Unifying intrusion detection and forensic analysis via provenance awareness Fulltext Access 11 Pages 2016
Home is where your friends are: Utilizing the social graph to locate twitter users in a city Fulltext Access 11 Pages 2016
BECloud: A new approach to analyse elasticity enablers of cloud services Fulltext Access 11 Pages 2016
On-siteDriverID: A secure authentication scheme based on Spanish eID cards for vehicular ad hoc networks Fulltext Access 11 Pages 2016
LBBA: An efficient online benefit-aware multiprocessor scheduling for QoS via online choice of approximation algorithms Fulltext Access 11 Pages 2016
Investigations of automatic methods for detecting the polymorphic worms signatures Fulltext Access 11 Pages 2016
Urban traffic congestion estimation and prediction based on floating car trajectory data Fulltext Access 11 Pages 2016
Unmanned aerial vehicles: A preliminary analysis of forensic challenges Fulltext Access 11 Pages 2016
Design of a memristor-based look-up table (LUT) for low-energy operation of FPGAs Fulltext Access 11 Pages 2016
Development of a simulator for analyzing some performance parameters of nanoscale strained silicon MOSFET-based CMOS inverters Fulltext Access 11 Pages 2016
Compact distributed multi-finger MOSFET model for circuit-level ESD simulation Fulltext Access 11 Pages 2016
Investigating gesture-based avatar game representations in teenagers, younger and older adults Fulltext Access 11 Pages 2016
Exergaming and rehabilitation: A methodology for the design of effective and safe therapeutic exergames Fulltext Access 11 Pages 2016
Monitoring player attention: A non-invasive measurement method applied to serious games Fulltext Access 11 Pages 2016
Streamlining patient consultations for sleep disorders with a knowledge-based CDSS Fulltext Access 11 Pages 2016
The introduction of IMO, an integrated model for designing for open-ended play Fulltext Access 11 Pages 2016
Low power fixed priority scheduling sporadic task with shared resources in hard real time systems Fulltext Access 12 Pages 2016
New scoring formula to rank hypervisors’ performance complementing with statistical analysis using DOE Fulltext Access 12 Pages 2016
An energy-efficient task scheduling for mobile devices based on cloud assistant Fulltext Access 12 Pages 2016
Identity-based proxy re-encryption version 2: Making mobile access easy in cloud Fulltext Access 12 Pages 2016
Exploring cultural heritage repositories with creative intelligence. The Labyrinth 3D system Fulltext Access 12 Pages 2016
Probability-based reversible image authentication scheme for image demosaicking Fulltext Access 12 Pages 2016
Evaluating the cooling and computing energy demand of a datacentre with optimal server provisioning Fulltext Access 12 Pages 2016
Improved auto control ant colony optimization using lazy ant approach for grid scheduling problem Fulltext Access 12 Pages 2016
GCM implementations of Camellia-128 and SMS4 by optimizing the polynomial multiplier Fulltext Access 12 Pages 2016
Towards a data processing plane: An automata-based distributed dynamic data processing model Fulltext Access 12 Pages 2016
IoT-enabled emergency information supply chain architecture for elderly people: The Australian context Fulltext Access 12 Pages 2016
Detection of radioactive sources in urban scenes using Bayesian Aggregation of data from mobile spectrometers Fulltext Access 12 Pages 2016
Emulation of current excited fractional-order capacitors and inductors using OTA topologies Fulltext Access 12 Pages 2016
On the existence of an MVU estimator for target localization with censored, noise-free binary detectors Fulltext Access 12 Pages 2016
Empirical investigation of key business factors for digital game performance Fulltext Access 12 Pages 2016
Binary sieves: Toward a semantic approach to user segmentation for behavioral targeting Fulltext Access 12 Pages 2016
A low-cost, fault-tolerant and high-performance router architecture for on-chip networks Fulltext Access 13 Pages 2016
A novel security information and event management system for enhancing cyber security in a hydroelectric dam Fulltext Access 13 Pages 2016
