文字方塊:  

 


2011 Subject Index

 

 

<Hardware<

Arithmetic and Logic Structures

An Efficient Frequent Pattern Mining Method and its Parallelization in Transactional Databases

S. M. FAKHRAHMAD AND GH. DASTGHAIBYFARD................................................. Vol. 27, No. 2, pp. 511-525

Design of High-Speed Iterative Dividers in GF(2m)

MING-DER SHIEH, WEN-CHING LIN AND CHIEN-MING WU....................................... Vol. 27, No. 3, pp. 953-967

 

Integrated Circuits

A Generic Multi-Dimensional Scan-Control Scheme for Test-Cost Reduction

CHIA-YI LIN AND HUNG-MING CHEN................................................................. Vol. 27, No. 6, pp. 1943-1957

Accurate TSV Number Minimization in High-Level Synthesis

CHIH-HUNG LEE, SHIH-HSU HUANG AND CHUN-HUA CHENG................................. Vol. 27, No. 5, pp. 1527-1543

Future-based On-line Integrated HW/SW Partitioning and Co-scheduling for Reconfigurable Computing Systems

MAISAM MANSUB BASSIRI AND HADI SHAHRIAR SHAHHOSEINI................................ Vol. 27, No. 5, pp. 1687-1711

Minimum Inserted Buffers for Clock Period Minimization

SHIH-HSU HUANG, GUAN-YU JHUO AND WEI-LUN HUANG...................................... Vol. 27, No. 5, pp. 1513-1526

 

Performance and Reliability

SETBIST: An Soft-Error Tolerant Built-In Self-Test Scheme for Random Access Memories

TSU-WEI TSENG AND JIN-FU LI........................................................................ Vol. 27, No. 2, pp. 643-656

 

<Computer Systems Organization<

Computer-Communication Networks

A Dynamic Ant Colony Based Routing Algorithm for Mobile Ad-hoc Networks

EHSAN KHOSROWSHAHI-ASL, MAJID NOORHOSSEINI AND ATIEH SABERI PIROUZ........ Vol. 27, No. 5, pp. 1581-1596

A Dynamic Navigation Approach with Rebroadcasting Flood Avoidance in VANETs

YAN-JING WU, WEI-CHENG SUNG AND TSANG-LING SHEU...................................... Vol. 27, No. 6, pp. 2017-2029

Adaptive Path Planning for Randomly Deployed Wireless Sensor Networks

KYUNGHWI KIM, BYUNGHYUK JUNG, WONJUN LEE AND DING-ZHU DU...................... Vol. 27, No. 3, pp. 1091-1106

An Anonymous Path Routing (APR) Protocol for Wireless Sensor Networks

JEHN-RUEY JIANG, JANG-PING SHEU, CHING TU AND JIH-WEI WU............................ Vol. 27, No. 2, pp. 657-680

An Efficient Relay Sensor Placing Algorithm for Connectivity in Wireless Sensor Networks

JYH-HUEI CHANG........................................................................................ Vol. 27, No. 1, pp. 381-392

CE-TIP: A Code Expansion Based Tag Identification Protocol for RFID Systems

KUO-HUI YEH, NAI-WEI LO AND ENRICO WINATA.................................................. Vol. 27, No. 2, pp. 777-788

Cryptanalysis and Enhancements of Three-Party Authenticated Key Exchange Protocol using ECC

SHUHUA WU, YUEFEI ZHU AND QIONG PU.......................................................... Vol. 27, No. 4, pp. 1329-1343

 

Employing PSO to Enhance RSS Range-based Node Localization for Wireless Sensor Networks

PO-JEN CHUANG AND CHENG-PEI WU.............................................................. Vol. 27, No. 5, pp. 1597-1611

Fairness Provisioning in Multi-hop Wireless Backhaul Networks: A Dynamic Estimation Approach

JENG-FARN LEE AND YUAN-NENG HSU............................................................. Vol. 27, No. 3, pp. 835-853

Group Oriented Renewal of Secrets and Its Application to Secure Multicast

J. A. M. NARANJO, L. G. CASADO AND J. A. LOPEZ-RAMOS....................................... Vol. 27, No. 4, pp. 1303-1313

Implementation of a Software-Based TCP/IP Offload Engine Using Standalone TCP/IP without an Embedded OS

