column
Ciphertext-Policy Attribute-Based Encryption with Short Keys
XU Peng, TANG Yong, JIANG Wenbin, JIN Hai, ZOU Deqing
2014, 23(4): 655-660.
Abstract PDF
Feature Selection with Data Field
YUAN Hanning, WANG Shuliang, LI Ying, FAN Jinghua
2014, 23(4): 661-665.
Abstract PDF
Analysis of Power Consumption on Laser Solder Joints of Electric Connector
ZENG Zhi, LI Xunbo, LI Miao, HUANG Bo, WANG Rui, XIA Chuanxi
2014, 23(4): 666-668.
Abstract PDF
Design and Implementation of a Driver’s Eye State Recognition Algorithm Based on PERCLOS
PENG Yan, DONG Yan, CHENG Du
2014, 23(4): 669-672.
Abstract PDF
An Improved Gate Charge Model of HEMTs by Direct Formulating the Branch Charges
LIU Linsheng
2014, 23(4): 673-677.
Abstract PDF
An Ultra Low Steady-State Current Power-on- Reset Circuit in 65nm CMOS Technology
SHAN Weiwei, WANG Xuexiang, LIU Xinning, SUN Huafang
2014, 23(4): 678-681.
Abstract PDF
A Fast Quantitative Analysis and Performance Estimation Method of SoC Bus Architectures
Jaesung Lee
2014, 23(4): 682-687.
Abstract PDF
Energy-Aware Scheduling of Parallel Application in Hybrid Computing System
MA Yan, GONG Bin, GUO Zhihong, CHEN Yufeng, ZOU Lida
2014, 23(4): 688-694.
Abstract PDF
Microblog Burst Keywords Detection Based on Social Trust and Dynamics Model
DONG Guozhong, LI Ruiguang, YANG Wu, WANG Wei, GONG Liangyi, SHEN Guowei, YU Miao, LV Jiguang
2014, 23(4): 695-700.
Abstract PDF
Protocol-Aware Process Placement for MPI Programs
XU Xinhai, LIN Yufei, YANG Xuejun
2014, 23(4): 701-705.
Abstract PDF
A Memetic Algorithm Based Feature Weighting for Metabolomics Data Classification
ZHOU Jiarui, ZHU Zexuan, JI Zhen
2014, 23(4): 706-711.
Abstract PDF
Combining User-Based and Item-Based Models for Collaborative Filtering Using Stacked Regression
LIU Qingwen, XIONG Yan, HUANG Wenchao
2014, 23(4): 712-717.
Abstract PDF
Multi-source Local Color Transfer Based on Texture Similarity
WANG Xuesong, CAO Ge, CHENG Yuhu
2014, 23(4): 718-722.
Abstract PDF
Artificial Neural Network Based Trilogic SVM Control in Current Source Rectifier
YANG Xuan, SHEN Anwen, YANG Jun, YE Jie, XU Jinbang
2014, 23(4): 723-728.
Abstract PDF
HOSVD-Based Subspace Algorithm for Multidimensional Frequency Estimation Without Pairing Parameters
WU Yuntao, HUANG Longting, CAO Hui, ZHANG Yanbin
2014, 23(4): 729-734.
Abstract PDF
Improving Nonlocal Means Method via a No-reference Image Content Metric for MRI Denoising
HOU Xin, LI Jianwu, LU Yao, DONG Zhengchao
2014, 23(4): 735-741.
Abstract PDF
Improving Integrality of Detected Moving Objects Based on Image Matting
ZHANG Liang, WANG Haili, DENG Tao, HE Xiaomei
2014, 23(4): 742-746.
Abstract PDF
Hybrid Weighted l1-Total Variation Constrained Reconstruction for MR Image
ZHAO Di, DU Huiqian, MEI Wenbo
2014, 23(4): 747-752.
Abstract PDF
Fault Diagnosis Based on the Updating Strategy of Interval-Valued Belief Structures
XU Xiaobin, LIU Ping, SUN Yanbo, WEN Chenglin
2014, 23(4): 753-760.
