Reduced complexity crosscorrelation interference mitigation in GPS-enabled collaborative ad-hoc wireless networks – Theory Fulltext Access 13 Pages 2012
Execution of natural language requirements using State Machines synthesised from Behavior Trees Fulltext Access 13 Pages 2012
SINOF: A dynamic-static combined framework for dynamic binary translation Fulltext Access 13 Pages 2012
Randomized execution algorithms for smart cards to resist power analysis attacks Fulltext Access 13 Pages 2012
Octopus: An Upperware based system for building personal pervasive environments Fulltext Access 13 Pages 2012
Have things changed now? An empirical study on input validation vulnerabilities in web applications Fulltext Access 13 Pages 2012
Polite sender: A resource-saving spam email countermeasure based on sender responsibilities and recipient justifications Fulltext Access 13 Pages 2012
RXIO: Design and implementation of high performance RDMA-capable GridFTP Fulltext Access 13 Pages 2012
A predictive handover scheme to improve service quality in the IEEE 802.21 network Fulltext Access 13 Pages 2012
Cross-layer architecture of impulse-based ultra wideband to support the integration of Radio Frequency Identification and wireless sensor network infrastructures Fulltext Access 13 Pages 2012
A linear chained approach for service invocation in IP Multimedia Subsystem Fulltext Access 13 Pages 2012
A queuing network model for minimizing the total makespan of computational grids Fulltext Access 13 Pages 2012
Definition of response metrics for an ontology-based Automated Intrusion Response Systems Fulltext Access 13 Pages 2012
Standardised system for automatic remote evaluation of biometric algorithms Fulltext Access 13 Pages 2012
Robustness of keystroke-dynamics based biometrics against synthetic forgeries Fulltext Access 13 Pages 2012
Building safe PaaS clouds: A survey on security in multitenant software platforms Fulltext Access 13 Pages 2012
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory Fulltext Access 13 Pages 2012
DC voltage design and corresponding compensation performance analysis for static var generator Fulltext Access 13 Pages 2012
Towards automated debugging in software evolution: Evaluating delta debugging on real regression bugs from the developers' perspectives Fulltext Access 13 Pages 2012
Dependency solving: A separate concern in component evolution management Fulltext Access 13 Pages 2012
An improved swarm optimized functional link artificial neural network (ISO-FLANN) for classification Fulltext Access 13 Pages 2012
“Leagile” software development: An experience report analysis of the application of lean approaches in agile software development Fulltext Access 13 Pages 2012
Energy efficient Traffic-Aware design of on-off Multi-Layer translucent optical networks Fulltext Access 13 Pages 2012
Comparison of control strategies for DSTATCOM in three-phase, four-wire distribution system for power quality improvement under various source voltage and load conditions Fulltext Access 13 Pages 2012
Feature extraction and classification algorithm for detecting complex covert timing channel Fulltext Access 13 Pages 2012
Impacts of distributed generations on power system transient and voltage stability Fulltext Access 13 Pages 2012
Bitmask-based code compression methods for balancing power consumption and code size for hard real-time embedded systems Fulltext Access 13 Pages 2012
A scalable pipelined architecture for real-time computation of MLP-BP neural networks Fulltext Access 13 Pages 2012
Optimization of sparse matrix–vector multiplication using reordering techniques on GPUs Fulltext Access 13 Pages 2012
Planar adaptive network-on-chip supporting deadlock-free and efficient tree-based multicast routing method Fulltext Access 13 Pages 2012
InRob: An approach for testing interoperability and robustness of real-time embedded software Fulltext Access 13 Pages 2012
Enabling correct design and formal analysis of Ambient Assisted Living systems Fulltext Access 13 Pages 2012
Generalized aggregate Quality of Service computation for composite services Fulltext Access 13 Pages 2012
SEProf: A high-level software energy profiling tool for an embedded processor enabling power management functions Fulltext Access 13 Pages 2012
Self-tuning of software systems through dynamic quality tradeoff and value-based feedback control loop Fulltext Access 13 Pages 2012
Accurate fault location algorithm for double-circuit series compensated lines using a limited number of two-end synchronized measurements Fulltext Access 13 Pages 2012
Advanced routing for city logistics service providers based on time-dependent travel times Fulltext Access 13 Pages 2012
Case for dynamic deployment in a grid-based distributed query processor Fulltext Access 13 Pages 2012
Visual understanding industrial workflows under uncertainty on distributed service oriented architectures Fulltext Access 13 Pages 2012
