


default search action
Journal of Computers, Volume 3
Volume 3, Number 1, January 2008
- William Claster, Subana Shanmuganathan, Nader Ghotbi:

Text Mining of Medical Records for Radiodiagnostic Decision-Making. 1-6 - Dipnarayan Guha, Thambipillai Srikanthan

:
Compiler Back End Design for Translating Multi-radio Descriptions to Operating System-less Asynchronous Processor Datapaths. 7-14 - Yukiko Sasaki Alam:

Algorithms for Identifying the Multiple Syntactic Categories and Meanings of the Word Over. 15-23 - Uttam Kumar Tripathi, Knut Hinkelmann

, Daniela Feldkamp:
Life Cycle for Change Management in Business Processes using Semantic Technologies. 24-31 - Dilip Gopichand Khairnar, S. N. Merchant, Uday B. Desai:

Radar Signal Detection In Non-Gaussian Noise Using RBF Neural Network. 32-39 - Dejene Ejigu, Marian Scuturici

, Lionel Brunie:
Hybrid Approach to Collaborative Context-Aware Service Platform for Pervasive Computing. 40-50 - Masaki Murata, Tomohiro Mitsumori, Kouichi Doi:

Analysis and Improved Recognition of Protein Names Using Transductive SVM. 51-62 - Boleslaw Mikolajczak, Nirmal Gami:

Design and Verification of Loosely Coupled Inter-Organizational Workflows with Multi-Level Security. 63-78
Volume 3, Number 2, February 2008
- Simon Polstra, Tessa E. Pronk, Andy D. Pimentel, Timo M. Breit:

Towards Design Space Exploration for Biological Systems. 1-9 - Ryad Ben-El-Kezadri

, Farouk Kamoun
:
YAVISTA: A Graphical Tool for Comparing 802.11 Simulators. 10-20 - Kumar Yelamarthi

, Chien-In Henry Chen:
Process Variation Aware Transistor Sizing for Load Balance of Multiple Paths in Dynamic CMOS for Timing Optimization. 21-28 - Shouling He, Xuping Xu:

Hardware/Software Co-design Approach for an ADALINE Based Adaptive Control System. 29-36 - Deblina Sarkar, Deepanjan Datta, Sudeb Dasgupta:

Modeling of Leakage Current Mechanisms in Nanoscale DG MOSFET and its Application to Low Power SRAM Design. 37-47 - Kenji Asano, Junji Kitamichi, Kenichi Kuroda:

Dynamic Module Library for System Level Modeling and Simulation of Dynamically Reconfigurable Systems. 55-62 - Tariq Jamil

:
Impact of Shift Operations on (-1+j)-Base Complex Binary Numbers. 63-71 - Bhogeswar Borah

, Dhruba K. Bhattacharyya
:
DDSC : A Density Differentiated Spatial Clustering Technique. 72-79
Volume 3, Number 3, March 2008
- Aram Shin, Sang Jun Hwang, Seung Woo Yu, Man Young Sung:

Design of Organic TFT Pixel Electrode Circuit for Active-Matrix OLED Displays. 1-5 - Kaijian Shi, Zhian Lin, Yi-Min Jiang, Lin Yuan:

Simultaneous Sleep Transistor Insertion and Power Network Synthesis for Industrial Power Gating Designs. 6-13 - Jorgen Peddersen, Sri Parameswaran

:
Energy Driven Application Self-Adaptation at Run-time. 14-24 - Diandian Zhang, Anupam Chattopadhyay, David Kammler, Ernst Martin Witte, Gerd Ascheid, Rainer Leupers, Heinrich Meyr:

Power-efficient Instruction Encoding Optimization for Various Architecture Classes. 25-38 - Duk-Hyung Lee, Dong-Kone Kwak, Kyeong-Sik Min:

Comparative Study on Leakage Current of Power-Gated SRAMs for 65-nm, 45-nm, 32-nm Technology Nodes. 39-47 - Omar S. Elkeelany

, Adegoke Olabisi:
Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware. 48-55 - Nevena Ackovska, Stevo Bozinovski, Gjorgi Jovancevski:

Real-Time Systems - Biologically Inspired Future. 56-63 - Giti Javidi, Ehsan Sheybani:

Content-Based Computer Simulation of a Networking Course: An Assessment. 64-72
Volume 3, Number 4, April 2008
- Gabriele Di Stefano, Alberto Petricola:

A Distributed AOA Based Localization Algorithm for Wireless Sensor Networks. 1-8 - Letian Rong:

Multimedia Resource Replication Strategy for a Pervasive Peer-to-Peer Environment. 9-15 - Minjae Park, Woonsik Lee, Minh-Viet Nguyen, Hwang Soo Lee:

Practical Chip-level Equalizers in HSDPA. 16-23 - Javid Jaffari, Mohab Anis:

Thermal Driven Placement for Island-style MTCMOS FPGAs. 24-30 - Debashis Mandal, T. K. Bhattacharyya:

Implementation of CMOS Low-power Integer-N Frequency Synthesizer for SOC Design. 31-38 - Sayeed A. Badrudduza, Ziyan Wang, Giby Samson, Lawrence T. Clark:

Leakage Controlled Read Stable Static Random Access Memories. 39-49 - Hung-Ming Cheng:

Wordlength Estimation of Digital Controller Synthesis for Inkjet Printer Mechanism. 50-57 - Rekha Bhowmik:

Building Design Optimization Using Sequential Linear Programming. 58-64
Volume 3, Number 5, May 2008
- Jens Eliasson, Per Lindgren, Jerker Delsing:

A Bluetooth-based Sensor Node for Low-Power Ad Hoc Networks. 1-10 - P. S. Deshpande, Latesh G. Malik

, Sandhya Arora
:
Fine Classification & Recognition of Hand Written Devnagari Characters with Regular Expressions & Minimum Edit Distance Method. 11-17 - Norashidah Md Din, Norsheila Fisal:

Fuzzy Logic Bandwidth Prediction and Policing in a DiffServ-Aware Network. 18-23 - Hamidreza Zaboli, Mohammad Rahmati, Abdolreza Mirzaei:

Shape Recognition by Clustering and Matching of Skeletons. 24-33 - Masaaki Iijima, Kayoko Seto, Masahiro Numa, Akira Tada, Takashi Ipposhi:

Low Power SRAM with Boost Driver Generating Pulsed Word Line Voltage for Sub-1V Operation. 34-40 - Jyi-Tsong Lin, Yi-Chuen Eng:

Analysis of Block Oxide Height Variations for a 40nm Gate Length bFDSOI-FET. 41-45 - Debdeep Mukhopadhyay, Pallavi Joshi, Dipanwita Roy Chowdhury:

VLSI Architecture of a Cellular Automata based One-Way Function. 46-53 - Kailash Chandra Ray, A. S. Dhar:

High Throughput VLSI Architecture for Blackman Windowing in Real Time Spectral Analysis. 54-59 - Anju Sharma, Seema Bawa:

Comparative Analysis of Resource Discovery Approaches in Grid Computing. 60-64
Volume 3, Number 6, June 2008
- Jason G. Tong, Mohammed A. S. Khalid:

Profiling Tools for FPGA-Based Embedded Systems: Survey and Quantitative Comparison. 1-14 - Santosh D. Chede, Kishore D. Kulat

:
Algorithm to Optimize Code Size and Energy Consumption in Real Time Embedded System. 15-21 - Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-Foss:

Formal Verification and Visualization of Security Policies. 22-31 - Mahmoud A. Ismail:

Vocal Tract Area Function Estimation Using Particle Swarm. 32-38 - Dharmalingam Jeya Mala, Vasudev Mohan:

IntelligenTester - Test Sequence Optimization Framework using Multi-Agents. 39-46 - Mohammad M. Alsuraihi, Dimitris I. Rigas:

Speech Displaces the Graphical Crowd. 47-58 - Anjali Mahajan, M. Sadique Ali:

Hybrid Evolutionary Algorithm Based Solution for Register Allocation for Embedded Systems. 59-65
Volume 3, Number 7, July 2008
- Shigeaki Sakurai, Youichi Kitahara, Ryohei Orihara, Koichiro Iwata, Nobuyoshi Honda, Toshio Hayashi:

Discovery of Sequential Patterns Coinciding with Analysts' Interests. 1-8 - Bin Liu, Rong Zhang, Sifeng Liu:

RFID Technology and its Perspective Analysis with KERGM(1, 1) Model. 9-15 - Te-Hsiu Sun:

K-Cosine Corner Detection. 16-22 - Ronghua Guo, Zheng Qin, Xiangnan Li, Junliang Chen:

Interacting Multiple Model Particle-type Filtering Approaches to Ground Target Tracking. 23-30 - Vishwas R. Puttige, Sreenatha G. Anavatti:

Real-time System Identification of Unmanned Aerial Vehicles: A Multi-Network Approach. 31-38 - Meng-Ju Han, Jing-Huai Hsu, Kai-Tai Song, Fuh-Yu Chang:

A New Information Fusion Method for Bimodal Robotic Emotion Recognition. 39-47 - Chin-Ming Hong, Yih-Guang Leu:

