default search action
Journal of Computers, Volume 3
Volume 3, Number 1, January 2008
- William Claster, Subana Shanmuganathan, Nader Ghotbi:
Text Mining of Medical Records for Radiodiagnostic Decision-Making. 1-6 - Dipnarayan Guha, Thambipillai Srikanthan:
Compiler Back End Design for Translating Multi-radio Descriptions to Operating System-less Asynchronous Processor Datapaths. 7-14 - Yukiko Sasaki Alam:
Algorithms for Identifying the Multiple Syntactic Categories and Meanings of the Word Over. 15-23 - Uttam Kumar Tripathi, Knut Hinkelmann, Daniela Feldkamp:
Life Cycle for Change Management in Business Processes using Semantic Technologies. 24-31 - Dilip Gopichand Khairnar, S. N. Merchant, Uday B. Desai:
Radar Signal Detection In Non-Gaussian Noise Using RBF Neural Network. 32-39 - Dejene Ejigu, Marian Scuturici, Lionel Brunie:
Hybrid Approach to Collaborative Context-Aware Service Platform for Pervasive Computing. 40-50 - Masaki Murata, Tomohiro Mitsumori, Kouichi Doi:
Analysis and Improved Recognition of Protein Names Using Transductive SVM. 51-62 - Boleslaw Mikolajczak, Nirmal Gami:
Design and Verification of Loosely Coupled Inter-Organizational Workflows with Multi-Level Security. 63-78
Volume 3, Number 2, February 2008
- Simon Polstra, Tessa E. Pronk, Andy D. Pimentel, Timo M. Breit:
Towards Design Space Exploration for Biological Systems. 1-9 - Ryad Ben-El-Kezadri, Farouk Kamoun:
YAVISTA: A Graphical Tool for Comparing 802.11 Simulators. 10-20 - Kumar Yelamarthi, Chien-In Henry Chen:
Process Variation Aware Transistor Sizing for Load Balance of Multiple Paths in Dynamic CMOS for Timing Optimization. 21-28 - Shouling He, Xuping Xu:
Hardware/Software Co-design Approach for an ADALINE Based Adaptive Control System. 29-36 - Deblina Sarkar, Deepanjan Datta, Sudeb Dasgupta:
Modeling of Leakage Current Mechanisms in Nanoscale DG MOSFET and its Application to Low Power SRAM Design. 37-47 - Kenji Asano, Junji Kitamichi, Kenichi Kuroda:
Dynamic Module Library for System Level Modeling and Simulation of Dynamically Reconfigurable Systems. 55-62 - Tariq Jamil:
Impact of Shift Operations on (-1+j)-Base Complex Binary Numbers. 63-71 - Bhogeswar Borah, Dhruba K. Bhattacharyya:
DDSC : A Density Differentiated Spatial Clustering Technique. 72-79
Volume 3, Number 3, March 2008
- Aram Shin, Sang Jun Hwang, Seung Woo Yu, Man Young Sung:
Design of Organic TFT Pixel Electrode Circuit for Active-Matrix OLED Displays. 1-5 - Kaijian Shi, Zhian Lin, Yi-Min Jiang, Lin Yuan:
Simultaneous Sleep Transistor Insertion and Power Network Synthesis for Industrial Power Gating Designs. 6-13 - Jorgen Peddersen, Sri Parameswaran:
Energy Driven Application Self-Adaptation at Run-time. 14-24 - Diandian Zhang, Anupam Chattopadhyay, David Kammler, Ernst Martin Witte, Gerd Ascheid, Rainer Leupers, Heinrich Meyr:
Power-efficient Instruction Encoding Optimization for Various Architecture Classes. 25-38 - Duk-Hyung Lee, Dong-Kone Kwak, Kyeong-Sik Min:
Comparative Study on Leakage Current of Power-Gated SRAMs for 65-nm, 45-nm, 32-nm Technology Nodes. 39-47 - Omar S. Elkeelany, Adegoke Olabisi:
Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware. 48-55 - Nevena Ackovska, Stevo Bozinovski, Gjorgi Jovancevski:
Real-Time Systems - Biologically Inspired Future. 56-63 - Giti Javidi, Ehsan Sheybani:
Content-Based Computer Simulation of a Networking Course: An Assessment. 64-72
Volume 3, Number 4, April 2008
- Gabriele Di Stefano, Alberto Petricola:
A Distributed AOA Based Localization Algorithm for Wireless Sensor Networks. 1-8 - Letian Rong:
Multimedia Resource Replication Strategy for a Pervasive Peer-to-Peer Environment. 9-15 - Minjae Park, Woonsik Lee, Minh-Viet Nguyen, Hwang Soo Lee:
Practical Chip-level Equalizers in HSDPA. 16-23 - Javid Jaffari, Mohab Anis:
Thermal Driven Placement for Island-style MTCMOS FPGAs. 24-30 - Debashis Mandal, T. K. Bhattacharyya:
Implementation of CMOS Low-power Integer-N Frequency Synthesizer for SOC Design. 31-38 - Sayeed A. Badrudduza, Ziyan Wang, Giby Samson, Lawrence T. Clark:
Leakage Controlled Read Stable Static Random Access Memories. 39-49 - Hung-Ming Cheng:
Wordlength Estimation of Digital Controller Synthesis for Inkjet Printer Mechanism. 50-57 - Rekha Bhowmik:
Building Design Optimization Using Sequential Linear Programming. 58-64
Volume 3, Number 5, May 2008
- Jens Eliasson, Per Lindgren, Jerker Delsing:
A Bluetooth-based Sensor Node for Low-Power Ad Hoc Networks. 1-10 - P. S. Deshpande, Latesh G. Malik, Sandhya Arora:
Fine Classification & Recognition of Hand Written Devnagari Characters with Regular Expressions & Minimum Edit Distance Method. 11-17 - Norashidah Md Din, Norsheila Fisal:
Fuzzy Logic Bandwidth Prediction and Policing in a DiffServ-Aware Network. 18-23 - Hamidreza Zaboli, Mohammad Rahmati, Abdolreza Mirzaei:
Shape Recognition by Clustering and Matching of Skeletons. 24-33 - Masaaki Iijima, Kayoko Seto, Masahiro Numa, Akira Tada, Takashi Ipposhi:
Low Power SRAM with Boost Driver Generating Pulsed Word Line Voltage for Sub-1V Operation. 34-40 - Jyi-Tsong Lin, Yi-Chuen Eng:
Analysis of Block Oxide Height Variations for a 40nm Gate Length bFDSOI-FET. 41-45 - Debdeep Mukhopadhyay, Pallavi Joshi, Dipanwita Roy Chowdhury:
VLSI Architecture of a Cellular Automata based One-Way Function. 46-53 - Kailash Chandra Ray, A. S. Dhar:
High Throughput VLSI Architecture for Blackman Windowing in Real Time Spectral Analysis. 54-59 - Anju Sharma, Seema Bawa:
Comparative Analysis of Resource Discovery Approaches in Grid Computing. 60-64
Volume 3, Number 6, June 2008
- Jason G. Tong, Mohammed A. S. Khalid:
Profiling Tools for FPGA-Based Embedded Systems: Survey and Quantitative Comparison. 1-14 - Santosh D. Chede, Kishore D. Kulat:
Algorithm to Optimize Code Size and Energy Consumption in Real Time Embedded System. 15-21 - Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-Foss:
Formal Verification and Visualization of Security Policies. 22-31 - Mahmoud A. Ismail:
Vocal Tract Area Function Estimation Using Particle Swarm. 32-38 - Dharmalingam Jeya Mala, Vasudev Mohan:
IntelligenTester - Test Sequence Optimization Framework using Multi-Agents. 39-46 - Mohammad M. Alsuraihi, Dimitris I. Rigas:
Speech Displaces the Graphical Crowd. 47-58 - Anjali Mahajan, M. Sadique Ali:
Hybrid Evolutionary Algorithm Based Solution for Register Allocation for Embedded Systems. 59-65
Volume 3, Number 7, July 2008
- Shigeaki Sakurai, Youichi Kitahara, Ryohei Orihara, Koichiro Iwata, Nobuyoshi Honda, Toshio Hayashi:
Discovery of Sequential Patterns Coinciding with Analysts' Interests. 1-8 - Bin Liu, Rong Zhang, Sifeng Liu:
RFID Technology and its Perspective Analysis with KERGM(1, 1) Model. 9-15 - Te-Hsiu Sun:
K-Cosine Corner Detection. 16-22 - Ronghua Guo, Zheng Qin, Xiangnan Li, Junliang Chen:
Interacting Multiple Model Particle-type Filtering Approaches to Ground Target Tracking. 23-30 - Vishwas R. Puttige, Sreenatha G. Anavatti:
Real-time System Identification of Unmanned Aerial Vehicles: A Multi-Network Approach. 31-38 - Meng-Ju Han, Jing-Huai Hsu, Kai-Tai Song, Fuh-Yu Chang:
A New Information Fusion Method for Bimodal Robotic Emotion Recognition. 39-47 - Chin-Ming Hong, Yih-Guang Leu:
Adaptive Cerebellar Model Articulation Controller for a Class of Nonlinear Systems with Only Output Measurement. 48-55
Volume 3, Numbers 8, August 2008
- Zhao-Hui Jiang, Taiki Ishida:
A Neural Network Controller for Trajectory Control of Industrial Robot Manipulators. 1-8 - Alan McCabe, Jarrod Trevathan, Wayne Read:
Neural Network-based Hwritten Signature Verification. 9-22 - Satoshi Ito, Shinya Amano, Minoru Sasaki, Pasan Kulvanit:
A ZMP Feedback Control for Biped Balance its Application to In-Place Lateral Stepping Motion. 23-31 - Weihua Li, Chunyan Yang:
Extension Information-Knowledge-Strategy System for Semantic Interoperability. 32-39 - Masayuki Murakami:
Task-based Dynamic Fault Tolerance for Humanoid Robot Applications Its Hardware Implementation. 40-48 - Santosh D. Chede, Kishore D. Kulat:
Design Overview Of Processor Based Implantable Pacemaker. 49-57 - Hayeong Jeong, Shun Shiramatsu, Kiyoshi Kobayashi, Tsuyoshi Hatori:
Discourse Analysis of Public Debates Using Corpus Linguistic Methodologies. 58-68 - Yimin Shen, Jing Zhang, Yushun Fan:
Multi-Index Cooperative Mixed Strategy for Service Selection Problem in Service-Oriented Architecture. 69-76 - Takashi Onoyama, Takuya Maekawa, Yoshitaka Sakurai, Setsuo Tsuruta, Norihisa Komoda:
Selfish Constraint Satisfaction Genetic Algorithm for Planning a Long-distance Transportation Network. 77-85
Volume 3, Numbers 9, September 2008
- George J. Sun:
Introducing the New Editor-in-Chief of the Journal of Computers. 1 - Muneomi Sagara, Hiroaki Mukaidani, Toru Yamamoto:
Efficient Numerical Computations of Soft Constrained Nash Strategy for Weakly Coupled Large-Scale Systems. 2-10 - Karen A. Panetta, Eric J. Wharton, Sos S. Agaian:
Logarithmic Edge Detection with Applications. 11-19 - Yuichi Kobayashi:
The Emotion Sign: Human Motion Analysis Classifying Specific Emotion. 20-28 - Song Zhiwei, Chen Xiaoping, Cong Shuang:
Agent Learning in Relational Domains based on Logical MDPs with Negation. 29-38 - Masanori Takemoto, Hiroaki Kosaka, Hirokazu Nishitani:
A Study on the Relationships between Unsafe Driving Behaviors and Driver's Inner Factors When Entering a Non-signalized Intersection. 39-49 - Jian Wu, Sherif Abdelwahed:
An Efficient Finite-Input Receding Horizon Control Method and Its Application for the Pneumatic Hopping Robot. 50-57 - Kazuyuki Hanahara, Yukio Tada:
Human-Robot Communication with Hand-Clapping Language (Consideration from Communication Impedance Matching Viewpoint). 58-66 - Zushu Li, Dongwu Liang:
Human Simulated Intelligent Controller with Fuzzy Online Self-Tuning of Parameters and its Application to a Cart-Double Pendulum. 67-76 - Tsutomu Miyoshi:
Relation Organization of SOM Initial Map by Improved Node Exchange. 77-84
Volume 3, Numbers 10, October 2008
- Qi Luo, Ben K. M. Sim:
Editorial. 1-2 - Yingjie Xia, Guanghua Song, Yao Zheng:
SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification. 3-11 - Qihai Zhou, Tao Huang, Hongyu Wu:
An Isomorphic New Algorithm for Finding Convex Hull with a Maximum Pitch of the Dynamical Base Line Guided by Apexes Distributing Characteristics. 12-19 - Jian Wu, Xing-Ming Li:
An Effective Mining Algorithm for Weighted Association Rules in Communication Networks. 20-27 - Peide Liu, Tongjuan Wang:
Research on Risk Evaluation in Supply Chain Based on Grey Relational Method. 28-35 - Dehuai Zeng, Jianmin Xu, Gang Xu:
Data Fusion for Traffic Incident Detector Using D-S Evidence Theory with Probabilistic SVMs. 36-43 - Jun Wang, Bingli Fan, Dongping Men:
Data Analysis and Statistical Behaviors of Stock Market Fluctuations. 44-49 - Xiaoliang Jia, Zhenming Zhang, Xitian Tian:
