


default search action
AICCSA 2008: Doha, Qatar
- The 6th ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2008, Doha, Qatar, March 31 - April 4, 2008. IEEE Computer Society 2008, ISBN 978-1-4244-1967-8

- Jinhui Chen, Zhongfu Ye, Min Tang:

A multipattern matching algorithm using sampling and bit index. 1-8 - Amin Zamiri, Amir Farzad, Ehsan Saboori

, Modjtaba Rouhani
, Mahmoud Naghibzadeh
:
An evolutionary gait generator with online parameter adjustment for humanoid robots. 9-14 - Ehsan Asgarian, M-Hossein Moeinzadeh, Sara Sharifian-R, Amir Najafi-Ardabili, Amin Ramezani, Jafar Habibi, Javad Mohammadzadeh

:
Solving MEC model of haplotype reconstruction using information fusion, single greedy and parallel clustering approaches. 15-19 - Benfano Soewito

, Ning Weng:
Methodology for evaluating string matching algorithms on multiprocessor. 20-27 - Javid Taheri

, Albert Y. Zomaya
, Bing Bing Zhou
:
RBT-I: A novel approach for solving the Multiple Sequence Alignment problem. 28-36 - Rehab M. Duwairi, Amal Kassawneh:

A framework for predicting proteins 3D structures. 37-44 - El-Ghazali Talbi, Laetitia Jourdan, José García-Nieto

, Enrique Alba
:
Comparison of population based metaheuristics for feature selection: Application to microarray data classification. 45-52 - Aiman H. El-Maleh

, Bashir M. Al-Hashimi, Aissa Melouki:
Transistor-level based defect tolerance for reliable nanoelectronics. 53-60 - Arash Mehdizadeh, Morteza Saheb Zamani

:
Proposing an efficient method to estimate and reduce crosstalk after placement in VLSI circuits. 61-68 - Truong Quang Vinh, Young-Chul Kim:

A low power crosstalk-free bus encoding using genetic algorithm. 69-73 - Pooya Davari

, Hamid Hassanpour
:
A variable step-size FxLMS algorithm for feedforward active noise control systems based on a new online secondary path modelling technique. 74-81 - Turki F. Al-Somani

, Alaaeldin Amin:
High performance elliptic curve point operations with pipelined GF(2m) field multiplier. 82-88 - Mona Safar, Mohamed Shalan

, M. Watheq El-Kharashi, Ashraf Salem
:
Hardware based algorithm for conflict diagnosis in SAT solver. 89-93 - Foad Lotfifar, Hadi Shahriar Shahhoseini

:
Performance modeling of partially reconfigurable computing systems. 94-99 - Chin-Hsien Wu:

A flash translation layer for huge-capacity flash memory storage systems. 100-107 - Sellappan Palaniappan, Rafiah Awang:

Intelligent heart disease prediction system using data mining techniques. 108-115 - Paulo M. Goncalves, Adrian L. Arnaud, Roberto Souto Maior de Barros:

DMPML Data Mining Preparation Markup Language. 116-125 - Ghazi Al-Naymat

:
Enumeration of maximal clique for mining spatial co-location patterns. 126-133 - Fadi K. Deeb

, Ludovít Niepel:
A methodology for discovering spatial co-location patterns. 134-141 - Majid Pourkashani, Mohammad Reza Kangavari:

A cellular automata approach to detecting concept drift and dealing with noise. 142-148 - Byung-Hoon Park, Nagiza F. Samatova, Rajesh Munavalli, Ramya Krishnamurthy, Houssain Kettani, Al Geist:

Rapid and robust ranking of text documents in a dynamically changing corpus. 149-155 - Abdelmalek Amine

, Zakaria Elberrichi, Ladjel Bellatreche, Michel Simonet, Mimoun Malki
:
Concept-based clustering of textual documents using SOM. 156-163 - Mohammad Alomari, Michael J. Cahill

, Alan D. Fekete, Uwe Röhm
:
When serializability comes without cost. 164-171 - Shariq Bashir

, Zahid Halim
, Abdul Rauf Baig:
Mining fault tolerant frequent patterns using pattern growth approach. 172-179 - Abhi Dattasharma, Praveen Kumar Tripathi:

Practical inter-stock dependency indicators using time series and derivatives. 180-187 - Ghazi Al-Naymat

, Javid Taheri
:
Effects of dimensionality reduction techniques on time series similarity measurements. 188-195 - Rana Malhas, Zaher Al Aghbari:

Using sensitivity of a bayesian network to discover interesting patterns. 196-205 - (Withdrawn) Detecting high-value individuals in covert networks: 7/7 London bombing case study. 206-215

- Mohammed Y. Aalsalem

, Javid Taheri
, Mohsin Iftikhar, Albert Y. Zomaya
:
Providing QoS guarantees to multiple classes of traffic in wireless sensor networks. 216-222 - Farzad Tashtarian

, Mohsen Tolou Honary, Majid Mazinani, A. T. Haghighat, Jalil Chitizadeh:
An energy efficient data reporting scheme for wireless sensor networks. 223-228 - Omid Abedi

, Mahmood Fathy, Jamshid Taghiloo:
Enhancing AODV routing protocol using mobility parameters in VANET. 229-235 - Najah A. Abu Ali

, Essa Ekram, Ali Eljasmy, Khaled Shuaib:
Measured delay distribution in a Wireless Mesh Network test-bed. 236-240 - Tao Liu, Depei Qian, Yongxiang Huang, Ying He, Rui Wang:

An evolutionary node architecture and performance optimization. 241-246 - Sanmin Liu, Hai Jin, Xiaofei Liao, Hong Yao, Deze Zeng:

TCPBridge: A software approach to establish direct communications for NAT hosts. 247-252 - Osama Abu-Rahmeh, Princy Johnson

:
Towards scalable and reliable Grid Networks. 253-259 - Lichen Zhang, Lihua Wang:

Aspect-oriented formal specification for multimedia systems. 260-267 - Abdul Aziz, Hesham El-Rewini:

Workflow scheduling in computational grids: Opportunistic vs. planned. 268-275 - Shariful Hasan Shaikot, Venkatesh Sarangan:

Energy aware routing in high capacity overlays in wireless sensor networks. 276-283 - Farzad Tashtarian

, Mohsen Tolou Honary, Majid Mazinani, A. T. Haghighat, Jalil Chitizadeh:
A new level based clustering scheme for wireless sensor networks. 284-290 - Jiguo Yu

, Wenjun Liu, Jingjing Song, Baoxiang Cao:
EEMR: An energy-efficient multi-hop routing protocol for wireless sensor networks. 291-298 - S. Ali, A. Fakoorian, Mohsen Tolou Honary, Hassan Taheri:

Energy assignment in wireless sensor networks with hierarchical cluster-based routing. 299-303 - Esa Alghonaim, Aiman El-Maleh

, Mohamed Adnan Landolsi:
Using input/output queues to increase LDPC decoder performance. 304-308 - Ibrahim Y. Abualhaol, Mustafa M. Matalgah:

Capacity analysis of MIMO system over Nakagami-m fading channels using Finite Mixture with Expectation Maximization algorithm. 309-316 - Mohammad Hayajneh

, Chaouki T. Abdallah, Walid Ibrahim
:
Impact of fading wireless channel on the performance of game theoretic power control algorithms for CDMA wireless data. 317-324 - Kyu-Sung Hwang, Young-Chai Ko, Mohamed-Slim Alouini

, Wooyong Lee:
Slow antenna selection and fast link adaptation MIMO systems. 325-332 - Badis Tebbani, Issam Aib, Guy Pujolle:

SLA-based dynamic resource management in wireless environments. 333-340 - Ayman Abdel-Hamid, Lobna Eslim, Yasser Y. Hanafy:

Enhanced mobile node's reachability through anycasting for MIPv6 regional registrations. 341-348 - Hongbo Liu, Wei Zhang:

Self-localization based on improved subspace approach in wireless sensor network. 349-354 - Soufiene Djahel

, Farid Naït-Abdesselam:
Avoiding virtual link attacks in wireless ad hoc networks. 355-360 - Sanaa Sharafeddine

