nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A lossless ECG data compression technique using ASCII character encoding
|
Mukhopadhyay, S.K. |
|
2011 |
37 |
4 |
p. 486-497 12 p. |
artikel |
2 |
An efficient identity-based blind signature scheme without bilinear pairings
|
He, Debiao |
|
2011 |
37 |
4 |
p. 444-450 7 p. |
artikel |
3 |
An efficient scheduling algorithm for radio resource reuse in IEEE 802.16j multi-hop relay networks
|
Liao, Wen-Hwa |
|
2011 |
37 |
4 |
p. 511-525 15 p. |
artikel |
4 |
An ID-based digital watermarking protocol for copyright protection
|
Zeng, Peng |
|
2011 |
37 |
4 |
p. 526-531 6 p. |
artikel |
5 |
A pseudo-Zernike moment based audio watermarking scheme robust against desynchronization attacks
|
Wang, Xiang-Yang |
|
2011 |
37 |
4 |
p. 425-443 19 p. |
artikel |
6 |
A real-time scheduling framework for embedded systems with environmental energy harvesting
|
EL Ghor, Hussein |
|
2011 |
37 |
4 |
p. 498-510 13 p. |
artikel |
7 |
Attribution of attack trees
|
Whitley, John N. |
|
2011 |
37 |
4 |
p. 624-628 5 p. |
artikel |
8 |
Combining pulse-based features for rejecting far-field speech in a HMM-based Voice Activity Detector
|
Varela, Óscar |
|
2011 |
37 |
4 |
p. 589-600 12 p. |
artikel |
9 |
Comparative analysis of power variables in high performance embedded and x86 architectures using GNU/Linux
|
Montoya, F.G. |
|
2011 |
37 |
4 |
p. 541-549 9 p. |
artikel |
10 |
Crypt analysis of two time pads in case of compressed speech
|
Khan, L.A. |
|
2011 |
37 |
4 |
p. 559-569 11 p. |
artikel |
11 |
Discrete logarithm based chameleon hashing and signatures without key exposure
|
Chen, Xiaofeng |
|
2011 |
37 |
4 |
p. 614-623 10 p. |
artikel |
12 |
Editorial Board
|
|
|
2011 |
37 |
4 |
p. IFC- 1 p. |
artikel |
13 |
Effective macroblock layer rate control algorithm for H.264/AVC
|
Zhao, Dandan |
|
2011 |
37 |
4 |
p. 550-558 9 p. |
artikel |
14 |
Fault diagnosis in reversible circuits under missing-gate fault model
|
Rahaman, Hafizur |
|
2011 |
37 |
4 |
p. 475-485 11 p. |
artikel |
15 |
Fuzzy identity based signature with applications to biometric authentication
|
Yang, Piyi |
|
2011 |
37 |
4 |
p. 532-540 9 p. |
artikel |
16 |
Generalized reconstruction algorithm for compressed sensing
|
Lei, J. |
|
2011 |
37 |
4 |
p. 570-588 19 p. |
artikel |
17 |
Large scale distributed visualization on computational Grids: A review
|
Wang, Lizhe |
|
2011 |
37 |
4 |
p. 403-416 14 p. |
artikel |
18 |
Learning automata based dynamic guard channel algorithms
|
Beigy, Hamid |
|
2011 |
37 |
4 |
p. 601-613 13 p. |
artikel |
19 |
LLACA: An adaptive localized clustering algorithm for wireless ad hoc networks
|
Akbari Torkestani, Javad |
|
2011 |
37 |
4 |
p. 461-474 14 p. |
artikel |
20 |
Optimal control of preemptive systems with loss
|
Carvalho, Glaucio H.S. |
|
2011 |
37 |
4 |
p. 417-424 8 p. |
artikel |
21 |
Practical aspects of preprocessing techniques for K-Best tree search MIMO detectors
|
Roger, Sandra |
|
2011 |
37 |
4 |
p. 451-460 10 p. |
artikel |