Dynamic interval-based labeling scheme for efficient XML query and update processing Fulltext Access 15 Pages 2008
A relation-based method combining functional and structural testing for test case generation Fulltext Access 15 Pages 2008
An architectural approach to the correct and automatic assembly of evolving component-based systems Fulltext Access 15 Pages 2008
Exploiting synergies between semantic reasoning and personalization strategies in intelligent recommender systems: A case study Fulltext Access 15 Pages 2008
An adaptive in-network aggregation operator for query processing in wireless sensor networks Fulltext Access 15 Pages 2008
Design and implementation of an efficient web cluster with content-based request distribution and file caching Fulltext Access 15 Pages 2008
The effectiveness of software metrics in identifying error-prone classes in post-release software evolution process Fulltext Access 15 Pages 2008
Understanding emotions experienced when using a mobile phone in public: The social usability of mobile (cellular) telephones Fulltext Access 15 Pages 2008
A novel caching mechanism for peer-to-peer based media-on-demand streaming Fulltext Access 15 Pages 2008
Resource-efficient routing and scheduling of time-constrained streaming communication on networks-on-chip Fulltext Access 16 Pages 2008
Automatic, evolutionary test data generation for dynamic software testing Fulltext Access 16 Pages 2008
MUSEMBLE: A novel music retrieval system with automatic voice query transcription and reformulation Fulltext Access 16 Pages 2008
Early quality monitoring in the development of real-time reactive systems Fulltext Access 16 Pages 2008
A framework for QoS-aware binding and re-binding of composite web services Fulltext Access 16 Pages 2008
A framework for the design and verification of software measurement methods Fulltext Access 16 Pages 2008
Post-industrialism and Silicon Valley as models of industrial governance in Australian public policy Fulltext Access 16 Pages 2008
Nash equilibria in bandwidth allocation for non-cooperative peer-to-peer networks Fulltext Access 16 Pages 2008
Grade-of-service differentiated static resource allocation schemes in WDM networks Fulltext Access 16 Pages 2008
A CBK for Information Security and Critical Information and Communication Infrastructure Protection Fulltext Access 16 Pages 2008
Ring of Masters (ROM): A new ring structure for Bluetooth scatternets with dynamic routing and adaptive scheduling schemes Fulltext Access 16 Pages 2008
Iris recognition and the challenge of homeland and border control security in UAE Fulltext Access 16 Pages 2008
Efficient processing of acoustic signals for high-rate information transmission over sparse underwater channels Fulltext Access 16 Pages 2008
Dynamic filter merging and mergeability detection for publish/subscribe Fulltext Access 16 Pages 2008
A class of mean field interaction models for computer and communication systems Fulltext Access 16 Pages 2008
Understanding knowledge sharing activities in free/open source software projects: An empirical study Fulltext Access 16 Pages 2008
OCL2Trigger: Deriving active mechanisms for relational databases using Model-Driven Architecture Fulltext Access 16 Pages 2008
Mobile agent migration modeling and design for target tracking in wireless sensor networks Fulltext Access 16 Pages 2008
An efficient mobile multicast mechanism for fast handovers: A study from design and implementation in experimental networks Fulltext Access 16 Pages 2008
Design of rate-based controllers for active queue management in TCP/IP networks Fulltext Access 16 Pages 2008
Replication attack on random key pre-distribution schemes for wireless sensor networks Fulltext Access 16 Pages 2008
A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing Fulltext Access 16 Pages 2008
Organizational virtual zones: Control of Internet edges using multi-level flat identifiers Fulltext Access 16 Pages 2008
QoS routing in GMPLS-capable integrated IP/WDM networks with router cost constraints Fulltext Access 16 Pages 2008
Design and evaluation of a context-aware service deployment for collaborative sessions Fulltext Access 16 Pages 2008
Multiclass G/M/1 queueing system with self-similar input and non-preemptive priority Fulltext Access 16 Pages 2008
Network configuration for optimal utilization efficiency of wireless sensor networks Fulltext Access 16 Pages 2008
A QoS-driven approach for service-oriented device anycasting in ubiquitous environments Fulltext Access 16 Pages 2008
Balancing computation and communication costs: The case for hybrid execution in sensor networks Fulltext Access 16 Pages 2008
Increasing fairness and efficiency using the MadMac protocol in ad hoc networks Fulltext Access 16 Pages 2008
New reverse converters for the moduli set {2n-3,2n-1,2n+1,2n+3}{2n-3,2n-1,2n+1,2n+3} Fulltext Access 16 Pages 2008
Collaborative techniques for intrusion detection in mobile ad-hoc networks Fulltext Access 16 Pages 2008
Detection workload in a dynamic grid-based intrusion detection environment Fulltext Access 16 Pages 2008
A case for cooperative and incentive-based federation of distributed clusters Fulltext Access 16 Pages 2008
Dynamic proxy assisted mobility support for third generation peer-to-peer networks Fulltext Access 16 Pages 2008
On the design and implementation of a RISC processor extension for the KASUMI encryption algorithm Fulltext Access 16 Pages 2008
Industrial application of machine-in-the-loop-learning for a medical robot vision system – Concept and comprehensive field study Fulltext Access 16 Pages 2008
Secure and auditable agent-based e-marketplace framework for mobile users Fulltext Access 16 Pages 2008
Feasibility and infrastructural study of AR interfacing and intuitive simulation on 3D nonlinear systems Fulltext Access 16 Pages 2008
A framework for fast RFID tag reading in static and mobile environments Fulltext Access 16 Pages 2008
Connected K-target coverage problem in wireless sensor networks with different observation scenarios Fulltext Access 16 Pages 2008
Energy-aware node placement, topology control and MAC scheduling for wireless sensor networks Fulltext Access 16 Pages 2008
Logarithmic window increase for TCP Westwood+ for improvement in high speed, long distance networks Fulltext Access 16 Pages 2008
A versatile timing unit for traffic shaping, policing and charging in packet-switched networks Fulltext Access 16 Pages 2008
Load balancing for video streaming services in hierarchical wireless networks Fulltext Access 16 Pages 2008
Short-term non-uniform access in IEEE 802.11-compliant WLANs: A study on its impact on the saturation performance Fulltext Access 16 Pages 2008
Enhancing VoIP service for ubiquitous communication in a campus WLAN with partial coverage Fulltext Access 16 Pages 2008
Adaptive playout scheduling algorithm tailored for real-time packet-based voice conversations over wireless ad-hoc networks Fulltext Access 16 Pages 2008
Applying neural networks to performance estimation of embedded software Fulltext Access 17 Pages 2008
Mining software repositories for comprehensible software fault prediction models Fulltext Access 17 Pages 2008
Cronus: A platform for parallel code generation based on computational geometry methods Fulltext Access 17 Pages 2008