Journal: Computers & Electrical Engineering

Volume 36, Issue 6

1021 -- 1026Qiang Dong, Xiaofan Yang, Dajin Wang. Embedding multi-dimensional meshes into twisted cubes
1027 -- 1034Salem H. Salamah, Turki Darweesh. Coverage study for broadband wireless systems using link adaptation and diversity combining techniques
1035 -- 1045Zuhua Shao. Fair exchange protocol of Schnorr signatures with semi-trusted adjudicator
1046 -- 1054Rui Zhang, Jiqiang Liu, Zhen Han, Lijuan Zheng. An IBE scheme using ECC combined public key
1055 -- 1065Serkan Dursun, Artyom M. Grigoryan. Nonlinear L::2::-by-3 transform for PAPR reduction in OFDM systems
1066 -- 1074Ramin Tajallipour, Khan A. Wahid. Error-free algorithm and architecture of radix-10 logarithmic converter
1075 -- 1092Dorin Patru, R. Scott Hudson. Optically injected logic circuits for remote-powered systems on a chip
1093 -- 1100Yilmaz Uyaroglu, Ihsan Pehlivan. Nonlinear Sprott94 Case A chaotic equation: Synchronization and masking communication applications
1101 -- 1109Nasro Min-Allah, Ishtiaq Ali, Jiansheng Xing, Yongji Wang. Utilization bound for periodic task set with composite deadline
1110 -- 1122Fiaz Gul Khan, Kalim Qureshi, Babar Nazir. Performance evaluation of fault tolerance techniques in grid computing system
1123 -- 1139Li Chunlin, Li Layuan. Joint contexts optimization for mobile grid
1140 -- 1146Farhad Gh. Khodaei, Javad Nourinia, Changiz Ghobadi. Adaptive beamforming algorithm with increased speed and improved reliability for smart antennas
1147 -- 1155Vahideh Vakil, Hassan Aghaeinia. Throughput improvement of STS-based MC DS-CDMA system with adaptive modulation
1156 -- 1164Tae-Wuk Bae, Byoung-Ik Kim, Young-Choon Kim, Kyu-Ik Sohng. Small target detection using cross product based on temporal profile in infrared image sequences
1165 -- 1180H. Fatih Ugurdag, Sezer Gören, Ferhat Canbay. Gravitational pose estimation
1181 -- 1186Pawel Kulakowski, Javier Vales-Alonso, Esteban Egea-López, Wieslaw Ludwin, Joan García-Haro. Angle-of-arrival localization based on antenna arrays for wireless sensor networks
1187 -- 1192P. P. Sahu, S. Panda. Frequency hopping spread spectrum signalling using code quadratic FSK technique for multichannel
1193 -- 1201Xiangzhi Bai, Fugen Zhou. Infrared small target enhancement and detection based on modified top-hat transformations

