P2P traffic optimization GuoQiang ZhangMingDong TangJing Yang Review 20 December 2011 Pages: 1475 - 1492
SCautz: a high performance and fault-tolerant datacenter network for modular datacenters Feng HuangXiCheng LuYiMing Zhang Research Paper 19 June 2012 Pages: 1493 - 1508
Radiance-based color calibration for image-based modeling with multiple cameras Xu ZhaoZhong ZhouWei Wu Research Paper 12 April 2012 Pages: 1509 - 1519
Perceptual video hashing robust against geometric distortions ShiJun XiangJianQuan YangJiWu Huang Research Paper 02 January 2012 Pages: 1520 - 1527
Human knowledge acquisition from 3D interaction in virtual environments Cheng ChengRu JiangXueMei Dong Research Paper 02 January 2012 Pages: 1528 - 1540
Relay-assisted hierarchical adaptation scheme for multi-user scalable video delivery to heterogeneous mobile devices HongJiang XiaoXiangYang JiQiongHai Dai Research Paper 19 June 2012 Pages: 1541 - 1550
Further results on the margin explanation of boosting: new algorithm and experiments LiWei WangXiaoCheng DengJuFu Feng Research Paper 16 May 2012 Pages: 1551 - 1562
Contourlet HMT model with directional feature XiangHai WangMingYing ChenLingLing Fang Research Paper 19 June 2012 Pages: 1563 - 1578
The upper bound of the minimal number of hidden neurons for the parity problem in binary neural networks Yang LuJuan YangZhenJin Huang Research Paper 17 October 2011 Pages: 1579 - 1587
Polar differential power attacks and evaluation Ming TangZhenLong QiuYingZhen Jin Research Paper 20 April 2012 Pages: 1588 - 1604
A wireless secret key generation method based on Chinese remainder theorem in FDD systems WenJie WangHongYan JiangQinYe Yin Research Paper 22 March 2012 Pages: 1605 - 1616
On the construction of multi-output Boolean functions with optimal algebraic immunity Jie ZhangShouChao SongQiaoYan Wen Research Paper 16 May 2012 Pages: 1617 - 1623
On semi-bent functions with Niho exponents YeFeng HeWenPing MaParminder Kang Research Paper 11 April 2012 Pages: 1624 - 1630
Accountable authority key policy attribute-based encryption YongTao WangKeFei ChenZhaoHui Liu Research Paper 19 June 2012 Pages: 1631 - 1638
Efficient construction of provably secure steganography under ordinary covert channels Yan ZhuMengYang YuHongJia Zhao Research Paper 10 May 2012 Pages: 1639 - 1649
Symbolic algorithmic verification of intransitive generalized noninterference CongHua ZhouZhiFeng LiuShiGuang Ju Research Paper 17 October 2011 Pages: 1650 - 1665
CMQV+: An authenticated key exchange protocol from CMQV Hui LiChuanKun Wu Research Paper 17 June 2011 Pages: 1666 - 1674
A framework for multi-robot motion planning from temporal logic specifications T. John KooRongQing LiThomas Bak Research Paper 26 May 2012 Pages: 1675 - 1692
Synchronization of multiple autonomous underwater vehicles without velocity measurements RongXin CuiWeiSheng YanDeMin Xu Research Paper 20 April 2012 Pages: 1693 - 1703
An adaptive control with optimal disturbances rejection ShengPing LiYingHui Fan Research Paper 11 April 2012 Pages: 1704 - 1714
A logistic regression model for Semantic Web service matchmaking DengPing WeiTing WangJi Wang Brief Report 16 May 2012 Pages: 1715 - 1720