Computers & Electrical Engineering, Volume 39 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 39, Number 1, January 2013
Special issue on Recent Advanced Technologies and Theories for Grid and Cloud Computing

Taeshik Shon, Ching-Hsien Hsu, Isaac Woungang:
Introduction to Special issue on Recent Advanced Technologies and Theories for Grid and Cloud Computing. 1-2

Lizhe Wang
, Dan Chen, Yangyang Hu, Yan Ma, Jian Wang:
Towards enabling Cyberinfrastructure as a Service in Clouds. 3-14

Young-Sik Jeong, Jong Hyuk Park:
High availability and efficient energy consumption for cloud computing service with grid infrastructure. 15-23

Tie Qiu, Lin Feng, He Jiang, Weifeng Sun:
Queueing model analysis and scheduling strategy for embedded multi-core SoC based on task priority. 24-33

Dongyoung Koo
, Junbeom Hur, Hyunsoo Yoon:
Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. 34-46

Chunming Rong
, Son Thanh Nguyen, Martin Gilje Jaatun
:
Beyond lightning: A survey on security challenges in cloud computing. 47-54

Deokho Kim, Karam Park, Won Woo Ro:
Exploiting SIMD parallelism on dynamically partitioned parallel network coding for P2P systems. 55-66

Jianqun Cui, Naixue Xiong, Jong Hyuk Park, Keming Jia, Libing Wu
:
A novel and efficient source-path discovery and maintenance method for application layer multicast. 67-75
Special issue on Bio-engineering

Yi Wan:
Introduction to the Special Issue on Bio-engineering. 77-78

Sundararajan Dhanalakshmi, Subramanian Baskar, Subramanian Kannan
, Krishnan Mahadevan
:
Generation Scheduling problem by Intelligent Genetic Algorithm. 79-88

Jun Feng
, Jian-Zhou Zhang, Bin Zhou:
A novel kernel-based limited-view computerized tomography reconstruction via anisotropic diffusion. 89-102

Younhee Choi, Qiao Zhang, Seok-Bum Ko
:
Noninvasive cuffless blood pressure estimation using pulse transit time and Hilbert-Huang transform. 103-111

Indrajit Pan
, Ritwik Mukherjee, Hafizur Rahaman
, Tuhina Samanta, Parthasarathi Dasgupta:
Optimization algorithms for the design of digital microfluidic biochips: A survey. 112-121

Jing Zhang, Jiayin Zhou, Weimin Huang, Jing Qin
, Tao Yang
, Jimmy Liu, Yi Su
, Chee-Kong Chui, Stephen K. Y. Chang:
GPU-friendly gallbladder modeling in laparoscopic cholecystectomy surgical training system. 122-129

Ranjeet Kumar
, Anil Kumar
, Rajesh Kumar Pandey
:
Beta wavelet based ECG signal compression using lossless encoding with modified thresholding. 130-140

Ching-Sung Wang
:
A new AC-coupled amplifier for portable ECG without reference electrode. 141-149
Volume 39, Number 2, February 2013
Regular papers

Salim Hadj Saïd, Faouzi M'Sahli
, Faouzi Mimouni, Mondher Farza:
Adaptive high gain observer based output feedback predictive controller for induction motors. 151-163

C. Vennila
, Alok Kumar Patel, G. Lakshminarayanan
, Seok-Bum Ko
:
Dynamic partial reconfigurable Viterbi decoder for wireless standards. 164-174

Suxia Zhu, Zhenzhou Ji, Qing Wang:
An efficient deterministic record-replay with separate dependencies. 175-189

Miona Andrejevic Stosovic
, Miljana Milic
, Mark Zwolinski
, Vanco B. Litovski:
Oscillation-based analog diagnosis using artificial neural networks based inference mechanism. 190-201

Jih-Ching Chiu, Kai-Ming Yang:
High-speed low-power multiplexer-based selector for priority policy. 202-213

N. Amuthan
, P. Subburaj, P. Melba Mary:
Voltage sag ride through using Improved Adaptive Internal Model Controller for doubly fed induction generator wind farms. 214-224

Dipak Kumar Kole, Hafizur Rahaman
, Debesh K. Das, Bhargab B. Bhattacharya:
Derivation of test set for detecting multiple missing-gate faults in reversible circuits. 225-236

Mahesh Kumar, Shishir Kumar:
An approach to stabilize interdomain routing protocol after failure. 237-245

Hattab Guesmi
, Ridha Djemal:
Design of priority-based active queue management for a high-performance IP switch. 246-260

Marija Punt
, Milo Tomasevic, Jovan Djordjevic:
Evaluation and analysis of an on-line error detection monitoring technique. 261-273

Armando Segovia de los Ríos, Mayra Garduño Gaffare, Miguel Balcázar, Luís Ledezma:
Automatic evaluation of solid state track detectors by artificial vision. 274-284

Chuan Zhou
, Junwei He, Qingwei Chen:
A robust active queue management scheme for network congestion control. 285-294

