default search action
Computers & Electrical Engineering, Volume 36
Volume 36, Number 1, January 2010
- Manu Malek:
CEE Introductory Editorial. 1 - Wei Lu, Hongtao Lu, Fu-Lai Chung:
Feature based robust watermarking using image normalization. 2-18 - Wen-Hwa Liao, Kuei-Ping Shih, Wan-Chi Wu:
A grid-based dynamic load balancing approach for data-centric storage in wireless sensor networks. 19-30 - Xiangyang Wang, Yi-Ping Yang, Hong-Ying Yang:
Invariant image watermarking using multi-scale Harris detector and wavelet moments. 31-44 - Ouldooz Baghban Karimi, Mahmood Fathy:
Adaptive end-to-end QoS for multimedia over heterogeneous wireless networks. 45-55 - Amr M. Youssef:
Cryptanalysis of Boolean permutation-based key escrow scheme. 56-60 - Joy Iong-Zong Chen, Chieh Wen Liou, Chieh Chung Yu:
Error probability analysis of an MC-DS-CDMA system under Weibull fading with a moment-generating function. 61-72 - Jean-Luc Beuchat, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, Hiroyasu Yamamoto:
FPGA and ASIC implementations of the etaT pairing in characteristic three. 73-87 - Abdoul Rjoub, M. Mousameh, Odysseas G. Koufopavlou:
Full custom low-power/high performance DDP-based Cobra-H64 cipher. 88-99 - Shun-Sheng Wang, Kuo-Qin Yan, Shu-Ching Wang:
An optimal solution for byzantine agreement under a hierarchical cluster-oriented mobile ad hoc network. 100-113 - Ipek Abasikeles, Mehmet Fatih Akay:
Performance evaluation of directory protocols on an optical broadcast-based distributed shared memory multiprocessor. 114-131 - Aiguo Li, Bingrong Hong:
On-line control flow error detection using relationship signatures among basic blocks. 132-141 - José Luis Ayala, Cándido Méndez, Marisa López-Vallejo:
Thermal analysis and modeling of embedded processors. 142-154 - Duc-Liem Vo, Hyunrok Lee, Chan Yeob Yeun, Kwangjo Kim:
Enhancements of authenticated multiple key exchange protocol based on bilinear pairings. 155-159 - Xiaofei Zhang, Gaopeng Feng, Xin Gao, Dazhuan Xu:
Blind multiuser detection for MC-CDMA with antenna array. 160-168 - Dragan Ivetic, Srdan Mihic, Branko Markoski:
Augmented AVI video file for road surveying. 169-179 - Shihui Zheng, Licheng Wang, Yixian Yang:
A new impossible differential attack on SAFER ciphers. 180-189 - Jih-Ching Chiu, Kai-Ming Yang:
A Novel instruction stream buffer for VLIW architectures. 190-198 - Ali A. Kanso:
Encryption System with Variable Number of Registers. 199-212 - Yunho Lee, Seungjoo Kim, Dongho Won:
Enhancement of two-factor authenticated key exchange protocols in public wireless LANs. 213-223 - N. Kumaratharan, Perumal Dananjayan:
Performance improvement in detection and estimation of MC-CDMA systems over MIMO channels. 224-233 - Mao-Lun Chiang, Shu-Ching Wang, Lin-Yu Tseng:
The anatomy study of consensus agreement in MANETs. 234-253
Volume 36, Number 2, March 2010
- Isaac Woungang:
Wireless ad hoc, sensor and mesh networks. 259-260 - Lloyd Emmanuel, Xavier N. Fernando:
Wavelet-based spectral shaping of UWB radio signal for multisystem coexistence. 261-268 - Haibo Xu, Hui Tian, Ping Zhang:
A novel terminal-controlled handover scheme in heterogeneous wireless networks. 269-279 - Yun-Sheng Yen, Hung-Chieh Chang, Ruay-Shiung Chang, Han-Chieh Chao:
Routing with adaptive path and limited flooding for mobile ad hoc networks. 280-290 - Ping Dong, Hongke Zhang, Hongbin Luo, Ting-Yun Chi, Sy-Yen Kuo:
A network-based mobility management scheme for future Internet. 291-302 - Ali Chamam, Samuel Pierre:
A distributed energy-efficient clustering protocol for wireless sensor networks. 303-312 - Jun Yi, Christian Poellabauer:
