6 | -- | 0 | Pimwadee Chaovalit, Aryya Gangopadhyay, George Karabatis, Zhiyuan Chen. Discrete wavelet transform-based time series analysis and mining |
7 | -- | 0 | Aline Carneiro Viana, Stephane Maag, Fatiha Zaïdi. One step forward: Linking wireless self-organizing network validation techniques with formal testing approaches |
8 | -- | 0 | Guido Urdaneta, Guillaume Pierre, Maarten van Steen. A survey of DHT security techniques |
9 | -- | 0 | Felix C. Freiling, Rachid Guerraoui, Petr Kuznetsov. The failure detector abstraction |
10 | -- | 0 | Simon Parsons, Juan A. Rodríguez-Aguilar, Mark Klein. Auctions and bidding: A guide for computer scientists |
11 | -- | 0 | Changhai Nie, Hareton Leung. A survey of combinatorial testing |
12 | -- | 0 | Wei Jie, Junaid Arshad, Richard O. Sinnott, Paul Townend, Zhou Lei. A review of grid authentication and authorization technologies and support for federated access control |