Hao Chen, Thomas Gaska, Yu Chen, Douglas H. Summerville:
An optimized reconfigurable power spectral density converter for real-time shrew DDoS attacks detection. 295-308

Fan Zhang, Xinhong Zhang, Kui Cao, Duoyi Li, Congcong Li:
Information theory applications in error bit rate analysis of digital image watermarking. 309-318

Imran Naseem, Duc-Son Pham
, Svetha Venkatesh
:
A novel information theoretic approach to wavelet feature selection for texture classification. 319-325

Xianfu Meng, Xiaoling Chen, Yalin Ding:
Using the complementary nature of node joining and leaving to handle churn problem in P2P networks. 326-337

Ian K. T. Tan
, Ian Chai
, Poo Kuan Hoong:
Dynamic threshold for imbalance assessment on load balancing for multicore systems. 338-348

Anbazhagan Rajesh
, Rangaswamy Nakkeeran:
Contention based bandwidth request with signaling analysis in IEEE 802.16 two hop relay networks. 349-360

Jinglei Zhou, Mao Ye
, Jian Ding, Haiyang Wang, Xue Li
:
Clothing-to-words mapping using word separation method. 361-372

Mohammad Aliasgari, Aliazam Abbasfar, Sied Mehdi Fakhraie:
Coding techniques to mitigate out-of-band radiation in high data rate OFDM-based cognitive radios. 373-385

Sezer Gören
, Ozgur Ozkurt, Abdullah Yildiz
, H. Fatih Ugurdag, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Partial bitstream protection for low-cost FPGAs with physical unclonable function, obfuscation, and dynamic partial self reconfiguration. 386-397

Ioannis Voyiatzis, Costas Efstathiou, Hera Antonopoulou, Athanasios Milidonis:
An effective two-pattern test generator for Arithmetic BIST. 398-409

Costas Efstathiou, Nikolaos Moschopoulos, Ioannis Voyiatzis, Kiamal Z. Pekmestzi:
On the design of modulo 2n + 1 dot product and generalized multiply-add units. 410-419

Jixin Liu, Quan-Sen Sun:
Fractal pursuit for compressive sensing signal recovery. 420-432

K. Nithiyananthan, V. Ramachandran:
Versioning-based service-oriented model for multi-area power system online economic load dispatch. 433-440

Cemal Hanilçi, Figen Ertas:
Investigation of the effect of data duration and speaker gender on text-independent speaker recognition. 441-452

Jih-Sheng Shen, Pao-Ann Hsiung
, Chun-Hsian Huang:
Learning-based adaptation to applications and environments in a reconfigurable network-on-chip for reducing crosstalk and dynamic power consumption. 453-464

Marija D. Blagojevic
, Zivadin Micic:
A web-based intelligent report e-learning system using data mining techniques. 465-474

Chong Yu, Qiwen Qiu, Xiong Chen:
A hybrid two-dimensional path planning model based on frothing construction algorithm and local fast marching method. 475-487

Mingwei Tang, Jie Hu, Mingyu Fan, Wen Song:
A steganalysis by adjacency pixel bits structure. 488-496

Tamer Ahmed Farrag
, Ahmed I. Saleh, Hesham A. Ali:
Semantic web services matchmaking: Semantic distance-based approach. 497-511

Yasser Shoukry
, M. Watheq El-Kharashi, Sherif Hammad:
An embedded implementation of the Generalized Predictive Control algorithm applied to automotive active suspension systems. 512-529

Mohammad Sabzinejad Farash
, Mahmoud Ahmadian-Attari, Reza Ebrahimi Atani
, Mohamadreza Jami:
A new efficient authenticated multiple-key exchange protocol from bilinear pairings. 530-541

Miguel Morales-Sandoval
, Claudia Feregrino Uribe, Paraskevas Kitsos
, René Cumplido:
Area/performance trade-off analysis of an FPGA digit-serial GF(2_m_)GF(2m) Montgomery multiplier based on LFSR. 542-549

Pawan K. Ajmera, Raghunath S. Holambe:
Fractional Fourier transform based features for speaker recognition using support vector machine. 550-557
Papers of the Special Issue on Recent Developments in Computing and Communications

Sabu M. Thampi
:
Introduction to the special issue on Recent Developments in Computing and Communications. 558-559

Ankit Chaudhary
, Jagdish Lal Raheja:
Bent fingers' angle calculation using supervised ANN to control electro-mechanical robotic hand. 560-570

Abdelaali Chaoub
, Elhassane Ibn-Elhaj:
Cross layer design for equal and unequal loss protection frameworks in cognitive radio networks. 571-581

Vaithianathan Geetha
, Niladhuri Sreenath
:
Preventing deadlocks and starvation in distributed object oriented systems. 582-595

Xiaowen Chen, Zhonghai Lu, Axel Jantsch
, Shuming Chen, Shenggang Chen, Huitao Gu:
Reducing Virtual-to-Physical address translation overhead in Distributed Shared Memory based multi-core Network-on-Chips according to data property. 596-612

