


default search action
Computers & Electrical Engineering, Volume 35
Volume 35, Number 1, January 2009
- Seher Sener, Ibrahim Develi

, Nurhan Karaboga
:
Further performance analysis of the generalized MC DS-CDMA system in Nakagami-m fading channels. 1-8 - Baoyuan Kang

, Colin Boyd, Ed Dawson
:
A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. 9-17 - Christopher Martinez, Mythri Pinnamaneni, Eugene B. John

:
Performance of commercial multimedia workloads on the Intel Pentium 4: A case study. 18-32 - Wen-Shenq Juang, Jing-Lin Wu:

Two efficient two-factor authenticated key exchange protocols in public wireless LANs. 33-40 - Tzungher Chen

, Wei-Bin Lee, Hsing-Bai Chen:
A self-verification authentication mechanism for mobile satellite communication systems. 41-48 - Baoyuan Kang

, Colin Boyd, Ed Dawson
:
Identity-based strong designated verifier signature schemes: Attacks and new construction. 49-53 - Miguel Morales-Sandoval

, Claudia Feregrino Uribe, René Cumplido, Ignacio Algredo-Badillo
:
An area/performance trade-off analysis of a GF(2m) multiplier architecture for elliptic curve cryptography. 54-58 - Wei Zhang, Liansheng Tan, Gang Peng:

Dynamic queue level control of TCP/RED systems in AQM routers. 59-70 - Erdinç Öztürk, Berk Sunar, Erkay Savas:

A versatile Montgomery multiplier architecture with characteristic three support. 71-85 - Feng Cao, Zhenfu Cao

:
A secure identity-based multi-proxy signature scheme. 86-95 - Azizollah Jamshidi

, Bizhan Karimi-Birgani:
Multiple partner coded cooperation scheme for wireless communications and its performance analysis for two cooperative users. 96-106 - Hyun Seok Kim, Jin-Young Choi

:
Enhanced password-based simple three-party key exchange protocol. 107-114 - Cihan Topal

, Cuneyt Akinlar
:
Secure seamless peer-to-peer (P2P) UDP communication using IPv4 LSRR option and IPv4+4 addresses. 115-125 - Ali A. Kanso

:
An efficient cryptosystem Delta for stream cipher applications. 126-140 - Ying Zheng, Guangyao Li, Xiehua Sun, Xinmin Zhou:

Fast edge integration based active contours for color images. 141-149 - Baodong Qin, Ming Li, Fanyu Kong, Daxing Li:

New left-to-right minimal weight signed-digit radix-r representation. 150-158 - Soonhak Kwon, Chang Hoon Kim, Chun Pyo Hong:

More efficient systolic arrays for multiplication in GF(2m) using LSB first algorithm with irreducible polynomials and trinomials. 159-167 - Jamal-Deen Abdulai

, Mohamed Ould-Khaoua, Lewis M. Mackenzie:
Adjusted probabilistic route discovery in mobile ad hoc networks. 168-182 - Wei Lu, Wei Sun, Hongtao Lu:

Robust watermarking based on DWT and nonnegative matrix factorization. 183-188 - Zuhua Shao:

Dynamic and efficient joint encryption scheme in the plain public key model. 189-196 - Omar M. Al-Jarrah, Omar Megdadi:

Enhanced AODV routing protocol for Bluetooth scatternet. 197-208
- D. Gnanadurai, V. Sadasivam, J. Paul Tiburtius Nishandh, L. Muthukumaran, C. Annamalai:

Undecimated double density wavelet transform based speckle reduction in SAR images. 209-217 - P. P. Sahu, Mahipal Singh:

Multichannel direct sequence spectrum signaling using code phase shift keying. 218-226
Volume 35, Number 2, March 2009
- Saraju P. Mohanty, Nasir D. Memon

, Karam S. Chatha:
Circuits and systems for real-time security and copyright protection of multimedia. 231-234 - P. P. Deepthi, Deepa Sara John, P. S. Sathidevi:

Design and analysis of a highly secure stream cipher based on linear feedback shift register. 235-243 - Behnam Ghavami, Hossein Pedram, Mehrdad Najibi:

An EDA tool for implementation of low power and secure crypto-chips. 244-257 - Radha Guha, Nader Bagherzadeh

