Efficient task replication and management for adaptive fault tolerance in Mobile Grid environments Fulltext Access 16 Pages 2007
Towards generic charge-pump phase-locked loop, jitter estimation techniques using indirect on chip methods Fulltext Access 16 Pages 2007
Compiled code simulation of analog and mixed-signal systems using piecewise linear modeling of nonlinear parameters: A case study for ΔΣΔΣ modulator simulation Fulltext Access 16 Pages 2007
GridBench: A tool for the interactive performance exploration of Grid infrastructures Fulltext Access 17 Pages 2007
On processor sharing and its applications to cellular data network provisioning Fulltext Access 17 Pages 2007
Markov and multifractal wavelet models for wireless MAC-to-MAC channels Fulltext Access 17 Pages 2007
A new service overlays dimensioning approach based on stochastic geometry Fulltext Access 17 Pages 2007
Robust static allocation of resources for independent tasks under makespan and dollar cost constraints Fulltext Access 17 Pages 2007
Efficient detection of a locally stable predicate in a distributed system Fulltext Access 17 Pages 2007
A window-assisted video partitioning strategy for partitioning and caching video streams in distributed multimedia systems Fulltext Access 17 Pages 2007
Accelerated regular grid traversals using extended anisotropic chessboard distance fields on a parallel stream processor Fulltext Access 17 Pages 2007
Optimization decomposition approach for layered QoS scheduling in grid computing Fulltext Access 17 Pages 2007
An efficient immersion-based watershed transform method and its prototype architecture Fulltext Access 17 Pages 2007
Designing layout–timing independent quantum-dot cellular automata (QCA) circuits by global asynchrony Fulltext Access 17 Pages 2007
Design of efficient architectures for 1-D and 2-D DLMS adaptive filters Fulltext Access 17 Pages 2007
Principles for designing data-/compute-intensive distributed applications and middleware systems for heterogeneous environments Fulltext Access 17 Pages 2007
A three round authenticated group key agreement protocol for ad hoc networks Fulltext Access 17 Pages 2007
A new approach to mine frequent patterns using item-transformation methods Fulltext Access 17 Pages 2007
A study on the cognitive of complexity and difficulty of chinese characters when reading and recognizing Fulltext Access 18 Pages 2007
A reconfigurable computing framework for multi-scale cellular image processing Fulltext Access 18 Pages 2007
Multiprogrammed non-blocking checkpoints in support of optimistic simulation on myrinet clusters Fulltext Access 18 Pages 2007
Methods and guidelines for the design and development of domestic ubiquitous computing applications Fulltext Access 18 Pages 2007
Coprocessor design to support MPI primitives in configurable multiprocessors Fulltext Access 18 Pages 2007
An analytic model of TCP performance over multi-hop wireless links with correlated channel fading Fulltext Access 18 Pages 2007
WinSGL: synchronizing displays in parallel graphics using cost-effective software genlocking Fulltext Access 18 Pages 2007
Using a Stochastic Well-formed Net model for assessing a decentralized approach to configuration management Fulltext Access 18 Pages 2007
A lattice-based approach for updating access control policies in real-time Fulltext Access 18 Pages 2007
Fault-tolerant and efficient data propagation in wireless sensor networks using local, additional network information Fulltext Access 18 Pages 2007
Clustering techniques for dynamic location management in mobile computing Fulltext Access 18 Pages 2007
Dynamic partner identification in mobile agent-based distributed job workflow execution Fulltext Access 18 Pages 2007
Modeling of concurrent web sessions with bounded inconsistency in shared data Fulltext Access 18 Pages 2007
The configuration space of homologous proteins: A theoretical and practical framework to reduce the diversity of the protein sequence space after massive all-by-all sequence comparisons Fulltext Access 18 Pages 2007
Security Attack Testing (SAT)—testing the security of information systems at design time Fulltext Access 18 Pages 2007
Efficient design space exploration for application specific systems-on-a-chip Fulltext Access 18 Pages 2007
Exploring phrasal context and error correction heuristics in bootstrapping for geographic named entity annotation Fulltext Access 18 Pages 2007
Hardware support for adaptive tessellation of Bézier surfaces based on local tests Fulltext Access 18 Pages 2007
An efficient implementation of a 3D wavelet transform based encoder on hyper-threading technology Fulltext Access 19 Pages 2007
Torus Ring: improving performance of interconnection network by modifying hierarchical ring Fulltext Access 19 Pages 2007
A priority-based distributed group mutual exclusion algorithm when group access is non-uniform Fulltext Access 19 Pages 2007
Performability analysis of clustered systems with rejuvenation under varying workload Fulltext Access 19 Pages 2007
The MM∑k=1KCPPk/GE/c/L G-queue with heterogeneous servers: Steady state solution and an application to performance evaluation Fulltext Access 19 Pages 2007
A modeling framework to understand the tussle between ISPs and peer-to-peer file-sharing users Fulltext Access 19 Pages 2007
Load shedding and distributed resource control of stream processing networks Fulltext Access 19 Pages 2007
An empirical study of reliable multicast protocols over Ethernet-connected networks Fulltext Access 19 Pages 2007
Discrete-time single-server finite-buffer queues under discrete Markovian arrival process with vacations Fulltext Access 19 Pages 2007
DW-RBAC: A formal security model of delegation and revocation in workflow systems Fulltext Access 20 Pages 2007
Systematic methodology for exploration of performance – Energy trade-offs in network applications using Dynamic Data Type refinement Fulltext Access 20 Pages 2007
Deadlock-free connection-based adaptive routing with dynamic virtual circuits Fulltext Access 20 Pages 2007
A revisit of fast greedy heuristics for mapping a class of independent tasks onto heterogeneous computing systems Fulltext Access 20 Pages 2007
Topology control with better radio models: Implications for energy and multi-hop interference Fulltext Access 20 Pages 2007
An automated entity–relationship clustering algorithm for conceptual database design Fulltext Access 20 Pages 2007
Scalability analysis of three monitoring and information systems: MDS2, R-GMA, and Hawkeye Fulltext Access 20 Pages 2007