On the side-effects of proprietary solutions for fading and interference mitigation in IEEE 802.11b/g outdoor links Fulltext Access 12 Pages 2009
Developing reusable simulation core code for networking: The grid resource discovery example Fulltext Access 12 Pages 2009
Dynamically reconfigurable hardware–software architecture for partitioning networking functions on the SoC platform Fulltext Access 12 Pages 2009
Comparative evaluation of contiguous allocation strategies on 3D mesh multicomputers Fulltext Access 12 Pages 2009
A study of project selection and feature weighting for analogy based software cost estimation Fulltext Access 12 Pages 2009
Development of a team measure for tacit knowledge in software development teams Fulltext Access 12 Pages 2009
Identifying exogenous drivers and evolutionary stages in FLOSS projects Fulltext Access 12 Pages 2009
Design and implementation of a Byzantine fault tolerance framework for Web services Fulltext Access 12 Pages 2009
An empirical analysis of the impact of software development problem factors on software maintainability Fulltext Access 12 Pages 2009
HERO: High-speed enhanced routing operation in Ethernet NICs for software routers Fulltext Access 12 Pages 2009
A real options approach for evaluation and justification of a hospital information system Fulltext Access 12 Pages 2009
Mathematical model of IRIS replication mechanism for the simulation of tactical networks Fulltext Access 12 Pages 2009
A MAC protocol for low-rate UWB wireless sensor networks using directional antennas Fulltext Access 12 Pages 2009
Design of certification authority using secret redistribution and multicast routing in wireless mesh networks Fulltext Access 12 Pages 2009
Analysis of burstiness monitoring and detection in an adaptive Web system Fulltext Access 12 Pages 2009
Probabilistic analysis and interdependence discovery in the user interactions of a video news on demand service Fulltext Access 12 Pages 2009
Key hierarchies for hierarchical access control in secure group communications Fulltext Access 12 Pages 2009
Robust network monitoring in the presence of non-cooperative traffic queries Fulltext Access 12 Pages 2009
A practical bytecode interpreter for programmable routers on IXP network processors Fulltext Access 12 Pages 2009
Hybrid TDMA with heuristic traffic shaping: An efficient bandwidth allocation approach for heavy loaded LANs Fulltext Access 12 Pages 2009
A survey of dynamic bandwidth allocation algorithms for Ethernet Passive Optical Networks Fulltext Access 12 Pages 2009
Mapping theoretical and practical issues in the relationship between ICTs and Africa’s socioeconomic development Fulltext Access 12 Pages 2009
Bhoomi, Gyan Ganga, e-governance and the right to information: ICTs and development in India Fulltext Access 12 Pages 2009
Consumer behaviour in the mobile telecommunications’ market: The individual’s adoption decision of innovative services Fulltext Access 12 Pages 2009
Parameter estimation validity and relationship robustness: A comparison of telephone and internet survey techniques Fulltext Access 12 Pages 2009
Simulation studies on scheduling requests for multiple data items in on-demand broadcast environments Fulltext Access 12 Pages 2009
The GI/M/1 queue and the GI/Geo/1 queue both with single working vacation Fulltext Access 12 Pages 2009
Capacity fades analysis of MIMO Rician channels in mobile ad hoc networks Fulltext Access 12 Pages 2009
Should we collude? Analyzing the benefits of bidder cooperation in online group-buying auctions Fulltext Access 12 Pages 2009
A context switching streaming memory architecture to accelerate a neocortex model Fulltext Access 12 Pages 2009
FPGA implementation of time–frequency analysis algorithms for laser welding monitoring Fulltext Access 12 Pages 2009
A new relevance feedback technique for iconic image retrieval based on spatial relationships Fulltext Access 12 Pages 2009
A comparison of issues and advantages in agile and incremental development between state of the art and an industrial case Fulltext Access 12 Pages 2009
Design and implementation of MLC NAND flash-based DBMS for mobile devices Fulltext Access 12 Pages 2009
