Efficient contention-based MAC protocol using adaptive fuzzy controlled sliding backoff interval for wireless networks Fulltext Access 11 Pages 2011
Parallelization methods for implementation of discharge simulation along resin insulator surfaces Fulltext Access 11 Pages 2011
Practical design and implementation of recognition assisted dynamic surveillance system Fulltext Access 11 Pages 2011
Design of an ultra high speed AES processor for next generation IT security Fulltext Access 11 Pages 2011
Steganalysis against substitution-based linguistic steganography based on context clusters Fulltext Access 11 Pages 2011
Virtual workflow system for distributed collaborative scientific applications on Grids Fulltext Access 11 Pages 2011
A PC-based architecture for parameter analysis of vector-controlled induction motor drive Fulltext Access 11 Pages 2011
Feature representation and selection in malicious code detection methods based on static system calls Fulltext Access 11 Pages 2011
A comprehensive study of energy efficiency and performance of flash-based SSD Fulltext Access 12 Pages 2011
Faster person identification using compressed ECG in time critical wireless telecardiology applications Fulltext Access 12 Pages 2011
P2PVR: A playback offset aware multicast tree for on-demand video streaming with VCR functions Fulltext Access 12 Pages 2011
Building a trusted route in a mobile ad hoc network considering communication reliability and path length Fulltext Access 12 Pages 2011
A study on the forensic mechanisms of VoIP attacks: Analysis and digital evidence Fulltext Access 12 Pages 2011
A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes Fulltext Access 12 Pages 2011
Congestion prevention in broadband wireless access systems: An economic approach Fulltext Access 12 Pages 2011
A link stability-based multicast routing protocol for wireless mobile ad hoc networks Fulltext Access 12 Pages 2011
Message scheduling with reduced matrix cycle and evenly distributed sparse allocation for time-triggered CAN Fulltext Access 12 Pages 2011
Resource searching in an unstructured P2P network based on Cloning Random Walker assisted by Dominating Set Fulltext Access 12 Pages 2011
A new convolution algorithm for loss probability analysis in multiservice networks Fulltext Access 12 Pages 2011
Error performance of PAM systems using energy detection with optimal and suboptimal decision thresholds Fulltext Access 12 Pages 2011
Joint channel and Frequency Offset estimation in MIMO-OFDM systems with insufficient Cyclic Prefix Fulltext Access 12 Pages 2011
Leveraging human behavior models to predict paths in indoor environments Fulltext Access 12 Pages 2011
Recognizing multi-user activities using wearable sensors in a smart home Fulltext Access 12 Pages 2011
A Critical Discourse Analysis of three US municipal wireless network initiatives for enhancing social inclusion Fulltext Access 12 Pages 2011
From high hopes to high deficit and back: A historic overview of Europe’s HDTV policy and reflections towards the future of HDTV Fulltext Access 12 Pages 2011
Acceptance and rejection of mobile TV among young adults: A case of college students in South Korea Fulltext Access 12 Pages 2011
Free probability based capacity calculation of multiantenna Gaussian fading channels with cochannel interference Fulltext Access 12 Pages 2011
Cooperative communication with imperfect channel information: Performance analysis and optimum power allocation Fulltext Access 12 Pages 2011
Heavy-traffic analysis of mean response time under Shortest Remaining Processing Time Fulltext Access 12 Pages 2011
Towards biomolecule-based information processing using engineered nanopores Fulltext Access 12 Pages 2011
A coordinated multiple channel assignment scheme and AP deployment for channel reuse in metropolitan scale wireless networks Fulltext Access 12 Pages 2011
Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks Fulltext Access 12 Pages 2011
RFID-assisted indoor localization and the impact of interference on its performance Fulltext Access 12 Pages 2011
H.264 video transmissions over wireless networks: Challenges and solutions Fulltext Access 12 Pages 2011
Distributed power control algorithm for multiple access systems based on Verhulst model Fulltext Access 12 Pages 2011
Cooperative communication with partial channel-state information in multiuser MIMO systems Fulltext Access 12 Pages 2011
Palmtree: An IP alias resolution algorithm with linear probing complexity Fulltext Access 12 Pages 2011
Performance prediction for OFDMA systems with dynamic power and subcarrier allocation Fulltext Access 12 Pages 2011
CCS-MAC: Exploiting the overheard data for compression in wireless sensor networks Fulltext Access 12 Pages 2011
Extending next generation network (NGN) architecture for connection-oriented transport Fulltext Access 12 Pages 2011
On the end-to-end flow allocation and channel assignment in multi-channel multi-radio wireless mesh networks with partially overlapped channels Fulltext Access 12 Pages 2011
Multi-stage change-point detection scheme for large-scale simultaneous events Fulltext Access 12 Pages 2011
Inter-domain collaborative routing (IDCR): Server selection for optimal client performance Fulltext Access 12 Pages 2011
Adaptive partial-matching steganography for voice over IP using triple M sequences Fulltext Access 12 Pages 2011
Coverage extension by means of non-conventional multi-hop communications Fulltext Access 12 Pages 2011
SOFROP: Self-organizing and fair routing protocol for wireless networks with mobile sensors and stationary actors Fulltext Access 12 Pages 2011
QoS-based cooperative algorithm for integral multi-commodity flow problem Fulltext Access 12 Pages 2011
Damage assessment and repair in attack resilient distributed database systems Fulltext Access 12 Pages 2011
Patient-centric authorization framework for electronic healthcare services Fulltext Access 12 Pages 2011
Understanding the mindset of the abusive insider: An examination of insiders’ causal reasoning following internal security changes Fulltext Access 12 Pages 2011
Combining pulse-based features for rejecting far-field speech in a HMM-based Voice Activity Detector Fulltext Access 12 Pages 2011
A lossless ECG data compression technique using ASCII character encoding Fulltext Access 12 Pages 2011
Estimating botnet virulence within mathematical models of botnet propagation dynamics Fulltext Access 12 Pages 2011
Analysis of update delays in signature-based network intrusion detection systems Fulltext Access 12 Pages 2011
Acceleration of acoustic emission signal processing algorithms using CUDA standard Fulltext Access 12 Pages 2011
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers Fulltext Access 12 Pages 2011
A generic simulation model for evaluating concurrency control protocols in native XML database systems Fulltext Access 12 Pages 2011
An economics-based negotiation scheme among mobile devices in mobile grid Fulltext Access 12 Pages 2011
Modified Generalized Autocorrelation based Estimator for time delays in multipath environment – A tradeoff in estimator performance and number of multipath Fulltext Access 12 Pages 2011
A new non-symmetry and anti-packing model and its application to image contrast enhancement Fulltext Access 12 Pages 2011
Parallelizing weighted frequency counting in high-speed network monitoring Fulltext Access 12 Pages 2011
Concurrent multipath transmission combining forward error correction and path interleaving for video streaming Fulltext Access 12 Pages 2011