Rapid functional modelling and simulation of coarse grained reconfigurable array architectures Fulltext Access 9 Pages 2011
Improving rate allocation for ephemeral traffic using a second-order algorithm Fulltext Access 9 Pages 2011
Capacity and interference aware link scheduling with channel assignment in wireless mesh networks Fulltext Access 9 Pages 2011
Boosting adaptivity of fault-tolerant scheduling for real-time tasks with service requirements on clusters Fulltext Access 9 Pages 2011
Provably secure and efficient authentication techniques for the global mobility network Fulltext Access 9 Pages 2011
Huffman-code strategies to improve MFCVQ-based reversible data hiding for VQ indexes Fulltext Access 9 Pages 2011
Function point measurement from Web application source code based on screen transitions and database accesses Fulltext Access 9 Pages 2011
Exact schedulability tests for real-time scheduling of periodic tasks on unrelated multiprocessor platforms Fulltext Access 9 Pages 2011
A passive image authentication scheme for detecting region-duplication forgery with rotation Fulltext Access 9 Pages 2011
A perceptual macroblock layer power control for energy scalable video encoder based on just noticeable distortion principle Fulltext Access 9 Pages 2011
A novel Parzen probabilistic neural network based noncoherent detection algorithm for distributed ultra-wideband sensors Fulltext Access 9 Pages 2011
A clique-based secure admission control scheme for mobile ad hoc networks (MANETs) Fulltext Access 9 Pages 2011
Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification Fulltext Access 9 Pages 2011
Temporal partitioning of data flow graph for dynamically reconfigurable architecture Fulltext Access 9 Pages 2011
Cross-layer QoS support framework and holistic opportunistic scheduling for QoS in single carrier WiMAX system Fulltext Access 9 Pages 2011
Robust several-speaker speech recognition with highly dependable online speaker adaptation and identification Fulltext Access 9 Pages 2011
Joint admission and power control for quality-of-service in the wireless downlink Fulltext Access 9 Pages 2011
Improved flooding of broadcast messages using extended multipoint relaying Fulltext Access 9 Pages 2011
Improving security in WMNs with reputation systems and self-organizing maps Fulltext Access 9 Pages 2011
Business process analysis and simulation for the RFID and EPCglobal Network enabled supply chain: A proof-of-concept approach Fulltext Access 9 Pages 2011
State of the art of frameworks and middleware for facilitating mobile and ubiquitous learning development Fulltext Access 9 Pages 2011
Strongly unforgeable proxy signature scheme secure in the standard model Fulltext Access 9 Pages 2011
Application of NSGA-II to feature selection for facial expression recognition Fulltext Access 9 Pages 2011
Possibility of an embedded system for ultrasound-based measurement of the distances to two target objects Fulltext Access 9 Pages 2011
Optimal control of mobile monitoring agents in immune-inspired wireless monitoring networks Fulltext Access 9 Pages 2011
A novel algorithm for feature selection using Harmony Search and its application for non-technical losses detection Fulltext Access 9 Pages 2011
On the value distributions of Walsh spectrums of quadratic Plateaued functions Fulltext Access 9 Pages 2011
A user friendly authentication scheme with anonymity for wireless communications Fulltext Access 9 Pages 2011
Results from a normative dependency analysis of geographic information standards Fulltext Access 9 Pages 2011
Efficient access control labeling scheme for secure XML query processing Fulltext Access 9 Pages 2011
An extended matrix encoding algorithm for steganography of high embedding efficiency Fulltext Access 9 Pages 2011
Optimized QoS-aware replica placement heuristics and applications in astronomy data grid Fulltext Access 9 Pages 2011
On a security model of conjunctive keyword search over encrypted relational database Fulltext Access 9 Pages 2011
A fuzzy predictive redundancy system for fault-tolerance of x-by-wire systems Fulltext Access 9 Pages 2011
Design of a performance enhanced and power reduced dual-crossbar Network-on-Chip (NoC) architecture Fulltext Access 9 Pages 2011
Low-power subthreshold to above threshold level shifters in 90 nm and 65 nm process Fulltext Access 9 Pages 2011
Fuzzy identity based signature with applications to biometric authentication Fulltext Access 9 Pages 2011
Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications Fulltext Access 9 Pages 2011
Comparative analysis of power variables in high performance embedded and x86 architectures using GNU/Linux Fulltext Access 9 Pages 2011
Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification Fulltext Access 9 Pages 2011
A web-based sensor network system with distributed data processing approach via web application Fulltext Access 9 Pages 2011
User acceptance of wireless technology in organizations: A comparison of alternative models Fulltext Access 9 Pages 2011
The antecedent factors on trust and commitment in supply chain relationships Fulltext Access 9 Pages 2011
Performance evaluation for on-demand routing protocols based on OPNET modules in wireless mesh networks Fulltext Access 9 Pages 2011
An on-chip instruction cache design with one-bit tag for low-power embedded systems Fulltext Access 10 Pages 2011
A comparison of deterministic and probabilistic methods for indoor localization Fulltext Access 10 Pages 2011
Variable assignment and instruction scheduling for processor with multi-module memory Fulltext Access 10 Pages 2011
Adjusting Fuzzy Similarity Functions for use with standard data mining tools Fulltext Access 10 Pages 2011
A topology control protocol based on eligibility and efficiency metrics Fulltext Access 10 Pages 2011
Explaining website effectiveness: The hedonic–utilitarian dual mediation hypothesis Fulltext Access 10 Pages 2011
Security analysis of the ADS-B implementation in the next generation air transportation system Fulltext Access 10 Pages 2011
Evaluation of a template protection approach to integrate fingerprint biometrics in a PIN-based payment infrastructure Fulltext Access 10 Pages 2011
A novel electronic cash system with trustee-based anonymity revocation from pairing Fulltext Access 10 Pages 2011
Do males and females differ in how they perceive and elaborate on agent-based recommendations in Internet-based selling? Fulltext Access 10 Pages 2011
The challenge for multichannel services: Cross-channel free-riding behavior Fulltext Access 10 Pages 2011
Designing utility-based recommender systems for e-commerce: Evaluation of preference-elicitation methods Fulltext Access 10 Pages 2011
The role of psychological traits and social factors in using new mobile communication services Fulltext Access 10 Pages 2011
Mining competitor relationships from online news: A network-based approach Fulltext Access 10 Pages 2011
An energy-efficient MAC protocol with downlink traffic scheduling strategy in IEEE 802.11 infrastructure WLANs Fulltext Access 10 Pages 2011
A data hiding scheme using the varieties of pixel-value differencing in multimedia images Fulltext Access 10 Pages 2011
An exploration of defensive deception in industrial communication networks Fulltext Access 10 Pages 2011
A comparative study on simulation vs. real time deployment in wireless sensor networks Fulltext Access 10 Pages 2011
Practitioner perceptions of Open Source software in the embedded systems area Fulltext Access 10 Pages 2011
Efficient file fuzz testing using automated analysis of binary file format Fulltext Access 10 Pages 2011
New heuristic algorithms for energy aware application mapping and routing on mesh-based NoCs Fulltext Access 10 Pages 2011
Modelling and analysis of pipelined circuit switching in interconnection networks with bursty traffic and hot-spot destinations Fulltext Access 10 Pages 2011