, Zaher Dawy, Amjad Beainy:
Network provisioning over IP networks with call admission control schemes. 361-365 - Jalel Ben-Othman

, Farid Naït-Abdesselam, Lynda Mokdad, Octavio Ramirez Rojas:
Performance evaluation of TCP handoffs over mobile IP connections. 366-372 - Tarek Bejaoui, Nidal Nasser

:
Handover and class-based Call Admission Control policy for 4G-heterogeneous mobile networks. 373-380 - Rami Tawil

, Jacques Demerjian
, Guy Pujolle, Oscar Salazar Gaitán:
Processing-delay reduction during the vertical handoff decision in heterogeneous wireless systems. 381-385 - Abdul-Rahman Elshafei, Uthman Baroudi

:
Wireless Fair Queuing algorithm for window-based Link Level Retransmission. 386-391 - Khaled Salah

, F. Haidari:
On the performance of a simple packet rate estimator. 392-395 - Mohammad Al Nabhan, Suleiman Al Masri, Wamadeva Balachandran, Ziad Hunaiti

:
A critical assessment for RINEX data from OS NET for GPS accuracy improvement. 396-402 - Omar M. Hammouri, Mustafa M. Matalgah:

Voronoi path planning technique for recovering communication in UAVs. 403-406 - Mourad Amad

, Ahmed Meddahi:
A scalable P2P model for optimizing application layer multicast. 407-413 - Ruay-Shiung Chang, Hui-Ping Chang, Yun-Ting Wang:

A dynamic weighted data replication strategy in data grids. 414-421 - Khalid Abdelkader, Jan Broeckhove, Kurt Vanmechelen:

Commodity resource pricing in dynamic computational grids. 422-429 - Hadi Salimi, Mohsen Sharifi

:
OTSX: An extended transaction service in support of FT-CORBA standard. 430-435 - Ali Elghirani

, Riky Subrata, Albert Y. Zomaya
, Ali Al Mazari
:
Performance enhancement through hybrid replication and Genetic Algorithm co-scheduling in data grids. 436-443 - Ch. D. V. Subba Rao, M. M. Naidu:

A new, efficient coordinated checkpointing protocol combined with selective sender-based message logging. 444-447 - Farshad Safaei, Ahmad Khonsari

, Amirhossein Shantia:
Comparative performance evaluation of software-based fault-tolerant routing algorithms in adaptively-routed tori. 448-455 - Audrey Marchand, Maryline Silly-Chetto

:
Dynamic scheduling of periodic skippable tasks in an overloaded real-time system. 456-464 - Lars Lundberg, Håkan Lennerstad:

Slack-based global multiprocessor scheduling of aperiodic tasks in parallel embedded real-time systems. 465-472 - Med Amine Haddar, Ahmed Hadj Kacem, Yves Métivier, Mohamed Mosbah

, Mohamed Jmaiel:
Electing a leader in the local computation model using mobile agents. 473-480 - Ning Weng, Nandeesh Kumar, Satish Dechu, Benfano Soewito

:
Mapping task graphs onto Network Processors using genetic algorithm. 481-488 - Jafar Ramadhan Mohammed

:
Real-time implementation of an efficient RLS algorithm based on IIR filter for acoustic echo cancellation. 489-494 - Afsaneh Asaei, Mohammad Javad Taghizadeh, Hossein Sameti:

Far-field continuous speech recognition system based on speaker Localization and sub-band Beamforming. 495-500 - Pejman Mowlaee Begzade Mahale, Mahsa Rashidi, Abolghasem Sayadiyan:

A model order based sinusoid representation for audio signals. 501-507 - Jafar Ramadhan Mohammed

:
A new robust adaptive beamformer for enhancing speech corrupted with colored noise. 508-515 - Nakissa Barzegar, Mohammad Shahram Moin

:
A new approach for iris localization in iris recognition systems. 516-523 - Hamid Tabatabaee Yazdi

, Amin Milani Fard, Mohammad R. Akbarzadeh-Totonchi:
Cooperative criminal face recognition in distributed web environment. 524-529 - Farid Benhammadi, Kadda Bey-Beghdad, Hamid Hentous:

Fingerprint verification based on core point neighbourhoods minutiae. 530-536 - Farid Benhammadi, Nassima Kihal:

Personal authentication based on iris texture analysis. 537-543 - El-Sayed M. El-Alfy

, Fares S. Al-Qunaieer:
A fuzzy similarity approach for automated spam filtering. 544-550 - Mahdieh Soleymani Baghshah, Saeed Bagheri Shouraki, Caro Lucas:

An agent-based clustering algorithm using potential fields. 551-558 - Mahdieh Soleymani Baghshah, Saeed Bagheri Shouraki:

A fuzzy clustering algorithm for finding arbitrary shaped clusters. 559-566 - Mohammed Waleed Ashour

, Mahmoud F. Hussin, Khaled Mohammed Mahar:
Supervised texture classification using several features extraction techniques based on ANN and SVM. 567-574 - Abolfazl Lakdashti, Mohammad Shahram Moin

, Kambiz Badie:
Semantic-based image retrieval: A fuzzy modeling approach. 575-581 - Somaya Al-Máadeed

, Eman Mohammed, Dori Al Kassis:
Writer identification using edge-based directional probability distribution features for arabic words. 582-590 - Mohammad Reza Soheili

:
Redundant watermarking using wavelet packets. 591-598 - François Meunier, David Laperrière:

A video-based image processing system for the automatic implementation of the eye involuntary reflexes measurements involved in the Drug Recognition Expert (DRE). 599-605 - Farhad Mohamad Kazemi, Jalaleddin Izadian, Reihaneh Moravejian, Ehsan Mohamad Kazemi:

Numeral recognition using curvelet transform. 606-612 - Abheek Saha, Seema Garg:

ALSD: An algorithm for noise erasure and structural information recovery for surfaces with structural discontinuities. 613-622 - Ehsan Shahrian, Hossein Karshenas

, Mahmood Fathy:
A similarity-window based background estimation approach. 623-628 - Sherif G. Moursi, Mahmoud R. El-Sakka:

Active contours initialization for ultrasound carotid artery images. 629-636 - M. Usman Akram, Anam Tariq, Sarwat Nasir, Assia Khanam:

Core point detection using improved segmentation and orientation. 637-644 - Saeed Samet

, Ali Miri:
Privacy preserving ID3 using Gini Index over horizontally partitioned data. 645-651 - Jianwen Xiang, Dines Bjørner, Kokichi Futatsugi:

Formal digital license language with OTS/CafeOBJ method. 652-660 - Syrine Tlili, Mourad Debbabi

:
A novel flow-sensitive type and effect analysis for securing C code. 661-668 - Abdulsalam Yassine

, Shervin Shirmohammadi
:
Privacy and the market for private data: A negotiation model to capitalize on private data. 669-678 - Ahmed Alazzawe, Anis Nawaz, Duminda Wijesekera:

Extracting Kerberos passwords through RC4-HMAC encryption type analysis. 679-685 - Roya Ensafi, Soheila Dehghanzadeh, Mohammad R. Akbarzadeh-Totonchi:

Optimizing Fuzzy K-means for network anomaly detection using PSO. 686-693 - Dieaa I. Nassr

, Hatem M. Bahig, Ashraf Bhery, Sameh S. Daoud:
A new RSA vulnerability using continued fractions. 694-701 - Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:

Managing access and flow control requirements in distributed workflows. 702-710 - Yacine Rebahi, Jordi Jaen Pallares, Tuan Minh Nguyen, Sven Ehlert, Gergely Kovacs, Dorgham Sisalem:

Performance analysis of identity management in the Session Initiation Protocol (SIP). 711-717 - Jianming Fu, Huijun Xiong, Zhou Li

, Huanguo Zhang:
PerformTrust: Trust model integrated past and current performance in P2P file sharing systems. 718-725 - Abdelli Abdelkrim

, Dahbia Yahiatene:
Efficient computation of state space over approximation of preemptive real time systems. 726-733 - Noureddine Adjir, Pierre de Saqui-Sannes

, Mustapha Kamel Rahmouni:
Test of preemptive real-time systems. 734-742 - Chafia Bouanaka

