Implementing a 1GHz Four-Issue Out-of-Order Execution Microprocessor in a Standard Cell ASIC Methodology Wei-Wu HuJi-Ye ZhaoChris Wu Regular Paper 14 February 2007 Pages: 1 - 14
An Energy-Efficient Instruction Scheduler Design with Two-Level Shelving and Adaptive Banking Yu-Lai ZhaoXian-Feng LiXu Cheng Regular Paper 14 February 2007 Pages: 15 - 24
A 485ps 64-Bit Parallel Adder in 0.18μm CMOS Dong-Yu ZhengYan SunLiang Fang Short Paper 14 February 2007 Pages: 25 - 27
Unified Parallel Systolic Multiplier Over \({\it GF}(2^{m})\) Chiou-Yng LeeYung-Hui ChenJim-Min Lin Regular Paper 14 February 2007 Pages: 28 - 38
Bounded Model Checking of CTL Zhi-Hong TaoCong-Hua ZhouLi-Fu Wang Short Paper 14 February 2007 Pages: 39 - 43
CSchema: A Downgrading Policy Language for XML Access Control Dong-Xi Liu Regular Paper 14 February 2007 Pages: 44 - 53
Two-Factor Cancelable Biometrics Authenticator Ying-Han PangAndrew T. B. J.David N. C. L Short Paper 14 February 2007 Pages: 54 - 59
Higher-Level Hardware Synthesis of the KASUMI Algorithm Issam W. Damaj Regular Paper 14 February 2007 Pages: 60 - 70
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt’2004 Xin-Yi HuangWilly SusiloFu-Tai Zhang Short Paper 14 February 2007 Pages: 71 - 74
Relationship Between a Non-Malleable Commitment Scheme and a Modified Selective Decommitment Scheme Hai-Xia XuBao Li Short Paper 14 February 2007 Pages: 75 - 78
Improved Collision Attack on Hash Function MD5 Jie LiangXue-Jia Lai Regular Paper 14 February 2007 Pages: 79 - 87
Secure Two-Party Point-Circle Inclusion Problem Yong-Long LuoLiu-Sheng HuangHong Zhong Short Paper 14 February 2007 Pages: 88 - 91
Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem Duo LiuPing LuoYi-Qi Dai Short Paper 14 February 2007 Pages: 92 - 94
A New Public-Key Encryption Scheme Hai-Bo TianXi SunYu-Min Wang Regular Paper 14 February 2007 Pages: 95 - 102
Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts Zhen-Chuan ChaiZhen-Fu CaoYuan Zhou Short Paper 14 February 2007 Pages: 103 - 108
Chameleon Hashes Without Key Exposure Based on Factoring Wei GaoXue-Li WangDong-Qing Xie Short Paper 14 February 2007 Pages: 109 - 113
An Efficient Handoff Decision Algorithm for Vertical Handoff Between WWAN and WLAN Min LiuZhong-Cheng LiXiao-Bing Guo Short Paper 14 February 2007 Pages: 114 - 120
FloodNet: Coupling Adaptive Sampling with Energy Aware Routing in a Flood Warning System Jing ZhouDavid De Roure Regular Paper 14 February 2007 Pages: 121 - 130
An Efficient Data Dissemination Scheme for Spatial Query Processing Kwangjin ParkHyunseung ChooChong-Sun Hwang Short Paper 14 February 2007 Pages: 131 - 134
End-to-End Utilization Control for Aperiodic Tasks in Distributed Real-Time Systems Yong LiaoXu-Dong ChenNan Sang Regular Paper 14 February 2007 Pages: 135 - 146
3D Morphing Using Strain Field Interpolation Han-Bing YanShi-Min HuRalph R Martin Regular Paper 14 February 2007 Pages: 147 - 155
Visual Simulation of Multiple Unmixable Fluids Wen ZhengJun-Hai YongJean-Claude Paul Short Paper 14 February 2007 Pages: 156 - 160
A Markov Random Field Model-Based Approach to Natural Image Matting Sheng-You LinJiao-Ying Shi Short Paper 14 February 2007 Pages: 161 - 167