| 185 | -- | 193 | Shu-Chung Yi. A new construction adder based on Chinese abacus algorithm |
| 194 | -- | 205 | Xianfu Meng, Wenqing Cui. Research on the immune strategy for the polluted file propagation in structured P2P networks |
| 206 | -- | 216 | Fotis Plessas, Efthimios Davrazos, Alexis Alexandropoulos, Michael K. Birbas, John C. Kikidis. A 1 GHz, DDR2/3 SSTL driver with On-Die Termination, strength calibration, and slew rate control |
| 217 | -- | 230 | Yang Zhou, Gangyi Jiang, Mei Yu, Zongju Peng, Feng Shao. Region-based error concealment of right-view frames for stereoscopic video transmission |
| 231 | -- | 242 | George Lagogiannis, Nikos A. Lorentzos. Partially persistent B-trees with constant worst-case update time |
| 243 | -- | 257 | Krishna M. Kavi, Izuchukwu Nwachukwu, Ademola Fawibe. A comparative analysis of performance improvement schemes for cache memories |
| 258 | -- | 269 | Jorge González-Domínguez, Guillermo L. Taboada, Basilio B. Fraguela, María J. Martín, Juan Touriño. Automatic mapping of parallel applications on multicore architectures using the Servet benchmark suite |
| 270 | -- | 281 | Feiyang Liu, Huaxi Gu, Yintang Yang. DTBR: A dynamic thermal-balance routing algorithm for Network-on-Chip |
| 282 | -- | 293 | Mohamed Reda Lakehal, Youcef Ferdi, Abdelmalik Taleb-Ahmed. β sequences synthesized by recursive filtering |
| 294 | -- | 305 | George N. Korres, Nikolaos M. Manousakis. A state estimator including conventional and synchronized phasor measurements |
| 306 | -- | 329 | Chao Wu, Yike Guo, Bo Zhou. Social networking federation: A position paper |
| 330 | -- | 345 | Basel A. Mahafzah, Mohammad Alshraideh, Tasneem M. Abu-Kabeer, Elham F. Ahmad, Nesreen A. Hamad. The Optical Chained-Cubic Tree interconnection network: Topological structure and properties |
| 346 | -- | 355 | Pedro Martinez-Julia, Antonio F. Gómez-Skarmeta. Using identities to achieve enhanced privacy in future content delivery networks |
| 356 | -- | 369 | Nooshin Bigdeli, Yousef Farid, Karim Afshar. A robust hybrid method for image encryption based on Hopfield neural network |
| 370 | -- | 380 | Fuchun Guo, Yi Mu, Willy Susilo. Efficient and secure stored-value cards with leakage resilience |
| 381 | -- | 387 | Fengtong Wen, Xuelei Li. An improved dynamic ID-based remote user authentication with key agreement scheme |
| 388 | -- | 398 | Sa'ed Abed, Ashraf Hasan Bqerat, Sahel Alouneh, Bassam Jamil Mohd. A novel approach to enhance distributed virtual memory |
| 399 | -- | 412 | Mohammed Amoon. A fault-tolerant scheduling system for computational grids |
| 413 | -- | 421 | Fagen Li, Yongjian Liao, Zhiguang Qin, Tsuyoshi Takagi. Further improvement of an identity-based signcryption scheme in the standard model |
| 422 | -- | 433 | Mohamed Mohandes, Mohamed Deriche, U. Johar, S. Ilyas. A signer-independent Arabic Sign Language recognition system using face detection, geometric features, and a Hidden Markov Model |
| 434 | -- | 443 | Pandya Lakshman. Combining deblurring and denoising for handheld HDR imaging in low light conditions |
| 444 | -- | 458 | Servet Soyguder, Hasan Alli. Kinematic and dynamic analysis of a hexapod walking-running-bounding gaits robot and control actions |
| 459 | -- | 470 | Tao Wu, Kun Qin. Image data field for homogeneous region based segmentation |