A modeling framework for optimizing the flow-level scheduling with time-varying channels Fulltext Access 16 Pages 2010
A game-based intrusion detection mechanism to confront internal attackers Fulltext Access 16 Pages 2010
Modeling and preventing TOCTTOU vulnerabilities in Unix-style file systems Fulltext Access 16 Pages 2010
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider Fulltext Access 16 Pages 2010
A multi-layer Criticality Assessment methodology based on interdependencies Fulltext Access 16 Pages 2010
A topology control approach for utilizing multiple channels in multi-radio wireless mesh networks Fulltext Access 16 Pages 2010
CARRADS: Cross layer based adaptive real-time routing attack detection system for MANETS Fulltext Access 16 Pages 2010
Stabilizing transport dynamics of control channels over wide-area networks Fulltext Access 16 Pages 2010
Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony Fulltext Access 16 Pages 2010
A novel frequency planning algorithm for mitigating unfairness in wireless LANs Fulltext Access 16 Pages 2010
Approximating passage time distributions in queueing models by Bayesian expansion Fulltext Access 16 Pages 2010
Linear-speed interior-path algorithms for distributed control of information networks Fulltext Access 16 Pages 2010
Cross-layer radio resource management in integrated WWAN and WLAN networks Fulltext Access 16 Pages 2010
Loop-free alternates and not-via addresses: A proper combination for IP fast reroute? Fulltext Access 16 Pages 2010
On the design of resilient heterogeneous wireless sensor networks based on small world concepts Fulltext Access 16 Pages 2010
Heuristic algorithm for finding boundary cycles in location-free low density wireless sensor networks Fulltext Access 16 Pages 2010
Topology-aware wavelength partitioning for DWDM OBS networks: A novel approach for absolute QoS provisioning Fulltext Access 16 Pages 2010
Evading stepping-stone detection under the cloak of streaming media with SNEAK Fulltext Access 16 Pages 2010
Automating the construction of domain-specific modeling languages for object-oriented frameworks Fulltext Access 16 Pages 2010
Frequency-domain channel estimation and equalization for shallow-water acoustic communications Fulltext Access 16 Pages 2010
Scheduling and development support in the Scavenger cyber foraging system Fulltext Access 16 Pages 2010
Heavy traffic analysis of state-dependent parallel queues with triggers and an application to web search systems Fulltext Access 16 Pages 2010
Steady-state analysis of a discrete-time batch arrival queue with working vacations Fulltext Access 16 Pages 2010
Studying the impact of synchronization frequency on scheduling tasks with dependencies in heterogeneous systems Fulltext Access 16 Pages 2010
An FPGA implemented cellular automaton crowd evacuation model inspired by the electrostatic-induced potential fields Fulltext Access 16 Pages 2010
A systematic and comprehensive investigation of methods to build and evaluate fault prediction models Fulltext Access 16 Pages 2010
Using Scrum to guide the execution of software process improvement in small organizations Fulltext Access 16 Pages 2010
Dynamically reconfigurable dataflow architecture for high-performance digital signal processing Fulltext Access 16 Pages 2010
Model-based platform-specific co-design methodology for dynamically partially reconfigurable systems with hardware virtualization and preemption Fulltext Access 16 Pages 2010
Domain-specific language modelling with UML profiles by decoupling abstract and concrete syntaxes Fulltext Access 16 Pages 2010
Software architecture awareness in long-term software product evolution Fulltext Access 16 Pages 2010
Transition-aware DVS algorithm for real-time systems using tree structure analysis Fulltext Access 16 Pages 2010
The inference problem: Maintaining maximal availability in the presence of database updates Fulltext Access 16 Pages 2010
Placement of wavelength converters and light splitters in a WDM network using the generic graph model Fulltext Access 16 Pages 2010
Structured quasi-cyclic LDPC codes with girth 18 and column-weight J⩾3J⩾3 Fulltext Access 16 Pages 2010
Network-assisted sink navigation for distributed data gathering: Stability and delay-energy trade-offs Fulltext Access 16 Pages 2010
Supporting mobility in an IMS-based P2P IPTV service: A proactive context transfer mechanism Fulltext Access 16 Pages 2010
Risk-informed assessment of regional preparedness: A case study of emergency potable water for hurricane response in Southeast Virginia Fulltext Access 16 Pages 2010
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks Fulltext Access 16 Pages 2010
Efficient broadcast for wireless ad hoc networks with a realistic physical layer Fulltext Access 16 Pages 2010
A three-tier framework for intruder information sharing in sensor networks Fulltext Access 16 Pages 2010
Feedback-directed page placement for ccNUMA via hardware-generated memory traces Fulltext Access 16 Pages 2010
eSciGrid: A P2P-based e-science Grid for scalable and efficient data sharing Fulltext Access 16 Pages 2010
Towards a federated Metropolitan Area Grid environment: The SCoPE network-aware infrastructure Fulltext Access 16 Pages 2010
Design and implementation of a real-time training environment for protective relay Fulltext Access 16 Pages 2010
Tuning the EDCA parameters in WLANs with heterogeneous traffic: A flow-level analysis Fulltext Access 16 Pages 2010
Shared-per-wavelength asynchronous optical packet switching: A comparative analysis Fulltext Access 16 Pages 2010
Physically-based models of low-power wireless links using signal power simulation Fulltext Access 16 Pages 2010
Capacity scaling of large wireless networks with heterogeneous clusters Fulltext Access 16 Pages 2010
Design and performance evaluation of ContentPlace, a social-aware data dissemination system for opportunistic networks Fulltext Access 16 Pages 2010
A unified model for joint throughput-overhead analysis of random access mobile ad hoc networks Fulltext Access 16 Pages 2010
A survey of evolutionary and embryogenic approaches to autonomic networking Fulltext Access 16 Pages 2010
Stochastic analysis of a randomized detection algorithm for pollution attack in P2P live streaming systems Fulltext Access 16 Pages 2010
Affect-aware behaviour modelling and control inside an intelligent environment Fulltext Access 16 Pages 2010
Context modelling and a context-aware framework for pervasive service creation: A model-driven approach Fulltext Access 16 Pages 2010
HURP/HURBA: Zero-configuration hierarchical Up/Down routing and bridging architecture for Ethernet backbones and campus networks Fulltext Access 16 Pages 2010
A survey of vertical handover decision algorithms in Fourth Generation heterogeneous wireless networks Fulltext Access 16 Pages 2010
Self-configurable border landmark selection in wireless networks: Algorithms and applications Fulltext Access 16 Pages 2010
Enabling user-oriented management for ubiquitous computing: The meta-design approach Fulltext Access 16 Pages 2010
A remote interactive non-repudiation multimedia-based m-learning system Fulltext Access 17 Pages 2010
Defense techniques for low-rate DoS attacks against application servers Fulltext Access 17 Pages 2010
Agile bandwidth management techniques in slotted all-optical packet switched networks Fulltext Access 17 Pages 2010
Cooperative user–network interactions in next generation communication networks Fulltext Access 17 Pages 2010
Improved modeling of IEEE 802.11a PHY through fine-grained measurements Fulltext Access 17 Pages 2010
A multi-objective evolutionary algorithm for the deployment and power assignment problem in wireless sensor networks Fulltext Access 17 Pages 2010
A network rate management protocol with TCP congestion control and fairness for all Fulltext Access 17 Pages 2010
Performance evaluation of a Kademlia-based communication-oriented P2P system under churn Fulltext Access 17 Pages 2010
Optimal volume anomaly detection and isolation in large-scale IP networks using coarse-grained measurements Fulltext Access 17 Pages 2010