Using a Stochastic Well-formed Net model for assessing a decentralized approach to configuration management Fulltext Access 18 Pages 2007
An analytic model of TCP performance over multi-hop wireless links with correlated channel fading Fulltext Access 18 Pages 2007
The semipublic encryption for visual cryptography using Q’tron neural networks Fulltext Access 18 Pages 2007
A novel recursive shared segment protection algorithm in survivable WDM networks Fulltext Access 18 Pages 2007
Hardware support for adaptive tessellation of Bézier surfaces based on local tests Fulltext Access 18 Pages 2007
Efficient design space exploration for application specific systems-on-a-chip Fulltext Access 18 Pages 2007
On efficient implementation of FPGA-based hyperelliptic curve cryptosystems Fulltext Access 18 Pages 2007
Platform independent overall security architecture in multi-processor system-on-chip integrated circuits for use in mobile phones and handheld devices Fulltext Access 18 Pages 2007
Haar wavelet based processor scheme for image coding with low circuit complexity Fulltext Access 18 Pages 2007
Performance analysis of classical, model-based and eigenvector methods: Ophthalmic arterial disorders detection case Fulltext Access 18 Pages 2007
Writing and executing ODP computational viewpoint specifications using Maude Fulltext Access 18 Pages 2007
Graduated regulation of ‘regulatable’ content and the European Audiovisual Media Services Directive: One small step for the industry and one giant leap for the legislator? Fulltext Access 18 Pages 2007
An enhanced QoS CBT multicast routing protocol based on Genetic Algorithm in a hybrid HAP–Satellite system Fulltext Access 18 Pages 2007
OSDA: Open service discovery architecture for efficient cross-domain service provisioning Fulltext Access 18 Pages 2007
Methods and guidelines for the design and development of domestic ubiquitous computing applications Fulltext Access 18 Pages 2007
The handover control mechanism for multi-path transmission using Stream Control Transmission Protocol (SCTP) Fulltext Access 18 Pages 2007
Interaction tree algorithms to extract effective architecture and layered performance models from traces Fulltext Access 19 Pages 2007
Comprehension strategies and difficulties in maintaining object-oriented systems: An explorative study Fulltext Access 19 Pages 2007
An effective and efficient code generation algorithm for uniform loops on non-orthogonal DSP architecture Fulltext Access 19 Pages 2007
Performability analysis of clustered systems with rejuvenation under varying workload Fulltext Access 19 Pages 2007
Provider-based deterministic packet marking against distributed DoS attacks Fulltext Access 19 Pages 2007
The case for a dynamic proxy framework with voluntary/incentive-based client hosting scheme Fulltext Access 19 Pages 2007
Research in optical burst switching within the e-Photon/ONe network of excellence Fulltext Access 19 Pages 2007
A modeling framework to understand the tussle between ISPs and peer-to-peer file-sharing users Fulltext Access 19 Pages 2007
Load shedding and distributed resource control of stream processing networks Fulltext Access 19 Pages 2007
Discrete-time single-server finite-buffer queues under discrete Markovian arrival process with vacations Fulltext Access 19 Pages 2007
The MM∑k=1KCPPk/GE/c/L G-queue with heterogeneous servers: Steady state solution and an application to performance evaluation Fulltext Access 19 Pages 2007
An empirical study of reliable multicast protocols over Ethernet-connected networks Fulltext Access 19 Pages 2007
Practical channel state aware and cooperative packet scheduling disciplines for coordinating colocated Bluetooth and IEEE 802.11b devices Fulltext Access 19 Pages 2007
Symbiotic rate adaptation for time sensitive elastic traffic with interactive transport Fulltext Access 19 Pages 2007
Designing an overload control strategy for secure e-commerce applications Fulltext Access 19 Pages 2007
Stateless key distribution for secure intra and inter-group multicast in mobile wireless network Fulltext Access 19 Pages 2007
Flexible security in peer-to-peer applications: Enabling new opportunities beyond file sharing Fulltext Access 19 Pages 2007
Real-time communications over wired/wireless PROFIBUS networks supporting inter-cell mobility Fulltext Access 19 Pages 2007
Performance evaluation and comparison of different ad hoc routing protocols Fulltext Access 19 Pages 2007
An asynchronous neighbor discovery algorithm for wireless sensor networks Fulltext Access 19 Pages 2007
Channelization for dynamic multi-frequency, multi-hop wireless cellular networks Fulltext Access 19 Pages 2007
A priority-based distributed group mutual exclusion algorithm when group access is non-uniform Fulltext Access 19 Pages 2007
Sensitivity study of location management area partitioning in cellular communication systems Fulltext Access 19 Pages 2007
Impact of mobility on the performance of relaying in ad hoc networks – Extended version Fulltext Access 19 Pages 2007
Multi-path routing versus tree routing for VPN bandwidth provisioning in the hose model Fulltext Access 19 Pages 2007
Using the danger model of immune systems for distributed defense in modern data networks Fulltext Access 19 Pages 2007
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots Fulltext Access 19 Pages 2007
A Fokker–Planck equation method predicting Buffer occupancy in a single queue Fulltext Access 19 Pages 2007
Towards a platform for wide-area overlay network deployment and management Fulltext Access 19 Pages 2007
On distributed power saving mechanisms of wireless LANs 802.11e U-APSD vs 802.11 power save mode Fulltext Access 19 Pages 2007
Active and passive techniques for group size estimation in large-scale and dynamic distributed systems Fulltext Access 20 Pages 2007
Worm-IT - A wormhole-based intrusion-tolerant group communication system Fulltext Access 20 Pages 2007
Secure communications for cluster-based ad hoc networks using node identities Fulltext Access 20 Pages 2007
A component composition model providing dynamic, flexible, and hierarchical composition of components for supporting software evolution Fulltext Access 20 Pages 2007
Systematic methodology for exploration of performance – Energy trade-offs in network applications using Dynamic Data Type refinement Fulltext Access 20 Pages 2007
A new scalable service discipline for real-time traffic: The framed-deadline scheduler Fulltext Access 20 Pages 2007
A network access control approach based on the AAA architecture and authorization attributes Fulltext Access 20 Pages 2007
Energy-aware multicasting in wireless ad hoc networks: A survey and discussion Fulltext Access 20 Pages 2007
Novel radio resource allocation strategy for multimedia content delivery over satellite multicast/broadcast systems Fulltext Access 20 Pages 2007
Internet collaboration and service composition as a loose form of teamwork Fulltext Access 20 Pages 2007
Specifying the intertwining of cooperation and autonomy in agent-based systems Fulltext Access 20 Pages 2007
A high-level requirements engineering methodology for electronic system-level design Fulltext Access 20 Pages 2007