A structural neural system for mechanical, biological, and environmental systems Fulltext Access 14 Pages 2008
A cross-layer adaptive transmission scheme combined with SR-ARQ over correlated fading channels Fulltext Access 14 Pages 2008
An aspect-oriented approach for the systematic security hardening of code Fulltext Access 14 Pages 2008
Middleware for automatic dynamic reconfiguration of context-driven services Fulltext Access 14 Pages 2008
Early detection and bypassing of trivial operations to improve energy efficiency of processors Fulltext Access 14 Pages 2008
Modeling hard real-time systems considering inter-task relations, dynamic voltage scaling and overheads Fulltext Access 14 Pages 2008
SCPS: A self-configuring power-saving protocol for wireless ad hoc networks Fulltext Access 15 Pages 2008
TMCP: Two-layer multicast communication protocol for Bluetooth radio networks Fulltext Access 15 Pages 2008
On the interaction between localization and location verification for wireless sensor networks Fulltext Access 15 Pages 2008
Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies Fulltext Access 15 Pages 2008
An optimal GTS scheduling algorithm for time-sensitive transactions in IEEE 802.15.4 networks Fulltext Access 15 Pages 2008
A user-centric and context-aware solution to interface management and access network selection in heterogeneous wireless environments Fulltext Access 15 Pages 2008
QoS-aware distributed spectrum sharing for heterogeneous wireless cognitive networks Fulltext Access 15 Pages 2008
Optimal robust policies for bandwidth allocation and admission control in wireless networks Fulltext Access 15 Pages 2008
On hierarchical DHT systems – An analytical approach for optimal designs Fulltext Access 15 Pages 2008
Selection based resource allocation for decentralized multi-user communications Fulltext Access 15 Pages 2008
An effective location fingerprint model for wireless indoor localization Fulltext Access 15 Pages 2008
Using cross-system diversity in heterogeneous networks: Throughput optimization Fulltext Access 15 Pages 2008
An algebraic condition for product form in stochastic automata networks without synchronizations Fulltext Access 15 Pages 2008
Unicast-based fault-tolerant multicasting in wormhole-routed hypercubes Fulltext Access 15 Pages 2008
Performance modeling and analysis of heterogeneous meta-computing systems interconnection networks Fulltext Access 15 Pages 2008
A new adaptive digital audio watermarking based on support vector machine Fulltext Access 15 Pages 2008
Data aggregation in wireless sensor networks using ant colony algorithm Fulltext Access 15 Pages 2008
Performance comparisons of load balancing algorithms for I/O-intensive workloads on clusters Fulltext Access 15 Pages 2008
The service discovery methods issue: A web services UDDI specification framework integrated in a grid environment Fulltext Access 15 Pages 2008
CHESS: An application-aware space for enhanced scalable services in overlay networks Fulltext Access 15 Pages 2008
Performance of quasisynchronous scale time code division multiple access for AWGN channel Fulltext Access 15 Pages 2008
Design and evaluation of network reconfiguration protocols for mostly-off sensor networks Fulltext Access 15 Pages 2008
Adaptive audio streaming in mobile ad hoc networks using neural networks Fulltext Access 15 Pages 2008
An autonomous defense against SYN flooding attacks: Detect and throttle attacks at the victim side independently Fulltext Access 15 Pages 2008
An interference-aware fair scheduling for multicast in wireless mesh networks Fulltext Access 15 Pages 2008
A distributed fault identification protocol for wireless and mobile ad hoc networks Fulltext Access 15 Pages 2008
Performance model for IEEE 802.11s wireless mesh network deployment design Fulltext Access 15 Pages 2008
Efficient parallel implementation of iterative reconstruction algorithms for electron tomography Fulltext Access 15 Pages 2008
An optimistic checkpointing and message logging approach for consistent global checkpoint collection in distributed systems Fulltext Access 15 Pages 2008
Scheduling optimization in coupling independent services as a Grid transaction Fulltext Access 15 Pages 2008
Distributed probabilistic inferencing in sensor networks using variational approximation Fulltext Access 15 Pages 2008
Bulk power risk analysis: Ranking infrastructure elements according to their risk significance Fulltext Access 15 Pages 2008
Extending electronic sourcing theory: An exploratory study of electronic reverse auction outcomes Fulltext Access 15 Pages 2008
An open financial services architecture based on the use of intelligent mobile devices Fulltext Access 15 Pages 2008
Can the current generation of wireless mesh networks compete with cellular voice? Fulltext Access 15 Pages 2008
Proactive rearrangement in delay constrained dynamic membership multicast Fulltext Access 15 Pages 2008
Harmony search based algorithms for bandwidth-delay-constrained least-cost multicast routing Fulltext Access 15 Pages 2008
TCP friendly protocols for media streams over heterogeneous wired–wireless networks Fulltext Access 15 Pages 2008
Resilience of structured P2P systems under churn: The reachable component method Fulltext Access 15 Pages 2008
A framework of models for QoS-oriented adaptive deployment of multi-layer communication services in group cooperative activities Fulltext Access 15 Pages 2008
A survey on integrating MANETs with the Internet: Challenges and designs Fulltext Access 15 Pages 2008
Decentralized risk management for strategic preparedness of critical infrastructure through decomposition of the inoperability input–output model Fulltext Access 15 Pages 2008
A formal validation methodology for MANET routing protocols based on nodes’ self similarity Fulltext Access 15 Pages 2008
Processing of massive audit data streams for real-time anomaly intrusion detection Fulltext Access 15 Pages 2008
FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks Fulltext Access 15 Pages 2008
An adaptive medium access control protocol using m-ary tree algorithms for quality-of-service support in single-cell ad hoc networks Fulltext Access 15 Pages 2008
Secure probabilistic location verification in randomly deployed wireless sensor networks Fulltext Access 15 Pages 2008
Semantic-based discovery to support mobile context-aware service access Fulltext Access 15 Pages 2008
A study of different types of attacks on multicast in mobile ad hoc networks Fulltext Access 15 Pages 2008