Adaptive Cerebellar Model Articulation Controller for a Class of Nonlinear Systems with Only Output Measurement. 48-55
Volume 3, Numbers 8, August 2008
- Zhao-Hui Jiang, Taiki Ishida:

A Neural Network Controller for Trajectory Control of Industrial Robot Manipulators. 1-8 - Alan McCabe, Jarrod Trevathan

, Wayne Read:
Neural Network-based Hwritten Signature Verification. 9-22 - Satoshi Ito

, Shinya Amano, Minoru Sasaki
, Pasan Kulvanit:
A ZMP Feedback Control for Biped Balance its Application to In-Place Lateral Stepping Motion. 23-31 - Weihua Li, Chunyan Yang:

Extension Information-Knowledge-Strategy System for Semantic Interoperability. 32-39 - Masayuki Murakami:

Task-based Dynamic Fault Tolerance for Humanoid Robot Applications Its Hardware Implementation. 40-48 - Santosh D. Chede, Kishore D. Kulat

:
Design Overview Of Processor Based Implantable Pacemaker. 49-57 - Hayeong Jeong, Shun Shiramatsu

, Kiyoshi Kobayashi, Tsuyoshi Hatori:
Discourse Analysis of Public Debates Using Corpus Linguistic Methodologies. 58-68 - Yimin Shen, Jing Zhang, Yushun Fan:

Multi-Index Cooperative Mixed Strategy for Service Selection Problem in Service-Oriented Architecture. 69-76 - Takashi Onoyama, Takuya Maekawa, Yoshitaka Sakurai, Setsuo Tsuruta, Norihisa Komoda:

Selfish Constraint Satisfaction Genetic Algorithm for Planning a Long-distance Transportation Network. 77-85
Volume 3, Numbers 9, September 2008
- George J. Sun:

Introducing the New Editor-in-Chief of the Journal of Computers. 1 - Muneomi Sagara, Hiroaki Mukaidani, Toru Yamamoto:

Efficient Numerical Computations of Soft Constrained Nash Strategy for Weakly Coupled Large-Scale Systems. 2-10 - Karen A. Panetta, Eric J. Wharton, Sos S. Agaian

:
Logarithmic Edge Detection with Applications. 11-19 - Yuichi Kobayashi:

The Emotion Sign: Human Motion Analysis Classifying Specific Emotion. 20-28 - Song Zhiwei, Chen Xiaoping, Cong Shuang:

Agent Learning in Relational Domains based on Logical MDPs with Negation. 29-38 - Masanori Takemoto, Hiroaki Kosaka, Hirokazu Nishitani:

A Study on the Relationships between Unsafe Driving Behaviors and Driver's Inner Factors When Entering a Non-signalized Intersection. 39-49 - Jian Wu, Sherif Abdelwahed:

An Efficient Finite-Input Receding Horizon Control Method and Its Application for the Pneumatic Hopping Robot. 50-57 - Kazuyuki Hanahara, Yukio Tada:

Human-Robot Communication with Hand-Clapping Language (Consideration from Communication Impedance Matching Viewpoint). 58-66 - Zushu Li, Dongwu Liang:

Human Simulated Intelligent Controller with Fuzzy Online Self-Tuning of Parameters and its Application to a Cart-Double Pendulum. 67-76 - Tsutomu Miyoshi:

Relation Organization of SOM Initial Map by Improved Node Exchange. 77-84
Volume 3, Numbers 10, October 2008
- Qi Luo, Ben K. M. Sim:

Editorial. 1-2 - Yingjie Xia, Guanghua Song, Yao Zheng:

SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification. 3-11 - Qihai Zhou, Tao Huang, Hongyu Wu:

An Isomorphic New Algorithm for Finding Convex Hull with a Maximum Pitch of the Dynamical Base Line Guided by Apexes Distributing Characteristics. 12-19 - Jian Wu, Xing-Ming Li:

An Effective Mining Algorithm for Weighted Association Rules in Communication Networks. 20-27 - Peide Liu, Tongjuan Wang:

Research on Risk Evaluation in Supply Chain Based on Grey Relational Method. 28-35 - Dehuai Zeng, Jianmin Xu, Gang Xu:

Data Fusion for Traffic Incident Detector Using D-S Evidence Theory with Probabilistic SVMs. 36-43 - Jun Wang, Bingli Fan, Dongping Men:

Data Analysis and Statistical Behaviors of Stock Market Fluctuations. 44-49 - Xiaoliang Jia, Zhenming Zhang, Xitian Tian:

Process Planning Knowledge Discovery Based on CAPP Database for Mechanical Manufacturing Enterprise. 50-57 - Youyao Liu, Jungang Han, Huimin Du:

A Hypercube-based Scalable Interconnection Network for Massively Parallel Computing. 58-65 - Lu Zhao, Xinqi Zheng, Shuqing Wang:

Design and Implementation of Spatial Data Mining System (M-SDM) based on MATLAB. 66-70 - Wei Liu, Ling Chen:

A Parallel Algorithm for Gene Expressing Data Biclustering. 71-77 - Kai Du, Zhengbing Hu, Huaimin Wang, Yingwen Chen, Shuqiang Yang, Zhijian Yuan:

Reliability Design for Large Scale Data Warehouses. 78-85 - Le Wang, Yan Jia, Yingwen Chen:

Conversation Extraction in Dynamic Text Message Stream. 86-93 - Ming Li, Yuanhong Hao:

Accelerated Kernel CCA plus SVDD: A Three-stage Process for Improving Face Recognition. 94-100 - Bo Jiang, Jiajun Bu, Chun Chen:

Providing Awareness of Cooperative Efficiency in Collaborative Graphics Design Systems through Reaction Mining. 101-108 - Jia Wu, Ling Chen:

Mining Frequent Subgraph by Incidence Matrix Normalization. 109-115
Volume 3, Numbers 11, November 2008
- Ishmael S. Msiza, Fulufhelo V. Nelwamondo, Tshilidzi Marwala:

Water Demand Prediction using Artificial Neural Networks and Support Vector Regression. 1-8 - Fong Chwee Teng, Ahmad Lotfi

, Ah Chung Tsoi
:
Novel Fuzzy Logic Controllers with Self-Tuning Capability. 9-16 - Kun-Li Wen, Shih-Kuen Changchien:

The Weighting Analysis of Influence Factors in Gas Breakdown via Rough Set and GM(h, N). 17-24 - Jun Yoneyama:

H8 Sample-Data Control of Fuzzy Systems with Input Delay. 25-31 - Jun-Zhao Sun:

QoS Aware Query Processing Algorithm for Wireless Sensor Networks. 32-41 - Miao Hao, Peter Deuflhard, Zengqi Sun, Masakazu Fujii:

Model-Free Uncalibrated Visual Servoing Using Recursive Least Squares. 42-50 - Fan Yang, Deyun Xiao:

Sensor Location Strategy in Large-Scale Systems for Fault Detection Applications. 51-57 - Tsung-Ying Sun, Shang-Jeng Tsai, Chih-Li Huo:

Intelligent Maneuvering Decision System for Computer Generated Forces Using Predictive Fuzzy Inference System. 58-66 - Tzung-Pei Hong, Min-Thai Wu:

A Hierarchical Gene-Set Genetic Algorithm. 67-75
Volume 3, Numbers 12, December 2008
- Fei Yu, Chin-Chen Chang, Ben M. Chen, Zhigang Chen, Jun Ni

:
Editorial. 1-2 - Jun Wang, Qiuyuan Wang, Jiguang Shao:

Analytical Valuation of Contingent Claims by Stochastic Interacting Systems for Stock Market. 3-10 - Jun Wang, Bingli Fan, Tiansong Wang:

Statistical Analysis and Data Analysis of Stock Market by Interacting Particle Models. 11-18 - Linyan Tu, Wei Dong, Yindong Ji, Xinya Sun:

A Meta-model Based Modeling Method for Geographic Information Model in CTCS Hardware-in-the-loop Simulation System. 19-26 - Ming Yang, Fei Wang, Ping Yang:

A Novel Feature Selection Algorithm Based on Hypothesis-Margin. 27-34 - Liqiong Chen, Zhiqing Shao, Guisheng Fan, Hanhua Ma:

A Petri Net based Method for Analyzing Schedulability of Distributed Real-time Embedded Systems. 35-42 - Xiaofeng Chen, Dengguo Feng:

Direct Anonymous Attestation for Next Generation TPM. 43-50 - Jianhua Jiang

, Huifang Ji, Gaochao Xu, Xiaohui Wei:
Scheduling Algorithm with Potential Behaviors. 51-59 - Xinquan Chen:

Weighted Clustering and Evolutionary Analysis of Hybrid Attributes Data Streams. 60-67 - Haibo Zhang, Xiaofei Wang, Wanhua Cao, Youpeng Huang:

Visual Cryptography for General Access Structure Using Pixel-block Aware Encoding. 68-75 - Lin Zhang, Ruchuan Wang, Haiyan Wang:

Trusted Decision Mechanism Based on Fuzzy Logic for Open Network. 76-83

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














