


default search action
Computers & Electrical Engineering, Volume 37
Volume 37, Number 1, January 2011
- Reza Moraveji, Hamid Sarbazi-Azad, Abbas Nayebi, Keivan Navi:

Modeling the effects of hot-spot traffic load on the performance of wormhole-switched hypermeshes. 1-23 - Yih-Ching Su, Ming-Haw Jing, Yaotsu Chang, Jian-Hong Chen, Zih-Heng Chen:

A fast parallel (23, 12, 7) QR decoder based on syndrome-weight determination. 24-29 - Kenli Li, Tianfang Tan, Xiaoyong Tang, Feng Wang:

Parallelization methods for implementation of discharge simulation along resin insulator surfaces. 30-40 - Cemal Hanilçi, Figen Ertas:

Comparison of the impact of some Minkowski metrics on VQ/GMM based speaker recognition. 41-56 - Ho-Lung Hung:

Using evolutionary computation technique for trade-off between performance peak-to average power ration reduction and computational complexity in OFDM systems. 57-70 - Mohamed M. Nasreldin Rasslan

, Amr M. Youssef:
Comments on the security of Chen's authenticated encryption scheme. 71-74 - Pejman Goudarzi, Mohammad R. Nezami Ranjbar:

Bandwidth allocation for video transmission with differentiated quality of experience over wireless networks. 75-90 - Dawid Zydek, Henry Selvaraj:

Fast and efficient processor allocation algorithm for torus-based chip multiprocessors. 91-105 - Lei Guo

, Yuhuai Peng, Xingwei Wang, Dingde Jiang, Yinpeng Yu:
Performance evaluation for on-demand routing protocols based on OPNET modules in wireless mesh networks. 106-114 - Mohammed Abd-Elnaby, Mohamed R. M. Rizk

, Moawad I. Dessouky
, Sami A. El-Dolil:
Efficient contention-based MAC protocol using adaptive fuzzy controlled sliding backoff interval for wireless networks. 115-125
Volume 37, Number 2, March 2011
- Nicolas Sklavos

, Sherali Zeadally, Cristina Alcaraz
:
Guest Editors' Introduction to the Special Issue on "Modern trends in applied security: Architectures, implementations and applications". 127-128 - Hu Xiong, Jian-bin Hu, Zhong Chen, Fagen Li

:
On the security of an identity based multi-proxy signature scheme. 129-135 - Zuhua Shao:

Enhanced Certificate-Based Encryption from pairings. 136-146 - Rodrigo Roman, Cristina Alcaraz

, Javier López
, Nicolas Sklavos
:
Key management systems for sensor networks in the context of the Internet of Things. 147-159 - Ioana Lasc, Reiner Dojen, Tom Coffey:

Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications. 160-168 - Lein Harn, Chu-Hsing Lin:

Contract signature in e-commerce. 169-173 - Pin-Chang Su:

Enhanced short signature scheme with hybrid problems. 174-179 - Kyung-Ah Shim:

Short designated verifier proxy signatures. 180-186 - Qingfeng Cheng, Chuangui Ma:

Analysis and improvement of an authenticated multiple key exchange protocol. 187-190 - Zuowen Tan:

Efficient identity-based authenticated multiple key exchange protocol. 191-198 - Mohammad Sabzinejad Farash

, Majid Bayat
, Mahmoud Ahmadian-Attari:
Vulnerability of two multiple-key agreement protocols. 199-204 - Liang Ni

, Gongliang Chen, Jianhua Li, Yanyan Hao:
Strongly secure identity-based authenticated key agreement protocols. 205-217 - Ziyi You, Xiaoyao Xie:

A novel group key agreement protocol for wireless mesh network. 218-239
Volume 37, Number 3, May 2011
- Ravinder Nath

:
Modified Generalized Autocorrelation based Estimator for time delays in multipath environment - A tradeoff in estimator performance and number of multipath. 241-252 - Miao Liu, Ke Wang, Yue Huang, Xiangling Li:

Reducing PAPR by selecting optimal wavelet tree structure in WOFDM. 253-260 - J. Jackson Juliet Roy, Vaidehi V.

