An efficient cluster-based multi-channel management protocol for wireless Ad Hoc networks Fulltext Access 12 Pages 2007
Bridging the gap between general management and technicians – A case study on ICT security in a developing country Fulltext Access 12 Pages 2007
An agent based and biological inspired real-time intrusion detection and security model for computer network operations Fulltext Access 12 Pages 2007
Improving search efficiency using Bloom filters in partially connected ad hoc networks: A node-centric analysis Fulltext Access 12 Pages 2007
Evaluation of the effect of SSL overhead in the performance of e-business servers operating in B2B scenarios Fulltext Access 12 Pages 2007
Study of signaling effects on Dynamic Traffic Grooming in IP/MPLS over WDM network Fulltext Access 12 Pages 2007
On the efficient and fast response for sensor deployment in sparse wireless sensor networks Fulltext Access 12 Pages 2007
A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers Fulltext Access 12 Pages 2007
The convergence of mobile data phones, consumer electronics, and wallets: Lessons from Japan Fulltext Access 12 Pages 2007
A low overhead dynamic route repairing mechanism for mobile ad hoc networks Fulltext Access 12 Pages 2007
Dual-wrapped digital watermarking scheme for image copyright protection Fulltext Access 12 Pages 2007
Timed verification of hierarchical communicating real-time state machines Fulltext Access 12 Pages 2007
XML and WML integration: An analysis and strategies for implementation to meet mobile commerce challenges Fulltext Access 12 Pages 2007
Changing user roles in ICT developments; the case of digital television Fulltext Access 12 Pages 2007
Analysis of a nonpreemptive priority queue with exponential timer and server vacations Fulltext Access 12 Pages 2007
Performance evaluation of the augmented data vortex switch fabric: An all-optical packet switched interconnection network Fulltext Access 12 Pages 2007
Optical CDMA network codecs with merged-M-coded wavelength-hopping and prime-coded time-spreading Fulltext Access 12 Pages 2007
Polling models with renewal arrivals: A new method to derive heavy-traffic asymptotics Fulltext Access 12 Pages 2007
A multiaccess tree algorithm with free access, interference cancellation and single signal memory requirements Fulltext Access 12 Pages 2007
The impact that placing email addresses on the Internet has on the receipt of spam: An empirical analysis Fulltext Access 12 Pages 2007
Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities Fulltext Access 12 Pages 2007
FH-RSVP scheme for intra-site handover in hierarchical mobile IPv6 networks Fulltext Access 12 Pages 2007
A performance comparison of mobility anchor point selection schemes in Hierarchical Mobile IPv6 networks Fulltext Access 13 Pages 2007
Extending equation-based congestion control to high-speed and long-distance networks Fulltext Access 13 Pages 2007
Rapid implementation and optimisation of DSP systems on FPGA-centric heterogeneous platforms Fulltext Access 13 Pages 2007
Efficient segment-based video transcoding proxy for mobile multimedia services Fulltext Access 13 Pages 2007
Hamming weight pyramid – A new insight into canonical signed digit representation and its applications Fulltext Access 13 Pages 2007
An HMM-based call admission control policy for supporting QoS in wireless cellular networks Fulltext Access 13 Pages 2007
A privacy-preserving clustering approach toward secure and effective data analysis for business collaboration Fulltext Access 13 Pages 2007
QoS multicast routing by using multiple paths/trees in wireless ad hoc networks Fulltext Access 13 Pages 2007
A refinement-tree based partitioning method for dynamic load balancing with adaptively refined grids Fulltext Access 13 Pages 2007
Parallelisation of genetic algorithms for the 2-page crossing number problem Fulltext Access 13 Pages 2007
Speedup and scalability analysis of Master–Slave applications on large heterogeneous clusters Fulltext Access 13 Pages 2007
A distributed integrated request processing algorithm for QoS assurance in large-scale media-based systems Fulltext Access 13 Pages 2007
Bio-STEER: A Semantic Web workflow tool for Grid computing in the life sciences Fulltext Access 13 Pages 2007
A layered workflow knowledge Grid/P2P architecture and its models for future generation workflow systems Fulltext Access 13 Pages 2007
Efficient Hierarchical Parallel Genetic Algorithms using Grid computing Fulltext Access 13 Pages 2007
Provision of financial transmission rights including assessment of maximum volumes of obligations and options Fulltext Access 13 Pages 2007
Dynamic load modeling of an Egyptian primary distribution system using neural networks Fulltext Access 13 Pages 2007
Intelligent power management strategy of hybrid distributed generation system Fulltext Access 13 Pages 2007
Preattentive processing of banner advertisements: The role of modality, location, and interference Fulltext Access 13 Pages 2007
Procurement models in the agricultural supply chain: A case study of online coffee auctions in India Fulltext Access 13 Pages 2007
GridJet: An underlying data-transporting protocol for accelerating Web communications Fulltext Access 13 Pages 2007
On the peninsula phenomenon in web graph and its implications on web search Fulltext Access 13 Pages 2007
Test generation for interaction detection in feature-rich communication systems Fulltext Access 13 Pages 2007
Capacity analysis and MAC enhancement for UWB broadband wireless access networks Fulltext Access 13 Pages 2007
Algorithm for equalization of cluster lifetimes in a multi-level Beacon enabled 802.15.4 sensor network Fulltext Access 13 Pages 2007
A vulnerabilities analysis and corresponding middleware security extensions for securing NGN applications Fulltext Access 13 Pages 2007
Linear time distributed construction of colored trees for disjoint multipath routing Fulltext Access 13 Pages 2007
A cellular multi-objective genetic algorithm for optimal broadcasting strategy in metropolitan MANETs Fulltext Access 13 Pages 2007
On the cross-layer interactions between congestion and contention in wireless sensor and actor networks Fulltext Access 13 Pages 2007
A MAC/Routing cross-layer approach to geographic forwarding in wireless sensor networks Fulltext Access 13 Pages 2007
Threshold cryptography in mobile ad hoc networks under minimal topology and setup assumptions Fulltext Access 13 Pages 2007