Achieving reliable system performance by fast recovery of branch miss prediction Fulltext Access 10 Pages 2012
Improving VRSS-based vulnerability prioritization using analytic hierarchy process Fulltext Access 10 Pages 2012
Side channel analysis attacks using AM demodulation on commercial smart cards with SEED Fulltext Access 10 Pages 2012
Self-control of the time complexity of a constraint satisfaction problem solver program Fulltext Access 10 Pages 2012
Intrusion-resilient identity-based signature: Security definition and construction Fulltext Access 10 Pages 2012
A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system Fulltext Access 10 Pages 2012
Grouping target paths for evolutionary generation of test data in parallel Fulltext Access 10 Pages 2012
Interpretation problems related to the use of regression models to decide on economy of scale in software development Fulltext Access 10 Pages 2012
Benefits of supplementing use case narratives with activity diagrams—An exploratory study Fulltext Access 10 Pages 2012
Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks Fulltext Access 10 Pages 2012
Comparison of recovery schemes to maximize restorable throughput in multicast networks Fulltext Access 10 Pages 2012
A self-adapting connection admission control solution for mobile WiMAX: Enabling dynamic switching of admission control algorithms based on predominant network usage profiles Fulltext Access 10 Pages 2012
VEACON: A Vehicular Accident Ontology designed to improve safety on the roads Fulltext Access 10 Pages 2012
Data embedding using pixel value differencing and diamond encoding with multiple-base notational system Fulltext Access 10 Pages 2012
Feature extraction from vein images using spatial information and chain codes Fulltext Access 10 Pages 2012
Lessons learned writing digital forensics tools and managing a 30TB digital evidence corpus Fulltext Access 10 Pages 2012
High capacity reversible data hiding scheme based upon discrete cosine transformation Fulltext Access 10 Pages 2012
Using Pig as a data preparation language for large-scale mining software repositories studies: An experience report Fulltext Access 10 Pages 2012
A geometric mixed norm approach to shallow water acoustic channel estimation and tracking Fulltext Access 10 Pages 2012
Adaptive radio maps for pattern-matching localization via inter-beacon co-calibration Fulltext Access 10 Pages 2012
Receive antenna selection in diversely polarized MIMO transmissions with convex optimization Fulltext Access 10 Pages 2012
Opportunistic routing through conjugation in bacteria communication nanonetwork Fulltext Access 10 Pages 2012
Fluid limit analysis of FIFO and RR caching for independent reference models Fulltext Access 10 Pages 2012
Run-time generation of partial FPGA configurations for subword operations Fulltext Access 10 Pages 2012
Design and modeling of a low-power multi-channel integrated circuit for infrared gas recognition Fulltext Access 10 Pages 2012
On the use of embedded debug features for permanent and transient fault resilience in microprocessors Fulltext Access 10 Pages 2012
CCTR: An efficient point-to-point memory race recorder implemented in chunks Fulltext Access 10 Pages 2012
Tool for inspecting faults from incorrectly cleaved fiber ends and contaminated optical fiber connector end surfaces Fulltext Access 10 Pages 2012
Auxiliary graph based protection for survivable Fiber-Wireless (FiWi) access network considering different levels of failures Fulltext Access 10 Pages 2012
An unequal error protection mechanism for video streaming over IEEE 802.11e WLANs Fulltext Access 10 Pages 2012
Load compensation using DSTATCOM in three-phase, three-wire distribution system under various source voltage and delta connected load conditions Fulltext Access 10 Pages 2012
Coordinated design of PSSs and SVC via bacteria foraging optimization algorithm in a multimachine power system Fulltext Access 10 Pages 2012
Multistage expansion planning for active distribution networks under demand and Distributed Generation uncertainties Fulltext Access 10 Pages 2012
Location and contract pricing of distributed generation using a genetic algorithm Fulltext Access 10 Pages 2012
A prefix-based approach for managing hybrid specifications in complex packet filtering Fulltext Access 10 Pages 2012
Modelling and analysis of a power line communication system with QPSK modem for renewable smart grids Fulltext Access 10 Pages 2012
Nonconvex dynamic spectrum allocation for cognitive radio networks via particle swarm optimization and simulated annealing Fulltext Access 10 Pages 2012
Comparative study on the static and dynamic characteristics of four types of PMFCLs for large capacity applications Fulltext Access 10 Pages 2012
Possibilistic programming approach for mid-term electric power planning in deregulated markets Fulltext Access 10 Pages 2012
Penetration impact of wind farms equipped with frequency variations ride through algorithm on power system frequency response Fulltext Access 10 Pages 2012
Link quality estimation in wireless multi-hop networks using Kernel based methods Fulltext Access 10 Pages 2012
Two-stage distributed generation optimal sizing with clustering-based node selection Fulltext Access 10 Pages 2012
Optimal configuration of an optical network providing predefined multicast transmissions Fulltext Access 10 Pages 2012
Forensic analysis techniques for fragmented flash memory pages in smartphones Fulltext Access 10 Pages 2012
An integrated conceptual digital forensic framework for cloud computing Fulltext Access 10 Pages 2012
Virtualization of reconfigurable coprocessors in HPRC systems with multicore architecture Fulltext Access 10 Pages 2012
An FEC scheme combined with weighted scheduling to reduce multicast packet loss in IPTV over PON Fulltext Access 10 Pages 2012
An efficient and robust content delivery solution for IEEE 802.11p vehicular environments Fulltext Access 10 Pages 2012
Accumulating error-free frame blocks to improve throughput for IEEE 802.11-based WLAN Fulltext Access 10 Pages 2012
Coordination of cooperation policies in a peer-to-peer system using swarm-based RL Fulltext Access 10 Pages 2012
Analysis of the security of VPN configurations in industrial control environments Fulltext Access 11 Pages 2012
Are we prepared for the economic risk resulting from telecom hotel disruptions? Fulltext Access 11 Pages 2012
Novel association control strategies for multicasting in relay-enabled WLANs Fulltext Access 11 Pages 2012
Authenticating hard decision sensing reports in cognitive radio networks Fulltext Access 11 Pages 2012
Improving data quality using a cross layer protocol in wireless sensor networks Fulltext Access 11 Pages 2012
Multi-leader multi-follower Stackelberg model for cognitive radio spectrum sharing scheme Fulltext Access 11 Pages 2012
The Peer’s Dilemma: A general framework to examine cooperation in pure peer-to-peer systems Fulltext Access 11 Pages 2012
Hardware design and implementation of packet fair queuing algorithms for the quality of service support in the high-speed internet Fulltext Access 11 Pages 2012
Periodic early detection for improved TCP performance and energy efficiency Fulltext Access 11 Pages 2012
AWG-based optical switches performance using crosstalk limiting schedulers Fulltext Access 11 Pages 2012
Delayed information cascades in Flickr: Measurement, analysis, and modeling Fulltext Access 11 Pages 2012
Measuring the validity of peer-to-peer data for information retrieval applications Fulltext Access 11 Pages 2012