, M. S. Sricharan:
QoS guaranteed integration methodology for a WLAN-WiMAX heterogeneous network. 261-274 - Giuseppe Alia, Enrico Martinelli:

A high performance ROM-based structure for modular exponentiation. 275-284 - Xuanxing Xiong, Yang Song, Ali Akoglu

:
Architecture design of variable block size motion estimation for full and fast search algorithms in H.264/AVC. 285-299 - Lizhe Wang

, Dan Chen, Fang Huang
:
Virtual workflow system for distributed collaborative scientific applications on Grids. 300-310 - Zhaoxuan Zhu, Houjun Wang, Zhigang Wang, Hao Zhang:

Reconstruction of compressed samples in shift-invariant space base on matrix factorization. 311-318 - Hsun Su, Jing-Ling Pan, Shin-Shin Kao:

Mutually independent Hamiltonian cycles in k-ary n-cubes when k is even. 319-331 - Stefan Panic

, Petar C. Spalevic, Jelena A. Anastasov
, Mihajlo C. Stefanovic, Mile Petrovic
:
On the performance analysis of SIR-based SSC diversity over correlated α-μ fading channels. 332-338 - Amit Phadikar, Santi P. Maity

, Bhupendra Verma
:
Region based QIM digital watermarking scheme for image database in DCT domain. 339-355 - Eun-Jun Yoon, Kee-Young Yoo, Keum-Sook Ha:

A user friendly authentication scheme with anonymity for wireless communications. 356-364 - Antônio Augusto Fröhlich

, Giovani Gracioli, João Felipe Santos
:
Periodic timers revisited: The real-time embedded system perspective. 365-375 - Aiman El-Maleh

, Saif al Zahir, Esam Khan
:
Test data compression based on geometric shapes. 376-391 - Omer Deperlioglu

, Utku Kose
:
An educational tool for artificial neural networks. 392-402
Volume 37, Number 4, July 2011
- Lizhe Wang

, Dan Chen, Ze Deng, Fang Huang
:
Large scale distributed visualization on computational Grids: A review. 403-416 - Glaucio H. S. Carvalho:

Optimal control of preemptive systems with loss. 417-424 - Xiangyang Wang, Tianxiao Ma, Pan-Pan Niu:

A pseudo-Zernike moment based audio watermarking scheme robust against desynchronization attacks. 425-443 - Debiao He

, Jianhua Chen, Rui Zhang:
An efficient identity-based blind signature scheme without bilinear pairings. 444-450 - Sandra Roger

, Alberto González
, Vicenç Almenar
, Antonio M. Vidal
:
Practical aspects of preprocessing techniques for K-Best tree search MIMO detectors. 451-460 - Javad Akbari Torkestani, Mohammad Reza Meybodi:

LLACA: An adaptive localized clustering algorithm for wireless ad hoc networks. 461-474 - Hafizur Rahaman

, Dipak Kumar Kole, Debesh K. Das, Bhargab B. Bhattacharya:
Fault diagnosis in reversible circuits under missing-gate fault model. 475-485 - Sourav Kumar Mukhopadhyay

, Sucharita Mitra, Madhuchhanda Mitra
:
A lossless ECG data compression technique using ASCII character encoding. 486-497 - Hussein El Ghor, Maryline Chetto, Rafic Hage Chehade:

A real-time scheduling framework for embedded systems with environmental energy harvesting. 498-510 - Wen-Hwa Liao

, Kuei-Ping Shih, Chen Liu, Avinash Kumar Dubey, Sagar Arora, Sital Prasad Kedia:
An efficient scheduling algorithm for radio resource reuse in IEEE 802.16j multi-hop relay networks. 511-525 - Peng Zeng, Zhenfu Cao

, Kim-Kwang Raymond Choo
:
An ID-based digital watermarking protocol for copyright protection. 526-531 - Piyi Yang, Zhenfu Cao

, Xiaolei Dong:
Fuzzy identity based signature with applications to biometric authentication. 532-540 - Francisco G. Montoya

, Alfredo Alcayde
, Pedro Sánchez, Consolación Gil
, Maria Dolores Gil Montoya, Julio Gómez
:
Comparative analysis of power variables in high performance embedded and x86 architectures using GNU/Linux. 541-549 - Dandan Zhao, Yujie Zhou, Dayong Wang, Junfa Mao

:
Effective macroblock layer rate control algorithm for H.264/AVC. 550-558 - L. A. Khan, Muhammad Shamim Baig, Ali Hassan

:
Crypt analysis of two time pads in case of compressed speech. 559-569 - J. Lei:

Generalized reconstruction algorithm for compressed sensing. 570-588 - Óscar Varela, Rubén San Segundo

, Luís A. Hernández:
Combining pulse-based features for rejecting far-field speech in a HMM-based Voice Activity Detector. 589-600 - Hamid Beigy

