A
  • AES From Fault Tolerance to Fault Attack Tolerance in the Implementations of Advanced Encryption Standard [Volume 4, Issue 2, 2006]
  • Anonymity Anonymous Communication in MANETs Using Pseudonymity in Chain-Based Routing [Volume 4, Issue 2, 2006]
  • Artificial intelligence Poet Identification for Shahnameh of Ferdowsi using Artificial Neural Network [Volume 4, Issue 3, 2006]
  • Artificial Neural Network Poet Identification for Shahnameh of Ferdowsi using Artificial Neural Network [Volume 4, Issue 3, 2006]
  • Author Identification Poet Identification for Shahnameh of Ferdowsi using Artificial Neural Network [Volume 4, Issue 3, 2006]
B
  • Bisection width A Class of Odd-Radix Chordal Ring Networks [Volume 4, Issue 2, 2006]
  • Blakley’s Algorithm Timing Attack Against Blakley’s Modular Multiplication Algorithm [Volume 4, Issue 3, 2006]
C
  • Cache memory Reducing Access Time in an Object-Oriented ASIP by Splitting Cache Memory [Volume 4, Issue 3, 2006]
  • CED From Fault Tolerance to Fault Attack Tolerance in the Implementations of Advanced Encryption Standard [Volume 4, Issue 2, 2006]
  • Chain-based Routing Anonymous Communication in MANETs Using Pseudonymity in Chain-Based Routing [Volume 4, Issue 2, 2006]
  • Compressor A High Speed Mixed Mode 4:2 Compressor [Volume 4, Issue 3, 2006]
  • Concept Recognition A Request Processing System for Question Answering based on Ontology [Volume 4, Issue 1, 2006]
  • Correlation Timing Attack Against Blakley’s Modular Multiplication Algorithm [Volume 4, Issue 3, 2006]
  • Current Mode Design of 4-2 compressor with 2's complement capability [Volume 4, Issue 1, 2006]
  • Current Mode A High Speed Mixed Mode 4:2 Compressor [Volume 4, Issue 3, 2006]
D
  • Decision Tree System Poet Identification for Shahnameh of Ferdowsi using Artificial Neural Network [Volume 4, Issue 3, 2006]
  • DFA From Fault Tolerance to Fault Attack Tolerance in the Implementations of Advanced Encryption Standard [Volume 4, Issue 2, 2006]
  • Diminished-1 number representation A One-Step Modulo 2^n+1 Adder Based on Double-lsb Representation of Residues [Volume 4, Issue 2, 2006]
  • Distributed resource management Grid-JQA: A New Method for Matching in Grid Environment [Volume 4, Issue 2, 2006]
  • Double-lsb representation A One-Step Modulo 2^n+1 Adder Based on Double-lsb Representation of Residues [Volume 4, Issue 2, 2006]
E
  • ECC From Fault Tolerance to Fault Attack Tolerance in the Implementations of Advanced Encryption Standard [Volume 4, Issue 2, 2006]
  • Embedding A Class of Odd-Radix Chordal Ring Networks [Volume 4, Issue 2, 2006]
  • Emotion Recognition An Expert System for Emotion Recognition from Face Image Sequences [Volume 4, Issue 1, 2006]
  • Expert Systems An Expert System for Emotion Recognition from Face Image Sequences [Volume 4, Issue 1, 2006]
F
  • Facial Expressions An Expert System for Emotion Recognition from Face Image Sequences [Volume 4, Issue 1, 2006]
  • Fault diameter A Class of Odd-Radix Chordal Ring Networks [Volume 4, Issue 2, 2006]
  • Fault Masking From Fault Tolerance to Fault Attack Tolerance in the Implementations of Advanced Encryption Standard [Volume 4, Issue 2, 2006]
  • Fuzzy inference system Recognition of Persian Handwritten Digit using Fuzzy Logic [Volume 4, Issue 1, 2006]
G
  • Generic adders A One-Step Modulo 2^n+1 Adder Based on Double-lsb Representation of Residues [Volume 4, Issue 2, 2006]
  • Genetic Algorithms Evolutionary Relational Database Schema Design Based on Software Measurement [Volume 4, Issue 1, 2006]
  • Grid-JQA Grid-JQA: A New Method for Matching in Grid Environment [Volume 4, Issue 2, 2006]
H
L
  • Language Processing A Request Processing System for Question Answering based on Ontology [Volume 4, Issue 1, 2006]
  • Learning Recognition of Persian Handwritten Digit using Fuzzy Logic [Volume 4, Issue 1, 2006]
