Fourth generation wireless communications: an analysis of future potential and implementation Fulltext Access 13 Pages 2005
An MPLS-based architecture for scalable QoS and traffic engineering in converged multiservice mobile IP networks Fulltext Access 13 Pages 2005
Analysis of adaptive GBN schemes in a Gilbert-Elliott channel and optimisation of system parameters Fulltext Access 13 Pages 2005
A simple and effective mechanism for stored video streaming with TCP transport and server-side adaptive frame discard Fulltext Access 13 Pages 2005
Polynomial time approximation schemes for base station coverage with minimum total radii Fulltext Access 13 Pages 2005
Radio frequency channel modeling for proximity networks on the Martian surface Fulltext Access 13 Pages 2005
Handling variety: the tension between adaptability and interoperability of open source software Fulltext Access 13 Pages 2005
Wireless packet fair queueing algorithms with link level retransmission Fulltext Access 13 Pages 2005
Content-access QoS in peer-to-peer networks using a fast MDS erasure code Fulltext Access 13 Pages 2005
Restoration mechanisms for handling channel and link failures in optical WDM networks: tunable laser-based switch architectures and performance analysis Fulltext Access 13 Pages 2005
A reliable on-demand routing protocol for mobile ad hoc networks with mobility prediction Fulltext Access 13 Pages 2005
Feedback-based bandwidth allocation with call admission control for providing delay guarantees in IEEE 802.11e networks Fulltext Access 13 Pages 2005
A simulation study of the Adaptive RIO (A-RIO) queue management algorithm Fulltext Access 13 Pages 2005
Traffic shaping in aggregate-based networks: implementation and analysis Fulltext Access 13 Pages 2005
Clipping distortion mitigation in OFDM systems over fading channels by using DFT-based method Fulltext Access 13 Pages 2005
Towards multilaterally secure computing platforms-with open source and trusted computing Fulltext Access 13 Pages 2005
The insider threat to information systems and the effectiveness of ISO17799 Fulltext Access 13 Pages 2005
A multinomial logistic regression modeling approach for anomaly intrusion detection Fulltext Access 13 Pages 2005
RBR: refinement-based route maintenance protocol in wireless ad hoc networks Fulltext Access 13 Pages 2005
A tool for extracting synchronous machines parameters from the dc flux decay test Fulltext Access 13 Pages 2005
Evidence processing and privacy issues in evidence-based reputation systems Fulltext Access 13 Pages 2005
Trusted computing using AMD “Pacifica” and “Presidio” secure virtual machine technology Fulltext Access 13 Pages 2005
Panoramic View System for extracting key sentences based on viewpoints and application to a search engine Fulltext Access 13 Pages 2005
Smart Time Management-the unified time synchronization interface for the distributed simulation Fulltext Access 13 Pages 2005
Voltage-mode universal biquadratic filters with one input and five outputs using MOCCIIs Fulltext Access 13 Pages 2005
Performance evaluation and verification of communication protocol for railway signaling systems Fulltext Access 13 Pages 2005
Future trends in distributed applications and problem-solving environments Fulltext Access 13 Pages 2005
Parallel techniques in irregular codes: cloth simulation as case of study Fulltext Access 13 Pages 2005
Fast synchronization on shared-memory multiprocessors: An architectural approach Fulltext Access 13 Pages 2005
Job scheduling and processor allocation for grid computing on metacomputers Fulltext Access 13 Pages 2005
Edge-disjoint spanning trees for the generalized butterfly networks and their applications Fulltext Access 13 Pages 2005
Analyzing and enhancing the resilience of structured peer-to-peer systems Fulltext Access 13 Pages 2005
A fast, parallel spanning tree algorithm for symmetric multiprocessors (SMPs) Fulltext Access 13 Pages 2005
On overlapping resource management and call setup signaling: a new signaling approach for internet multimedia applications Fulltext Access 13 Pages 2005
Controlling a complex electromechanical process on the basis of a neurofuzzy approach Fulltext Access 13 Pages 2005
Making automatic differentiation truly automatic: coupling PETSc with ADIC Fulltext Access 13 Pages 2005
A secure e-Government platform architecture for small to medium sized public organizations Fulltext Access 13 Pages 2005
Online value network linkages: integration, information sharing and flexibility Fulltext Access 13 Pages 2005
A graph-based proactive fault identification approach in computer networks Fulltext Access 13 Pages 2005
Performance evaluation of a generalized hybrid TDMA/CDMA protocol for wireless multimedia with QoS adaptations Fulltext Access 13 Pages 2005
Class-based downlink capacity estimation of a WCDMA network in a multiservice context Fulltext Access 13 Pages 2005
An evaluation of fair packet schedulers using a novel measure of instantaneous fairness Fulltext Access 13 Pages 2005
Design and implementation of a network domain agency for scaleable QoS in the Internet Fulltext Access 13 Pages 2005
Performance evaluation of a multilevel hierarchical location management protocol for ad hoc networks Fulltext Access 13 Pages 2005
Shepherd: A lightweight statistical authentication protocol for access control in wireless LANs Fulltext Access 13 Pages 2005
Design and demonstration of policy-based management in a multi-hop ad hoc network Fulltext Access 13 Pages 2005
An optimised resource aware approach to information collection in ad hoc networks Fulltext Access 13 Pages 2005
Bandwidth guaranteed call admission in TDMA/CDMA ad hoc wireless networks Fulltext Access 13 Pages 2005
Towards autonomic application-sensitive partitioning for SAMR applications Fulltext Access 13 Pages 2005
Dealing with heterogeneity through limited duplication for scheduling precedence constrained task graphs Fulltext Access 13 Pages 2005
Instruction level redundant number computations for fast data intensive processing in asynchronous processors Fulltext Access 14 Pages 2005
Two controlled experiments concerning the comparison of pair programming to peer review Fulltext Access 14 Pages 2005
An agent based adaptive bandwidth allocation scheme for multimedia applications Fulltext Access 14 Pages 2005
Methodologies for the use of VMware to boot cloned/mounted subject hard disk images Fulltext Access 14 Pages 2005
Multiple behavior information fusion based quantitative threat evaluation Fulltext Access 14 Pages 2005
Distance-aware L2 cache organizations for scalable multiprocessor systems Fulltext Access 14 Pages 2005
Usage based service differentiation for end-to-end quality of service management Fulltext Access 14 Pages 2005
End-to-end support for statistical quality of service in heterogeneous mobile ad hoc networks Fulltext Access 14 Pages 2005
Toward end-to-end fairness: a framework for the allocation of multiple prioritized resources in switches and routers Fulltext Access 14 Pages 2005
A measurement-based approach for dynamic QoS adaptation in DiffServ networks Fulltext Access 14 Pages 2005
Development of field programmable modular wireless sensor network nodes for ambient systems Fulltext Access 14 Pages 2005