Improving Slow-start based probing mechanisms for flow adaptation after handovers Fulltext Access 16 Pages 2012
An experimental evaluation of cross-layer routing in a wireless mesh backbone Fulltext Access 16 Pages 2012
Voice call capacity analysis of long range WiFi as a femto backhaul solution Fulltext Access 16 Pages 2012
A bandwidth and effective hit optimal cache scheme for wireless data access networks with client injected updates Fulltext Access 16 Pages 2012
On the problem of k-coverage in mission-oriented mobile wireless sensor networks Fulltext Access 16 Pages 2012
Specification and monitoring of data-centric temporal properties for service-based systems Fulltext Access 17 Pages 2012
Free Search with Adaptive Differential Evolution Exploitation and Quantum-Inspired Exploration Fulltext Access 17 Pages 2012
Eventual strong consensus with fault detection in the presence of dual failure mode on processors under dynamic networks Fulltext Access 17 Pages 2012
W-Grid: A scalable and efficient self-organizing infrastructure for multi-dimensional data management, querying and routing in wireless data-centric sensor networks Fulltext Access 17 Pages 2012
Handling timing constraints violations in soft real-time applications as exceptions Fulltext Access 17 Pages 2012
Termite-hill: Performance optimized swarm intelligence based routing algorithm for wireless sensor networks Fulltext Access 17 Pages 2012
Bandwidth aggregation in heterogeneous wireless networks: A survey of current approaches and issues Fulltext Access 17 Pages 2012
Performance comparison of end-to-end mobility management protocols for TCP Fulltext Access 17 Pages 2012
Coding-error based defects in enterprise resource planning software: Prevention, discovery, elimination and mitigation Fulltext Access 17 Pages 2012
Expressing embedded systems configurations at high abstraction levels with UML MARTE profile: Advantages, limitations and alternatives Fulltext Access 17 Pages 2012
Redundancy-aware SOAP messages compression and aggregation for enhanced performance Fulltext Access 17 Pages 2012
Discovering target groups in social networking sites: An effective method for maximizing joint influential power Fulltext Access 17 Pages 2012
Noncespaces: Using randomization to defeat cross-site scripting attacks Fulltext Access 17 Pages 2012
An exploratory investigation of the investment information search behavior of individual domestic investors Fulltext Access 17 Pages 2012
A framework for model-driven development of information systems: Technical decisions and lessons learned Fulltext Access 17 Pages 2012
Mining frequent patterns from dynamic data streams with data load management Fulltext Access 17 Pages 2012
Multi-granularity and robust grooming in power- and port-cost-efficient IP over WDM networks Fulltext Access 17 Pages 2012
A tool for the generation of realistic network workload for emerging networking scenarios Fulltext Access 17 Pages 2012
Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks Fulltext Access 17 Pages 2012
An integrated sparsity and model-based probabilistic framework for estimating the spatial variations of communication channels Fulltext Access 17 Pages 2012
Egocentric interaction as a tool for designing ambient ecologies—The case of the easy ADL ecology Fulltext Access 17 Pages 2012
Social interaction regulation in virtual web environments using the Social Theatres model Fulltext Access 17 Pages 2012
Topological optimization for spare-sharing-based wavelength-routed all-optical networks Fulltext Access 17 Pages 2012
Computing system-time and system-length distributions for MAP/D/1 queue using distributional Little’s law Fulltext Access 17 Pages 2012
Efficient analysis of the queue length moments of the MMAP/MAP/1 preemptive priority queue Fulltext Access 17 Pages 2012
An embedded software-reconfigurable color segmentation architecture for image processing systems Fulltext Access 17 Pages 2012
IMORC: An infrastructure and architecture template for implementing high-performance reconfigurable FPGA accelerators Fulltext Access 17 Pages 2012
An analytical study of the communication cost of data-centric storage in mobile ad hoc networks Fulltext Access 17 Pages 2012
Catching popular prefixes at AS border routers with a prediction based method Fulltext Access 17 Pages 2012
Network convergence and QoS for future multimedia services in the VISION project Fulltext Access 17 Pages 2012
CSI: A paradigm for behavior-oriented profile-cast services in mobile networks Fulltext Access 17 Pages 2012
A negotiation-based networking methodology to enable cooperation across heterogeneous co-located networks Fulltext Access 17 Pages 2012
A survey of identity and handoff management approaches for the future Internet Fulltext Access 17 Pages 2012
On improving the representation of a region achieved by a sensor network Fulltext Access 17 Pages 2012
Practical packet combining for use with cooperative and non-cooperative ARQ schemes in resource-constrained wireless sensor networks Fulltext Access 17 Pages 2012
Enhancing IEEE 802.11p/WAVE to provide infotainment applications in VANETs Fulltext Access 17 Pages 2012
Sophia: A local trust system to secure key-based routing in non-deterministic DHTs Fulltext Access 17 Pages 2012
A reflective service gateway for integrating evolvable sensor–actuator networks with pervasive infrastructure Fulltext Access 17 Pages 2012
Workflow management for soft real-time interactive applications in virtualized environments Fulltext Access 17 Pages 2012
Modeling and analyzing the impact of authorization on workflow executions Fulltext Access 17 Pages 2012
A scenario driven multiobjective Primary–Secondary Distribution System Expansion Planning algorithm in the presence of wholesale–retail market Fulltext Access 17 Pages 2012
Evaluating a migration-based response to DoS attacks in a system of distributed auctions Fulltext Access 17 Pages 2012
Dynamic relay management protocol for efficient inter-piconet scheduling in Bluetooth scatternet Fulltext Access 17 Pages 2012
Zero Configuration Networking: Implementation, performance, and security Fulltext Access 17 Pages 2012
Voice activity detection algorithm using nonlinear spectral weights, hangover and hangbefore criteria Fulltext Access 17 Pages 2012
Optimized relay node placement for connecting disjoint wireless sensor networks Fulltext Access 17 Pages 2012
Stochastic TCP friendliness: Expanding the design space of TCP-friendly traffic control protocols Fulltext Access 17 Pages 2012
Detection of traffic changes in large-scale backbone networks: The case of the Spanish academic network Fulltext Access 17 Pages 2012
Cross-layer routing for peer database querying over mobile ad hoc networks Fulltext Access 17 Pages 2012
Extracting user web browsing patterns from non-content network traces: The online advertising case study Fulltext Access 17 Pages 2012
An analytic research on secondary-spectrum trading mechanisms based on technical and market changes Fulltext Access 17 Pages 2012
Design and evaluation of Mesh-of-Tree based Network-on-Chip using virtual channel router Fulltext Access 18 Pages 2012
A proposal to detect errors in Enterprise Application Integration solutions Fulltext Access 18 Pages 2012
Automated, highly-accurate, bug assignment using machine learning and tossing graphs Fulltext Access 18 Pages 2012
Reconciling perspectives: A grounded theory of how people manage the process of software development Fulltext Access 18 Pages 2012
Design and VLSI implementation of a high-performance face detection engine Fulltext Access 18 Pages 2012
Solutions for biomedical grid computing—Case studies from the D-Grid project Services@MediGRID Fulltext Access 18 Pages 2012
Achieving dynamic adaptation via management and interpretation of runtime models Fulltext Access 18 Pages 2012
A new heterogeneous tree-based application specific FPGA and its comparison with mesh-based application specific FPGA Fulltext Access 18 Pages 2012