, Mohammad Reza Meybodi:
Learning automata based dynamic guard channel algorithms. 601-613 - Xiaofeng Chen, Fangguo Zhang

, Haibo Tian, Baodian Wei, Kwangjo Kim:
Discrete logarithm based chameleon hashing and signatures without key exposure. 614-623 - John N. Whitley, Raphael C.-W. Phan

, Jie Wang
, David J. Parish:
Attribution of attack trees. 624-628
Volume 37, Number 5, September 2011
- Nicholas Sia Pik Kong, Haidi Ibrahim

:
Multiple layers block overlapped histogram equalization for local content emphasis. 631-643 - Madhu S. Nair

, G. Raju
:
Additive noise removal using a novel fuzzy-based filter. 644-655 - Hong-Ying Yang, Xiangyang Wang, Tian-Xiang Qu, Zhong-Kai Fu:

Image denoising using bilateral filter and Gaussian scale mixtures in shiftable complex directional pyramid domain. 656-668 - Chuanbo Chen, Guangwei Wang, Mudar Sarem:

A new non-symmetry and anti-packing model and its application to image contrast enhancement. 669-680 - Ngai Ming Kwok, Xiuping Jia

, Dalong Wang, Shengyong Chen, Gu Fang
, Quang Phuc Ha:
Visual impact enhancement via image histogram smoothing and continuous intensity relocation. 681-694 - Hong-Ying Yang, Xiangyang Wang, Lili Chen:

Geometrically invariant image watermarking using SVR correction in NSCT domain. 695-713 - Harsh Vikram Singh

, Suresh Rai, Anand Mohan, Surya Pal Singh:
Robust copyright marking using Weibull distribution. 714-728 - Turgay Çelik

, Tardi Tjahjadi:
Multiscale texture classification and retrieval based on magnitude and phase features of complex wavelet subbands. 729-743 - Mohammad Bagher Akbari Haghighat

, Ali Aghagolzadeh
, Hadi Seyedarabi
:
A non-reference image fusion metric based on mutual information of image features. 744-756 - Fangyan Nie

, Chao Gao, Yongcai Guo, Min Gan:
Two-dimensional minimum local cross-entropy thresholding based on co-occurrence matrix. 757-767 - Ehsan Namjoo

, Ali Aghagolzadeh
, Javad Museviniya:
Robust transmission of scalable video stream using modified LT codes. 768-781 - Fang Li, Chaomin Shen, Ruihua Liu, Jinsong Fan:

A fast implementation algorithm of TV inpainting model based on operator splitting method. 782-788 - Mohammad Bagher Akbari Haghighat

, Ali Aghagolzadeh
, Hadi Seyedarabi
:
Multi-focus image fusion for visual sensor networks in DCT domain. 789-797 - Mohsen Nasri

, Abdelhamid Helali
, Halim Sghaier, Hassen Maaref:
Adaptive image compression technique for wireless sensor networks. 798-810 - Mehran Safayani, Mohammad Taghi Manzuri Shalmani

:
Three-dimensional modular discriminant analysis (3DMDA): A new feature extraction approach for face recognition. 811-823 - M. Alarmel Mangai, N. Ammasai Gounden:

Classification of 3-D objects and faces employing view-based clusters. 824-833
Volume 37, Number 6, November 2011
- Rashid Ali

, Mirza Mohd. Sufyan Beg
:
An overview of Web search evaluation methods. 835-848 - Xuelian Li, Yupu Hu, Juntao Gao:

On the value distributions of Walsh spectrums of quadratic Plateaued functions. 849-857 - Carlos A. Gonzalez-Gutierrez, Juvenal Rodríguez-Reséndiz

, Georgina Mota-Valtierra, Edgar Alejandro Rivas-Araiza, Jorge D. Mendiola-Santibañez, Ricardo Luna-Rubio:
A PC-based architecture for parameter analysis of vector-controlled induction motor drive. 858-868 - Amit K. Awasthi

, Keerti Srivastava
, R. C. Mittal:
An improved timestamp-based remote user authentication scheme. 869-874 - Sema Nur Kirici Koç, Adnan Köksal:

Wire antennas optimized using genetic algorithm. 875-885 - Caio C. O. Ramos, André N. de Souza, Giovani Chiachia, Alexandre X. Falcão

, João P. Papa:
A novel algorithm for feature selection using Harmony Search and its application for non-technical losses detection. 886-894 - Hao Ye, Kaiping Xue