Protecting the consistency of workflow applications in collaborative development environments Fulltext Access 13 Pages 2012
PFRF: An adaptive data replication algorithm based on star-topology data grids Fulltext Access 13 Pages 2012
A time-constrained SLA negotiation strategy in competitive computational grids Fulltext Access 13 Pages 2012
PREDICT – Decision support system for load forecasting and inference: A new undertaking for Brazilian power suppliers Fulltext Access 13 Pages 2012
Estimation of power quality indices in distributed generation systems during power islanding conditions Fulltext Access 13 Pages 2012
H∞ load frequency control of interconnected power systems with communication delays Fulltext Access 13 Pages 2012
Designing, implementing and evaluating a new internetworking architecture Fulltext Access 13 Pages 2012
Long term distribution network planning considering urbanity uncertainties Fulltext Access 13 Pages 2012
Sweep frequency response analysis for diagnosis of low level short circuit faults on the windings of power transformers: An experimental study Fulltext Access 13 Pages 2012
Design and performance evaluation of SSSC supplementary modulation controller in power systems using SPEF method Fulltext Access 13 Pages 2012
Performance enhancement and robustness assessment of VSC–HVDC transmission systems controllers under uncertainties Fulltext Access 13 Pages 2012
A novel opposition-based gravitational search algorithm for combined economic and emission dispatch problems of power systems Fulltext Access 13 Pages 2012
Transforming e-services evaluation data into business analytics using value models Fulltext Access 13 Pages 2012
Do customization programs of e-commerce companies lead to better relationship with consumers? Fulltext Access 13 Pages 2012
Evaluating content quality and helpfulness of online product reviews: The interplay of review helpfulness vs. review content Fulltext Access 13 Pages 2012
Adding clicks to bricks: A study of the consequences on customer loyalty in a service context Fulltext Access 13 Pages 2012
Assessing the benefits of group-buying-based combinatorial reverse auctions Fulltext Access 13 Pages 2012
Graph based signature classes for detecting polymorphic worms via content analysis Fulltext Access 13 Pages 2012
Optimal mining on security labels for decentralized information flow control Fulltext Access 13 Pages 2012
Preventing delegation-based mobile authentications from man-in-the-middle attacks Fulltext Access 13 Pages 2012
Using decision fusion of feature selection in digital forensics for camera source model identification Fulltext Access 13 Pages 2012
Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme Fulltext Access 13 Pages 2012
Average framing linear prediction coding with wavelet transform for text-independent speaker identification system Fulltext Access 13 Pages 2012
A comparative study of hardware architectures for lightweight block ciphers Fulltext Access 13 Pages 2012
A Web-based, Offline-able, and Personalized Runtime Environment for executing applications on mobile devices Fulltext Access 13 Pages 2012
Payment frameworks for the purchase of electronic products and services Fulltext Access 13 Pages 2012
HW/SW for an intelligent transducer network based on IEEE 1451 standard Fulltext Access 13 Pages 2012
Energy-efficient topology control in wireless ad hoc networks with selfish nodes Fulltext Access 13 Pages 2012
Selecting shorter alternate paths for tunnel-based IP Fast ReRoute in linear time Fulltext Access 13 Pages 2012
Implementing novel reactive defense functionality in MPLS networks using hyperspeed signaling Fulltext Access 13 Pages 2012
Multi-sink load balanced forwarding with a multi-criteria fuzzy sink selection for video sensor networks Fulltext Access 13 Pages 2012
A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants Fulltext Access 13 Pages 2012
Securing wireless mesh networks in a unified security framework with corruption-resilience Fulltext Access 13 Pages 2012
Contention based scheduling for femtocell access points in a densely deployed network environment Fulltext Access 13 Pages 2012
A simple and robust handover authentication between HeNB and eNB in LTE networks Fulltext Access 13 Pages 2012
ECO–ALOC: Energy-efficient resource allocation for cluster-based software routers Fulltext Access 13 Pages 2012
A game theoretical study of access point association in wireless mesh networks Fulltext Access 13 Pages 2012
Centralized route recovery based on multi-hop wakeup time estimation for wireless sensor networks with ultra low duty cycles Fulltext Access 13 Pages 2012
A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks Fulltext Access 13 Pages 2012
Control mechanisms of presence updates: A tradeoff between traffic optimization and information consistency Fulltext Access 13 Pages 2012