Using hybrid algorithm for Pareto efficient multi-objective test suite minimisation Fulltext Access 13 Pages 2010
Efficient utilization of elliptic curve cryptosystem for hierarchical access control Fulltext Access 13 Pages 2010
Automated assembly of Internet-scale software systems involving autonomous agents Fulltext Access 13 Pages 2010
Class movement and re-location: An empirical study of Java inheritance evolution Fulltext Access 13 Pages 2010
Measuring behavioral dependency for improving change-proneness prediction in UML-based design models Fulltext Access 13 Pages 2010
Formal specification of the variants and behavioural features of design patterns Fulltext Access 13 Pages 2010
Quantifying security risk level from CVSS estimates of frequency and impact Fulltext Access 13 Pages 2010
CA-MPSoC: An automated design flow for predictable multi-processor architectures for multiple applications Fulltext Access 13 Pages 2010
A novel adaptive steganography based on local complexity and human vision sensitivity Fulltext Access 13 Pages 2010
Exploiting address compression and heterogeneous interconnects for efficient message management in tiled CMPs Fulltext Access 13 Pages 2010
Buffer flush and address mapping scheme for flash memory solid-state disk Fulltext Access 13 Pages 2010
An empirical investigation into branch coverage for C programs using CUTE and AUSTIN Fulltext Access 13 Pages 2010
A path-traceable query routing mechanism for search in unstructured peer-to-peer networks Fulltext Access 13 Pages 2010
Design and analysis of systems based on RF receivers with multiple carbon nanotube antennas Fulltext Access 13 Pages 2010
Policy implications of market segmentation as a determinant of fixed-mobile service substitution: What it means for carriers and policy makers Fulltext Access 13 Pages 2010
Priming, sense-making and help: Analysis of player behaviour in an immersive theatrical experience Fulltext Access 13 Pages 2010
Topology and routing optimization for congestion minimization in optical wireless networks Fulltext Access 13 Pages 2010
Introducing cognitive systems in the wireless B3G world: Motivations and basic engineering challenges Fulltext Access 13 Pages 2010
Study of all-optical clock recovery performance by the primary and the secondary temporal Talbot effects in a second-order dispersive medium Fulltext Access 13 Pages 2010
Synthetic protocols for nano sensor transmitting platforms using enzyme and DNA based computing Fulltext Access 13 Pages 2010
Stochastic Petri nets with matrix exponentially distributed firing times Fulltext Access 13 Pages 2010
Analysis of short term fairness and its impact on packet level performance Fulltext Access 13 Pages 2010
Enabling portability in advanced information-centric services over structured peer-to-peer systems Fulltext Access 13 Pages 2010
An input traffic allocation strategy and an efficient transmission technique for collisions-free WDM ring MANs Fulltext Access 13 Pages 2010
Class prioritization and server dedication in queueing systems: Discrimination and fairness aspects Fulltext Access 13 Pages 2010
Reliable data path design of VLIW processor cores with comprehensive error-coverage assessment Fulltext Access 13 Pages 2010
Partial access conflict-relieving programmable address shuffler for parallel memory system in multi-core processor Fulltext Access 13 Pages 2010
Motion estimation and CABAC VLSI co-processors for real-time high-quality H.264/AVC video coding Fulltext Access 13 Pages 2010
Nonlinear signal–noise interactions in dispersion-managed links with various modulation formats Fulltext Access 13 Pages 2010
McTorrent: Using multiple communication channels for efficient bulk data dissemination in wireless sensor networks Fulltext Access 13 Pages 2010
Software process improvement through the Lean Measurement (SPI-LEAM) method Fulltext Access 13 Pages 2010
The impact of network topology on the performance of MAP selection algorithms Fulltext Access 13 Pages 2010
Design and implementation of the Node Identity Internetworking Architecture Fulltext Access 13 Pages 2010
SocialVPN: Enabling wide-area collaboration with integrated social and overlay networks Fulltext Access 13 Pages 2010
Strategies for adaptive smoothing and rebuffering via dynamic network calculus Fulltext Access 13 Pages 2010
Promoting effective service differentiation with Size-oriented Queue Management Fulltext Access 13 Pages 2010
Building an IP-based community wireless mesh network: Assessment of PACMAN as an IP address autoconfiguration protocol Fulltext Access 13 Pages 2010
Making the best of limited resources: Optimized differential sensing in cognitive PANs Fulltext Access 13 Pages 2010
An efficient dynamic-identity based signature scheme for secure network coding Fulltext Access 13 Pages 2010
The optimization of sensor relocation in wireless mobile sensor networks Fulltext Access 13 Pages 2010
Performance analysis of large multicast packet switches with multiple input queues and gathered traffic Fulltext Access 13 Pages 2010
On accuracy of region based localization algorithms for wireless sensor networks Fulltext Access 13 Pages 2010
Iterative decision feedback equalizer with cyclic detection for DFT-S OFDM system Fulltext Access 13 Pages 2010
Software engineering projects may fail before they are started: Post-mortem analysis of five cancelled projects Fulltext Access 13 Pages 2010
Towards real time implementation of reconstructive signal processing algorithms using systolic arrays coprocessors Fulltext Access 13 Pages 2010
Computing the correct Increment of Induction Pointers with application to loop unrolling Fulltext Access 13 Pages 2010
ComboFTL: Improving performance and lifespan of MLC flash memory using SLC flash buffer Fulltext Access 13 Pages 2010
Agent-based artificial immune system approach for adaptive damage detection in monitoring networks Fulltext Access 13 Pages 2010
Provably correct Java implementations of Spi Calculus security protocols specifications Fulltext Access 13 Pages 2010
Performance evaluation of fault tolerance techniques in grid computing system Fulltext Access 13 Pages 2010
Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU Fulltext Access 13 Pages 2010
Power-based multi-cell call admission control scheme for wideband-CDMA systems Fulltext Access 13 Pages 2010
Opportunistic resource utilization networks—A new paradigm for specialized ad hoc networks Fulltext Access 13 Pages 2010
Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11i standard Fulltext Access 13 Pages 2010