Developing context-aware pervasive computing applications: Models and approach Fulltext Access 28 Pages 2006
Relevance of massively distributed explorations of the Internet topology: Qualitative results Fulltext Access 28 Pages 2006
Quantitative performance comparison of different content distribution modes Fulltext Access 28 Pages 2006
The parallel optimization of network bandwidth allocation based on generalized particle model Fulltext Access 28 Pages 2006
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks Fulltext Access 28 Pages 2006
Performance of two-stage tandem queues with blocking: The impact of several flows of signals Fulltext Access 29 Pages 2006
Stronger interaction between link layer and network layer for an optimized mobility management in heterogeneous IPv6 networks Fulltext Access 29 Pages 2006
Closed form solutions for mapping general distributions to quasi-minimal PH distributions Fulltext Access 29 Pages 2006
The integration of ad hoc sensor and cellular networks for multi-class data transmission Fulltext Access 29 Pages 2006
On the performance of ad hoc wireless LANs: A practical queuing theoretic model Fulltext Access 30 Pages 2006
Performance evaluation of the push-mode-multicast based candidate access router discovery (PMM CARD) Fulltext Access 31 Pages 2006
SimQPN—A tool and methodology for analyzing queueing Petri net models by means of simulation Fulltext Access 31 Pages 2006
Two methods for computing bounds for the distribution of cumulative reward for large Markov models Fulltext Access 31 Pages 2006
Service discovery using volunteer nodes in heterogeneous pervasive computing environments Fulltext Access 31 Pages 2006
Tight end-to-end per-flow delay bounds in FIFO multiplexing sink-tree networks Fulltext Access 32 Pages 2006
NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey Fulltext Access 33 Pages 2006
Context-aware resource management in multi-inhabitant smart homes: A framework based on Nash HH-learning Fulltext Access 33 Pages 2006
MuSeQoR: Multi-path failure-tolerant security-aware QoS routing in Ad hoc wireless networks Fulltext Access 35 Pages 2006
Decentralized media streaming infrastructure (DeMSI): An adaptive and high-performance peer-to-peer content delivery network Fulltext Access 36 Pages 2006
Embedding expression: Pervasive computing architecture for art and entertainment Fulltext Access 36 Pages 2006
Survey of research towards robust peer-to-peer networks: Search methods Fulltext Access 37 Pages 2006
A framework and source model for design and evaluation of Robust Header Compression Fulltext Access 37 Pages 2006
Quality of service provisioning in ad hoc wireless networks: a survey of issues and solutions Fulltext Access 42 Pages 2006
The Internet is the computer: The role of forensics in bridging the digital and physical divide Fulltext Access 4 Pages 2005
Safety and Security in Multiagent Systems: Report on the 2nd SASEMAS workshop (SASEMAS'05) Fulltext Access 4 Pages 2005
Remarks on Wu-Hsu's threshold signature scheme using self-certified public keys Fulltext Access 4 Pages 2005
New FTFN-based grounded-capacitor SRCO with explicit current-mode output and reduced number of resistors Fulltext Access 4 Pages 2005
Note on the asymptotic approximation of a double integral with an angular-spectrum representation Fulltext Access 4 Pages 2005
Approximate symbol error probability evaluation of M-ary pulse amplitude modulation with imperfect carrier recovery Fulltext Access 4 Pages 2005
Size-dependent Bruggeman approach for dielectric-magnetic composite materials Fulltext Access 4 Pages 2005
Closed-form SER expressions for Star MQAM in frequency non-selective Rician and Nakagami-m channels Fulltext Access 4 Pages 2005
Design and performance of networks for super-, cluster-, and grid-computing: Part I Fulltext Access 4 Pages 2005
Design and performance of networks for super-, cluster-, and grid-computing: Part II Fulltext Access 4 Pages 2005
Special section: “Soft-computing and advanced techniques in new algorithmic approaches to existing application areas” Fulltext Access 4 Pages 2005
High-speed networks and services for data-intensive Grids: The DataTAG Project Fulltext Access 4 Pages 2005
Performance modeling and evaluation of high-performance parallel and distributed systems Fulltext Access 4 Pages 2005
Recent advances in computer vision and image processing using reconfigurable hardware Fulltext Access 4 Pages 2005
Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies Fulltext Access 4 Pages 2005
Information Security Governance - Compliance management vs operational management Fulltext Access 5 Pages 2005
Cryptanalyses of two key assignment schemes based on polynomial interpolations Fulltext Access 5 Pages 2005