1 | -- | 14 | Wei-Wu Hu, Ji-Ye Zhao, Shi-Qiang Zhong, Xu Yang, Elio Guidetti, Chris Wu. Implementing a 1GHz Four-Issue Out-of-Order Execution Microprocessor in a Standard Cell ASIC Methodology |
15 | -- | 24 | Yulai Zhao, Xianfeng Li, Dong Tong, Xu Cheng. An Energy-Efficient Instruction Scheduler Design with Two-Level Shelving and Adaptive Banking |
25 | -- | 27 | Dong-Yu Zheng, Yan Sun, Shao-Qing Li, Liang Fang. A 485ps 64-Bit Parallel Adder in 0.18::::mu::::m CMOS |
28 | -- | 38 | Chiou-Yng Lee, Yung-Hui Chen, Che Wun Chiou, Jim-Min Lin. Unified Parallel Systolic Multiplier Over ::::GF::::(2:::::::m:::::::) |
39 | -- | 43 | Zhi-Hong Tao, Cong-Hua Zhou, Zhong Chen, Li-Fu Wang. Bounded Model Checking of CTL |
54 | -- | 59 | Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling. Two-Factor Cancelable Biometrics Authenticator |
60 | -- | 70 | Issam Damaj. Higher-Level Hardware Synthesis of the KASUMI Algorithm |
71 | -- | 74 | Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang. Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt 2004 |
75 | -- | 78 | Haixia Xu, Bao Li. Relationship Between a Non-Malleable Commitment Scheme and a Modified Selective Decommitment Scheme |
79 | -- | 87 | Jie Liang, Xue-Jia Lai. Improved Collision Attack on Hash Function MD5 |
88 | -- | 91 | Yonglong Luo, Liusheng Huang, Hong Zhong. Secure Two-Party Point-Circle Inclusion Problem |
92 | -- | 94 | Duo Liu, Ping Luo, Yiqi Dai. Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem |
95 | -- | 102 | Haibo Tian, Xi Sun, YuMin Wang. A New Public-Key Encryption Scheme |
103 | -- | 108 | Zhenchuan Chai, Zhenfu Cao, Yuan Zhou. Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts |
109 | -- | 113 | Wei Gao, Xueli Wang, Dongqing Xie. Chameleon Hashes Without Key Exposure Based on Factoring |
114 | -- | 120 | Min Liu, Zhongcheng Li, Xiao-Bing Guo. An Efficient Handoff Decision Algorithm for Vertical Handoff Between WWAN and WLAN |
121 | -- | 130 | Jing Zhou, David De Roure. FloodNet: Coupling Adaptive Sampling with Energy Aware Routing in a Flood Warning System |
131 | -- | 134 | KwangJin Park, Hyunseung Choo, Chong-Sun Hwang. An Efficient Data Dissemination Scheme for Spatial Query Processing |
135 | -- | 146 | Yong Liao, Xudong Chen, Guangze Xiong, Qingxin Zhu, Nan Sang. End-to-End Utilization Control for Aperiodic Tasks in Distributed Real-Time Systems |
147 | -- | 155 | Han-Bing Yan, Shi-Min Hu, Ralph R. Martin. 3D Morphing Using Strain Field Interpolation |
156 | -- | 160 | Wen Zheng, Jun-Hai Yong, Jean-Claude Paul. Visual Simulation of Multiple Unmixable Fluids |
161 | -- | 167 | Sheng-You Lin, Jiao-Ying Shi. A Markov Random Field Model-Based Approach to Natural Image Matting |