Abstract is missing.
- Proposal of Digital Forensic System Using Security Device and Hysteresis SignatureYuki Ashino, Ryoichi Sasaki. 3-7 [doi]
- Forecasting Typhoon Moving Path Using BPNN-Weighted Grey-C3LSP Tuned by Quantum-Neuron-Based Adaptive Support Vector Regression with Nested Local Adiabatic EvolutionBao Rong Chang, Hsiu Fen Tsai. 3-6 [doi]
- Using Principal Component Analysis and Radial Basis Function Neural Networks for Image Contents ClassificationChuan-Yu Chang, Chi-Fang Li, Hung-Jen Wang. 7-10 [doi]
- Development and Application of Digital Forensic Logging System for Data from a Keyboard and CameraMariko Irisawa, Yuki Ashino, Keisuke Fujita, Ryoichi Sasaki. 8-11 [doi]
- Very Low Bit Rate Video Coding Using H.264 Codec and Cubic Spline InterpolationTsung-Ching Lin, Chien-Wen Chen, Chien-Chang Lin, Trieu-Kien Truong. 11-14 [doi]
- Secure Generation of Digital Signature on Compromised ComputerHideaki Tanaka, Shoichi Sasaki, Isao Echizen, Hiroshi Yoshiura. 12-15 [doi]
- Optimal Deployment for Wireless Sensor Networks Using Lifetime Expectation EstimationChu-Fu Wang, Chun-Chia Lee, Hui-Sheng Chu. 15-18 [doi]
- A New Scheme for Optimum Decoding of Additive Watermarks Embedded in Spatial DomainMaki Yoshida, Itaru Kitamura, Toru Fujiwara. 16-19 [doi]
- Enhancement of Hardware-Software Partition for Embedded Multiprocessor FPGA SystemsTrong-Yen Lee, Yang-Hsin Fan, Yu-Min Cheng, Chia-Chun Tsai, Rong-Shue Hsiao. 19-22 [doi]
- HVS-Based Robust Video Watermarking with Dual-plane CorrelationIsao Echizen, Yusuke Atomori, Shinta Nakayama, Hiroshi Yoshiura. 20-24 [doi]
- Comparison of Several Classifiers for Emotion Recognition from Noisy Mandarin SpeechTsang-Long Pao, Wen-Yuan Liao, Yu-Te Chen, Jun-Heng Yeh, Yun-Maw Cheng, Charles S. Chien. 23-26 [doi]
- Use of Gap-Filling Operation to Enhance Image Quality of Binary Image WatermarkingRyu Ebisawa, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka, Isao Echizen. 25-28 [doi]
- Extracting the Ocean Surface Feature of Non-linear Internal Solitary Waves in MODIS Satellite ImagesChih-Chung Kao, Liang-Hwei Lee, Chih-Chiang Tai, Yung-Chung Wei. 27-30 [doi]
- A Study on Reversible Information Hiding Using Complexity Measure for Binary ImagesSho Tanaka, Michiharu Niimi, Hideki Noda. 29-32 [doi]
- The Input-Interface of Webcam Applied in the Digital Content InteractionHuey-Min Sun, Wen-Lin Cheng. 31-34 [doi]
- Host-Cooperative Metadata Embedding FrameworkAkiomi Kunisa. 33-36 [doi]
- Combination of Multiple Classifiers for Improving Emotion Recognition in Mandarin SpeechTsang-Long Pao, Charles S. Chien, Yu-Te Chen, Jun-Heng Yeh, Yun-Maw Cheng, Wen-Yuan Liao. 35-38 [doi]
- A Switchable DRM Structure for Embedded DeviceFeng-Cheng Chang, Chiao-Lin Wu, Hsueh-Ming Hang. 37-40 [doi]
- Audio-Visual Speech Recognition with Weighted KNN-based Classification in Mandarin DatabaseTsang-Long Pao, Wen-Yuan Liao, Yu-Te Chen. 39-42 [doi]
- An H.264 Video Encryption Algorithm Based On Entropy CodingMian Cai, Jia Jia, Yan Lei. 41-44 [doi]
- Building Corner Feature Extraction Based on Fusion Technique with Airborne LiDAR Data and Aerial ImageryLiang-Hwei Lee, Shiahn-Wern Shyue, Ming-Jer Huang. 43-46 [doi]
- Non-Interactive t-out-of-n Oblivious Transfer Based on the RSA CryptosystemYa-Fen Chang. 45-50 [doi]
- Continuous Tracking of User Emotion in Mandarin Emotional SpeechTsang-Long Pao, Charles S. Chien, Jun-Heng Yeh, Yu-Te Chen, Yun-Maw Cheng. 47-52 [doi]
- Queueing Analysis for Self-similar Traffic by SimulatorTakuo Nakashima, Akari Ono, Toshinori Sueyoshi. 51-54 [doi]
- Fuzzy Based Classification of EEG Mental Tasks for a Brain Machine InterfaceC. R. Hema, Murugesa Pandiyan Paulraj, R. Nagarajan, Sazali Yaacob, Abdul Hamid Adorn. 53-56 [doi]
- Extraction for Characteristics of Anomaly Accessed IP Packets Based on Statistical AnalysisShunsuke Oshima, Takuo Nakashima, Yusuke Nishikido. 55-58 [doi]
- Personalized Face Emotion Classification Using Optimized Data of Three FeaturesM. Karthigayan, R. Nagarajan, Mohamed Rizon, Sazali Yaacob. 57-60 [doi]
- Efficient Spline Interpolation Curve ModelingNingping Sun, Toru Ayabe, Takahiro Nishizaki. 59-62 [doi]
- Keystroke Patterns Classification Using the ARTMAP-FD Neural NetworkChen Change Loy, Weng-Kin Lai, Chee Peng Lim. 61-64 [doi]
- An Approach to Camera Work Based AnimationNingping Sun, Daisuke Sato, Ryohei Takaki. 63-66 [doi]
- A Mutation-Based Evolving Neural Network Model and Its Application to Condition MonitoringShing Chiang Tan, M. V. C. Rao, Chee Peng Lim. 65-68 [doi]
- A Study of using L1-norm with Image Watermarking on SVD DomainAmnach Khawne, Orachat Chitsobhuk, Toshiyuki Nakamiya. 67-70 [doi]
- Performance Analysis of Digital Image Fingerprinting Based on Design of ExperimentsChun Farn Leong, Bee Ee Khoo, Zalina B. binti Abdul Aziz. 69-72 [doi]
- A Novel Multimedia Network backbone Architecture base on Proportional Delay DifferentiationJih-Hsin Ho, Wen-Shyang Hwang, Wen-Ping Chen. 71-74 [doi]
- A Dynamic Step-Size Updating Rule for Single Distribution Blind Source SeparationXuansen He. 73-76 [doi]