Volume 36, Issue 5

803 -- 804Hamid Sarbazi-Azad, Lewis M. Mackenzie. Special section on advances in computing systems science and engineering
805 -- 817Soheil Hassas Yeganeh, Jafar Habibi, Habib Rostami, Hassan Abolhassani. Semantic web service composition testbed
818 -- 834Nasser Yazdani, Hossein Mohammadi. DMP-tree: A dynamic M-way prefix tree data structure for strings matching
835 -- 849Mehdi Kargahi, Ali Movaghar. Dynamic routing of real-time jobs among parallel EDF queues: A performance study
850 -- 863Hooman Nikmehr, Braden Phillips, Cheng-Chew Lim. A novel implementation of radix-4 floating-point division/square-root using comparison multiples
864 -- 873H. Parandeh-Afshar, Sied Mehdi Fakhraie, O. Fatemi. Parallel merged multiplier-accumulator coprocessor optimized for digital filters
874 -- 885Hamid Reza Shahriari, Mohammad Sadegh Makarem, Marjan Sirjani, Rasool Jalili, Ali Movaghar. Vulnerability analysis of networks to detect multiphase attacks using the actor-based language Rebeca
886 -- 894S. H. Nabavi-Kerizi, Mohammad Shams Esfand Abadi, Ehsanollah Kabir. A PSO-based weighting method for linear combination of neural networks
895 -- 901Farshad Rostamabadi, Mohammad Ghodsi. Incremental labeling in closed-2PM model
902 -- 911Kaveh Jokar Deris, Amirali Baniasadi. Power-aware BTB for modern processors
913 -- 926Heeheon Kim, Xuefeng Piao, Sangchul Han, Moonju Park, Minkyu Park, Seongje Cho, Yookun Cho. Improving responsiveness of soft aperiodic tasks using proportional slack time
927 -- 934Mingjun Wu, Xianrong Peng, Qiheng Zhang, Rujin Zhao. Segmenting and tracking multiple objects under occlusion using multi-label graph cut
935 -- 947A. Y. Al-nahari, Sami A. El-Dolil, M. I. Desouky, Fathi E. Abd El-Samie. Power-based multi-cell call admission control scheme for wideband-CDMA systems
948 -- 954Ji-Seon Lee, Jik Hyun Chang, Dong-Hoon Lee. Forgery attacks on Kang et al. s identity-based strong designated verifier signature scheme and its improvement with security proof
955 -- 968Chiou-Yng Lee, Pramod Kumar Meher. Efficient bit-parallel multipliers over finite fields GF(2:::m:::)
969 -- 977Wenfa Zhan, Huaguo Liang, Cuiyun Jiang, Zhengfeng Huang, Aiman H. El-Maleh. A scheme of test data compression based on coding of even bits marking and selective output inversion
978 -- 992Imam Al-wazedi, Ahmed K. Elhakeem. A CDMA/TDD approach for wireless mesh networks
993 -- 1001Ali Kanso. Modified self-shrinking generator
1002 -- 1013Tsung Hung Chen, Shyh-Chang Liu, Jyh-Haw Chen. Adaptive receiver-driven approach in P2P live streaming networks
1014 -- 1020Jie Yang, Shengsheng Yu, Jingli Zhou, Yi Gao. A new error concealment method for consecutive frame loss based on CELP speech

Volume 36, Issue 4

593 -- 595Beata J. Wysocki, Tadeusz A. Wysocki, Hamid Sharif. Guest Editorial
596 -- 602Amir Valizadeh, Mahsa Najibi. A constrained optimization approach for an adaptive generalized subspace tracking algorithm
603 -- 616Jean-Marc Valin, Daniel V. Smith, Christopher Montgomery, Timothy B. Terriberry. An iterative linearised solution to the sinusoidal parameter estimation problem
617 -- 625Hitoshi Hayakawa, Tadashi Shibata. Block-matching-based motion field generation utilizing directional edge displacement
626 -- 642Kevin Adistambha, Stephen J. Davis, Christian H. Ritz, Ian S. Burnett. Efficient multimedia query-by-content from mobile devices
643 -- 663Simon Denman, Todd Lamb, Clinton Fookes, Vinod Chandran, Sridha Sridharan. Multi-spectral fusion for surveillance systems
664 -- 675T. Nguyen-Ky, J. Leis, W. Xiang. An improved new error estimation algorithm for optimal filter lengths for stereophonic acoustic echo cancellation
676 -- 690Vanessa Testoni, Max H. M. Costa. Entropy coders and 3D-Hadamard coefficients sequency scan order for a fast embedded color video codec
691 -- 701Jun Zhang, Lei Ye. Series feature aggregation for content-based image retrieval
702 -- 717Young H. Jung, Yoonsik Choe. Resource-aware and quality-fair video-streaming using multiple adaptive TCP connections
718 -- 734Fariza Sabrina. A novel resource scheduling algorithm for QoS-aware services on the Internet
735 -- 751Kumudu S. Munasinghe, Abbas Jamalipour. An analytical evaluation of mobility management in integrated WLAN-UMTS networks
752 -- 765Huda Alamri, Mehran Abolhasan, Tadeusz A. Wysocki. Scalability of MANET routing protocols for heterogeneous and homogenous networks
766 -- 774Le Chung Tran, Alfred Mertins, Tadeusz A. Wysocki. Quasi-orthogonal space-time-frequency codes in MB-OFDM UWB
775 -- 788Keni Popovski, Tadeusz A. Wysocki, Beata J. Wysocki. A closed-form derivation of self and multi-user interference for time-reversed UWB communications
789 -- 801Yafeng Wang, Hao Yang, Dacheng Yang, Wei Xiang. Iterative decision feedback equalizer with cyclic detection for DFT-S OFDM system

