Volume 35, Number 1, January 2009
, Cuneyt Akinlar
: Secure seamless peer-to-peer (P2P) UDP communication using IPv4 LSRR option and IPv4+4 addresses.
Ali A. Kanso
: An efficient cryptosystem Delta for stream cipher applications.
: Dynamic and efficient joint encryption scheme in the plain public key model.
Volume 35, Number 2, March 2009
Volume 35, Number 3, May 2009
Khaled A. Mayyas
: Low complexity LMS-type adaptive algorithm with selective coefficient update for stereophonic acoustic echo cancellation.
, Muhammed Salamah
: Performance analysis of a threshold based distributed channel allocation algorithm for cellular networks.
: Provably secure proxy-protected signature schemes based on RSA.
Volume 35, Number 4, July 2009
, Hassan Aghaeinia
: Throughput analysis of STS-based CDMA system with variable spreading factor in non-frequency selective Rayleigh fading channel.
, Nasser Qaddoumi
: Potential of near-field microwave imaging in breast cancer detection utilizing tapered rectangular waveguide probes.
Volume 35, Number 5, September 2009
: Strongly Hamiltonian laceability of the even k-ary n-cube.
: Identity-based mix: Anonymous communications without public key certificates.
: Novel automatic video cut detection technique using Gabor filtering.
: Impulse invariance-based method for the computation of fractional integral of order 0alpha.
, Chienhua Chen
: Performance analysis of non-preemptive GE/G/1 priority queueing of LER system with bulk arrivals.
Syed Mahfuzul Aziz
: A cycle-accurate transaction level SystemC model for a serial communication bus.
Volume 35, Number 6, November 2009
, Zheng Liang
: An accelerator design for speedup of Java execution in consumer mobile devices.
, Xiaolong Wu
, Si-Qing Zheng
: An optimal and processor efficient parallel sorting algorithm on a linear array with a reconfigurable pipelined bus system.
, Peizhong Lu
: A two-phase scheduling strategy for real-time applications with security requirements on heterogeneous clusters.