- Research of P2P Traffic Identification Based on BP Neural NetworkFuke Shen, Change Pan, Xiaoli Ren. 75-78 [doi]
- A Map Matching Algorithm in GPS-based Car Navigation SystemYongyi Zhao, Bo Song, Jin Li. 77-80 [doi]
- Fault Tolerant Reconstruction Algorithm Based on Distributed Agents for Network ManagementLi Hang, Liu Jie, Bi Jing. 79-82 [doi]
- An Edge Enhanced Technique for Digital Halftoning Using Error DiffusionJen-Bang Feng, Iuon-Chang Lin, Yen-Ping Chu. 81-86 [doi]
- Integrating Genetic and Ant Algorithm into P2P Grid Resource DiscoveryZenggang Xiong, Yang Yang, Xuemin Zhang, Fu Chen, Li Liu. 83-86 [doi]
- A Content-Adaptive Up-Sampling Technique for Image Resolution EnhancementMing-Sui Lee, Mei-Yin Shen, C. C. Jay Kuo. 87-90 [doi]
- Design and Implementation of a PKI-Based Electronic Documents Protection Management SystemJin-Bao Liu, Xian-Qing Hu, Qiong Li, Xiamu Niu. 87-92 [doi]
- Double-Density Discrete Wavelet Transform Based Texture ClassificationYu-Long Qiao, Chun-Yan Song, Chun-hui Zhao. 91-94 [doi]
- Blind Multi-Class Steganalysis System Using Wavelet StatisticsAntonio Savoldi, Paolo Gubian. 93-96 [doi]
- Particle Swarm Optimization for Image Noise CancellationTe-Jen Su, Hsin-Chih Wang, Jia-Wei Liu. 95-98 [doi]
- Password Recovery Using an Evidence Collection Tool and CountermeasuresSeokhee Lee, Antonio Savoldi, Sangjin Lee, Jongin Lim. 97-102 [doi]
- An Arbitrary Block Resizing Algorithm in Transform DomainZhenyu Wu, Bin Tang. 99-102 [doi]
- An Effective and Efficient Testing Methodology for Correctness Testing for File Recovery ToolsLei Pan, Lynn Margaret Batten. 103-107 [doi]
- Improved Adaptive Lifting Scheme for Wavelet-Based Image CompressionQiong Li, Guo-Qiang Li, Yi-Liang He, Xiamu Niu. 103-108 [doi]
- How to Balance Privilege and Digital Forensics InvestigationRicci S. C. Ieong. 108-111 [doi]
- A Robust Eye Detection and Tracking Technique Using Gabor FiltersYen-Wei Chen, Kenji Kubo. 109-112 [doi]
- Crytanalysis and Improvement on Chang et al.'s Signature SchemeQing-Long Wang, Zhen Han, Xiu-Hua Geng. 112-114 [doi]
- An ICA Based Noise Reduction for PET Reconstructed ImagesXian-Hua Han, Yen-Wei Chen, Keishi Kitamura, Akihiro Ishikawa, Yoshihiro Inoue, Kouichi Shibata, Yukio Mishina, Yoshihiro Mukuta. 113-116 [doi]
- An ID-based Multi-signature SchemeTao Meng, Xinping Zhang, Shenghe Sun. 115-117 [doi]
- Brain Matters Emphasis in MRI by Kernel Independent Component AnalysisTomoko Tateyama, Zensho Nakao, Yen-Wei Chen. 117-120 [doi]
- Color Image Steganography Based on Module SubstitutionsChing-Yu Yang. 118-121 [doi]
- Principal Component Analysis of O-linked Glycosylation Sites in Protein SequenceXuemei Yang, Yen-Wei Chen, Masahiro Ito, Ikuko Nishikawa. 121-126 [doi]
- An Efficient Steganography Scheme for M-CommerceIuon-Chang Lin, Yang-Bin Lin, Chung-Ming Wang. 122-125 [doi]
- An Evaluation Scheme for Steganalysis-proof Ability of Steganographic AlgorithmsGang Luo, Xingming Sun, Lingyun Xiang, Junwei Huang. 126-129 [doi]
- A New Neural Fusion Recognition Method with Multi-AgentQingdong Du, Jie Liu. 127-130 [doi]
- A Multiple Grade Blind Proxy Signature SchemeMian Cai, Li Kang, Jia Jia. 130-133 [doi]
- 2D(PC)2 A for Face Recognition with One Training Image per PersonJun-Bao Li, Shu-Chuan Chu, Jeng-Shyang Pan. 131-134 [doi]
- Complementary Steganography in Error-Diffused Block Truncation Coding ImagesJing-Ming Guo. 134-140 [doi]
- HMM Based Eyebrow RecognitionYujian Li, Xingli Li. 135-138 [doi]
- Novel and Fast Approach for Iris LocationJen-Chun Lee, Ping Sheng Huang, Chien-Ping Chang, Te-Ming Tu. 139-142 [doi]
- Design and Application of Large-scale Project Management System based on Software BusLie-yun Ding, Guang Zeng, Ying Zhou. 141-144 [doi]
- Maximal Sequential Pattern Mining Based on Simultaneous Monotone and Anti-monotone ConstraintsJia-Dong Ren, Ya-Fei Sun, Sheng Guo. 143-146 [doi]
- A Method of Ontology Mapping Based on InstanceTao Jin, Yuchen Fu, Xinhong Lin, Quan Liu, Zhiming Cui. 145-148 [doi]
- A New Scheme of Iris Image Quality AssessmentGuangming Lu, Jiayin Qi, Qingmin Liao. 147-150 [doi]
- Artificial Immune Recognition System as a New Classifier for Reservoir Operating Rules ExtractionXiao-lin Wang, Zheng-jie Yin. 149-153 [doi]
- Contextual Hidden Markov Tree Model Image Denoising Using a New Nonuniform Quincunx Directional Filter BanksYong Tian, Jianing Wang, Jiuwen Zhang, Yida May. 151-154 [doi]
- Brief Analysis of the H.264 Coding StandardYun Wu, Yong Zhao, Jianshi Li. 154-157 [doi]
- Dissolve Detection Scheme with Transition Duration RefinementGuo-Shiang Lin, Min-Kuan Chang, Shien-Tang Chiu. 155-158 [doi]
- Research of K-means Clustering Method Based on Parallel Genetic AlgorithmWenHua Dai, Cuizhen Jiao, Tingting He. 158-161 [doi]
- Performance Evaluation of Fingerprint Orientation Estimation AlgorithmsYuqin Sun, Shenghong Chen, Zhifang Wang, Qiong Li. 159-164 [doi]
- The Surplus Partition in a Simultaneous Offers Bargaining GameZhenwen Zhang, Xueguang Chen, Chen Chen. 162-165 [doi]
- The Research of Video Matching Algorithm Based on Spatio-temporal FeatureKebin Jia, Zhipin Deng, Xin-Yue Zhuang. 165-168 [doi]
