Information security management: An information security retrieval and awareness model for industry Fulltext Access 8 Pages 2008
Fast and efficient routing algorithms for delay-bounded and dependable channels Fulltext Access 9 Pages 2008
Standardising business application security assessments with pattern-driven audit automations Fulltext Access 9 Pages 2008
Redesigning remote system administration paradigms for enhanced security and flexibility Fulltext Access 9 Pages 2008
A Ubiquitous wireless network architecture and its impact on optical networks Fulltext Access 9 Pages 2008
On the nominal capacity of multi-radio multi-channel wireless mesh networks Fulltext Access 9 Pages 2008
A localization protocol with adaptive power control in wireless sensor networks Fulltext Access 9 Pages 2008
Achieving proportional loss rate differentiation in a wireless network with a multi-state link Fulltext Access 9 Pages 2008
Optimization of logical rings for multi-hop transmissions in WDM optical star networks Fulltext Access 9 Pages 2008
A self-organizing group management middleware for mobile ad-hoc networks Fulltext Access 9 Pages 2008
Vertical dimensioning: A novel DRR implementation for efficient fair queueing Fulltext Access 9 Pages 2008
The internals of advanced interrupt handling techniques: Performance optimization of an embedded Linux network interface Fulltext Access 9 Pages 2008
Clustering strategies for improving the lifetime of two-tiered sensor networks Fulltext Access 9 Pages 2008
COMPASS – A tool for evaluation of compression strategies for embedded processors Fulltext Access 9 Pages 2008
40 Gb/s all-optical regeneration based on the pump depletion effect in fiber parametric amplification Fulltext Access 9 Pages 2008
An inhomogeneous theory for the analysis of an all-optical gain-stabilized multichannel erbium-doped fiber amplifier in the presence of ion pairs Fulltext Access 9 Pages 2008
Reconstruction of phase-shifted fiber Bragg grating parameters using genetic algorithm over thermally-modulated reflection intensity spectra Fulltext Access 9 Pages 2008
The application of spectral-amplitude-coding optical CDMA in passive optical networks Fulltext Access 9 Pages 2008
Information security management standards: Compliance, governance and risk management Fulltext Access 9 Pages 2008
In a ‘trusting’ environment, everyone is responsible for information security Fulltext Access 9 Pages 2008
An empirical investigation of the factors affecting the adoption of Instant Messaging in organizations Fulltext Access 9 Pages 2008
Improvement of keystroke data quality through artificial rhythms and cues Fulltext Access 9 Pages 2008
Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings Fulltext Access 9 Pages 2008
A generic application sharing architecture based on message-oriented middleware platform Fulltext Access 9 Pages 2008
Space-frequency-Doppler coded OFDM over the time-varying Doppler fading channels Fulltext Access 9 Pages 2008
Quasi-FIFO back-off scheme for collision resolution in wireless networks Fulltext Access 9 Pages 2008
Performance analysis of IEEE 802.11 ad hoc networks in the presence of exposed terminals Fulltext Access 9 Pages 2008
A singular-value decomposition-based image watermarking using genetic algorithm Fulltext Access 9 Pages 2008
Throughput enhancement with a modified 802.11 MAC protocol with multi-user detection support Fulltext Access 9 Pages 2008
A new analytical approach in modeling of multi-loop feed-forward linearized microwave power amplifiers Fulltext Access 9 Pages 2008
A robust prediction model using ANFIS based on recent TETRA outdoor RF measurements conducted in Riyadh city – Saudi Arabia Fulltext Access 9 Pages 2008
A pipelined-loop-compatible architecture and algorithm to reduce variable-length sets of floating-point data on a reconfigurable computer Fulltext Access 9 Pages 2008
Parallel computation of the eigenvalues of symmetric Toeplitz matrices through iterative methods Fulltext Access 9 Pages 2008
New upper and lower bounds line of sight path loss model for mobile propagation in buildings Fulltext Access 9 Pages 2008
A distributed approximation algorithm for the minimum degree minimum weight spanning trees Fulltext Access 9 Pages 2008
Secure multiobjective real and reactive power allocation of thermal power units Fulltext Access 9 Pages 2008
Stochastic combined heat and power dispatch based on multi-objective particle swarm optimization Fulltext Access 9 Pages 2008
A game-theoretic model for electricity markets with tight capacity constraints Fulltext Access 9 Pages 2008
Strategic bidding of generating units in competitive electricity market with considering their reliability Fulltext Access 9 Pages 2008
Optimal placement of capacitors in distribution systems using an immune multi-objective algorithm Fulltext Access 9 Pages 2008
Optimising power generation efficiency for head-sensitive cascaded reservoirs in a competitive electricity market Fulltext Access 9 Pages 2008
Enhanced merit order and augmented Lagrange Hopfield network for hydrothermal scheduling Fulltext Access 9 Pages 2008
Effects of wind energy supplied by independent power producers on the generation dispatch of electric power utilities Fulltext Access 9 Pages 2008
A hybrid open queuing network model approach for multi-threaded dataflow architecture Fulltext Access 9 Pages 2008
Analysis and placement of storage capacity in large distributed video servers Fulltext Access 9 Pages 2008
Molecule: An adaptive dynamic reconfiguration scheme for sensor operating systems Fulltext Access 9 Pages 2008
IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks Fulltext Access 9 Pages 2008
Source controlled semi-reliable multimedia streaming using selective retransmission in DCCP/IP networks Fulltext Access 9 Pages 2008
An efficient uplink mapping scheme for VoIP services in the IEEE 802.16e OFDMA system Fulltext Access 9 Pages 2008
Adaptive rate scheduling for 3G networks with shared resources using the generalized processor sharing performance model Fulltext Access 9 Pages 2008
Performance analysis of two throughput-based call admission control schemes for 3G WCDMA wireless networks supporting multiservices Fulltext Access 9 Pages 2008
Deadline missing predictor based on aperiodic server queue length for distributed systems Fulltext Access 9 Pages 2008
Distributed power control and random access for spectrum sharing with QoS constraint Fulltext Access 9 Pages 2008
Fair bandwidth sharing and delay differentiation: Joint packet scheduling with buffer management Fulltext Access 9 Pages 2008
Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing Fulltext Access 9 Pages 2008
A trust-based security system for ubiquitous and pervasive computing environments Fulltext Access 9 Pages 2008
Robust appearance-guided particle filter for object tracking with occlusion analysis Fulltext Access 9 Pages 2008
A modified 802.11-based MAC scheme to assure fair access for vehicle-to-roadside communications Fulltext Access 9 Pages 2008
Predictive handoff mechanism with real-time mobility tracking in a campus wide wireless network considering ITS Fulltext Access 9 Pages 2008