Punam Bedi
, Anjali Thukral
, Hema Banati
:
Focused crawling of tagged web resources using ontology. 613-628

Huaizhou Shi, R. Venkatesha Prasad
, Ignas G. Niemegeers, Ming Xu:
A distributed lifetime guaranteed mechanism in cooperative personal networks. 629-639

Punam Bedi
, Roli Bansal
, Priti Sehgal:
Using PSO in a spatial domain based image hiding scheme with distortion tolerance. 640-654

Sunil Kumar Kopparapu
, Kiran Kumar Bhuvanagiri:
Recognition of subsampled speech using a modified Mel filter bank. 655-662

Madhu S. Nair
, P. M. Ameera Mol:
Direction based adaptive weighted switching median filter for removing high density impulse noise. 663-689

Neela Madheswari Annamalai
, R. S. D. Wahida Banu:
Static and dynamic job scheduling with communication aware policy in cluster computing. 690-696

Lei Zhang, Emma E. Regentova, Xianfang Tan:
Packet switching optical network-on-chip architectures. 697-714
Volume 39, Number 3, April 2013
Special issue on Image and Video Processing

Ferat Sahin, Ryan Bowen:
Introduction to Special Issue on Image and Video Processing. 715-716

Cheng-Fan Li, Jing-Yuan Yin:
Variational Bayesian independent component analysis-support vector machine for remote sensing classification. 717-726

Saeed Meshgini, Ali Aghagolzadeh
, Hadi Seyedarabi
:
Face recognition using Gabor-based direct linear discriminant analysis and support vector machine. 727-745

Xiangyang Wang, Hong-Ying Yang, Dong-Ming Li:
A new content-based image retrieval technique using color and texture information. 746-761

M. Subrahmanyam, Q. M. Jonathan Wu, R. P. Maheshwari, Raman Balasubramanian:
Modified color motif co-occurrence matrix for image indexing and retrieval. 762-774

Laura Pozueco
, Xabiel García Pañeda, Roberto García, David Melendi
, Sergio Cabrero
:
Adaptable system based on Scalable Video Coding for high-quality video service. 775-789

Engin Mendi, Hélio B. Clemente, Coskun Bayrak:
Sports video summarization based on motion analysis. 790-796

Chunsheng Guo, Jian Yu:
Steering kernel-based video moving objects detection with local background texture dictionaries. 797-808

M. Alarmel Mangai, N. Ammasai Gounden:
Subspace-based clustering and retrieval of 3-D objects. 809-817

Mahmood Ashoori Lalimi, Sedigheh Ghofrani
, Desmond C. McLernon
:
A vehicle license plate detection method using region and edge based methods. 834-845

Bing-Fei Wu, Hao-Yu Huang, Chao-Jung Chen, Ying-Han Chen, Chia-Wei Chang, Yen-Lin Chen
:
A vision-based blind spot warning system for daytime and nighttime driver assistance. 846-862

Songan Mao, Mao Ye
, Xue Li
, Feng Pang, Jinglei Zhou:
Rapid vehicle logo region detection based on information theory. 863-872

Li Fan, Tiegang Gao, Yanjun Cao:
Improving the embedding efficiency of weight matrix-based steganography for grayscale images. 873-881

Guang-tao Ge, Lu Yu
:
Extrema points coding based on empirical mode decomposition: An improved image sub-band coding method. 882-892

Hong-Ying Yang, Xiangyang Wang, Chunpeng Wang:
A robust digital watermarking algorithm in undecimated discrete wavelet transform domain. 893-906

Intan Aidha Yusoff, Nor Ashidi Mat Isa
, Khairunnisa Hasikin
:
Automated two-dimensional K-means clustering algorithm for unsupervised image segmentation. 907-917

Abdenour Hacine-Gharbi
, Mohamed A. Deriche
, Philippe Ravier, Rachid Harba, Tayeb Mohamadi:
A new histogram-based estimation technique of entropy and mutual information using mean squared error minimization. 918-933

Xiaobo Zhang
, Xiang-Chu Feng, Weiwei Wang, Shunli Zhang, Qunfeng Dong:
Gradient-based Wiener filter for image denoising. 934-944

Xiao Ke, Shaozi Li, Guolong Chen:
Real web community based automatic image annotation. 945-956

Yi-Leh Wu, Cheng-Yuan Tang, Yuan-Ming Yeh, Wei-Chih Hung:
Using Hilbert scan on statistical color space partitioning. 957-969
Special issue on Recent Trends in Communications and Signal Processing

Srinivasan Rajavelu
, G. Radhamani, Raja Kumar Murugesan
:
Introduction to Special Issue on Recent Trends in Communications and Signal Processing. 971-972

M. M. Hafizur Rahman, Yukinori Sato
, Yasushi Inoguchi:
High and stable performance under adverse traffic patterns of tori-connected torus network. 973-983

