Developing and implementing an open and non-proprietary device description for FOUNDATION fieldbus based on software standards Fulltext Access 11 Pages 2009
Performance evaluation study for QoS-aware triple play services over entry-level xDSL connections Fulltext Access 11 Pages 2009
Janus: A dual-purpose analytical model for understanding, characterizing and countermining multi-stage collusive attacks in enterprise networks Fulltext Access 11 Pages 2009
Self-efficacy in information security: Its influence on end users' information security practice behavior Fulltext Access 11 Pages 2009
Secure seamless peer-to-peer (P2P) UDP communication using IPv4 LSRR option and IPv4+4 addresses Fulltext Access 11 Pages 2009
Multiple partner coded cooperation scheme for wireless communications and its performance analysis for two cooperative users Fulltext Access 11 Pages 2009
Introducing undergraduate students to simulation of semiconductor doping techniques Fulltext Access 11 Pages 2009
Validation and verification of computer forensic software tools—Searching Function Fulltext Access 11 Pages 2009
Business to business interoperability: A current review of XML data integration standards Fulltext Access 11 Pages 2009
Anomaly-based network intrusion detection: Techniques, systems and challenges Fulltext Access 11 Pages 2009
On the development of an internetwork-centric defense for scanning worms Fulltext Access 11 Pages 2009
Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks Fulltext Access 11 Pages 2009
A two-stage modelling architecture for distributed control of real-time industrial systems: Application of UML and Petri Net Fulltext Access 11 Pages 2009
Efficient hardware architecture of 2D-scan-based wavelet watermarking for image and video Fulltext Access 11 Pages 2009
Performance evaluation of wireless sensor network with hybrid channel access mechanism Fulltext Access 11 Pages 2009
Joint design of spectrum sharing and routing with channel heterogeneity in cognitive radio networks Fulltext Access 11 Pages 2009
A new low power reconfigurable decimation–interpolation and masking based filter architecture for channel adaptation in cognitive radio handsets Fulltext Access 11 Pages 2009
Multiresolution wavelet denoising for ultra-wideband time-of-arrival estimation with regularized least squares Fulltext Access 11 Pages 2009
Code-shifted reference transceiver for impulse radio ultra-wideband systems Fulltext Access 11 Pages 2009
Modeling, validation and performance evaluation of body shadowing effect in ultra-wideband networks Fulltext Access 11 Pages 2009
Resource provisioning for survivable WDM networks under a sliding scheduled traffic model Fulltext Access 11 Pages 2009
Performance analysis and dimensioning of multi-granular optical networks Fulltext Access 11 Pages 2009
Design tool and its experimental validation for SOA-based photonic signal processing Fulltext Access 11 Pages 2009
A policy-based authorization model for workflow-enabled dynamic process management Fulltext Access 11 Pages 2009
Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks Fulltext Access 11 Pages 2009
Dual-rail transition logic: A logic style for counteracting power analysis attacks Fulltext Access 11 Pages 2009
MetaCDN: Harnessing ‘Storage Clouds’ for high performance content delivery Fulltext Access 11 Pages 2009
BARC: A Battery Aware Reliable Clustering algorithm for sensor networks Fulltext Access 11 Pages 2009
Human factors in information security: The insider threat – Who can you trust these days? Fulltext Access 11 Pages 2009
Forensic analysis of the Firefox 3 Internet history and recovery of deleted SQLite records Fulltext Access 11 Pages 2009
Extraction of forensically sensitive information from windows physical memory Fulltext Access 11 Pages 2009
DIALOG: A framework for modeling, analysis and reuse of digital forensic knowledge Fulltext Access 11 Pages 2009
A reindexing based approach towards mapping of DAG with affine schedules onto parallel embedded systems Fulltext Access 11 Pages 2009
Analyzing the techniques that improve fault tolerance of aggregation trees in sensor networks Fulltext Access 11 Pages 2009
Bandwidth guaranteed multicast scheduling for virtual output queued packet switches Fulltext Access 11 Pages 2009
A novel distributed architecture of large-scale multimedia storage system using autonomous object-based storage devices Fulltext Access 11 Pages 2009
A genetic approach to joint routing and link scheduling for wireless mesh networks Fulltext Access 11 Pages 2009
Identification of a continuous time nonlinear state space model for the external power system dynamic equivalent by neural networks Fulltext Access 11 Pages 2009
Velocity relaxed and craziness-based swarm optimized intelligent PID and PSS controlled AVR system Fulltext Access 11 Pages 2009
A survey of critical research areas in the energy segment of restructured electric power markets Fulltext Access 11 Pages 2009
The effects of information overload on consumers’ subjective state towards buying decision in the internet shopping environment Fulltext Access 11 Pages 2009
Coordinated selection of procurement bids in finite capacity environments Fulltext Access 11 Pages 2009
Consideration sets in online shopping environments: the effects of search tool and information load Fulltext Access 11 Pages 2009
Discovering recency, frequency, and monetary (RFM) sequential patterns from customers’ purchasing data Fulltext Access 11 Pages 2009
Application of trusted network technology to industrial control networks Fulltext Access 11 Pages 2009
Optimal flow control for utility-lifetime tradeoff in wireless sensor networks Fulltext Access 11 Pages 2009
Chaos-based discrete fractional Sine transform domain audio watermarking scheme Fulltext Access 11 Pages 2009
Overcoming controllability problems with fewest channels between testers Fulltext Access 11 Pages 2009
Improving routing distance for geographic multicast with Fermat points in mobile ad hoc networks Fulltext Access 11 Pages 2009
Architecture and scalability of a high-speed traffic measurement platform with a highly flexible packet classification Fulltext Access 11 Pages 2009
A simulation of an economic, self-organising resource allocation approach for application layer networks Fulltext Access 11 Pages 2009
Understanding the physical and economic consequences of attacks on control systems Fulltext Access 11 Pages 2009
Slot allocation algorithms in centralized scheduling scheme for IEEE 802.16 based wireless mesh networks Fulltext Access 11 Pages 2009
Routing based on delivery distributions in predictable disruption tolerant networks Fulltext Access 11 Pages 2009
Localised alpha-shape computations for boundary recognition in sensor networks Fulltext Access 11 Pages 2009
Minimum energy hierarchical dynamic source routing for Mobile Ad Hoc Networks Fulltext Access 11 Pages 2009
Time-domain analysis of lossy active transmission lines using FDTD method Fulltext Access 11 Pages 2009
Error propagation analysis for underwater cooperative multi-hop communications Fulltext Access 11 Pages 2009