A distributed platform for personalized advertising in digital interactive TV environments Fulltext Access 17 Pages 2010
Architecture analysis of enterprise systems modifiability – Models, analysis, and validation Fulltext Access 17 Pages 2010
A reconfigurable platform for evaluating the performance of QoS networks Fulltext Access 17 Pages 2010
Decision support for moving from a single product to a product portfolio in evolving software systems Fulltext Access 17 Pages 2010
Pitfalls in CAPTCHA design and implementation: The Math CAPTCHA, a case study Fulltext Access 17 Pages 2010
Agent-oriented software patterns for rapid and affordable robot programming Fulltext Access 17 Pages 2010
An analytical evaluation of mobility management in integrated WLAN-UMTS networks Fulltext Access 17 Pages 2010
A novel resource scheduling algorithm for QoS-aware services on the Internet Fulltext Access 17 Pages 2010
A security privacy aware architecture and protocol for a single smart card used for multiple services Fulltext Access 17 Pages 2010
WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks Fulltext Access 17 Pages 2010
DMP-tree: A dynamic M-way prefix tree data structure for strings matching Fulltext Access 17 Pages 2010
Optimality analysis of energy-performance trade-off for server farm management Fulltext Access 17 Pages 2010
Online anomaly detection for sensor systems: A simple and efficient approach Fulltext Access 17 Pages 2010
A unified framework for the bottleneck analysis of multiclass queueing networks Fulltext Access 17 Pages 2010
Positive Harris recurrence and diffusion scale analysis of a push pull queueing network Fulltext Access 17 Pages 2010
Machine learning algorithms for accurate flow-based network traffic classification: Evaluation and comparison Fulltext Access 17 Pages 2010
Defining and controlling the heterogeneity of a cluster: The Wrekavoc tool Fulltext Access 17 Pages 2010
A fast and progressive algorithm for skyline queries with totally- and partially-ordered domains Fulltext Access 17 Pages 2010
P/S-CoM: Building correct by design Publish/Subscribe architectural styles with safe reconfiguration Fulltext Access 17 Pages 2010
Visual comparison of software cost estimation models by regression error characteristic analysis Fulltext Access 17 Pages 2010
Implementation tradeoffs in the design of flexible transactional memory support Fulltext Access 17 Pages 2010
Using hierarchical agglomerative clustering in wireless sensor networks: An energy-efficient and flexible approach Fulltext Access 17 Pages 2010
Computationally secure self-healing key distribution with revocation in wireless ad hoc networks Fulltext Access 17 Pages 2010
UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks Fulltext Access 17 Pages 2010
Broadcast capacity of a WSN under communication and information coordination Fulltext Access 17 Pages 2010
ABC: A simple geographic forwarding scheme capable of bypassing routing holes in sensor networks Fulltext Access 17 Pages 2010
Smart bridges, smart tunnels: Transforming wireless sensor networks from research prototypes into robust engineering infrastructure Fulltext Access 17 Pages 2010
PROMPT: A cross-layer position-based communication protocol for delay-aware vehicular access networks Fulltext Access 17 Pages 2010
Fast file dissemination in peer-to-peer networks with upstream bandwidth constraint Fulltext Access 17 Pages 2010
An early warning system for detecting GSM-R wireless interference in the high-speed railway infrastructure Fulltext Access 17 Pages 2010
Supplying Web 2.0: An empirical investigation of the drivers of consumer transmutation of culture-oriented digital information goods Fulltext Access 17 Pages 2010
Pattern recognition of power signal disturbances using S Transform and TT Transform Fulltext Access 17 Pages 2010
With or without you: The countervailing forces and effects of process standardization Fulltext Access 18 Pages 2010
The value chain and e-business in exporting: Case studies from Ghana’s non-traditional export (NTE) sector Fulltext Access 18 Pages 2010
Analytical model for performance evaluation of Multilayer Multistage Interconnection Networks servicing unicast and multicast traffic by partial multicast operation Fulltext Access 18 Pages 2010
Designing an effective P2P system for a VoD system to exploit the multicast communication Fulltext Access 18 Pages 2010
Echo: A peer-to-peer clustering framework for improving communication in DHTs Fulltext Access 18 Pages 2010
Lightweight Transactional Memory systems for NoCs based architectures: Design, implementation and comparison of two policies Fulltext Access 18 Pages 2010
Probabilistic models for access strategies to dynamic information elements Fulltext Access 18 Pages 2010
An analytical approach to the deployment quality of surveillance wireless sensor networks considering the effect of jammers and coverage holes Fulltext Access 18 Pages 2010
HiFIND: A high-speed flow-level intrusion detection approach with DoS resiliency Fulltext Access 18 Pages 2010
Distributed QoS-sensitive band selection strategies for dynamic spectrum access in unlicensed CDMA networks Fulltext Access 18 Pages 2010
Augmenting predictive with oblivious routing for wireless mesh networks under traffic uncertainty Fulltext Access 18 Pages 2010
Performance evaluation of artificial neural network-based learning schemes for cognitive radio systems Fulltext Access 18 Pages 2010
Sequential hashing: A flexible approach for unveiling significant patterns in high speed networks Fulltext Access 18 Pages 2010
High-speed, in-band performance measurement instrumentation for next generation IP networks Fulltext Access 18 Pages 2010
Spectrum sharing in cognitive radio networks with imperfect sensing: A discrete-time Markov model Fulltext Access 18 Pages 2010
TCP Libra: Derivation, analysis, and comparison with other RTT-fair TCPs Fulltext Access 18 Pages 2010
RDSR-V. Reliable Dynamic Source Routing for video-streaming over mobile ad hoc networks Fulltext Access 18 Pages 2010
Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments Fulltext Access 18 Pages 2010
A general framework for efficient geographic routing in wireless networks Fulltext Access 18 Pages 2010
An intelligent backbone formation algorithm for wireless ad hoc networks based on distributed learning automata Fulltext Access 18 Pages 2010
Performance evaluation of directory protocols on an optical broadcast-based distributed shared memory multiprocessor Fulltext Access 18 Pages 2010
Efficient integer programming formulations for optimum sink location and routing in heterogeneous wireless sensor networks Fulltext Access 18 Pages 2010
Gather/scatter hardware support for accelerating Fast Fourier Transform Fulltext Access 18 Pages 2010
Passive internet measurement: Overview and guidelines based on experiences Fulltext Access 18 Pages 2010
An efficient analytical model for the dimensioning of WiMAX networks supporting multi-profile best effort traffic Fulltext Access 18 Pages 2010
Greedy face routing with face identification support in wireless networks Fulltext Access 18 Pages 2010