Measuring effectiveness of HCI integration in software development processes Fulltext Access 14 Pages 2010
Exploring the benefits of the combination of a software architecture analysis and a usability evaluation of a mobile application Fulltext Access 14 Pages 2010
Efficient hardware support for pattern matching in network intrusion detection Fulltext Access 14 Pages 2010
Robust lossless image watermarking based on α-trimmed mean algorithm and support vector machine Fulltext Access 14 Pages 2010
An optimal solution for byzantine agreement under a hierarchical cluster-oriented mobile ad hoc network Fulltext Access 14 Pages 2010
Invariant image watermarking using multi-scale Harris detector and wavelet moments Fulltext Access 14 Pages 2010
A closed-form derivation of self and multi-user interference for time-reversed UWB communications Fulltext Access 14 Pages 2010
Scalability of MANET routing protocols for heterogeneous and homogenous networks Fulltext Access 14 Pages 2010
An iterative linearised solution to the sinusoidal parameter estimation problem Fulltext Access 14 Pages 2010
Pervasive authentication and authorization infrastructures for mobile users Fulltext Access 14 Pages 2010
Power optimization for dynamic configuration in heterogeneous web server clusters Fulltext Access 14 Pages 2010
Compiler-assisted leakage-aware loop scheduling for embedded VLIW DSP processors Fulltext Access 14 Pages 2010
A feature-oriented approach for developing reusable product line assets of service-based systems Fulltext Access 14 Pages 2010
Petri net modeling and deadlock analysis of parallel manufacturing processes with shared-resources Fulltext Access 14 Pages 2010
Design and analysis of GUI test-case prioritization using weight-based methods Fulltext Access 14 Pages 2010
Maintaining and checking parity in highly available Scalable Distributed Data Structures Fulltext Access 14 Pages 2010
Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method Fulltext Access 14 Pages 2010
Signal strength based routing for power saving in mobile ad hoc networks Fulltext Access 14 Pages 2010
Comprehensive evaluation of aperiodic checkpointing and rejuvenation schemes in operational software system Fulltext Access 14 Pages 2010
Communication-aware heuristics for run-time task mapping on NoC-based MPSoC platforms Fulltext Access 14 Pages 2010
Implementing the new Ada 2005 timing event and execution time control features on the AVR32 architecture Fulltext Access 14 Pages 2010
Surveillance with wireless sensor networks in obstruction: Breach paths as watershed contours Fulltext Access 14 Pages 2010
A reliability analysis of Double-Ring topologies with Dual Attachment using p-cycles for optical metro networks Fulltext Access 14 Pages 2010
CoreCast: How core/edge separation can help improving inter-domain live streaming Fulltext Access 14 Pages 2010
Network prefix-level traffic profiling: Characterizing, modeling, and evaluation Fulltext Access 14 Pages 2010
Energy efficient transmission scheduling for infrastructure sensor nodes in location systems Fulltext Access 14 Pages 2010
Continuum equilibria and global optimization for routing in dense static ad hoc networks Fulltext Access 14 Pages 2010
Signal reconstruction in sensor networks with flat and clustered topologies Fulltext Access 14 Pages 2010
Traceband: A fast, low overhead and accurate tool for available bandwidth estimation and monitoring Fulltext Access 14 Pages 2010
On the capacity of multi-packet reception enabled multi-channel multi-interface wireless networks Fulltext Access 14 Pages 2010
Providing scalable NH-diverse iBGP route re-distribution to achieve sub-second switch-over time Fulltext Access 14 Pages 2010
Error analysis of non-collaborative wireless localization in circular-shaped regions Fulltext Access 14 Pages 2010
A market-based approach to managing the risk of peer-to-peer transactions Fulltext Access 14 Pages 2010
TRIMS, a privacy-aware trust and reputation model for identity management systems Fulltext Access 14 Pages 2010
Performance analysis of the IEEE 802.11 DCF in the presence of the hidden stations Fulltext Access 14 Pages 2010
Improving responsiveness of soft aperiodic tasks using proportional slack time Fulltext Access 14 Pages 2010
A novel implementation of radix-4 floating-point division/square-root using comparison multiples Fulltext Access 14 Pages 2010
A detailed review of energy-efficient medium access control protocols for mobile sensor networks Fulltext Access 14 Pages 2010
A cross-layer elastic CAC and holistic opportunistic scheduling for QoS support in WiMAX Fulltext Access 14 Pages 2010
Bounds estimation and practical stability of AIMD/RED systems with time delays Fulltext Access 14 Pages 2010
A novel self-learning architecture for p2p traffic classification in high speed networks Fulltext Access 14 Pages 2010
Blind maximum likelihood estimation of traffic matrices under long-range dependent traffic Fulltext Access 14 Pages 2010
Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study Fulltext Access 14 Pages 2010
A backward-compatible multiple-round collision avoidance scheme for contention based medium access control Fulltext Access 14 Pages 2010
Measurement and performance issues of transport protocols over 10 Gbps high-speed optical networks Fulltext Access 14 Pages 2010
Enhancing middleware support for architecture-based development through compositional weaving of styles Fulltext Access 15 Pages 2010
CST: A new contention reduction scheme in all-optical packet switched star-based metro networks Fulltext Access 15 Pages 2010
PCTL model checking of Markov chains: Truth and falsity as winning strategies in games Fulltext Access 15 Pages 2010
A symbolic fault-prediction model based on multiobjective particle swarm optimization Fulltext Access 15 Pages 2010
Communication of uncoded sensor measurements through nanoscale binary-node stochastic pooling networks Fulltext Access 15 Pages 2010
Rate stability and output rates in queueing networks with shared resources Fulltext Access 15 Pages 2010
Design and implementation of high-speed buffered crossbars with efficient load balancing for multi-core SoCs Fulltext Access 15 Pages 2010
Modeling soft errors for data caches and alleviating their effects on data reliability Fulltext Access 15 Pages 2010
A mean field model for an optical switch with a large number of wavelengths and centralized partial conversion Fulltext Access 15 Pages 2010
Structuring the modeling space and supporting evolution in software product line engineering Fulltext Access 15 Pages 2010
On the ability of complexity metrics to predict fault-prone classes in object-oriented systems Fulltext Access 15 Pages 2010
Coordination implications of software architecture in a global software development project Fulltext Access 15 Pages 2010
A Superscalar software architecture model for Multi-Core Processors (MCPs) Fulltext Access 15 Pages 2010
A distributed server architecture supporting dynamic resource provisioning for BPM-oriented workflow management systems Fulltext Access 15 Pages 2010
Design and implementation of Performance Analysis Unit (PAU) for AXI-based multi-core System on Chip (SOC) Fulltext Access 15 Pages 2010
Scalable mpNoC for massively parallel systems – Design and implementation on FPGA Fulltext Access 15 Pages 2010
CLPL: Providing software infrastructure for the systematic and effective construction of complex collaborative learning systems Fulltext Access 15 Pages 2010
Efficient multi-objective higher order mutation testing with genetic programming Fulltext Access 15 Pages 2010
An exploratory study of architectural effects on requirements decisions Fulltext Access 15 Pages 2010
Component Point: A system-level size measure for Component-Based Software Systems Fulltext Access 15 Pages 2010
Effective processing of continuous group-by aggregate queries in sensor networks Fulltext Access 15 Pages 2010