409 | -- | 420 | Peng Liu, Sanli Li, Francis C. M. Lau, Yao Shi, Feng Huang. RAID-M: A high performance RAID Matrix mass storage |
421 | -- | 436 | Dongsheng Li, Xicheng Lu. A novel constant degree and constant congestion DHT scheme for peer-to-peer networks |
437 | -- | 451 | Jie Tian, Yuliang He, Hong Chen, Xin Yang. A fingerprint identification algorithm by clustering similarity |
452 | -- | 466 | Li Zou, Yuping Zhao, Bing Wang, Qinglin Liang, Haige Xiang. Dual constellations space-time modulation |
467 | -- | 483 | Yanfei Wang, Xingfa Gu, Tao Yu, Shufang Fan. Iterative lavrentiev regularization for symmetric kernel-driven operator equations: with application to digital image restoration problems |
484 | -- | 498 | Peizhong Lu, Shen Li, Yan Zou, Xiangyang Luo. Blind recognition of punctured convolutional codes |
499 | -- | 512 | Sihan Qing, Gaicheng Li. A formal model of fair exchange protocols |
513 | -- | 532 | Kaile Su, Guanfeng Lv, Qingliang Chen. Knowledge structure approach to verification of authentication protocols |
533 | -- | 544 | Xiaolang Yan, Zheng Shi, Ye Chen, Yue Ma, Gensheng Gao. Full-IC manufacturability check based on dense silicon imaging |