Probabilistic model checking for the quantification of DoS security threats Fulltext Access 16 Pages 2009
Autonomous mobile agent routing for efficient server resource allocation Fulltext Access 16 Pages 2009
Differentiated survivability with improved fairness in IP/MPLS-over-WDM optical networks Fulltext Access 16 Pages 2009
Achieving efficiency, quality of service and robustness in multi-organizational Grids Fulltext Access 16 Pages 2009
Dynamic Web Service discovery architecture based on a novel peer based overlay network Fulltext Access 16 Pages 2009
Algorithms and performance of load-balancing with multiple hash functions in massive content distribution Fulltext Access 16 Pages 2009
Spanning tree elevation protocol: Enhancing metro Ethernet performance and QoS Fulltext Access 16 Pages 2009
Data aggregation and routing in Wireless Sensor Networks: Optimal and heuristic algorithms Fulltext Access 16 Pages 2009
Maximizing the capacity of mobile cellular networks with heterogeneous traffic Fulltext Access 16 Pages 2009
Model-driven eGovernment interoperability: A review of the state of the art Fulltext Access 16 Pages 2009
User perceptions of security, convenience and usability for ebanking authentication tokens Fulltext Access 16 Pages 2009
DOM tree browsing of a very large XML document: Design and implementation Fulltext Access 16 Pages 2009
An accelerator design for speedup of Java execution in consumer mobile devices Fulltext Access 16 Pages 2009
Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms Fulltext Access 16 Pages 2009
Improving reliability of cooperative concurrent systems with exception flow analysis Fulltext Access 17 Pages 2009
Design pattern recovery through visual language parsing and source code analysis Fulltext Access 17 Pages 2009
A family of experiments to evaluate a functional size measurement procedure for Web applications Fulltext Access 17 Pages 2009
Combined person tracking and classification in a network of chemical sensors Fulltext Access 17 Pages 2009
Self-organization of unattended wireless acoustic sensor networks for ground target tracking Fulltext Access 17 Pages 2009
Signal propagation techniques for wireless underground communication networks Fulltext Access 17 Pages 2009
Adaptive state-based multi-radio multi-channel multi-path routing in Wireless Mesh Networks Fulltext Access 17 Pages 2009
Evidential fusion of sensor data for activity recognition in smart homes Fulltext Access 17 Pages 2009
A compressed sensing receiver for UWB impulse radio in bursty applications like wireless sensor networks Fulltext Access 17 Pages 2009
Admission control for differentiated services in future generation CDMA networks Fulltext Access 17 Pages 2009
A hybrid approach for content-based publish/subscribe in vehicular networks Fulltext Access 17 Pages 2009
Modeling the effect of node synchronization times in ultra-wideband wireless networks Fulltext Access 17 Pages 2009
Energy optimization for proactive unicast route maintenance in MANETs under end-to-end reliability requirements Fulltext Access 17 Pages 2009
Security extensions for integrity and confidentiality in embedded processors Fulltext Access 17 Pages 2009
Using aspect orientation in legacy environments for reverse engineering using dynamic analysis—An industrial experience report Fulltext Access 17 Pages 2009
An overhead and resource contention aware analytical model for overloaded Web servers Fulltext Access 17 Pages 2009
Selecting highly optimal architectural feature sets with Filtered Cartesian Flattening Fulltext Access 17 Pages 2009
Autonomic QoS control in enterprise Grid environments using online simulation Fulltext Access 17 Pages 2009
Achieving millennium development goals: Role of ICTS innovations in India Fulltext Access 17 Pages 2009
Case study on distributed and fault tolerant system modeling based on timed automata Fulltext Access 17 Pages 2009
Time-bounded distributed QoS-aware service configuration in heterogeneous cooperative environments Fulltext Access 17 Pages 2009
Policy-constrained bio-inspired processes for autonomic route management Fulltext Access 17 Pages 2009
Modelisation and validation of a full deterministic medium access method for IEEE 802.15.4 WPAN Fulltext Access 17 Pages 2009
Minimum disruption service composition and recovery in mobile ad hoc networks Fulltext Access 17 Pages 2009
Detecting and connecting disjoint sub-networks in wireless sensor and actor networks Fulltext Access 17 Pages 2009
Rappel: Exploiting interest and network locality to improve fairness in publish-subscribe systems Fulltext Access 17 Pages 2009
Optimal node-selection algorithm for parallel download in overlay content-distribution networks Fulltext Access 17 Pages 2009
Spatio-temporal thermal-aware job scheduling to minimize energy consumption in virtualized heterogeneous data centers Fulltext Access 17 Pages 2009
CDM-based design and performance evaluation of a robust AQM method for dynamic TCP/AQM networks Fulltext Access 17 Pages 2009
Public key cryptography based privacy preserving multi-context RFID infrastructure Fulltext Access 17 Pages 2009
Bio-inspired multi-agent data harvesting in a proactive urban monitoring environment Fulltext Access 17 Pages 2009
An 802.11e HCCA scheduler with an end-to-end quality aware territory method Fulltext Access 17 Pages 2009
Experimentation-oriented platform for development and evaluation of MANET cross-layer protocols Fulltext Access 17 Pages 2009
Providing true end-to-end security in converged voice over IP infrastructures Fulltext Access 17 Pages 2009
A survey of scheduling metrics and an improved ordering policy for list schedulers operating on workloads with dependencies and a wide variation in execution times Fulltext Access 17 Pages 2009
Classification of slice-based VBR video traffic and estimation of link loss by exceedance Fulltext Access 17 Pages 2009
Tunnel Hunter: Detecting application-layer tunnels with statistical fingerprinting Fulltext Access 17 Pages 2009
Self-∗ through self-learning: Overload control for distributed web systems Fulltext Access 17 Pages 2009
Impact of multiple channels and radios on the performance of a TDMA based wireless mesh network Fulltext Access 17 Pages 2009
Stochastic convex ordering for multiplicative decrease internet congestion control Fulltext Access 17 Pages 2009
Reducing query overhead through route learning in unstructured peer-to-peer network Fulltext Access 18 Pages 2009
An efficient bow-based on-demand QoS routing protocol for MIMO ad hoc networks Fulltext Access 18 Pages 2009
ERTP: Energy-efficient and Reliable Transport Protocol for data streaming in Wireless Sensor Networks Fulltext Access 18 Pages 2009
Component-based software version management based on a Component-Interface Dependency Matrix Fulltext Access 18 Pages 2009
Decentralized multi-dimensional alert correlation for collaborative intrusion detection Fulltext Access 18 Pages 2009
Adaptive disk scheduling with workload-dependent anticipation intervals Fulltext Access 18 Pages 2009
A lightweight web-based vulnerability scanner for small-scale computer network security assessment Fulltext Access 18 Pages 2009
Principles and performance analysis of SeCond: A system for epidemic peer-to-peer content distribution Fulltext Access 18 Pages 2009