Estimation of missing RTTs in computer networks: Matrix completion vs compressed sensing Fulltext Access 12 Pages 2011
Liquid: A detection-resistant covert timing channel based on IPD shaping Fulltext Access 12 Pages 2011
Evaluating the transmission rate of covert timing channels in a network Fulltext Access 12 Pages 2011
Comparison of different meta-heuristics to solve the global planning problem of UMTS networks Fulltext Access 12 Pages 2011
A combined resource management and admission control scheme for optimizing uplink performance of M-WiMAX systems Fulltext Access 12 Pages 2011
Performance evaluation of path splicing on the GÉANT and the Sprint networks Fulltext Access 12 Pages 2011
Introducing multipath selection for concurrent multipath transfer in the future internet Fulltext Access 12 Pages 2011
Mobile WiMAX for vehicular applications: Performance evaluation and comparison against IEEE 802.11p/a Fulltext Access 12 Pages 2011
ECN verbose mode: A statistical method for network path congestion estimation Fulltext Access 12 Pages 2011
Energy efficient wireless Internet access with cooperative cellular networks Fulltext Access 13 Pages 2011
Fast spanning tree reconnection mechanism for resilient Metro Ethernet networks Fulltext Access 13 Pages 2011
Secure neighbor discovery through overhearing in static multihop wireless networks Fulltext Access 13 Pages 2011
Physical channel characterization for medium-range nanonetworks using flagellated bacteria Fulltext Access 13 Pages 2011
Energy saving and cost reduction in multi-granularity green optical networks Fulltext Access 13 Pages 2011
An exploration of user-generated wireless broadband infrastructures in digital cities Fulltext Access 13 Pages 2011
User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking Fulltext Access 13 Pages 2011
Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks Fulltext Access 13 Pages 2011
Key management systems for sensor networks in the context of the Internet of Things Fulltext Access 13 Pages 2011
A real-time scheduling framework for embedded systems with environmental energy harvesting Fulltext Access 13 Pages 2011
Combining sketches and wavelet analysis for multi time-scale network anomaly detection Fulltext Access 13 Pages 2011
Low energy operation in WSNs: A survey of preamble sampling MAC protocols Fulltext Access 13 Pages 2011
Analytical model based on green criteria for optical backbone network interconnection Fulltext Access 13 Pages 2011
Enforcing the timing behavior of real-time stations in legacy bus-based industrial Ethernet networks Fulltext Access 13 Pages 2011
A confirmation-based geocast routing algorithm for street lighting systems Fulltext Access 13 Pages 2011
Path planning strategy for autonomous mobile robot navigation using Petri-GA optimisation Fulltext Access 13 Pages 2011
Mutually independent Hamiltonian cycles in k-ary n-cubes when k is even Fulltext Access 13 Pages 2011
Three-dimensional modular discriminant analysis (3DMDA): A new feature extraction approach for face recognition Fulltext Access 13 Pages 2011
A non-reference image fusion metric based on mutual information of image features Fulltext Access 13 Pages 2011
Image denoising using bilateral filter and Gaussian scale mixtures in shiftable complex directional pyramid domain Fulltext Access 13 Pages 2011
Multiple layers block overlapped histogram equalization for local content emphasis Fulltext Access 13 Pages 2011
Design of a sliding window scheme for detecting high packet-rate flows via random packet sampling Fulltext Access 13 Pages 2011
Realizing and benchmarking broadcast algorithms in wireless mesh networks Fulltext Access 13 Pages 2011
A pre-determined node deployment strategy to prolong network lifetime in wireless sensor network Fulltext Access 13 Pages 2011
Design, optimization and performance evaluation of a content distribution overlay for streaming Fulltext Access 13 Pages 2011
Connectivity preserving localized coverage algorithm for area monitoring using wireless sensor networks Fulltext Access 13 Pages 2011
An empirical study of behavioral characteristics of spammers: Findings and implications Fulltext Access 13 Pages 2011
Repetition-based cooperative broadcasting for vehicular ad-hoc networks Fulltext Access 13 Pages 2011
Review of some fundamental approaches for power control in wireless networks Fulltext Access 13 Pages 2011
Clustering botnet communication traffic based on n-gram feature selection Fulltext Access 13 Pages 2011
A new and effective hierarchical overlay structure for Peer-to-Peer networks Fulltext Access 13 Pages 2011
Improving performance for multimedia traffic with distributed dynamic QoS adaptation Fulltext Access 13 Pages 2011
Efficient link scheduling for online admission control of real-time traffic in wireless mesh networks Fulltext Access 13 Pages 2011
A signal adaptive filter for blocking effect reduction of JPEG compressed images Fulltext Access 13 Pages 2011
Reversible data hiding based on multilevel histogram modification and sequential recovery Fulltext Access 13 Pages 2011
Robust coordinated design of multiple and multi-type damping controller using differential evolution algorithm Fulltext Access 13 Pages 2011
Multistage expansion planning of generation and interconnections with sustainable energy development criteria: A multiobjective model Fulltext Access 13 Pages 2011
Approximating electrical distribution networks via mixed-integer nonlinear programming Fulltext Access 13 Pages 2011
Comparative performance evaluation of SMES–SMES, TCPS–SMES and SSSC–SMES controllers in automatic generation control for a two-area hydro–hydro system Fulltext Access 13 Pages 2011
Impact of FACTS controllers on the stability of power systems connected with doubly fed induction generators Fulltext Access 13 Pages 2011
Multi-objective PID controller tuning for a FACTS-based damping stabilizer using Non-dominated Sorting Genetic Algorithm-II Fulltext Access 13 Pages 2011
A hybrid communication solution to distributed moving query monitoring systems Fulltext Access 13 Pages 2011
Efficient probabilistic communication protocol for the private identification of RFID tags by means of collaborative readers Fulltext Access 13 Pages 2011
Per-flow sleep scheduling for power management in IEEE 802.16 wireless networks Fulltext Access 13 Pages 2011
Autonomic personalized handover decisions for mobile services in heterogeneous wireless networks Fulltext Access 13 Pages 2011
On the queue-overflow probabilities of a class of distributed scheduling algorithms Fulltext Access 13 Pages 2011
Congestion control and its stability in networks with delay sensitive traffic Fulltext Access 13 Pages 2011
Understanding data center network architectures in virtualized environments: A view from multi-tier applications Fulltext Access 13 Pages 2011
An integrated framework for control system simulation and regulatory compliance monitoring Fulltext Access 13 Pages 2011
Modeling and analysis of TXOP differentiation in infrastructure-based WLANs Fulltext Access 13 Pages 2011
Link scheduling in wireless networks with successive interference cancellation Fulltext Access 13 Pages 2011
Modeling and comparison of candidate selection algorithms in opportunistic routing Fulltext Access 13 Pages 2011
Design and implementation of a distributed service invocation function for the IP multimedia subsystem Fulltext Access 13 Pages 2011
A distributed-request-based CDMA CAC for DiffServ multimedia services in wireless cellular mobile networks Fulltext Access 13 Pages 2011
Preventing TCP performance interference on asymmetric links using ACKs-first variable-size queuing Fulltext Access 13 Pages 2011
An overview of vertical handover techniques: Algorithms, protocols and tools Fulltext Access 13 Pages 2011
Channel access and traffic control for dynamic-spectrum networks with single-transmit, dual-receive radios Fulltext Access 13 Pages 2011