A framework for low energy data management in reconfigurable multi-context architectures Fulltext Access 13 Pages 2009
Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions Fulltext Access 13 Pages 2009
Source video camera identification for multiply compressed videos originating from YouTube Fulltext Access 13 Pages 2009
Proposal, design and evaluation of a mechanism to limit the length of anonymous overlay network paths Fulltext Access 13 Pages 2009
A cycle-accurate transaction level SystemC model for a serial communication bus Fulltext Access 13 Pages 2009
Enhancing WLAN/UMTS dual-mode services using a novel distributed multi-agent scheduling scheme Fulltext Access 13 Pages 2009
Spatial error concealment: A novel exemplar-based approach using segmentation Fulltext Access 13 Pages 2009
Fast detection and visualization of network attacks on parallel coordinates Fulltext Access 13 Pages 2009
Smart card security evaluation: Community solutions to intractable problems Fulltext Access 13 Pages 2009
A new steganography algorithm based on color histograms for data embedding into raw video streams Fulltext Access 13 Pages 2009
Extending fieldbus standards to food processing and packaging industry: A review Fulltext Access 13 Pages 2009
Resource allocation and admission control for the provisioning of quality of service in networks of static priority schedulers Fulltext Access 13 Pages 2009
Path coverage properties of randomly deployed sensors with finite data-transmission ranges Fulltext Access 13 Pages 2009
H-P2PSIP: Interconnection of P2PSIP domains for global multimedia services based on a hierarchical DHT overlay network Fulltext Access 13 Pages 2009
An efficient XML encoding and labeling method for query processing and updating on dynamic XML data Fulltext Access 13 Pages 2009
Tool support for the rapid composition, analysis and implementation of reactive services Fulltext Access 13 Pages 2009
UWIS: An assessment methodology for usability of web-based information systems Fulltext Access 13 Pages 2009
On the design of an global intrusion tolerance network architecture against the internet catastrophes Fulltext Access 13 Pages 2009
Visualization and comparison of architecture rationale with semantic web technologies Fulltext Access 13 Pages 2009
Broadcast filtering: Snoop energy reduction in shared bus-based low-power MPSoCs Fulltext Access 13 Pages 2009
Maintaining constraints of UML models in distributed collaborative environments Fulltext Access 13 Pages 2009
A secure digital camera architecture for integrated real-time digital rights management Fulltext Access 13 Pages 2009
fP2P–HN: A P2P-based route optimization architecture for mobile IP-based community networks Fulltext Access 13 Pages 2009
Managing requirements specifications for product lines – An approach and industry case study Fulltext Access 13 Pages 2009
PAT: A pattern classification approach to automatic reference oracles for the testing of mesh simplification programs Fulltext Access 13 Pages 2009
An efficient approach for distributed dynamic channel allocation with queues for real-time and non-real-time traffic in cellular networks Fulltext Access 13 Pages 2009
Identifying best practices for supporting broadband growth: Methodology and analysis Fulltext Access 13 Pages 2009
Exception handling refactorings: Directed by goals and driven by bug fixing Fulltext Access 13 Pages 2009
Advanced seamless vertical handoff architecture for WiMAX and WiFi heterogeneous networks with QoS guarantees Fulltext Access 13 Pages 2009
Increasing wide-area download throughputs on the roads by trunking multiple cellular channels over a vehicular ad hoc network Fulltext Access 13 Pages 2009
A novel adaptive fully-differential GM-C filter, tuneable with a CMOS fuzzy logic controller for automatic channel equalization after digital transmissions Fulltext Access 13 Pages 2009
Design of beam-forming networks using CORPS and evolutionary optimization Fulltext Access 13 Pages 2009
A comparison of centralized and distributed meta-scheduling architectures for computation and communication tasks in Grid networks Fulltext Access 13 Pages 2009
Advanced types of the sensitivity analysis in frequency and time domains Fulltext Access 13 Pages 2009
Locating congested segments over the Internet by clustering the delay performance of multiple paths Fulltext Access 13 Pages 2009
Using cross-layer metrics to improve the performance of end-to-end handover mechanisms Fulltext Access 13 Pages 2009
Quality of service through bandwidth reservation on multirate ad hoc wireless networks Fulltext Access 13 Pages 2009
Efficient spectrum utilization via cross-layer optimization in distributed cognitive radio networks Fulltext Access 13 Pages 2009
Exploiting spatial multiplexing and reuse in multi-antenna wireless ad hoc networks Fulltext Access 13 Pages 2009
A quality of service aware cross-layer approach for wireless ad hoc networks with smart antennas Fulltext Access 13 Pages 2009
E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks Fulltext Access 13 Pages 2009
SeRWA: A secure routing protocol against wormhole attacks in sensor networks Fulltext Access 13 Pages 2009
Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks Fulltext Access 13 Pages 2009
Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks Fulltext Access 13 Pages 2009
AVCOL: Availability-aware information aggregation in large distributed systems under uncollaborative behavior Fulltext Access 13 Pages 2009
Approximate transient analysis of large stochastic models with WinPEPSY-QNS Fulltext Access 13 Pages 2009
An analytic framework for performance modeling of software transactional memory Fulltext Access 13 Pages 2009
Operating point selection for primary and secondary users in cognitive radio networks Fulltext Access 13 Pages 2009
On the reliability of large-scale distributed systems – A topological view Fulltext Access 13 Pages 2009
ANEMA: Autonomic network management architecture to support self-configuration and self-optimization in IP networks Fulltext Access 13 Pages 2009
A modeling framework of content pollution in Peer-to-Peer video streaming systems Fulltext Access 13 Pages 2009
Three-dimensional and two-dimensional deployment analysis for underwater acoustic sensor networks Fulltext Access 13 Pages 2009
A novel gossip-based sensing coverage algorithm for dense wireless sensor networks Fulltext Access 13 Pages 2009
A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding Fulltext Access 13 Pages 2009
A per-application mobility management platform for application-specific handover decision in overlay networks Fulltext Access 13 Pages 2009
Threshold configuration and routing optimization for PCN-based resilient admission control Fulltext Access 13 Pages 2009
On the energy consumption of Pure and Slotted Aloha based RFID anti-collision protocols Fulltext Access 13 Pages 2009
Off-chip communication architectures for high throughput network processors Fulltext Access 13 Pages 2009
Fast and noniterative scheduling in input-queued switches: Supporting QoS Fulltext Access 13 Pages 2009
Analytical evaluation of average delay and maximum stable throughput along a typical two-way street for vehicular ad hoc networks in sparse situations Fulltext Access 13 Pages 2009