Real-time multicast for wireless multihop networks. 313-327 - Leszek Lilien, Ajay Gupta, Zill-E-Huma Kamal, Zijiang Yang:
Opportunistic resource utilization networks - A new paradigm for specialized ad hoc networks. 328-340 - Seung-Hwan Lee, Yong-Hwan Lee:
Adaptive frequency hopping and power control based on spectrum characteristic of error sources in Bluetooth systems. 341-351 - Ho Van Khuong, Tho Le-Ngoc:
Bandwidth-efficient cooperative MIMO relaying schemes. 352-357 - Lamiaa Khalid, Alagan Anpalagan:
Emerging cognitive radio technology: Principles, challenges and opportunities. 358-366 - Sudip Misra, Sanjay K. Dhurandher, Avanish Rayankula, Deepansh Agrawal:
Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks. 367-382 - Vincent Ngo, Alagan Anpalagan:
A detailed review of energy-efficient medium access control protocols for mobile sensor networks. 383-396
Volume 36, Number 3, May 2010
- Volkan Kumbasar, Oguz Kucur:
Better wavelet packet tree based OFDM for multipath powerline channel. 397-403 - Shih-Yan Chen, Shin-Shin Kao:
Hamiltonian connectivity and globally 3*-connectivity of dual-cube extensive networks. 404-413 - Athanasios Doukas, Grigorios Kalivas:
Analysis and performance evaluation of a pilot-aided interpolated channel estimator for OFDM systems. 414-423 - Khader Mohammad, Sos S. Agaian, Fred Hudson:
Implementation of Digital Electronic Arithmetics and its application in image processing. 424-434 - Renwang Su, Zhenfu Cao:
An efficient anonymous authentication mechanism for delay tolerant networks. 435-441 - Jia Xu, Qianmu Li, Hong Zhang, Fengyu Liu:
Model and analysis of path compression for mobile Ad Hoc networks. 442-454 - Rashid A. Saeed, Sabira Khatun, Borhanuddin Mohd Ali, Mohd Khazani Abdullah:
A joint PHY/MAC cross-layer design for UWB under power control. 455-468 - Wenjing Yue, Baoyu Zheng:
Spectrum sensing algorithms for primary detection based on reliability in cognitive radio systems. 469-479 - Ozcan Ozturk:
Improving chip multiprocessor reliability through code replication. 480-490 - Ghassem Jaberipur, Saeid Gorgin:
An improved maximally redundant signed digit adder. 491-502 - Chunlin Li, Layuan Li:
Controlling energy without compromising system performance in mobile grid environments. 503-517 - Apostolos Katidiotis, Kostas Tsagkaris, Panagiotis Demestichas:
Performance evaluation of artificial neural network-based learning schemes for cognitive radio systems. 518-535 - José B. Aragão Jr., Guilherme De A. Barreto:
Novel approaches for online playout delay prediction in VoIP applications using time series models. 536-544 - Zhengping Jin, Qiaoyan Wen, Hongzhen Du:
An improved semantically-secure identity-based signcryption scheme in the standard model. 545-552 - Xingzhi Wang, Zheng Yan, Li Li:
A grid computing based approach for the power system dynamic security assessment. 553-564 - Ignacio Algredo-Badillo, Claudia Feregrino Uribe, René Cumplido, Miguel Morales-Sandoval:
Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11i standard. 565-577 - Rafiullah Chamlawi, Asifullah Khan, Imran Usman:
Authentication and recovery of images using multiple watermarks. 578-584 - Ming Ming Wong, M. L. Dennis Wong, Ismat Hijazin:
A throughput maximised parallel architecture for 2D fast Discrete Pascal Transform. 585-591
Volume 36, Number 4, July 2010
- Beata J. Wysocki, Tadeusz A. Wysocki, Hamid Sharif:
Guest Editorial. 593-595 - Amir Valizadeh, Mahsa Najibi:
A constrained optimization approach for an adaptive generalized subspace tracking algorithm. 596-602 - Jean-Marc Valin, Daniel V. Smith, Christopher Montgomery, Timothy B. Terriberry:
An iterative linearised solution to the sinusoidal parameter estimation problem. 603-616 - Hitoshi Hayakawa, Tadashi Shibata:
Block-matching-based motion field generation utilizing directional edge displacement. 617-625 - Kevin Adistambha, Stephen J. Davis, Christian H. Ritz, Ian S. Burnett:
Efficient multimedia query-by-content from mobile devices. 626-642 - Simon Denman, Todd Lamb, Clinton Fookes, Vinod Chandran, Sridha Sridharan:
Multi-spectral fusion for surveillance systems. 643-663 - Tai Nguyen-Ky, John Leis, Wei Xiang:
An improved new error estimation algorithm for optimal filter lengths for stereophonic acoustic echo cancellation. 664-675 - Vanessa Testoni, Max H. M. Costa:
Entropy coders and 3D-Hadamard coefficients sequency scan order for a fast embedded color video codec. 676-690 - Jun Zhang, Lei Ye:
Series feature aggregation for content-based image retrieval. 691-701 - Young H. Jung, Yoonsik Choe:
Resource-aware and quality-fair video-streaming using multiple adaptive TCP connections. 702-717 - Fariza Sabrina:
A novel resource scheduling algorithm for QoS-aware services on the Internet. 718-734 - Kumudu S. Munasinghe, Abbas Jamalipour:
An analytical evaluation of mobility management in integrated WLAN-UMTS networks. 735-751 - Huda AlAmri, Mehran Abolhasan, Tadeusz A. Wysocki:
Scalability of MANET routing protocols for heterogeneous and homogenous networks. 752-765 - Le Chung Tran, Alfred Mertins, Tadeusz A. Wysocki:
Quasi-orthogonal space-time-frequency codes in MB-OFDM UWB. 766-774 - Keni Popovski, Tadeusz A. Wysocki, Beata J. Wysocki:
A closed-form derivation of self and multi-user interference for time-reversed UWB communications. 775-788 - Yafeng Wang, Hao Yang, Dacheng Yang, Wei Xiang:
Iterative decision feedback equalizer with cyclic detection for DFT-S OFDM system. 789-801
Volume 36, Number 5, September 2010
- Hamid Sarbazi-Azad, Lewis M. Mackenzie:
Special section on advances in computing systems science and engineering. 803-804 - Soheil Hassas Yeganeh, Jafar Habibi, Habib Rostami, Hassan Abolhassani:
Semantic web service composition testbed. 805-817 - Nasser Yazdani, Hossein Mohammadi:
DMP-tree: A dynamic M-way prefix tree data structure for strings matching. 818-834 - Mehdi Kargahi, Ali Movaghar:
Dynamic routing of real-time jobs among parallel EDF queues: A performance study. 835-849 - Hooman Nikmehr, Braden Phillips, Cheng-Chew Lim:
A novel implementation of radix-4 floating-point division/square-root using comparison multiples. 850-863 - H. Parandeh-Afshar, Sied Mehdi Fakhraie, Omid Fatemi:
Parallel merged multiplier-accumulator coprocessor optimized for digital filters. 864-873 - Hamid Reza Shahriari, Mohammad Sadegh Makarem, Marjan Sirjani, Rasool Jalili, Ali Movaghar:
Vulnerability analysis of networks to detect multiphase attacks using the actor-based language Rebeca. 874-885 - S. H. Nabavi-Kerizi, Mohammad Shams Esfand Abadi, Ehsanollah Kabir:
A PSO-based weighting method for linear combination of neural networks. 886-894 - Farshad Rostamabadi, Mohammad Ghodsi:
Incremental labeling in closed-2PM model. 895-901 - Kaveh Jokar Deris, Amirali Baniasadi:
Power-aware BTB for modern processors. 902-911
- Heeheon Kim, Xuefeng Piao, Sangchul Han, Moonju Park, Minkyu Park, Seongje Cho, Yookun Cho:
Improving responsiveness of soft aperiodic tasks using proportional slack time. 913-926 - Mingjun Wu, Xianrong Peng, Qiheng Zhang, Rujin Zhao:
