An efficient model for dimensioning an ATA-based virtual storage system Fulltext Access 11 Pages 2012
Preserving privacy of feedback providers in decentralized reputation systems Fulltext Access 11 Pages 2012
A framework for quantitative evaluation of parallel control-flow obfuscation Fulltext Access 11 Pages 2012
Modeling the reliability of a group membership protocol for dual-scheduled time division multiple access networks Fulltext Access 11 Pages 2012
Noise-robust software based R/D conversion methods using over-sample technique Fulltext Access 11 Pages 2012
Adaptive instruction dispatching techniques for Simultaneous Multi-Threading (SMT) processors Fulltext Access 11 Pages 2012
A systematic approach to configurable functional verification of HW IP blocks at transaction level Fulltext Access 11 Pages 2012
Low complexity cell search scheme for LTE and LTE-advanced mobile technologies Fulltext Access 11 Pages 2012
A dynamic load balancing strategy with the push and pull approaches in DHT networks Fulltext Access 11 Pages 2012
Design of multi-path data routing algorithm based on network reliability Fulltext Access 11 Pages 2012
Tracing and revoking scheme for dynamic privileges against pirate rebroadcast Fulltext Access 11 Pages 2012
Research on development of embedded uninterruptable power supply system for IOT-based mobile service Fulltext Access 11 Pages 2012
Performance analysis of multicell multiuser MIMO MC DS/CDMA system with MMSE user-ordered SIC technique Fulltext Access 11 Pages 2012
Throughput and PER estimates harnessing link-layer measurements for indoor 802.11n WLAN Fulltext Access 11 Pages 2012
A distributed reputation and trust management scheme for mobile peer-to-peer networks Fulltext Access 11 Pages 2012
Joint authentication and quality of service provisioning in cooperative communication networks Fulltext Access 11 Pages 2012
Performance analysis of multiple-antenna cooperative networks under Weibull fading Fulltext Access 11 Pages 2012
A hybrid genetic algorithm and chaotic function model for image encryption Fulltext Access 11 Pages 2012
Communication imperatives for indigenous peoples’ representation in policy making: Lessons from the IPRA (Indigenous Peoples Rights Act) experience Fulltext Access 11 Pages 2012
Efficient RTSP-based multiple buffering and packet transmission methods for delivering OMA PoC Box service Fulltext Access 11 Pages 2012
Optimal allocation of shunt Var compensators in power systems using a novel global harmony search algorithm Fulltext Access 11 Pages 2012
Identification of critical transmission limits in injection impedance plane Fulltext Access 11 Pages 2012
Dynamic process control and monitoring of novel S3RS based hydrogen cooling system Fulltext Access 11 Pages 2012
Voltage sag source location: A review with introduction of a new method Fulltext Access 11 Pages 2012
Political blog readers: Predictors of motivations for accessing political blogs Fulltext Access 11 Pages 2012
Using new technologies for stimulating interpersonal communication on HIV and AIDS Fulltext Access 11 Pages 2012
Man’s need or man’s greed: The human rights ramifications of green ICTs Fulltext Access 11 Pages 2012
HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks Fulltext Access 11 Pages 2012
A 1 GHz, DDR2/3 SSTL driver with On-Die Termination, strength calibration, and slew rate control Fulltext Access 11 Pages 2012
Efficient self-organized backbone formation in mobile ad hoc networks (MANETs) Fulltext Access 11 Pages 2012
A single-cycle output buffered router with layered switching for Networks-on-Chips Fulltext Access 11 Pages 2012
Efficient parallel architecture for multi-level forward discrete wavelet transform processors Fulltext Access 11 Pages 2012
Localized discriminative scale invariant feature transform based facial expression recognition Fulltext Access 11 Pages 2012
Automatic network intrusion detection: Current techniques and open issues Fulltext Access 11 Pages 2012
Control strategies for harmonic mitigation and power factor correction using shunt active filter under various source voltage conditions Fulltext Access 11 Pages 2012
Quorum based sink location service for irregular wireless sensor networks Fulltext Access 11 Pages 2012
A dual-band priority assignment algorithm for dynamic QoS resource management Fulltext Access 11 Pages 2012
A new approach to security-constrained generation scheduling of large-scale power systems with a piecewise linear ramping model Fulltext Access 11 Pages 2012
