An adaptive hybrid dynamic power management algorithm for mobile devices Fulltext Access 18 Pages 2012
ADR-SPLDA: Activity discovery and recognition by combining sequential patterns and latent Dirichlet allocation Fulltext Access 18 Pages 2012
Mechanisms for centralized flow rate control in 802.11-based wireless mesh networks Fulltext Access 18 Pages 2012
Supporting the Web with an information centric network that routes by name Fulltext Access 18 Pages 2012
CTAC: Control traffic tunneling attacks’ countermeasures in mobile wireless networks Fulltext Access 18 Pages 2012
Integrating network-calculus-based simulation with packet-level simulation for TCP-operated networks Fulltext Access 18 Pages 2012
Reducing congestion in bulk-service finite-buffer queueing system using batch-size-dependent service Fulltext Access 18 Pages 2012
Joint scheduling and routing algorithm with load balancing in wireless mesh network Fulltext Access 18 Pages 2012
Toward developing a systematic approach to generate benchmark datasets for intrusion detection Fulltext Access 18 Pages 2012
Using fuzzy logic applied to software metrics and test cases to assess programming assignments and give advice Fulltext Access 18 Pages 2012
Privacy-friendly synchronized ultralightweight authentication protocols in the storm Fulltext Access 18 Pages 2012
k-Nearest neighbor query processing algorithm for cloaking regions towards user privacy protection in location-based services Fulltext Access 18 Pages 2012
Opportunistically assisted parking service discovery: Now it helps, now it does not Fulltext Access 18 Pages 2012
A data dependence test based on the projection of paths over shape graphs Fulltext Access 18 Pages 2012
Automatic parallelisation for LTI MIMO state space systems using FPGAs. An optimisation for cost & performance Fulltext Access 18 Pages 2012
Quantitative analysis of the hidden terminal problem in preamble sampling WSNs Fulltext Access 18 Pages 2012
MrFair: Misbehavior-resistant fair scheduling in wireless mesh networks Fulltext Access 18 Pages 2012
A survey of sensory data boundary estimation, covering and tracking techniques using collaborating sensors Fulltext Access 18 Pages 2012
Network coding for unicast in a WiFi hotspot: Promises, challenges, and testbed implementation Fulltext Access 18 Pages 2012
HERO: A hierarchical, efficient and reliable routing protocol for wireless sensor and actor networks Fulltext Access 18 Pages 2012
PPZTEM: An efficient approximate trajectory extraction method with error bound constraint for wireless sensor networks Fulltext Access 18 Pages 2012
Analysis of TCP performance on multi-hop wireless networks: A cross layer approach Fulltext Access 18 Pages 2012
Estimating the channel capacity of multi-hop IEEE 802.11 wireless networks Fulltext Access 18 Pages 2012
An analytical model for transport layer caching in wireless sensor networks Fulltext Access 19 Pages 2012
Transaction-based authentication and key agreement protocol for inter-domain VoIP Fulltext Access 19 Pages 2012
An efficient model-based methodology for developing device-independent mobile applications Fulltext Access 19 Pages 2012
On the analytical modeling of concurrency control algorithms for Software Transactional Memories: The case of Commit-Time-Locking Fulltext Access 19 Pages 2012
Sensor9k : A testbed for designing and experimenting with WSN-based ambient intelligence applications Fulltext Access 19 Pages 2012
Automating the product derivation process of multi-agent systems product lines Fulltext Access 19 Pages 2012
An evaluation of multi-model self-managing control schemes for adaptive performance management of software systems Fulltext Access 19 Pages 2012
Energy-efficient mobile target detection in Wireless Sensor Networks with random node deployment and partial coverage Fulltext Access 19 Pages 2012
A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing Fulltext Access 19 Pages 2012
Automatic execution of business process models: Exploiting the benefits of Model-driven Engineering approaches Fulltext Access 19 Pages 2012
HOPE: A Hybrid Optimistic checkpointing and selective Pessimistic mEssage logging protocol for large scale distributed systems Fulltext Access 19 Pages 2012
Chains of Trust in vehicular networks: A secure Points of Interest dissemination strategy Fulltext Access 19 Pages 2012
Network coding and competitive approach for gradient based routing in wireless sensor networks Fulltext Access 19 Pages 2012
LIS: Localization based on an intelligent distributed fuzzy system applied to a WSN Fulltext Access 19 Pages 2012
Solving pinball routing, race condition and loop formation issues in nested mobile networks Fulltext Access 19 Pages 2012
When Ambient Intelligence meets the Internet: User Module framework and its applications Fulltext Access 19 Pages 2012
Structural analysis of network traffic matrix via relaxed principal component pursuit Fulltext Access 19 Pages 2012
GrAnt: Inferring best forwarders from complex networks’ dynamics through a greedy Ant Colony Optimization Fulltext Access 19 Pages 2012
ICTEDCT-CBIR: Integrating curvelet transform with enhanced dominant colors extraction and texture analysis for efficient content-based image retrieval Fulltext Access 19 Pages 2012
Biometrics-based consumer applications driven by reconfigurable hardware architectures Fulltext Access 19 Pages 2012
Maximizing energy utilization routing scheme in wireless sensor networks based on minimum hops algorithm Fulltext Access 19 Pages 2012
Information and communication technology and the sustainability of microfinance Fulltext Access 19 Pages 2012
Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures Fulltext Access 19 Pages 2012
Certification-based trust models in mobile ad hoc networks: A survey and taxonomy Fulltext Access 19 Pages 2012
Job allocation strategies for energy-aware and efficient Grid infrastructures Fulltext Access 19 Pages 2012
Profiling all paths: A new profiling technique for both cyclic and acyclic paths Fulltext Access 19 Pages 2012
Energy efficiency analysis for flexible-grid OFDM-based optical networks Fulltext Access 20 Pages 2012
CoMP clustering and backhaul limitations in cooperative cellular mobile access networks Fulltext Access 20 Pages 2012
A middleware to integrate robots, simple devices and everyday objects into an ambient ecology Fulltext Access 20 Pages 2012
Markov chains with discontinuous drifts have differential inclusion limits Fulltext Access 20 Pages 2012
Multicast capacity of optical ring network with hotspot traffic: The bi-directional WDM packet ring Fulltext Access 20 Pages 2012
A dynamically reconfigurable communication architecture for multicore embedded systems Fulltext Access 20 Pages 2012
A survey on solutions and main free tools for privacy enhancing Web communications Fulltext Access 20 Pages 2012