A cross layer architecture for multicast and unicast video transmission in mobile broadband networks Fulltext Access 15 Pages 2012
HPobSAM for modeling and analyzing IT Ecosystems – Through a case study Fulltext Access 15 Pages 2012
Adaptive application offloading using distributed abstract class graphs in mobile environments Fulltext Access 15 Pages 2012
From Teleo-Reactive specifications to architectural components: A model-driven approach Fulltext Access 15 Pages 2012
JCSI: A tool for checking secure information flow in Java Card applications Fulltext Access 15 Pages 2012
A feedback-based decentralised coordination model for distributed open real-time systems Fulltext Access 15 Pages 2012
A computer assisted method for leukocyte nucleus segmentation and recognition in blood smear images Fulltext Access 15 Pages 2012
Dynamic service placement and replication framework to enhance service availability using team formation algorithm Fulltext Access 15 Pages 2012
Formally based semi-automatic implementation of an open security protocol Fulltext Access 15 Pages 2012
Rolling-horizon scheduling for energy constrained distributed real-time embedded systems Fulltext Access 15 Pages 2012
Adaptive co-scheduling for periodic application and update transactions in real-time database systems Fulltext Access 15 Pages 2012
Exploring parallelization techniques based on OpenMP in H.264/AVC encoder for embedded multi-core processor Fulltext Access 15 Pages 2012
Reinforcement learning for context awareness and intelligence in wireless networks: Review, new features and open issues Fulltext Access 15 Pages 2012
Using data envelopment analysis to evaluate the efficiency of web caching object replacement strategies Fulltext Access 15 Pages 2012
Knowledge-Aware and Service-Oriented Middleware for deploying pervasive services Fulltext Access 15 Pages 2012
HIPAA Privacy Rule compliance: An interpretive study using Norman’s action theory Fulltext Access 15 Pages 2012
Kinematic and dynamic analysis of a hexapod walking–running–bounding gaits robot and control actions Fulltext Access 15 Pages 2012
A comparative analysis of performance improvement schemes for cache memories Fulltext Access 15 Pages 2012
Pump wave coherence, modulation instability and their effect on continuous-wave supercontinua Fulltext Access 15 Pages 2012
Simulating digital dividend auctions: Service neutrality versus dedicated licences Fulltext Access 15 Pages 2012
A token based distributed algorithm for supporting mutual exclusion in opportunistic networks Fulltext Access 15 Pages 2012
Balancing energy efficiency and throughput fairness in IEEE 802.11 WLANs Fulltext Access 15 Pages 2012
Balancing behavioral privacy and information utility in sensory data flows Fulltext Access 15 Pages 2012
Resource efficient network design and traffic grooming strategy with guaranteed survivability Fulltext Access 15 Pages 2012
Fairness and efficiency for polling models with the κκ-gated service discipline Fulltext Access 15 Pages 2012
An efficient stabilized fast Newton adaptive filtering algorithm for stereophonic acoustic echo cancellation SAEC Fulltext Access 15 Pages 2012
Cost efficient traffic grooming and regenerator placement in impairment-aware optical WDM networks Fulltext Access 15 Pages 2012
Markovian agent modeling swarm intelligence algorithms in wireless sensor networks Fulltext Access 15 Pages 2012
Power-efficient deterministic and adaptive routing in torus networks-on-chip Fulltext Access 15 Pages 2012
The changing industry structure of software development for consumer electronics and its consequences for software architectures Fulltext Access 15 Pages 2012
DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks Fulltext Access 15 Pages 2012
Keyword clustering for user interest profiling refinement within paper recommender systems Fulltext Access 15 Pages 2012
A power efficiency routing and maintenance protocol in wireless multi-hop networks Fulltext Access 15 Pages 2012
Lightweight embedded software performance analysis method by kernel hack and its industrial field study Fulltext Access 15 Pages 2012
Detection quality of border surveillance wireless sensor networks in the existence of trespassers’ favorite paths Fulltext Access 15 Pages 2012
The Social Internet of Things (SIoT) – When social networks meet the Internet of Things: Concept, architecture and network characterization Fulltext Access 15 Pages 2012
Efficient progressive downloading over multimedia broadcast multicast service Fulltext Access 15 Pages 2012
Backpressure scheduling in IEEE 802.11 wireless mesh networks: Gap between theory and practice Fulltext Access 15 Pages 2012
Dynamic routing and spectrum (re)allocation in future flexgrid optical networks Fulltext Access 15 Pages 2012
Effects of access phases lengths on performance of IEEE 802.15.6 CSMA/CA Fulltext Access 15 Pages 2012
Novel scheduling algorithms for concurrent transmit/receive wireless mesh networks Fulltext Access 15 Pages 2012
Minimum delay load-balancing via nonparametric regression and no-regret algorithms Fulltext Access 15 Pages 2012
Impact analysis of BGP sessions for prioritization of maintenance operations Fulltext Access 15 Pages 2012
A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis Fulltext Access 15 Pages 2012
Contemporary review of techniques for the solution of nonlinear Burgers equation Fulltext Access 15 Pages 2012
Scheduling efficiency of resource information aggregation in grid networks Fulltext Access 15 Pages 2012
An effective data aggregation based adaptive long term CPU load prediction mechanism on computational grid Fulltext Access 15 Pages 2012
A robust optimization method for planning regional-scale electric power systems and managing carbon dioxide Fulltext Access 15 Pages 2012
The importance of market interdependencies in modeling energy systems – The case of the European electricity generation market Fulltext Access 15 Pages 2012
Design of a multilevel control strategy for integration of stand-alone wind/diesel system Fulltext Access 15 Pages 2012
Online user reviews, product variety, and the long tail: An empirical investigation on online software downloads Fulltext Access 15 Pages 2012
From the wisdom of crowds to my own judgment in microfinance through online peer-to-peer lending platforms Fulltext Access 15 Pages 2012
Partial forwarding vs. partial participation for dynamic window resizing in P2P streaming Fulltext Access 15 Pages 2012
From single watermark to dual watermark: A new approach for image watermarking Fulltext Access 15 Pages 2012
Pulse quarantine strategy of internet worm propagation: Modeling and analysis Fulltext Access 15 Pages 2012
Performance evaluation of Recursive Distributed Rendezvous based service discovery for Peer-to-Peer Session Initiation Protocol Fulltext Access 15 Pages 2012
Scheduling links for heavy traffic on interfering routes in wireless mesh networks Fulltext Access 15 Pages 2012
Probabilistic flooding in stochastic networks: Analysis of global information outreach Fulltext Access 15 Pages 2012
Non-asymptotic end-to-end performance bounds for networks with long range dependent fBm cross traffic Fulltext Access 15 Pages 2012
Integer linear programming optimization of joint RRM policies for heterogeneous wireless systems Fulltext Access 15 Pages 2012
Efficient and automatized error pattern modelling with hidden Markov models in digital communication Fulltext Access 16 Pages 2012