IN-SU YOON, SANG-HWA CHUNG AND YOON-GEUN KWON..................................... Vol. 27, No. 6, pp. 1871-1883

Injection Level Flow Control for Network-on-Chip (NoC)

MINGHUA TANG AND XIAOLA LIN...................................................................... Vol. 27, No. 2, pp. 527-544

IP Traceback Based on Chinese Remainder Theorem

LIH-CHYAU WUU, CHI-HSIANG HUNG AND JYUN-YAN YANG.................................... Vol. 27, No. 6, pp. 1985-1999

Load Balancing in Metro Ethernet Networks by Selecting the Best Spanning Tree

GHASEM MIRJALILY, MOHAMMAD HADI KARIMI TAFTI AND SHAHRAM RAJAEE............. Vol. 27, No. 5, pp. 1747-1759

Locality-Aware Clustering Application Level Multicast for Live Streaming Services on the Internet

KANCHANA SILAWARAWET AND NATAWUT NUPAIROJ........................................... Vol. 27, No. 1, pp. 319-336

Location Privacy Protection Using Independent ID Update for WLANs

PO-JEN CHUANG, JER-SHENG DENG AND CHIH-SHIN LIN...................................... Vol. 27, No. 2, pp. 403-418

MegaDrop: A Cooperative Video-on-Demand System in a Peer-to-Peer Environment

JIA-MING CHEN, JENQ-SHIOU LEU, YEN-CHIU CHEN, HSIN-WEN WEI

AND WEI-KUAN SHIH..................................................................................... Vol. 27, No. 4, pp. 1345-1361

On the Extremal Number of Edges in Hamiltonian Graphs

TUNG-YANG HO, CHENG-KUAN LIN, JIMMY J. M. TAN, D. FRANK HSU

AND LIH-HSING HSU..................................................................................... Vol. 27, No. 5, pp. 1659-1665

Security Analysis and Enhancements of Verifier-Based Password-Authenticated Key Exchange Protocols in the Three-Party Setting

SHUHUA WU............................................................................................... Vol. 27, No. 3, pp. 1059-1072

 

Special-Purpose and Application-Based Systems

Agent-based Intelligent Middleware for User-Centric Services in Ubiquitous Computing Environments

HYUNSU JANG, CHANG HWAN SONG, MOON JEONG KIM AND YOUNG IK EOM............. Vol. 27, No. 5, pp. 1729-1746

An Efficient Architecture for a TCP Offload Engine Based on Hardware/Software Co-design

HANKOOK JANG, SANG-HWA CHUNG, DONG KYUE KIM AND YUN-SUNG LEE............... Vol. 27, No. 2, pp. 493-509

Area-Efficient Instruction Set Extension Exploration with Hardware Design Space Exploration

I-WEI WU, CHUNG-PING CHUNG AND JEAN JYH-JIUN SHANN.................................. Vol. 27, No. 5, pp. 1641-1657

 

Performance of Systems

A Low-Memory Address Translation Mechanism for Flash-Memory Storage Systems

CHIN-HSIEN WU, CHEN-KAI JAN AND TEI-WEI KUO................................................ Vol. 27, No. 5, pp. 1713-1727

 

<Software<

General

Embedding Access Control Policy in Web Service Path Composition Algorithm

SHIH-CHIEN CHOU AND JIN-YUAN JHU............................................................. Vol. 27, No. 6, pp. 1839-1853

Improving MapReduce Performance by Exploiting Input Redundancy

SHIN-GYU KIM, HYUCK HAN, HYUNGSOO JUNG, HYEONSANG EOM AND HEON Y. YEOM Vol. 27, No. 3, pp. 1137-1152

 

Software Engineering

A Delegation Framework for Task-Role Based Access Control in WFMS

HWAI-JUNG HSU AND FENG-JIAN WANG............................................................ Vol. 27, No. 3, pp. 1011-1028

A Specific Effort Estimation Method Using Function Point

BINGCHIANG JENG, DOWMING YEH, DERON WANG, SHU-LAN CHU AND CHIA-MEI CHEN..... Vol. 27, No. 4, pp. 1363-1376

An Approach to Weaving Stateful Aspects using LTS

CHUN-HUA YANG AND HAI-YANG WANG............................................................ Vol. 27, No. 4, pp. 1395-1411

