Abstract is missing.
- A 2-approximation algorithm for the clustered minimum routing cost tree problemChen-Wan Lin, Bang Ye Wu. 3-10 [doi]
- An efficient exact algorithm for P2-packing in cubic graphsMaw-Shang Chang, Li-Hsuan Chen, Ling-Ju Hung. 11-21 [doi]
- Good characterizations and linear time recognition for 2-probe block graphsVan Bang Le, Sheng-Lung Peng. 22-31 [doi]
- PFBF: Pre-Filtered Bloom FiltersSsu-Ting Liu, Sheng-De Wang. 32-39 [doi]
- Approximate String Matching Problem under Non-Overlapping Inversion DistanceShih-Yuan Huang, Chung-Han Yang, Toan Thang Ta, Chin Lung Lu. 40-48 [doi]
- IDP: An Innovative Data Placement Algorithm for Hadoop SystemsChia-Wei Lee, Horng-Chyau Huang, Sun-Yuan Hsieh. 49-58 [doi]
- The End-to-end Longest Path Problem on a Mesh with a Missing VertexTing-Wei Chang, Ondrej Navrátil, Sheng-Lung Peng. 59-66 [doi]
- Toward the One-to-Two Balanced Disjoint-Path Cover of Matching Composition NetworksTzu-Liang Kung, Hon-Chan Chen, Lih-Hsing Hsu, Chi-Lun Wang. 67-76 [doi]
- The Weighted Independent Domination Problem in Series-Parallel GraphsShun-Chieh Chang, Jia Jie Liu, Yue-Li Wang. 77-84 [doi]
- Some Results of Incidence Coloring on Generalized Petersen GraphsKun-Fu Ding, Kung-Jui Pai, Jou-Ming Chang, Rueiher Tsaur. 85-91 [doi]
- On the Existence of All Shortest Vertex-Disjoint Paths in Cayley Graphs of Abelian GroupsCheng-Nan Lai. 92-103 [doi]
- Extended Cycles Embedding on Folded Hypercubes with Vertex-Fault-TolerantChe-Nan Kuo. 104-111 [doi]
- An Efficient Algorithm to Solve the Nearest Neighbor Searching ProblemYi Kung Shieh, R. C. T. Lee. 112-121 [doi]
- A Multi-Agent Intelligence Hybrid System Technique for Detection and Defense of DDoS AttacksHsia-Hsiang Chen, Shih-Kun Huang. 125-139 [doi]
- A global optimized neuro-fuzzy system using artificial bee colony evolutionary algorithmYu-Ting Liu, Yang-Yin Lin, Tsung-Yu Hsieh, Shang-Lin Wu, Chin-Teng Lin. 140-149 [doi]
- Using a Novel LDA-Ensemble Framework to Classification of Motor Imagery Tasks for Brain-Computer Interface ApplicationsChing-Yu Chiu, Chih-Yu Chen, Yang-Yin Lin, Shi-An Chen, Chin-Teng Lin. 150-156 [doi]
- Circuit-Simulation-Based Multi-objective Evolutionary Algorithm with Multi-Level Clock Driving Technique for a-Si: H TFTs Gate Driver Circuit Design OptimizationSheng-Chin Hung, Chieh-Yang Chen, Chien-Hsueh Chiang, Yiming Li. 157-166 [doi]
- Using a Genetic Model for Asset Allocation in Stock InvestmentShin-Shou Chen, Chien-Feng Huang, Tzung-Pei Hong, Bao Rong Chang. 167-174 [doi]
- Automatic Adaptive Locomotion on Partially Breakdown Quadrupedal Biomorphic Robot by Multi-Objective Evolutionary AlgorithmsHou-Yu Chen, Shih-Hung Wu. 175-184 [doi]
- Analysis of exercise ventilation with autoregressive model and Hilbert-Huang transformHsueh-Ting Chu, Tieh-Cheng Fu. 185-192 [doi]
- Auto-Tuning for GPGPU Applications Using Performance and Energy ModelChih-Sheng Lin, Shih-Meng Teng, Pao-Ann Hsiung. 195-204 [doi]
- A Transaction-based Design Model and Its MPEG-2 Encoder DesignChun-Yu Chen, Yun-Lung Lee, Jer Min Jou. 205-214 [doi]
- Power Management Strategy for Non-DVS Multiprocessor SystemChin-Fu Kuo, Yung-Feng Lu. 215-224 [doi]
- Micro-grid Design Modeling and PrototypingHung-Lin Chao, Pao-Ann Hsiung. 225-234 [doi]
- An Optimal Budget Assignment of Real-Time Query Processing for Wireless Sensor Networks in Context of the Internet of ThingsYung-Feng Lu, Chin-Fu Kuo, Pei-Lun Suei, Wei-Chen Pao. 235-245 [doi]