, Pai H. Chou:
Resource management and task partitioning and scheduling on a run-time reconfigurable embedded system. 258-285 - Youtao Zhang, Jun Yang, Lan Gao:

Supporting flexible streaming media protection through privacy-aware secure processors. 286-299 - P. P. Deepthi, V. S. Nithin, P. S. Sathidevi:

Implementation and analysis of stream ciphers based on the elliptic curves. 300-314 - Olga Gelbart, Eugen Leontie, Bhagirath Narahari, Rahul Simha:

A compiler-hardware approach to software protection for embedded systems. 315-328 - Santosh Ghosh, Monjur Alam, Dipanwita Roy Chowdhury, Indranil Sengupta:

Parallel crypto-devices for GF(p) elliptic curve multiplication resistant against side channel attacks. 329-338 - Elias Kougianos, Saraju P. Mohanty, Rabi N. Mahapatra:

Hardware assisted watermarking for multimedia. 339-358 - Amir Moradi

, Mohammad Taghi Manzuri Shalmani, Mahmoud Salmasizadeh:
Dual-rail transition logic: A logic style for counteracting power analysis attacks. 359-369 - Neng-Wen Wang, Yueh-Min Huang:

A novel software key container in on-line media services. 370-375 - Pramod A. Jamkhedkar, Gregory L. Heileman:

Digital rights management architectures. 376-394 - Ju Wang, Jonathan C. L. Liu, Mbonisi Masilela:

A real-time video watermarking system with buffer sharing for video-on-demand service. 395-414 - Santi P. Maity

, Malay K. Kundu, Seba Maity:
Dual purpose FWT domain spread spectrum image watermarking in real time. 415-433
Volume 35, Number 3, May 2009
- Wen-Fang Yen, Shingchern D. You

, Yung-Chao Chang:
Real-time FFT with pre-calculation. 435-440 - Niyazi Odabasioglu, Osman N. Uçan:

Multilevel turbo coded-continuous phase frequency shift keying (MLTC-CPFSK). 441-449 - Khaled A. Mayyas:

Low complexity LMS-type adaptive algorithm with selective coefficient update for stereophonic acoustic echo cancellation. 450-458 - Vikram Simhadri, Yusuf Ozturk:

RASCor: An associative hardware algorithm for real time stereo. 459-477 - Pin-Chang Su, Chien-Hua Tsai:

New cryptosystems design based on hybrid-mode problems. 478-484 - Tamer Tulgar

, Muhammed Salamah:
Performance analysis of a threshold based distributed channel allocation algorithm for cellular networks. 485-496 - Zuhua Shao:

Provably secure proxy-protected signature schemes based on RSA. 497-505 - Mingquan Fan, Hongxia Wang:

Chaos-based discrete fractional Sine transform domain audio watermarking scheme. 506-516 - M. Ali Aydin

, Abdül Halim Zaim
, K. Gökhan Ceylan:
A hybrid intrusion detection system design for computer network security. 517-526
Volume 35, Number 4, July 2009
- Hasan Al-Nashash

:
Innovations in communications electronics and control. 527 - Vahideh Vakil, Hassan Aghaeinia

:
Throughput analysis of STS-based CDMA system with variable spreading factor in non-frequency selective Rayleigh fading channel. 528-535 - Mani Ranjbar, Shohreh Kasaei

:
Spatial error concealment: A novel exemplar-based approach using segmentation. 536-548 - Abdul-Karim A.-R. Kadhim, Abdul-Aziz A. Hussain:

Hierarchical matched filter based on FPGA for mobile systems. 549-555 - Ibrahim M. Al Abdulmohsin:

Techniques and algorithms for access control list optimization. 556-566 - M. Narayanan, Hasan Al-Nashash

:
Introducing undergraduate students to simulation of semiconductor doping techniques. 567-577 - Muhammad Shakil, Moustafa Elshafei, Mohamed A. Habib

, F. A. Maleki:
Soft sensor for NOx and O2 using dynamic neural networks. 578-586 - Wael Saleh, Nasser Qaddoumi:

Potential of near-field microwave imaging in breast cancer detection utilizing tapered rectangular waveguide probes. 587-593 - A. H. M. A. Rahim

, M. Ahsanul Alam
, M. F. Kandlawala:
Dynamic performance improvement of an isolated wind turbine induction generator. 594-607
Volume 35, Number 5, September 2009
- Jiann-Liang Chen, Ming-Chiao Chen, Yan-Cheng Chang:

Enhancing WLAN/UMTS dual-mode services using a novel distributed multi-agent scheduling scheme. 609-621 - Jun-Bo Wang, Ming Chen, Jiangzhou Wang:

Adaptive channel and power allocation of downlink multi-user MC-CDMA systems. 622-633 - Félix J. García Clemente

, Gregorio Martínez Pérez
, Antonio Fernandez Gómez-Skarmeta
:
Multi-layer framework for analysing and managing routing configurations. 634-643 - Hafizur Rahaman

, Debesh K. Das, Bhargab B. Bhattacharya:
Testable design of AND-EXOR logic networks with universal test sets. 644-658 - Chien-Hung Huang:

Strongly Hamiltonian laceability of the even k-ary n-cube. 659-663 - Xiangxue Li, Dong Zheng, Kefei Chen, Jianhua Li:

Democratic group signatures with collective traceability. 664-672 - Hazem Al-Otum

, Allam O. Al-Taba'a:
Adaptive color image watermarking based on a modified improved pixel-wise masking technique. 673-695 - Zuoyong Li, Chuancai Liu:

Gray level difference-based transition region extraction and thresholding. 696-704 - Sheng Zhong:

Identity-based mix: Anonymous communications without public key certificates. 705-711 - Tudor Barbu

:
Novel automatic video cut detection technique using Gabor filtering. 712-721 - Youcef Ferdi

:
Impulse invariance-based method for the computation of fractional integral of order 0alpha. 722-729 - Kanyapat Watcharasitthiwat, Paramote Wardkein:

Reliability optimization of topology communication network design using an improved ant colony optimization. 730-747 - Xianghui Cao

, Jiming Chen, Chuanhou Gao, Youxian Sun:
An optimal control method for applications using wireless sensor/actuator networks. 748-756 - Chin-Chen Chang, Shih-Chang Chang, Jung-San Lee:

An on-line electronic check system with mutual authentication. 757-763 - Yun-Lung Chen, Chienhua Chen:

Performance analysis of non-preemptive GE/G/1 priority queueing of LER system with bulk arrivals. 764-789 - Syed Mahfuzul Aziz

:
A cycle-accurate transaction level SystemC model for a serial communication bus. 790-802 - Fernando Pardo, Jose Antonio Boluda

:
SimuRed: A flit-level event-driven simulator for multicomputer network performance evaluation. 803-814
Volume 35, Number 6, November 2009
- Mei Yang, Yingtao Jiang, Ling Wang, Yulu Yang:

High performance computing architectures. 815-816 - Peng Liu, Bingjie Xia, Chunchang Xiang, Xiaohang Wang, Weidong Wang, Qingdong Yao:

A networks-on-chip architecture design space exploration - The LIB. 817-836 - Seung Eun Lee

, Nader Bagherzadeh
:
A high level power model for Network-on-Chip (NoC) router. 837-845 - Ling Wang, Hui Song, Yingtao Jiang, Lihong Zhang:

A routing-table-based adaptive and minimal routing scheme on network-on-chip architectures. 846-855 - Lei Zhang, Mei Yang, Yingtao Jiang, Emma E. Regentova:

Architectures and routing schemes for optical network-on-chips. 856-877 - Yitzhak Birk

, Evgeny Fiksman:
Dynamic reconfiguration architectures for multi-context FPGAs. 878-903 - Lu Yan, Zheng Liang:

An accelerator design for speedup of Java execution in consumer mobile devices. 904-919 - Behnam Ghavami, Hossein Pedram:

High performance asynchronous design flow using a novel static performance analysis method. 920-941 - Qiang Dong

, Xiaofan Yang, Juan Zhao:
Embedding a fault-free hamiltonian cycle in a class of faulty generalized honeycomb tori. 942-950 - Min He, Xiaolong Wu, Si-Qing Zheng:

An optimal and processor efficient parallel sorting algorithm on a linear array with a reconfigurable pipelined bus system. 951-965 - Fei Yin, Changjun Jiang, Rong Deng, Jianjun Yuan:

Grid resource management policies for load-balancing and energy-saving by vacation queuing theory. 966-979 - Xiaomin Zhu, Peizhong Lu:

A two-phase scheduling strategy for real-time applications with security requirements on heterogeneous clusters. 980-993

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














