An efficient anonymous authentication mechanism for delay tolerant networks Fulltext Access 7 Pages 2010
Improving the robustness of DCT-based image watermarking against JPEG compression Fulltext Access 7 Pages 2010
Maximum likelihood estimation for linearity testing of ADCs stimulated by known constant signals Fulltext Access 7 Pages 2010
Nonconvex maximization for communication systems based on particle swarm optimization Fulltext Access 7 Pages 2010
Time-slotted voting mechanism for fusion data assurance in wireless sensor networks under stealthy attacks Fulltext Access 7 Pages 2010
On the relationship between the noise-to-power ratio (NPR) and the effective in-band distortion of WCDMA signals Fulltext Access 7 Pages 2010
Characterization of long-range dependent traffic regulated by leaky-bucket policers and shapers Fulltext Access 7 Pages 2010
A novel stable selection and reliable transmission protocol for clustered heterogeneous wireless sensor networks Fulltext Access 7 Pages 2010
SAGE based joint timing-frequency offsets and channel estimation in distributed MIMO systems Fulltext Access 7 Pages 2010
Speaker verification from partially encrypted compressed speech for forensic investigation Fulltext Access 7 Pages 2010
A constrained optimization approach for an adaptive generalized subspace tracking algorithm Fulltext Access 7 Pages 2010
Improving the accuracy and storage cost in biometric remote authentication schemes Fulltext Access 7 Pages 2010
Treasure and tragedy in kmem_cache mining for live forensics investigation Fulltext Access 7 Pages 2010
Adaptive beamforming algorithm with increased speed and improved reliability for smart antennas Fulltext Access 7 Pages 2010
Partial crosstalk cancellation with discrete bit-loading using genetic algorithm Fulltext Access 7 Pages 2010
Revising centralized certificate validation standards for mobile and wireless communications Fulltext Access 7 Pages 2010
A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations Fulltext Access 7 Pages 2010
A new error concealment method for consecutive frame loss based on CELP speech Fulltext Access 7 Pages 2010
Forgery attacks on Kang et al.’s identity-based strong designated verifier signature scheme and its improvement with security proof Fulltext Access 7 Pages 2010
A throughput maximised parallel architecture for 2D fast Discrete Pascal Transform Fulltext Access 7 Pages 2010
A planar waveguide optical discrete Fourier transformer design for 160 Gb/s all-optical OFDM systems Fulltext Access 7 Pages 2010
Stability comparison of two quadruple-wavelength switchable erbium-doped fiber lasers Fulltext Access 7 Pages 2010
Analytical approach of developing the expression of output of all-optical frequency encoded different logical units and a way-out to implement the logic gates Fulltext Access 7 Pages 2010
0.7 V, 5.745 GHz CMOS RF low noise amplifier for IEEE 802.11a wireless LAN Fulltext Access 7 Pages 2010
Alternating projection method applied to indefinite correlation matrices for generation of synthetic MIMO channels Fulltext Access 7 Pages 2010
Design and performance of ultra-high-density optical fiber cable with rollable optical fiber ribbons Fulltext Access 7 Pages 2010
High speed switched-capacitor analog correlator with balanced charge pump circuit for wired CDMA bus interface Fulltext Access 7 Pages 2010
The industrial indoor channel: Statistical analysis of the power delay profile Fulltext Access 7 Pages 2010
Biological excitable media based on non-excitable cells and calcium signaling Fulltext Access 7 Pages 2010
Energy saving in optical transport networks exploiting transmission properties and wavelength path optimization Fulltext Access 7 Pages 2010
Half-duplex relaying with serially concatenated low-density generator matrix (SCLDGM) codes Fulltext Access 7 Pages 2010
Pre-processing optimization for IBI mitigation in an OFDM system over channels with large delay spreads Fulltext Access 7 Pages 2010
Assessing mobile phone communication utility preferences in a social support network Fulltext Access 7 Pages 2010
Mechanisms of access to the Internet in rural areas of developing countries Fulltext Access 7 Pages 2010
Emulating shared-memory Do-All algorithms in asynchronous message-passing systems Fulltext Access 7 Pages 2010
Performance Evaluation of Fast Handover in Mobile IPv6 Based on Link-Layer Information Fulltext Access 7 Pages 2010
Sequenced release of privacy-accurate information in a forensic investigation Fulltext Access 7 Pages 2010
A novel model of adaptation decision-taking engine in multimedia adaptation Fulltext Access 7 Pages 2010
A diffusion approximation model for wireless networks based on IEEE 802.11 standard Fulltext Access 7 Pages 2010
Accelerated collection of sensor data by mobility-enabled topology ranks Fulltext Access 7 Pages 2010
Simulating a Poisson cluster process for Internet traffic packet arrivals Fulltext Access 7 Pages 2010
Multicast protection scheme based on Hamiltonian cycle in fault-tolerant optical mesh networks Fulltext Access 7 Pages 2010
Comparison of the internet usage levels amongst final year students of faculty of medicine and health colleges in Turkey: According to the gender variable Fulltext Access 8 Pages 2010
Received signal strength based mobile terminal positioning error analysis and optimization Fulltext Access 8 Pages 2010
Scalable dynamic Monitoring, Analysis and Tuning Environment for parallel applications Fulltext Access 8 Pages 2010
Distributed hierarchical search for balanced energy consumption routing spanning trees in wireless sensor networks Fulltext Access 8 Pages 2010
Impact of Doppler spread and adaptive modulation on TCP throughput in Rayleigh fading channels Fulltext Access 8 Pages 2010
Improved Nyquist filter with an ideal piece-wise rectangular characteristic Fulltext Access 8 Pages 2010
An efficient uplink transmission technique for IDMA based on time-reversal Fulltext Access 8 Pages 2010
A multi-path interleaved hop-by-hop en-route filtering scheme in wireless sensor networks Fulltext Access 8 Pages 2010
Joint multi-user interference and clipping noise cancellation in uplink MC-CDMA system Fulltext Access 8 Pages 2010
Robust network dimensioning for realtime services over IP networks with traffic deviation Fulltext Access 8 Pages 2010
A secure model for controlling the hubs in P2P wireless network based on trust value Fulltext Access 8 Pages 2010
A review of DoS attack models for 3G cellular networks from a system-design perspective Fulltext Access 8 Pages 2010
Nearly optimal power saving policies for mobile stations in wireless networks Fulltext Access 8 Pages 2010
Modeling self-similar traffic over multiple time scales based on hierarchical Markovian and L-System models Fulltext Access 8 Pages 2010
Performance evaluation of the RQMA-CDMA scheme for multimedia traffic with QoS guarantees Fulltext Access 8 Pages 2010
Turbo joint channel estimation, synchronization, and decoding for coded OFDM systems Fulltext Access 8 Pages 2010