The SCEAS System
Navigation Menu

Journals in DBLP

J. Comput. Sci. Technol.
2007, volume: 22, number: 1

  1. Wei-Wu Hu, Ji-Ye Zhao, Shi-Qiang Zhong, Xu Yang, Elio Guidetti, Chris Wu
    Implementing a 1GHz Four-Issue Out-of-Order Execution Microprocessor in a Standard Cell ASIC Methodology. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:1-14 [Journal]
  2. Yulai Zhao, Xian-Feng Li, Dong Tong, Xu Cheng
    An Energy-Efficient Instruction Scheduler Design with Two-Level Shelving and Adaptive Banking. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:15-24 [Journal]
  3. Dong-Yu Zheng, Yan Sun, Shao-Qing Li, Liang Fang
    A 485ps 64-Bit Parallel Adder in 0.18mum CMOS. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:25-27 [Journal]
  4. Chiou-Yng Lee, Yung-Hui Chen, Che Wun Chiou, Jim-Min Lin
    Unified Parallel Systolic Multiplier Over GF(2m). [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:28-38 [Journal]
  5. Zhi-Hong Tao, Cong-Hua Zhou, Zhong Chen, Li-Fu Wang
    Bounded Model Checking of CTL. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:39-43 [Journal]
  6. Dong-Xi Liu
    CSchema: A Downgrading Policy Language for XML Access Control. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:44-53 [Journal]
  7. Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling
    Two-Factor Cancelable Biometrics Authenticator. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:54-59 [Journal]
  8. Issam Damaj
    Higher-Level Hardware Synthesis of the KASUMI Algorithm. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:60-70 [Journal]
  9. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
    Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:71-74 [Journal]
  10. Haixia Xu, Bao Li
    Relationship Between a Non-Malleable Commitment Scheme and a Modified Selective Decommitment Scheme. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:75-78 [Journal]
  11. Jie Liang, Xue-Jia Lai
    Improved Collision Attack on Hash Function MD5. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:79-87 [Journal]
  12. Yonglong Luo, Liusheng Huang, Hong Zhong
    Secure Two-Party Point-Circle Inclusion Problem. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:88-91 [Journal]
  13. Duo Liu, Ping Luo, Yi-Qi Dai
    Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:92-94 [Journal]
  14. Haibo Tian, Xi Sun, Yu-Min Wang
    A New Public-Key Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:95-102 [Journal]
  15. Zhenchuan Chai, Zhen-Fu Cao, Yuan Zhou
    Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:103-108 [Journal]
  16. Wei Gao, Xueli Wang, Dongqing Xie
    Chameleon Hashes Without Key Exposure Based on Factoring. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:109-113 [Journal]
  17. Min Liu, Zhongcheng Li, Xiao-Bing Guo
    An Efficient Handoff Decision Algorithm for Vertical Handoff Between WWAN and WLAN. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:114-120 [Journal]
  18. Jing Zhou, David De Roure
    FloodNet: Coupling Adaptive Sampling with Energy Aware Routing in a Flood Warning System. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:121-130 [Journal]
  19. KwangJin Park, Hyunseung Choo, Chong-Sun Hwang
    An Efficient Data Dissemination Scheme for Spatial Query Processing. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:131-134 [Journal]
  20. Yong Liao, Xudong Chen, Guangze Xiong, Qingxin Zhu, Nan Sang
    End-to-End Utilization Control for Aperiodic Tasks in Distributed Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:135-146 [Journal]
  21. Han-Bing Yan, Shi-Min Hu, Ralph R. Martin
    3D Morphing Using Strain Field Interpolation. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:147-155 [Journal]
  22. Wen Zheng, Jun-Hai Yong, Jean-Claude Paul
    Visual Simulation of Multiple Unmixable Fluids. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:156-160 [Journal]
  23. Sheng-You Lin, Jiao-Ying Shi
    A Markov Random Field Model-Based Approach to Natural Image Matting. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:161-167 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002