HW/SW co-design for public-key cryptosystems on the 8051 micro-controller Fulltext Access 9 Pages 2007
Comparative studies on authentication and key exchange methods for 802.11 wireless LAN Fulltext Access 9 Pages 2007
Proxy-protected signature secure against the undelegated proxy signature attack Fulltext Access 9 Pages 2007
A study on decision consolidation methods using analytic models for security systems Fulltext Access 9 Pages 2007
Key reduction of a Chinese phonetic input method by minimizing message ambiguity Fulltext Access 9 Pages 2007
NDIS-based virtual polling algorithm for IEEE 802.11b for guaranteeing the real-time requirements Fulltext Access 9 Pages 2007
Adaptive pre-task assignment scheduling strategy for heterogeneous distributed raytracing system Fulltext Access 9 Pages 2007
Turbo equalization for block fading MIMO channels using random signal mapping Fulltext Access 9 Pages 2007
An active learning based TCM-KNN algorithm for supervised network intrusion detection Fulltext Access 9 Pages 2007
Evaluation of service management algorithms in a distributed web search system Fulltext Access 9 Pages 2007
Verification and conformance test generation of communication protocol for railway signaling systems Fulltext Access 9 Pages 2007
Validating the external quality subcharacteristics of software products according to ISO/IEC 9126 Fulltext Access 9 Pages 2007
Comparing the task effectiveness of instant messaging and electronic mail for geographically dispersed teams in Taiwan Fulltext Access 9 Pages 2007
Secure many-to-one symbol transmission for implementation on smart cards Fulltext Access 9 Pages 2007
Seventh-order elliptic video filter with 0.1 dB pass band ripple employing CMOS CDTAs Fulltext Access 9 Pages 2007
Parameterized floating-point logarithm and exponential functions for FPGAs Fulltext Access 9 Pages 2007
An empirical analysis of risk components and performance on software projects Fulltext Access 9 Pages 2007
Managing requirements for a US$1bn IT-based business transformation: New approaches and challenges Fulltext Access 9 Pages 2007
Early quality prediction of component-based systems – A generic framework Fulltext Access 9 Pages 2007
An empirical study of the bad smells and class error probability in the post-release object-oriented system evolution Fulltext Access 9 Pages 2007
Two novel shared-clock scheduling algorithms for use with ‘Controller Area Network’ and related protocols Fulltext Access 9 Pages 2007
Supporting multiple-input, multiple-output custom functions in configurable processors Fulltext Access 9 Pages 2007
Massive threading: Using GPUs to increase the performance of digital forensics tools Fulltext Access 9 Pages 2007
Biologically-inspired Complex Adaptive Systems approaches to Network Intrusion Detection Fulltext Access 9 Pages 2007
Evaluating information security tradeoffs: Restricting access can interfere with user tasks Fulltext Access 9 Pages 2007
A particle-swarm-based approach of power system stability enhancement with unified power flow controller Fulltext Access 9 Pages 2007
Integrative Biology — the challenges of developing a collaborative research environment for heart and cancer modelling Fulltext Access 9 Pages 2007
GEMMA — A Grid environment for microarray management and analysis in bone marrow stem cells experiments Fulltext Access 9 Pages 2007
Peer-to-Peer and fault-tolerance: Towards deployment-based technical services Fulltext Access 9 Pages 2007
Resource trading using cognitive agents: A hybrid perspective and its simulation Fulltext Access 9 Pages 2007
A novel distance protection scheme using time-frequency analysis and pattern recognition approach Fulltext Access 9 Pages 2007
Adaptive Prony method for waveform distortion detection in power systems Fulltext Access 9 Pages 2007
A new approach for the design of electric power system software using object oriented modeling Fulltext Access 9 Pages 2007
Power system stability reinforcement based on network expansion: A practical case Fulltext Access 9 Pages 2007
Identification of the vulnerable transmission segment and cluster of critical machines using line transient potential energy Fulltext Access 9 Pages 2007
Extremely short term frequency estimation (ESTFE) algorithm for underfrequency protection Fulltext Access 9 Pages 2007
Automatic generation control of an interconnected hydrothermal power system considering superconducting magnetic energy storage Fulltext Access 9 Pages 2007
Transient stabilization of structure preserving power systems with excitation control via energy-shaping Fulltext Access 9 Pages 2007
Quality of service based resource allocation for scheduled lightpath demands Fulltext Access 9 Pages 2007
Performance evaluation of RSVP extensions for a guaranteed delivery scenario Fulltext Access 9 Pages 2007
An adaptive packet scheduling algorithm for efficient downlink bandwidth allocation in UWB based wireless infrastructure networks Fulltext Access 9 Pages 2007
Reduced-complexity simulation of the effect of non-stationary interference on DMT-based DSL systems Fulltext Access 9 Pages 2007
Optimization of a fractional-N frequency synthesizer for UMTS application with a VHDL-AMS description Fulltext Access 9 Pages 2007
Modeling and analysis of a nonlinear fully distributed FET using FDTD technique Fulltext Access 9 Pages 2007
DIP-MIP: Distributed individual paging extension for mobile IP in IP-based cellular networks Fulltext Access 9 Pages 2007
Efficient ARQ protocols for exploiting cooperative relaying in wireless sensor networks Fulltext Access 9 Pages 2007
A Delaunay Triangulation based method for wireless sensor network deployment Fulltext Access 9 Pages 2007
An efficient routing scheme with optimal power control in wireless multi-hop sensor networks Fulltext Access 9 Pages 2007
Using event detection latency to evaluate the coverage of a wireless sensor network Fulltext Access 9 Pages 2007
A novel channel assignment scheme for improving channel reuse efficiency in multi-channel ad hoc wireless networks Fulltext Access 9 Pages 2007
An autonomic tool for building self-organizing Grid-enabled applications Fulltext Access 9 Pages 2007
Definition, modelling and simulation of a grid computing scheduling system for high throughput computing Fulltext Access 9 Pages 2007
StReD: A quality of security framework for storage resources in Data Grids Fulltext Access 9 Pages 2007