default search action
Computers & Electrical Engineering, Volume 33
Volume 33, Number 1, January 2007
- Liang-Teh Lee, Der-Fu Tao, Chieh Tsao:
An adaptive scheme for predicting the usage of grid resources. 1-11 - Wenming Li, Krishna M. Kavi, Robert Akl:
A non-preemptive scheduling algorithm for soft real-time systems. 12-29 - Elif Derya Übeyli, Inan Güler:
Performance analysis of classical, model-based and eigenvector methods: Ophthalmic arterial disorders detection case. 30-47 - Asim Bhatti, Saeid Nahavandi, Yakov Frayman:
3D depth estimation for visual inspection using wavelet transform modulus maxima. 48-57 - Sezer Gören, F. Joel Ferguson:
On state reduction of incompletely specified finite state machines. 58-69 - Kalim Qureshi, Paul D. Manuel:
Adaptive pre-task assignment scheduling strategy for heterogeneous distributed raytracing system. 70-78
Volume 33, Number 2, March 2007
- Richard Demo Souza, Javier Garcia-Frías, Renato da Rocha Lopes:
Turbo equalization for block fading MIMO channels using random signal mapping. 79-87 - Lifeng Guo, Guilin Wang:
Insider attacks on multi-proxy multi-signature schemes. 88-93 - Ho-Ting Wu, Kai-Wei Ke, Shunyong Huang:
A novel multicast mechanism for optical local area networks. 94-108 - F. Javier Díaz, Angel M. Burón, José M. Solana:
Haar wavelet based processor scheme for image coding with low circuit complexity. 109-126 - P. P. Sahu:
Improvement of jitter transfer characteristics of a 9.95328Gb/s data recovery DLL using saw filter. 127-132 - Shiang-Feng Tzeng, Yuan-Liang Tang, Min-Shiang Hwang:
A new convertible authenticated encryption scheme with message linkages. 133-138
- Ganesan Periakarruppan, Hairul A. Abdul-Rashid:
Packet based echo cancellation for VoIP networks. 139-148
Volume 33, Number 3, May 2007
- Liang-Teh Lee, Chen-Feng Wu:
An HMM-based call admission control policy for supporting QoS in wireless cellular networks. 153-165 - Yu Long, Kefei Chen, Shengli Liu:
ID-based threshold decryption secure against adaptive chosen-ciphertext attack. 166-176 - Yu-Chuan Liu, Hsiang-An Wen, Chun-Li Lin, Tzonelih Hwang:
Proxy-protected signature secure against the undelegated proxy signature attack. 177-185 - R. Shantha Selva Kumari, V. Sadasivam:
A novel algorithm for wavelet based ECG signal coding. 186-194 - Fei Xu, Chip-Hong Chang, Ching-Chuen Jong:
Hamming weight pyramid - A new insight into canonical signed digit representation and its applications. 195-207 - Chun-Wei Tseng, Chu-Sing Yang:
System support for web hosting services on server clusters. 208-220
- Nong-Kun Chen, Jiann-Liang Chen:
Feedback QoS control scheme for wireless network applications. 221-229
Volume 33, Number 4, July 2007
- Mohamed Abid:
Guest Editorial. 231-232 - Stephen Coe, Shawki Areibi, Medhat Moussa:
A hardware Memetic accelerator for VLSI circuit partitioning. 233-248 - Nicolas Gorse, P. Bélanger, Alexandre Chureau, El Mostapha Aboulhamid, Yvon Savaria:
A high-level requirements engineering methodology for electronic system-level design. 249-268 - Amir Masoud Gharehbaghi, Benyamin Hamdin Yaran, Shaahin Hessabi, Maziar Goudarzi:
An assertion-based verification methodology for system-level design. 269-284 - Abdellatif Mtibaa, Bouraoui Ouni, Mohamed Abid:
An efficient list scheduling algorithm for time placement problem. 285-298 - Hervé Charlery, Adrijean Andriahantenaina, Alain Greiner:
Physical design of the VCI wrappers for the on-chip packet-switched network named SPIN. 299-309 - Thomas Hollstein, Manfred Glesner:
Advanced hardware/software co-design on reconfigurable network-on-chip based hyper-platforms. 310-319
Volume 33, Numbers 5-6, September-November 2007
- Paris Kitsos, Nicolas Sklavos:
Guest Editors' Introduction to the Special Issue on Security of Computers and Networks. 321-323 - Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede:
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller. 324-332 - Apostolos P. Fournaris, Odysseas G. Koufopavlou:
Applying systolic multiplication-inversion architectures based on modified extended Euclidean algorithm for GF(2k) in elliptic curve cryptography. 333-348 - Grace Elias, Ali Miri, Tet Hin Yeap:
On efficient implementation of FPGA-based hyperelliptic curve cryptosystems. 349-366 - Elke De Mulder, Siddika Berna Örs, Bart Preneel, Ingrid Verbauwhede:
Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems. 367-382 - Timo Alho, Panu Hämäläinen, Marko Hännikäinen, Timo D. Hämäläinen:
Compact modular exponentiation accelerator for modern FPGA devices. 383-391 - Maurice Keller, Robert Ronan, William P. Marnane, Colin C. Murphy:
Hardware architectures for the Tate pairing over GF(2m). 392-406 - Asaf Ashkenazi, Dmitry Akselrod:
Platform independent overall security architecture in multi-processor system-on-chip integrated circuits for use in mobile phones and handheld devices. 407-424 - Drago Zagar, Kresimir Grgic, Snjezana Rimac-Drlje:
Security aspects in IPv6 networks - implementation and testing. 425-437 - Zorana Bankovic, Dusan Stepanovic, Slobodan Bojanic, Octavio Nieto-Taladriz:
Improving network security using genetic algorithm approach. 438-451
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.