Journal: Computers & Electrical Engineering

Volume 38, Issue 2

185 -- 193Shu-Chung Yi. A new construction adder based on Chinese abacus algorithm
194 -- 205Xianfu Meng, Wenqing Cui. Research on the immune strategy for the polluted file propagation in structured P2P networks
206 -- 216Fotis Plessas, Efthimios Davrazos, Alexis Alexandropoulos, Michael K. Birbas, John C. Kikidis. A 1 GHz, DDR2/3 SSTL driver with On-Die Termination, strength calibration, and slew rate control
217 -- 230Yang Zhou, Gangyi Jiang, Mei Yu, Zongju Peng, Feng Shao. Region-based error concealment of right-view frames for stereoscopic video transmission
231 -- 242George Lagogiannis, Nikos A. Lorentzos. Partially persistent B-trees with constant worst-case update time
243 -- 257Krishna M. Kavi, Izuchukwu Nwachukwu, Ademola Fawibe. A comparative analysis of performance improvement schemes for cache memories
258 -- 269Jorge González-Domínguez, Guillermo L. Taboada, Basilio B. Fraguela, María J. Martín, Juan Touriño. Automatic mapping of parallel applications on multicore architectures using the Servet benchmark suite
270 -- 281Feiyang Liu, Huaxi Gu, Yintang Yang. DTBR: A dynamic thermal-balance routing algorithm for Network-on-Chip
282 -- 293Mohamed Reda Lakehal, Youcef Ferdi, Abdelmalik Taleb-Ahmed. β sequences synthesized by recursive filtering
294 -- 305George N. Korres, Nikolaos M. Manousakis. A state estimator including conventional and synchronized phasor measurements
306 -- 329Chao Wu, Yike Guo, Bo Zhou. Social networking federation: A position paper
330 -- 345Basel A. Mahafzah, Mohammad Alshraideh, Tasneem M. Abu-Kabeer, Elham F. Ahmad, Nesreen A. Hamad. The Optical Chained-Cubic Tree interconnection network: Topological structure and properties
346 -- 355Pedro Martinez-Julia, Antonio F. Gómez-Skarmeta. Using identities to achieve enhanced privacy in future content delivery networks
356 -- 369Nooshin Bigdeli, Yousef Farid, Karim Afshar. A robust hybrid method for image encryption based on Hopfield neural network
370 -- 380Fuchun Guo, Yi Mu, Willy Susilo. Efficient and secure stored-value cards with leakage resilience
381 -- 387Fengtong Wen, Xuelei Li. An improved dynamic ID-based remote user authentication with key agreement scheme
388 -- 398Sa'ed Abed, Ashraf Hasan Bqerat, Sahel Alouneh, Bassam Jamil Mohd. A novel approach to enhance distributed virtual memory
399 -- 412Mohammed Amoon. A fault-tolerant scheduling system for computational grids
413 -- 421Fagen Li, Yongjian Liao, Zhiguang Qin, Tsuyoshi Takagi. Further improvement of an identity-based signcryption scheme in the standard model
422 -- 433Mohamed Mohandes, Mohamed Deriche, U. Johar, S. Ilyas. A signer-independent Arabic Sign Language recognition system using face detection, geometric features, and a Hidden Markov Model
434 -- 443Pandya Lakshman. Combining deblurring and denoising for handheld HDR imaging in low light conditions
444 -- 458Servet Soyguder, Hasan Alli. Kinematic and dynamic analysis of a hexapod walking-running-bounding gaits robot and control actions
459 -- 470Tao Wu, Kun Qin. Image data field for homogeneous region based segmentation