A grid-based dynamic load balancing approach for data-centric storage in wireless sensor networks Fulltext Access 12 Pages 2010
An improved new error estimation algorithm for optimal filter lengths for stereophonic acoustic echo cancellation Fulltext Access 12 Pages 2010
Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems Fulltext Access 12 Pages 2010
Vulnerability analysis of networks to detect multiphase attacks using the actor-based language Rebeca Fulltext Access 12 Pages 2010
A grid computing based approach for the power system dynamic security assessment Fulltext Access 12 Pages 2010
An Aspect-Oriented Programming-based approach to software development for fault detection in measurement systems Fulltext Access 12 Pages 2010
MAC-layer proactive mixing for network coding in multi-hop wireless networks Fulltext Access 12 Pages 2010
REACT: An RFID-based privacy-preserving children tracking scheme for large amusement parks Fulltext Access 12 Pages 2010
Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic Fulltext Access 12 Pages 2010
An underwater sensor allocation scheme for a range dependent environment Fulltext Access 12 Pages 2010
An adaptive peer-to-peer live streaming system with incentives for resilience Fulltext Access 12 Pages 2010
Quorum-based power-saving multicast protocols in the asynchronous ad hoc network Fulltext Access 12 Pages 2010
Discourse behind the Forbidden Realm: Internet surveillance and its implications on China’s blogosphere Fulltext Access 12 Pages 2010
Analysis of the performance of multiuser MIMO systems with user scheduling over Nakagami-mm fading channels Fulltext Access 12 Pages 2010
Urban cycles and mobility patterns: Exploring and predicting trends in a bicycle-based public transport system Fulltext Access 12 Pages 2010
Fast and adaptive impairment aware routing and wavelength assignment algorithm optimized by offline simulations Fulltext Access 12 Pages 2010
A novel implementation of TCP Vegas for optical burst switched networks Fulltext Access 12 Pages 2010
CAPEX minimization through node degree reduction in a Colorless and Directionless ROADM architecture for flexible optical networks Fulltext Access 12 Pages 2010
The influence of social and cultural factors on mothers’ domestication of household ICTs – Experiences of Chinese and Korean women Fulltext Access 12 Pages 2010
On the characterization of binary concentration-encoded molecular communication in nanonetworks Fulltext Access 12 Pages 2010
Fair resource allocation in wireless networks in the presence of a jammer Fulltext Access 12 Pages 2010
Discovery and prevention of attack episodes by frequent episodes mining and finite state machines Fulltext Access 12 Pages 2010
Experimental evaluation of slack management in real-time control systems: Coordinated vs. self-triggered approach Fulltext Access 12 Pages 2010
A Force-Directed Scheduling based architecture generation algorithm and design tool for FPGAs Fulltext Access 12 Pages 2010
Efficient architectures for 3D HWT using dynamic partial reconfiguration Fulltext Access 12 Pages 2010
Metropolitan optical packet bus-based networks: Packet bursting and emulation of TDM services Fulltext Access 12 Pages 2010
QoE oriented cross-layer design of a resource allocation algorithm in beyond 3G systems Fulltext Access 12 Pages 2010
Hierarchical packet classification using a Bloom filter and rule-priority tries Fulltext Access 12 Pages 2010
SSR results obtained with a dynamic phasor model of SVC using modal analysis Fulltext Access 12 Pages 2010
An extensible database architecture for nationwide power quality monitoring Fulltext Access 12 Pages 2010
The calculation of flicker propagation in part of the Slovenian transmission network Fulltext Access 12 Pages 2010
A multi-objective framework for dynamic transmission expansion planning in competitive electricity market Fulltext Access 12 Pages 2010
GA/particle swarm intelligence based optimization of two specific varieties of controller devices applied to two-area multi-units automatic generation control Fulltext Access 12 Pages 2010
An empirical study of customers’ perceptions of security and trust in e-payment systems Fulltext Access 12 Pages 2010
Do online reviews reflect a product’s true perceived quality? An investigation of online movie reviews across cultures Fulltext Access 12 Pages 2010
Virtual travel communities and customer loyalty: Customer purchase involvement and web site design Fulltext Access 12 Pages 2010
Internet positioning and performance of e-tailers: An empirical analysis Fulltext Access 12 Pages 2010
Exploring business opportunities from mobile services data of customers: An inter-cluster analysis approach Fulltext Access 12 Pages 2010
The importance of language familiarity in global business e-negotiation Fulltext Access 12 Pages 2010
The SEMA referential framework: Avoiding ambiguities in the terms “security” and “safety” Fulltext Access 12 Pages 2010
The interdependent security problem in the defense industrial base: An agent-based model on a social network Fulltext Access 12 Pages 2010
The impact of dynamic adversarial attacks on the stability of heterogeneous multimedia networks Fulltext Access 12 Pages 2010
A decentralized energy-based diffusion algorithm to increase the lifetime of MANETs Fulltext Access 12 Pages 2010
A non-cooperative game approach for power-aware MAC in ad hoc wireless networks Fulltext Access 12 Pages 2010
Interference and power constrained broadcast and multicast routing in wireless ad hoc networks using directional antennas Fulltext Access 12 Pages 2010
Denial of service attack-resistant flooding authentication in wireless sensor networks Fulltext Access 12 Pages 2010
ALM: An adaptive location management scheme for approximate location queries in wireless sensor networks Fulltext Access 12 Pages 2010
Routing multicast sessions with differentiated reliability requirement in WDM mesh networks Fulltext Access 12 Pages 2010
Task-execution scheduling schemes for network measurement and monitoring Fulltext Access 12 Pages 2010
Risk-informed decision support for assessing the costs and benefits of counter-terrorism protective measures for infrastructure Fulltext Access 12 Pages 2010
A fast IPv6 packet classification algorithm based on efficient multi-bit selection Fulltext Access 12 Pages 2010
A graph theoretic approach to ultrafast information distribution: Borel Cayley graph resizing algorithm Fulltext Access 12 Pages 2010
Fragment Transfer Protocol: An IEEE-FIPA based efficient transfer protocol for mobile agents Fulltext Access 12 Pages 2010
OverCourt: DDoS mitigation through credit-based traffic segregation and path migration Fulltext Access 12 Pages 2010
Routing exploiting multiple heterogeneous wireless interfaces: A TCP performance study Fulltext Access 12 Pages 2010
On the applicability of available bandwidth estimation techniques and tools Fulltext Access 12 Pages 2010
An optimized 2.4 GHz VCO circuit design and simulation with high-Q MEMS LC-tank Fulltext Access 12 Pages 2010
A constrained minimum mean square error code tracking loop for synchronous DS-CDMA systems Fulltext Access 12 Pages 2010
Suitable combination of channel coding and space–time schemes for moderate-to-high spectral efficiency MIMO systems Fulltext Access 12 Pages 2010