An Entropy-Based Complexity Measure for Web Applications Using Structural Information

WOO-SUNG JUNG, EUN-JOO LEE, KAP-SU KIM AND CHI-SU WU................................ Vol. 27, No. 2, pp. 595-619

An Experimental Approach to Detect Similar Web Pages Based on 3-Levels of Similarity Clues

WOOSUNG JUNG, EUNJOO LEE AND CHISU WU................................................... Vol. 27, No. 6, pp. 1787-1822

On Adaptive Random Testing Through Iterative Partitioning

TSONG YUEH CHEN, DE HAO HUANG AND ZHI QUAN ZHOU.................................... Vol. 27, No. 4, pp. 1449-1472

On Improving CMMI in an Immature World of Software Development

JING-CHIOU LIOU......................................................................................... Vol. 27, No. 1, pp. 213-226

 

Operating Systems

A Robust Kernel-Based Solution to Control-Hijacking Buffer Overflow Attacks

LI-HAN CHEN, FU-HAU HSU, CHENG-HSIEN HUANG, CHIH-WEN OU, CHIA-JUN LIN

AND SZU-CHI LIU......................................................................................... Vol. 27, No. 3, pp. 869-890

An Online Reprogrammable Operating System for Wireless Sensor Networks

HSUNG-PIN CHANG, YU-CHIEH LIN AND DA-WEI CHANG........................................ Vol. 27, No. 1, pp. 261-286

Backup Metadata As Data: DPC-Tolerance to Commodity File System

YOUNG JIN YU, DONG IN SHIN, HYEONG SEOG KIM, HYEONSANG EOM

AND HEON YOUNG YEOM.............................................................................. Vol. 27, No. 4, pp. 1193-1218

 

<Data<

General

A Secure ID-Based Authenticated Group Key Exchange Protocol Resistant to Insider Attacks

TSU-YANG WU, YUH-MIN TSENG AND CHING-WEN YU........................................... Vol. 27, No. 3, pp. 915-932

Attribute-Based Key-Insulated Encryption

JIAN-HONG CHEN, YONG-TAO WANG AND KE-FEI CHEN........................................ Vol. 27, No. 2, pp. 437-449

Attribute-Based Traitor Tracing

YONG-TAO WANG, KE-FEI CHEN AND JIAN-HONG CHEN........................................ Vol. 27, No. 1, pp. 181-195

 

Data Structures

Making T-Trees Cache Conscious on Commodity Microprocessors

IG-HOON LEE, SANG-GOO LEE AND JUNHO SHIM................................................. Vol. 27, No. 1, pp. 143-161

 

Data Encryption

A DL Based Short Strong Designated Verifier Signature Scheme with Low Computation

HAN-YU LIN, TZONG-SUN WU AND YI-SHIUNG YEH............................................... Vol. 27, No. 2, pp. 451-463

 

Another Efficient Proxy Signature Scheme in the Standard Model

JIAN-HONG ZHANG AND JIAN MAO................................................................... Vol. 27, No. 4, pp. 1249-1264

Comments on Shao-Caos Unidirectional Proxy Re-Encryption Scheme from PKC 2009

MIN-RONG CHEN, XI ZHANG AND XIA LI............................................................. Vol. 27, No. 3, pp. 1153-1158

Improved Integral Attacks on Rijndael

YAN-JUN LI AND WEN-LING WU........................................................................ Vol. 27, No. 6, pp. 2031-2045

On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption

ZHONG-MEI WAN, JIAN WENG, XUE-JIA LAI, SHENG-LI LIU AND JI-GUO LI..................... Vol. 27, No. 1, pp. 243-259

Preimage Attack on Reduced DHA-256

JINMIN ZHONG AND XUEJIA LAI....................................................................... Vol. 27, No. 4, pp. 1315-1327

Secure Verifier-Based Three-Party Key Exchange in the Random Oracle Model

HUNG-YU CHIEN......................................................................................... Vol. 27, No. 4, pp. 1487-1501

 

Coding and Information Theory

Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree

SHAOJING FU, BING SUN, CHAO LI AND LONGJIANG QU......................................... Vol. 27, No. 6, pp. 1931-1942

 

Miscellaneous

A Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme

CHE-WEI LEE AND WEN-HSIANG TSAI................................................................ Vol. 27, No. 4, pp. 1265-1282

