Selfishness, collusion and power of local search for the ADMs minimization problem Fulltext Access 11 Pages 2008
A new mathematical based QRS detector using continuous wavelet transform Fulltext Access 11 Pages 2008
Performance analysis of multi-service wireless network: An approach integrating CAC, scheduling, and buffer management Fulltext Access 11 Pages 2008
Investigating some special sequence lengths generated in an external exclusive-NOR type LFSR Fulltext Access 11 Pages 2008
Towards security requirements management for software product lines: A security domain requirements engineering process Fulltext Access 11 Pages 2008
Efficient, anonymous, and authenticated conference key setup in cellular wireless networks Fulltext Access 11 Pages 2008
A user-oriented ontology-based approach for network intrusion detection Fulltext Access 11 Pages 2008
Distributed approaches for impairment-aware routing and wavelength assignment algorithms in GMPLS networks Fulltext Access 11 Pages 2008
Location-based design for secure and efficient wireless sensor networks Fulltext Access 11 Pages 2008
A novel TCP with dynamic Burst-Contention Loss notification over OBS networks Fulltext Access 11 Pages 2008
Noise reduction in biomedical speech signal processing based on time and frequency Kalman filtering combined with spectral subtraction Fulltext Access 11 Pages 2008
Scalability study of cache access mechanisms in multiple-cell wireless networks Fulltext Access 11 Pages 2008
Dynamic duty cycle and adaptive contention window based QoS-MAC protocol for wireless multimedia sensor networks Fulltext Access 11 Pages 2008
A multi-path mechanism for reliable VoIP transmission over wireless networks Fulltext Access 11 Pages 2008
Expected quorum overlap sizes of quorum systems for asynchronous power-saving in mobile ad hoc networks Fulltext Access 11 Pages 2008
Dual home agent (DHA)-based location management scheme in integrated cellular–WLAN networks Fulltext Access 11 Pages 2008
Combating the bloated state problem in mobile agents based network monitoring applications Fulltext Access 11 Pages 2008
Suppression of stimulated Brillouin scattering in high-power single-frequency multicore fiber amplifiers Fulltext Access 11 Pages 2008
An M/G/1M/G/1 retrial queueing system with two phases of service subject to the server breakdown and repair Fulltext Access 11 Pages 2008
Binary power allocation for cognitive radio networks with centralized and distributed user selection strategies Fulltext Access 11 Pages 2008
Fine protection of data-paths in multi-layer networks based on the GMPLS paradigm Fulltext Access 11 Pages 2008
CHEETAH virtual label switching router for dynamic provisioning in IP optical networks Fulltext Access 11 Pages 2008
Motivations for using the mobile phone for mass communications and entertainment Fulltext Access 11 Pages 2008
A novel robust routing algorithm for multi-granularity connection requests in wavelength division multiplexing mesh networks Fulltext Access 11 Pages 2008
Fairness and throughput performance of infrastructure IEEE 802.11 networks with hidden-nodes Fulltext Access 11 Pages 2008
A non-competing hybrid optical burst switch architecture for QoS differentiation Fulltext Access 11 Pages 2008
Effects of Rayleigh backscattering in single-source bidirectional fiber-optic systems using different modulation formats for downstream and upstream transmission Fulltext Access 11 Pages 2008
Secure log management for privacy assurance in electronic communications Fulltext Access 11 Pages 2008
Split-ST-OFDM: Using split processing to improve the performance of space-time OFDM over digital TV channels Fulltext Access 11 Pages 2008
Performance evaluation of IEEE 802.11-based wireless LANs under finite-load conditions Fulltext Access 11 Pages 2008
A high performance algorithm for static task scheduling in heterogeneous distributed computing systems Fulltext Access 11 Pages 2008
Just-in-time dynamic voltage scaling: Exploiting inter-node slack to save energy in MPI programs Fulltext Access 11 Pages 2008
Improving routing in long-distance wireless mesh networks via a distributed embedded router Fulltext Access 11 Pages 2008
Comments on “Design and performance evaluation of load distribution strategies for multiple loads on heterogeneous linear daisy chain networks” Fulltext Access 11 Pages 2008
Dual decomposition method for optimal and fair congestion control in Ad Hoc networks: Algorithm, implementation and evaluation Fulltext Access 11 Pages 2008
Task scheduling algorithm using minimized duplications in homogeneous systems Fulltext Access 11 Pages 2008
Static heuristics for robust resource allocation of continuously executing applications Fulltext Access 11 Pages 2008
A performance study of general-purpose applications on graphics processors using CUDA Fulltext Access 11 Pages 2008
Fast parallel Particle-To-Grid interpolation for plasma PIC simulations on the GPU Fulltext Access 11 Pages 2008
Scheduling in a dynamic heterogeneous distributed system using estimation error Fulltext Access 11 Pages 2008
Proposing a new advanced control technique for micro hydro power plants Fulltext Access 11 Pages 2008
Pattern recognition based digital relaying for advanced series compensated line Fulltext Access 11 Pages 2008
Solving economic load dispatch problems in power systems using chaotic and Gaussian particle swarm optimization approaches Fulltext Access 11 Pages 2008
Simulation-based experimentation for designing reliable and efficient Web service orchestrations in supply chains Fulltext Access 11 Pages 2008
Rational fads in investor reactions to electronic commerce announcements: An explanation of the Internet bubble Fulltext Access 11 Pages 2008
Evaluating the trustworthiness of advice about seller agents in e-marketplaces: A personalized approach Fulltext Access 11 Pages 2008
Dynamic adaptation of CSMA/CA MAC protocol for wide area wireless mesh networks Fulltext Access 11 Pages 2008
A framework of cross-layer design for multiple video streams in wireless mesh networks Fulltext Access 11 Pages 2008
Implementing and evaluating three routing protocols in dual-radio-dual-mode IEEE 802.11(b) wireless mesh networks Fulltext Access 11 Pages 2008
Adaptive QoS provisioning by pricing incentive QoS routing for next generation networks Fulltext Access 11 Pages 2008
Effective hotspot storage management schemes in wireless sensor networks Fulltext Access 11 Pages 2008
The optimum sensor redeployment scheme using the most frangible clusters set Fulltext Access 11 Pages 2008
The handoff control scheme for computing powerless devices and its applications in the digital home network Fulltext Access 11 Pages 2008
An efficient session key generation for NTDR networks based on bilinear paring Fulltext Access 11 Pages 2008
CORA: Collaborative Opportunistic Recovery Algorithm for loss controlled, delay bounded ad hoc multicast Fulltext Access 11 Pages 2008
Balancing intrusion detection resources in ubiquitous computing networks Fulltext Access 11 Pages 2008
Cross-layer multiuser resource allocation for video communication over OFDM networks Fulltext Access 11 Pages 2008
High delivery rate position-based routing algorithms for 3D ad hoc networks Fulltext Access 11 Pages 2008