Effective operation and performance improvement methods for OMTP BONDI-based mobile Web widget resources Jiwoong BangDaewon Kim OriginalPaper 05 October 2011 Pages: 787 - 799
Non-uniform B-spline curveswith multiple shape parameters Juan CaoGuo-zhao Wang OriginalPaper 05 October 2011 Pages: 800 - 808
k-Dimensional hashing scheme for hard disk integrity verification in computer forensics Zoe Lin JiangJun-bin FangMeng-meng Sheng OriginalPaper 05 October 2011 Pages: 809 - 818
CCA2 secure biometric identity based encryption with constant-size ciphertext Yang YangYu-pu HuChun-hui Sun OriginalPaper 05 October 2011 Pages: 819 - 827
Control of cascading failures in coupled map lattices based on adaptive predictive pinning control Zhe-jing BaoGang WuWen-jun Yan OriginalPaper 05 October 2011 Pages: 828 - 835
An algorithm that minimizes audio fingerprints using the difference of Gaussians MyoungBeom ChungIlJu Ko OriginalPaper 05 October 2011 Pages: 836 - 845
A construction of inter-group complementary codes with flexible ZCZ length Li-fang FengXian-wei ZhouPing-zhi Fan OriginalPaper 05 October 2011 Pages: 846 - 854
Serial decoding of rateless code over noisy channels Ke-di WuZhao-yang ZhangPei-liang Qiu OriginalPaper 05 October 2011 Pages: 855 - 866