default search action
Computers & Electrical Engineering, Volume 35
Volume 35, Number 1, January 2009
- Seher Sener, Ibrahim Develi, Nurhan Karaboga:
Further performance analysis of the generalized MC DS-CDMA system in Nakagami-m fading channels. 1-8 - Baoyuan Kang, Colin Boyd, Ed Dawson:
A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. 9-17 - Christopher Martinez, Mythri Pinnamaneni, Eugene B. John:
Performance of commercial multimedia workloads on the Intel Pentium 4: A case study. 18-32 - Wen-Shenq Juang, Jing-Lin Wu:
Two efficient two-factor authenticated key exchange protocols in public wireless LANs. 33-40 - Tzungher Chen, Wei-Bin Lee, Hsing-Bai Chen:
A self-verification authentication mechanism for mobile satellite communication systems. 41-48 - Baoyuan Kang, Colin Boyd, Ed Dawson:
Identity-based strong designated verifier signature schemes: Attacks and new construction. 49-53 - Miguel Morales-Sandoval, Claudia Feregrino Uribe, René Cumplido, Ignacio Algredo-Badillo:
An area/performance trade-off analysis of a GF(2m) multiplier architecture for elliptic curve cryptography. 54-58 - Wei Zhang, Liansheng Tan, Gang Peng:
Dynamic queue level control of TCP/RED systems in AQM routers. 59-70 - Erdinç Öztürk, Berk Sunar, Erkay Savas:
A versatile Montgomery multiplier architecture with characteristic three support. 71-85 - Feng Cao, Zhenfu Cao:
A secure identity-based multi-proxy signature scheme. 86-95 - Azizollah Jamshidi, Bizhan Karimi-Birgani:
Multiple partner coded cooperation scheme for wireless communications and its performance analysis for two cooperative users. 96-106 - Hyun Seok Kim, Jin-Young Choi:
Enhanced password-based simple three-party key exchange protocol. 107-114 - Cihan Topal, Cuneyt Akinlar:
Secure seamless peer-to-peer (P2P) UDP communication using IPv4 LSRR option and IPv4+4 addresses. 115-125 - Ali A. Kanso:
An efficient cryptosystem Delta for stream cipher applications. 126-140 - Ying Zheng, Guangyao Li, Xiehua Sun, Xinmin Zhou:
Fast edge integration based active contours for color images. 141-149 - Baodong Qin, Ming Li, Fanyu Kong, Daxing Li:
New left-to-right minimal weight signed-digit radix-r representation. 150-158 - Soonhak Kwon, Chang Hoon Kim, Chun Pyo Hong:
More efficient systolic arrays for multiplication in GF(2m) using LSB first algorithm with irreducible polynomials and trinomials. 159-167 - Jamal-Deen Abdulai, Mohamed Ould-Khaoua, Lewis M. Mackenzie:
Adjusted probabilistic route discovery in mobile ad hoc networks. 168-182 - Wei Lu, Wei Sun, Hongtao Lu:
Robust watermarking based on DWT and nonnegative matrix factorization. 183-188 - Zuhua Shao:
Dynamic and efficient joint encryption scheme in the plain public key model. 189-196 - Omar M. Al-Jarrah, Omar Megdadi:
Enhanced AODV routing protocol for Bluetooth scatternet. 197-208
- D. Gnanadurai, V. Sadasivam, J. Paul Tiburtius Nishandh, L. Muthukumaran, C. Annamalai:
Undecimated double density wavelet transform based speckle reduction in SAR images. 209-217 - P. P. Sahu, Mahipal Singh:
Multichannel direct sequence spectrum signaling using code phase shift keying. 218-226
Volume 35, Number 2, March 2009
- Saraju P. Mohanty, Nasir D. Memon, Karam S. Chatha:
Circuits and systems for real-time security and copyright protection of multimedia. 231-234 - P. P. Deepthi, Deepa Sara John, P. S. Sathidevi:
Design and analysis of a highly secure stream cipher based on linear feedback shift register. 235-243 - Behnam Ghavami, Hossein Pedram, Mehrdad Najibi:
An EDA tool for implementation of low power and secure crypto-chips. 244-257 - Radha Guha, Nader Bagherzadeh, Pai H. Chou:
Resource management and task partitioning and scheduling on a run-time reconfigurable embedded system. 258-285 - Youtao Zhang, Jun Yang, Lan Gao:
Supporting flexible streaming media protection through privacy-aware secure processors. 286-299 - P. P. Deepthi, V. S. Nithin, P. S. Sathidevi:
Implementation and analysis of stream ciphers based on the elliptic curves. 300-314 - Olga Gelbart, Eugen Leontie, Bhagirath Narahari, Rahul Simha:
A compiler-hardware approach to software protection for embedded systems. 315-328 - Santosh Ghosh, Monjur Alam, Dipanwita Roy Chowdhury, Indranil Sengupta:
Parallel crypto-devices for GF(p) elliptic curve multiplication resistant against side channel attacks. 329-338 - Elias Kougianos, Saraju P. Mohanty, Rabi N. Mahapatra:
Hardware assisted watermarking for multimedia. 339-358 - Amir Moradi, Mohammad Taghi Manzuri Shalmani, Mahmoud Salmasizadeh:
Dual-rail transition logic: A logic style for counteracting power analysis attacks. 359-369 - Neng-Wen Wang, Yueh-Min Huang:
A novel software key container in on-line media services. 370-375 - Pramod A. Jamkhedkar, Gregory L. Heileman:
Digital rights management architectures. 376-394 - Ju Wang, Jonathan C. L. Liu, Mbonisi Masilela:
A real-time video watermarking system with buffer sharing for video-on-demand service. 395-414 - Santi P. Maity, Malay K. Kundu, Seba Maity:
Dual purpose FWT domain spread spectrum image watermarking in real time. 415-433
Volume 35, Number 3, May 2009
- Wen-Fang Yen, Shingchern D. You, Yung-Chao Chang:
Real-time FFT with pre-calculation. 435-440 - Niyazi Odabasioglu, Osman N. Uçan:
Multilevel turbo coded-continuous phase frequency shift keying (MLTC-CPFSK). 441-449 - Khaled A. Mayyas:
Low complexity LMS-type adaptive algorithm with selective coefficient update for stereophonic acoustic echo cancellation. 450-458 - Vikram Simhadri, Yusuf Ozturk:
RASCor: An associative hardware algorithm for real time stereo. 459-477 - Pin-Chang Su, Chien-Hua Tsai:
New cryptosystems design based on hybrid-mode problems. 478-484 - Tamer Tulgar, Muhammed Salamah:
Performance analysis of a threshold based distributed channel allocation algorithm for cellular networks. 485-496 - Zuhua Shao:
Provably secure proxy-protected signature schemes based on RSA. 497-505 - Mingquan Fan, Hongxia Wang:
Chaos-based discrete fractional Sine transform domain audio watermarking scheme. 506-516 - M. Ali Aydin, Abdül Halim Zaim, K. Gökhan Ceylan:
A hybrid intrusion detection system design for computer network security. 517-526
Volume 35, Number 4, July 2009
- Hasan Al-Nashash:
Innovations in communications electronics and control. 527 - Vahideh Vakil, Hassan Aghaeinia:
Throughput analysis of STS-based CDMA system with variable spreading factor in non-frequency selective Rayleigh fading channel. 528-535 - Mani Ranjbar, Shohreh Kasaei:
Spatial error concealment: A novel exemplar-based approach using segmentation. 536-548 - Abdul-Karim A.-R. Kadhim, Abdul-Aziz A. Hussain:
Hierarchical matched filter based on FPGA for mobile systems. 549-555 - Ibrahim M. Al Abdulmohsin:
Techniques and algorithms for access control list optimization. 556-566 - M. Narayanan, Hasan Al-Nashash:
Introducing undergraduate students to simulation of semiconductor doping techniques. 567-577 - M. Shakil, Moustafa Elshafei, Mohamed A. Habib, F. A. Maleki:
Soft sensor for NOx and O2 using dynamic neural networks. 578-586 - Wael Saleh, Nasser Qaddoumi:
Potential of near-field microwave imaging in breast cancer detection utilizing tapered rectangular waveguide probes. 587-593 - A. H. M. A. Rahim, M. Ahsanul Alam, M. F. Kandlawala:
Dynamic performance improvement of an isolated wind turbine induction generator. 594-607
Volume 35, Number 5, September 2009
- Jiann-Liang Chen, Ming-Chiao Chen, Yan-Cheng Chang:
Enhancing WLAN/UMTS dual-mode services using a novel distributed multi-agent scheduling scheme. 609-621 - Jun-Bo Wang, Ming Chen, Jiangzhou Wang:
Adaptive channel and power allocation of downlink multi-user MC-CDMA systems. 622-633 - Félix J. García Clemente, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta:
Multi-layer framework for analysing and managing routing configurations. 634-643 - Hafizur Rahaman, Debesh K. Das, Bhargab B. Bhattacharya:
Testable design of AND-EXOR logic networks with universal test sets. 644-658 - Chien-Hung Huang:
Strongly Hamiltonian laceability of the even k-ary n-cube. 659-663 - Xiangxue Li, Dong Zheng, Kefei Chen, Jianhua Li:
Democratic group signatures with collective traceability. 664-672 - Hazem Al-Otum, Allam O. Al-Taba'a:
Adaptive color image watermarking based on a modified improved pixel-wise masking technique. 673-695 - Zuoyong Li, Chuancai Liu:
Gray level difference-based transition region extraction and thresholding. 696-704 - Sheng Zhong:
Identity-based mix: Anonymous communications without public key certificates. 705-711 - Tudor Barbu:
Novel automatic video cut detection technique using Gabor filtering. 712-721 - Youcef Ferdi:
Impulse invariance-based method for the computation of fractional integral of order 0alpha. 722-729 - Kanyapat Watcharasitthiwat, Paramote Wardkein:
Reliability optimization of topology communication network design using an improved ant colony optimization. 730-747 - Xianghui Cao, Jiming Chen, Chuanhou Gao, Youxian Sun:
An optimal control method for applications using wireless sensor/actuator networks. 748-756 - Chin-Chen Chang, Shih-Chang Chang, Jung-San Lee:
An on-line electronic check system with mutual authentication. 757-763 - Yun-Lung Chen, Chienhua Chen:
Performance analysis of non-preemptive GE/G/1 priority queueing of LER system with bulk arrivals. 764-789 - Syed Mahfuzul Aziz:
A cycle-accurate transaction level SystemC model for a serial communication bus. 790-802 - Fernando Pardo, Jose Antonio Boluda:
SimuRed: A flit-level event-driven simulator for multicomputer network performance evaluation. 803-814
Volume 35, Number 6, November 2009
- Mei Yang, Yingtao Jiang, Ling Wang, Yulu Yang:
High performance computing architectures. 815-816 - Peng Liu, Bingjie Xia, Chunchang Xiang, Xiaohang Wang, Weidong Wang, Qingdong Yao:
A networks-on-chip architecture design space exploration - The LIB. 817-836 - Seung Eun Lee, Nader Bagherzadeh:
A high level power model for Network-on-Chip (NoC) router. 837-845 - Ling Wang, Hui Song, Yingtao Jiang, Lihong Zhang:
A routing-table-based adaptive and minimal routing scheme on network-on-chip architectures. 846-855 - Lei Zhang, Mei Yang, Yingtao Jiang, Emma E. Regentova:
Architectures and routing schemes for optical network-on-chips. 856-877 - Yitzhak Birk, Evgeny Fiksman:
Dynamic reconfiguration architectures for multi-context FPGAs. 878-903 - Lu Yan, Zheng Liang:
An accelerator design for speedup of Java execution in consumer mobile devices. 904-919 - Behnam Ghavami, Hossein Pedram:
High performance asynchronous design flow using a novel static performance analysis method. 920-941 - Qiang Dong, Xiaofan Yang, Juan Zhao:
Embedding a fault-free hamiltonian cycle in a class of faulty generalized honeycomb tori. 942-950 - Min He, Xiaolong Wu, Si-Qing Zheng:
An optimal and processor efficient parallel sorting algorithm on a linear array with a reconfigurable pipelined bus system. 951-965 - Fei Yin, Changjun Jiang, Rong Deng, Jianjun Yuan:
Grid resource management policies for load-balancing and energy-saving by vacation queuing theory. 966-979 - Xiaomin Zhu, Peizhong Lu:
A two-phase scheduling strategy for real-time applications with security requirements on heterogeneous clusters. 980-993
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.