- Application of Data Mining in Physical Statistics and EvaluationJihui Zhang 0005, Qi Luo. 166-169 [doi]
- An Effective Image Retrieval Method Based on Color and Texture Combined FeaturesPengyu Liu, Kebin Jia, Zhuozheng Wang. 169-172 [doi]
- Analysis of Insurance Contract with the Auditing EffortsXiaogang Xiang, Zhenwen Zhang. 170-173 [doi]
- Image Retrieval with Long-Term Memory Learning and Short-Time Relevance FeedbackZhen Sun, Zhe-Ming Lu, Hai-Jun Jin. 173-177 [doi]
- Research and Design of Software Bus Based Generic Software Agent ArchitectureChuan-Sheng Zhou, Jie Liu. 174-178 [doi]
- Dynamic Extended Codebook Based Vector Quantization Scheme for Mesh Geometry CompressionZhen Li, Zhe-Ming Lu, Lei Sun. 178-181 [doi]
- Synchronization for Rössler Chaotic Systems Using Fuzzy Impulsive ControlsYi-Bei Nian, Yong-Ai Zheng. 179-182 [doi]
- A Fast Intra-frame Prediction Algorithm Based on the Characteristic of Macro-block and 2D-histogram for H.264/AVC StandardXu He, Pengyu Liu, Kebin Jia, Yanhua Zhang. 182-185 [doi]
- A Fuzzy Basis on Knowledge Structure Analysis for Cognition Diagnosis and Application on Geometry Concepts for PupilsJeng-Ming Yih, Yuan-Horng Lin. 183-186 [doi]
- A Method of Bucket Index over Encrypted Character Data in DatabaseYong Zhang, Wei-xin Li, Xiamu Niu. 186-189 [doi]
- An Integration of Fuzzy theory and ISM for Concept Structure Analysis with Application of Learning MATLABJeng-Ming Yih, Yuan-Horng Lin. 187-190 [doi]
- Real-Time Path Planning of Large-scale Virtual CrowdYongqing Ye, Qingge Ji. 190-193 [doi]
- The Particle Swarm Optimization Algorithm: How to Select the Number of IterationBo Li, RenYue Xiao. 191-196 [doi]
- Overlapped Block Motion Compensation Using Modified Sigmoid WindowDanny Fernandes, Ce Zhu. 194-197 [doi]
- Signal Processing Application for TelemedicineSh-Hussain Salleh, Ismail Kamarulafizam, Asasul Islam Chowdhury, Mohd. Zin Zamri. 197-200 [doi]
- Selective Extraction of Visual Saliency Objects in Images and VideosZhi-Cheng Zhao, An-Ni Cai. 198-201 [doi]
- Adaptive Frame Decomposition in Slow Wave Cortical Responses to Transcranial Magnetic StimulationArief R. Harris, Daniel J. Strauss. 201-204 [doi]
- Effective Video Annotation by Mining Visual Features and Speech FeaturesVincent S. Tseng, Ja-Hwung Su, Chih-Jen Chen. 202-205 [doi]
- Colour Contrast Enhancement Based on Bright and Dark Stretching for Ziehl-Neelsen Slide ImagesZaleha Salleh, Mohd. Yusoff Mashor, N. R. Mat Noor, Shazmin Aniza, N. Abdul Rahim, A. S. W. Wahab, S. S. Md. Noor, F. Mohamad Idris, H. Hasan. 205-208 [doi]
- A Hierarchical Grid-Based Indexing Method for Content-Based Image RetrievalTe-Wei Chiang, Tienwei Tsai, Mann-Jung Hsiao. 206-209 [doi]
- Colour Contrast Enhancement on Preselected Cervical Cell for ThinPrep® ImagesNazahah Mustafa, Nor Ashidi Mat Isa, Mohd. Yusoff Mashor, Nor Hayati Othman. 209-212 [doi]
- A Programming Model for Distributed Content-Based Image RetrievalFeng-Cheng Chang, Hsiang-Cheh Huang. 210-213 [doi]
- The Johor Screening Scheme: Is an Area-Wide Newborn Hearing Screening Possible in Malaysia?Farah I. Corona-Strauss, Wolfgang Delb, Marc Bloching, Sheikh Hussain, Daniel J. Strauss. 213-216 [doi]
- An Efficient Image Retrieval Approach base on Color ClusteringBo Di. 214-220 [doi]
- Optimized Computational Instrumentation in Biomedicine: A ReviewDirk Benyoucef, Daniel J. Strauss. 217-220 [doi]
- A Ka Band WCDMA-based LEO Multi-satellites Mobile Medicine SystemChin-Feng Lin, Rung-Hua Shiu. 221-224 [doi]
- A Scheme for Protecting Mobile Agents Based on Combining Obfuscated Data and Time Checking TechnologyJiehong Wu, Guiran Chang, Jia Li. 221-224 [doi]
- Smart Embed Tension Tensor Based on InternetPeng Wu, Aixia Wang, Jingjiao Li. 225-228 [doi]
- Video Authentication and Tamper Detection Based on Cloud ModelChang-yin Liang, Ang Li, Xiamu Niu. 225-228 [doi]
- MRI Brain Phase Image Unwrapping Process by Wavelet Zero-Padding TechniquePuu-An Juang, Ming-Ni Wu. 229-232 [doi]
- The Key Management of the Encrypted Database Based on XMLYong Zhang, Qin-tao Song, Xiamu Niu. 229-232 [doi]
- A Chaos Based Unequal Encryption Mechanism in Mobile Medicine SystemChin-Feng Lin, Cheng-Hsing Chung, Zhi-Lu Chen, Chang-Jin Song, Zhi-Xiang Wang. 233-236 [doi]
- Detecting Iris Lacunae Based on Gaussian FilterBo Shen, Yong Xu, Guangming Lu, David Zhang. 233-236 [doi]
- Applying Feature Extraction of Speech Recognition on VOIP AuditingXuan Wang, Jiancheng Lin, Yong Sun. 237-240 [doi]
- X-ray Image Reconstruction by Radon Transform Simulation with Fan-Beam AllocationPuu-An Juang, Ming-Ni Wu. 237-240 [doi]
- A Digital Watermarking Scheme Based on DCT and SVDZhe-Ming Lu, Hong-Yi Zheng, Ji-Wu Huang. 241-244 [doi]
- A Unified Multilingual and Multimedia Data Mining Approach for Cancer Knowledge DiscoveryChung-Hong Lee, Chih-Hong Wu, Hsiang-Hang Chung, Hsin-Chang Yang. 241-244 [doi]
- Brain Tumor Detection Using Color-Based K-Means Clustering SegmentationMing-Ni Wu, Chia-Chen Lin, Chin-Chen Chang. 245-250 [doi]
- The Improvement of Lee-Chiu's Remote User Authentication SchemeChao-Wen Chan, Chung-Chih Lin. 245-248 [doi]
