Journal: Computers & Electrical Engineering

Volume 35, Issue 6

815 -- 816Mei Yang, Yingtao Jiang, Ling Wang, Yulu Yang. High performance computing architectures
817 -- 836Peng Liu, Bingjie Xia, Chunchang Xiang, Xiaohang Wang, Weidong Wang, Qingdong Yao. A networks-on-chip architecture design space exploration - The LIB
837 -- 845Seung Eun Lee, Nader Bagherzadeh. A high level power model for Network-on-Chip (NoC) router
846 -- 855Ling Wang, Hui Song, Yingtao Jiang, Lihong Zhang. A routing-table-based adaptive and minimal routing scheme on network-on-chip architectures
856 -- 877Lei Zhang 0006, Mei Yang, Yingtao Jiang, Emma Regentova. Architectures and routing schemes for optical network-on-chips
878 -- 903Yitzhak Birk, Evgeny Fiksman. Dynamic reconfiguration architectures for multi-context FPGAs
904 -- 919Lu Yan, Zheng Liang. An accelerator design for speedup of Java execution in consumer mobile devices
920 -- 941Behnam Ghavami, Hossein Pedram. High performance asynchronous design flow using a novel static performance analysis method
942 -- 950Qiang Dong, Xiaofan Yang, Juan Zhao. Embedding a fault-free hamiltonian cycle in a class of faulty generalized honeycomb tori
951 -- 965Min He, Xiaolong Wu, Si-Qing Zheng. An optimal and processor efficient parallel sorting algorithm on a linear array with a reconfigurable pipelined bus system
966 -- 979Fei Yin, Changjun Jiang, Rong Deng, Jianjun Yuan. Grid resource management policies for load-balancing and energy-saving by vacation queuing theory
980 -- 993Xiaomin Zhu, Peizhong Lu. A two-phase scheduling strategy for real-time applications with security requirements on heterogeneous clusters

Volume 35, Issue 5

609 -- 621Jiann-Liang Chen, Ming-Chiao Chen, Yan-Cheng Chang. Enhancing WLAN/UMTS dual-mode services using a novel distributed multi-agent scheduling scheme
622 -- 633Jun-Bo Wang, Ming Chen, Jiangzhou Wang 0002. Adaptive channel and power allocation of downlink multi-user MC-CDMA systems
634 -- 643Félix J. García Clemente, Gregorio Martínez Pérez, Antonio F. Gómez-Skarmeta. Multi-layer framework for analysing and managing routing configurations
644 -- 658Hafizur Rahaman, Debesh K. Das, Bhargab B. Bhattacharya. Testable design of AND-EXOR logic networks with universal test sets
659 -- 663Chien-Hung Huang. Strongly Hamiltonian laceability of the even k-ary n-cube
664 -- 672Xiangxue Li, Dong Zheng, Kefei Chen, Jianhua Li. Democratic group signatures with collective traceability
673 -- 695Hazem Al-Otum, Allam O. Al-Taba a. Adaptive color image watermarking based on a modified improved pixel-wise masking technique
696 -- 704Zuoyong Li, Chuancai Liu. Gray level difference-based transition region extraction and thresholding
705 -- 711Sheng Zhong. Identity-based mix: Anonymous communications without public key certificates
712 -- 721Tudor Barbu. Novel automatic video cut detection technique using Gabor filtering
722 -- 729Youcef Ferdi. Impulse invariance-based method for the computation of fractional integral of order 0alpha
730 -- 747Kanyapat Watcharasitthiwat, Paramote Wardkein. Reliability optimization of topology communication network design using an improved ant colony optimization
748 -- 756Xianghui Cao, Jiming Chen, Chuanhou Gao, Youxian Sun. An optimal control method for applications using wireless sensor/actuator networks
757 -- 763Chin-Chen Chang, Shih-Chang Chang, Jung-San Lee. An on-line electronic check system with mutual authentication
764 -- 789Yun-Lung Chen, Chienhua Chen. Performance analysis of non-preemptive GE/G/1 priority queueing of LER system with bulk arrivals
790 -- 802Syed Mahfuzul Aziz. A cycle-accurate transaction level SystemC model for a serial communication bus
803 -- 814Fernando Pardo, Jose Antonio Boluda. SimuRed: A flit-level event-driven simulator for multicomputer network performance evaluation

