213 | -- | 221 | Jinn-ke Jan, Yu-Yi Chen. A secure anonymous voting protocol with a complete supervision |
223 | -- | 236 | Oran Sharon, Alexander Vainshtein, Anatoly Likholat. On the relation between the throughput gain with slot reuse and the number of address bits in the dual bus configuration Part 1: Maximum throughput |
237 | -- | 251 | Oran Sharon, Anatoly Likholat. On the relation between the throughput gain with slot reuse and the number of address bits in the dual bus configuration Part 2: Linear and equal throughputs |
253 | -- | 257 | Nageswara S. V. Rao, Nachimuthu Manickam. General quickest paths and path-tables |
259 | -- | 267 | Ahmad R. Sharafat, Mehran S. Fallah. A measure of resilience against denial of service attacks in computer networks |
269 | -- | 280 | Seung-Joon Seok, Sung-Hyuck Lee, Jinwoo Park, Chul-Hee Kang. Characteristics of assured service and an alternative RIO scheme in differentiated services networks |
281 | -- | 291 | Der-Chyuan Lou, Te-Lung Yin, Ming-Chang Chang. An efficient steganographic approach |
293 | -- | 302 | Kun-Lung Wu, Philip S. Yu. Controlled replication for hash routing-based web caching |
303 | -- | 310 | Sang-Wook Kim, Hee-Sun Won. Bulk-loading of a multidimensional file: algorithm and its performance evaluation |