Search
Now showing items 31-40 of 742
MESP: A Modified IPSec for Secure Multicast Communication
(
IEEE
, 2006 , Article)
We propose the multicast encryption security protocol MESP. It is driven form the IPSEC ESP. The specification of the protocol are discussed and applied the existing IPSEC ESP. We use the existing implementation of the ...
Performance analysis of a cell-based call admission control scheme for QoS support in multimedia wireless networks
(
John Wiley & Sons, Ltd.
, 2010 , Article)
Next generation wireless communication systems, including 3G and 4G technologies, are envisaged to support more mobile users and a variety of high-bandwidth multimedia services. Different multimedia services have diverse ...
DiSWOP: A novel measure for cell-level protein network analysis in localized proteomics image data
(
Oxford Journals
, 2014 , Article)
Motivation: New bioimaging techniques have recently been proposed to visualize the colocation or interaction of several proteins within individual cells, displaying the heterogeneity of neighbouring cells within the same ...
A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems
(
Springer
, 2014 , Article)
In a cloud computing paradigm, energy efficient allocation of different virtualized ICT resources (servers, storage disks, and networks, and the like) is a complex problem due to the presence of heterogeneous application ...
Towards agile approach for better user satisfaction
(
Mundo Press
, 2014 , Article)
User satisfaction is a cornerstone indicator of any successful software project. Software projects are classified as successful only if the users are satisfied with the delivered software project result. Reducing the gap ...
Evaluation model for e-tourism product: A hidden Markov model-based algorithm
(
Inderscience
, 2014 , Article)
Nowadays, e-tourism is widely pronounced as a kind of web marketing for tourism businesses. Tourist agencies and tourism service providers are able to access their customers directly in a cost-effective way. In this context, ...
G-RAT | A novel graphical randomized authentication technique for consumer smart devices
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
User authentication is the process that is exercised millions of times around the globe by using different techniques and methods. The most prominent way of authentication is alphanumerical password forms that have been ...
A PLM components monitoring framework for SMEs based on a PLM maturity model and FAHP methodology
(
Mundo Press
, 2014 , Article)
Right PLM components selection and investments increase business advantages. This paper develops a PLM components monitoring framework to assess and guide PLM implementation in small and middle enterprises (SMEs). The ...
Coalitional double auction for spatial spectrum allocation in cognitive radio networks
(
IEEE
, 2014 , Article)
Recently, many dynamic spectrum allocation schemes based on economics are proposed to improve spectrum utilization in cognitive radio networks (CRNs). However, existing mechanisms do not take into account the economic ...
Software project management: Theory of constraints, risk management, and performance evaluation
(
Mundo Press
, 2014 , Article)
Constraints and risks are two critical factors that affect software project performance; more attention needs to be paid to constraints and risks in order to improve performance. In this paper, investigation will take place ...