737 | -- | 739 | Jean-Luc Gaudiot. Editor s Note |
740 | -- | 749 | Cesare Alippi. Randomized Algorithms: A System-Level, Poly-Time Analysis of Robust Computation |
750 | -- | 758 | Huapeng Wu. Bit-Parallel Finite Field Multiplier and Squarer Using Polynomial Basis |
759 | -- | 774 | Martin Burtscher, Benjamin G. Zorn. Hybrid Load-Value Predictors |
775 | -- | 786 | Hsien-Ming Tsai, Yi-Bing Lin. Modeling Wireless Local with General Call Holding Times and Finite Number of Subscribers |
787 | -- | 792 | Francisco José Monaco, Adilson Gonzaga. Remote Device Command and Resource Sharing over the Internet: A New Approach Based on a Distributed Layered Architecture |
793 | -- | 800 | Jongmoo Choi, Sam H. Noh, Sang Lyul Min, Eun Yong Ha, Yookun Cho. Design, Implementation, and Performance Evaluation of a Detection-Based Adaptive Block Replacement Scheme |
801 | -- | 809 | Sybille Hellebrand, Hans-Joachim Wunderlich, Alexander A. Ivaniuk, Yuri V. Klimets, Vyacheslav N. Yarmolik. Efficient Online and Offline Testing of Embedded DRAMs |
810 | -- | 820 | Nong Ye, Syed Masum Emran, Qiang Chen, Sean Vilbert. Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection |
821 | -- | 834 | Victor C. S. Lee, Kwok-Wa Lam, Sheung-lun Hung. Concurrency Control for Mixed Transactions in Real-Time Databases |
835 | -- | 849 | Marco Caccamo, Giorgio C. Buttazzo, Lui Sha. Handling Execution Overruns in Hard Real-Time Control Systems |
850 | -- | 865 | Antonio Caruso, Stefano Chessa, Piero Maestrini, Paolo Santi. Evaluation of a Diagnosis Algorithm for Regular Structures |
866 | -- | 872 | Irith Pomeranz, Sudhakar M. Reddy. Enumeration of Test Sequences in Increasing Chronological Order to Improve the Levels of Compaction Achieved by Vector Omission |
873 | -- | 880 | Yu-Chee Tseng, Hsiang-Kuang Pan. Data Hiding in 2-Color Images |