A network flow approach for static and dynamic traffic grooming in WDM networks Fulltext Access 16 Pages 2006
Benefits of advertising wavelength availability in distributed lightpath establishment Fulltext Access 16 Pages 2006
On achieving fairness in the joint allocation of buffer and bandwidth resources: Principles and algorithms Fulltext Access 16 Pages 2006
Multi-layer protection in IP-over-WDM networks with and with no backup lightpath sharing Fulltext Access 16 Pages 2006
Maximal lifetime scheduling for K to 1 sensor–target surveillance networks Fulltext Access 16 Pages 2006
Low-cost itineraries for multi-hop agents designed for scalable monitoring of multiple subnets Fulltext Access 16 Pages 2006
OMNI: An efficient overlay multicast infrastructure for real-time applications Fulltext Access 16 Pages 2006
Incorporating trust and reputation in the DSR protocol for dependable routing Fulltext Access 16 Pages 2006
Estimating the source-destination traffic matrix of a VPN from access-link loads Fulltext Access 16 Pages 2006
Unwillingness-to-communicate, perceptions of the Internet and self-disclosure in ICQ Fulltext Access 16 Pages 2006
Globalization and heterogenization: Cultural and civilizational clustering in telecommunicative space (1989–1999) Fulltext Access 16 Pages 2006
Efficient steady-state analysis of second-order fluid stochastic Petri nets Fulltext Access 16 Pages 2006
Performance analysis of timer-based burst assembly with slotted scheduling for optical burst switching networks Fulltext Access 16 Pages 2006
Dynamic grooming in IP over optical networks based on the overlay architecture Fulltext Access 16 Pages 2006
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks Fulltext Access 16 Pages 2006
Chirped-pulsed frequency modulation (C-PFM) for fiber Bragg grating sensors multiplexing Fulltext Access 16 Pages 2006
Reputation-based policies that provide the right incentives in peer-to-peer environments Fulltext Access 16 Pages 2006
P2P reputation management: Probabilistic estimation vs. social networks Fulltext Access 16 Pages 2006
MAWS: A platform-independent framework for mobile agents using Web services Fulltext Access 16 Pages 2006
DistDLB: Improving cosmology SAMR simulations on distributed computing systems through hierarchical load balancing Fulltext Access 16 Pages 2006
Data redistribution and remote method invocation for coupled components Fulltext Access 16 Pages 2006
On a solvability of contact problems with visco-plastic friction in the thermo-visco-plastic Bingham rheology Fulltext Access 16 Pages 2006
Simple approximation algorithms and PTASs for various problems in wireless ad hoc networks Fulltext Access 16 Pages 2006
GPU-accelerated DXT and JPEG compression schemes for low-latency network transmissions of HD, 2K, and 4K video Fulltext Access 16 Pages 2006
Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention Fulltext Access 16 Pages 2006
Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques Fulltext Access 16 Pages 2006
BlueCube: Constructing a hypercube parallel computing and communication environment over Bluetooth radio systems Fulltext Access 16 Pages 2006
A robust framework for real-time distributed processing of satellite data Fulltext Access 16 Pages 2006
On the deployment of VoIP in Ethernet networks: methodology and case study Fulltext Access 16 Pages 2006
Optimized QoS priority routing for service tunability and overhead reduction using swarm based active network scheme Fulltext Access 16 Pages 2006
Dynamic bandwidth allocation for efficient support of concurrent digital TV and IP multicast services in DVB-T networks Fulltext Access 16 Pages 2006
A flexible contention resolution scheme for QoS provisioning in optical burst switching networks Fulltext Access 16 Pages 2006
Scheduling of a meta-task with QoS requirements in heterogeneous computing systems Fulltext Access 16 Pages 2006
A predictive dynamic output buffer reconfiguration (PDOBR) architecture for ATM networks Fulltext Access 16 Pages 2006
Coverage-adaptive random sensor scheduling for application-aware data gathering in wireless sensor networks Fulltext Access 16 Pages 2006
E-MACSC: A novel dynamic cache tuning technique to reduce information retrieval roundtrip time over the Internet Fulltext Access 16 Pages 2006
Hamming hypermeshes: High performance interconnection networks for pin-out limited systems Fulltext Access 17 Pages 2006
Scalable key management for secure multicast communication in the mobile environment Fulltext Access 17 Pages 2006
Predicting communication protocol performance on superscalar architectures using instruction dependency Fulltext Access 17 Pages 2006
A discrete-time queueing model with periodically scheduled arrival and departure slots Fulltext Access 17 Pages 2006
Examination of load-balancing methods to improve efficiency of a composite materials manufacturing process simulation under uncertainty using distributed computing Fulltext Access 17 Pages 2006
The Plan B OS for ubiquitous computing. Voice control, security, and terminals as case studies Fulltext Access 17 Pages 2006
ASM-based design of data warehouses and on-line analytical processing systems Fulltext Access 17 Pages 2006
Validating strategic alignment of organizational IT requirements using goal modeling and problem diagrams Fulltext Access 17 Pages 2006
A taxonomy and comparison of computer security incidents from the commercial and government sectors Fulltext Access 17 Pages 2006
Distributed mutual exclusion algorithms for grid applications: A hierarchical approach Fulltext Access 17 Pages 2006
Multiuser frequency-time domain radio resource allocation in downlink OFDM systems: Capacity analysis and scheduling methods Fulltext Access 17 Pages 2006
A scalable routing scheme with group motion support in large and dense wireless ad hoc networks Fulltext Access 17 Pages 2006
Topology-transparent reservation time division multiple access in multihop ad hoc networks Fulltext Access 17 Pages 2006
A tight bound on remote reference time complexity of mutual exclusion in the read-modify-write model Fulltext Access 17 Pages 2006
Parallel sparse LU factorization on different message passing platforms Fulltext Access 17 Pages 2006
Analytical modeling of codes with arbitrary data-dependent conditional structures Fulltext Access 17 Pages 2006
MEMPHIS: A mobile agent-based system for enabling acquisition of multilingual content and providing flexible format internet premium services Fulltext Access 17 Pages 2006
Virtual fully connected WDM network: A high-performance single-hop architecture for metropolitan area networks Fulltext Access 17 Pages 2006