Evaluating two ways of calculating priorities in requirements hierarchies – An experiment on hierarchical cumulative voting Fulltext Access 15 Pages 2009
Integrating knowledge flow mining and collaborative filtering to support document recommendation Fulltext Access 15 Pages 2009
Reengineering for service oriented architectures: A strategic decision model for integration versus migration Fulltext Access 15 Pages 2009
Tactics based approach for integrating non-functional requirements in object-oriented analysis and design Fulltext Access 15 Pages 2009
Specifying behavioral semantics of UML diagrams through graph transformations Fulltext Access 15 Pages 2009
Discovery of architectural layers and measurement of layering violations in source code Fulltext Access 15 Pages 2009
Mutation testing from probabilistic and stochastic finite state machines Fulltext Access 15 Pages 2009
The information security digital divide between information security managers and users Fulltext Access 15 Pages 2009
An optimal and processor efficient parallel sorting algorithm on a linear array with a reconfigurable pipelined bus system Fulltext Access 15 Pages 2009
Cognitive node selection and assignment algorithms for weighted cooperative sensing in radar systems Fulltext Access 15 Pages 2009
REFiLL: A lightweight programmable middleware platform for cost effective RFID application development Fulltext Access 15 Pages 2009
A user driven approach to develop a cognitive prosthetic to address the unmet needs of people with mild dementia Fulltext Access 15 Pages 2009
Packet delay analysis for multichannel communication systems with MSW-ARQ Fulltext Access 15 Pages 2009
Improved bounds for performability evaluation algorithms using state generation Fulltext Access 15 Pages 2009
Design and performance evaluation of throughput-aware rate adaptation protocols for IEEE 802.11 wireless networks Fulltext Access 15 Pages 2009
REDFLAG: A Run-timE, Distributed, Flexible, Lightweight, And Generic fault detection service for data-driven wireless sensor applications Fulltext Access 15 Pages 2009
A delegation-based approach for the unanticipated dynamic evolution of distributed objects Fulltext Access 15 Pages 2009
On the optimality of field-line routing in massively dense wireless multi-hop networks Fulltext Access 15 Pages 2009
Evaluating the optimal server allocation policy for clusters with on/off sources Fulltext Access 15 Pages 2009
Characterizing asynchronous variable latencies through probability distribution functions Fulltext Access 15 Pages 2009
Extending an embedded RISC microprocessor for efficient translation based Java execution Fulltext Access 15 Pages 2009
Dictionary-based program compression on customizable processor architectures Fulltext Access 15 Pages 2009
Empirical analysis of biometric technology adoption and acceptance in Botswana Fulltext Access 15 Pages 2009
Performance of commercial multimedia workloads on the Intel Pentium 4: A case study Fulltext Access 15 Pages 2009
Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system Fulltext Access 15 Pages 2009
A versatile Montgomery multiplier architecture with characteristic three support Fulltext Access 15 Pages 2009
Enhancing peer-to-peer content discovery techniques over mobile ad hoc networks Fulltext Access 15 Pages 2009
HOPNET: A hybrid ant colony optimization routing algorithm for mobile ad hoc network Fulltext Access 16 Pages 2009
RETRACTED: Worst case dimensioning and modeling of reliable real-time multihop wireless sensor network Fulltext Access 16 Pages 2009
TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks Fulltext Access 16 Pages 2009
Ambient intelligence platform using multi-agent system and mobile ubiquitous hardware Fulltext Access 16 Pages 2009
A cooperative approach for topology control in Wireless Sensor Networks Fulltext Access 16 Pages 2009
The MAP/PH/1/NMAP/PH/1/N queue with flows of customers as a model for traffic control in telecommunication networks Fulltext Access 16 Pages 2009
FEC recovery performance for video streaming services over wired-wireless networks Fulltext Access 16 Pages 2009
On submesh allocation for 2D mesh multicomputers using the free-list approach: Global placement schemes Fulltext Access 16 Pages 2009
Improving energy efficiency via probabilistic rate combination in 802.11 multi-rate wireless networks Fulltext Access 16 Pages 2009
A management scheme for improving transportation efficiency and contributing to the enhancement of the social fabric Fulltext Access 16 Pages 2009
EEDTC: Energy-efficient dominating tree construction in multi-hop wireless networks Fulltext Access 16 Pages 2009
Improving the QoS for information discovery in autonomic wireless sensor networks Fulltext Access 16 Pages 2009
Optimization of a lattice Boltzmann computation on state-of-the-art multicore platforms Fulltext Access 16 Pages 2009
Design and performance of speculative flow control for high-radix datacenter interconnect switches Fulltext Access 16 Pages 2009
Energy saving strategies for cooperative cache replacement in mobile ad hoc networks Fulltext Access 16 Pages 2009
Resource allocation on computational grids using a utility model and the knapsack problem Fulltext Access 16 Pages 2009
Practical architecture of a broadband sensing receiver for use in cognitive radio Fulltext Access 16 Pages 2009
Investigation of the M2/G2/1/∞,NM2/G2/1/∞,N queue with restricted admission of priority customers and its application to HSDPA mobile systems Fulltext Access 16 Pages 2009
Understanding the limitations of S/MIME digital signatures for e-mails: A GUI based approach Fulltext Access 16 Pages 2009
Role and channel assignments for wireless mesh networks using hybrid approach Fulltext Access 16 Pages 2009
Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks Fulltext Access 16 Pages 2009
Secure data aggregation in wireless sensor networks: A comprehensive overview Fulltext Access 16 Pages 2009
DTSMA: Distributed time-spread multiple access for wireless mesh networks with IEEE 802.16d MAC protocol Fulltext Access 16 Pages 2009
Providing early resource allocation during emergencies: The mobile triage tag Fulltext Access 16 Pages 2009
On the detection of signaling DoS attacks on 3G/WiMax wireless networks Fulltext Access 16 Pages 2009
Performance analysis of a cross-layer SSO mechanism for a roaming infrastructure Fulltext Access 16 Pages 2009
A novel path protection scheme for MPLS networks using multi-path routing Fulltext Access 16 Pages 2009
FAD and SPA: End-to-end link-level loss rate inference without infrastructure Fulltext Access 16 Pages 2009
An autonomic architecture for optimizing QoE in multimedia access networks Fulltext Access 16 Pages 2009
An analytical model of information dissemination for a gossip-based protocol Fulltext Access 16 Pages 2009
Stepwise fair-share buffering for gossip-based peer-to-peer data dissemination Fulltext Access 16 Pages 2009
Sandpiper: Black-box and gray-box resource management for virtual machines Fulltext Access 16 Pages 2009
An auto-responsive honeypot architecture for dynamic resource allocation and QoS adaptation in DDoS attacked networks Fulltext Access 16 Pages 2009
On-demand routing and channel assignment in multi-channel mobile ad hoc networks Fulltext Access 16 Pages 2009