Legally “reasonable” security requirements: A 10-year FTC retrospective Fulltext Access 16 Pages 2011
Quantitative analysis of a certified e-mail protocol in mobile environments: A probabilistic model checking approach Fulltext Access 16 Pages 2011
Mutual information-based feature selection for intrusion detection systems Fulltext Access 16 Pages 2011
An efficient metric-based (EM-B) location management scheme for wireless cellular networks Fulltext Access 16 Pages 2011
Dynamic hinting: Collaborative real-time resource management for reactive embedded systems Fulltext Access 16 Pages 2011
Slack computation for DVS algorithms in fixed-priority real-time systems using fluid slack analysis Fulltext Access 16 Pages 2011
Implementation and analysis of the BitTorrent protocol with a multi-agent model Fulltext Access 16 Pages 2011
Provenance security guarantee from origin up to now in the e-Science environment Fulltext Access 16 Pages 2011
User-provided multimedia content distribution architecture in mobile and ubiquitous communication networks Fulltext Access 16 Pages 2011
A policy-based publish/subscribe middleware for sense-and-react applications Fulltext Access 17 Pages 2011
FeGC: An efficient garbage collection scheme for flash memory based storage systems Fulltext Access 17 Pages 2011
Study and performance of localization methods in IP based networks: Vivaldi algorithm Fulltext Access 17 Pages 2011
SOARware1: Treading through the crossroads of RFID middleware and SOA paradigm Fulltext Access 17 Pages 2011
XML-manipulating test case prioritization for XML-manipulating services Fulltext Access 17 Pages 2011
A design pattern coupling role and component concepts: Application to medical software Fulltext Access 17 Pages 2011
Advanced quality prediction model for software architectural knowledge sharing Fulltext Access 17 Pages 2011
The reliability estimation, prediction and measuring of component-based software Fulltext Access 17 Pages 2011
Modular software architecture for flexible reservation mechanisms on heterogeneous resources Fulltext Access 17 Pages 2011
Weapon classification and shooter localization using distributed multichannel acoustic sensors Fulltext Access 17 Pages 2011
Symbolic reachability analysis for parameterized administrative role-based access control Fulltext Access 17 Pages 2011
End-to-end protocols for Cognitive Radio Ad Hoc Networks: An evaluation study Fulltext Access 17 Pages 2011
Energy-efficient geographic routing in the presence of localization errors Fulltext Access 17 Pages 2011
Multipath routing with spatial separation in wireless multi-hop networks without location information Fulltext Access 17 Pages 2011
Delivery ratio-maximized wakeup scheduling for ultra-low duty-cycled WSNs under real-time constraints Fulltext Access 17 Pages 2011
Message ferries as generalized dominating sets in intermittently connected mobile networks Fulltext Access 17 Pages 2011
Impact of source counter on routing performance in resource constrained DTNs Fulltext Access 17 Pages 2011
Social fMRI: Investigating and shaping social mechanisms in the real world Fulltext Access 17 Pages 2011
Performance analysis of the BMAP/G/1BMAP/G/1 queue with gated servicing and adaptive vacations Fulltext Access 17 Pages 2011
Theoretical and experimental evaluation of communication-induced checkpointing protocols in FE and FLazy-E families Fulltext Access 17 Pages 2011
Scalable and efficient web services composition based on a relational database Fulltext Access 17 Pages 2011
An overview of interrupt accounting techniques for multiprocessor real-time systems Fulltext Access 17 Pages 2011
Supporting component-based failover units in middleware for distributed real-time and embedded systems Fulltext Access 17 Pages 2011
Fast placement and routing by extending coarse-grained reconfigurable arrays with Omega Networks Fulltext Access 17 Pages 2011
Enabling through life product-instance management: Solutions and challenges Fulltext Access 17 Pages 2011
A QoS-aware routing mechanism for multi-channel multi-interface ad-hoc networks Fulltext Access 17 Pages 2011
Improving multi-view peer-to-peer live streaming systems with the divide-and-conquer strategy Fulltext Access 17 Pages 2011
Definition, implementation and application of a model-based framework for analyzing interdependencies in electric power systems Fulltext Access 17 Pages 2011
A dynamic reconfigurable routing framework for wireless sensor networks Fulltext Access 17 Pages 2011
QuRiNet: A wide-area wireless mesh testbed for research and experimental evaluations Fulltext Access 17 Pages 2011
Energy efficient and perceived QoS aware video routing over Wireless Multimedia Sensor Networks Fulltext Access 17 Pages 2011
Foresighted tree configuration games in resource constrained distributed stream mining sensors Fulltext Access 17 Pages 2011
Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks Fulltext Access 17 Pages 2011
ADV-MAC: Analysis and optimization of energy efficiency through data advertisements for wireless sensor networks Fulltext Access 17 Pages 2011
Integrated topology control and routing in wireless sensor networks for prolonged network lifetime Fulltext Access 17 Pages 2011
A parallel multi-unit resource deadlock detection algorithm with O(log2(min(m,n))) overall run-time complexity Fulltext Access 17 Pages 2011
Strategic behavior modeling of multi-service overlay multicast networks based on auction mechanism design Fulltext Access 17 Pages 2011
On-demand minimum cost benchmarking for intermediate dataset storage in scientific cloud workflow systems Fulltext Access 17 Pages 2011
CODISC: Collaborative and distributed semantic caching for maximizing cache effectiveness in wireless networks Fulltext Access 17 Pages 2011
A dependable architecture to mitigate distributed denial of service attacks on network-based control systems Fulltext Access 17 Pages 2011
Compliance by design – Bridging the chasm between auditors and IT architects Fulltext Access 17 Pages 2011
Basis for an integrated security ontology according to a systematic review of existing proposals Fulltext Access 17 Pages 2011
Structural planning and implementation of a microprocessor-based human–machine interface in a steam-explosion process application Fulltext Access 17 Pages 2011
Wireless propagation channel modeling for optimized Handoff algorithms in wireless LANs Fulltext Access 17 Pages 2011
Region based QIM digital watermarking scheme for image database in DCT domain Fulltext Access 17 Pages 2011
Session-based classification of internet applications in 3G wireless networks Fulltext Access 17 Pages 2011
Limited mobility coverage and connectivity maintenance protocols for wireless sensor networks Fulltext Access 17 Pages 2011
Estimating network link characteristics using packet-pair dispersion: A discrete-time queueing theoretic analysis Fulltext Access 17 Pages 2011
Can Future Internet be based on constrained networks design principles? Fulltext Access 17 Pages 2011
V2X communication in Europe – From research projects towards standardization and field testing of vehicle communication technology Fulltext Access 17 Pages 2011
Evolutionary computation techniques for intrusion detection in mobile ad hoc networks Fulltext Access 17 Pages 2011
On the design of reliable wireless mesh network infrastructure with QoS constraints Fulltext Access 17 Pages 2011
Robust scheduler for grid networks under uncertainties of both application demands and resource availability Fulltext Access 17 Pages 2011
Resource allocation over multirate wireless networks: A Network Utility Maximization perspective Fulltext Access 17 Pages 2011
Black Burst Synchronization (BBS) – A protocol for deterministic tick and time synchronization in wireless networks Fulltext Access 17 Pages 2011
A Cooperative Channel Assignment protocol for multi-channel multi-rate wireless mesh networks Fulltext Access 18 Pages 2011
Environment-conscious scheduling of HPC applications on distributed Cloud-oriented data centers Fulltext Access 18 Pages 2011
Leveraging workload diversity through OS scheduling to maximize performance on single-ISA heterogeneous multicore systems Fulltext Access 18 Pages 2011