- Improving the Security of the Chien-Jan Protocol for Large Mobile NetworksChao-Wen Chan, Rong-Yuan Wang. 249-252 [doi]
- Potential of Value-Added Speech Communications by Using SteganographyNaofumi Aoki. 251-254 [doi]
- A New Design of Efficient Key Pre-distribution Scheme for Secure Wireless Sensor NetworksHui-Feng Huang. 253-256 [doi]
- Maximum-Likelihood Estimation of Recording Position Based on Audio WatermarkingYuta Nakashima, Ryuki Tachibana, Noboru Babaguchi. 255-258 [doi]
- Detection of Hidden Information in Tags of Webpage Based on Tag-MismatchHuajun Huang, Xingming Sun, Guang Sun, Junwei Huang. 257-260 [doi]
- Increasing Correlation using a Few Bits for Multiple Description CodingAkinori Ito, Shozo Makino. 259-262 [doi]
- Enhancement of the Mutual Authentication protocol on RFID Passive TagsKuo-Ching Liu, Hsin-Wei Wang, Hui-Feng Huang. 261-264 [doi]
- Authentication and Quality Monitoring based on Audio Watermark for Analog AM Shortwave BroadcastingMing Li, Yun Lei, Xiang Zhang, Jian Liu, YongHong Yan. 263-266 [doi]
- Security Analysis of RFID Based on Multiple ReadersJia-lin Ma, Xu Wei, Jie Liu. 265-268 [doi]
- Psychoacoustically-Adapted Patchwork Algorithm for WatermarkingHyun-Ho Kang, Koutarou Yamaguchi, Brian M. Kurkoski. 267-270 [doi]
- Framework for Windows Password Function Security EnhancementLi Li 0015, Jing Wu, Xiaowei Guo, Meng Li, Xiamu Niu. 269-274 [doi]
- A Portable Acoustic Caption Decoder Using IH Techniques for Enhancing Lives of the People Who Are Deaf or Hard-of-Hearing - System Configuration and Robustness for Airborne Sound -Tetsuya Munekata, Toshimitsu Yamaguchi, Hiroki Handa, Ryouichi Nishimura, Yôiti Suzuki. 271-274 [doi]
- A Novel Lossy Image-Hiding Scheme Based on Block DifferenceY. K. Sek, L. M. Cheng, L. L. Cheng, Chi-Kwong Chan. 275-278 [doi]
- Presentation of Information Synchronized with the Audio Signal Reproduced by Loudspeakers using an AM-based WatermarkAkira Nishimura. 275-278 [doi]
- Information Hiding for Public Address Audio Signal using FH/FSK Spread-spectrum SchemeKotaro Sonoda, Katsunari Yoshioka, Osamu Takizawa. 279-282 [doi]
- Hardware Realization of Steganographic TechniquesH. Y. Leung, L. M. Cheng, L. L. Cheng, Chi-Kwong Chan. 279-282 [doi]
- Adaptive Digital Audio Steganography Based on Integer Wavelet TransformAhmad Delforouzi, Mohammad Pooyan. 283-286 [doi]
- A Novel Semi-Fragile Image Watermarking, Authentication and Self-Restoration Technique Using the Slant TransformXi Zhao, Anthony T. S. Ho, Helen Treharne, Vinod Pankajakshan, Chris Culnane, Weina Jiang. 283-286 [doi]
- Improving Video Steganalysis Using Temporal CorrelationVinod Pankajakshan, Anthony T. S. Ho. 287-290 [doi]
- Adaptive and Robust Audio watermarking in Wavelet DomainMohammad Pooyan, Ahmad Delforouzi. 287-290 [doi]
- A Robust Audio Fingerprinting Scheme for MP3 CopyrightChe-Jen Hsieh, Jung-Shian Li, Cheng-Fu Hung. 291-294 [doi]
- A GA-based Optimal Image Watermarking TechniqueNing Zhong, Jing-ming Kuang, Zun-wen He. 291-294 [doi]
- Image Authentication in Print-and-scan ScenarioLongjiang Yu, Sheng-He Sun. 295-298 [doi]
- Content Integrity Verification for G.729 Coded SpeechYuhua Jiao, Yubo Tian, Qiong Li, Xiamu Niu. 295-300 [doi]
- Halftone Image Watermarking Based on the Binary Pseudo-Wavelet TransformHao Luo, Zhenfei Zhao, Jianming Huang, Zhe-Ming Lu. 299-302 [doi]
- Using Knowledge Management Technologies to Develop Reflective LearningMing-zhang Zuo, Ling-yun Yi, Gan-nian Zhang. 301-304 [doi]
- Hiding Multiple Watermarks in Transparencies of Visual CryptographyHao Luo, Jeng-Shyang Pan, Zhe-Ming Lu. 303-306 [doi]
- Construction of Collaborative Virtual Learning Communities in Peer-to-peer NetworksChun-hong Hu, Ming Zhao. 305-308 [doi]
- Data Hiding for Binary Images Using Weight MechanismHsien-Wen Tseng, Feng-Rong Wu, Chi-Pin Hsieh. 307-310 [doi]
- Research and Application of an Improved Genetic Algorithm on the Net Platform of "Digitized Party School"Shijue Zheng, Shiqian Wu. 309-312 [doi]
- Reversible Fragile Watermarking Based on Pyramidal Structure and Gradient Predicting ImageFu-Hao Yeh, Greg C. Lee, Cheng-Chieh Chiang. 311-314 [doi]
- Research on Knowledge Management Framework Based on Peer-to-peer ComputingWei-dong Yang, Ming Zhao. 313-316 [doi]
- High-Capacity Data Hiding Using Virtual Window PartitionChin-Feng Lee, Hsing-Ling Chen. 315-318 [doi]
- Study on the Division Tactics of Top Swimming Athletes Home and Abroad in the 400m Freestyle Swimming RaceWeitao Zheng, Zihua Zhang, Ting Liao, Tuanjie Zhao, Yong Ma. 317-320 [doi]
- Hiding Data in Ordered Dithering Halftone Images by Bit InterleavingBrian K. Lien, Bo-Wei Shiue. 319-322 [doi]
- A Multi-agent System for the Flexible Resource Constrained Project SchedulingJingjing Liu, Bing Wu. 321-324 [doi]
- Robust Block-based Image Watermarking in Curvelet TransformPeining Tao, Ahmet M. Eskicioglu. 323-328 [doi]
- A Rule-based Chinese Question Answering System for Reading Comprehension TestsXiaoyan Hao, Xiaoming Chang, Kaiying Liu. 325-329 [doi]
- Effective Color Ink Diffusion SynthesisRen-Jie Wang, Chung-Ming Wang. 329-332 [doi]