- A Data Migration Approach for L1 Cache Design with SRAM and Volatile STT-RAMWei-Kai Cheng, Yen-Heng Ciou. 246-253 [doi]
- Design of Low-Complexity 4-Path Dynamic Reconfigurable MDC FFT ProcessorTrong-Yen Lee, Wei-Cheng Chen, Chi-Han Huang. 257-268 [doi]
- Analyzing the BTI Effect on Multi-bit Retention RegistersIng-Chao Lin, Yao-Te Wang, Shuen-Shiang Yang, Yi-Luen Wu. 269-278 [doi]
- FPGA Implementation for Path and Wall Following Wheeled RobotsShiow-Jyu Lin, Ju-Xun He, Guan-Wei Chen, Wang-Wei Chen. 279-288 [doi]
- A Low-Memory-Access Flexible Architecture for FFTKuan-Hung Chen. 289-297 [doi]
- Dynamic Voltage and Frequency Scaling Optimization for Multicore ArchitecturesTing-Hsuan Chien, Rong-Guey Chang. 298-307 [doi]
- VLSI Implementation of 8051 MCU with In-System ProgrammingMao-Hsu Yen, Yeong-Chang Maa, Yih-Hsia Lin, Chih-Chen Lai, Shu-Ping Zheng. 308-314 [doi]
- Line Probe Routing Algorithm Implementation for SOCYang-Hsin Fan. 315-320 [doi]
- An Color Interference Checking Chip Dicing Plan for Multiple Project WaferChihhsiong Shih, Minlong Huang, Zhaolong Liang. 321-331 [doi]
- Forecasting the Impacts of Articles and Authors on the Social Forum during EmergenciesMing-Hung Wang, Chin-Laung Lei. 335-344 [doi]
- Optimization of Downlink Bandwidth Allocation for Energy Efficiency over OFDMA Wireless NetworksChien-Yu Wu, Hann-Jang Ho, Sing-Ling Lee. 345-354 [doi]
- Study of Radio Resource Reallocation for Hotspots in LTE NetworkFu Yuan Chua, Kang-Hao Lo, Yen-Wen Chen. 355-363 [doi]
- A DHT-based Resource Provision Enquiry for Cloud Computing InteroperabilityLi-Der Chou, Chi-An Jen, David Chunhu Li, Chun-Tse Lin. 364-372 [doi]
- A Novel Approach for Ontology Maintenance Based on Web DataXiangyu Ren, Jin Liu, Qiuxia Song, Junjie Song, Bei Zhong. 373-380 [doi]
- A FEC Allocation Method for Unequal Loss Protection of H.264/AVC Videos Based on Macroblock IndexJung-Hung Wang, Jian-Min Wu, Chow-Sing Lin. 381-390 [doi]
- NFC Facility Inventory Control and Checking SystemRung-Shiang Cheng, Chia Peng Lin. 391-400 [doi]
- Extending lifespan of a sensor network by partial coverage strategyPeng-Hsiang Kao, Xuan-Bo Wang, Yu-Yun Lin, Lei Wang. 401-411 [doi]
- Maximum-Lifetime Least-Cost Multicasting in MANETs based on Heuristic Genetic AlgorithmTing Lu, Guohua Liu, Shan Chang, Wenjing Guo, Qiubo Huang. 412-419 [doi]
- A Task Scheduling Policy for Heterogeneous MapReduce ClusterChui-Ming Chiu, Sheng-Wei Huang, Tzu-Chi Huang, Ce-Kuen Shieh, Ming-Fong Tsai, Lien-Wu Chen. 420-429 [doi]
- A Novel SVM Based Multi-Facet Ranking Method for Topic Specific Web PagesYanjun Cao, Jin Liu, Jingtai Zhang, Fei Li, Bei Zhong. 430-437 [doi]
- WiFi-based Floor Estimation for Multi-Storey Building: A Case Study for a Crowded AP EnvironmentHung-Huan Liu, Chung-Wei Liao, Wei-Hsiang Lo. 438-444 [doi]
- Machine to Machine Service Capability Architecture for LTE Communication SystemYao-Chung Chang. 445-452 [doi]
- A Hierarchical M-hops Idle Bandwidth Sharing Approach in Vehicular Ad-Hoc NetworkJin-Lih Shieh, Yau-Hwang Kuo, Wei-Hsun Lee. 453-462 [doi]
- Performance Comparison of Typical Routing Protocols in Ad-hoc NetworksJian Shen, Chen Wang, Anxi Wang, Lei Li, Yu Yang, Jin Wang. 463-473 [doi]
- An Effective Group Communications in Hybrid VANETI-Hsien Liu, Tian-Li Wang, Jung-Shian Li. 474-481 [doi]
- A Rule Based DFA Driven Information Extractor for Content Extracting from Web PagesJin Liu, Danliang Chu, Junjie Song, Bei Zhong, Biqi Cai. 482-488 [doi]
