A systematic literature review of stakeholder identification methods in requirements elicitation Fulltext Access 11 Pages 2012
Understanding socially oriented roles and goals through motivational modelling Fulltext Access 11 Pages 2012
On the fundamentals of leakage aware real-time DVS scheduling for peak temperature minimization Fulltext Access 11 Pages 2012
Mobile telemedicine for moving vehicle scenarios: Wireless technology options and challenges Fulltext Access 11 Pages 2012
An incentive mechanism to reinforce truthful reports in reputation systems Fulltext Access 11 Pages 2012
Reputation rating modeling for open environment lack of communication by using online social cognition Fulltext Access 11 Pages 2012
Security threats and solutions in MANETs: A case study using AODV and SAODV Fulltext Access 11 Pages 2012
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks Fulltext Access 11 Pages 2012
Reliable spatial window aggregation query processing algorithm in wireless sensor networks Fulltext Access 11 Pages 2012
A structural approach for modelling the hierarchical dynamic process of Web workload in a large-scale campus network Fulltext Access 11 Pages 2012
Energy-aware performance analysis methodologies for HPC architectures—An exploratory study Fulltext Access 11 Pages 2012
Dynamic refinement of search engines results utilizing the user intervention Fulltext Access 11 Pages 2012
An automated timeline reconstruction approach for digital forensic investigations Fulltext Access 11 Pages 2012
IntroLib: Efficient and transparent library call introspection for malware forensics Fulltext Access 11 Pages 2012
MARTE profile extension for modeling dynamic power management of embedded systems Fulltext Access 11 Pages 2012
Register allocation for write activity minimization on non-volatile main memory for embedded systems Fulltext Access 11 Pages 2012
An energy-efficient mobile transaction processing method using random back-off in wireless broadcast environments Fulltext Access 11 Pages 2012
Node localization through physical layer network coding: Bootstrap, security, and accuracy Fulltext Access 11 Pages 2012
Compressive sampling based differential detection for UWB impulse radio signals Fulltext Access 11 Pages 2012
Belief-propagation-based joint channel estimation and decoding for spectrally efficient communication over unknown sparse channels Fulltext Access 11 Pages 2012
Design and implementation of a self-guided indoor robot based on a two-tier localization architecture Fulltext Access 11 Pages 2012
Tri-polarized spectrum sensing based on an experimental outdoor-to-indoor cognitive-radio scenario Fulltext Access 11 Pages 2012
Molecular circuits for decoding frequency coded signals in nano-communication networks Fulltext Access 11 Pages 2012
Using compressed index structures for processing moving objects in large spatio-temporal databases Fulltext Access 11 Pages 2012
Achieving key privacy without losing CCA security in proxy re-encryption Fulltext Access 11 Pages 2012
Making sense of business process descriptions: An experimental comparison of graphical and textual notations Fulltext Access 11 Pages 2012
Wireless sensor network-based fire detection, alarming, monitoring and prevention system for Bord-and-Pillar coal mines Fulltext Access 11 Pages 2012
Provably secure three-party password authenticated key exchange protocol in the standard model Fulltext Access 11 Pages 2012
Towards understanding the underlying structure of motivational factors for software engineers to guide the definition of motivational programs Fulltext Access 11 Pages 2012
AIOLOS: Middleware for improving mobile application performance through cyber foraging Fulltext Access 11 Pages 2012
Cross-layer end-to-end label switching protocol for WiMAX–MPLS heterogeneous networks Fulltext Access 11 Pages 2012
Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability Fulltext Access 11 Pages 2012
Globally Synchronized Frames for guaranteed quality-of-service in on-chip networks Fulltext Access 11 Pages 2012
A high performance multiple sequence alignment system for pyrosequencing reads from multiple reference genomes Fulltext Access 11 Pages 2012
Microwave tomography for breast cancer detection on Cell broadband engine processors Fulltext Access 11 Pages 2012
Optimal, quality-aware scheduling of data consumption in mobile ad hoc networks Fulltext Access 11 Pages 2012
Towards green data centers: A comparison of x86 and ARM architectures power efficiency Fulltext Access 11 Pages 2012
Bloom: A stochastic growth-based fast method of community detection in networks Fulltext Access 11 Pages 2012
An efficient computational framework for the analysis of whole slide images: Application to follicular lymphoma immunohistochemistry Fulltext Access 11 Pages 2012
A high performance fingerprint liveness detection method based on quality related features Fulltext Access 11 Pages 2012
Balancing energy consumption with mobile agents in wireless sensor networks Fulltext Access 11 Pages 2012
Morphological approach for autonomous and adaptive systems based on self-reconfigurable modular agents Fulltext Access 11 Pages 2012
Design and implementation of adaptive power-aware virtual machine provisioner (APA-VMP) using swarm intelligence Fulltext Access 11 Pages 2012
A distributed energy-efficient clustering algorithm with improved coverage in wireless sensor networks Fulltext Access 11 Pages 2012
A deductive system for proving workflow models from operational procedures Fulltext Access 11 Pages 2012
A weighted-fair-queuing (WFQ)-based dynamic request scheduling approach in a multi-core system Fulltext Access 11 Pages 2012
Securing sensor networks: A novel approach that combines encoding, uncorrelation and node disjoint transmission Fulltext Access 11 Pages 2012
Routing with multiple quality-of-services constraints: An approximation perspective Fulltext Access 11 Pages 2012
A hybrid policy for fault tolerant load balancing in grid computing environments Fulltext Access 11 Pages 2012
High level MANET protocol: Enhancing the communication support for mobile collaborative work Fulltext Access 11 Pages 2012
Throughput and delay scaling laws for mobile overlaid wireless networks Fulltext Access 11 Pages 2012
OSIA: Out-of-order Scheduling for In-order Arriving in concurrent multi-path transfer Fulltext Access 11 Pages 2012
Performance analysis of Bayesian networks and neural networks in classification of file system activities Fulltext Access 11 Pages 2012
Digital image forgery detection and estimation by exploring basic image manipulations Fulltext Access 11 Pages 2012
Shared hardware, high throughput implementation of 2D 4 × 4 and 8 × 8 integer transform for H.264/AVC high-profile coders Fulltext Access 11 Pages 2012
Extended sliding frame R-Aloha: Medium access control (MAC) protocol for mobile networks Fulltext Access 11 Pages 2012
Optimal wake-up scheduling of data gathering trees for wireless sensor networks Fulltext Access 11 Pages 2012
Performance analysis of an adaptive, energy-efficient MAC protocol for wireless sensor networks Fulltext Access 11 Pages 2012
A fast algorithm for constructing inverted files on heterogeneous platforms Fulltext Access 11 Pages 2012
Accelerating knowledge-based energy evaluation in protein structure modeling with Graphics Processing Units Fulltext Access 11 Pages 2012
URL: A unified reinforcement learning approach for autonomic cloud management Fulltext Access 11 Pages 2012
Improving the localization accuracy of targets by using their spatial–temporal relationships in wireless sensor networks Fulltext Access 11 Pages 2012
A flexible layered control policy for resource allocation in a sensor grid Fulltext Access 11 Pages 2012