- Research on the Partner Selection of Virtual Enterprise Based on Self-adaptive Genetic AlgorithmMingzhi Huang, Chengwei Fan. 330-333 [doi]
- Neural ISOMAPShih-Pin Chao, Chen-Lan Yen, Chien-Chun Kuo. 333-336 [doi]
- Research on Scientific Constructions of CAI English Teaching SystemXianzhi Tian. 334-337 [doi]
- Real-Time Rendering of Splashing Stream WaterJun-Wei Chang, Su Ian Eugene Lei, Chun-Fa Chang, Yu-Jung Cheng. 337-340 [doi]
- A Hybrid Adaptive Evolutionary Algorithm for Constrained OptimizationXiang Li, Ximing Liang. 338-341 [doi]
- Facial Expressions for 3D Game ApplicationsTainchi Lu, Daosheng Mu, Minchih Tsai. 341-344 [doi]
- The Distance-Guided Particle Swarm Optimizer with Dynamic MutationChunhe Song, Hai Zhao, Wei Cai, Haohua Zhang, Ming Zhao, Wei Gao, Xuanjie Ning, Xudong Han, Peng Zhu, Jie Gao, Tianyu Qi, Hongyan Gong. 342-345 [doi]
- IMHAP - An Experimental Platform for Humanoid Procedural AnimationChang-Hung Liang, Pai-Cheng Tao, Tsai-Yen Li. 345-348 [doi]
- A Modified Particle Swarm Optimization Algorithm with Dynamic AdaptiveBo Yang, Ding-Xue Zhang, Rui-Quan Liao. 346-349 [doi]
- Animation Generation and Retargeting Based on Physics CharacteristicsYao-Yang Tsai, Hung-Kuo Chu, Kuangyou B. Cheng, Tong-Yee Lee, Chen-Lan Yen. 349-352 [doi]
- A DNA Algorithm of Graph Vertex Coloring Problem Based on Multi-separationJun-jie Chen, Hai-Fang Li, Yu-xing Yang, Ji-Lan Ma. 350-356 [doi]
- WYSIWYG: Mesh Decomposition for Static ModelsYu-Shuen Wang, Tong-Yee Lee. 353-356 [doi]
- Multi-resolution Unsteady Flow VisualizationShyh-Kuang Ueng, Wei-Yang Sun. 357-360 [doi]
- Video Streaming Using Overlay Multicast Scheme with Efficient and Load-Balance Path DiversityJeng-Wei Lee, Jia-Ming Yang, Chao-Lieh Chen, Yau-Hwang Kuo. 357-360 [doi]
- Asymmetric Clustering Based on Self-SimilarityMika Sato-Ilic, Lakhmi C. Jain. 361-364 [doi]
- Search RNN on Broadcast EnvironmentLien-Fa Lin. 361-364 [doi]
- An Architecture for the Interoperability of Multimedia Messaging Services between GPRS and PHS Cellular NetworksWen-Chuan Hsieh, Wei-Chung Hsu, Yu-Yuan Hsu. 365-368 [doi]
- Reversible Data Hiding Base on Histogram Shift for 3D VertexChang-Yun Jhou, Jeng-Shyang Pan, Ding Chou. 365-370 [doi]
- A DC-based Approach to Robust Watermarking with Hamming-CodeMing-Harng Lee, Mong-Fong Horng, Bo-Chao Chang. 369-372 [doi]
- Three-Channel Multiple Description Image Coding Based on Special Lattice Vector QuantizationChunyu Lin, Yao Zhao, Huihui Bai. 371-374 [doi]
- Design and Simulation of VHDL based ARP CacheTian-Hua Liu, Hong-Feng Zhu, Chuan-Sheng Zhou, Gui-Ran Chang. 373-376 [doi]
- Three-Description Image Coding Using Optimal Dead-Zone Lattice Vector QuantizationYuanyuan Xu, Yao Zhao. 375-378 [doi]
- Implementation of a General Reduced TCP/IP Protocol Stack for Embedded Web ServerChuan-Sheng Zhou, Chong Fu. 377-380 [doi]
- Design of Multiuser Collusion-Free Hiding Codes with Delayed EmbeddingByung-Ho Cha, C. C. Jay Kuo. 379-382 [doi]
- Fuzzy Control for Networked Control SystemSun Zhi-yi, Hou Chao-Zhen. 381-384 [doi]
- MB-Activity Measure Based Slice Grouping and Unequal Error Protection for H.264/AVC Video Transmission over Wireless NetworksYubin Cui, BoJin Zhuang, Anni Cai. 383-386 [doi]
- The AES Design Space Exploration with a Soft IP GeneratorLiang-Bi Chen, Ching-Chi Hu, Yen-Ling Chen, Chi-Wei Chu, Ing-Jer Huang. 385-388 [doi]
- GOP-based Rate Control for H.264/SVC with Hierarchical B-picturesYongjin Cho, C. C. Jay Kuo, Ming Hsieh, Do-Kyoung Kwon. 387-390 [doi]
- The Architecture of Fast H.264 CAVLC Decoder and its FPGA ImplementationTony Gladvin George, N. Malmurugan. 389-392 [doi]
- A Method for Decoding the (24, 15, 5) Cyclic CodeH. P. Lee, H. Y. Chen, H.-C. Chang. 391-394 [doi]
- Watermarking Technique for HDL-based IP Module ProtectionMin-Chuan Lin, Guo-Ruey Tsai, Chun-Rong Wu, Ching-Hui Lin. 393-396 [doi]
- A Covert Communication Scheme for the DCT Based Image Multiple Description Coding SystemChuang Lin, Jeng-Shyang Pan, Tsong-Yi Chen, Kuang-Chih Huang. 395-398 [doi]
- The System for the Reduction of Conducted Electromagnetic Interference Emission from Switching Power SupplyYuh-Yih Lu, Zhi-Hua Chen, Hsiang-Cheh Huang. 397-402 [doi]
- Hierarchical Key Management of Scalable Video CodingTien-Yan Ma, Ting-Wei Hou, Shau-Yin Tseng. 399-402 [doi]
- Biometric Verification by Fusing Hand Geometry and PalmprintWen-Shiung Chen, Yao-Shan Chiang, Yen-Hsun Chiu. 403-406 [doi]
- The Enhanced Fuzzy Bit generator (EFBG): A Cryptographically Secure Pseudorandom Bit GeneratorSaid E. El-Khamy, Mona Chong-Qing Lotfy, Adel Hamdi Ali. 403-406 [doi]
- Cascading Rectangle and Edge Orientation Features for Fast Pedestrian DetectionYu-Ting Chen, Chu-Song Chen. 407-410 [doi]
- Directional Texture Feature Extraction using Context Labels of Significance Coding for JPEG2000 Compressed Domain Image RetrievalNavin Angkura, Supavadee Aramvith, Supakorn Siddhichai. 407-410 [doi]
- Feature Selection for Iris Recognition with AdaBoostKan-Ru Chen, Chia-Te Chou, Sheng-Wen Shih, Wen-Shiung Chen, Duan-Yu Chen. 411-414 [doi]
- Application of LDPC Codes over GF(q) to DFH Communication SystemBai Yu-Jie, Luo Wei-Xiong, Han Li. 411-414 [doi]
