Applying genetic algorithm for the development of the components-based embedded system Fulltext Access 15 Pages 2005
A quad-tree based algorithm for processor allocation in 2D mesh-connected multicomputers Fulltext Access 15 Pages 2005
Password authenticated key exchange protocols among diverse network domains Fulltext Access 15 Pages 2005
Private key infrastructure: balancing computer transmission privacy with changing technology and security demands Fulltext Access 15 Pages 2005
Distributed routing algorithms for multi-hop ad hoc networks using d-hop connected d-dominating sets Fulltext Access 15 Pages 2005
Basic protocols, message sequence charts, and the verification of requirements specifications Fulltext Access 15 Pages 2005
A lightweight encapsulation protocol for IP over MPEG-2 networks: design, implementation and analysis Fulltext Access 15 Pages 2005
Workflow analysis for web publishing using a stage-activity process model Fulltext Access 15 Pages 2005
Relevance feedback using adaptive clustering for image similarity retrieval Fulltext Access 15 Pages 2005
Some successful approaches to software reliability modeling in industry Fulltext Access 15 Pages 2005
A middleware service for secure group communication in mobile ad hoc networks Fulltext Access 15 Pages 2005
Can the WSIS declaration principle and plan of action work in Japan? Digital stratification of Japanese society Fulltext Access 15 Pages 2005
Physical layer performance benchmarking of two metropolitan area network configurations Fulltext Access 15 Pages 2005
Characterization of optical fibers for optimization of a Brillouin scattering based fiber optic sensor Fulltext Access 15 Pages 2005
Dynamic routing and wavelength assignment with optical bypass using ring embeddings Fulltext Access 15 Pages 2005
Stress birefringence analysis of polarization maintaining optical fibers Fulltext Access 15 Pages 2005
The use of a figure-of-eight coil for fibre optic respiratory plethysmography: Geometrical analysis and experimental characterisation Fulltext Access 15 Pages 2005
The impact of x86 instruction set architecture on superscalar processing Fulltext Access 15 Pages 2005
Compatibility, competition, and control in trusted computing environments Fulltext Access 15 Pages 2005
Profiling soft-core processor applications for hardware/software partitioning Fulltext Access 15 Pages 2005
Data mining and machine learning-Towards reducing false positives in intrusion detection Fulltext Access 15 Pages 2005
DINCast: a hop efficient dynamic multicast infrastructure for P2P computing Fulltext Access 15 Pages 2005
Message-based cellular peer-to-peer grids: foundations for secure federation and autonomic services Fulltext Access 15 Pages 2005
A social interaction analysis methodology for improving E-collaboration over the Internet Fulltext Access 15 Pages 2005
A new cache document replacement policy considering the contribution to sales Fulltext Access 15 Pages 2005
Integration of streaming services and TCP data transmission in the Internet Fulltext Access 15 Pages 2005
Performance analysis of dynamic load balancing algorithms with variable number of processors Fulltext Access 15 Pages 2005
Evaluating scheduling policies for fine-grain communication protocols on a cluster of SMPs Fulltext Access 15 Pages 2005
Wireless real-time on-demand data broadcast scheduling with dual deadlines Fulltext Access 15 Pages 2005
Statistical modelling of information sharing: Community, membership, and content Fulltext Access 15 Pages 2005
Preventing information leakage within workflows that execute among competing organizations Fulltext Access 15 Pages 2005
Implementation and performance study of a hardware-VIA-based network adapter on Gigabit Ethernet Fulltext Access 15 Pages 2005
Enabling ubiquitous sensor networking over mobile networks through peer-to-peer overlay networking Fulltext Access 16 Pages 2005
Internet like control for MPLS based traffic engineering: performance evaluation Fulltext Access 16 Pages 2005
“Pay bursts only once” does not hold for non-FIFO guaranteed rate nodes Fulltext Access 16 Pages 2005
Priority queueing with finite buffer size and randomized push-out mechanism Fulltext Access 16 Pages 2005
Stability of size-based scheduling disciplines in resource-sharing networks Fulltext Access 16 Pages 2005
A simple analytical framework to analyze search strategies in large-scale peer-to-peer networks Fulltext Access 16 Pages 2005
A dynamic and reliability-driven scheduling algorithm for parallel real-time jobs executing on heterogeneous clusters Fulltext Access 16 Pages 2005
A wireless extension of Profibus DP based on the Bluetooth radio system Fulltext Access 16 Pages 2005
Localized LMST and RNG based minimum-energy broadcast protocols in ad hoc networks Fulltext Access 16 Pages 2005
SF-DeviL: an algorithm for energy-efficient Bluetooth scatternet formation and maintenance Fulltext Access 16 Pages 2005
Weight allocation in distributed admission control for wireless networks Fulltext Access 16 Pages 2005
Analysis of multiservice cellular networks with asymmetrical traffic and handoff queue Fulltext Access 16 Pages 2005
Distributed block independent set algorithms and parallel multilevel ILU preconditioners Fulltext Access 16 Pages 2005
Memory-side prefetching for linked data structures for processor-in-memory systems Fulltext Access 16 Pages 2005
A framework for the design, synthesis and cycle-accurate simulation of multiprocessor networks Fulltext Access 16 Pages 2005
Capital market reaction to defective IT products: The case of computer viruses Fulltext Access 16 Pages 2005
A diversity-based method for infrequent purchase decision support in e-commerce Fulltext Access 16 Pages 2005
A framework for the assessment and analysis of electronic government proposals Fulltext Access 16 Pages 2005
Combining bundle search with buyer coalition formation in electronic markets: A distributed approach through explicit negotiation Fulltext Access 16 Pages 2005