Authentication and Copyright Protection Scheme for H.264/AVC and SVC

SU-WAN PARK AND SANG UK SHIN................................................................... Vol. 27, No. 1, pp. 129-142

Data Hiding in Graphic Drawings by Structures of Object Groupings

TSUNG-YUAN LIU1 AND WEN-HSIANG TSAI......................................................... Vol. 27, No. 3, pp. 983-994

Secure Data Deletion for USB Flash Memory

BYUNGHEE LEE, KYUNGHO SON, DONGHO WON AND SEUNGJOO KIM....................... Vol. 27, No. 3, pp. 933-952

 

<Theory of Computation<

Analysis of Algorithms and Problem Complexity

Improved Bound on Approximating Jug Measuring Problem

MIN-ZHENG SHIEH AND SHI-CHUN TSAI............................................................ Vol. 27, No. 3, pp. 1159-1163

 

<Mathematics of Computing<

Discrete Mathematics

Alternating Runs of Geometrically Distributed Random Variables

CHIA-JUNG LEE AND SHI-CHUN TSAI................................................................ Vol. 27, No. 3, pp. 1029-1044

 

Miscellaneous

Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings

CHUN-I FAN, RUEI-HAU HSU AND PEI-HSIU HO.................................................... Vol. 27, No. 3, pp. 969-982

 

<Information Systems<

General

Adaptive Scheduling for On-Demand Time-Critical Information Dissemination over Data Broadcast Channel

CHIH-LIN HU............................................................................................... Vol. 27, No. 6, pp. 1959-1983

Characterization of WOSF by Equivalent Classes through Support Vector Machine

WEI-CHIH CHEN AND JYH-HORNG JENG............................................................ Vol. 27, No. 1, pp. 227-242

 

Database Management

High Index Compression without the Dependencies of Data Orders and Data Skewness for Spatial Databases

HUNG-YI LIN............................................................................................... Vol. 27, No. 2, pp. 561-576

IPL B+-tree for Flash Memory Database Systems

GAP-JOO NA, BONGKI MOON AND SANG-WON LEE................................................ Vol. 27, No. 1, pp. 111-127

The SQL Function XMLNEST to Generate Recursive XML Values from Relational Data

SUNG-CHUL PARK AND YOUNG-CHUL PARK....................................................... Vol. 27, No. 4, pp. 1283-1302

 

Information Storage and Retrieval

Exploiting Taxonomic Knowledge for Personalized Search: A Bayesian Belief Network-based Approach

JAE-WON LEE, HAN-JOON KIM AND SANG-GOO LEE.............................................. Vol. 27, No. 4, pp. 1413-1433

Music Matching Based on Rough Longest Common Subsequence

HWEI-JEN LIN, HUNG-HSUAN WU AND CHUN-WEI WANG........................................ Vol. 27, No. 1, pp. 95-110

 

Information Systems Applications

A Solution for Data Inconsistency in Data Integration

XIN WANG, LIN-PENG HUANG, XIAO-HUI XU, YI ZHANG AND JUN-QING CHEN............... Vol. 27, No. 2, pp. 681-695

Implementation of Business Logic Framework for Collaboration of Heterogeneous Service Systems in RFID/USN Environment

SEOK-KYOO KIM, JUNO CHANG AND SANG-YONG HAN.......................................... Vol. 27, No. 3, pp. 1073-1089

Improving Data Association in Robot SLAM with Monocular Vision

YIN-TIEN WANG, DUAN-YAN HUNG AND CHUNG-HSUN SUN................................... Vol. 27, No. 6, pp. 1823-1837

Map-based Indoor People Localization using an Inertial Measurement Unit

YUNYOUNG NAM..................................................................................... Vol. 27, No. 4, pp. 1233-1248

New Forward-Secure Signature Scheme with Untrusted Update

JIA YU, FAN-YU KONG, XIANG-GUO CHENG, RONG HAO AND JIAN-XI FAN................... Vol. 27, No. 4, pp. 1435-1448

 

Information Interfaces and Presentation

Applying Semantic Segment Detection to Enhance Web Page Presentation on the Mobile Internet

STEPHEN J. H. YANG, JIA ZHANG, STELLA T. C. TSAI AND JEFF J. S. HUANG ................ Vol. 27, No. 2, pp. 697-713

 

