We use cookies to improve your experience with our site.
All
Title
Author
Keyword
Abstract
DOI
Category
Address
Fund
Advanced Search
All
Title
Author
Keyword
Abstract
DOI
Category
Address
Fund
PACS
EEACC
Select articles
Implementing a 1GHz Four-Issue Out-of-Order Execution Microprocessor in a Standard Cell ASIC Methodology
Wei-Wu Hu
,
Ji-Ye Zhao
,
Shi-Qiang Zhong
,
Xu Yang
,
Elio Guidetti
,
Chris Wu
2007, 22(1): 1-0.
Abstract
An Energy-Efficient Instruction Scheduler Design with Two-Level Shelving and Adaptive Banking
Yu-Lai Zhao
,
Xian-Feng Li
,
Dong Tong
,
Xu Cheng
2007, 22(1): 15-24.
Abstract
A 485ps 64-Bit Parallel Adder in 0.18$\mu$m CMOS
Dong-Yu Zheng
,
Yan Sun
,
Shao-Qing Li
,
Liang Fang
2007, 22(1): 25-27.
Abstract
Unified Parallel Systolic Multiplier Over GF(2^m)
Chiou-Yng Lee
,
Yung-Hui Chen
,
Che-Wun Chiou
,
Jim-Min Lin
2007, 22(1): 28-38.
Abstract
Bounded Model Checking of CTL^*
Zhi-Hong Tao
,
Cong-Hua Zhou
,
Zhong Chen
,
Li-Fu Wang
2007, 22(1): 39-43.
Abstract
CSchema: A Downgrading Policy Language for XML Access Control
Dong-Xi Liu
2007, 22(1): 44-53.
Abstract
Two-Factor Cancelable Biometrics Authenticator
Ying-Han Pang
,
Andrew T. B. J.
,
David N. C. L
2007, 22(1): 54-59.
Abstract
Higher-Level Hardware Synthesis of the KASUMI Algorithm
Issam W. Damaj
2007, 22(1): 60-70.
Abstract
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt 2004
Xin-Yi Huang
,
Willy Susilo
,
Yi Mu
,
Fu-Tai Zhang
2007, 22(1): 71-74.
Abstract
Relationship Between a Non-Malleable Commitment Scheme and a Modified Selective Decommitment Scheme
Hai-Xia Xu
,
Bao Li
2007, 22(1): 75-78.
Abstract
Improved Collision Attack on Hash Function MD5
Jie Liang
,
Xue-Jia Lai
2007, 22(1): 79-87.
Abstract
Secure Two-Party Point-Circle Inclusion Problem
Yong-Long Luo
,
Liu-Sheng Huang
,
Hong Zhong
2007, 22(1): 88-91.
Abstract
Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem
Duo Liu
,
Ping Luo
,
Yi-Qi Dai
2007, 22(1): 92-94.
Abstract
A New Public-Key Encryption Scheme
Hai-Bo Tian
,
Xi Sun
,
Yu-Min Wang
2007, 22(1): 95-02.
Abstract
Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts
Zhen-Chuan Chai
,
Zhen-Fu Cao
,
Yuan Zhou
2007, 22(1): 103-108.
Abstract
Chameleon Hashes Without Key Exposure Based on Factoring
Wei Gao
,
Xue-Li Wang
,
Dong-Qing Xie
2007, 22(1): 109-113.
Abstract
An Efficient Handoff Decision Algorithm for Vertical Handoff Between WWAN and WLAN
Min Liu
,
Zhong-Cheng Li
,
Xiao-Bing Guo
2007, 22(1): 114-120.
Abstract
FloodNet: Coupling Adaptive Sampling with Energy Aware Routing in a Flood Warning System
Jing Zhou
,
David De Roure
2007, 22(1): 121-130.
Abstract
An Efficient Data Dissemination Scheme for Spatial Query Processing
Kwangjin Park
,
Hyunseung Choo
,
Chong-Sun Hwang
2007, 22(1): 131-134.
Abstract
End-to-End Utilization Control for Aperiodic Tasks in Distributed Real-Time Systems
Yong Liao
,
Xu-Dong Chen
,
Guang-Ze Xiong
,
Qing-Xin Zhu
,
Nan Sang
2007, 22(1): 135-146.
Abstract
3D Morphing Using Strain Field Interpolation
Han-Bing Yan
,
Shi-Min Hu
,
Ralph R Martin
2007, 22(1): 147-155.
Abstract
Visual Simulation of Multiple Unmixable Fluids
Wen Zheng
,
Jun-Hai Yong
,
Jean-Claude Paul
2007, 22(1): 156-160.
Abstract
A Markov Random Field Model-Based Approach to Natural Image Matting
Sheng-You Lin
,
Jiao-Ying Shi
2007, 22(1): 161-167.
Abstract
Cover Articles
Top Cited Papers
Top Most Read
Download Templates
Datasets & Toolsets
×
Close
Export File
Citation
Format
RIS(for EndNote,Reference Manager,ProCite)
BibTex
Txt
Content
Citation Only
Citation and Abstract
×
Close
Citation