Energy optimization of Application-Specific Instruction-Set Processors by using hardware accelerators in semicustom ICs technology Fulltext Access 11 Pages 2012
Ontology driven bee's foraging approach based self adaptive online recommendation system Fulltext Access 12 Pages 2012
A history-based cost-cognizant test case prioritization technique in regression testing Fulltext Access 12 Pages 2012
A user-friendly secret image sharing scheme with reversible steganography based on cellular automata Fulltext Access 12 Pages 2012
Investigating intentional distortions in software cost estimation – An exploratory study Fulltext Access 12 Pages 2012
Grindstone4Spam: An optimization toolkit for boosting e-mail classification Fulltext Access 12 Pages 2012
Concept vector for semantic similarity and relatedness based on WordNet structure Fulltext Access 12 Pages 2012
NetStage/DPR: A self-reconfiguring platform for active and passive network security operations Fulltext Access 12 Pages 2012
Security analysis of image cryptosystems only or partially based on a chaotic permutation Fulltext Access 12 Pages 2012
Debugging applications created by a Domain Specific Language: The IPAC case Fulltext Access 12 Pages 2012
Free and Open Source Software versus Internet content filtering and censorship: A case study Fulltext Access 12 Pages 2012
Intelligent reversible watermarking in integer wavelet domain for medical images Fulltext Access 12 Pages 2012
An adaptive model-free resource and power management approach for multi-tier cloud environments Fulltext Access 12 Pages 2012
A longitudinal case study of an emerging software ecosystem: Implications for practice and theory Fulltext Access 12 Pages 2012
Applying security policies and service level agreement to IaaS service model to enhance security and transition Fulltext Access 12 Pages 2012
Hierarchical hybrid control for improving comprehensive performance in smart power system Fulltext Access 12 Pages 2012
An experimental comparison of different real-time schedulers on multicore systems Fulltext Access 12 Pages 2012
The influence of SPI on business success in software SMEs: An empirical study Fulltext Access 12 Pages 2012
Performance analysis of sleep mode mechanisms in the presence of bidirectional traffic Fulltext Access 12 Pages 2012
Ant colony based self-adaptive energy saving routing for energy efficient Internet Fulltext Access 12 Pages 2012
How do we encourage an egoist to act socially in an ad hoc mobile network? Fulltext Access 12 Pages 2012
A novel neural network and backtracking based protection coordination scheme for distribution system with distributed generation Fulltext Access 12 Pages 2012
Maximum power point tracking of partially shaded solar PV system using modified Fibonacci search method with fuzzy controller Fulltext Access 12 Pages 2012
A signer-independent Arabic Sign Language recognition system using face detection, geometric features, and a Hidden Markov Model Fulltext Access 12 Pages 2012
Energy management strategy for fuel cell/battery/ultracapacitor hybrid vehicle based on fuzzy logic Fulltext Access 12 Pages 2012
NSGA-II with local search for a multi-objective reactive power compensation problem Fulltext Access 12 Pages 2012
Transient performance improvement of grid connected hydro system using distributed generation and capacitive energy storage unit Fulltext Access 12 Pages 2012
Comparison of different robust control methods in design of decentralized UPFC controllers Fulltext Access 12 Pages 2012
An application specific instruction set processor based implementation for signal detection in multiple antenna systems Fulltext Access 12 Pages 2012
Rapid exploration of integrated scheduling and module selection in high level synthesis for application specific processor design Fulltext Access 12 Pages 2012
An efficient routing methodology to tolerate static and dynamic faults in 2-D mesh networks-on-chip Fulltext Access 12 Pages 2012
Accelerating FPGA-based evolution of wavelet transform filters by optimized task scheduling Fulltext Access 12 Pages 2012
Design automation of cellular neural networks for data fusion applications Fulltext Access 12 Pages 2012
Balancing electricity bill and performance in server farms with setup costs Fulltext Access 12 Pages 2012
Dynamic RAT selection for multiple calls in heterogeneous wireless networks using group decision-making technique Fulltext Access 12 Pages 2012
An efficient key management scheme for content access control for linear hierarchies Fulltext Access 12 Pages 2012
Utility-based scheduling in wireless multi-hop networks over non-deterministic fading channels Fulltext Access 12 Pages 2012
The Spy Element Method – A universal approach to complex computing on manycore processors Fulltext Access 12 Pages 2012
Towards governance on noise between municipality and terminal operator by the use of simulation modelling Fulltext Access 12 Pages 2012
Overlay network resource allocation using a decentralized market-based approach Fulltext Access 12 Pages 2012
Energy accounting for shared virtualized environments under DVFS using PMC-based power models Fulltext Access 12 Pages 2012
CyberGuarder: A virtualization security assurance architecture for green cloud computing Fulltext Access 12 Pages 2012
A service oriented architecture for decision support systems in environmental crisis management Fulltext Access 12 Pages 2012
High level QoS-driven model for Grid applications in a simulated environment Fulltext Access 12 Pages 2012
Combining explicit admission control and congestion control for predictable data transfers in grids Fulltext Access 12 Pages 2012
Scheduling real-time DAGs in heterogeneous clusters by combining imprecise computations and bin packing techniques for the exploitation of schedule holes Fulltext Access 12 Pages 2012
Adaptive parallel job scheduling with resource admissible allocation on two-level hierarchical grids Fulltext Access 12 Pages 2012
Impact of pricing schemes on a market for Software-as-a-Service and perpetual software Fulltext Access 12 Pages 2012
Service level agreement as a complementary currency in peer-to-peer markets Fulltext Access 12 Pages 2012
A state estimator including conventional and synchronized phasor measurements Fulltext Access 12 Pages 2012
On the self-similarity of 1/fβ sequences synthesized by recursive filtering Fulltext Access 12 Pages 2012
Automatic mapping of parallel applications on multicore architectures using the Servet benchmark suite Fulltext Access 12 Pages 2012
Research on the immune strategy for the polluted file propagation in structured P2P networks Fulltext Access 12 Pages 2012
Spectral efficiency of cognitive radio networks under interference constraint and QoS guarantees Fulltext Access 12 Pages 2012
HACS: A novel cost aware paradigm promising fault tolerance on mesh-based network on chip architecture Fulltext Access 12 Pages 2012
Local Upsampling Fourier Transform for accurate 2D/3D image registration Fulltext Access 12 Pages 2012
A systematic gradient-based method for the computation of fingerprint’s orientation field Fulltext Access 12 Pages 2012
A standard language for service delivery: Enabling understanding among stakeholders Fulltext Access 12 Pages 2012
Formal verification of a Cooperative Automatic Repeat reQuest MAC protocol Fulltext Access 12 Pages 2012
Churn prediction in telecom using Random Forest and PSO based data balancing in combination with various feature selection strategies Fulltext Access 12 Pages 2012
FPGA implementation and performance study of spectrum sensing based on entropy estimation using cyclic features Fulltext Access 12 Pages 2012
Power-aware system-on-chip test scheduling using enhanced rectangle packing algorithm Fulltext Access 12 Pages 2012
On the impact of adaptive RED in IP networks transporting H.264/MPEG-4 AVC video streams Fulltext Access 12 Pages 2012
Receiving-peer-driven multi-video-source scheduling algorithms in mobile P2P overlay networks Fulltext Access 12 Pages 2012
Heuristic algorithms for two-dimensional uplink burst construction in IEEE 802.16 networks Fulltext Access 12 Pages 2012
Virtio network paravirtualization driver: Implementation and performance of a de-facto standard Fulltext Access 12 Pages 2012