- An Improved Multi-stage Vector Quantization for Image CodingMeng Wang, Hui-Ping Ma, Chongqing Zhou, Bian Yang. 415-420 [doi]
- Edge-based Lane Change Detection and its Application to Suspicious Driving Behavior AnalysisSin-Yu Chen, Jun-Wei Hsieh. 415-418 [doi]
- An Improved Face Detection Method in Low-resolution VideoChih-Chung Hsu, Hsuan-Ting Chang, Ting Cheng Chang. 419-422 [doi]
- A Novel Subliminal Channel Found in Visual Cryptography and Its Application to Image HidingTzungher Chen, Chang-Sian Wu, Wei-Bin Lee. 421-424 [doi]
- Face Detection and Authentication in a Large SpaceYing-Nong Chen, Gang-Feng Ho, Kuo-Chin Fan, Chin-Chuan Han. 423-426 [doi]
- A Digital Watermarking Algorithm for Certificate IdentifyingLi Li, Nina Sun, Bin Luo. 425-428 [doi]
- Multi-mode Target Tracking on a Crowd SceneCheng-Chang Lien, Jian-Cheng Wang, Yue-Min Jiang. 427-430 [doi]
- Image Watermarking Robust to Four-Color Printing and Fragile to High Resolution CopyLi Li. 429-432 [doi]
- Facial Expression Recognition with Discriminative Common VectorYuan-Kai Wang, Chun-Hao Huang. 431-434 [doi]
- Reversible Data Embedding Using Reduced Difference ExpansionChiang-Lung Liu, Der-Chyuan Lou, Chien-Chung Lee. 433-436 [doi]
- Cascaded Face Detector with Multiple TemplatesYea-Shuan Huang, Hua-Ching Yan, Ting-Chia Hsu. 435-440 [doi]
- Length Estimation for Embedded Message Using Support Vector MachineDer-Chyuan Lou, Chiang-Lung Liu, Chih-Lin Lin, Shin-Her Wang. 437-440 [doi]
- A Steganographic Method Based on a File AttributeHioki Hirohisa. 441-444 [doi]
- A Novel Algorithm for Robust Audio Watermarking Based on Quantification DCT DomainZhiping Zhou, Lihua Zhou. 441-444 [doi]
- New Video Watermarking Scheme by Using Dither Modulation to Local EnergyXiao-Yan Liu, Li-Hong Ma, Hu-Yun Yin. 445-448 [doi]
- Analyses of Pixel-Value-Differencing Schemes with LSB Replacement in StegonagraphyCheng-Hsing Yang, Shiuh-Jeng Wang, Chi-Yao Weng. 445-448 [doi]
- Image Steganographic Scheme Using Tri-way Pixel-Value Differencing and Adaptive RulesKo-Chin Chang, Ping Sheng Huang, Te-Ming Tu, Chien-Ping Chang. 449-452 [doi]
- Dynamically Constructing Mixed Pyramid for Fast VQ EncodingHong-Wei Sun, Kwok-Yan Lam, Jia-Guang Sun, Siu Leung Chung. 449-452 [doi]
- An Information Hiding Method based on SOAPXiaofen Zhang, Hong Wang, Jing Sun. 453-456 [doi]
- Robust Near-Reversible Data Embedding Using Histogram ProjectionYuan-Liang Tang, Hui-Tzu Huang. 453-456 [doi]
- Generalized Discrete Fractional Hadamard Transformation and its Application on the Image EncryptionLijun Yan, Jeng-Shyang Pan. 457-460 [doi]
- Secret Sharing and Information Hiding by Shadow ImagesChin-Chen Chang, The Duc Kieu. 457-460 [doi]
- Information Protection and Recovery with Reversible Data HidingHsiang-Cheh Huang, Yu-Hsiu Huang, Jeng-Shyang Pan, Yuh-Yih Lu. 461-464 [doi]
- Combining Multilevel Manipulation Estimation with Content-Based Authentication WatermarkingMichael Gulbis, Erika Müller, Martin Steinebach. 461-464 [doi]
- Optimized Copyright Protection Systems with Genetic-Based Robust WatermarkingHsiang-Cheh Huang, Jeng-Shyang Pan, Chi-Ming Chu. 465-468 [doi]
- Blind Color Watermarking Approach for Secret Text HidingChih-Chien Wu, Te-Ming Tu, Jyh-Chian Chang, Chien-Ping Chang, Ping Sheng Huang. 465-472 [doi]
- A New Attributes-Priority Matching Watermarking Algorithm Satisfying Topological Conformance for Vector MapDong Zhang, Depei Qian, Pen Han. 469-472 [doi]
- Improvements of EMD Embedding for Large PayloadsChin-Chen Chang, Wei-Liang Tai, Kuo-Nan Chen. 473-476 [doi]
- An LSB Data Hiding Technique Using Natural Number DecompositionSandipan Dey, Ajith Abraham, Sugata Sanyal. 473-476 [doi]
- Content-based Rate Controlled Data Hiding in JPEG-LSJeanne Chen, Tung-Shou Chen. 477-480 [doi]
- Blind Image Watermarking Scheme in DWT-SVD DomainKyung-Su Kim, Min-Jeong Lee, Heung-Kyu Lee. 477-480 [doi]
- Reversible Data Embedding for Vector Quantization IndicesChin-Chen Chang, The Duc Kieu. 481-484 [doi]
- A Novel Scheme for Watermarking Natural Language TextJianlong Yang, Jianmin Wang 0001, Chaokun Wang, Deyi Li. 481-484 [doi]
- A Study of Content based Watermarking using an Advanced HVS ModelFlorent Autrusseau, Patrick Le Callet, Alexandre Ninassi. 485-488 [doi]
- Binary Document Images Authentication by Thinning Digital PatternsChu-Hsing Lin, Wen-Kui Chang, Yu-Ying Lin, Lun-Yuen Cheng. 485-488 [doi]
- DCT-Based Reversible Image Watermarking ApproachChien-Chang Chen, De-Sheng Kao. 489-492 [doi]
- Using Dynamic Programming Strategy to Find an Optimal Solution to Exploiting Modification Direction Embedding MethodChin-Chen Chang, Chin-Feng Lee, Lin-Yi Chuang. 489-492 [doi]
- Fragile Database Watermarking for Malicious Tamper Detection Using Support Vector RegressionMeng-Hsiun Tsai, Fang-Yu Hsu, Jun-Dong Chang, Hsien-Chu Wu. 493-496 [doi]
- An Iterative Method for Lossless Data Embedding in BMP ImagesJia-Hong Lee, Mei-Yi Wu. 493-498 [doi]
- A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification DirectionChin-Feng Lee, Yi-Ren Wang, Chin-Chen Chang. 497-500 [doi]
