We use cookies to improve your experience with our site.

Implementing a 1GHz Four-Issue Out-of-Order Execution Microprocessor in a Standard Cell ASIC Methodology
Wei-Wu Hu, Ji-Ye Zhao, Shi-Qiang Zhong, Xu Yang, Elio Guidetti, Chris Wu
2007, 22(1): 1-0.
Abstract
An Energy-Efficient Instruction Scheduler Design with Two-Level Shelving and Adaptive Banking
Yu-Lai Zhao, Xian-Feng Li, Dong Tong, Xu Cheng
2007, 22(1): 15-24.
Abstract
A 485ps 64-Bit Parallel Adder in 0.18$\mu$m CMOS
Dong-Yu Zheng, Yan Sun, Shao-Qing Li, Liang Fang
2007, 22(1): 25-27.
Abstract
Unified Parallel Systolic Multiplier Over GF(2^m)
Chiou-Yng Lee, Yung-Hui Chen, Che-Wun Chiou, Jim-Min Lin
2007, 22(1): 28-38.
Abstract
Bounded Model Checking of CTL^*
Zhi-Hong Tao, Cong-Hua Zhou, Zhong Chen, Li-Fu Wang
2007, 22(1): 39-43.
Abstract
CSchema: A Downgrading Policy Language for XML Access Control
Dong-Xi Liu
2007, 22(1): 44-53.
Abstract
Two-Factor Cancelable Biometrics Authenticator
Ying-Han Pang, Andrew T. B. J., David N. C. L
2007, 22(1): 54-59.
Abstract
Higher-Level Hardware Synthesis of the KASUMI Algorithm
Issam W. Damaj
2007, 22(1): 60-70.
Abstract
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt 2004
Xin-Yi Huang, Willy Susilo, Yi Mu, Fu-Tai Zhang
2007, 22(1): 71-74.
Abstract
Relationship Between a Non-Malleable Commitment Scheme and a Modified Selective Decommitment Scheme
Hai-Xia Xu, Bao Li
2007, 22(1): 75-78.
Abstract
Improved Collision Attack on Hash Function MD5
Jie Liang, Xue-Jia Lai
2007, 22(1): 79-87.
Abstract
Secure Two-Party Point-Circle Inclusion Problem
Yong-Long Luo, Liu-Sheng Huang, Hong Zhong
2007, 22(1): 88-91.
Abstract
Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem
Duo Liu, Ping Luo, Yi-Qi Dai
2007, 22(1): 92-94.
Abstract
A New Public-Key Encryption Scheme
Hai-Bo Tian, Xi Sun, Yu-Min Wang
2007, 22(1): 95-02.
Abstract
Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts
Zhen-Chuan Chai, Zhen-Fu Cao, Yuan Zhou
2007, 22(1): 103-108.
Abstract
Chameleon Hashes Without Key Exposure Based on Factoring
Wei Gao, Xue-Li Wang, Dong-Qing Xie
2007, 22(1): 109-113.
Abstract
An Efficient Handoff Decision Algorithm for Vertical Handoff Between WWAN and WLAN
Min Liu, Zhong-Cheng Li, Xiao-Bing Guo
2007, 22(1): 114-120.
Abstract
FloodNet: Coupling Adaptive Sampling with Energy Aware Routing in a Flood Warning System
Jing Zhou, David De Roure
2007, 22(1): 121-130.
Abstract
An Efficient Data Dissemination Scheme for Spatial Query Processing
Kwangjin Park, Hyunseung Choo, Chong-Sun Hwang
2007, 22(1): 131-134.
Abstract
End-to-End Utilization Control for Aperiodic Tasks in Distributed Real-Time Systems
Yong Liao, Xu-Dong Chen, Guang-Ze Xiong, Qing-Xin Zhu, Nan Sang
2007, 22(1): 135-146.
Abstract
3D Morphing Using Strain Field Interpolation
Han-Bing Yan, Shi-Min Hu, Ralph R Martin
2007, 22(1): 147-155.
Abstract
Visual Simulation of Multiple Unmixable Fluids
Wen Zheng, Jun-Hai Yong, Jean-Claude Paul
2007, 22(1): 156-160.
Abstract
A Markov Random Field Model-Based Approach to Natural Image Matting
Sheng-You Lin, Jiao-Ying Shi
2007, 22(1): 161-167.
Abstract