A lightweight group-key management protocol for secure ad-hoc-network routing Fulltext Access 20 Pages 2011
Comparison of end-to-end and network-supported fast startup congestion control schemes Fulltext Access 20 Pages 2011
A survey of main memory acquisition and analysis techniques for the windows operating system Fulltext Access 20 Pages 2011
Performance evaluation of radio access selection strategies in constrained multi-access/multi-service wireless networks Fulltext Access 20 Pages 2011
A hybrid model for correlating alerts of known and unknown attack scenarios and updating attack graphs Fulltext Access 20 Pages 2011
Release-time-based multi-channel MAC protocol for wireless mesh networks Fulltext Access 20 Pages 2011
Universal connection architecture for interactive applications to achieve distributed computing Fulltext Access 20 Pages 2011
Delay efficient scheduling via redundant constraints in multihop networks Fulltext Access 20 Pages 2011
Scheduling gain for frequency-selective Rayleigh-fading channels with application to self-organizing packet scheduling Fulltext Access 20 Pages 2011
Performance analysis of PSK systems with phase error in fading channels: A survey Fulltext Access 20 Pages 2011
Service level agreements (SLAs) parameter negotiation between heterogeneous 4G wireless network operators Fulltext Access 20 Pages 2011
Dynamic routing at different layers in IP-over-WDM networks — Maximizing energy savings Fulltext Access 20 Pages 2011
Rough-Set-and-Genetic-Algorithm based data mining and Rule Quality Measure to hypothesize distance protective relay operation characteristics from relay event report Fulltext Access 20 Pages 2011
Rapid specification and automated generation of prompting systems to assist people with dementia Fulltext Access 20 Pages 2011
Video mediated social interaction between groups: System requirements and technology challenges Fulltext Access 20 Pages 2011
Performance analysis of the Sent-But-Sure strategy for Optical Burst and Packet Switched Networks Fulltext Access 20 Pages 2011
On the effectiveness of service differentiation based resource-provision incentive mechanisms in dynamic and autonomous P2P networks Fulltext Access 21 Pages 2011
Logic-based approach for digital forensic investigation in communication Networks Fulltext Access 21 Pages 2011
Load and storage balanced posting file partitioning for parallel information retrieval Fulltext Access 21 Pages 2011
An application-level framework for information dissemination and collection in vehicular networks Fulltext Access 21 Pages 2011
RadiaLE: A framework for designing and assessing link quality estimators in wireless sensor networks Fulltext Access 21 Pages 2011
Hybrid reliable load balancing with MOSIX as middleware and its formal verification using process algebra Fulltext Access 21 Pages 2011
Clustered Zigbee networks with data fusion: Characterization and performance analysis Fulltext Access 21 Pages 2011
Provably secure hybrid key agreement protocols in cluster-based wireless ad hoc networks Fulltext Access 21 Pages 2011
NetTopo: A framework of simulation and visualization for wireless sensor networks Fulltext Access 22 Pages 2011
The effects of scheduling, workload type and consolidation scenarios on virtual machine performance and their prediction through optimized artificial neural networks Fulltext Access 22 Pages 2011
Modeling and evaluation of ring-based interconnects for Network-on-Chip Fulltext Access 22 Pages 2011
Analysis of threshold-based batch-service queueing systems with batch arrivals and general service times Fulltext Access 22 Pages 2011
Managing crosscutting concerns in component based systems using a model driven development approach Fulltext Access 22 Pages 2011
Artificial potential field approach in WSN deployment: Cost, QoM, connectivity, and lifetime constraints Fulltext Access 22 Pages 2011
Opportunistic broadcast of event-driven warning messages in Vehicular Ad Hoc Networks with lossy links Fulltext Access 22 Pages 2011
Context-aware media independent information server for optimized seamless handover procedures Fulltext Access 22 Pages 2011
Wireless sensor deployment for collaborative sensing with mobile phones Fulltext Access 22 Pages 2011