K. S. Vishvaksenan, R. Seshasayanan, Yuvaraj Krishnamoorthy:
Performance of joint transmit scheme assisted multiple-input multiple-output multi-carrier IDMA system. 984-995

Shruthi Ravichandran, Prabagarane Nagaradjane, Selvam Paranche Damodaran
, Sriram Ravichandran, Nithin Srinivasan:
Performance of transmitter preprocessing aided cooperative relaying with fixed infrastructure relays. 996-1005

Sakthi Vignesh Radhakrishnan, Sudharssun Subramanian:
An analytical approach to s-box generation. 1006-1015

Prabagarane Nagaradjane, Prasaanth Muralidharan, Sabarish Karthik Vivek Sarathy, Yuvika Ashwina Rajan, Shriram Swaminathan:
Multi-user transmitter preprocessing assisted uplink multi-cell multiple-input multiple-output system with base station cooperation over frequency-selective channels. 1016-1025

R. Jothi Chitra
, Velmurugan Nagarajan
:
Double L-slot microstrip patch antenna array for WiMAX and WLAN applications. 1026-1041
Volume 39, Number 4, May 2013

Seung-Eun Lee
, Kyungwon Min
, Taeweon Suh:
Accelerating Histograms of Oriented Gradients descriptor extraction for pedestrian recognition. 1043-1048

Keisuke Murakami:
Formulation and heuristic algorithms for multi-chip module substrate testing. 1049-1060

Xiaojun Chen, Jing Zhang, Wei Wei, Junhuai Li, Xiang Li:
Integration technology of collaborative computing system over multiple virtual machines oriented for finite element analysis. 1061-1076

Jimson Mathew, Saraju P. Mohanty, Shibaji Banerjee, Dhiraj K. Pradhan, Abusaleh M. Jabir:
Attack tolerant cryptographic hardware design by combining error correction and uniform switching activity. 1077-1087

Zijian Tian, Liya Zhang, Wei Chen:
Improved algorithm for navigation of rescue robots in underground mines. 1088-1094

Yunfei Du
, Yuhua Tang, Xinwei Xie:
A new parallel recomputing code design methodology for fast failure recovery. 1095-1113

Hafiz Imtiaz
, Shaikh Anowarul Fattah:
A histogram-based dominant wavelet domain feature selection algorithm for palm-print recognition. 1114-1128

Jih-Ching Chiu, Kai-Ming Yang, Yu-Liang Chou, Chih-Kang Wu:
A relation-exchanging buffering mechanism for instruction and data streaming. 1129-1141

Jiang Bian
, Remzi Seker:
The Jigsaw secure distributed file system. 1142-1152

Sesham Srinu
, Samrat L. Sabat
:
Effective cooperative wideband sensing using energy detection under suspicious Cognitive Radio Network. 1153-1163

Hongjun Liu
, Da Lin, Abdurahman Kadir:
A novel data hiding method based on deoxyribonucleic acid coding. 1164-1173

G. P. Sajeev, M. P. Sebastian:
Building semi-intelligent web cache systems with lightweight machine learning techniques. 1174-1191

Dora M. Ballesteros L.
, Juan M. Moreno A:
Real-time, speech-in-speech hiding scheme based on least significant bit substitution and adaptive key. 1192-1203

Amin Farshidi, Logan M. Rakai, Bardia Samimi, Laleh Behjat
, David T. Westwick
:
A new a priori net length estimation technique for integrated circuits using radial basis functions. 1204-1218

M. Jayabharata Reddy
, D. Venkata Rajesh, D. K. Mohanta
:
Robust transmission line fault classification using wavelet multi-resolution analysis. 1219-1247

Tianshuang Qiu, Li Li
:
A novel joint parameter estimation method based on fractional ambiguity function in bistatic multiple-input multiple-output radar system. 1248-1259

Fotis Foukalas, George T. Karetsos:
On the performance of adaptive modulation in cognitive radio networks. 1260-1275

Chong Yu, Xiong Chen:
Home monitoring system based on indoor service robot and wireless sensor network. 1276-1287

Ahmet Rizaner
:
Radial basis function network assisted single-user channel estimation by using a linear minimum mean square error detector under impulsive noise. 1288-1299

Dora M. Ballesteros L.
, Juan M. Moreno A:
Wavelet-denoising on hardware devices with Perfect Reconstruction, low latency and adaptive thresholding. 1300-1311

Hamit Soyel
, Peter W. McOwan:
Towards an affect sensitive interactive companion. 1312-1319

Tahereh Boroomandnezhad, Mohammad Abdollahi Azgomi
:
An efficient control-flow checking technique for the detection of soft-errors in embedded software. 1320-1332

Abu Asaduzzaman, Vidya R. Suryanarayana, Fadi N. Sibai
:
On level-1 cache locking for high-performance low-power real-time multicore systems. 1333-1345

Jie Jia, Qiusi Lin, Jian Chen, Chunyu Li, Xingwei Wang:
Congestion aware channel allocation with route scheduling in wireless cognitive radio mesh network. 1346-1357

