Modeling the performance of flooding in wireless multi-hop Ad hoc networks Fulltext Access 8 Pages 2006
Predation and the cost of replication: New approaches to malware prevention? Fulltext Access 8 Pages 2006
Packet-based burst queue modeling at an edge in optical-burst switched networks Fulltext Access 8 Pages 2006
Cryptanalysis of some improved password-authenticated key exchange schemes Fulltext Access 8 Pages 2006
Utility-based downlink power allocation in multicell wireless packet networks Fulltext Access 8 Pages 2006
Minimizing preemption cost for path selection in Diffserv-ware MPLS networks Fulltext Access 8 Pages 2006
TCP performance in wireless networks with delay spike and different initial congestion window sizes Fulltext Access 8 Pages 2006
S-shaped TCP: A transport protocol for improving the performance of TCP in fast long-distance networks Fulltext Access 8 Pages 2006
Performance evaluation of a satellite-switched variable-frame TDMA system Fulltext Access 8 Pages 2006
Dynamic cell-based MAC protocol for target detection applications in energy-constrained wireless networks Fulltext Access 8 Pages 2006
An efficient traffic engineering approach based on flow distribution and splitting in MPLS networks Fulltext Access 8 Pages 2006
A unified model for the implementation of both ISO 9001:2000 and CMMI by ISO-certified organizations Fulltext Access 8 Pages 2006
Yet shorter warmup by combining no-state-loss and MRRL for sampled LRU cache simulation Fulltext Access 8 Pages 2006
Detailed numerical analysis of a four-wave mixing in dispersion-shifted fiber based all-optical wavelength converter of 10 Gb/s single sideband optical signal Fulltext Access 8 Pages 2006
Sim-ARM1136: A case study on the accuracy of the cycle-accurate simulator Fulltext Access 8 Pages 2006
Recent developments in cryptographic hash functions: Security implications and future directions Fulltext Access 8 Pages 2006
The Windows Registry as a forensic artefact: Illustrating evidence collection for Internet usage Fulltext Access 8 Pages 2006
FORZA – Digital forensics investigation framework that incorporate legal issues Fulltext Access 8 Pages 2006
Task allocation for maximizing reliability of distributed systems: A simulated annealing approach Fulltext Access 8 Pages 2006
Virtual Leashing: Creating a computational foundation for software protection Fulltext Access 8 Pages 2006
The Trellis security infrastructure for overlay metacomputers and bridged distributed file systems Fulltext Access 8 Pages 2006
Fast distributed algorithm for convergecast in ad hoc geometric radio networks Fulltext Access 8 Pages 2006
Greedy localized routing for maximizing probability of delivery in wireless ad hoc networks with a realistic physical layer Fulltext Access 8 Pages 2006
Reconfiguration of distribution system using fuzzy multi-objective approach Fulltext Access 8 Pages 2006
Hardware/software optimization for array & pointer boundary checking against buffer overflow attacks Fulltext Access 8 Pages 2006
Time-domain fault location algorithm for parallel transmission lines using unsynchronized currents Fulltext Access 8 Pages 2006
Transmission project profitability including reliability optimization of bulk power systems Fulltext Access 8 Pages 2006
Optimal distributed generation allocation for reliability, losses, and voltage improvement Fulltext Access 8 Pages 2006
A study on the on-line measurement of transmission line impedances for improved relaying protection Fulltext Access 8 Pages 2006
Electricity customer classification using frequency–domain load pattern data Fulltext Access 8 Pages 2006
Optimal coordinated PET and generator excitation control for power systems Fulltext Access 8 Pages 2006
Utilisation of mobile handheld devices for care management at an Australian aged care facility Fulltext Access 8 Pages 2006
Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks Fulltext Access 8 Pages 2006
Survivable IP network realization in IP-over-WDM networks under overlay model Fulltext Access 8 Pages 2006
Resource allocation for real-time and non-real-time traffic in wireless networks Fulltext Access 8 Pages 2006
Cross-layer conditional retransmission for layered video streaming over cellular networks Fulltext Access 8 Pages 2006
Performance optimization of an adaptive wireless push system in environments with locality of demand Fulltext Access 8 Pages 2006
Broadcasting in all-output-port cube-connected cycles with distance-insensitive switching Fulltext Access 8 Pages 2006
Component value selection for active filters using parallel tabu search algorithm Fulltext Access 8 Pages 2006
Frequency-domain model reduction approach to design IIR digital filters using orthonormal bases Fulltext Access 8 Pages 2006
Interference suppression by element position control of phased arrays using LM algorithm Fulltext Access 8 Pages 2006
Genetic algorithm for delay- and degree-constrained multimedia broadcasting on overlay networks Fulltext Access 8 Pages 2006
A method for the analysis of transistor circuits having multiple DC solutions Fulltext Access 8 Pages 2006
Study of climatic effects on peak load and regional similarity of load profiles following disturbances based on data mining Fulltext Access 9 Pages 2006
Factors affecting customer needs of geographical accessibility in electronic commerce Fulltext Access 9 Pages 2006
Web service decomposition: Edge computing architecture for cache-friendly e-commerce applications Fulltext Access 9 Pages 2006
Havana agents for comparison shopping and location-aware advertising in wireless mobile environments Fulltext Access 9 Pages 2006
Development of a tool for selecting mobile shopping site: A customer perspective Fulltext Access 9 Pages 2006