Model-driven engineering of planning and optimisation algorithms for pervasive computing environments Fulltext Access 22 Pages 2011
Roles in information security – A survey and classification of the research area Fulltext Access 22 Pages 2011
Evaluating extensions to IMS session setup for multicast-based many-to-many services Fulltext Access 22 Pages 2011
Enhanced radio resource management algorithms for efficient MBMS service provision in UTRAN Fulltext Access 22 Pages 2011
A framework for risk assessment based on analysis of historical information of workflow execution in IT systems Fulltext Access 22 Pages 2011
Mean-field framework for performance evaluation of push–pull gossip protocols Fulltext Access 23 Pages 2011
Cross-layer routing metrics for mesh networks: Current status and research directions Fulltext Access 23 Pages 2011
A simple distributed mechanism for accounting system self-configuration in next-generation charging and billing Fulltext Access 23 Pages 2011
A location prediction based routing protocol and its extensions for multicast and multi-path routing in mobile ad hoc networks Fulltext Access 23 Pages 2011
An IMS-based network architecture for WiMAX-UMTS and WiMAX-WLAN interworking Fulltext Access 23 Pages 2011
Mechanism design for e-procurement auctions: On the efficacy of post-auction negotiation and quality effort incentives Fulltext Access 23 Pages 2011
Cross-layer failure restoration of IP multicast with applications to IPTV Fulltext Access 23 Pages 2011
Modeling the effects of hot-spot traffic load on the performance of wormhole-switched hypermeshes Fulltext Access 23 Pages 2011
Data preprocessing for anomaly based network intrusion detection: A review Fulltext Access 23 Pages 2011
Cross-layer optimization of wireless multihop networks with one-hop two-way network coding Fulltext Access 23 Pages 2011
SATI: A scalable and traffic-efficient data delivery infrastructure for real-time sensing applications Fulltext Access 23 Pages 2011
A novel statistical time-series pattern based interval forecasting strategy for activity durations in workflow systems Fulltext Access 23 Pages 2011
Cooperative strategies of wireless access technologies: A game-theoretic analysis Fulltext Access 24 Pages 2011
An approach to process continuous location-dependent queries on moving objects with support for location granules Fulltext Access 24 Pages 2011
Design and performance analysis of MAC schemes for Wireless Sensor Networks Powered by Ambient Energy Harvesting Fulltext Access 24 Pages 2011
Approximate steady-state analysis of large Markov models based on the structure of their decision diagram encoding Fulltext Access 24 Pages 2011
A survey of WDM network reconfiguration: Strategies and triggering methods Fulltext Access 24 Pages 2011
Can encrypted traffic be identified without port numbers, IP addresses and payload inspection? Fulltext Access 25 Pages 2011
Study of the periodic ferroresonance in the electrical power networks by bifurcation diagrams Fulltext Access 25 Pages 2011
The “Always Best Packet Switching” architecture for SIP-based mobile multimedia services Fulltext Access 25 Pages 2011
Identification of extract method refactoring opportunities for the decomposition of methods Fulltext Access 26 Pages 2011
Froms: A failure tolerant and mobility enabled multicast routing paradigm with reinforcement learning for WSNs Fulltext Access 26 Pages 2011
Optimized network management for energy savings of wireless access networks Fulltext Access 27 Pages 2011
Exploiting channel memory for multiuser wireless scheduling without channel measurement: Capacity regions and algorithms Fulltext Access 27 Pages 2011
Energy efficient wireless unicast routing alternatives for machine-to-machine networks Fulltext Access 28 Pages 2011
A formal approach for the specification and verification of trustworthy component-based systems Fulltext Access 28 Pages 2011
Challenges of 40/100 Gbps and higher-rate deployments over long-haul transport networks Fulltext Access 28 Pages 2011
Sojourn time distributions and time scale separation results for multiclass state-dependent processor sharing systems with a finite service pool and exponential service requirements Fulltext Access 28 Pages 2011
Theoretical analysis of the lifetime and energy hole in cluster based wireless sensor networks Fulltext Access 29 Pages 2011