Requirements change: Fears dictate the must haves; desires the won’t haves Fulltext Access 28 Pages 2007
Context-aware handoff middleware for transparent service continuity in wireless networks Fulltext Access 28 Pages 2007
Power and accuracy trade-offs in sound-based context recognition systems Fulltext Access 28 Pages 2007
An empirical comparison of generators for self similar simulated traffic Fulltext Access 29 Pages 2007
Filling the gap between design and performance/reliability models of component-based systems: A model-driven approach Fulltext Access 31 Pages 2007
Optimal XOR hashing for non-uniformly distributed address lookup in computer networks Fulltext Access 31 Pages 2007
Performance analysis of an ingress switch in a JumpStart optical burst switching network Fulltext Access 32 Pages 2007
Analysis and evaluation of Secos, a protocol for energy efficient and secure communication in sensor networks Fulltext Access 32 Pages 2007
Two efficient packet aggregation mechanisms and QoS support in a slotted dual bus optical ring network Fulltext Access 35 Pages 2007
The impact of master–slave bridge access mode on the performance of multi-cluster 802.15.4 network Fulltext Access 39 Pages 2007
Intelligent association selection of embedded agents in intelligent inhabited environments Fulltext Access 41 Pages 2007
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards Fulltext Access 41 Pages 2007
Advances in Onion Routing: Description and backtracing/investigation problems Fulltext Access 4 Pages 2006
Polarization dependent loss vector measurement in a system with polarization mode dispersion Fulltext Access 4 Pages 2006
An assessment of systems and software engineering scholars and institutions (2000–2004) Fulltext Access 4 Pages 2006
Analysis of Sun et al.’s linkability attack on some proxy blind signature schemes Fulltext Access 4 Pages 2006
Performance analysis of multiple-input multiple-output system for wireless network in an office room Fulltext Access 4 Pages 2006
Computation of cavity resonances by means of adaptive eigenvalues displacement Fulltext Access 4 Pages 2006
Current-mode KHN filter employing current differencing transconductance amplifiers Fulltext Access 4 Pages 2006
Path-based protection in WDM mesh networks subject to double-link failures Fulltext Access 4 Pages 2006
Determination of the complex permittivity of materials with transmission/reflection measurements in rectangular waveguides Fulltext Access 4 Pages 2006
New analytical expressions for the coupling matrix elements related to scattering from a planar single-strip grating Fulltext Access 4 Pages 2006
New analytical model for the radiation pattern of a TM02 mode circular patch antenna Fulltext Access 4 Pages 2006
Solving the trade-off between fairness and throughput: Token bucket and leaky bucket-based weighted fair queueing schedulers Fulltext Access 4 Pages 2006
SQAP: A simple QoS supportive adaptive polling protocol for wireless LANs Fulltext Access 4 Pages 2006
Linearly precoded analytical constant modulus algorithm for non-constant modulus space-time codes Fulltext Access 4 Pages 2006
Low polarization mode dispersion measurements in ad hoc drawn spun fibers Fulltext Access 5 Pages 2006
Investigation of performance variations due to the amplitude of group-delay ripple in chirped fiber Bragg gratings Fulltext Access 5 Pages 2006
Design of non-uniform circular antenna arrays for side lobe reduction using the method of genetic algorithms Fulltext Access 5 Pages 2006
All-optical NAND gate using integrated SOA-based Mach–Zehnder interferometer Fulltext Access 5 Pages 2006
To transfer or not to transfer – Service handovers in wireless LAN systems with imperfect movement estimation Fulltext Access 5 Pages 2006
Structured peer-to-peer systems for telecommunications and mobile environments Fulltext Access 5 Pages 2006
Beam steering characteristics of strip line fed printed array antenna on magnetized ferrite Fulltext Access 5 Pages 2006
Regularised analytical constant modulus algorithm for space–time coded systems Fulltext Access 5 Pages 2006
Optimal IP network dimensioning for stream-type traffic using probabilistic delay constraints Fulltext Access 5 Pages 2006