Compositionality for Markov reward chains with fast and silent transitions Fulltext Access 18 Pages 2009
McPAD: A multiple classifier system for accurate payload-based anomaly detection Fulltext Access 18 Pages 2009
On the departure process of burst aggregation algorithms in optical burst switching Fulltext Access 18 Pages 2009
The impact of a realistic packet traffic model on the performance of surveillance wireless sensor networks Fulltext Access 18 Pages 2009
Guaranteed real-time communication in packet-switched networks with FCFS queuing Fulltext Access 18 Pages 2009
Fuzzy explicit marking: A unified congestion controller for Best-Effort and Diff-Serv networks Fulltext Access 18 Pages 2009
ChangeLedge: Change design and planning in networked systems based on reuse of knowledge and automation Fulltext Access 18 Pages 2009
An extended JADE-S based framework for developing secure Multi-Agent Systems Fulltext Access 18 Pages 2009
Reliability optimization of topology communication network design using an improved ant colony optimization Fulltext Access 18 Pages 2009
PENET: A practical method and tool for integrated modeling of security attacks and countermeasures Fulltext Access 18 Pages 2009
MediaBench II video: Expediting the next generation of video systems research Fulltext Access 18 Pages 2009
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility Fulltext Access 18 Pages 2009
Trend forecasting based on Singular Spectrum Analysis of traffic workload in a large-scale wireless LAN Fulltext Access 18 Pages 2009
Ontology-based modeling of dynamic ubiquitous computing applications as evolving activity spheres Fulltext Access 18 Pages 2009
Impact of queuing discipline on packet delivery latency in ad hoc networks Fulltext Access 18 Pages 2009
Unicast routing protocols for vehicular ad hoc networks: A critical comparison and classification Fulltext Access 18 Pages 2009
A multi-layer experimental study of multimedia and QoS communication in wireless mesh networks Fulltext Access 18 Pages 2009
The effect of hard and soft information and communication technologies investment on manufacturing business performance in Greece – A preliminary econometric study Fulltext Access 18 Pages 2009
Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks Fulltext Access 18 Pages 2009
Resource pool management: Reactive versus proactive or let’s be friends Fulltext Access 18 Pages 2009
Cluster head election techniques for coverage preservation in wireless sensor networks Fulltext Access 18 Pages 2009
Combining on-demand and opportunistic routing for intermittently connected networks Fulltext Access 18 Pages 2009
Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks Fulltext Access 18 Pages 2009
CRUST: Implementation of clustering and routing functions for mobile ad hoc networks using reactive tuple-spaces Fulltext Access 18 Pages 2009
Joint range assignment and routing to conserve energy in wireless ad hoc networks Fulltext Access 18 Pages 2009
Optimal placement and channel assignment of relay stations in heterogeneous wireless mesh networks by modified Bender’s decomposition Fulltext Access 18 Pages 2009
Zero config residential gateway experiences for next generation smart homes Fulltext Access 18 Pages 2009
Energy-efficient neighbor discovery protocol for mobile wireless sensor networks Fulltext Access 18 Pages 2009
Assessing the efficiency of resource allocations in bandwidth-sharing networks Fulltext Access 19 Pages 2009
Design, implementation, and evaluation of a Programmable Bandwidth Aggregation System for home networks Fulltext Access 19 Pages 2009
CROSS: A probabilistic constrained random sensor selection scheme in wireless sensor networks Fulltext Access 19 Pages 2009
A novel network mobility handoff scheme using SIP and SCTP for multimedia applications Fulltext Access 19 Pages 2009
Managing architectural decision models with dependency relations, integrity constraints, and production rules Fulltext Access 19 Pages 2009
Performance analysis of security aspects by weaving scenarios extracted from UML models Fulltext Access 19 Pages 2009
Queuing network models for delay analysis of multihop wireless ad hoc networks Fulltext Access 19 Pages 2009
uWave: Accelerometer-based personalized gesture recognition and its applications Fulltext Access 19 Pages 2009
Using group structures for efficient routing in delay tolerant networks Fulltext Access 19 Pages 2009
Analytical models for understanding misbehavior and MAC friendliness in CSMA networks Fulltext Access 19 Pages 2009
A framework for incremental construction of real global smart space applications Fulltext Access 19 Pages 2009
Broadband municipal optical networks in Greece: A suitable business model Fulltext Access 19 Pages 2009
Integration of sensing and computing in an intelligent decision support system for homeland security defense Fulltext Access 19 Pages 2009
Measurement-based optimal resource allocation for network services with pricing differentiation Fulltext Access 19 Pages 2009
A survey on physical layer impairments aware routing and wavelength assignment algorithms in optical networks Fulltext Access 19 Pages 2009
Dual purpose FWT domain spread spectrum image watermarking in real time Fulltext Access 19 Pages 2009
Performance analysis of IEEE 802.15.4 wireless sensor networks: An insight into the topology formation process Fulltext Access 19 Pages 2009
A new standard of on-line customer service process: Integrating language-action into blogs Fulltext Access 19 Pages 2009
Towards a general model of the multi-criteria workflow scheduling on the grid Fulltext Access 20 Pages 2009
Improving on-demand data access efficiency in MANETs with cooperative caching Fulltext Access 20 Pages 2009
A performance analysis of discrete-time tandem queues with Markovian sources Fulltext Access 20 Pages 2009
Reliable and energy-efficient data collection in sparse sensor networks with mobile elements Fulltext Access 20 Pages 2009
Markov Chain-based performance analysis of multihop IEEE 802.15.4 wireless networks Fulltext Access 20 Pages 2009
Optimal backpressure routing for wireless networks with multi-receiver diversity Fulltext Access 20 Pages 2009
Mobility-aware clustering algorithms with interference constraints in wireless mesh networks Fulltext Access 20 Pages 2009
Efficient application identification and the temporal and spatial stability of classification schema Fulltext Access 20 Pages 2009
Remote detection of bottleneck links using spectral and statistical methods Fulltext Access 20 Pages 2009
LIAD: Adaptive bandwidth prediction based Logarithmic Increase Adaptive Decrease for TCP congestion control in heterogeneous wireless networks Fulltext Access 20 Pages 2009
Analysis and scheduling of practical network coding in OFDMA relay networks Fulltext Access 20 Pages 2009
A real-time video watermarking system with buffer sharing for video-on-demand service Fulltext Access 20 Pages 2009
A distributed mobile database implementation on Pocket PC mobile devices communicating over Bluetooth Fulltext Access 20 Pages 2009
An overlapping communication protocol using improved time-slot leasing for Bluetooth WPANs Fulltext Access 20 Pages 2009
System-theoretical algorithmic solution to waiting times in semi-Markov queues Fulltext Access 20 Pages 2009
Throughput-oriented MAC for mobile ad hoc networks: A game-theoretic approach Fulltext Access 20 Pages 2009