An application of artificial bee colony algorithm with least squares support vector machine for real and reactive power tracing in deregulated power system Fulltext Access 11 Pages 2012
Comparison of adaptive Neuro-Fuzzy-based space-vector modulation for two-level inverter Fulltext Access 11 Pages 2012
Identification of maximum loadability limit and weak buses using security constraint genetic algorithm Fulltext Access 11 Pages 2012
Simultaneous optimization of phase balancing and reconfiguration in distribution networks using BF–NM algorithm Fulltext Access 11 Pages 2012
Fuzzy bilinear state feedback control design based on TS fuzzy bilinear model for DC–DC converters Fulltext Access 11 Pages 2012
Unequal error protection under bitrate constraint for video streaming over internet Fulltext Access 11 Pages 2012
Power system flexibility with electricity storage technologies: A technical–economic assessment of a large-scale storage facility Fulltext Access 11 Pages 2012
Electric power system generation expansion plans considering the impact of Smart Grid technologies Fulltext Access 11 Pages 2012
Power quality enhancement in autonomous microgrid operation using Particle Swarm Optimization Fulltext Access 11 Pages 2012
Sliding mode control of a dual-stator induction generator for wind energy conversion systems Fulltext Access 11 Pages 2012
ANN based integrated security assessment of power system using parallel computing Fulltext Access 11 Pages 2012
Fuel-quality soft sensor using the dynamic superheater model for control strategy improvement of the BioPower 5 CHP plant Fulltext Access 11 Pages 2012
A scenario-based multiobjective operation of electricity markets enhancing transient stability Fulltext Access 11 Pages 2012
A day-ahead energy market simulation framework for assessing the impact of decentralized generators on step-down transformer power flows Fulltext Access 11 Pages 2012
Consumer electronics acceptance based on innovation attributes and switching costs: The case of e-book readers Fulltext Access 11 Pages 2012
Triggers and barriers to financial inclusion: The use of ICT-based branchless banking in an Amazon county Fulltext Access 11 Pages 2012
How to improve consumer attitudes toward using credit cards online: An experimental study Fulltext Access 11 Pages 2012
Capacity estimation algorithm for simultaneous support of multi-class traffic services in Mobile WiMAX Fulltext Access 11 Pages 2012
A multi-criteria network-aware service composition algorithm in wireless environments Fulltext Access 11 Pages 2012
A learning automata-based uplink scheduler for supporting real-time multimedia interactive traffic in IEEE 802.16 WiMAX networks Fulltext Access 11 Pages 2012
Dynamic adjustable multimedia streaming service architecture over cloud computing Fulltext Access 11 Pages 2012
Cross-layer analysis of error control in underwater wireless sensor networks Fulltext Access 11 Pages 2012
Initiative movement prediction assisted adaptive handover trigger scheme in fast MIPv6 Fulltext Access 11 Pages 2012
Fuzzy ring-overlapping range-free (FRORF) localization method for wireless sensor networks Fulltext Access 11 Pages 2012
Energy-efficient WLAN with on-demand AP wake-up using IEEE 802.11 frame length modulation Fulltext Access 11 Pages 2012
An energy-centric handover decision algorithm for the integrated LTE macrocell–femtocell network Fulltext Access 11 Pages 2012
Seamless handover supported by parallel polling and dynamic multicast group in connected WLAN micro-cells system Fulltext Access 11 Pages 2012
Feed Forward Bandwidth Indication (FFBI): Cooperation for an accurate bandwidth forecast Fulltext Access 11 Pages 2012
Swarm mobility and its impact on performance of routing protocols in MANETs Fulltext Access 11 Pages 2012
Grid cell based detection strategy for MIMO radar with widely separated subarrays Fulltext Access 11 Pages 2012
Listless block-tree set partitioning algorithm for very low bit rate embedded image compression Fulltext Access 11 Pages 2012
A new joint strategy of radio channel allocation and power control for wireless mesh networks Fulltext Access 11 Pages 2012
Packet aggregation based network I/O virtualization for cloud computing Fulltext Access 11 Pages 2012
QoS in Wireless LAN: A comparison between feedback-based and earliest due-date approaches Fulltext Access 11 Pages 2012