Volume 36, Issue 3

397 -- 403Volkan Kumbasar, Oguz Kucur. Better wavelet packet tree based OFDM for multipath powerline channel
404 -- 413Shih-Yan Chen, Shin-Shin Kao. Hamiltonian connectivity and globally 3*-connectivity of dual-cube extensive networks
414 -- 423Athanasios Doukas, Grigorios Kalivas. Analysis and performance evaluation of a pilot-aided interpolated channel estimator for OFDM systems
424 -- 434Khader Mohammad, Sos S. Agaian, Fred Hudson. Implementation of Digital Electronic Arithmetics and its application in image processing
435 -- 441Renwang Su, Zhenfu Cao. An efficient anonymous authentication mechanism for delay tolerant networks
442 -- 454Jia Xu, Qianmu Li, Hong Zhang, Fengyu Liu. Model and analysis of path compression for mobile Ad Hoc networks
455 -- 468Rashid A. Saeed, Sabira Khatun, Borhanuddin Mohd Ali, Mohd. Khazani Abdullah. A joint PHY/MAC cross-layer design for UWB under power control
469 -- 479Wenjing Yue, Baoyu Zheng. Spectrum sensing algorithms for primary detection based on reliability in cognitive radio systems
480 -- 490Ozcan Ozturk. Improving chip multiprocessor reliability through code replication
491 -- 502Ghassem Jaberipur, Saeid Gorgin. An improved maximally redundant signed digit adder
503 -- 517ChunLin Li, Layuan Li. Controlling energy without compromising system performance in mobile grid environments
518 -- 535Apostolos Katidiotis, Kostas Tsagkaris, Panagiotis Demestichas. Performance evaluation of artificial neural network-based learning schemes for cognitive radio systems
536 -- 544José B. Aragão Jr., Guilherme De A. Barreto. Novel approaches for online playout delay prediction in VoIP applications using time series models
545 -- 552Zhengping Jin, Qiaoyan Wen, Hongzhen Du. An improved semantically-secure identity-based signcryption scheme in the standard model
553 -- 564Xingzhi Wang, Zheng Yan, Li Li. A grid computing based approach for the power system dynamic security assessment
565 -- 577Ignacio Algredo-Badillo, Claudia Feregrino Uribe, René Cumplido, Miguel Morales-Sandoval. Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11i standard
578 -- 584Rafiullah Chamlawi, Asifullah Khan, Imran Usman. Authentication and recovery of images using multiple watermarks
585 -- 591M. M. Wong, M. L. D. Wong, I. Hijazin. A throughput maximised parallel architecture for 2D fast Discrete Pascal Transform

Volume 36, Issue 2

259 -- 260Isaac Woungang. Wireless ad hoc, sensor and mesh networks
261 -- 268Lloyd Emmanuel, Xavier N. Fernando. Wavelet-based spectral shaping of UWB radio signal for multisystem coexistence
269 -- 279Haibo Xu, Hui Tian, Ping Zhang 0003. A novel terminal-controlled handover scheme in heterogeneous wireless networks
280 -- 290Yun-Sheng Yen, Hung-Chieh Chang, Ruay Shiung Chang, Han-Chieh Chao. Routing with adaptive path and limited flooding for mobile ad hoc networks
291 -- 302Ping Dong, Hongke Zhang, Hongbin Luo, Ting-Yun Chi, Sy-Yen Kuo. A network-based mobility management scheme for future Internet
303 -- 312Ali Chamam, Samuel Pierre. A distributed energy-efficient clustering protocol for wireless sensor networks
313 -- 327Jun Yi, Christian Poellabauer. Real-time multicast for wireless multihop networks
328 -- 340Leszek Lilien, Ajay K. Gupta, Zill-E-Huma Kamal, Zijiang Yang. Opportunistic resource utilization networks - A new paradigm for specialized ad hoc networks
341 -- 351Seung Hwan Lee, Yong-Hwan Lee. Adaptive frequency hopping and power control based on spectrum characteristic of error sources in Bluetooth systems
352 -- 357Ho Van Khuong, Tho Le-Ngoc. Bandwidth-efficient cooperative MIMO relaying schemes
358 -- 366Lamiaa Khalid, Alagan Anpalagan. Emerging cognitive radio technology: Principles, challenges and opportunities
367 -- 382Sudip Misra, Sanjay Kumar Dhurandher, Avanish Rayankula, Deepansh Agrawal. Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks
383 -- 396Vincent Ngo, Alagan Anpalagan. A detailed review of energy-efficient medium access control protocols for mobile sensor networks