Miscellaneous

Mashup Creation Using a Mashup Rule Language

HYOSOOK JUNG AND SEONGBIN PARK.............................................................. Vol. 27, No. 2, pp. 761-775

 

<Computing Methodologies<

General

Video Super-Resolution by Motion Compensated Iterative Back-Projection Approach

CHEN-CHIUNG HSIEH, YO-PING HUANG, YU-YI CHEN AND CHIOU-SHANN FUH........... Vol. 27, No. 3, pp. 1107-1122

 

Artificial Intelligence

A Cooperative Approach to Bee Swarm Optimization

REZA AKBARI AND KOORUSH ZIARATI............................................................... Vol. 27, No. 3, pp. 799-818

Feature Subset Selection Based on Bio-Inspired Algorithms

CHULMIN YUN, BYONGHWA OH, JIHOON YANG AND JONGHO NANG......................... Vol. 27, No. 5, pp. 1667-1686

Impact of Behavior Clustering on Web Surfer Behavior Prediction

MALIK TAHIR HASSAN AND ASIM KARIM............................................................. Vol. 27, No. 6, pp. 1855-1870

The Linear Quantization Strategy of Quadratic Hebbian-Type Associative Memories and Their Performance Analysis

CHAO-HUI KO, CHING-TSORNG TSAI AND CHISHYAN LIAW..................................... Vol. 27, No. 2, pp. 481-492

 

Computer Graphics

Adaptive Continuous Collision Detection for Cloth Models Using a Skipping Frame Session

SAI-KEUNG WONG........................................................................................ Vol. 27, No. 5, pp. 1545-1559

An Effective Framework for Cloud Modeling, Rendering, and Morphing

CHUNG-MIN YU AND CHUNG-MING WANG......................................................... Vol. 27, No. 3, pp. 891-913

Cubist Style Rendering for 3D Polygonal Models

YU-SHUEN WANG, MIN-WEN CHAO, CHIN-CHUENG YI AND CHAO-HUNG LIN............... Vol. 27, No. 6, pp. 1885-1899

Multi-Layered Expression Synthesis

JIA-RU LIN AND I-CHEN LIN............................................................................. Vol. 27, No. 1, pp. 337-351

Perceptual LOD under Low Resolution Conditions

LIEU-HEN CHEN, YU-SHENG CHEN AND TSUNG-CHIH TSAI.................................... Vol. 27, No. 3, pp. 1045-1057

 

Image Processing and Computer Vision

A Reliable Fingerprint Orientation Estimation Algorithm

LIMIN LIU AND TIAN-SHYR DAI......................................................................... Vol. 27, No. 1, pp. 353-368

A Robust Watermarking Technique Resistant JPEG Compression

CHI-HUNG FAN, HUI-YU HUANG AND WEN-HSING HSU.......................................... Vol. 27, No. 1, pp. 163-180

Exposure Fusion Based on Shift-Invariant Discrete Wavelet Transform

JINHUA WANG, DE XU, CONGYAN LANG AND BING LI............................................. Vol. 27, No. 1, pp. 197-211

Fast Inter-Mode Selection for H.264 Encoders Based on Coded Block Patterns and Interblock Correlation

DONG-WEI LIN, JIN-LONG HSIEH, SHIH-HSUAN YANG AND CHIA-CHI YANG................. Vol. 27, No. 6, pp. 1901-1917

Improved Auto-Focus Search Algorithms for CMOS Image-Sensing Module

CHUNG-FENG JEFFREY KUO AND CHIN-HSUN CHIU............................................ Vol. 27, No. 4, pp. 1377-1393

Jointing Edge Labeling and Geometrical Constraint for Lane Detection and its Application to Suspicious Driving Behavior Analysis

SIN-YU CHEN, JUN-WEI HSIEH AND DUAN-YU CHEN............................................. Vol. 27, No. 2, pp. 715-732

Lossless Compression of Hyperspectral Images Using Adaptive Prediction and Backward Search Schemes

CHENG-CHEN LIN AND YIN-TSUNG HWANG........................................................ Vol. 27, No. 2, pp. 419-435

Medical Image Registration Based on SVD and Modified PSNR

MEI-SEN PAN, JING-TIAN TANG AND XIAO-LI YANG................................................ Vol. 27, No. 5, pp. 1761-1775

