The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
<
Volume 40,
Issue 8
Volume 40,
Issue 7
Volume 40,
Issue 6
Volume 40,
Issue 5
Volume 40,
Issue 4
Volume 40,
Issue 3
Volume 40,
Issue 2
Volume 40,
Issue 1
Volume 39,
Issue 8
Volume 39,
Issue 7
Volume 39,
Issue 6
Volume 39,
Issue 5
Volume 39,
Issue 4
Volume 39,
Issue 3
Volume 39,
Issue 2
Volume 39,
Issue 1
Volume 38,
Issue 6
Volume 38,
Issue 5
Volume 38,
Issue 4
Volume 38,
Issue 3
Volume 38,
Issue 2
Volume 38,
Issue 1
Volume 37,
Issue 6
Volume 37,
Issue 5
Volume 37,
Issue 4
Volume 37,
Issue 3
Volume 37,
Issue 2
Volume 37,
Issue 1
Volume 36,
Issue 6
Volume 36,
Issue 5
Volume 36,
Issue 4
Volume 36,
Issue 3
Volume 36,
Issue 2
Volume 36,
Issue 1
Volume 35,
Issue 6
Volume 35,
Issue 5
Volume 35,
Issue 4
Volume 35,
Issue 3
Volume 35,
Issue 2
Volume 35,
Issue 1
Volume 34,
Issue 6
Volume 34,
Issue 5
Volume 34,
Issue 4
Volume 34,
Issue 3
Volume 34,
Issue 2
Volume 34,
Issue 1
Volume 33,
Issue 6
Volume 33,
Issue 5
Volume 33,
Issue 4
Volume 33,
Issue 3
Volume 33,
Issue 2
Volume 33,
Issue 1
Volume 32,
Issue 6
Volume 32,
Issue 5
Volume 32,
Issue 4
Volume 32,
Issue 3
Volume 32,
Issue 1
Volume 31,
Issue 8
Volume 31,
Issue 7
Volume 31,
Issue 6
Volume 31,
Issue 5
Volume 31,
Issue 4
Volume 31,
Issue 3
Volume 31,
Issue 2
Volume 31,
Issue 1
Volume 30,
Issue 8
Volume 30,
Issue 7
Volume 30,
Issue 6
Volume 30,
Issue 5
Volume 30,
Issue 4
Volume 30,
Issue 3
Volume 30,
Issue 2
Volume 30,
Issue 1
Volume 29,
Issue 8
Volume 29,
Issue 7
Volume 29,
Issue 6
Volume 29,
Issue 5
Volume 29,
Issue 4
Volume 29,
Issue 3
Volume 29,
Issue 2
Volume 29,
Issue 1
Volume 28,
Issue 6
Volume 28,
Issue 5
Volume 28,
Issue 4
Volume 28,
Issue 3
Volume 28,
Issue 2
Volume 28,
Issue 1
Volume 27,
Issue 6
Volume 27,
Issue 5
Volume 27,
Issue 4
Volume 27,
Issue 3
Volume 27,
Issue 2
Volume 27,
Issue 1
Volume 26,
Issue 6
Volume 26,
Issue 5
Volume 26,
Issue 4
Volume 26,
Issue 3
Volume 26,
Issue 2
Volume 26,
Issue 1
Volume 25,
Issue 6
Volume 25,
Issue 5
Volume 25,
Issue 4
Volume 25,
Issue 3
Volume 25,
Issue 2
Volume 25,
Issue 1
Volume 24,
Issue 6
Volume 24,
Issue 5
Volume 24,
Issue 4
Volume 24,
Issue 3
Volume 24,
Issue 2
Volume 24,
Issue 1
Volume 23,
Issue 6
Volume 23,
Issue 5
Volume 23,
Issue 4
Volume 23,
Issue 3
Volume 23,
Issue 2
Volume 23,
Issue 1
Volume 22,
Issue 6
Volume 22,
Issue 5
Volume 22,
Issue 4
Volume 22,
Issue 3
Volume 22,
Issue 2
Volume 22,
Issue 1
Volume 21,
Issue 6
Volume 21,
Issue 5
Volume 21,
Issue 4
Volume 21,
Issue 3
Volume 21,
Issue 2
Volume 21,
Issue 1
Volume 20,
Issue 6
Volume 20,
Issue 5
Volume 20,
Issue 4
Volume 20,
Issue 3
Volume 20,
Issue 2
Volume 20,
Issue 1
Volume 19,
Issue 6
Volume 19,
Issue 5
Volume 19,
Issue 4
Volume 19,
Issue 3
Volume 19,
Issue 2
Volume 19,
Issue 1
Volume 18,
Issue 6
Volume 18,
Issue 5
Volume 18,
Issue 4
Volume 18,
Issue 3
Volume 18,
Issue 2
Volume 18,
Issue 1
Volume 17,
Issue 4
Volume 17,
Issue 3
Volume 17,
Issue 2
Volume 17,
Issue 1
Volume 16,
Issue 4
Volume 16,
Issue 3
Volume 16,
Issue 2
Volume 16,
Issue 1
Volume 15,
Issue 4
Volume 15,
Issue 3
Volume 15,
Issue 2
Volume 15,
Issue 1
Volume 14,
Issue 4
Volume 14,
Issue 3
Volume 14,
Issue 2
Volume 14,
Issue 1
Volume 13,
Issue 4
Volume 13,
Issue 3
Volume 13,
Issue 2
Volume 13,
Issue 1
Volume 12,
Issue 4
Volume 12,
Issue 3