Volume 35, Issue 4

527 -- 0Hasan Al-Nashash. Innovations in communications electronics and control
528 -- 535Vahideh Vakil, Hassan Aghaeinia. Throughput analysis of STS-based CDMA system with variable spreading factor in non-frequency selective Rayleigh fading channel
536 -- 548Mani Ranjbar, Shohreh Kasaei. Spatial error concealment: A novel exemplar-based approach using segmentation
567 -- 577M. Narayanan, H. Al-Nashash. Introducing undergraduate students to simulation of semiconductor doping techniques
578 -- 586M. Shakil, Moustafa Elshafei, Mohamed A. Habib, F. A. Maleki. Soft sensor for NO::x:: and O::2:: using dynamic neural networks
587 -- 593Wael Saleh, Nasser Qaddoumi. Potential of near-field microwave imaging in breast cancer detection utilizing tapered rectangular waveguide probes
594 -- 607A. H. M. A. Rahim, M. Ahsanul Alam, M. F. Kandlawala. Dynamic performance improvement of an isolated wind turbine induction generator

Volume 35, Issue 3

435 -- 440Wen-Fang Yen, Shingchern D. You, Yung-Chao Chang. Real-time FFT with pre-calculation
441 -- 449Niyazi Odabasioglu, Osman N. Uçan. Multilevel turbo coded-continuous phase frequency shift keying (MLTC-CPFSK)
450 -- 458Khaled A. Mayyas. Low complexity LMS-type adaptive algorithm with selective coefficient update for stereophonic acoustic echo cancellation
459 -- 477Vikram Simhadri, Yusuf Ozturk. RASCor: An associative hardware algorithm for real time stereo
478 -- 484Pin-Chang Su, Chien-Hua Tsai. New cryptosystems design based on hybrid-mode problems
485 -- 496Tamer Tulgar, Muhammed Salamah. Performance analysis of a threshold based distributed channel allocation algorithm for cellular networks
497 -- 505Zuhua Shao. Provably secure proxy-protected signature schemes based on RSA
506 -- 516Mingquan Fan, Hongxia Wang. Chaos-based discrete fractional Sine transform domain audio watermarking scheme
517 -- 526M. Ali Aydin, A. Halim Zaim, K. Gökhan Ceylan. A hybrid intrusion detection system design for computer network security

Volume 35, Issue 2

231 -- 234Saraju P. Mohanty, Nasir Memon, Karam S. Chatha. Circuits and systems for real-time security and copyright protection of multimedia
235 -- 243P. P. Deepthi, Deepa Sara John, P. S. Sathidevi. Design and analysis of a highly secure stream cipher based on linear feedback shift register
244 -- 257Behnam Ghavami, Hossein Pedram, Mehrdad Najibi. An EDA tool for implementation of low power and secure crypto-chips
258 -- 285Radha Guha, Nader Bagherzadeh, Pai H. Chou. Resource management and task partitioning and scheduling on a run-time reconfigurable embedded system
286 -- 299Youtao Zhang, Jun Yang 0002, Lan Gao. Supporting flexible streaming media protection through privacy-aware secure processors
300 -- 314P. P. Deepthi, V. S. Nithin, P. S. Sathidevi. Implementation and analysis of stream ciphers based on the elliptic curves
315 -- 328Olga Gelbart, Eugen Leontie, Bhagirath Narahari, Rahul Simha. A compiler-hardware approach to software protection for embedded systems
329 -- 338Santosh Ghosh, Monjur Alam, Dipanwita Roy Chowdhury, Indranil Sen Gupta. Parallel crypto-devices for GF(p) elliptic curve multiplication resistant against side channel attacks
339 -- 358Elias Kougianos, Saraju P. Mohanty, Rabi N. Mahapatra. Hardware assisted watermarking for multimedia
359 -- 369Amir Moradi, Mohammad Taghi Manzuri Shalmani, Mahmoud Salmasizadeh. Dual-rail transition logic: A logic style for counteracting power analysis attacks
370 -- 375Neng-Wen Wang, Yueh-Min Huang. A novel software key container in on-line media services
376 -- 394Pramod A. Jamkhedkar, Gregory L. Heileman. Digital rights management architectures
395 -- 414Ju Wang, Jonathan C. L. Liu, Mbonisi Masilela. A real-time video watermarking system with buffer sharing for video-on-demand service
415 -- 433Santi P. Maity, Malay K. Kundu, Seba Maity. Dual purpose FWT domain spread spectrum image watermarking in real time