Segmenting and tracking multiple objects under occlusion using multi-label graph cut. 927-934 - Azzam Y. Al-nahari, Sami A. El-Dolil, M. I. Desouky, Fathi E. Abd El-Samie:
Power-based multi-cell call admission control scheme for wideband-CDMA systems. 935-947 - Ji-Seon Lee, Jik Hyun Chang, Dong Hoon Lee:
Forgery attacks on Kang et al.'s identity-based strong designated verifier signature scheme and its improvement with security proof. 948-954 - Chiou-Yng Lee, Pramod Kumar Meher:
Efficient bit-parallel multipliers over finite fields GF(2m). 955-968 - Wenfa Zhan, Huaguo Liang, Cuiyun Jiang, Zhengfeng Huang, Aiman H. El-Maleh:
A scheme of test data compression based on coding of even bits marking and selective output inversion. 969-977 - Imam Al-wazedi, Ahmed K. Elhakeem:
A CDMA/TDD approach for wireless mesh networks. 978-992 - Ali Kanso:
Modified self-shrinking generator. 993-1001 - Tsung Hung Chen, Shyh-Chang Liu, Jyh-Haw Chen:
Adaptive receiver-driven approach in P2P live streaming networks. 1002-1013 - Jie Yang, Shengsheng Yu, Jingli Zhou, Yi Gao:
A new error concealment method for consecutive frame loss based on CELP speech. 1014-1020
Volume 36, Number 6, November 2010
- Qiang Dong, Xiaofan Yang, Dajin Wang:
Embedding multi-dimensional meshes into twisted cubes. 1021-1026 - Salem H. Salamah, Turki Darweesh:
Coverage study for broadband wireless systems using link adaptation and diversity combining techniques. 1027-1034 - Zuhua Shao:
Fair exchange protocol of Schnorr signatures with semi-trusted adjudicator. 1035-1045 - Rui Zhang, Jiqiang Liu, Zhen Han, Lijuan Zheng:
An IBE scheme using ECC combined public key. 1046-1054 - Serkan Dursun, Artyom M. Grigoryan:
Nonlinear L2-by-3 transform for PAPR reduction in OFDM systems. 1055-1065 - Ramin Tajallipour, Khan A. Wahid:
Error-free algorithm and architecture of radix-10 logarithmic converter. 1066-1074 - Dorin Patru, R. Scott Hudson:
Optically injected logic circuits for remote-powered systems on a chip. 1075-1092 - Yilmaz Uyaroglu, Ihsan Pehlivan:
Nonlinear Sprott94 Case A chaotic equation: Synchronization and masking communication applications. 1093-1100 - Nasro Min-Allah, Ishtiaq Ali, Jiansheng Xing, Yongji Wang:
Utilization bound for periodic task set with composite deadline. 1101-1109 - Fiaz Gul Khan, Kalim Qureshi, Babar Nazir:
Performance evaluation of fault tolerance techniques in grid computing system. 1110-1122 - Chunlin Li, Layuan Li:
Joint contexts optimization for mobile grid. 1123-1139 - Farhad Gh. Khodaei, Javad Nourinia, Changiz Ghobadi:
Adaptive beamforming algorithm with increased speed and improved reliability for smart antennas. 1140-1146 - Vahideh Vakil, Hassan Aghaeinia:
Throughput improvement of STS-based MC DS-CDMA system with adaptive modulation. 1147-1155 - Tae-Wuk Bae, Byoung-Ik Kim, Young-Choon Kim, Kyu-Ik Sohng:
Small target detection using cross product based on temporal profile in infrared image sequences. 1156-1164 - H. Fatih Ugurdag, Sezer Gören, Ferhat Canbay:
Gravitational pose estimation. 1165-1180 - Pawel Kulakowski, Javier Vales-Alonso, Esteban Egea-López, Wieslaw Ludwin, Joan García-Haro:
Angle-of-arrival localization based on antenna arrays for wireless sensor networks. 1181-1186 - Partha Pratim Sahu, S. Panda:
Frequency hopping spread spectrum signalling using code quadratic FSK technique for multichannel. 1187-1192 - Xiangzhi Bai, Fugen Zhou:
Infrared small target enhancement and detection based on modified top-hat transformations. 1193-1201
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.