M
  • MANET Anonymous Communication in MANETs Using Pseudonymity in Chain-Based Routing [Volume 4, Issue 2, 2006]
  • Matching Grid-JQA: A New Method for Matching in Grid Environment [Volume 4, Issue 2, 2006]
  • Mixed mode A High Speed Mixed Mode 4:2 Compressor [Volume 4, Issue 3, 2006]
  • Modular Multiplication Timing Attack Against Blakley’s Modular Multiplication Algorithm [Volume 4, Issue 3, 2006]
  • Modulo 2^n+1 addition A One-Step Modulo 2^n+1 Adder Based on Double-lsb Representation of Residues [Volume 4, Issue 2, 2006]
  • Multiple Valued Logic Design of 4-2 compressor with 2's complement capability [Volume 4, Issue 1, 2006]
N
O
  • Object-Oriented ASIP Reducing Access Time in an Object-Oriented ASIP by Splitting Cache Memory [Volume 4, Issue 3, 2006]
  • Odyssey Reducing Access Time in an Object-Oriented ASIP by Splitting Cache Memory [Volume 4, Issue 3, 2006]
  • OMU Reducing Access Time in an Object-Oriented ASIP by Splitting Cache Memory [Volume 4, Issue 3, 2006]
  • Optimal Routing A Class of Odd-Radix Chordal Ring Networks [Volume 4, Issue 2, 2006]
  • OS Filters A Robust Voice Activity Detection Method for Noisy Speech Signals [Volume 4, Issue 3, 2006]
P
  • Parallel prefix adders A One-Step Modulo 2^n+1 Adder Based on Double-lsb Representation of Residues [Volume 4, Issue 2, 2006]
  • Pattern Recognition Recognition of Persian Handwritten Digit using Fuzzy Logic [Volume 4, Issue 1, 2006]
  • Persian-Arabic Handwritten Digit Recognition of Persian Handwritten Digit using Fuzzy Logic [Volume 4, Issue 1, 2006]
  • Poet Identification Poet Identification for Shahnameh of Ferdowsi using Artificial Neural Network [Volume 4, Issue 3, 2006]
  • Pseudonymity Anonymous Communication in MANETs Using Pseudonymity in Chain-Based Routing [Volume 4, Issue 2, 2006]
Q
  • Quality of service Grid-JQA: A New Method for Matching in Grid Environment [Volume 4, Issue 2, 2006]
  • Question Answering A Request Processing System for Question Answering based on Ontology [Volume 4, Issue 1, 2006]
  • Question Classification A Request Processing System for Question Answering based on Ontology [Volume 4, Issue 1, 2006]
R
  • Relational Database Design Evolutionary Relational Database Schema Design Based on Software Measurement [Volume 4, Issue 1, 2006]
  • Residue Number System A One-Step Modulo 2^n+1 Adder Based on Double-lsb Representation of Residues [Volume 4, Issue 2, 2006]
S
  • Security and Privacy Anonymous Communication in MANETs Using Pseudonymity in Chain-Based Routing [Volume 4, Issue 2, 2006]
  • Segmentation Recognition of Persian Handwritten Digit using Fuzzy Logic [Volume 4, Issue 1, 2006]
  • Shahnameh of Ferdowsi Poet Identification for Shahnameh of Ferdowsi using Artificial Neural Network [Volume 4, Issue 3, 2006]
  • Side-Channel Attack Countermeasure From Fault Tolerance to Fault Attack Tolerance in the Implementations of Advanced Encryption Standard [Volume 4, Issue 2, 2006]
  • Software Measurement Evolutionary Relational Database Schema Design Based on Software Measurement [Volume 4, Issue 1, 2006]
  • Symmetric network A Class of Odd-Radix Chordal Ring Networks [Volume 4, Issue 2, 2006]
T
  • Text Categorization Poet Identification for Shahnameh of Ferdowsi using Artificial Neural Network [Volume 4, Issue 3, 2006]
  • Timing Attack Timing Attack Against Blakley’s Modular Multiplication Algorithm [Volume 4, Issue 3, 2006]
V
  • Video An Expert System for Emotion Recognition from Face Image Sequences [Volume 4, Issue 1, 2006]
  • VLSI A High Speed Mixed Mode 4:2 Compressor [Volume 4, Issue 3, 2006]
  • Voice Activity Detection A Robust Voice Activity Detection Method for Noisy Speech Signals [Volume 4, Issue 3, 2006]
  • Voltage Mode A High Speed Mixed Mode 4:2 Compressor [Volume 4, Issue 3, 2006]