- Applying the CDHS to Improve the MAP-Based Algorithm in Super Resolution Reconstruction from SequencesHsi-Kuan Chen, Chin-Hsing Chen, Shih-Jen Wang. 499-502 [doi]
- A Flexible Fragile Watermarking Scheme for Binary Images with ReversibilityChung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan, Iuon-Chang Lin. 501-504 [doi]
- A Resistor String DAC for Video ProcessingDe-Ji Liu, Chien-Hung Lin, Shu-Chung Yi, Jin-Jia Chen. 503-506 [doi]
- High Payload Data Embedding with Hybrid StrategyChin-Chen Chang, Yung-Chen Chou. 505-508 [doi]
- A Chinese Abacus DAC for Video ApplicationsShun-He Huang, Chien-Hung Lin, Shu-Chung Yi, Jin-Jia Chen. 507-510 [doi]
- A Best-pair-first Capacity-distortion Control for Data Hiding on VQ Compression DomainChi-Nan Lin, Chin-Chen Chang. 509-514 [doi]
- The VLSI Design of Winscale for Digital Image ScalingChung-Chi Lin, Zeng-chuan Wu, Wen-Kai Tsai, Ming-Hwa Sheu, Huann-Keng Chiang. 511-514 [doi]
- A Fast Video Noise Reduction Method by Using Object-Based Temporal FilteringThou-Ho Chen, Zhi-Hong Lin, Chin-Hsing Chen, Cheng-Liang Kao. 515-518 [doi]
- Secret Image Sharing Using Quadratic ResiduesChang-Chu Chen, Chin-Chen Chang. 515-518 [doi]
- Visual Cryptography in reversible styleWen-Pinn Fang. 519-524 [doi]
- Vehicle Detection and Counting by Using Headlight Information in the Dark EnvironmentThou-Ho Chen, Jun-liang Chen, Chin-Hsing Chen, Chao-Ming Chang. 519-522 [doi]
- An Adaptive Random-valued Impulse Noise Reduction Method Based on Noise Ratio Estimation in Highly Corrupted ImagesThou-Ho Chen, Chao-Yu Chen, Chin-Hsing Chen. 523-526 [doi]
- A Fast Multiple Reference Frame Selection Algorithm Based on H.264/AVCHong-Jun Wang, Li-li Wang, Hua Li. 525-528 [doi]
- A Cost-Effective Noise-Reduction Filtering Structure Based on Unsymmetrical Working WindowsChin-Fa Hsieh, Tsung-Han Tsai, Shu-Ping Chang, Tai-An Shan. 527-530 [doi]
- H.264/AVC Video Encoder Algorithm Optimization Based on TI TMS320DM642Hong-Jun Wang, Yan-yan Hou, Hua Li. 529-532 [doi]
- A Real-Time Video Noise Reduction Algorithm in the Dusk EnvironmentThou-Ho Chen, Chao-Yu Chen, Shi-Feng Huang, Chin-Hsing Chen. 531-534 [doi]
- Text Independent Speaker Verification Based on Mixing ICA Overcomplete Basis FunctionsShuzhong Ba, Ju Liu, Guoxia Sun, Wei Zhang. 533-536 [doi]
- Fast Intra Prediction Mode Decision Algorithm for H.264/AVC Video Coding StandardChih-Hsien Hsia, Jen-Shiun Chiang, Ying-Hong Wang, Tsai-Yuan. 535-538 [doi]
- Influence of Joint Action of Fluid Shear Stress and Signal Transduction Ligand Inhibitor on Osteoclasts' Differentiation and MaturationHuiqiang Sun, Guoxia Sun, Xing Liang, Ju Liu. 537-541 [doi]
- Shot Segmentation and Classification in Basketball VideosLifang Wu, Xiuli Han, Hao Cui, Wei Shen. 539-542 [doi]
- Fuzzy Joint Encoding and Statistical Multiplexing of Multiple Video Sources with Independent Quality of Services for Streaming over DVB-HMehdi Rezaei, Imed Bouazizi, Moncef Gabbouj. 542-545 [doi]
- Template-Based Scene Classification for Baseball Videos Using Efficient Playfield SegmentationWei-Han Chang, Nai-Chung Yang, Chung Ming Kuo, Ching-Hsuan Lin. 543-548 [doi]
- A Method for Making Three-Party Password-Based Key Exchange Resilient to Server CompromiseHongfeng Zhu, Tianhua Liu, Jie Liu, Guiran Chang. 546-549 [doi]
- Pricing Credit-Linked Notes Issued by the Protection Buyer and an SPVChou-Wen Wang, Chia-Chien Chang. 549-552 [doi]
- Policy Based Controlled Migration of Mobile Agents to Untrusted HostsV. Valli Kumari, Y. Aditya Kumar, K. V. S. V. N. Raju, K. Venkata Ramana, R. V. V. S. V. Prasad. 550-553 [doi]
- Financial Accelerator Effect and Macroeconomic FluctuationsJui-Chuan Chang. 553-556 [doi]
- Sending Mobile Software Activation Code by SMS Using SteganographyMohammad Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza. 554-557 [doi]
- Application of Artificial Neural Network to Corporate Liquidity DeterminationNaiwei Chen, Yakuang Liu. 557-560 [doi]
- Reducing Host Interference from Spread Spectrum WatermarkingSaeed Sedghi, Yôiti Suzuki. 558-561 [doi]
- Optimal Pricing Strategy for Queuing Systems with Capacity Constraint ProblemPen-Yuan Liao. 561-564 [doi]
- An Auto-Generating Approach of Transactions Profile Graph in Detection of Malicious TransactionsJinfu Chen, Yansheng Lu, Xiaodong Xie. 562-565 [doi]
- The Application of Fuzzy Evaluating Approach on Banking Operating Performance in Taiwan: An Empirical StudyTien-Tsai Huang. 565-569 [doi]
- Protecting Mobile Agent's Computation Results with Reversible Watermarking and Digital SignatureAbid Khan, Xiamu Niu, Zhang Yong. 566-569 [doi]
- An Intellectual Capital Performance Evaluation Based on Fuzzy LinguisticWei-Shen Tai, Chen-Tung Chen. 570-573 [doi]
- Anonymity in PKI EnvironmentChuanjun Wang, Xiamu Niu, Yong Zhang. 570-576 [doi]
- Fault-Tree Analysis of Intuitionistic Fuzzy Sets for Liquefied Natural Gas Terminal Emergency Shut-Down SystemChiu-Lien Lee, Ming-Hung Shu. 574-577 [doi]
- A Practical Color Transfer Algorithm for Image SequencesYao-Hsien Huang, Chung-Hsin Liu. 577-580 [doi]
- Genetic Algorithm in Vehicle Routing ProblemYueqin Zhang, Jinfeng Liu, Fu Duan, Jing Ren. 578-581 [doi]
