide research: The Mobile Data Challenge Fulltext Access 20 Pages 2013
Application and analysis of multidimensional negative surveys in participatory sensing applications Fulltext Access 20 Pages 2013
Design and analysis of heterogeneous nanoscale on-chip communication networks Fulltext Access 20 Pages 2013
On the scalability of the random pairwise key predistribution scheme: Gradual deployment and key ring sizes Fulltext Access 20 Pages 2013
Formal verification of context and situation models in pervasive computing Fulltext Access 20 Pages 2013
APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks Fulltext Access 20 Pages 2013
A content-based publish/subscribe framework for large-scale content delivery Fulltext Access 20 Pages 2013
Optimizing throughput performance of FMIPv6 over legacy 802.11 networks using iterative scanning Fulltext Access 20 Pages 2013
GOAL: A parsimonious geographic routing protocol for large scale sensor networks Fulltext Access 20 Pages 2013
Geo-casting of queries combined with coverage area reporting for wireless sensor networks Fulltext Access 20 Pages 2013
A cross-layer multi-hop cooperative network architecture for wireless ad hoc networks Fulltext Access 20 Pages 2013
H: A component-based specification language for heterogeneous applications Fulltext Access 20 Pages 2013
On design and performance evaluation of an integrated SIP and HCoP-B architecture for nested network mobility Fulltext Access 20 Pages 2013
A new adaptive filtering subband algorithm for two-channel acoustic noise reduction and speech enhancement Fulltext Access 20 Pages 2013
HybridNN: An accurate and scalable network location service based on the inframetric model Fulltext Access 20 Pages 2013
Using interconnected risk maps to assess the threats faced by electricity infrastructures Fulltext Access 20 Pages 2013
Website features that gave rise to social commerce: a historical analysis Fulltext Access 20 Pages 2013
Scheduling parameter sweep workflow in the Grid based on resource competition Fulltext Access 20 Pages 2013
Delegate the smartphone user? Security awareness in smartphone platforms Fulltext Access 20 Pages 2013
On the optimality of cooperative intrusion detection for resource constrained wireless networks Fulltext Access 20 Pages 2013
A two phased service oriented Broker for replica selection in data grids Fulltext Access 20 Pages 2013
Providing multiple hard latency and throughput guarantees for packet switching networks on chip Fulltext Access 20 Pages 2013
Cross-layer design and analysis of WSN-based mobile target detection systems Fulltext Access 21 Pages 2013
Seeing through black boxes: Tracking transactions through queues under monitoring resource constraints Fulltext Access 21 Pages 2013
The feedback-capacity tradeoff for opportunistic beamforming under optimal user selection Fulltext Access 21 Pages 2013
Improving the transport performance in delay tolerant networks by random linear network coding and global acknowledgments Fulltext Access 21 Pages 2013
Network utility maximization over partially observable Markovian channels Fulltext Access 21 Pages 2013
Beyond the separation of identifier and locator: Building an identity-based overlay network architecture for the Future Internet Fulltext Access 21 Pages 2013
Incrementally upgradable data center architecture using hyperbolic tessellations Fulltext Access 21 Pages 2013
DistressNet: A disaster response system providing constant availability cloud-like services Fulltext Access 21 Pages 2013
Evaluating the perceived and estimated quality in use of Web 2.0 applications Fulltext Access 21 Pages 2013
Does decision documentation help junior designers rationalize their decisions? A comparative multiple-case study Fulltext Access 21 Pages 2013
Assessing the genuineness of events in runtime monitoring of cyber systems Fulltext Access 21 Pages 2013
Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform Fulltext Access 21 Pages 2013
A study of cyclic dependencies on defect profile of software components Fulltext Access 21 Pages 2013
A new MAC scheme specifically suited for real-time industrial communication based on IEEE 802.11e Fulltext Access 21 Pages 2013
Agile requirements prioritization in large-scale outsourced system projects: An empirical study Fulltext Access 21 Pages 2013
A formal role-based access control model for security policies in multi-domain mobile networks Fulltext Access 21 Pages 2013
Common weaving approach in mainstream languages for software security hardening Fulltext Access 21 Pages 2013
A comprehensive review of the application characteristics and traffic requirements of a smart grid communications network Fulltext Access 21 Pages 2013
On the integration of model-driven design and dynamic assertion-based verification for embedded software Fulltext Access 21 Pages 2013
Simulation of molecular signaling in blood vessels: Software design and application to atherogenesis Fulltext Access 22 Pages 2013
Data center demand response: Avoiding the coincident peak via workload shifting and local generation Fulltext Access 22 Pages 2013
CAMPUS: A middleware for automated context-aware adaptation decision making at run time Fulltext Access 22 Pages 2013