Volume 35, Issue 1

1 -- 8Seher Sener, Ibrahim Develi, Nurhan Karaboga. Further performance analysis of the generalized MC DS-CDMA system in Nakagami-m fading channels
9 -- 17Baoyuan Kang, Colin Boyd, Ed Dawson. A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
18 -- 32Christopher Martinez, Mythri Pinnamaneni, Eugene B. John. Performance of commercial multimedia workloads on the Intel Pentium 4: A case study
33 -- 40Wen-Shenq Juang, Jing-Lin Wu. Two efficient two-factor authenticated key exchange protocols in public wireless LANs
41 -- 48Tzungher Chen, Wei-Bin Lee, Hsing-Bai Chen. A self-verification authentication mechanism for mobile satellite communication systems
49 -- 53Baoyuan Kang, Colin Boyd, Ed Dawson. Identity-based strong designated verifier signature schemes: Attacks and new construction
54 -- 58Miguel Morales-Sandoval, Claudia Feregrino Uribe, René Cumplido, Ignacio Algredo-Badillo. An area/performance trade-off analysis of a GF(2:::m:::) multiplier architecture for elliptic curve cryptography
59 -- 70Wei Zhang, Liansheng Tan, Gang Peng. Dynamic queue level control of TCP/RED systems in AQM routers
71 -- 85Erdinç Öztürk, Berk Sunar, Erkay Savas. A versatile Montgomery multiplier architecture with characteristic three support
86 -- 95Feng Cao, Zhenfu Cao. A secure identity-based multi-proxy signature scheme
96 -- 106Azizollah Jamshidi, Bizhan Karimi-Birgani. Multiple partner coded cooperation scheme for wireless communications and its performance analysis for two cooperative users
107 -- 114Hyun Seok Kim, Jin-Young Choi. Enhanced password-based simple three-party key exchange protocol
115 -- 125Cihan Topal, Cuneyt Akinlar. Secure seamless peer-to-peer (P2P) UDP communication using IPv4 LSRR option and IPv4+4 addresses
126 -- 140Ali A. Kanso. An efficient cryptosystem Delta for stream cipher applications
141 -- 149Ying Zheng, Guangyao Li, Xiehua Sun, Xinmin Zhou. Fast edge integration based active contours for color images
150 -- 158Baodong Qin, Ming Li, Fanyu Kong, Daxing Li. New left-to-right minimal weight signed-digit radix-r representation
159 -- 167Soonhak Kwon, Chang Hoon Kim, Chun-Pyo Hong. More efficient systolic arrays for multiplication in GF(2:::m:::) using LSB first algorithm with irreducible polynomials and trinomials
168 -- 182Jamal-Deen Abdulai, Mohamed Ould-Khaoua, Lewis M. Mackenzie. Adjusted probabilistic route discovery in mobile ad hoc networks
183 -- 188Wei Lu, Wei Sun, Hongtao Lu. Robust watermarking based on DWT and nonnegative matrix factorization
189 -- 196Zuhua Shao. Dynamic and efficient joint encryption scheme in the plain public key model
197 -- 208Omar Al-Jarrah, Omar Megdadi. Enhanced AODV routing protocol for Bluetooth scatternet
209 -- 217D. Gnanadurai, V. Sadasivam, J. Paul Tiburtius Nishandh, L. Muthukumaran, C. Annamalai. Undecimated double density wavelet transform based speckle reduction in SAR images
218 -- 226P. P. Sahu, Mahipal Singh. Multichannel direct sequence spectrum signaling using code phase shift keying