default search action
Computers & Electrical Engineering, Volume 37
Volume 37, Number 1, January 2011
- Reza Moraveji, Hamid Sarbazi-Azad, Abbas Nayebi, Keivan Navi:
Modeling the effects of hot-spot traffic load on the performance of wormhole-switched hypermeshes. 1-23 - Yih-Ching Su, Ming-Haw Jing, Yaotsu Chang, Jian-Hong Chen, Zih-Heng Chen:
A fast parallel (23, 12, 7) QR decoder based on syndrome-weight determination. 24-29 - Kenli Li, Tianfang Tan, Xiaoyong Tang, Feng Wang:
Parallelization methods for implementation of discharge simulation along resin insulator surfaces. 30-40 - Cemal Hanilçi, Figen Ertas:
Comparison of the impact of some Minkowski metrics on VQ/GMM based speaker recognition. 41-56 - Ho-Lung Hung:
Using evolutionary computation technique for trade-off between performance peak-to average power ration reduction and computational complexity in OFDM systems. 57-70 - Mohamed M. Nasreldin Rasslan, Amr M. Youssef:
Comments on the security of Chen's authenticated encryption scheme. 71-74 - Pejman Goudarzi, Mohammad R. Nezami Ranjbar:
Bandwidth allocation for video transmission with differentiated quality of experience over wireless networks. 75-90 - Dawid Zydek, Henry Selvaraj:
Fast and efficient processor allocation algorithm for torus-based chip multiprocessors. 91-105 - Lei Guo, Yuhuai Peng, Xingwei Wang, Dingde Jiang, Yinpeng Yu:
Performance evaluation for on-demand routing protocols based on OPNET modules in wireless mesh networks. 106-114 - Mohammed Abd-Elnaby, Mohamed R. M. Rizk, Moawad I. Dessouky, Sami A. El-Dolil:
Efficient contention-based MAC protocol using adaptive fuzzy controlled sliding backoff interval for wireless networks. 115-125
Volume 37, Number 2, March 2011
- Nicolas Sklavos, Sherali Zeadally, Cristina Alcaraz:
Guest Editors' Introduction to the Special Issue on "Modern trends in applied security: Architectures, implementations and applications". 127-128 - Hu Xiong, Jian-bin Hu, Zhong Chen, Fagen Li:
On the security of an identity based multi-proxy signature scheme. 129-135 - Zuhua Shao:
Enhanced Certificate-Based Encryption from pairings. 136-146 - Rodrigo Roman, Cristina Alcaraz, Javier López, Nicolas Sklavos:
Key management systems for sensor networks in the context of the Internet of Things. 147-159 - Ioana Lasc, Reiner Dojen, Tom Coffey:
Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications. 160-168 - Lein Harn, Chu-Hsing Lin:
Contract signature in e-commerce. 169-173 - Pin-Chang Su:
Enhanced short signature scheme with hybrid problems. 174-179 - Kyung-Ah Shim:
Short designated verifier proxy signatures. 180-186 - Qingfeng Cheng, Chuangui Ma:
Analysis and improvement of an authenticated multiple key exchange protocol. 187-190 - Zuowen Tan:
Efficient identity-based authenticated multiple key exchange protocol. 191-198 - Mohammad Sabzinejad Farash, Majid Bayat, Mahmoud Ahmadian-Attari:
Vulnerability of two multiple-key agreement protocols. 199-204 - Liang Ni, Gongliang Chen, Jianhua Li, Yanyan Hao:
Strongly secure identity-based authenticated key agreement protocols. 205-217 - Ziyi You, Xiaoyao Xie:
A novel group key agreement protocol for wireless mesh network. 218-239
Volume 37, Number 3, May 2011
- Ravinder Nath:
Modified Generalized Autocorrelation based Estimator for time delays in multipath environment - A tradeoff in estimator performance and number of multipath. 241-252 - Miao Liu, Ke Wang, Yue Huang, Xiangling Li:
Reducing PAPR by selecting optimal wavelet tree structure in WOFDM. 253-260 - J. Jackson Juliet Roy, Vaidehi V., M. S. Sricharan:
QoS guaranteed integration methodology for a WLAN-WiMAX heterogeneous network. 261-274 - Giuseppe Alia, Enrico Martinelli:
A high performance ROM-based structure for modular exponentiation. 275-284 - Xuanxing Xiong, Yang Song, Ali Akoglu:
Architecture design of variable block size motion estimation for full and fast search algorithms in H.264/AVC. 285-299 - Lizhe Wang, Dan Chen, Fang Huang:
Virtual workflow system for distributed collaborative scientific applications on Grids. 300-310 - Zhaoxuan Zhu, Houjun Wang, Zhigang Wang, Hao Zhang:
Reconstruction of compressed samples in shift-invariant space base on matrix factorization. 311-318 - Hsun Su, Jing-Ling Pan, Shin-Shin Kao:
Mutually independent Hamiltonian cycles in k-ary n-cubes when k is even. 319-331 - Stefan Panic, Petar C. Spalevic, Jelena A. Anastasov, Mihajlo C. Stefanovic, Mile Petrovic:
On the performance analysis of SIR-based SSC diversity over correlated α-μ fading channels. 332-338 - Amit Phadikar, Santi P. Maity, Bhupendra Verma:
Region based QIM digital watermarking scheme for image database in DCT domain. 339-355 - Eun-Jun Yoon, Kee-Young Yoo, Keum-Sook Ha:
A user friendly authentication scheme with anonymity for wireless communications. 356-364 - Antônio Augusto Fröhlich, Giovani Gracioli, João Felipe Santos:
Periodic timers revisited: The real-time embedded system perspective. 365-375 - Aiman El-Maleh, Saif al Zahir, Esam Khan:
Test data compression based on geometric shapes. 376-391 - Omer Deperlioglu, Utku Kose:
An educational tool for artificial neural networks. 392-402
Volume 37, Number 4, July 2011
- Lizhe Wang, Dan Chen, Ze Deng, Fang Huang:
Large scale distributed visualization on computational Grids: A review. 403-416 - Glaucio H. S. Carvalho:
Optimal control of preemptive systems with loss. 417-424 - Xiangyang Wang, Tianxiao Ma, Pan-Pan Niu:
A pseudo-Zernike moment based audio watermarking scheme robust against desynchronization attacks. 425-443 - Debiao He, Jianhua Chen, Rui Zhang:
An efficient identity-based blind signature scheme without bilinear pairings. 444-450 - Sandra Roger, Alberto González, Vicenç Almenar, Antonio M. Vidal:
Practical aspects of preprocessing techniques for K-Best tree search MIMO detectors. 451-460 - Javad Akbari Torkestani, Mohammad Reza Meybodi:
LLACA: An adaptive localized clustering algorithm for wireless ad hoc networks. 461-474 - Hafizur Rahaman, Dipak Kumar Kole, Debesh K. Das, Bhargab B. Bhattacharya:
Fault diagnosis in reversible circuits under missing-gate fault model. 475-485 - Sourav Kumar Mukhopadhyay, Sucharita Mitra, Madhuchhanda Mitra:
A lossless ECG data compression technique using ASCII character encoding. 486-497 - Hussein El Ghor, Maryline Chetto, Rafic Hage Chehade:
A real-time scheduling framework for embedded systems with environmental energy harvesting. 498-510 - Wen-Hwa Liao, Kuei-Ping Shih, Chen Liu, Avinash Kumar Dubey, Sagar Arora, Sital Prasad Kedia:
An efficient scheduling algorithm for radio resource reuse in IEEE 802.16j multi-hop relay networks. 511-525 - Peng Zeng, Zhenfu Cao, Kim-Kwang Raymond Choo:
An ID-based digital watermarking protocol for copyright protection. 526-531 - Piyi Yang, Zhenfu Cao, Xiaolei Dong:
Fuzzy identity based signature with applications to biometric authentication. 532-540 - Francisco G. Montoya, Alfredo Alcayde, Pedro Sánchez, Consolación Gil, Maria Dolores Gil Montoya, Julio Gómez:
Comparative analysis of power variables in high performance embedded and x86 architectures using GNU/Linux. 541-549 - Dandan Zhao, Yujie Zhou, Dayong Wang, Junfa Mao:
Effective macroblock layer rate control algorithm for H.264/AVC. 550-558 - L. A. Khan, Muhammad Shamim Baig, Ali Hassan:
Crypt analysis of two time pads in case of compressed speech. 559-569 - J. Lei:
Generalized reconstruction algorithm for compressed sensing. 570-588 - Óscar Varela, Rubén San Segundo, Luís A. Hernández:
Combining pulse-based features for rejecting far-field speech in a HMM-based Voice Activity Detector. 589-600 - Hamid Beigy, Mohammad Reza Meybodi:
Learning automata based dynamic guard channel algorithms. 601-613 - Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Kwangjo Kim:
Discrete logarithm based chameleon hashing and signatures without key exposure. 614-623 - John N. Whitley, Raphael C.-W. Phan, Jie Wang, David J. Parish:
Attribution of attack trees. 624-628
Volume 37, Number 5, September 2011
- Nicholas Sia Pik Kong, Haidi Ibrahim:
Multiple layers block overlapped histogram equalization for local content emphasis. 631-643 - Madhu S. Nair, G. Raju:
Additive noise removal using a novel fuzzy-based filter. 644-655 - Hong-Ying Yang, Xiangyang Wang, Tian-Xiang Qu, Zhong-Kai Fu:
Image denoising using bilateral filter and Gaussian scale mixtures in shiftable complex directional pyramid domain. 656-668 - Chuanbo Chen, Guangwei Wang, Mudar Sarem:
A new non-symmetry and anti-packing model and its application to image contrast enhancement. 669-680 - Ngai Ming Kwok, Xiuping Jia, Dalong Wang, Shengyong Chen, Gu Fang, Quang Phuc Ha:
Visual impact enhancement via image histogram smoothing and continuous intensity relocation. 681-694 - Hong-Ying Yang, Xiangyang Wang, Lili Chen:
Geometrically invariant image watermarking using SVR correction in NSCT domain. 695-713 - Harsh Vikram Singh, Suresh Rai, Anand Mohan, Surya Pal Singh:
Robust copyright marking using Weibull distribution. 714-728 - Turgay Çelik, Tardi Tjahjadi:
Multiscale texture classification and retrieval based on magnitude and phase features of complex wavelet subbands. 729-743 - Mohammad Bagher Akbari Haghighat, Ali Aghagolzadeh, Hadi Seyedarabi:
A non-reference image fusion metric based on mutual information of image features. 744-756 - Fangyan Nie, Chao Gao, Yongcai Guo, Min Gan:
Two-dimensional minimum local cross-entropy thresholding based on co-occurrence matrix. 757-767 - Ehsan Namjoo, Ali Aghagolzadeh, Javad Museviniya:
Robust transmission of scalable video stream using modified LT codes. 768-781 - Fang Li, Chaomin Shen, Ruihua Liu, Jinsong Fan:
A fast implementation algorithm of TV inpainting model based on operator splitting method. 782-788 - Mohammad Bagher Akbari Haghighat, Ali Aghagolzadeh, Hadi Seyedarabi:
Multi-focus image fusion for visual sensor networks in DCT domain. 789-797 - Mohsen Nasri, Abdelhamid Helali, Halim Sghaier, Hassen Maaref:
Adaptive image compression technique for wireless sensor networks. 798-810 - Mehran Safayani, Mohammad Taghi Manzuri Shalmani:
Three-dimensional modular discriminant analysis (3DMDA): A new feature extraction approach for face recognition. 811-823 - M. Alarmel Mangai, N. Ammasai Gounden:
Classification of 3-D objects and faces employing view-based clusters. 824-833
Volume 37, Number 6, November 2011
- Rashid Ali, Mirza Mohd. Sufyan Beg:
An overview of Web search evaluation methods. 835-848 - Xuelian Li, Yupu Hu, Juntao Gao:
On the value distributions of Walsh spectrums of quadratic Plateaued functions. 849-857 - Carlos A. Gonzalez-Gutierrez, Juvenal Rodríguez-Reséndiz, Georgina Mota-Valtierra, Edgar Alejandro Rivas-Araiza, Jorge D. Mendiola-Santibañez, Ricardo Luna-Rubio:
A PC-based architecture for parameter analysis of vector-controlled induction motor drive. 858-868 - Amit K. Awasthi, Keerti Srivastava, R. C. Mittal:
An improved timestamp-based remote user authentication scheme. 869-874 - Sema Nur Kirici Koç, Adnan Köksal:
Wire antennas optimized using genetic algorithm. 875-885 - Caio C. O. Ramos, André N. de Souza, Giovani Chiachia, Alexandre X. Falcão, João P. Papa:
A novel algorithm for feature selection using Harmony Search and its application for non-technical losses detection. 886-894 - Hao Ye, Kaiping Xue, Peilin Hong, Hancheng Lu:
Viewing experience optimization based on adaptive requesting window adjustment in peer-to-peer media streaming. 895-904 - Liqiang Wang, Mao Ye, Jian Ding, Yuanxiang Zhu:
Hybrid fire detection using hidden Markov model and luminance map. 905-915 - Qun Wang, Zhiwen Liu:
A robust and efficient algorithm for distributed compressed sensing. 916-926 - ChunLei Li, Yunhong Wang, Bin Ma, Zhaoxiang Zhang:
A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure. 927-940 - Monji Zaidi, Ridha Ouni, Rached Tourki:
Wireless propagation channel modeling for optimized Handoff algorithms in wireless LANs. 941-957 - Fadi N. Sibai:
Design and evaluation of low latency interconnection networks for real-time many-core embedded systems. 958-972 - Li Fan, Tiegang Gao, Qunting Yang, Yanjun Cao:
An extended matrix encoding algorithm for steganography of high embedding efficiency. 973-981 - Mika Asami, Makoto Okuda, Minoru Aoyagi:
Possibility of an embedded system for ultrasound-based measurement of the distances to two target objects. 982-990 - Jian-quan Ouyang, Hua Nie, Min Zhang, Zezhou li, Yongzhou Li:
Fusing audio-visual fingerprint to detect TV commercial advertisement. 991-1008 - Morteza Saraf, Karim Mohammadi, Mohammad R. Mosavi:
Classifying the Geometric Dilution of Precision of GPS satellites utilizing Bayesian decision theory. 1009-1018 - Somayeh Bahramnejad, Hamid R. Zarandi:
Mitigation of soft errors in SRAM-based FPGAs using CAD tools. 1019-1031 - Boppana Lakshmi, A. S. Dhar:
VLSI architecture for low latency radix-4 CORDIC. 1032-1042 - Kashif Latif, Arshad Aziz, Athar Mahboob:
Optimal utilization of available reconfigurable hardware resources. 1043-1057 - Jagadish Chandra Mohanta, Dayal Ramakrushna Parhi, Saroj Kumar Patel:
Path planning strategy for autonomous mobile robot navigation using Petri-GA optimisation. 1058-1070 - Zhili Chen, Liusheng Huang, Haibo Miao, Wei Yang, Peng Meng:
Steganalysis against substitution-based linguistic steganography based on context clusters. 1071-1081 - Ahmet Rizaner, Ali Hakan Ulusoy, Hasan Amca, Kadri Hacioglu:
An adaptive least squares channel estimation based on conjugate gradient approach for multipath fading CDMA systems. 1082-1089 - Khaled Salah, A. Manea, Sherali Zeadally, José M. Alcaraz Calero:
On Linux starvation of CPU-bound processes in the presence of network I/O. 1090-1105 - Dingde Jiang, Zhengzheng Xu, Hongwei Xu, Yang Han, Zhenhua Chen, Zhen Yuan:
An approximation method of origin-destination flow traffic from link load counts. 1106-1121 - Seung-Ho Lim:
DeFFS: Duplication-eliminated flash file system. 1122-1136 - K. C. Cinnati Loi, Seok-Bum Ko:
Improvements on the design and implementation of DVB-S2 LDPC decoders. 1137-1146 - Rodrigo Palucci Pantoni, Dennis Brandão:
A confirmation-based geocast routing algorithm for street lighting systems. 1147-1159 - Liakot Ali, Ishak Aris, Fakir Sharif Hossain, Niranjan Roy:
Design of an ultra high speed AES processor for next generation IT security. 1160-1170 - Dongxiao Ren, Mao Ye:
Extracting post-nonlinear signal with reference. 1171-1181 - Jenq-Shiou Leu, Hung-Jie Tzeng, Chi-Feng Chen, Wei-Hsiang Lin:
Practical design and implementation of recognition assisted dynamic surveillance system. 1182-1192 - Enric Musoll:
Variable-size mosaics: A process-variation aware technique to increase the performance of tile-based, massive multi-core processors. 1193-1211 - Slawomir Grys:
Signed multiplication technique by means of unsigned multiply instruction. 1212-1221 - Oscar Delgado-Mohatar, Amparo Fúster-Sabater, José M. Sierra:
Performance evaluation of highly efficient techniques for software implementation of LFSR. 1222-1231 - Hamit Soyel, Umut Tekguc, Hasan Demirel:
Application of NSGA-II to feature selection for facial expression recognition. 1232-1240
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.