Abstract PDF
An Adaptive PM Model Based on Difference Eigenvalue for Image Restoration
TIAN Haiying, CAI Hongmin, LAI Jianhuang
2014, 23(4): 761-766.
Abstract PDF
Quadratic Bent and Semi-bent Functions over Finite Fields of Odd Characteristic
ZHENG Dabin, YU Long, HU Lei
2014, 23(4): 767-772.
Abstract PDF
Optimal p-ary Codes from Constacyclic Codes over a Non-chain Ring R
SHI Minjia
2014, 23(4): 773-777.
Abstract PDF
Efficient Attribute-Based Encryption from R-LWE
ZHU Weiling, YU Jianping, WANG Ting, ZHANG Peng, XIE Weixin
2014, 23(4): 778-782.
Abstract PDF
Dynamic Per-flow Queuing to Reduce Competitions Among Large Number of Flows
WEI Jianhua, ZHU Lei, ZHANG Weichuan, FENG Zhi, GUO Peng
2014, 23(4): 783-789.
Abstract PDF
Authentication Codes from ε-ASU Hash Functions with Partially Secret Keys
LIU Shengli, TILBORG Henk van, WENG Jian, CHEN Kefei
2014, 23(4): 790-793.
Abstract PDF
Relay Node Placement with Base Stations in Wireless Sensor Networks Fault-Tolerant
GAO Zhipeng, CHEN Kan, QIU Xuesong
2014, 23(4): 794-800.
Abstract PDF
On the Cycle Structure of Some Nonlinear Feedback Shift Registers
WANG Zhongxiao, XU Hong, QI Wenfeng
2014, 23(4): 801-804.
Abstract PDF
An Intra-PAN Mobility Management Schemefor IPv6 over Low-Power WirelessPersonal Area Networks
SHANG Xiaopu, ZHANG Runtong, LI Xiaolong
2014, 23(4): 805-809.
Abstract PDF
A Pulse Immunization Model for Inhibiting Malware Propagation in Mobile Wireless Sensor Networks
WANG Xiaoming, HE Zaobo, ZHANG Lichen
2014, 23(4): 810-815.
Abstract PDF
Construction and Count of 1-Resilient Rotation Symmetric Boolean Functions on pr Variables
DU Jiao, PANG Shanqi, WEN Qiaoyan, LIAO Xin
2014, 23(4): 816-820.
Abstract PDF
The Euclidean Distance Spectra of FDMA-CPM: Algorithms and Applications
LI Bing, BAI Baoming, Tor Aulin
2014, 23(4): 821-826.
Abstract PDF
An Authenticated Asymmetric Group Key Agreement for Imbalanced Mobile Networks
ZHANG Qikun, ZHANG Quanxin, MA Zhongmei, TAN Yu'an
2014, 23(4): 827-835.
Abstract PDF
Novel Hash Function Based on Coupled Chaotic Map Lattices
ZHEN Ping, ZHAO Geng, MIN Lequan, LI Xiaodong
2014, 23(4): 836-841.
Abstract PDF
Identity-Based Encryption on RSA Without Pairings and Key Escrow
ZHU Yan, WANG Shanbiao, MA Di, FENG Rongquan
2014, 23(4): 842-850.
Abstract PDF
A Novel Refined Track Initiation Algorithm for Group Targets Based on Group Model
GAO Fei, REN He, WANG Jun, Amir Hussain, Tariq S. Durrani
2014, 23(4): 851-856.
Abstract PDF
An SEU-Tolerant Approach for Space-Borne Viterbi Decoders
WANG Yongqing, MA Yuanxing, LIU Donglei, WU Siliang
2014, 23(4): 857-861.
Abstract PDF
Study of a New Type of SIW End Slot Antenna at X-Band
WU Weiwei, ZHAO Hongyu, HUANG Jingjian, FENG Qi, WANG Chao
2014, 23(4): 862-865.
Abstract PDF
A Novel Wavenumber Domain SAR Imaging Algorithm Based on the Fractional Fourier Transform
XU Huaping, XIAO Zhongyuan, GAO Jing, LI Chunsheng
2014, 23(4): 866-870.
Abstract PDF