Self-interference cancellation in full-duplex wireless with IQ imbalance Fulltext Access 13 Pages 2016
Runtime observation of functional safety properties in an automotive control network Fulltext Access 13 Pages 2016
Madeira Story Generator: Prospecting serendipitous storytelling in public spaces Fulltext Access 13 Pages 2016
Dominant handover algorithms for vehicular Radio-over-Fiber networks at 60 GHz: A performance evaluation study Fulltext Access 13 Pages 2016
Enhancing WiFi-fingerprinting accuracy using RSS calibration in dual-band environments Fulltext Access 13 Pages 2016
PeepList: Adapting ex-post interaction with pervasive display content using eye tracking Fulltext Access 13 Pages 2016
Segmenting human activities based on HMMs using smartphone inertial sensors Fulltext Access 13 Pages 2016
Algebraic soft decoding of Reed–Solomon codes with improved progressive interpolation Fulltext Access 13 Pages 2016
BiLink: A high performance NoC router architecture using bi-directional link with double data rate Fulltext Access 13 Pages 2016
A survey on compressive sensing techniques for cognitive radio networks Fulltext Access 13 Pages 2016
Further results on multicarrier MFSK based underwater acoustic communications Fulltext Access 13 Pages 2016
A secure and quality-aware prototypical architecture for the Internet of Things Fulltext Access 13 Pages 2016
Modeling and scheduling hybrid workflows of tasks and task interaction graphs on the cloud Fulltext Access 13 Pages 2016
Exploiting multimodal interactions in recommender systems with ensemble algorithms Fulltext Access 13 Pages 2016
AUPS: An Open Source AUthenticated Publish/Subscribe system for the Internet of Things Fulltext Access 13 Pages 2016
A novel framework for semantic entity identification and relationship integration in large scale text data Fulltext Access 13 Pages 2016
Scheduling online mixed-parallel workflows of rigid tasks in heterogeneous multi-cluster environments Fulltext Access 13 Pages 2016
A novel pseudo random number generator based cryptographic architecture using quantum-dot cellular automata Fulltext Access 13 Pages 2016
Self-managed cost-efficient virtual elastic clusters on hybrid Cloud infrastructures Fulltext Access 13 Pages 2016
Augmenting playspaces to enhance the game experience: A tag game case study Fulltext Access 13 Pages 2016
Adaptive Probabilistic Behavioural Learning System for the effective behavioural decision in cloud trading negotiation market Fulltext Access 13 Pages 2016
GAINE – A portable framework for the development of edutainment applications based on multitouch and tangible interaction Fulltext Access 13 Pages 2016
Modeling dynamic relationship types for subsets of entity type instances and across entity types Fulltext Access 13 Pages 2016
Forensic investigation framework for the document store NoSQL DBMS: MongoDB as a case study Fulltext Access 13 Pages 2016
TIṬAL – Asynchronous multiplayer shooter with procedurally generated maps Fulltext Access 13 Pages 2016
Improving the Area Efficiency of ACO-Based Routing by Directional Pheromone in Large-Scale NoCs Fulltext Access 14 Pages 2016
Design and implementation of instruction indirection for embedded software obfuscation Fulltext Access 14 Pages 2016
Line-impedance matching and signal conditioning capabilities for high-speed feed-forward voltage-mode transmit drivers Fulltext Access 14 Pages 2016
Multi-mode parallel and folded VLSI architectures for 1D-fast Fourier transform Fulltext Access 14 Pages 2016
Extraction and analysis of non-volatile memory of the ZW0301 module, a Z-Wave transceiver Fulltext Access 14 Pages 2016
A unified framework for designing high performance in-memory and hybrid memory file systems Fulltext Access 14 Pages 2016
Multi-sensor data fusion methods for indoor localization under collinear ambiguity Fulltext Access 14 Pages 2016
Hysteresis control by the number of active servers in queueing system MMAP/PH/NMMAP/PH/N with priority service Fulltext Access 14 Pages 2016