547 | -- | 558 | Shouyi Yin, Leibo Liu, Shaojun Wei. Buffer planning for application-specific networks-on-chip design |
559 | -- | 574 | WenZhe Fa, Feng Xu, YaQiu Jin. SAR imaging simulation for an inhomogeneous undulated lunar surface based on triangulated irregular network |
575 | -- | 587 | Yong Dou, Guiming Wu, Jinhui Xu, Xingming Zhou. A coarse-grained reconfigurable computing architecture with loop self-pipelining |
588 | -- | 601 | Yiming Zhang, Xicheng Lu, Dongsheng Li. SKY: efficient peer-to-peer networks based on distributed Kautz graphs |
602 | -- | 608 | Biao Wang, YingJue Fang, HongGang Lin, Yi Li. The improved QV signature scheme based on conic curves over Z:: ::::n:::: :: |
609 | -- | 616 | Ping Luo, Haijian Zhou, Daoshun Wang, Yiqi Dai. Cryptanalysis of RSA for a special case with ::::d:::: > ::::e:::: |
617 | -- | 626 | Yongzhuang Wei, Yupu Hu. New related-key rectangle attacks on reduced AES-192 and AES-256 |
627 | -- | 644 | Xiaochun Yang, Bin Wang, Ge Yu. Efficient secure data publishing algorithms for supporting information sharing |
645 | -- | 655 | Yi Jin, Gang Zhou, Dongchen Jiang, Shuai Yuan, Lili Wang, Jianting Cao. Theoretical mean-variance relationship of IP network traffic based on ON/OFF model |
674 | -- | 687 | Minghui Wang, Shugen Ma, Bin Li, Yuechao Wang. Configuration representation and reconfiguration optimization for the reconfigurable robots with independent manipulation |
688 | -- | 694 | Zutao Zhang, Jiashu Zhang. A novel strong tracking finite-difference extended Kalman filter for nonlinear eye tracking |
695 | -- | 703 | Jingyu Yang, Yigang Peng, Wenli Xu, Qionghai Dai. Ways to sparse representation: An overview |
704 | -- | 711 | Zhang Wang, Jixian Zhang, Haitao Li. Component-adaptive up-sampling for inter layer interpolation in scalable video coding |
712 | -- | 722 | Li-Juan Jia, Ran Tao, Yue Wang, Kiyoshi Wada. Realizations of BELS as WIV method in both direct and indirect closed-loop system identification |