, Faiza Belala:
Towards a mobile architecture description language. 743-748 - Hossein Keramati, Seyed-Hassan Mirian-Hosseinabadi:

Integrating software development security activities with agile methodologies. 749-754 - Jens Bruhn, Christian Niklaus, Thomas Vogel

, Guido Wirtz
:
Comprehensive support for management of enterprise applications. 755-762 - Khaled M. Khan

:
Assessing quality of web based systems. 763-769 - Zakaria Maamar, Djamal Benslimane:

Exceptions in a Web services environment. 770-777 - Emad Ghosheh, Sue Black, Jihad Qaddour:

Design metrics for web application maintainability measurement. 778-784 - Yacine Kissoum

, Zaïdi Sahnoun:
A Recursive Colored Petri Nets semantics for AUML as base of test case generation. 785-792 - Youcef Hammal

:
A modular state exploration and compatibility checking of UML dynamic diagrams. 793-800 - Maryam Razavian, Ramtin Khosravi:

Modeling variability in the component and connector view of architecture using UML. 801-809 - Soraya Kouadri Mostéfaoui:

A context model based on UML and XML schema representations. 810-814 - Moutaz Saleh Mustafa

, Zulaiha Ali Othman:
Efficient Hierarchical Diff-EDF schedulability for QoS packet networks. 815-819 - G. Balasubramanian, Saswat Chakrabarti:

Modelling information generation in event-driven sensor networks. 820-823 - Amer M. Magableh, Mustafa M. Matalgah:

Error rate performance for coherent modulation techniques with switched and examine diversity combining over Weibull fading channels. 824-829 - Gilbert Sawma, Issam Aib, Kablan Barbar, Guy Pujolle:

A Recursive Load Balancing technique for VoIP-dedicated WLANs. 830-833 - Louis Rompre, Ismaïl Biskri

, François Meunier:
Text classification: A preferred tool for audio file classification. 834-839 - Mohsen Sharifi

, Seyed Hossein Siadati
:
A phishing sites blacklist generator. 840-843 - Mohammad Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza:

Steganography in SMS by Sudoku puzzle. 844-847 - Yacine Rebahi, Muhammad Sher

, Thomas Magedanz:
Detecting flooding attacks against IP Multimedia Subsystem (IMS) networks. 848-851 - M. Hadi Mashinchi, Siti Mariyam Hj. Shamsuddin:

A connectionist system approach for learning logic programs. 852-855 - Xing Fang, Dong Wang, Shuming Chen:

SPVA: A novel digital signal processor architecture for Software Defined Radio. 856-859 - Turki F. Al-Somani

, Alaaeldin Amin:
An efficient high performance scalar multiplication method with resistance against timing attacks. 860-865 - Zohreh Seyyedsalehi, Ali Motie Nasrabadi

, Vahid Abootalebi:
Committee machines and quadratic B-spline wavelet for the P300 speller paradigm. 866-869 - Mahmoud F. Hussin, Ibrahim El Rube

, Mohamed S. Kamel
:
Enhanced document clustering using fusion of multiscale wavelet decomposition. 870-874 - Fatma Ayari, Ali T. Alouani, Mekki Ksouri

:
Wavelets: An efficient tool for lung sounds analysis. 875-878 - Walid Elloumi, Mohamed Chakroun, Moncef Charfi, Mohamed Adel Alimi

:
Compression of the images of ancient Arab manuscript documents based on segmentation. 879-883 - Uvais Qidwai

, Mohammed Maqbool:
On hybrid-fuzzy classifier design: An empirical modeling scenario for corrosion detection in gas pipelines. 884-890 - Majid A. Al-Taee

, Mohammed Al-Rawi
, Fadi M. Al-Ghawanmeh:
Time-frequency analysis of the Arabian flute (Nay) tone applied to automatic music transcription. 891-894 - Thierry Antoine-Santoni

, Jean François Santucci, Emmanuelle de Gentili, Bernadette Costa:
DEVS-WSN : A discrete event approach for Wireless Sensor Network simulation. 895-898 - Hamid Mcheick

, Hafedh Mili, Eric Dallaire, Rakan Mcheik:
Delegation model for object-oriented systems. 899-902 - Hamid Bagheri, Vajih Montaghami, Gholamreza Safi, Seyed-Hassan Mirian-Hosseinabadi:

An evaluation method for aspectual modeling of distributed software architectures. 903-908 - Wadha K. Lebda, Noura Fetais, Suad Al Hussaini, Sahar smail, Qutaibah M. Malluhi:

Intelligent virtual archiving for accessing news article repositories. 909-912 - David L. Duke, Charles E. Thorpe, Mazahir Mahmoud, Mahmoud Zirie

:
Intelligent Diabetes Assistant: Using machine learning to help manage diabetes. 913-914 - Hassiba Nemmour

, Youcef Chibani
:
New technique in the use of tangent vectors for a robust handwritten digit recognition. 915-916 - Nuria Gómez Blas

, Luis F. Mingo
, Juan Castellanos:
Networks of evolutionary processors with a self-organizing learning. 917-918 - Sharifah Mumtazah Syed Ahmad

, Asma Shakil
, Abdul Rahim Ahmad
, Mustafa Agil Muhamad Balbed, Rina Bt. Md. Anwar:
SIGMA - A Malaysian signatures' database. 919-920 - Xin Zhao, Myung-Eun Lee, Soo-Hyung Kim:

Improved image segmentation method based on optimized threshold using Genetic Algorithm. 921-922 - Somaya Al-Máadeed

, Amat-AlAleem Al-Kurbi, Amal Al-Muslih, Reem Al-Qahtani, Haend Al Kubisi:
Writer identification of Arabic handwriting documents using grapheme features. 923-924 - Hani Mahdi

, Sally S. Attia:
MASCE: A Multi-Agent System for Collaborative E-Learning. 925-926 - Mohamed Fezari

, Hamza Attoui, Mouldi Bedda:
Arabic spotted words recognition system based on HMM approach to control a didactic manipulator. 927-928 - Somaya Al-Máadeed

, Fatima Amire, Sara Khalily Hamza, Wadha Al-lebda:
Forensic handwritten document management system. 929-930 - Qasim M. Chaudhari, Erchin Serpedin

:
Estimation of clock parameters and performance benchmarks for synchronization in Wireless Sensor Networks. 931-932 - Soraya Kouadri Mostéfaoui:

Suitability of context models for service-oriented environments. 933-934 - Noora AlNaimi, Nuha Barhoum

, Abeer Nasser, Alia Swidan, Qutaibah M. Malluhi:
A system for automatic gathering and intelligent analyses of Doha traffic data. 935-936 - Myung-Eun Lee, Soo-Hyung Kim, Wan Hyun Cho, Xin Zhao:

Segmentation of medical image based on mean shift and deterministic annealing EM algorithm. 937-938 - Fatiha Bouabache, Thomas Hérault

, Gilles Fedak, Franck Cappello:
Hierarchical replication techniques to ensure checkpoint storage reliability in grid environment. 939-940 - Mohamed S. Hassan

, Taha Landolsi, Mohamed G. El-Tarhuni:
A fair scheduling algorithm for video transmission over wireless packet networks. 941-942 - Foued Melakessou, Ulrich Sorger, Zdzislaw Suchanecki:

How can path diversity help transmission protocols in the achievement of a better connection QOS? 943-944 - Jihad M. Alja'am, Haya Alsuwaidi, Noor Alkuwari, Hamda Aldosari:

Tutorials-based system to assist Qatari children with special needs. 945-946 - Nikos Zotos

, Georgios Xilouris
, Evangelos Pallis
, Anastasios Kourtis:
An MPLS-DiffServ experimental core network infrastructure for E2E QoS content delivery. 947-951 - Evangelos K. Markakis, Anargyros Sideris, Evangelos Pallis

, Vassilios Zacharopoulos:
Differentiated services provision in a converged DVB/IP networking environment. 952-957 - Nader Mbarek, Francine Krief, Daniel Négru:

SLNP usage for QoS negotiation in heterogeneous environments. 958-963 - Mamadou Sidibé, Ahmed Mehaoua:

QoS monitoring framework for end-to-end service management in wired and wireless networks. 964-968 - Christian Timmerer, Víctor H. Ortega, José María González Calabozo, Alberto León:

Measuring quality of experience for MPEG-21-based cross-layer multimedia content adaptation. 969-974 - Mubashar Mushtaq, Toufik Ahmed

:
P2P-based mobile IPTV: Challenges and opportunities. 975-980 - Beilu Shao, Marco Mattavelli, Maria Teresa Andrade

, Samuel Keller, Giorgiana Ciobanu, Pedro Carvalho
:
Multimedia terminal architecture: An inter-operable approach. 981-986 - Amir Djouama, Marwen Abdennebi, Samir Tohmé:

Optimizing resources utilization in heterogeneous wireless networks. 987-992 - Ismail Djama, Toufik Ahmed

, Daniel Négru:
Adaptive cross-layer fragmentation for QoS-based wireless IPTV services. 993-998 - Bader Al-Manthari, Najah A. Abu Ali

, Nidal Nasser
, Hossam S. Hassanein
:
Frame-level dynamic bandwidth provisioning for QoS-enabled broadband wireless networks. 999-1004 - Reza GhasemAghaei, Abu Saleh Md. Mahfujur Rahman, Md. Abdur Rahman, Wail Gueaieb:

Ant colony-based many-to-one sensory data routing in Wireless Sensor Networks. 1005-1010 - Mubashar Mushtaq, Toufik Ahmed

:
Multimedia caching integration for efficient content delivery over heterogeneous networks. 1011-1012 - Artur Lugmayr

:
The ENTHRONE 2 metadata management tool (MATool) (WISE 2008 MATool demonstration). 1013-1018 - Olimpiu Negru:

End-to-End QoS through integrated management of content, networks and terminals: The ENTHRONE project. 1019-1020 - Michel Houtermans, Mufeed Al-Ghumgham, Tino Vande Capelle:

Improve industrial process plant safety & availability via reliability engineering. 1021-1026 - Heinz Gall:

Functional safety IEC 61508 / IEC 61511 the impact to certification and the user. 1027-1031 - Michael Short

:
Development guidelines for dependable real-time embedded systems. 1032-1039 - Hans-Dieter Wacker, Josef Börcsök, Hartmut Hillmer

:
Redundant optical data transmission using semiconductor lasers. 1040-1045 - Josef Börcsök, Ali Hayek, Muhammad Umar:

Implementation of a 1oo2-RISC-architecture on FPGA for safety systems. 1046-1051 - Josef Börcsök, Peter Holub:

Different approaches for probability of common cause failure on demand calculations for safety integrity systems. 1052-1057 - Michael H. Schwarz, Huiyun Sheng, Oleksandr Sheleh, Josef Börcsök:

Matlab® / Simulink® generated source code for safety related systems. 1058-1063 - Azzedine Boukerche, Anis Zarrad, Regina Borges de Araujo:

A heterogeneous network architecture based Gnutella for mobile emergency preparedness applications. 1064-1069 - Eliamani Sedoyeka, Ziad Hunaiti

, Mohammad Al Nabhan, Wamadeva Balachandran:
WiMAX Mesh networks for underserved areas. 1070-1075 - Fatma Bouabdallah, Nizar Bouabdallah, Raouf Boutaba:

Analysis of the latency-lifetime tradeoff in wireless sensor networks. 1076-1081 - Issam Elarbaoui, Hazem H. Refai:

Enhancement of IEEE 802.11 DCF backoff algorithm under heavy traffic. 1082-1087 - Samuel Cheng, Lina Stankovic

, Vladimir Stankovic
, Hazem H. Refai:
Cumulative intelligence gathering for smart vehicles. 1088-1093 - André Herms, Georg Lukas:

Preventing admission failures of bandwidth reservation in wireless mesh networks. 1094-1099 - Sonia Waharte, Brent Ishibashi, Raouf Boutaba, Djamal-Eddine Meddour:

Performance study of wireless mesh networks routing metrics. 1100-1106 - Mohammed Nadhmi Miladi, Mohamed Hadj Kacem

, Achraf Boukhris, Mohamed Jmaiel, Khalil Drira:
A UML rule-based approach for describing and checking dynamic software architectures. 1107-1114

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














