Detecting artifact anomalies in business process specifications with a formal model Fulltext Access 20 Pages 2009
Exogenous coalition formation in the e-marketplace based on geographical proximity Fulltext Access 21 Pages 2009
Inter-domain policy violations in multi-hop overlay routes: Analysis and mitigation Fulltext Access 21 Pages 2009
Analysis of k-Neigh topology control protocol for mobile wireless networks Fulltext Access 21 Pages 2009
An incremental frequent structure mining framework for real-time alert correlation Fulltext Access 21 Pages 2009
A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems Fulltext Access 21 Pages 2009
Design and implementation of S-MARKS: A secure middleware for pervasive computing applications Fulltext Access 21 Pages 2009
Flexible coordinator design for modeling resource sharing in multi-agent systems Fulltext Access 21 Pages 2009
Efficient wireless reprogramming through reduced bandwidth usage and opportunistic sleeping Fulltext Access 21 Pages 2009
Querying sensor networks using ad hoc mobile devices: A two-layer networking approach Fulltext Access 21 Pages 2009
Automated adaptive on-line Multi-Layer Traffic Engineering through “tailoring” wavelength-paths in the Fragment Graph Fulltext Access 21 Pages 2009
Performance evaluation of a mesh-evolving quality-of-service-aware multicast routing protocol for mobile ad hoc networks Fulltext Access 21 Pages 2009
SafeMesh: A wireless mesh network routing protocol for incident area communications Fulltext Access 21 Pages 2009
Delay-based TCP congestion avoidance: A network calculus interpretation and performance improvements Fulltext Access 22 Pages 2009
High performance asynchronous design flow using a novel static performance analysis method Fulltext Access 22 Pages 2009
Technology standards-setting in the US wireless telecommunications industry: A study of three generations of digital standards development Fulltext Access 22 Pages 2009
Epidemic-based reliable and adaptive multicast for mobile ad hoc networks Fulltext Access 22 Pages 2009
A spam rejection scheme during SMTP sessions based on layer-3 e-mail classification Fulltext Access 22 Pages 2009
Identifying some important success factors in adopting agile software development practices Fulltext Access 22 Pages 2009
Frameworks for designing and implementing dependable systems using Coordinated Atomic Actions: A comparative study Fulltext Access 22 Pages 2009
A compound real option and AHP methodology for evaluating ICT business alternatives Fulltext Access 22 Pages 2009
Energy efficiency in wireless sensor networks using sleep mode TDMA scheduling Fulltext Access 22 Pages 2009
A belief-theoretic framework for the collaborative development and integration of para-consistent conceptual models Fulltext Access 23 Pages 2009
A hierarchical control protocol for group-oriented playbacks supported by content distribution networks Fulltext Access 23 Pages 2009
Adaptive color image watermarking based on a modified improved pixel-wise masking technique Fulltext Access 23 Pages 2009
Evaluation of physical carrier sense based spanner construction and maintenance as well as broadcast and convergecast in ad hoc networks Fulltext Access 23 Pages 2009
RETT-gen: A globally efficient routing protocol for wireless sensor networks by equalising sensor energy and avoiding energy holes Fulltext Access 23 Pages 2009
Exploring the design space of reliable multicast protocols for wireless mesh networks Fulltext Access 23 Pages 2009
Trends in the development of communication networks: Cognitive networks Fulltext Access 23 Pages 2009
A probabilistic constrained nonlinear optimization framework to optimize RED parameters Fulltext Access 24 Pages 2009
An energy-efficient, transport-controlled MAC protocol for wireless sensor networks Fulltext Access 24 Pages 2009
Performance evaluation of message-oriented middleware using the SPECjms2007 benchmark Fulltext Access 25 Pages 2009
Self-managing energy-efficient multicast support in MANETs under end-to-end reliability constraints Fulltext Access 25 Pages 2009
Performance analysis of non-preemptive GE/G/1 priority queueing of LER system with bulk arrivals Fulltext Access 26 Pages 2009
Data center evolution: A tutorial on state of the art, issues, and challenges Fulltext Access 27 Pages 2009
Resource management and task partitioning and scheduling on a run-time reconfigurable embedded system Fulltext Access 28 Pages 2009
Students’ thoughts about the importance and costs of their mobile devices’ features and services Fulltext Access 28 Pages 2009
Real-time available-bandwidth estimation using filtering and change detection Fulltext Access 29 Pages 2009
Mobility label based network: Hierarchical mobility management and packet forwarding architecture Fulltext Access 29 Pages 2009
QoS-enabled multicast for delivering live events in a Digital Cinema scenario Fulltext Access 31 Pages 2009
A novel method for progressive image transmission using blocked wavelets Fulltext Access 4 Pages 2008
New voltage-mode high-pass, band-pass and low-pass filter using DDCC and OTAs Fulltext Access 4 Pages 2008
Recovering erased digital evidence from CD-RW discs in a child exploitation investigation Fulltext Access 4 Pages 2008
Elimination of scan blindness in microstrip scanning array antennas using defected ground structure Fulltext Access 4 Pages 2008
Special issue: Modeling, testbeds, and applications in wireless mesh networks Fulltext Access 4 Pages 2008
Guest editors' introduction: Disruptive networking with peer-to-peer systems Fulltext Access 4 Pages 2008
Secure software development: Why the development world awoke to the challenge Fulltext Access 4 Pages 2008