Efficient verifier-based password-authenticated key exchange in the three-party setting Fulltext Access 8 Pages 2007
Intrusion detection using text processing techniques with a kernel based similarity measure Fulltext Access 8 Pages 2007
Authentication in a layered security approach for mobile ad hoc networks Fulltext Access 8 Pages 2007
Value-focused assessment of ICT security awareness in an academic environment Fulltext Access 8 Pages 2007
Probabilistic analysis of an algorithm to compute TCP packet round-trip time for intrusion detection Fulltext Access 8 Pages 2007
Measures of retaining digital evidence to prosecute computer-based cyber-crimes Fulltext Access 8 Pages 2007
Performance analysis of IEEE 802.11 ad hoc networks in the presence of hidden terminals Fulltext Access 8 Pages 2007
Coordinated interaction using reliable broadcast in mobile wireless networks Fulltext Access 8 Pages 2007
Energy-aware location error handling for object tracking applications in wireless sensor networks Fulltext Access 8 Pages 2007
Analytical modeling of a time-threshold based bandwidth allocation scheme for cellular networks Fulltext Access 8 Pages 2007
Inconsistency of expert judgment-based estimates of software development effort Fulltext Access 8 Pages 2007
Efficiency study of the information flow mechanism enabling interworking of heterogeneous wireless systems Fulltext Access 8 Pages 2007
Common defects in information security management system of Korean companies Fulltext Access 8 Pages 2007
Verification of instrumentation techniques for resource management of real-time systems Fulltext Access 8 Pages 2007
Feedback control-based dynamic resource management in distributed real-time systems Fulltext Access 8 Pages 2007
Reflections on 10 years of sponsored senior design projects: Students win–clients win! Fulltext Access 8 Pages 2007
Implementation methods of repetitive sampling on an OTDR for alignment of ghost reflection in short-period measurement with a short-length fiber Fulltext Access 8 Pages 2007
Low complexity radix-4 butterfly design for the soft-decision Viterbi decoder Fulltext Access 8 Pages 2007
The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection Fulltext Access 8 Pages 2007
On minimizing the number of ADMs—Tight bounds for an algorithm without preprocessing Fulltext Access 8 Pages 2007
Fisheye zone routing protocol: A multi-level zone routing protocol for mobile ad hoc networks Fulltext Access 8 Pages 2007
Fixed collision rate back-off scheme for collision resolution in wireless networks Fulltext Access 8 Pages 2007
A cross-layer transmission scheduling scheme for wireless sensor networks Fulltext Access 8 Pages 2007
Adaptive clustering in wireless sensor networks by mining sensor energy data Fulltext Access 8 Pages 2007
Cross-layer modeling of capacity in wireless networks: Application to UMTS/HSDPA, IEEE802.11 WLAN and IEEE802.16 WiMAX Fulltext Access 8 Pages 2007
Deployable multipath communication scheme with sufficient performance data distribution method Fulltext Access 8 Pages 2007
A structured hierarchical P2P model based on a rigorous binary tree code algorithm Fulltext Access 8 Pages 2007
Distributed data mining on Agent Grid: Issues, platform and development toolkit Fulltext Access 8 Pages 2007
Analytical array polynomial method for linear antenna arrays with phase-only control Fulltext Access 8 Pages 2007
A versatile signal flow graph realization of a general transfer function by using CDBA Fulltext Access 8 Pages 2007
Multiuser detection of time-hopping PPM UWB system in the presence of multipath fading Fulltext Access 8 Pages 2007
LSSP: A novel local segment-shared protection for multi-domain optical mesh networks Fulltext Access 8 Pages 2007
Analytical model for authentication transmission overhead between entities in mobile networks Fulltext Access 8 Pages 2007
Comparison of three different architectures for active resistive memories Fulltext Access 8 Pages 2007
A scalability comparison of GST and SST MANET multicast routing algorithms Fulltext Access 8 Pages 2007
Priority-enabled optical shared protection: An online efficiency evaluation study Fulltext Access 8 Pages 2007
Modeling of streaming and elastic flow integration in OFDMA-based IEEE802.16 WiMAX Fulltext Access 8 Pages 2007
Truly random number generators based on a non-autonomous chaotic oscillator Fulltext Access 8 Pages 2007
An objective-oriented service model for VoIP overlay networks over DiffServ/MPLS networks Fulltext Access 8 Pages 2007
Performance evaluation of minimum interference routing in network scenarios with protection requirements Fulltext Access 8 Pages 2007
Using neighborhood-pixels-information and ANFIS for impulsive noise suppression Fulltext Access 8 Pages 2007
Generating homogeneous magnetostatic field inside prolate and oblate ellipsoidal coil Fulltext Access 8 Pages 2007
Threshold password authentication against guessing attacks in Ad hoc networks Fulltext Access 9 Pages 2007
Loss behavior in space priority queue with batch Markovian arrival process — continuous-time case Fulltext Access 9 Pages 2007
Power and dispersion constrained optimization of optical links with unequally-spaced repeater modules Fulltext Access 9 Pages 2007
Performance analysis of modified prime-hop codes for OCDMA systems with multiuser detectors Fulltext Access 9 Pages 2007
Cross-phase modulation induced modulation instability in single-mode optical fibers with saturable nonlinearity Fulltext Access 9 Pages 2007