Intelligent rate control for supporting real-time traffic in WLAN mesh networks Fulltext Access 10 Pages 2011
Lifetime extension for surveillance wireless sensor networks with intelligent redeployment Fulltext Access 10 Pages 2011
Swarm behavior control of mobile multi-robots with wireless sensor networks Fulltext Access 10 Pages 2011
A model-based framework to automate the analysis of users' activity in collaborative systems Fulltext Access 10 Pages 2011
Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy Fulltext Access 10 Pages 2011
SHARC: A scalable 3D graphics virtual appliance delivery framework in cloud Fulltext Access 10 Pages 2011
Efficient dynamic task scheduling in virtualized data centers with fuzzy prediction Fulltext Access 10 Pages 2011
CAT Detect (Computer Activity Timeline Detection): A tool for detecting inconsistency in computer activity timelines Fulltext Access 10 Pages 2011
Application of the Java Message Service in mobile monitoring environments Fulltext Access 10 Pages 2011
Discrete logarithm based chameleon hashing and signatures without key exposure Fulltext Access 10 Pages 2011
Practical aspects of preprocessing techniques for K-Best tree search MIMO detectors Fulltext Access 10 Pages 2011
Detection and characterization of defects using GMR probes and artificial neural networks Fulltext Access 10 Pages 2011
An interactive mobile SMS confirmation method using secret sharing technique Fulltext Access 10 Pages 2011
An effective image retrieval scheme using color, texture and shape features Fulltext Access 10 Pages 2011
Distributed audio recorder using smart phones and proximity connections Fulltext Access 10 Pages 2011
Bandwidth allocation in cooperative wireless networks: Buffer load analysis and fairness evaluation Fulltext Access 10 Pages 2011
Static hybrid amplify and forward (AF) and decode and forward (DF) relaying for cooperative systems Fulltext Access 10 Pages 2011
A Distributed and Collaborative Beamforming algorithm for a self-organizing Wireless Sensor Network Fulltext Access 10 Pages 2011
Comparative analysis of power consumption in asynchronous wavelength modular optical switching fabrics Fulltext Access 10 Pages 2011
Performance of On–Off scheduling strategy in the presence of transmit beamforming Fulltext Access 10 Pages 2011
Service center trade-offs between customer impatience and power consumption Fulltext Access 10 Pages 2011
A secure dynamic identity based authentication protocol for multi-server architecture Fulltext Access 10 Pages 2011
Feasibility analysis of hybrid control networks based on common industrial protocol Fulltext Access 10 Pages 2011
Load-balancing mechanism for the RFID middleware applications over grid networking Fulltext Access 10 Pages 2011
Efficient cluster-based group key agreement protocols for wireless ad hoc networks Fulltext Access 10 Pages 2011
Randomized load balancing strategies with churn resilience in peer-to-peer networks Fulltext Access 10 Pages 2011
A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications Fulltext Access 10 Pages 2011
Coordinated session-based admission control with statistical learning for multi-tier internet applications Fulltext Access 10 Pages 2011
Resource allocation robustness in multi-core embedded systems with inaccurate information Fulltext Access 10 Pages 2011
An efficient diversity-driven selective forwarding approach for replicated data queries in wireless sensor networks Fulltext Access 10 Pages 2011
Detection of substitution-based linguistic steganography by relative frequency analysis Fulltext Access 10 Pages 2011
Modelling and analysis of strategies in the design of WSAN coordination systems Fulltext Access 10 Pages 2011
Performance evaluation of highly efficient techniques for software implementation of LFSR Fulltext Access 10 Pages 2011
An information-theoretic framework for field monitoring using autonomously mobile sensors Fulltext Access 10 Pages 2011
A low power, low phase noise, square wave LC quadrature VCO and its comprehensive analysis for ISM band Fulltext Access 10 Pages 2011
An efficient VLSI architecture for 4 × 4 16-QAM sorted QR-factorisation based V-BLAST decoder Fulltext Access 10 Pages 2011
Investigation of computationally efficient complementary IIR filter pairs with tunable crossover frequency Fulltext Access 10 Pages 2011
The impact of interference-aware routing metrics on video streaming in Wireless Mesh Networks Fulltext Access 10 Pages 2011
Wireless multimedia sensor and actor networks for the next generation power grid Fulltext Access 10 Pages 2011
Indoor deployment of IEEE 802.11s mesh networks: Lessons and guidelines Fulltext Access 10 Pages 2011
Time-division-multiplexed arbitration in silicon nanophotonic networks-on-chip for high-performance chip multiprocessors Fulltext Access 10 Pages 2011
Interest-Intended Piece Selection in BitTorrent-like peer-to-peer file sharing systems Fulltext Access 10 Pages 2011
Performance modeling of the LEACH protocol for mobile wireless sensor networks Fulltext Access 10 Pages 2011
Tabu Search with two approaches to parallel flowshop evaluation on CUDA platform Fulltext Access 10 Pages 2011
A study of subdividing hexagon-clustered WSN for power saving: Analysis and simulation Fulltext Access 10 Pages 2011
Resolving a L2-prefetch-caused parallel nonscaling on Intel Core microarchitecture Fulltext Access 10 Pages 2011
FPGA implementation and performance evaluation of a high throughput crypto coprocessor Fulltext Access 10 Pages 2011
On optimization of finite-difference time-domain (FDTD) computation on heterogeneous and GPU clusters Fulltext Access 10 Pages 2011
Intrusion detection in a KK-Gaussian distributed wireless sensor network Fulltext Access 10 Pages 2011
Distributed algorithmic mechanism design for scheduling on unrelated machines Fulltext Access 10 Pages 2011
Reuse efficiency of wireless access networks under physical carrier sense: A Markovian analysis Fulltext Access 10 Pages 2011
Asymmetric group key agreement protocol for open networks and its application to broadcast encryption Fulltext Access 10 Pages 2011
Signed multiplication technique by means of unsigned multiply instruction Fulltext Access 10 Pages 2011
Classifying the Geometric Dilution of Precision of GPS satellites utilizing Bayesian decision theory Fulltext Access 10 Pages 2011
Viewing experience optimization based on adaptive requesting window adjustment in peer-to-peer media streaming Fulltext Access 10 Pages 2011
Quantifying the accuracy of the ground truth associated with Internet traffic traces Fulltext Access 10 Pages 2011
V2X simulation runtime infrastructure VSimRTI: An assessment tool to design smart traffic management systems Fulltext Access 10 Pages 2011
Simulation of vehicular ad-hoc networks: Challenges, review of tools and recommendations Fulltext Access 10 Pages 2011
MISE-PIPE: Magnetic induction-based wireless sensor networks for underground pipeline monitoring Fulltext Access 10 Pages 2011
Adaptive sleep mode management in IEEE 802.16m wireless metropolitan area networks Fulltext Access 10 Pages 2011
Performance analysis for power saving class type III of IEEE 802.16 in WiMAX Fulltext Access 10 Pages 2011
Indoor localization method based on RTT and AOA using coordinates clustering Fulltext Access 10 Pages 2011
Flow-level performance of proportional fairness with hierarchical modulation in OFDMA-based networks Fulltext Access 10 Pages 2011
On tradeoffs between cross-ISP P2P traffic and P2P streaming performance Fulltext Access 10 Pages 2011
Joint random access and power control game in ad hoc networks with noncooperative users Fulltext Access 10 Pages 2011
A system for the proactive, continuous, and efficient collection of digital forensic evidence Fulltext Access 11 Pages 2011