A semantic information system for services and traded resources in Grid e-markets Fulltext Access 18 Pages 2010
Integrating real-time inter-task communication channels into hardware–software codesign Fulltext Access 18 Pages 2010
Survey of network security systems to counter SIP-based denial-of-service attacks Fulltext Access 19 Pages 2010
Software Process Improvement as organizational change: A metaphorical analysis of the literature Fulltext Access 19 Pages 2010
An intruder model with message inspection for model checking security protocols Fulltext Access 19 Pages 2010
A knowledgeable security model for distributed health information systems Fulltext Access 19 Pages 2010
Dynamical combination of byte level and Sub-Packet level FEC in HARQ mechanism to reduce error recovery overhead on video streaming over wireless networks Fulltext Access 19 Pages 2010
Performance analysis for hierarchical resource allocation in multiplexed mobile packet data networks Fulltext Access 19 Pages 2010
High level modeling and automated generation of heterogeneous SoC architectures with optimized custom reconfigurable cores and on-chip communication media Fulltext Access 19 Pages 2010
Query performance evaluation of an architecture for fine-grained integration of heterogeneous grid data sources Fulltext Access 19 Pages 2010
NanoNS: A nanoscale network simulator framework for molecular communications Fulltext Access 19 Pages 2010
Optimal monotone forwarding policies in delay tolerant mobile ad-hoc networks Fulltext Access 19 Pages 2010
An analytical framework for self-organizing peer-to-peer anti-entropy algorithms Fulltext Access 19 Pages 2010
On accurate and efficient statistical counting in sensor-based surveillance systems Fulltext Access 19 Pages 2010
A study of overheads and accuracy for efficient monitoring of wireless mesh networks Fulltext Access 19 Pages 2010
Maximum lifetime continuous query processing in wireless sensor networks Fulltext Access 19 Pages 2010
Routing, scheduling and channel assignment in Wireless Mesh Networks: Optimization models and algorithms Fulltext Access 19 Pages 2010
On the impact of routing matrix inconsistencies on statistical path monitoring in overlay networks Fulltext Access 19 Pages 2010
Design of the multicast service for mobile users in the 802.16 network environment Fulltext Access 19 Pages 2010
HCMM: Modelling spatial and temporal properties of human mobility driven by users’ social relationships Fulltext Access 19 Pages 2010
On oligopoly spectrum allocation game in cognitive radio networks with capacity constraints Fulltext Access 19 Pages 2010
Reputation-based dependable scheduling of workflow applications in Peer-to-Peer Grids Fulltext Access 19 Pages 2010
Fitting genetic algorithms to distributed on-line evolution of network protocols Fulltext Access 19 Pages 2010
Research on the energy hole problem based on unequal cluster-radius for wireless sensor networks Fulltext Access 20 Pages 2010
Verification and validation of declarative model-to-model transformations through invariants Fulltext Access 20 Pages 2010
Ant-based routing for wireless multimedia sensor networks using multiple QoS metrics Fulltext Access 20 Pages 2010
Performance analysis of differentiated resource-sharing in a wireless ad-hoc network Fulltext Access 20 Pages 2010
Mobility profiler: A framework for discovering mobility profiles of cell phone users Fulltext Access 20 Pages 2010
Military tactics in agent-based sinkhole attack detection for wireless ad hoc networks Fulltext Access 20 Pages 2010
A system for destination and future route prediction based on trajectory mining Fulltext Access 20 Pages 2010
Analytical performance evaluation of various frequency reuse and scheduling schemes in cellular OFDMA networks Fulltext Access 20 Pages 2010
Extracting state-based performance metrics using asynchronous iterative techniques Fulltext Access 20 Pages 2010
A framework for utilizing qualitative spatial relations between networked embedded systems Fulltext Access 20 Pages 2010
Real-time hands, face and facial features detection and tracking: Application to cognitive rehabilitation tests monitoring Fulltext Access 20 Pages 2010
SARA: A service architecture for resource aware ubiquitous environments Fulltext Access 20 Pages 2010
Enhancing intelligence and dependability of a product line enabled pervasive middleware Fulltext Access 20 Pages 2010
An overview of Channel Assignment methods for multi-radio multi-channel wireless mesh networks Fulltext Access 20 Pages 2010
Composition of architectural models: Empirical analysis and language support Fulltext Access 20 Pages 2010
Blocking probability computation in reversible Markovian bufferless multi-server systems Fulltext Access 20 Pages 2010
SUTIL – Network selection based on utility function and integer linear programming Fulltext Access 20 Pages 2010
Collision-Aware Rate Adaptation in multi-rate WLANs: Design and implementation Fulltext Access 20 Pages 2010
Performance Model Interchange Format (PMIF 2): A comprehensive approach to Queueing Network Model interoperability Fulltext Access 21 Pages 2010
A comprehensive engineering framework for guaranteeing component compatibility Fulltext Access 21 Pages 2010
Optimising context data dissemination and storage in distributed pervasive computing systems Fulltext Access 21 Pages 2010
Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines Fulltext Access 21 Pages 2010
End-to-end quality of service seen by applications: A statistical learning approach Fulltext Access 21 Pages 2010
A loss-event driven scalable fluid simulation method for high-speed networks Fulltext Access 21 Pages 2010
Quasi-Birth–Death Processes, Tree-Like QBDs, Probabilistic 1-Counter Automata, and Pushdown Systems Fulltext Access 21 Pages 2010
K-Tree: A multiple tree video multicast protocol for Ad hoc wireless networks Fulltext Access 21 Pages 2010
A family of code coverage-based heuristics for effective fault localization Fulltext Access 21 Pages 2010
A software integration approach for designing and assessing dependable embedded systems Fulltext Access 21 Pages 2010
CATCH: A protocol framework for cross-layer attacker traceback in mobile multi-hop networks Fulltext Access 21 Pages 2010
Symbolic partition refinement with automatic balancing of time and space Fulltext Access 21 Pages 2010
Ambient-PRISMA: Ambients in mobile aspect-oriented software architecture Fulltext Access 22 Pages 2010
Approach for selecting the most suitable Automated Personal Identification Mechanism (ASMSA) Fulltext Access 22 Pages 2010