Nuha A. S. Alwan:
Systolic parallel architecture for brute-force autoregressive signal modeling. 1358-1366

Marco A. Moreno-Armendáriz
, Nareli Cruz Cortés, Carlos A. Duchanoy, Alejandro León-Javier, Rolando Quintero
:
Hardware implementation of the elitist compact Genetic Algorithm using Cellular Automata pseudo-random number generator. 1367-1379
Volume 39, Number 5, July 2013
Regular Papers

Jiang Liu, Baigen Cai
, Yunpeng Wang, Jian Wang:
A lane level positioning-based cooperative vehicle conflict resolution algorithm for unsignalized intersection collisions. 1381-1398

Haixia Cui, Gang Wei, Gaoyong Luo, Yongcong Yu, Wenlou Li:
Performance analysis of ARQ cooperative diversity system with multiple two-hop relays over Rayleigh fading channels. 1399-1408

Hung-Ming Chen, Po-Hung Chen, Cheng-Tso Lin, Jian-Hong Ciou:
An adaptive macroblock-mean difference based sorting scheme for fast normalized partial distortion search motion estimation. 1409-1421

Laisen Nie, Dingde Jiang, Zhengzheng Xu:
A compressive sensing-based reconstruction approach to network traffic. 1422-1432

Hamid Parvin
, Behrouz Minaei-Bidgoli
, Hamid Alinejad-Rokny, William F. Punch:
Data weighing mechanisms for clustering ensembles. 1433-1450

Harvendra Singh Bhadauria, M. L. Dewal:
Medical image denoising using adaptive fusion of curvelet transform and total variation. 1451-1460
Special Issue on Recent Advances in Signal Processing, Biomedical Engineering and Informatics

Yonghong Peng, Riyi Shi, Yong Xiang:
Introduction to the special issue on Recent advance in signal processing, biomedical engineering and informatics. 1461-1463

Zhenhao Ge, Sudhendu R. Sharma
, Mark J. T. Smith:
Improving mispronunciation detection using adaptive frequency scale. 1464-1472

Bo Liu, Xiangzhi Bai, Fugen Zhou, Hongbin Han, Chao Hou:
Mutual information based three-dimensional registration of rat brain magnetic resonance imaging time-series. 1473-1484

Shun Miao, Rui Liao, Marcus Pfister:
Toward smart utilization of two X-ray images for 2-D/3-D registration applied to abdominal aortic aneurysm interventions. 1485-1498

Ugur Bilge
, Selen Bozkurt, Sedat Durmaz
:
Application of data mining techniques for detecting asymptomatic carotid artery stenosis. 1499-1505

Yuanquan Wang
, Huaibin Wang, Yan Xu:
Texture segmentation using vector-valued Chan-Vese model driven by local histogram. 1506-1515

S. S. Kumar, R. S. Moni, J. Rajeesh:
An automatic computer-aided diagnosis system for liver tumours on computed tomography images. 1516-1526

Harvendra Singh Bhadauria, Annapurna Singh, M. L. Dewal:
An integrated method for hemorrhage segmentation from brain CT Imaging. 1527-1536

Mehdi Fartash
, Saeed Setayeshi
, Farbod Razzazi
:
A scale-rate filter selection method in the spectro-temporal domain for phoneme classification. 1537-1548

Vikneswaran Vijean, M. Hariharan
, Sazali Yaacob, Mohd Nazri B. Sulaiman, Abdul Hamid Adom:
Objective investigation of vision impairments using single trial pattern reversal visually evoked potentials. 1549-1560

J. Mateo, A. M. Torres, C. Soria, J. L. Santos:
A method for removing noise from continuous brain signal recordings. 1561-1570

Umut Çelik, Sami Arica
:
Classification of evoked potentials of familiar and unfamiliar face stimuli using multi-resolution approximation based on excitatory post-synaptic potential waveform. 1571-1584
Volume 39, Number 6, August 2013

Mehdi Shadaram, Paul Cotae
, Catalin Lacatus:
Introduction to the special issue on "Wireless systems: Modeling, monitoring, transmission, performance evaluation and optimization". 1585-1586

Wei Lu, Yingzhuang Liu, Desheng Wang:
Efficient feedback scheme based on compressed sensing in MIMO wireless networks. 1587-1600

Dayang Sun, Xuan Huang, Yanheng Liu, Hui Zhong:
Predictable Energy Aware Routing based on Dynamic Game Theory in Wireless Sensor Networks. 1601-1608

Marios Logothetis, Kostas Tsagkaris
, Panagiotis Demestichas
:
Application and mobility aware integration of opportunistic networks with wireless infrastructures. 1609-1624

Zhaolong Ning
, Qingyang Song, Yao Yu:
A novel scheduling algorithm for physical-layer network coding under Markov model in wireless multi-hop network. 1625-1636

Zonghao Zhou, Yijun Zhu:
Optimization of the (MAP1, MAP2)/(PH1, PH2)/N retrial queue model of wireless cellular networks with channel allocation. 1637-1649

