| | | Issue Date | Title | Author(s) |
| 1 | | 2012 | Optimal family of q-ary codes obtained from a substructure of generalised Hadamard matrices | Bracken, Carl; Chee, Yeow Meng; Purkayastha, Punarbasu |
| 2 | | 2017 | Anomalous Spectral Characteristics of Ultrathin sub-nm Colloidal CdSe Nanoplatelets | Bose, Sumanta; Delikanli, Savas; Yeltik, Aydan; Sharma, Manoj; Dang, Cuong; Zhang, Dao Hua; Demir, Hilmi Volkan; Erdem, Onur; Fan, Weijun |
| 3 | | 2012 | Enabling standardized cryptography on ultra-constrained 4-bit microcontrollers | Kaufmann, Tino; Poschmann, Axel |
| 4 | | 2013 | On construction D and related constructions of lattices from linear codes | Kositwattanarerk, Wittawat; Oggier, Frederique |
| 5 | | 2012 | DWCS : a dynamic web cache selection algorithm | Zhang, Baili; Hu, Xinping; Zhang, Zhizheng; Fang, Ning |
| 6 | | 2012 | Accurate detection of SNPs using base-specific cleavage and mass spectrometry | Sun, Ruimin; Gao, Xiang; Han, Nanyu; Wu, Qiong; Mu, Yuguang; Tang, Kai; Chen, Xin |
| 7 | | 2012 | Maximum distance separable symbol-pair codes | Chee, Yeow Meng; Kiah, Han Mao; Wang, Chengmin |
| 8 | | 2012 | Copula Gaussian graphical models with hidden variables | Yu, Hang; Dauwels, Justin; Wang, Xueou |
| 9 | | 2012 | Efficient decoding of permutation codes obtained from distance preserving maps | Chee, Yeow Meng; Purkayastha, Punarbasu |
| 10 | | 2012 | Enforcing efficient equilibria in network design games via subsidies | Augustine, John; Caragiannis, Ioannis; Fanelli, Angelo; Kalaitzis, Christos |
| 11 | | 2012 | Design and fabrication of dielectric nanostructured bending adaptor for optical frequencies | Lu, Yen-Sheng; Xu, Hongyi; Gao, Hanhong; Hsieh, C. Max; Zhang, Baile; Sun, Handong; Barbastathis, George |
| 12 | | 2012 | Near-optimal random walk sampling in distributed networks | Das Sarma, Atish.; Molla, Anisur Rahaman.; Pandurangan, Gopal. |
| 13 | | 2018 | Codes correcting limited-shift errors in racetrack memories | Chee, Yeow Meng; Kiah, Han Mao; Vardy, Alexander; Vu, Van Khu; Yaakobi, Eitan |
| 14 | | 2012 | Private (t,n) threshold searching on streaming data | Yi, Xun; Xing, Chaoping |
| 15 | | 2018 | Sublinear-time algorithms for compressive phase retrieval | Li, Yi; Nakos, Vasileios |
| 16 | | 2018 | Low-power cooling codes with efficient encoding and decoding | Chee, Yeow Meng; Etzion, Tuvi; Kiah, Han Mao; Vardy, Alexander; Wei, Hengjia |
| 17 | | 2019 | Optimal fee structure for efficient lightning networks | Heng, Alvin Jun Ren; Feng, Ling; Cheong, Siew Ann; Goh, Rick Siow Mong |
| 18 | | 2020 | On the worst-case side-channel security of ECC point randomization in embedded devices | Azouaoui, Melissa; Durvaux, François; Poussier, Romain; Standaert, François-Xavier; Papagiannopoulos, Kostas; Verneuil, Vincent |
| 19 | | 2017 | Looting the LUTs : FPGA optimization of AES and AES-like ciphers for authenticated encryption | Khairallah, Mustafa; Chattopadhyay, Anupam; Peyrin, Thomas |
| 20 | | 2012 | Approximate pure nash equilibria in weighted congestion games: existence, efficient computation, and structure | Caragiannis, Ioannis; Fanelli, Angelo; Gravin, Nick; Skopalik, Alexander |
