RAID-M: A high performance RAID Matrix mass storage Liu PengLi SanliHuang Feng OriginalPaper Pages: 409 - 420
A novel constant degree and constant congestion DHT scheme for peer-to-peer networks Li DongshengLu Xicheng OriginalPaper Pages: 421 - 436
A fingerprint identification algorithm by clustering similarity Tian JieHe YuliangYang Xin OriginalPaper Pages: 437 - 451
Dual constellations space-time modulation Zou LiZhao YupingXiang Haige OriginalPaper Pages: 452 - 466
Iterative lavrentiev regularization for symmetric kernel-driven operator equations: with application to digital image restoration problems Wang YanfeiGu XingfaFan Shufang OriginalPaper Pages: 467 - 483
Blind recognition of punctured convolutional codes Lu PeizhongLi ShenLuo Xiangyang OriginalPaper Pages: 484 - 498
Knowledge structure approach to verification of authentication protocols Su KaileLü GuanfengChen Qingliang OriginalPaper Pages: 513 - 532
Full-IC manufacturability check based on dense silicon imaging Yan XiaolangShi ZhengGao Gensheng OriginalPaper Pages: 533 - 544