


default search action
Computers & Electrical Engineering, Volume 36
Volume 36, Number 1, January 2010
- Manu Malek:
CEE Introductory Editorial. 1 - Wei Lu, Hongtao Lu, Fu-Lai Chung
:
Feature based robust watermarking using image normalization. 2-18 - Wen-Hwa Liao
, Kuei-Ping Shih, Wan-Chi Wu:
A grid-based dynamic load balancing approach for data-centric storage in wireless sensor networks. 19-30 - Xiangyang Wang, Yi-Ping Yang, Hong-Ying Yang:
Invariant image watermarking using multi-scale Harris detector and wavelet moments. 31-44 - Ouldooz Baghban Karimi, Mahmood Fathy:
Adaptive end-to-end QoS for multimedia over heterogeneous wireless networks. 45-55 - Amr M. Youssef:
Cryptanalysis of Boolean permutation-based key escrow scheme. 56-60 - Joy Iong-Zong Chen, Chieh Wen Liou, Chieh Chung Yu:
Error probability analysis of an MC-DS-CDMA system under Weibull fading with a moment-generating function. 61-72 - Jean-Luc Beuchat
, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, Hiroyasu Yamamoto:
FPGA and ASIC implementations of the etaT pairing in characteristic three. 73-87 - Abdoul Rjoub, M. Mousameh, Odysseas G. Koufopavlou:
Full custom low-power/high performance DDP-based Cobra-H64 cipher. 88-99 - Shun-Sheng Wang, Kuo-Qin Yan, Shu-Ching Wang:
An optimal solution for byzantine agreement under a hierarchical cluster-oriented mobile ad hoc network. 100-113 - Ipek Abasikeles, Mehmet Fatih Akay:
Performance evaluation of directory protocols on an optical broadcast-based distributed shared memory multiprocessor. 114-131 - Aiguo Li, Bingrong Hong:
On-line control flow error detection using relationship signatures among basic blocks. 132-141 - José Luis Ayala
, Cándido Méndez, Marisa López-Vallejo
:
Thermal analysis and modeling of embedded processors. 142-154 - Duc-Liem Vo, Hyunrok Lee, Chan Yeob Yeun
, Kwangjo Kim:
Enhancements of authenticated multiple key exchange protocol based on bilinear pairings. 155-159 - Xiaofei Zhang, Gaopeng Feng, Xin Gao, Dazhuan Xu:
Blind multiuser detection for MC-CDMA with antenna array. 160-168 - Dragan Ivetic, Srdan Mihic, Branko Markoski:
Augmented AVI video file for road surveying. 169-179 - Shihui Zheng, Licheng Wang, Yixian Yang:
A new impossible differential attack on SAFER ciphers. 180-189 - Jih-Ching Chiu, Kai-Ming Yang:
A Novel instruction stream buffer for VLIW architectures. 190-198 - Ali A. Kanso
:
Encryption System with Variable Number of Registers. 199-212 - Yunho Lee, Seungjoo Kim
, Dongho Won:
Enhancement of two-factor authenticated key exchange protocols in public wireless LANs. 213-223 - N. Kumaratharan
, Perumal Dananjayan
:
Performance improvement in detection and estimation of MC-CDMA systems over MIMO channels. 224-233 - Mao-Lun Chiang
, Shu-Ching Wang, Lin-Yu Tseng
:
The anatomy study of consensus agreement in MANETs. 234-253
Volume 36, Number 2, March 2010
- Isaac Woungang:
Wireless ad hoc, sensor and mesh networks. 259-260 - Lloyd Emmanuel, Xavier N. Fernando
:
Wavelet-based spectral shaping of UWB radio signal for multisystem coexistence. 261-268 - Haibo Xu, Hui Tian, Ping Zhang:
A novel terminal-controlled handover scheme in heterogeneous wireless networks. 269-279 - Yun-Sheng Yen, Hung-Chieh Chang, Ruay-Shiung Chang, Han-Chieh Chao:
Routing with adaptive path and limited flooding for mobile ad hoc networks. 280-290 - Ping Dong, Hongke Zhang, Hongbin Luo, Ting-Yun Chi, Sy-Yen Kuo
:
A network-based mobility management scheme for future Internet. 291-302 - Ali Chamam, Samuel Pierre:
A distributed energy-efficient clustering protocol for wireless sensor networks. 303-312 - Jun Yi, Christian Poellabauer