Volume 36, Issue 1

1 -- 0Manu Malek. CEE Introductory Editorial
2 -- 18Wei Lu, Hongtao Lu, Fu-Lai Chung. Feature based robust watermarking using image normalization
19 -- 30Wen-Hwa Liao, Kuei-Ping Shih, Wan-Chi Wu. A grid-based dynamic load balancing approach for data-centric storage in wireless sensor networks
31 -- 44Xiangyang Wang, Yi-Ping Yang, Hong-Ying Yang. Invariant image watermarking using multi-scale Harris detector and wavelet moments
45 -- 55Ouldooz Baghban Karimi, Mahmood Fathy. Adaptive end-to-end QoS for multimedia over heterogeneous wireless networks
56 -- 60Amr M. Youssef. Cryptanalysis of Boolean permutation-based key escrow scheme
61 -- 72Joy Iong-Zong Chen, Chieh Wen Liou, Chieh Chung Yu. Error probability analysis of an MC-DS-CDMA system under Weibull fading with a moment-generating function
73 -- 87Jean-Luc Beuchat, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, Hiroyasu Yamamoto. FPGA and ASIC implementations of the eta::T:: pairing in characteristic three
88 -- 99Abdoul Rjoub, M. Mousameh, Odysseas G. Koufopavlou. Full custom low-power/high performance DDP-based Cobra-H64 cipher
100 -- 113Shun-Sheng Wang, Kuo-Qin Yan, Shu-Ching Wang. An optimal solution for byzantine agreement under a hierarchical cluster-oriented mobile ad hoc network
114 -- 131Ipek Abasikeles, M. Fatih Akay. Performance evaluation of directory protocols on an optical broadcast-based distributed shared memory multiprocessor
132 -- 141Aiguo Li, Bingrong Hong. On-line control flow error detection using relationship signatures among basic blocks
142 -- 154José Luis Ayala, Cándido Méndez, Marisa López-Vallejo. Thermal analysis and modeling of embedded processors
155 -- 159Duc-Liem Vo, Hyunrok Lee, Chan Yeob Yeun, Kwangjo Kim. Enhancements of authenticated multiple key exchange protocol based on bilinear pairings
160 -- 168Xiaofei Zhang, Gaopeng Feng, Xin Gao, Dazhuan Xu. Blind multiuser detection for MC-CDMA with antenna array
169 -- 179Dragan Ivetic, Srdan Mihic, Branko Markoski. Augmented AVI video file for road surveying
180 -- 189Shihui Zheng, Licheng Wang, Yixian Yang. A new impossible differential attack on SAFER ciphers
190 -- 198Jih-Ching Chiu, Kai-Ming Yang. A Novel instruction stream buffer for VLIW architectures
199 -- 212Ali A. Kanso. Encryption System with Variable Number of Registers
213 -- 223Yunho Lee, Seungjoo Kim, Dongho Won. Enhancement of two-factor authenticated key exchange protocols in public wireless LANs
224 -- 233N. Kumaratharan, P. Dananjayan. Performance improvement in detection and estimation of MC-CDMA systems over MIMO channels
234 -- 253Mao-Lun Chiang, Shu-Ching Wang, Lin Yu Tseng. The anatomy study of consensus agreement in MANETs