Wei Feng, Jian Liu, Jiannong Cao
, Liang Yang, Qin Xin:
Interference-aware cooperative QoS routing in multi-hop wireless networks. 1650-1666

Mu-Sheng Lin, Jenq-Shiou Leu, Kuen-Han Li, Jean-Lien C. Wu:
Zigbee-based Internet of Things in 3D Terrains. 1667-1683

Raimundo Viégas Junior, Luiz Affonso Guedes
, Francisco Vasques
, Paulo Portugal
, Ricardo de Moraes
:
A new MAC scheme specifically suited for real-time industrial communication based on IEEE 802.11e. 1684-1704

Guoqin Ning, Kaushik R. Chowdhury
, Jiaqi Duan, Prusayon Nintanavongsa
:
Licensed user activity estimation and track in mobile cognitive radio ad hoc networks. 1705-1716

Hu Xiong, Guobin Zhu, Zhong Chen, Fagen Li
:
Efficient communication scheme with confidentiality and privacy for vehicular networks. 1717-1725

Shufen Niu, Caifen Wang, Zhixuan Yu, Suzhen Cao:
Lossy data aggregation integrity scheme in wireless sensor networks. 1726-1735

Chien-Erh Weng, Ho-Lung Hung, Jia-Ming Zhang:
An analysis of lifetime-extended algorithm for wireless sensor networks. 1736-1745

Yong Zhang, Dan Huang, Min Ji, Fu-Ding Xie:
The evolution game analysis of clustering for asymmetrical multi-factors in WSNs. 1746-1757

Yi Chen, Ge Gao, Ming Liu, Huaxiong Yao, Jinglei Guo:
Convergence rate control for distributed multi-hop wireless mesh networks. 1758-1766

Yanheng Liu, An Ren, Dayang Sun, Aimin Wang:
A proactive maintaining algorithm for dynamic topology control in wireless sensor networks. 1767-1778

Gengzhong Zheng, Qiumei Liu:
Scale-free topology evolution for wireless sensor networks. 1779-1788

Ashraf Hossain
, S. Chakrabarti, P. K. Biswas:
Equal energy dissipation in wireless image sensor network: A solution to energy-hole problem. 1789-1799

Javad Akbari Torkestani:
Energy-efficient backbone formation in wireless sensor networks. 1800-1811

Yuhuai Peng, Yao Yu, Xiaorui Wang, Qingyang Song, Yinpeng Yu, Cunqian Yu:
A new coding- and interference-aware routing protocol in wireless mesh networks. 1822-1836

Joy Iong-Zong Chen, Lu-Tsou Yeh, Chu-Hsing Lin:
Performance evaluation of outage probability and BER for MIMO-femtocell system over spatial correlated channel. 1837-1845

M. Nesa Sudha
, M. L. Valarmathi
:
Collision control extended pattern medium access protocol in wireless sensor network. 1846-1853

Waleed Ejaz
, Kamran Manzoor, Hyung Joo Kim, Byung Tae Jang, Gwang-Ja Jin, Hyung Seok Kim:
Two-state routing protocol for maritime multi-hop wireless networks. 1854-1866

S. V. Annlin Jeba
, B. Paramasivan:
Energy efficient multipath data transfer scheme to mitigate false data injection attack in wireless sensor networks. 1867-1879

Pradheepkumar Singaravelu, Shekhar Verma
:
Performance analysis of multivariate cryptosystem schemes for wireless sensor network. 1880-1893

Xiao-Ying Zhang, Lei Guo
, Xuetao Wei:
An energy-balanced cooperative MAC protocol based on opportunistic relaying in MANETs. 1894-1904

Ing-Chau Chang, Yi-Ting Mai:
The end-to-end QoS guarantee framework for interworking WiMAX PMP and mesh networks with Internet. 1905-1934

Xuangou Wu, Yan Xiong, Wenchao Huang, Hong Shen, Mingxi Li:
An efficient compressive data gathering routing scheme for large-scale wireless sensor networks. 1935-1946
Volume 39, Number 7, October 2013
Regular Papers

Korra Sathya Babu
, Sanjay Kumar Jena, Jhalaka Hota
, Bijayinee Moharana:
Anonymizing social networks: A generalization approach. 1947-1961

Wei Chen, Zhibo Tang, Xiaorong Jiang, Jing Gao, Renke Sun, Sanad Hashlan:
Agglomerative clustering using improved rough sets and its applications in cooperative object localization. 1962-1969

Zahra Kamranian
, S. Amirhassan Monadjemi, Naser Nematbakhsh:
A novel free format Persian/Arabic handwritten zip code recognition system. 1970-1979

Ehsan Namjoo
, Ali Aghagolzadeh
, Javad Museviniya:
A new rateless code with unequal error protection property. 1980-1992

Pablo García-Triviño
, Luis M. Fernández
, Juan P. Torreglosa
, Francisco Jurado
:
Operation mode control of a hybrid power system based on fuel cell/battery/ultracapacitor for an electric tramway. 1993-2004