| 21 | | 2012 | Privacy-preserving techniques and system for streaming databases | Oliveira, Anderson Santana de; Kerschbaum, Florian; Lim, Hoon Wei; Yu, Su-Yang |
| 22 | | 2012 | Large-area (> 50 cm × 50 cm), freestanding, flexible, optical membranes of Cd-free nanocrystal quantum dots | Panda, Subhendu K.; Hickey, Stephen G.; Mutlugun, Evren; Hernández-Martínez, Pedro Ludwig; Eroglu, Cuneyt; Coskun, Yasemin; Erdem, Talha; Sharma, Vijay Kumar; Unal, Emre; Gaponik, Nikolai; Eychmüller, Alexander; Demir, Hilmi Volkan |
| 23 | | 2012 | Some comparison on whole-proteome phylogeny of large dsDNA viruses based on dynamical language approach and feature frequency profiles method | Yu, Zu-Guo.; Han, Guo-Sheng.; Zhou, Guang-ming.; Wang, De-sheng.; Zhou, Li-Qian. |
| 24 | | 2012 | Algebraic fast-decodable relay codes for distributed communications | Hollanti, Camilla; Markin, Nadya |
| 25 | | 2012 | Efficient computation of distance sketches in distributed networks | Das Sarma, Atish.; Dinitz, Michael.; Pandurangan, Gopal. |
| 26 | | 2012 | Folded codes from function field towers and improved optimal rate list decoding | Guruswami, Venkatesan; Xing, Chaoping |
| 27 | | 2014 | Assets dependencies model in information security risk management | Jakub, Breier; Frank, Schindler |
| 28 | | 2012 | The arithmetic codex | Cascudo, Ignacio; Cramer, Ronald; Xing, Chaoping |
| 29 | | 2012 | Importance of symbol equity in coded modulation for power line communications | Chee, Yeow Meng; Kiah, Han Mao; Purkayastha, Punarbasu; Wang, Chengmin |
| 30 | | 2012 | Implementation of the GRIN solid immersion lens | Hsieh, Chih-Hung; Tian, Lei; Lu, Yen-Sheng; Zhang, Baile; Barbastathis, George |
| 31 | | 2013 | Wiretap encoding of lattices from number fields using codes over Fp | Kositwattanarerk, Wittawat; Ong, Soon Sheng; Oggier, Frederique |
| 32 | | 2012 | Large scale cylindrical cloak in free space without superluminal propagation | Moser, Herbert O.; Chen, Hongsheng; Xu, Su; Zhang, Baile; Zhang, Runren; Shen, Zhi; Xu, Yang; Zhang, Xianmin |
| 33 | | 2012 | Budget feasible mechanism design : from prior-free to Bayesian | Bei, Xiaohui; Chen, Ning; Gravin, Nick; Lu, Pinyan |
| 34 | | 2012 | Clone structures in voters' preferences | Elkind, Edith; Faliszewski, Piotr; Slinko, Arkadii |
| 35 | | 2012 | Investigating fundamental security requirements on whirlpool : improved preimage and collision attacks | Sasaki, Yu; Wang, Lei; Wu, Shuang; Wu, Wenling |
| 36 | | 2012 | Mechanism design : from partial to probabilistic verification | Caragiannis, Ioannis; Szegedy, Mario; Yu, Lan; Elkind, Edith |
| 37 | | 2012 | Optimal index codes with near-extreme rates | Dau, Son Hoang; Skachek, Vitaly; Chee, Yeow Meng |
| 38 | | 2012 | Optimal equitable symbol weight codes for power line communications | Ling, Alan C. H.; Chee, Yeow Meng; Kiah, Han Mao; Wang, Chengmin |
| 39 | | 2018 | Carrier dynamics in a 1.55 μm tunneling injection quantum dot semiconductor optical amplifier | Khanonkin, Igor; Lorke, Michael; Michael, Stephan; Mishra, Akhilesh Kumar; Reithmaier, Johann Peter; Jahnke, Frank; Eisenstein, Gadi |
| 40 | | 2020 | On configurable SCA countermeasures against single trace attacks for the NTT | Ravi, Prasanna; Poussier, Romain; Bhasin, Shivam; Chattopadhyay, Anupam |