Resource prioritization of code optimization techniques for program synthesis of wireless sensor network applications Fulltext Access 12 Pages 2009
An efficient peer-to-peer indexing tree structure for multidimensional data Fulltext Access 12 Pages 2009
A domain decomposition strategy for alignment of multiple biological sequences on multiprocessor platforms Fulltext Access 12 Pages 2009
A multigrain Delaunay mesh generation method for multicore SMT-based architectures Fulltext Access 12 Pages 2009
Sequence-preserving parallel IP lookup using multiple SRAM-based pipelines Fulltext Access 12 Pages 2009
A new diffusion-based multilevel algorithm for computing graph partitions Fulltext Access 12 Pages 2009
A proactive low-overhead file replication scheme for structured P2P content delivery networks Fulltext Access 12 Pages 2009
Handling biological sequence alignments on networked computing systems: A divide-and-conquer approach Fulltext Access 12 Pages 2009
Algorithm, software, and hardware optimizations for Delaunay mesh generation on simultaneous multithreaded architectures Fulltext Access 12 Pages 2009
Using historical accounting information to predict the resource usage of grid jobs Fulltext Access 12 Pages 2009
A progressive multi-layer resource reconfiguration framework for time-shared grid systems Fulltext Access 12 Pages 2009
Calculation of fault current-division factors and assessment of earth-grid safety at an independent power producer station Fulltext Access 12 Pages 2009
Robust Model-Following control of a three-level Neutral Point Clamped shunt active filter in the medium voltage range Fulltext Access 12 Pages 2009
Construction of the hourly load curves and detecting the annual peak load of future Syrian electric power demand using bottom-up approach Fulltext Access 12 Pages 2009
Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit Fulltext Access 12 Pages 2009
Embracing interference in ad hoc networks using joint routing and scheduling with multiple packet reception Fulltext Access 12 Pages 2009
Software-driven sensor networks for short-range shallow water applications Fulltext Access 12 Pages 2009
A Bayesian network approach to a biologically inspired motion strategy for mobile wireless sensor networks Fulltext Access 12 Pages 2009
Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications Fulltext Access 12 Pages 2009
An energy efficiency model for adaptive and custom error control schemes in Bluetooth sensor networks Fulltext Access 12 Pages 2009
Efficient error recovery with network coding in underwater sensor networks Fulltext Access 12 Pages 2009
A genetic algorithm based approach for energy efficient routing in two-tiered sensor networks Fulltext Access 12 Pages 2009
An incentive mechanism for message relaying in unstructured peer-to-peer systems Fulltext Access 12 Pages 2009
Pricing display ads and contextual ads: Competition, acquisition, and investment Fulltext Access 12 Pages 2009
Time-parallel simulation of wireless ad hoc networks with compressed history Fulltext Access 12 Pages 2009
Biased choice of a mobile telephony tariff type:: Exploring usage boundary perceptions as a cognitive cause in choosing between a use-based or a flat rate plan Fulltext Access 13 Pages 2009
Content and context for mobile television: Integrating trial, expert and user findings Fulltext Access 13 Pages 2009
Real options and technology management: Assessing technology migration options in wireless industry Fulltext Access 13 Pages 2009
Virtual gratifications of wireless Internet: Is wireless portable Internet reinforced by unrealized gratifications? Fulltext Access 13 Pages 2009
CMV: File consistency maintenance through virtual servers in peer-to-peer systems Fulltext Access 13 Pages 2009
Symmetric active/active metadata service for high availability parallel file systems Fulltext Access 13 Pages 2009
On the design of communication-aware fault-tolerant scheduling algorithms for precedence constrained tasks in grid computing systems with dedicated communication devices Fulltext Access 13 Pages 2009
A P2P-based intelligent resource discovery mechanism in Internet-based distributed systems Fulltext Access 13 Pages 2009
Loop scheduling and bank type assignment for heterogeneous multi-bank memory Fulltext Access 13 Pages 2009