Ivanovitch M. D. Silva
, Rafael Leandro, Daniel Macêdo Batista, Luiz Affonso Guedes
:
A dependability evaluation tool for the Internet of Things. 2005-2018

Rafi Ullah Khalil, Asifullah Khan
, Aamir Saeed Malik:
Dual-purpose semi-fragile watermark: Authentication and recovery of digital images. 2019-2030

Yilin Zhang, Caleb Douglas, Wei-Ming Lin:
Recalling instructions from idling threads to maximize resource utilization for simultaneous multi-threading processors. 2031-2044

Shu-Chung Yi, Chin-Fa Hsieh:
An arithmetic controller design for numerical control. 2045-2052

Saleem Aslam, Kyung-Geun Lee:
Spectrum sharing optimization with QoS guarantee in cognitive radio networks. 2053-2067

Ehsan Tavakoli, Mahmoud Tabandeh, Sara Kaffash, Bijan Raahemi:
Multi-hop communications on wireless network-on-chip using optimized phased-array antennas. 2068-2085

Javier Moreno-Valenzuela
, Ricardo Campa, Víctor Santibáñez:
Model-based control of a class of voltage-driven robot manipulators with non-passive dynamics. 2086-2099

Wenbiao Zhou, Zhaoyun Cai, Ruiqiang Ding, Chen Gong, Dake Liu:
Efficient sorting design on a novel embedded parallel computing architecture with unique memory access. 2100-2111

Tao Ni, Hongyan Zhang, Changzhi Yu, Dingxuan Zhao, Songyue Liu:
Design of highly realistic virtual environment for excavator simulator. 2112-2123

Xianfu Meng, Tianjiao Li:
A dynamic load balancing scheme with incentive mechanism in heterogeneous structured P2P networks. 2124-2134

Tao Ni, Hongyan Zhang, Peng Xu, Hironao Yamada:
Vision-based virtual force guidance for tele-robotic system. 2135-2144

Valery Sklyarov
, Iouliia Skliarova
:
Hardware implementations of software programs based on hierarchical finite state machine models. 2145-2160

Yi-Kuei Lin, Cheng-Fu Huang
:
Delivery reliability of computer networks for data transmission within the permitted packet error rate and latency. 2161-2172

Ashraf K. Helmy, Gh. S. El-tawel:
Regular gridding and segmentation for microarray images. 2173-2182

Slo-Li Chu, Chih-Chieh Hsiao, Chen-Yu Chen:
Program-based dynamic precision selection framework with a dual-mode unified shader for mobile GPUs. 2183-2196

Hui Li
, Huaxi Gu
, Yintang Yang, Xiaoshan Yu:
A hybrid packet-circuit switched router for optical network on chip. 2197-2206

Eui-Jik Kim, Sung-Kwan Youm, Taeshik Shon, Chul-Hee Kang:
Stable pairwise time synchronization in the application layer for capillary machine-to-machine networks. 2207-2213

Athanasios G. Lazaropoulos:
Overhead and underground MIMO low voltage broadband over power lines networks and EMI regulations: Towards greener capacity performances. 2214-2230
Special issue on Recent Advances in Security and Privacy in Distributed Communications

José M. Alcaraz Calero
, Félix Gómez Mármol, Gregorio Martínez Pérez:
Special issue on Recent Advances in Security and Privacy in Distributed Communications. 2231-2232

Li-Han Chen, Fu-Hau Hsu, Yanling Hwang, Mu-Chun Su, Wei-Shinn Ku
, Chi-Hsuan Chang:
ARMORY: An automatic security testing tool for buffer overflow defect detection. 2233-2242

Jianqi Zhu, Feng Fu, Ke-xin Yin, Yanheng Liu:
Dynamic entropy based DoS attack detection method. 2243-2251

Luis Campo-Giralte, Cristina Conde
, Isaac Martín de Diego
, Enrique Cabello
:
Detecting denial of service by modelling web-server behaviour. 2252-2262

Eugenia I. Papagiannakopoulou
, Maria N. Koukovini, Georgios V. Lioudakis
, Joaquín García-Alfaro
, Dimitra I. Kaklamani, Iakovos S. Venieris, Frédéric Cuppens, Nora Cuppens-Boulahia:
A privacy-aware access control model for distributed network monitoring. 2263-2281

Fatemeh Raji
, Ali Miri, Mohammad Davarpanah Jazi:
CP2: Cryptographic privacy protection framework for online social networks. 2282-2298

Li Liu, Tao Guan, Zutao Zhang
:
Broadcast monitoring protocol based on secure watermark embedding. 2299-2305

Juan E. Tapiador
, John A. Clark:
The placement-configuration problem for intrusion detection nodes in wireless sensor networks. 2306-2317

Juan Hernández-Serrano
, Olga León
, Miguel Soriano
:
WiMAX-based robust localization in the presence of misbehaving and/or malicious base stations. 2318-2329
Special issue on Recent Advanced Technologies and Theories for Grid and Cloud Computing