:
Real-time multicast for wireless multihop networks. 313-327 - Leszek Lilien
, Ajay Gupta
, Zill-E-Huma Kamal, Zijiang Yang:
Opportunistic resource utilization networks - A new paradigm for specialized ad hoc networks. 328-340 - Seung-Hwan Lee, Yong-Hwan Lee:
Adaptive frequency hopping and power control based on spectrum characteristic of error sources in Bluetooth systems. 341-351 - Ho Van Khuong, Tho Le-Ngoc:
Bandwidth-efficient cooperative MIMO relaying schemes. 352-357 - Lamiaa Khalid, Alagan Anpalagan
:
Emerging cognitive radio technology: Principles, challenges and opportunities. 358-366 - Sudip Misra, Sanjay K. Dhurandher, Avanish Rayankula, Deepansh Agrawal:
Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks. 367-382 - Vincent Ngo, Alagan Anpalagan
:
A detailed review of energy-efficient medium access control protocols for mobile sensor networks. 383-396
Volume 36, Number 3, May 2010
- Volkan Kumbasar, Oguz Kucur:
Better wavelet packet tree based OFDM for multipath powerline channel. 397-403 - Shih-Yan Chen, Shin-Shin Kao:
Hamiltonian connectivity and globally 3*-connectivity of dual-cube extensive networks. 404-413 - Athanasios Doukas, Grigorios Kalivas:
Analysis and performance evaluation of a pilot-aided interpolated channel estimator for OFDM systems. 414-423 - Khader Mohammad
, Sos S. Agaian, Fred Hudson:
Implementation of Digital Electronic Arithmetics and its application in image processing. 424-434 - Renwang Su, Zhenfu Cao
:
An efficient anonymous authentication mechanism for delay tolerant networks. 435-441 - Jia Xu, Qianmu Li, Hong Zhang, Fengyu Liu:
Model and analysis of path compression for mobile Ad Hoc networks. 442-454 - Rashid A. Saeed
, Sabira Khatun, Borhanuddin Mohd Ali, Mohd Khazani Abdullah:
A joint PHY/MAC cross-layer design for UWB under power control. 455-468 - Wenjing Yue, Baoyu Zheng:
Spectrum sensing algorithms for primary detection based on reliability in cognitive radio systems. 469-479 - Ozcan Ozturk:
Improving chip multiprocessor reliability through code replication. 480-490 - Ghassem Jaberipur, Saeid Gorgin
:
An improved maximally redundant signed digit adder. 491-502 - Chunlin Li, Layuan Li:
Controlling energy without compromising system performance in mobile grid environments. 503-517 - Apostolos Katidiotis, Kostas Tsagkaris
, Panagiotis Demestichas
:
Performance evaluation of artificial neural network-based learning schemes for cognitive radio systems. 518-535 - José B. Aragão Jr., Guilherme De A. Barreto
:
Novel approaches for online playout delay prediction in VoIP applications using time series models. 536-544 - Zhengping Jin, Qiaoyan Wen, Hongzhen Du:
An improved semantically-secure identity-based signcryption scheme in the standard model. 545-552 - Xingzhi Wang, Zheng Yan, Li Li:
A grid computing based approach for the power system dynamic security assessment. 553-564 - Ignacio Algredo-Badillo
, Claudia Feregrino Uribe, René Cumplido, Miguel Morales-Sandoval
:
Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11i standard. 565-577 - Rafiullah Chamlawi
, Asifullah Khan
, Imran Usman:
Authentication and recovery of images using multiple watermarks. 578-584 - Ming Ming Wong, M. L. Dennis Wong
, Ismat Hijazin:
A throughput maximised parallel architecture for 2D fast Discrete Pascal Transform. 585-591
Volume 36, Number 4, July 2010
- Beata J. Wysocki, Tadeusz A. Wysocki, Hamid Sharif:
Guest Editorial. 593-595 - Amir Valizadeh, Mahsa Najibi:
A constrained optimization approach for an adaptive generalized subspace tracking algorithm. 596-602 - Jean-Marc Valin, Daniel V. Smith, Christopher Montgomery, Timothy B. Terriberry:
An iterative linearised solution to the sinusoidal parameter estimation problem. 603-616 - Hitoshi Hayakawa, Tadashi Shibata:
Block-matching-based motion field generation utilizing directional edge displacement. 617-625 - Kevin Adistambha, Stephen J. Davis, Christian H. Ritz
, Ian S. Burnett
:
Efficient multimedia query-by-content from mobile devices. 626-642 - Simon Denman, Todd Lamb, Clinton Fookes
, Vinod Chandran
, Sridha Sridharan:
Multi-spectral fusion for surveillance systems. 643-663 - Tai Nguyen-Ky, John Leis, Wei Xiang
:
An improved new error estimation algorithm for optimal filter lengths for stereophonic acoustic echo cancellation. 664-675 - Vanessa Testoni, Max H. M. Costa:
Entropy coders and 3D-Hadamard coefficients sequency scan order for a fast embedded color video codec. 676-690 - Jun Zhang
, Lei Ye:
Series feature aggregation for content-based image retrieval. 691-701 - Young H. Jung, Yoonsik Choe:
Resource-aware and quality-fair video-streaming using multiple adaptive TCP connections. 702-717 - Fariza Sabrina:
A novel resource scheduling algorithm for QoS-aware services on the Internet. 718-734 - Kumudu S. Munasinghe
, Abbas Jamalipour:
An analytical evaluation of mobility management in integrated WLAN-UMTS networks. 735-751 - Huda AlAmri, Mehran Abolhasan
, Tadeusz A. Wysocki:
Scalability of MANET routing protocols for heterogeneous and homogenous networks. 752-765 - Le Chung Tran
, Alfred Mertins, Tadeusz A. Wysocki:
Quasi-orthogonal space-time-frequency codes in MB-OFDM UWB. 766-774 - Keni Popovski, Tadeusz A. Wysocki, Beata J. Wysocki:
A closed-form derivation of self and multi-user interference for time-reversed UWB communications. 775-788 - Yafeng Wang, Hao Yang, Dacheng Yang, Wei Xiang
:
Iterative decision feedback equalizer with cyclic detection for DFT-S OFDM system. 789-801
Volume 36, Number 5, September 2010
- Hamid Sarbazi-Azad, Lewis M. Mackenzie:
Special section on advances in computing systems science and engineering. 803-804 - Soheil Hassas Yeganeh, Jafar Habibi, Habib Rostami
, Hassan Abolhassani:
Semantic web service composition testbed. 805-817 - Nasser Yazdani, Hossein Mohammadi:
DMP-tree: A dynamic M-way prefix tree data structure for strings matching. 818-834 - Mehdi Kargahi, Ali Movaghar
:
Dynamic routing of real-time jobs among parallel EDF queues: A performance study. 835-849 - Hooman Nikmehr, Braden Phillips, Cheng-Chew Lim
:
A novel implementation of radix-4 floating-point division/square-root using comparison multiples. 850-863 - H. Parandeh-Afshar, Sied Mehdi Fakhraie, Omid Fatemi:
Parallel merged multiplier-accumulator coprocessor optimized for digital filters. 864-873 - Hamid Reza Shahriari
, Mohammad Sadegh Makarem, Marjan Sirjani, Rasool Jalili, Ali Movaghar
:
Vulnerability analysis of networks to detect multiphase attacks using the actor-based language Rebeca. 874-885 - S. H. Nabavi-Kerizi, Mohammad Shams Esfand Abadi, Ehsanollah Kabir
:
A PSO-based weighting method for linear combination of neural networks. 886-894 - Farshad Rostamabadi, Mohammad Ghodsi:
Incremental labeling in closed-2PM model. 895-901 - Kaveh Jokar Deris, Amirali Baniasadi:
Power-aware BTB for modern processors. 902-911
- Heeheon Kim, Xuefeng Piao, Sangchul Han, Moonju Park, Minkyu Park, Seongje Cho, Yookun Cho:
Improving responsiveness of soft aperiodic tasks using proportional slack time. 913-926 - Mingjun Wu, Xianrong Peng, Qiheng Zhang, Rujin Zhao:
Segmenting and tracking multiple objects under occlusion using multi-label graph cut. 927-934 - Azzam Y. Al-nahari, Sami A. El-Dolil, M. I. Desouky, Fathi E. Abd El-Samie:
Power-based multi-cell call admission control scheme for wideband-CDMA systems. 935-947 - Ji-Seon Lee, Jik Hyun Chang, Dong Hoon Lee:
Forgery attacks on Kang et al.'s identity-based strong designated verifier signature scheme and its improvement with security proof. 948-954 - Chiou-Yng Lee
, Pramod Kumar Meher:
Efficient bit-parallel multipliers over finite fields GF(2m). 955-968 - Wenfa Zhan, Huaguo Liang, Cuiyun Jiang, Zhengfeng Huang, Aiman H. El-Maleh
:
A scheme of test data compression based on coding of even bits marking and selective output inversion. 969-977 - Imam Al-wazedi, Ahmed K. Elhakeem:
A CDMA/TDD approach for wireless mesh networks. 978-992 - Ali A. Kanso
:
Modified self-shrinking generator. 993-1001 - Tsung Hung Chen, Shyh-Chang Liu, Jyh-Haw Chen:
Adaptive receiver-driven approach in P2P live streaming networks. 1002-1013 - Jie Yang, Shengsheng Yu, Jingli Zhou, Yi Gao:
A new error concealment method for consecutive frame loss based on CELP speech. 1014-1020
Volume 36, Number 6, November 2010
- Qiang Dong
, Xiaofan Yang, Dajin Wang:
Embedding multi-dimensional meshes into twisted cubes. 1021-1026 - Salem H. Salamah, Turki Darweesh:
Coverage study for broadband wireless systems using link adaptation and diversity combining techniques. 1027-1034 - Zuhua Shao:
Fair exchange protocol of Schnorr signatures with semi-trusted adjudicator. 1035-1045 - Rui Zhang, Jiqiang Liu, Zhen Han, Lijuan Zheng:
An IBE scheme using ECC combined public key. 1046-1054 - Serkan Dursun, Artyom M. Grigoryan:
Nonlinear L2-by-3 transform for PAPR reduction in OFDM systems. 1055-1065 - Ramin Tajallipour, Khan A. Wahid:
Error-free algorithm and architecture of radix-10 logarithmic converter. 1066-1074 - Dorin Patru, R. Scott Hudson:
Optically injected logic circuits for remote-powered systems on a chip. 1075-1092 - Yilmaz Uyaroglu
, Ihsan Pehlivan:
Nonlinear Sprott94 Case A chaotic equation: Synchronization and masking communication applications. 1093-1100 - Nasro Min-Allah
, Ishtiaq Ali
, Jiansheng Xing, Yongji Wang:
Utilization bound for periodic task set with composite deadline. 1101-1109 - Fiaz Gul Khan, Kalim Qureshi, Babar Nazir:
Performance evaluation of fault tolerance techniques in grid computing system. 1110-1122 - Chunlin Li, Layuan Li:
Joint contexts optimization for mobile grid. 1123-1139 - Farhad Gh. Khodaei
, Javad Nourinia
, Changiz Ghobadi
:
Adaptive beamforming algorithm with increased speed and improved reliability for smart antennas. 1140-1146 - Vahideh Vakil, Hassan Aghaeinia
:
Throughput improvement of STS-based MC DS-CDMA system with adaptive modulation. 1147-1155 - Tae-Wuk Bae, Byoung-Ik Kim, Young-Choon Kim, Kyu-Ik Sohng:
Small target detection using cross product based on temporal profile in infrared image sequences. 1156-1164 - H. Fatih Ugurdag, Sezer Gören
, Ferhat Canbay:
Gravitational pose estimation. 1165-1180 - Pawel Kulakowski
, Javier Vales-Alonso
, Esteban Egea-López
, Wieslaw Ludwin, Joan García-Haro
:
Angle-of-arrival localization based on antenna arrays for wireless sensor networks. 1181-1186 - Partha Pratim Sahu, S. Panda:
Frequency hopping spread spectrum signalling using code quadratic FSK technique for multichannel. 1187-1192 - Xiangzhi Bai, Fugen Zhou:
Infrared small target enhancement and detection based on modified top-hat transformations. 1193-1201

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.