High-performance computing of 1/xiandexp(±xi) for a vector of inputs xixi on Alpha and IA-64 CPUs Fulltext Access 13 Pages 2008
A product-line architecture for web service-based visual composition of web applications Fulltext Access 13 Pages 2008
XML-based agent communication, migration and computation in mobile agent systems Fulltext Access 13 Pages 2008
Recursive protocol for group-oriented authentication with key distribution Fulltext Access 13 Pages 2008
An efficient algorithm for mining temporal high utility itemsets from data streams Fulltext Access 13 Pages 2008
The consistency among facilitating factors and ERP implementation success: A holistic view of fit Fulltext Access 13 Pages 2008
Information security awareness in higher education: An exploratory study Fulltext Access 13 Pages 2008
Cost-driven repair optimization of reconfigurable nanowire crossbar systems with clustered defects Fulltext Access 13 Pages 2008
SAM-MAC: An efficient channel assignment scheme for multi-channel ad hoc networks Fulltext Access 13 Pages 2008
Binary integer programming formulation and heuristics for differentiated coverage in heterogeneous sensor networks Fulltext Access 13 Pages 2008
OVSF code assignment strategies with minimal fragmentations for WCDMA systems Fulltext Access 13 Pages 2008
Cooperative mobile-to-mobile file dissemination in cellular networks within a unified radio interface Fulltext Access 13 Pages 2008
Improving TCP performance in heterogeneous mobile environments by exploiting the explicit cooperation between server and mobile host Fulltext Access 13 Pages 2008
Performance modelling of pipelined circuit switching in hypercubes with hot spot traffic Fulltext Access 13 Pages 2008
Internet-based ‘social sharing’ as a new form of global production: The case of SETI@home Fulltext Access 13 Pages 2008
LL-MAC: A low latency MAC protocol for wireless self-organised networks Fulltext Access 13 Pages 2008
XMobile: A MB-UID environment for semi-automatic generation of adaptive applications for mobile devices Fulltext Access 13 Pages 2008
Under storage constraints of epidemic backup node selection using HyMIS architecture for data replication in mobile peer-to-peer networks Fulltext Access 13 Pages 2008
Investigating software process in practice: A grounded theory perspective Fulltext Access 13 Pages 2008
Measuring where it matters: Determining starting points for metrics collection Fulltext Access 13 Pages 2008
Facilitating software extension with design patterns and Aspect-Oriented Programming Fulltext Access 13 Pages 2008
Benchmarking temporal database models with interval-based and temporal element-based timestamping Fulltext Access 13 Pages 2008
Optimal load distribution in nondedicated heterogeneous cluster and grid computing environments Fulltext Access 13 Pages 2008
Mixed hierarchical-functional fault models for targeting sequential cores Fulltext Access 13 Pages 2008
Designing efficient irregular networks for heterogeneous systems-on-chip Fulltext Access 13 Pages 2008
Memory hierarchy performance measurement of commercial dual-core desktop processors Fulltext Access 13 Pages 2008
Uncoded optimal binary communication for sources with memory using the Burrows Wheeler Transform Fulltext Access 13 Pages 2008
Moving toward end-to-end support for handoffs across heterogeneous telephony systems on dual-mode mobile devices Fulltext Access 13 Pages 2008
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense Fulltext Access 13 Pages 2008
Functional reputation based reliable data aggregation and transmission for wireless sensor networks Fulltext Access 13 Pages 2008
A trust-based secure service discovery (TSSD) model for pervasive computing Fulltext Access 13 Pages 2008
Quick convergecast in ZigBee beacon-enabled tree-based wireless sensor networks Fulltext Access 13 Pages 2008
A joint selfish routing and channel assignment game in wireless mesh networks Fulltext Access 13 Pages 2008
Multicast overlay spanning trees in ad hoc networks: Capacity bounds, protocol design and performance evaluation Fulltext Access 13 Pages 2008
Joint bandwidth allocation, element assignment and scheduling for wireless mesh networks with MIMO links Fulltext Access 13 Pages 2008
Efficient implementation of tunable ladder filters using multi-output current controlled conveyors Fulltext Access 13 Pages 2008
Cross-layer rate control, medium access control and routing design in cooperative VANET Fulltext Access 13 Pages 2008
A mechanism to enforce privacy in vehicle-to-infrastructure communication Fulltext Access 13 Pages 2008
SIGMCC: A system for sharing meta patient records in a Peer-to-Peer environment Fulltext Access 13 Pages 2008
RCT: A distributed tree for supporting efficient range and multi-attribute queries in grid computing Fulltext Access 13 Pages 2008
A content-based load balancing algorithm with admission control for cluster web servers Fulltext Access 13 Pages 2008
Consideration of multiple uncertainties for evaluation of available transfer capability using fuzzy continuation power flow Fulltext Access 13 Pages 2008
Hierarchical algorithms of functional modelling for solution of optimal operation problems in electrical power systems Fulltext Access 13 Pages 2008
Online consumer-to-consumer market in China – A comparative study of Taobao and eBay Fulltext Access 13 Pages 2008
Experiences in developing a fair-exchange e-commerce protocol using common off-the-shelf components Fulltext Access 13 Pages 2008
An end-to-end prototyping framework for compliant wireless LAN transceivers with smart antennas Fulltext Access 13 Pages 2008
Mobility label based network: Mobility support in label switched networks with multi-protocol BGP Fulltext Access 13 Pages 2008
An approach to the identification of network elements composing heterogeneous end-to-end paths Fulltext Access 13 Pages 2008
Interworking of heterogeneous access networks and QoS provisioning via IP multimedia core networks Fulltext Access 13 Pages 2008
On applying fair queuing discipline to schedule requests at access gateway for downlink differential QoS Fulltext Access 13 Pages 2008
Classification of access network types: Ethernet, wireless LAN, ADSL, cable modem or dialup? Fulltext Access 13 Pages 2008
SecureStream: An intrusion-tolerant protocol for live-streaming dissemination Fulltext Access 13 Pages 2008
Location API 2.0 for J2ME – A new standard in location for Java-enabled mobile phones Fulltext Access 13 Pages 2008
The PoSIM middleware for translucent and context-aware integrated management of heterogeneous positioning systems Fulltext Access 13 Pages 2008
End-to-end performance aware association mechanism for wireless municipal mesh networks Fulltext Access 13 Pages 2008
eWOM overload and its effect on consumer behavioral intention depending on consumer involvement Fulltext Access 13 Pages 2008
On the feasibility of IEEE 802.11 multi-channel multi-hop mesh networks Fulltext Access 13 Pages 2008
Adaptive hierarchical polling and Markov decision process based CAC for increasing network reward and reducing average delay in IEEE 802.16 WiMAX networks Fulltext Access 13 Pages 2008
Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks Fulltext Access 13 Pages 2008
CollECT: Collaborative event detection and tracking in wireless heterogeneous sensor networks Fulltext Access 13 Pages 2008
A real-time routing protocol with load distribution in wireless sensor networks Fulltext Access 14 Pages 2008
Design of a low power and low latency MAC protocol with node grouping and transmission pipelining in wireless sensor networks Fulltext Access 14 Pages 2008