


default search action
Computers & Electrical Engineering, Volume 33
Volume 33, Number 1, January 2007
- Liang-Teh Lee, Der-Fu Tao, Chieh Tsao:

An adaptive scheme for predicting the usage of grid resources. 1-11 - Wenming Li, Krishna M. Kavi, Robert Akl:

A non-preemptive scheduling algorithm for soft real-time systems. 12-29 - Elif Derya Übeyli, Inan Güler

:
Performance analysis of classical, model-based and eigenvector methods: Ophthalmic arterial disorders detection case. 30-47 - Asim Bhatti

, Saeid Nahavandi, Yakov Frayman:
3D depth estimation for visual inspection using wavelet transform modulus maxima. 48-57 - Sezer Gören

, F. Joel Ferguson:
On state reduction of incompletely specified finite state machines. 58-69 - Kalim Qureshi, Paul D. Manuel

:
Adaptive pre-task assignment scheduling strategy for heterogeneous distributed raytracing system. 70-78
Volume 33, Number 2, March 2007
- Richard Demo Souza

, Javier Garcia-Frías
, Renato da Rocha Lopes
:
Turbo equalization for block fading MIMO channels using random signal mapping. 79-87 - Lifeng Guo, Guilin Wang:

Insider attacks on multi-proxy multi-signature schemes. 88-93 - Ho-Ting Wu, Kai-Wei Ke, Shunyong Huang:

A novel multicast mechanism for optical local area networks. 94-108 - F. Javier Díaz, Angel M. Burón, José M. Solana:

Haar wavelet based processor scheme for image coding with low circuit complexity. 109-126 - P. P. Sahu:

Improvement of jitter transfer characteristics of a 9.95328Gb/s data recovery DLL using saw filter. 127-132 - Shiang-Feng Tzeng, Yuan-Liang Tang, Min-Shiang Hwang:

A new convertible authenticated encryption scheme with message linkages. 133-138
- Ganesan Periakarruppan, Hairul A. Abdul-Rashid

:
Packet based echo cancellation for VoIP networks. 139-148
Volume 33, Number 3, May 2007
- Liang-Teh Lee, Chen-Feng Wu:

An HMM-based call admission control policy for supporting QoS in wireless cellular networks. 153-165 - Yu Long, Kefei Chen, Shengli Liu:

ID-based threshold decryption secure against adaptive chosen-ciphertext attack. 166-176 - Yu-Chuan Liu, Hsiang-An Wen, Chun-Li Lin, Tzonelih Hwang:

Proxy-protected signature secure against the undelegated proxy signature attack. 177-185 - R. Shantha Selva Kumari

, V. Sadasivam:
A novel algorithm for wavelet based ECG signal coding. 186-194 - Fei Xu, Chip-Hong Chang

, Ching-Chuen Jong
:
Hamming weight pyramid - A new insight into canonical signed digit representation and its applications. 195-207 - Chun-Wei Tseng, Chu-Sing Yang:

System support for web hosting services on server clusters. 208-220
- Nong-Kun Chen, Jiann-Liang Chen:

Feedback QoS control scheme for wireless network applications. 221-229
Volume 33, Number 4, July 2007
- Mohamed Abid:

Guest Editorial. 231-232 - Stephen Coe, Shawki Areibi, Medhat Moussa

:
A hardware Memetic accelerator for VLSI circuit partitioning. 233-248 - Nicolas Gorse, P. Bélanger, Alexandre Chureau, El Mostapha Aboulhamid, Yvon Savaria:

A high-level requirements engineering methodology for electronic system-level design. 249-268 - Amir Masoud Gharehbaghi

, Benyamin Hamdin Yaran, Shaahin Hessabi
, Maziar Goudarzi
:
An assertion-based verification methodology for system-level design. 269-284 - Abdellatif Mtibaa

, Bouraoui Ouni, Mohamed Abid:
An efficient list scheduling algorithm for time placement problem. 285-298 - Hervé Charlery, Adrijean Andriahantenaina, Alain Greiner:

Physical design of the VCI wrappers for the on-chip packet-switched network named SPIN. 299-309 - Thomas Hollstein

, Manfred Glesner:
Advanced hardware/software co-design on reconfigurable network-on-chip based hyper-platforms. 310-319
Volume 33, Numbers 5-6, September-November 2007
- Paris Kitsos

, Nicolas Sklavos
:
Guest Editors' Introduction to the Special Issue on Security of Computers and Networks. 321-323 - Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede

:
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller. 324-332 - Apostolos P. Fournaris, Odysseas G. Koufopavlou:

Applying systolic multiplication-inversion architectures based on modified extended Euclidean algorithm for GF(2k) in elliptic curve cryptography. 333-348 - Grace Elias, Ali Miri, Tet Hin Yeap:

On efficient implementation of FPGA-based hyperelliptic curve cryptosystems. 349-366 - Elke De Mulder, Siddika Berna Örs

, Bart Preneel, Ingrid Verbauwhede
:
Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems. 367-382 - Timo Alho, Panu Hämäläinen, Marko Hännikäinen, Timo D. Hämäläinen:

Compact modular exponentiation accelerator for modern FPGA devices. 383-391 - Maurice Keller, Robert Ronan, William P. Marnane

, Colin C. Murphy:
Hardware architectures for the Tate pairing over GF(2m). 392-406 - Asaf Ashkenazi, Dmitry Akselrod:

Platform independent overall security architecture in multi-processor system-on-chip integrated circuits for use in mobile phones and handheld devices. 407-424 - Drago Zagar, Kresimir Grgic, Snjezana Rimac-Drlje

:
Security aspects in IPv6 networks - implementation and testing. 425-437 - Zorana Bankovic, Dusan Stepanovic, Slobodan Bojanic, Octavio Nieto-Taladriz:

Improving network security using genetic algorithm approach. 438-451

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