Taeshik Shon, Danielo Goncalves Gomes
:
Introduction to Special issue on Recent Advanced Technologies and Theories for Grid and Cloud Computing. 2330-2331

Xiaofei Liao, Kai Chen, Hai Jin:
AdaptIDC: Adaptive inter-domain communication in virtualized environments. 2332-2341

Sheng Di, Cho-Li Wang, Ling Chen:
Ex-post efficient resource allocation for Self-organizing Cloud. 2342-2356

Aihua Liang, Limin Xiao, Li Ruan:
Adaptive workload driven dynamic power management for high performance computing clusters. 2357-2368

Tien-Ruey Hsiang, Yu Fu, Ching-Wei Chen, Sheng-Luen Chung:
A MapReduce-based indoor visual localization system using affine invariant features. 2369-2378

Jui-Hung Chang, Chin-Feng Lai
, Ming-Shi Wang, Tin-Yu Wu:
A cloud-based intelligent TV program recommendation system. 2379-2399

Thar Baker
, Michael Mackay, Martin Randles
, Azzelarabe Taleb-Bendiab:
Intention-oriented programming support for runtime adaptive autonomic cloud-based applications. 2400-2412

Lanxiang Chen, Shuming Zhou, Xinyi Huang, Li Xu:
Data dynamics for remote data possession checking in cloud storage. 2413-2424
Volume 39, Number 8, November 2013
Regular Papers

Babar Nazir
, Halabi Hasbullah:
Energy efficient and QoS aware routing protocol for Clustered Wireless Sensor Network. 2425-2441

Muhammad Mehran Ajmal, Sajjad Ahmad Madani
, Tahir Maqsood, Kashif Bilal, Babar Nazir
, Khizar Hayat
:
Coordinated opportunistic routing protocol for wireless mesh networks. 2442-2453

Matthew J. Hibbard, Eric R. Peskin, Ferat Sahin:
FPGA implementation of particle swarm optimization for Bayesian network learning. 2454-2468

Nachiketa Das, Pranab Roy, Hafizur Rahaman
:
Bridging fault detection in cluster based FPGA by using Muller C element. 2469-2482

Jorge González-Domínguez
, María J. Martín
, Guillermo L. Taboada
, Roberto R. Expósito
, Juan Touriño
:
The Servet 3.0 benchmark suite: Characterization of network performance degradation. 2483-2493

Abu Asaduzzaman, Sri R. Chaturvedula, Ravi Pendse:
A novel folded-torus based network architecture for power-aware multicore systems. 2494-2506

Flávio Henrique Teles Vieira
, Josemar Alves dos Santos Jr., Álisson A. Cardoso
:
Estimation of backlog and delay in OFDM/TDMA systems with traffic policing using Network Calculus. 2507-2520

Ying Xie, Bin Luo
, Rongbin Xu:
The learning system of collective behavior in students' social network. 2521-2530

Mohamed Djendi, Rédha Bendoumia
:
A new adaptive filtering subband algorithm for two-channel acoustic noise reduction and speech enhancement. 2531-2550
Special issue on Heterogeneous Architectures and High-Performance Computing

Jesús Carretero
, Félix García Carballeira:
Introduction to special issue on heterogeneous architectures and high-performance computing. 2551-2552

Mattijs Ghijsen, Jeroen van der Ham
, Paola Grosso
, Cosmin Dumitru, Hao Zhu, Zhiming Zhao
, Cees de Laat:
A semantic-web approach for modeling computing infrastructures. 2553-2565

Ami Marowka:
Analytical modeling of energy efficiency in heterogeneous processors. 2566-2578

Carlos de Alfonso
, Miguel Caballer
, Fernando Alvarruiz
, Vicente Hernández:
An energy management system for cluster infrastructures. 2579-2590

Alejandro Acosta
, Vicente Blanco Pérez
, Francisco Almeida
:
Dynamic load balancing on heterogeneous multi-GPU systems. 2591-2602

Jan Heisswolf, Ralf König, Martin Kupper, Jürgen Becker
:
Providing multiple hard latency and throughput guarantees for packet switching networks on chip. 2603-2622

Rafael Rodríguez-Sánchez
, José Luis Martínez
, Jan De Cock, Gerardo Fernández-Escribano
, Bart Pieters, José L. Sánchez
, José M. Claver
, Rik Van de Walle:
3D high definition video coding on a GPU-based heterogeneous system. 2623-2637

Pablo Quesada-Barriuso
, Dora Blanco Heras
, Francisco Argüello
:
Efficient 2D and 3D watershed on graphics processing unit: block-asynchronous approaches based on cellular automata. 2638-2655

Ricardo J. Barrientos
, José Ignacio Gómez
, Christian Tenllado
, Manuel Prieto-Matías
, Mauricio Marín
:
Range query processing on single and multi GPU environments. 2656-2668

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