Method of Lossless and Near-Lossless Color Image Compression

GRZEGORZ ULACHA..................................................................................... Vol. 27, No. 2, pp. 621-642

 

P-SURF: A Robust Local Image Descriptor

CONGXIN LIU, JIE YANG AND HAI HUANG........................................................... Vol. 27, No. 6, pp. 2001-2015

Reversible Data Hiding Based on Median Difference Histogram

HSIEN-WEI YANG, I-EN LIAO AND CHAUR-CHIN CHEN............................................ Vol. 27, No. 2, pp. 577-593

Reversible Video Watermarking Using Motion Estimation and Prediction Error Expansion

XIAO ZENG, ZHEN-YONG CHEN, MING CHEN AND ZHANG XIONG............................. Vol. 27, No. 2, pp. 465-479

Robust Logo Recognition for Mobile Phone Applications

SHU-KUO SUN AND ZEN CHEN........................................................................ Vol. 27, No. 2, pp. 545-559

Secret Image Sharing Using Multiwavelet Transform

CHIN-PAN HUANG AND CHING-CHUNG LI.......................................................... Vol. 27, No. 2, pp. 733-748

 

Pattern Recognition

A Fuzzy K-means Clustering Algorithm Using Cluster Center Displacement

CHIH-TANG CHANG, JIM Z. C. LAI AND MU-DER JENG............................................ Vol. 27, No. 3, pp. 995-1009

A Novel Scheme for Face Recognition and Authentication against Pose, Illumination and Expression Changes

YING-NONG CHEN, CHIN-CHUAN HAN, CHENG-TZU WANG AND KUO-CHIN FAN.......... Vol. 27, No. 1, pp. 369-380

High-Order Hidden Markov Model and Application to Continuous Mandarin Digit Recognition

LEE-MIN LEE............................................................................................... Vol. 27, No. 6, pp. 1919-1930

Palmprint Recognition Based on Line and Slope Orientation Features

MIN-KI KIM................................................................................................. Vol. 27, No. 4, pp. 1219-1232

 

Document and Text Processing

Explicit Use of Term Occurrence Probabilities for Term Weighting in Text Categorization

ZAFER ERENEL, HAKAN ALTINCAY AND EKREM VAROGLU...................................... Vol. 27, No. 3, pp. 819-834

 

Miscellaneous

An HMM Based Pitch-Contour Generation Method for Mandarin Speech Synthesis

HUNG-YAN GU AND CHUNG-CHIEH YANG.......................................................... Vol. 27, No. 5, pp. 1561-1580

Intention Learning From Human Demonstration

HOA-YU CHAN, KUU-YOUNG YOUNG AND HSIN-CHIA FU....................................... Vol. 27, No. 3, pp. 1123-1136

Mandarin Singing-voice Synthesis Using an HNM Based Scheme

HUNG-YAN GU AND HUANG-LIANG LIAO............................................................ Vol. 27, No. 1, pp. 303-317

 

<Computer Applications<

General

Real-time Traffic Monitoring with Magnetic Sensor Networks

LEI ZHANG, RUI WANG AND LI CUI.................................................................... Vol. 27, No. 4, pp. 1473-1486

 

Life and Medical Sciences

Automatic Counting Cancer Cell Colonies using Fuzzy Inference System

SHENG-FUU LIN, HSIEN-TSE CHEN AND YI-HSIEN LIN............................................ Vol. 27, No. 2, pp. 749-760

Similarity Analysis between Transcription Factor Binding Sites by Bayesian Hypothesis Test

QIAN LIU, SAN-YANG LIU AND LI-FANG LIU.......................................................... Vol. 27, No. 3, pp. 855-868

 

 

Social and Behavioral Sciences

Towards Understanding Child Language Acquisition: An Unsupervised Multimodal Neural Network Approach

ABEL NYAMAPFENE...................................................................................... Vol. 27, No. 5, pp. 1613-1639

 

Computer-Aided Engineering

Design Planning with 3D-Via Optimization in Alternative Stacking Integrated Circuits

CHAO-HUNG LU, HUNG-MING CHEN AND CHIEN-NAN JIMMY LIU............................. Vol. 27, No. 1, pp. 287-302