Fast and proximity-aware multi-source overlay multicast under heterogeneous environment Fulltext Access 11 Pages 2009
Protecting light forest in survivable WDM mesh networks with sparse light splitting Fulltext Access 11 Pages 2009
Hardware implementation of a pulse mode neural network-based edge detection system Fulltext Access 11 Pages 2009
Microwave circuit theory-based models to predict the resonant frequencies of a wide range of ring resonators Fulltext Access 11 Pages 2009
End-to-end epidemic multicast loss recovery: Analysis of scalability and robustness Fulltext Access 11 Pages 2009
A performance study of uplink scheduling algorithms in point-to-multipoint WiMAX networks Fulltext Access 11 Pages 2009
Impact of bandwidth request schemes for Best-Effort traffic in IEEE 802.16 networks Fulltext Access 11 Pages 2009
Adaptive Head-to-Tail: Active Queue Management based on implicit congestion signals Fulltext Access 11 Pages 2009
LGRR: A new packet scheduling algorithm for differentiated services packet-switched networks Fulltext Access 11 Pages 2009
Highest Urgency First (HUF): A latency and modulation aware bandwidth allocation algorithm for WiMAX base stations Fulltext Access 11 Pages 2009
A new intelligent algorithm for online voltage stability assessment and monitoring Fulltext Access 11 Pages 2009
Assured end-to-end QoS through adaptive marking in multi-domain differentiated services networks Fulltext Access 11 Pages 2009
Interdependent technology attributes and the diffusion of consumer electronics Fulltext Access 11 Pages 2009
Effects of gratification-opportunities and gratifications-obtained on preferences of instant messaging and e-mail among college students Fulltext Access 11 Pages 2009
Exploring a heterogeneous and fragmented digital ecosystem: Mobile content Fulltext Access 11 Pages 2009
New secure bilateral transaction determination and study of pattern under contingencies and UPFC in competitive hybrid electricity markets Fulltext Access 11 Pages 2009
A study on performance of dynamic file replication algorithms for real-time file access in Data Grids Fulltext Access 11 Pages 2009
A new grid resource management mechanism with resource-aware policy administrator for SLA-constrained applications Fulltext Access 11 Pages 2009
OntoZilla: An ontology-based, semi-structured, and evolutionary peer-to-peer network for information systems and services Fulltext Access 11 Pages 2009
Deterministic particle filtering for GPS navigation in the presence of multipath Fulltext Access 11 Pages 2009
A contribution to fast telecommunication system conception: Application to a DS-SS tracking stage improvement Fulltext Access 11 Pages 2009
Optimal power allocation for the proposed asymmetric turbo code for 3G systems Fulltext Access 11 Pages 2009
A combinatorial algorithm for the maximum lifetime data gathering with aggregation problem in sensor networks Fulltext Access 11 Pages 2009
LTRES: A loss-tolerant reliable event sensing protocol for wireless sensor networks Fulltext Access 11 Pages 2009
Framework and implementation of secondary voltage regulation strategy based on multi-agent technology Fulltext Access 11 Pages 2009
Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information and forensic workflow Fulltext Access 12 Pages 2009
Power saving and fault-tolerance in real-time critical embedded systems Fulltext Access 12 Pages 2009
Predicting intrusion goal using dynamic Bayesian network with transfer probability estimation Fulltext Access 12 Pages 2009
Dependability assessment of by-wire control systems using fault injection Fulltext Access 12 Pages 2009
Security threats scenarios in trust and reputation models for distributed systems Fulltext Access 12 Pages 2009
SimuRed: A flit-level event-driven simulator for multicomputer network performance evaluation Fulltext Access 12 Pages 2009
Adaptive channel and power allocation of downlink multi-user MC-CDMA systems Fulltext Access 12 Pages 2009
A negotiation framework for content distribution in mobile transient networks Fulltext Access 12 Pages 2009
Enhancement of anticipative recursively adjusting mechanism for redundant parallel file transfer in data grids Fulltext Access 12 Pages 2009
On target coverage in wireless heterogeneous sensor networks with multiple sensing units Fulltext Access 12 Pages 2009
Content and overlay-aware scheduling for peer-to-peer streaming in fluctuating networks Fulltext Access 12 Pages 2009
A phenotype reputation estimation function and its study of resilience to social attacks Fulltext Access 12 Pages 2009
A platform-based design framework for joint SW/HW multiprocessor systems design Fulltext Access 12 Pages 2009
Performance analysis of a threshold based distributed channel allocation algorithm for cellular networks Fulltext Access 12 Pages 2009
Self-deployment of sensors for maximized coverage in underwater acoustic sensor networks Fulltext Access 12 Pages 2009
Distributed uplink scheduling and rate control in cdma2000 using adaptive antenna arrays Fulltext Access 12 Pages 2009
Multi-service traffic profiles to realise and maintain QoS guarantees in wireless LANs Fulltext Access 12 Pages 2009
Optimisation of the pilot-to-data power ratio in the wireless MIMO-OFDM system with low-complexity MMSE channel estimation Fulltext Access 12 Pages 2009
A genetic algorithm for solving virtual source placement problem on WDM networks Fulltext Access 12 Pages 2009
Intrusion detection alarms reduction using root cause analysis and clustering Fulltext Access 12 Pages 2009
Secure network coding for wireless mesh networks: Threats, challenges, and directions Fulltext Access 12 Pages 2009
The Oea framework for class-based object-oriented style JavaScript for web programming Fulltext Access 12 Pages 2009
Human and organizational factors in computer and information security: Pathways to vulnerabilities Fulltext Access 12 Pages 2009
BGP convergence delay after multiple simultaneous router failures: Characterization and solutions Fulltext Access 12 Pages 2009
What the heck is this application doing? – A security-by-contract architecture for pervasive services Fulltext Access 12 Pages 2009
Multi-dimensional credentialing using veiled certificates: Protecting privacy in the face of regulatory reporting requirements Fulltext Access 12 Pages 2009
Utility-based scheduling for grid computing under constraints of energy budget and deadline Fulltext Access 12 Pages 2009