, Peilin Hong, Hancheng Lu:
Viewing experience optimization based on adaptive requesting window adjustment in peer-to-peer media streaming. 895-904 - Liqiang Wang, Mao Ye

, Jian Ding, Yuanxiang Zhu:
Hybrid fire detection using hidden Markov model and luminance map. 905-915 - Qun Wang, Zhiwen Liu:

A robust and efficient algorithm for distributed compressed sensing. 916-926 - ChunLei Li, Yunhong Wang, Bin Ma, Zhaoxiang Zhang:

A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure. 927-940 - Monji Zaidi

, Ridha Ouni
, Rached Tourki:
Wireless propagation channel modeling for optimized Handoff algorithms in wireless LANs. 941-957 - Fadi N. Sibai

:
Design and evaluation of low latency interconnection networks for real-time many-core embedded systems. 958-972 - Li Fan, Tiegang Gao, Qunting Yang, Yanjun Cao:

An extended matrix encoding algorithm for steganography of high embedding efficiency. 973-981 - Mika Asami, Makoto Okuda, Minoru Aoyagi:

Possibility of an embedded system for ultrasound-based measurement of the distances to two target objects. 982-990 - Jian-quan Ouyang, Hua Nie, Min Zhang, Zezhou li, Yongzhou Li:

Fusing audio-visual fingerprint to detect TV commercial advertisement. 991-1008 - Morteza Saraf, Karim Mohammadi, Mohammad R. Mosavi

:
Classifying the Geometric Dilution of Precision of GPS satellites utilizing Bayesian decision theory. 1009-1018 - Somayeh Bahramnejad

, Hamid R. Zarandi:
Mitigation of soft errors in SRAM-based FPGAs using CAD tools. 1019-1031 - Boppana Lakshmi, A. S. Dhar:

VLSI architecture for low latency radix-4 CORDIC. 1032-1042 - Kashif Latif, Arshad Aziz, Athar Mahboob:

Optimal utilization of available reconfigurable hardware resources. 1043-1057 - Jagadish Chandra Mohanta

, Dayal Ramakrushna Parhi
, Saroj Kumar Patel
:
Path planning strategy for autonomous mobile robot navigation using Petri-GA optimisation. 1058-1070 - Zhili Chen, Liusheng Huang, Haibo Miao, Wei Yang, Peng Meng:

Steganalysis against substitution-based linguistic steganography based on context clusters. 1071-1081 - Ahmet Rizaner

, Ali Hakan Ulusoy
, Hasan Amca, Kadri Hacioglu:
An adaptive least squares channel estimation based on conjugate gradient approach for multipath fading CDMA systems. 1082-1089 - Khaled Salah

, A. Manea, Sherali Zeadally, José M. Alcaraz Calero
:
On Linux starvation of CPU-bound processes in the presence of network I/O. 1090-1105 - Dingde Jiang, Zhengzheng Xu, Hongwei Xu, Yang Han, Zhenhua Chen, Zhen Yuan:

An approximation method of origin-destination flow traffic from link load counts. 1106-1121 - Seung-Ho Lim:

DeFFS: Duplication-eliminated flash file system. 1122-1136 - K. C. Cinnati Loi, Seok-Bum Ko

:
Improvements on the design and implementation of DVB-S2 LDPC decoders. 1137-1146 - Rodrigo Palucci Pantoni, Dennis Brandão

:
A confirmation-based geocast routing algorithm for street lighting systems. 1147-1159 - Liakot Ali, Ishak Aris

, Fakir Sharif Hossain, Niranjan Roy:
Design of an ultra high speed AES processor for next generation IT security. 1160-1170 - Dongxiao Ren, Mao Ye

:
Extracting post-nonlinear signal with reference. 1171-1181 - Jenq-Shiou Leu, Hung-Jie Tzeng, Chi-Feng Chen, Wei-Hsiang Lin:

Practical design and implementation of recognition assisted dynamic surveillance system. 1182-1192 - Enric Musoll:

Variable-size mosaics: A process-variation aware technique to increase the performance of tile-based, massive multi-core processors. 1193-1211 - Slawomir Grys

:
Signed multiplication technique by means of unsigned multiply instruction. 1212-1221 - Oscar Delgado-Mohatar, Amparo Fúster-Sabater, José M. Sierra

:
Performance evaluation of highly efficient techniques for software implementation of LFSR. 1222-1231 - Hamit Soyel

, Umut Tekguc
, Hasan Demirel:
Application of NSGA-II to feature selection for facial expression recognition. 1232-1240

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