- Intelligent Surveillance by Using 2D Heterogeneous Multimodal Sensations and Information TranscodingI-Horng Jeng, Tai-Ning Yang, Chih-Jen Lee, Shih-Yun Lin, Tsung-Hsien Wu. 581-584 [doi]
- An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity IndexLei Sun, Tzu-Chieh Lin, Hsiang-Cheh Huang, Bin-Yih Liao, Jeng-Shyang Pan. 582-585 [doi]
- Traffic Detection at Nighttime Using Entropy MeasurementWei-Lieh Hsu, Chang-Lung Tsai, Tsung-Lun Chen. 585-588 [doi]
- A Fast Training Algorithm for Least Squares SVMShouda Jiang, Lianlei Lin, Chao Sun. 586-592 [doi]
- A New Application Framework for Intelligent Surveillance Sensor NetworksLi-Ping Chou, Jenn-Dong Sun, Mei-Ling Chen. 589-591 [doi]
- Motion Vector Re-estimation for Trans-coding Using Kalman FilterChih-Shan Liu, Jen-Chun Lin, Nai-Chung Yang, Chung Ming Kuo. 592-595 [doi]
- An Enhanced ACO Algorithm for Multi-objective Maintenance Scheduling of Oil TanksCheng-Chung Hsu, Sheng-Tun Li, Chih-Chuan Chen, Ti-Yen Yang. 593-596 [doi]
- An Algorithm for Coplanar Camera CalibrationKaset Sirisantisamrid, Kitti Tirasesth, Takenobu Matsuura. 596-599 [doi]
- A Multi-objective Particle Swarm Optimization Algorithm for Rule DiscoverySheng-Tun Li, Chih-Chuan Chen, Jian Wei Li. 597-600 [doi]
- Fast Motion Search Using Early Zero-block DetectionChiung-Chin Lin, Yu-Ming Lee, Yinyi Lin. 600-603 [doi]
- Fuzzy Rating Framework for Knowledge ManagementSheng-Tun Li, Hei-Fong Ho. 601-604 [doi]
- Ensemble HMM Learning for Motion Retrieval with Non-linear PCA Dimensionality ReductionJian Xiang, Hongli Zhu. 604-607 [doi]
- A Decomposition Approach for Mining Frequent ItemsetsJen-Peng Huang, Guo-Cheng Lan, Huang-Cheng Kuo, Tzung-Pei Hong. 605-608 [doi]
- Eyes Tracking in a Video Sequence Based-On Haar-like Features and Skin ColorQi Han, Qiong Li, Xiongdong Huang, Tong Zhou, Xiamu Niu. 608-611 [doi]
- Integrating Multiple Knowledge Sources by Genetic ProgrammingChan-Sheng Kuo, Tzung-Pei Hong, Chuen-Lung Chen. 609-612 [doi]
- Extracting Emotional Semantics from Color Image using Analytical Hierarchy ProcessHaifang Li, Jin Li, Jiancheng Song, Junjie Chen. 612-618 [doi]
- Imitation Output Characteristic of Turbine Control Based on Servos Interface TechnologyXiao-Wei Wang, Ying-ming Liu, Feng Li. 613-616 [doi]
- A High-Efficiency Recursive Algorithm without Numerical Instability for Polynomial Predistorter DesignLingjun Xu, Gang Su, Zhijun Liu, Yong Wang, Zhang Ping. 617-620 [doi]
- Usability Testing of AMC Hospital's Website for Home Users: Case Study for On-Site Registration DesignHao-Yun Kao. 619-622 [doi]
- Fuzzy Belief Reasoning for Intrusion Detection DesignTe-Shun Chou, Kang K. Yen, Niki Pissinou, Kia Makki. 621-624 [doi]
- User's Authentication in Media Services by using One-Time Password Authentication SchemeNeng-Wen Wang, Yueh-Min Huang. 623-626 [doi]
- Find Recent Frequent Items with Sliding Windows in Data StreamsJiadong Ren, Ke Li. 625-628 [doi]
- Energy-Efficient Geographic Relay for Ad-Hoc Wireless NetworksJeng-Wei Lee, Yi-Tsung Chen, Yau-Hwang Kuo. 627-630 [doi]
- Punched Image Watermarking: A Novel Fast Fractal Coding Based TechniqueSaid E. El-Khamy, Mohamed Khedr, Ahmad Al-Kabbany. 629-632 [doi]
- Mining Generalized Association Rules for Service Recommendations for Digital Home ApplicationsSue-Chen Hsueh, Ming-Yen Lin, Kun-Lin Lu. 631-634 [doi]
- On the Convergence Behavior of the FastICA Algorithm with the Kurtosis Cost FunctionChangyuan Fan, Xiayu Mu. 633-638 [doi]
- Applications of a Pedagogical Agent Mechanism in a Web-based Clinical Simulation System for Medical EducationYuh-Ming Cheng, Lih-Shyang Chen, Sheng-Feng Weng, Yong-Guo Chen, Chyi-Her Lin. 635-638 [doi]
- Distributed Detection of Wormholes and Critical Links in Wireless Sensor NetworksYung-Tsung Hou, Chia-Mei Chen, Bingchiang Jeng. 639-642 [doi]
- Research on Routing Protocols Based on ZigBee NetworkJing Sun, Zhongxiao Wang, Hong Wang, Xiaofen Zhang. 639-642 [doi]
- Information Exchange Mechanism Based on Reputation in Mobile P2P NetworksWei-Yu Lai, Chia-Mei Chen, Bingchiang Jeng, Gu Hsin Lai, Hsiao-Chung Lin. 643-646 [doi]
- The Wireless Sensor Network for Home-Care System Using ZigBeeMao-Cheng Huang, Jyun-Ciang Huang, Jing-Cyun You, Gwo-Jia Jong. 643-646 [doi]
- Scalable Anycast System based on OSPFWei Kuang Lai, Chen-Da Tsai. 647-650 [doi]
- A Multi-Sensor Fusion Method Applied to Stability Diagnosis Based on Distributed Neyman-Pearson AlgorithmJie Liu, Qingdong Du. 651-654 [doi]
- An Energy-Efficient Clustering Algorithm for Wireless Sensor NetworkYing Liang, Hang Li. 655-658 [doi]
- An Effective Privacy-Preserving RFID Scheme against DesynchronizationMin-Hua Shao. 659-662 [doi]
- Research on pertinence of QoS Metrics Based on IEEE 802.15.4 in Wireless Sensor NetworksXuemin Zhang, Zenggang Xiong. 663-666 [doi]
- A New Multi-quality Image Fusion Method in Visual Sensor NetworkMinghua Yang, Yuanda Cao, Li Tan, Changyou Zhang, Jiong Yu. 667-670 [doi]
- A Multi-path Routing Protocol with Reduced Control Messages for Wireless Sensor NetworksChe-Wei Hsu, Chin-Shiuh Shieh, Wei Kuang Lai. 671-675 [doi]