Volume 12,
Issue 2
Volume 12,
Issue 1
Volume 11,
Issue 4
Volume 11,
Issue 3
Volume 11,
Issue 2
Volume 11,
Issue 1
Volume 10,
Issue 4
Volume 10,
Issue 3
Volume 10,
Issue 2
Volume 10,
Issue 1
Volume 9,
Issue 4
Volume 9,
Issue 3
Volume 9,
Issue 2
Volume 9,
Issue 1
Volume 8,
Issue 4
Volume 8,
Issue 3
Volume 8,
Issue 2
Volume 8,
Issue 1
Volume 7,
Issue 4
Volume 7,
Issue 3
Volume 7,
Issue 2
Volume 7,
Issue 1
Volume 6,
Issue 4
Volume 6,
Issue 3
Volume 6,
Issue 2
Volume 6,
Issue 1
Volume 5,
Issue 4
Volume 5,
Issue 3
Volume 5,
Issue 2
Volume 5,
Issue 1
Volume 4,
Issue 4
Volume 4,
Issue 3
Volume 4,
Issue 2
Volume 4,
Issue 1
Volume 3,
Issue 2
Volume 3,
Issue 1
Volume 2,
Issue 3
Volume 2,
Issue 2
Volume 2,
Issue 1
Volume 1,
Issue 3
Volume 1,
Issue 1
>
Table of contents
397
Better wavelet packet tree based OFDM for multipath powerline channel
Kumbasar, Volkan
/ Kucur, Oğuz
et al.
| 2009
404
Hamiltonian connectivity and globally 3∗-connectivity of dual-cube extensive networks
Chen, Shih-Yan
/ Kao, Shin-Shin
et al.
| 2009
414
Analysis and performance evaluation of a pilot-aided interpolated channel estimator for OFDM systems
Doukas, Athanasios
/ Kalivas, Grigorios
et al.
| 2009
424
Implementation of Digital Electronic Arithmetics and its application in image processing
Mohammad, Khader
/ Agaian, Sos
/ Hudson, Fred
et al.
| 2009
435
An efficient anonymous authentication mechanism for delay tolerant networks
Su, Renwang
/ Cao, Zhenfu
et al.
| 2009
442
Model and analysis of path compression for mobile Ad Hoc networks
Jia, Xu
/ Qian-mu, Li
/ Hong, Zhang
et al.
| 2009
455
A joint PHY/MAC cross-layer design for UWB under power control
Saeed, Rashid A.
/ Khatun, Sabira
/ Ali, Borhanuddin Mohd
et al.
| 2009
469
Spectrum sensing algorithms for primary detection based on reliability in cognitive radio systems
Yue, Wenjing
/ Zheng, Baoyu
et al.
| 2009
480
Improving chip multiprocessor reliability through code replication
Ozturk, Ozcan
et al.
| 2009
491
An improved maximally redundant signed digit adder
Jaberipur, Ghassem
/ Gorgin, Saeid
et al.
| 2009
503
Controlling energy without compromising system performance in mobile grid environments
Chunlin, Li
/ Layuan, Li
et al.
| 2009
518
Performance evaluation of artificial neural network-based learning schemes for cognitive radio systems
Katidiotis, A.
/ Tsagkaris, K.
/ Demestichas, P.
et al.
| 2009
536
Novel approaches for online playout delay prediction in VoIP applications using time series models
Aragão, José B. Jr.
/ Barreto, Guilherme A.
et al.
| 2009
545
An improved semantically-secure identity-based signcryption scheme in the standard model
Jin, Zhengping
/ Wen, Qiaoyan
/ Du, Hongzhen
et al.
| 2009
553
A grid computing based approach for the power system dynamic security assessment
Wang, Xingzhi
/ Yan, Zheng
/ Li, Li
et al.
| 2009
565
Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11i standard
Algredo-Badillo, Ignacio
/ Feregrino-Uribe, Claudia
/ Cumplido, René
et al.
| 2009
578
Authentication and recovery of images using multiple watermarks
Chamlawi, Rafiullah
/ Khan, Asifullah
/ Usman, Imran
et al.
| 2009
585
A throughput maximised parallel architecture for 2D fast Discrete Pascal Transform
Wong, M.M.
/ Wong, M.L.D.
/ Hijazin, I.
et al.
| 2009
IFC
Editorial Board
| 2010