Process Planning Knowledge Discovery Based on CAPP Database for Mechanical Manufacturing Enterprise. 50-57 - Youyao Liu, Jungang Han, Huimin Du:
A Hypercube-based Scalable Interconnection Network for Massively Parallel Computing. 58-65 - Lu Zhao, Xinqi Zheng, Shuqing Wang:
Design and Implementation of Spatial Data Mining System (M-SDM) based on MATLAB. 66-70 - Wei Liu, Ling Chen:
A Parallel Algorithm for Gene Expressing Data Biclustering. 71-77 - Kai Du, Zhengbing Hu, Huaimin Wang, Yingwen Chen, Shuqiang Yang, Zhijian Yuan:
Reliability Design for Large Scale Data Warehouses. 78-85 - Le Wang, Yan Jia, Yingwen Chen:
Conversation Extraction in Dynamic Text Message Stream. 86-93 - Ming Li, Yuanhong Hao:
Accelerated Kernel CCA plus SVDD: A Three-stage Process for Improving Face Recognition. 94-100 - Bo Jiang, Jiajun Bu, Chun Chen:
Providing Awareness of Cooperative Efficiency in Collaborative Graphics Design Systems through Reaction Mining. 101-108 - Jia Wu, Ling Chen:
Mining Frequent Subgraph by Incidence Matrix Normalization. 109-115
Volume 3, Numbers 11, November 2008
- Ishmael S. Msiza, Fulufhelo V. Nelwamondo, Tshilidzi Marwala:
Water Demand Prediction using Artificial Neural Networks and Support Vector Regression. 1-8 - Fong Chwee Teng, Ahmad Lotfi, Ah Chung Tsoi:
Novel Fuzzy Logic Controllers with Self-Tuning Capability. 9-16 - Kun-Li Wen, Shih-Kuen Changchien:
The Weighting Analysis of Influence Factors in Gas Breakdown via Rough Set and GM(h, N). 17-24 - Jun Yoneyama:
H8 Sample-Data Control of Fuzzy Systems with Input Delay. 25-31 - Jun-Zhao Sun:
QoS Aware Query Processing Algorithm for Wireless Sensor Networks. 32-41 - Miao Hao, Peter Deuflhard, Zengqi Sun, Masakazu Fujii:
Model-Free Uncalibrated Visual Servoing Using Recursive Least Squares. 42-50 - Fan Yang, Deyun Xiao:
Sensor Location Strategy in Large-Scale Systems for Fault Detection Applications. 51-57 - Tsung-Ying Sun, Shang-Jeng Tsai, Chih-Li Huo:
Intelligent Maneuvering Decision System for Computer Generated Forces Using Predictive Fuzzy Inference System. 58-66 - Tzung-Pei Hong, Min-Thai Wu:
A Hierarchical Gene-Set Genetic Algorithm. 67-75
Volume 3, Numbers 12, December 2008
- Fei Yu, Chin-Chen Chang, Ben M. Chen, Zhigang Chen, Jun Ni:
Editorial. 1-2 - Jun Wang, Qiuyuan Wang, Jiguang Shao:
Analytical Valuation of Contingent Claims by Stochastic Interacting Systems for Stock Market. 3-10 - Jun Wang, Bingli Fan, Tiansong Wang:
Statistical Analysis and Data Analysis of Stock Market by Interacting Particle Models. 11-18 - Linyan Tu, Wei Dong, Yindong Ji, Xinya Sun:
A Meta-model Based Modeling Method for Geographic Information Model in CTCS Hardware-in-the-loop Simulation System. 19-26 - Ming Yang, Fei Wang, Ping Yang:
A Novel Feature Selection Algorithm Based on Hypothesis-Margin. 27-34 - Liqiong Chen, Zhiqing Shao, Guisheng Fan, Hanhua Ma:
A Petri Net based Method for Analyzing Schedulability of Distributed Real-time Embedded Systems. 35-42 - Xiaofeng Chen, Dengguo Feng:
Direct Anonymous Attestation for Next Generation TPM. 43-50 - Jianhua Jiang, Huifang Ji, Gaochao Xu, Xiaohui Wei:
Scheduling Algorithm with Potential Behaviors. 51-59 - Xinquan Chen:
Weighted Clustering and Evolutionary Analysis of Hybrid Attributes Data Streams. 60-67 - Haibo Zhang, Xiaofei Wang, Wanhua Cao, Youpeng Huang:
Visual Cryptography for General Access Structure Using Pixel-block Aware Encoding. 68-75 - Lin Zhang, Ruchuan Wang, Haiyan Wang:
Trusted Decision Mechanism Based on Fuzzy Logic for Open Network. 76-83
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.