An assessment of systems and software engineering scholars and institutions (2002–2006) Fulltext Access 4 Pages 2009
Perfectly fair channel assignment in non-cooperative multi-radio multi-channel wireless networks Fulltext Access 4 Pages 2009
Weaknesses and improvements of the Yoon–Ryu–Yoo remote user authentication scheme using smart cards Fulltext Access 4 Pages 2009
Mobile and wireless communications: Technologies, applications, business models and diffusion Fulltext Access 4 Pages 2009
Combined switching and power control for diversity and multiplexing in MIMO systems with cochannel interference Fulltext Access 4 Pages 2009
Throughput analysis of partial channel information proportional fairness scheduling Fulltext Access 4 Pages 2009
Joint blind estimation of symbol timing and carrier frequency offset for 2×22×2 MIMO-OFDM system based on cyclostationarity Fulltext Access 4 Pages 2009
Electronic passports – from secure specifications to secure implementations Fulltext Access 5 Pages 2009
Characteristics of cladding index modulated fiber gratings for ambient refractive index sensing Fulltext Access 5 Pages 2009
Teleporter: An analytically and forensically sound duplicate transfer system Fulltext Access 5 Pages 2009
Radio-on-hybrid WDM transport systems based on mutually injection-locked Fabry–Perot laser diodes Fulltext Access 5 Pages 2009
An optical surveillance technique based on cavity mode analysis of SL-RSOA for GPON Fulltext Access 5 Pages 2009
Bidirectional colorless gigabit WDM-passive optical networks by use of injection locking and optical carrier suppression Fulltext Access 5 Pages 2009
A new waveband switching method for reducing the number of ports in wavelength-division-multiplexing optical networks Fulltext Access 5 Pages 2009
Security weakness of Tseng’s fault-tolerant conference-key agreement protocol Fulltext Access 5 Pages 2009
A novel domain-by-domain survivable mechanism in multi-domain wavelength-division-multiplexing optical networks Fulltext Access 5 Pages 2009
A new algorithm with segment protection and load balancing for single-link failure in multicasting survivable networks Fulltext Access 5 Pages 2009
Evolution of the probability density functions of Gaussian ASE noise in zero-memory nonlinear fiber Fulltext Access 5 Pages 2009
Mapping of nomadic multimedia applications on the ADRES reconfigurable array processor Fulltext Access 5 Pages 2009
Software engineering education: How far we’ve come and how far we have to go Fulltext Access 5 Pages 2009
Code reusuable optical CDMA system using an array of superstructured fiber Bragg gratings Fulltext Access 5 Pages 2009
Effects of the Random Diagonal code link parameters on the performance of an OCDMA scheme for high-speed access networks Fulltext Access 5 Pages 2009
Using 10 Gb/s remodulation DPSK signal in self-restored colorless WDM-PON system Fulltext Access 5 Pages 2009
Modeling and simulation of WDM optical networks under traffic control protocols Fulltext Access 5 Pages 2009
Robust feature points extraction for image registration based on the nonsubsampled contourlet transform Fulltext Access 5 Pages 2009
A performance analysis of polling schemes for IEEE 802.11 MAC over the Gilbert–Elliot channel Fulltext Access 5 Pages 2009
Tunable wave propagation in linear ferrite film bound by Kerr-type media Fulltext Access 5 Pages 2009
A modified CMOS differential operational transresistance amplifier (OTRA) Fulltext Access 5 Pages 2009
A new algorithm based on auxiliary virtual topology for sub-path protection in WDM optical networks Fulltext Access 5 Pages 2009
Simplified soft value extraction for M-PPM-modulated signals in FSO systems Fulltext Access 5 Pages 2009
Blind self-authentication of images for robust watermarking using integer wavelet transform Fulltext Access 5 Pages 2009
MOS-C single amplifier biquads using the operational transresistance amplifier Fulltext Access 5 Pages 2009
Evaluation of layer properties of effective parameters of metallic rod metamaterials in GHz frequencies Fulltext Access 5 Pages 2009
A continuous-time least mean-phase adaptive filter for power system frequency estimation Fulltext Access 5 Pages 2009
Short duration disturbance classifying based on S-transform maximum similarity Fulltext Access 5 Pages 2009
Erroneous measurement detection in substation automation system using OLS based RBF neural network Fulltext Access 5 Pages 2009
Recognition of electro-magnetic leakage information from computer radiation with SVM Fulltext Access 5 Pages 2009
An area/performance trade-off analysis of a GF(2m) multiplier architecture for elliptic curve cryptography Fulltext Access 5 Pages 2009
Identity-based strong designated verifier signature schemes: Attacks and new construction Fulltext Access 5 Pages 2009
Design methodology for battery powered embedded systems — In safety critical application Fulltext Access 5 Pages 2009
Efficient and provably-secure certificateless short signature scheme from bilinear pairings Fulltext Access 5 Pages 2009
Threshold authenticated encryption scheme using labor-division signature Fulltext Access 5 Pages 2009
A novel application of grey system theory to information security (Part I) Fulltext Access 5 Pages 2009
A generalized method to improve the location accuracy of the single-ended sampled data and lumped parameter model based fault locators Fulltext Access 5 Pages 2009
Two improved two-party identity-based authenticated key agreement protocols Fulltext Access 5 Pages 2009
On the security of a copyright protection scheme based on visual cryptography Fulltext Access 5 Pages 2009
Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards Fulltext Access 5 Pages 2009
A dandelion-encoded evolutionary algorithm for the delay-constrained capacitated minimum spanning tree problem Fulltext Access 5 Pages 2009