Scalable hardware implementing high-radix Montgomery multiplication algorithm Fulltext Access 10 Pages 2007
Fast hardware for modular exponentiation with efficient exponent pre-processing Fulltext Access 10 Pages 2007
A heuristic fault-tolerant routing algorithm in mesh using rectilinear-monotone polygonal fault blocks Fulltext Access 10 Pages 2007
Feasibility of decoupling memory management from the execution pipeline Fulltext Access 10 Pages 2007
Efficient control generation for mapping nested loop programs onto processor arrays Fulltext Access 10 Pages 2007
An FPGA implementation of a neural optimization of block truncation coding for image/video compression Fulltext Access 10 Pages 2007
Emergent standard of knowledge management: Hybrid peer-to-peer knowledge management Fulltext Access 10 Pages 2007
Functional similarities between computer worms and biological pathogens Fulltext Access 10 Pages 2007
A majority-voting based watermarking scheme for color image tamper detection and recovery Fulltext Access 10 Pages 2007
Towards a new standard for allowing concurrency and ensuring consistency in revision control systems Fulltext Access 10 Pages 2007
Neural-network-based approaches for software reliability estimation using dynamic weighted combinational models Fulltext Access 10 Pages 2007
Software development risk and project performance measurement: Evidence in Korea Fulltext Access 10 Pages 2007
Discrete-time performance analysis of a congestion control mechanism based on RED under multi-class bursty and correlated traffic Fulltext Access 10 Pages 2007
A software-based trust framework for distributed industrial management systems Fulltext Access 10 Pages 2007
The maintenance and evolution of resource-constrained embedded systems created using design patterns Fulltext Access 10 Pages 2007
The design and performance of component middleware for QoS-enabled deployment and configuration of DRE systems Fulltext Access 10 Pages 2007
Advanced hardware/software co-design on reconfigurable network-on-chip based hyper-platforms Fulltext Access 10 Pages 2007
Making every student a winner: The WinWin approach in software engineering education Fulltext Access 10 Pages 2007
Virtual knowledge service market—For effective knowledge flow within knowledge grid Fulltext Access 10 Pages 2007
Configurable implementation of parallel memory based real-time video downscaler Fulltext Access 10 Pages 2007
An analysis of distributed sensor data aggregation for network intrusion detection Fulltext Access 10 Pages 2007
A STATCOM based variable structure control for power system oscillations damping Fulltext Access 10 Pages 2007
Short term hydrothermal scheduling with bilateral transactions via bundle method Fulltext Access 10 Pages 2007
Parallel solution of Newton’s power flow equations on configurable chips Fulltext Access 10 Pages 2007
From access and integration to mining of secure genomic data sets across the Grid Fulltext Access 10 Pages 2007
Optimal task partition and distribution in grid service system with common cause failures Fulltext Access 10 Pages 2007
A modular meta-scheduling architecture for interfacing with pre-WS and WS Grid resource management services Fulltext Access 10 Pages 2007
3D depth estimation for visual inspection using wavelet transform modulus maxima Fulltext Access 10 Pages 2007
Using a multi-criteria decision making approach to evaluate mobile phone alternatives Fulltext Access 10 Pages 2007
A common criteria based security requirements engineering process for the development of secure information systems Fulltext Access 10 Pages 2007
Comparison of intelligent fuzzy based AGC coordinated PID controlled and PSS controlled AVR system Fulltext Access 11 Pages 2007
Evolutionary programming based optimal power flow and its validation for deregulated power system analysis Fulltext Access 11 Pages 2007
A Bayesian classifier for learning opponents’ preferences in multi-object automated negotiation Fulltext Access 11 Pages 2007
P–Q decoupled control schemes using fuzzy neural networks for the unified power flow controller Fulltext Access 11 Pages 2007
A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy Fulltext Access 11 Pages 2007
Application of pattern search method to power system valve-point economic load dispatch Fulltext Access 11 Pages 2007
Convenience and TAM in a ubiquitous computing environment: The case of wireless LAN Fulltext Access 11 Pages 2007
Intrusion detection aware component-based systems: A specification-based framework Fulltext Access 11 Pages 2007
NetPay: An off-line, decentralized micro-payment system for thin-client applications Fulltext Access 11 Pages 2007
Identifying and characterizing change-prone classes in two large-scale open-source products Fulltext Access 11 Pages 2007
WebTracer: A new web usability evaluation environment using gazing point information Fulltext Access 11 Pages 2007
A hierarchical key management scheme for secure group communications in mobile ad hoc networks Fulltext Access 11 Pages 2007
Modeling Internet firm survival using Bayesian dynamic models with time-varying coefficients Fulltext Access 11 Pages 2007
Robust codes and robust, fault-tolerant architectures of the Advanced Encryption Standard Fulltext Access 11 Pages 2007
Crosslayer firewall interaction as a means to provide effective and efficient protection at mobile devices Fulltext Access 11 Pages 2007
Cross-layer error-control with low-overhead ARQ for H.264 video transmission over wireless LANs Fulltext Access 11 Pages 2007
A system architecture for high-speed deep packet inspection in signature-based network intrusion prevention Fulltext Access 11 Pages 2007
Adaptive resource reservation schemes for proportional DiffServ enabled fourth-generation mobile communications system Fulltext Access 11 Pages 2007
Enhanced fault tolerant routing algorithms using a concept of “balanced ring” Fulltext Access 11 Pages 2007
Using the composite act frame technique to model ‘Rules of Origin’ knowledge representations in e-government services Fulltext Access 11 Pages 2007
Performance evaluation of scheduling in IEEE 802.16 based wireless mesh networks Fulltext Access 11 Pages 2007
An Interleaving Slotted-PolyHarmonic-Staircase Broadcasting Protocol for Near Video-on-Demand Services Fulltext Access 11 Pages 2007
Quality of service provision in combined input and crosspoint queued switches without output queueing match Fulltext Access 11 Pages 2007
Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce Fulltext Access 11 Pages 2007
A technique to compensate the specified flow deviation among control areas Fulltext Access 11 Pages 2007
Performance analysis of a novel architecture to integrate heterogeneous wireless systems Fulltext Access 11 Pages 2007
Multiplierless and fully pipelined JPEG compression soft IP targeting FPGAs Fulltext Access 11 Pages 2007
An accurate performance model of fully adaptive routing in wormhole-switched two-dimensional mesh multicomputers Fulltext Access 11 Pages 2007
Multi-band infinite impulse response filtering using microcontrollers for e-Monitoring applications Fulltext Access 11 Pages 2007
The impacts of price responsiveness on strategic equilibrium in competitive electricity markets Fulltext Access 11 Pages 2007
Executing large algorithms on low-capacity FPGAs using flowpath partitioning and runtime reconfiguration Fulltext Access 11 Pages 2007
An evolutionary programming based simulated annealing method for solving the unit commitment problem Fulltext Access 11 Pages 2007
GA application to optimization of AGC in three-area power system after deregulation Fulltext Access 11 Pages 2007