- Enhanced Local Support Vector Machine With Fast Cross-Validation CapabilityYu-Ann Chen, Pau-Choo Chung. 491-500 [doi]
- Efficient Mining of Frequent Target Episodes from Complex Event SequencesYu-Feng Lin, Pei-Wen Jiang, Vincent S. Tseng. 501-510 [doi]
- A Graph Structure-based Asset Retrieval SystemJia-Ling Koh, Chia-Jung Chiang, Seng-Chih Chu, Yi-Chi Huang, Shao-Chun Peng, Sz-Han Wang, Te Yu Liu, Hui-I Hsiao, Chien Lin, Arbee L. P. Chen. 511-520 [doi]
- An Obstruction-Check Approach to Mining Closed Sequential Patterns in Data StreamsYe-In Chang, Chia-En Li, Tzu-Lin Chin. 521-530 [doi]
- Forecasting Price Volatility Range of Crude Palm Oil by Mining the Historical Data Using Hybrid Range ModelKwan-Hua Sim, Isaac Yung Shen Goh, Kwan Yong Sim, Yiing Chee Tan. 531-540 [doi]
- Anomaly Detection in Hadoop Clusters Using PCA and DBSCANXiao Yang, Yan Liu, Zunhe Liu, Buyang Cao. 541-552 [doi]
- Analysis of Big Data Sized NoSQL Database with Secondary IndexBao Rong Chang, Hsiu Fen Tsai, Chia-Yen Chen, Hung-Ta Hsu. 553-558 [doi]
- Development of Graphical Editor for Supervisory Control and Data Acquisition System in Agriculture GreenhouseWen-Hao Tsai, W. C. Liu, Kuan-Rong Lee, Wei-Tsung Su, P.-Y. Chen, Yau-Hwang Kuo. 561-571 [doi]
- An Automated Wrapper Generator for Semi-Structured Web ContentsLung-Pin Chen, Wen-Nan Hsu. 572-582 [doi]
- Landscape Recommendation System Using Public Preference Mining and Social Influence AnalysisWen-Hao Tsai, Yan-Ting Lin, Kuan-Rung Lee, Yau-Hwang Kuo, Bing-Huei Lu. 583-592 [doi]
- QoN-oriented Resilient Bandwidth Allocation for Medical Content Services in Software-Defined Hospital NetworksHsuan-Hsuan Chin, Chun-Chih Lo, Pei-Yu Wu, Mong-Fong Horng, Yau-Hwang Kuo. 593-602 [doi]
- The Design and Implementation of the Intelligent Crafts for Digital ArtsTzu-Chi Lin, Cheng-Min Lin, Chong-Wey Lin. 603-610 [doi]
- News Event Detection Using Random Walk with RestartLun-Chi Chen, I-En Liao, Chi-Hao Chen. 611-620 [doi]
- A User Interactive Experience for One-handed Operation of Hand-held DevicesTseng-Yi Chen, Heng-Yin Chen, Nai-Yuan Jhang, Wei Kuan Shih. 621-630 [doi]
- A New Human-Machine Interaction of Smart PlantsWen-Bin Huang, Shuo-Wen Chang, Mei-Yun Xie, Chu-Rong Yen, Mong-Fong Horng. 631-640 [doi]
- A Vision-based Virtual Keyboard DesignShiuh-Ku Weng, Chaur-Heh Hsieh, You-Zen Chy. 641-647 [doi]
- The Research of Experimental State Feedback Mechanism Based on Windows API - Take Cloud Security Experimental Platform for InstanceYun-Ting Ching, Yi-Ming Chen. 651-661 [doi]
- Implementation of Portal System of Online Tutoring for After School's LearningChe-Wun Lin, Yun-Yuag Chiang, Wei-Ru Lai. 662-671 [doi]
- Mobile Literacy: - Navigating New Learning Opportunities and ObligationsMark Pegrum. 672-679 [doi]
- Effectiveness of Constructing Information Literacy via Credited Information Literacy ProgramSzu-chia S. Lo. 680-688 [doi]
- Interactive augmented reality system for supporting museum guided instructionKo-Fong Lee, Kai-Yi Chin, Jim-Min Lin. 689-698 [doi]
- Design of Chinese Language Learning APP in the Context-Aware Learning EnvironmentHong-Ren Chen, Hsiao-Han Chiu. 699-706 [doi]
- Originality Assurance in Academic PublicationKun-Huang Huarng. 707-712 [doi]
- An Efficient Authentication and Service Key Agreement Scheme in IOT EnvironmentsJheng-Jia Huang, Wen-Shenq Juang, Chun-I Fan. 715-723 [doi]
- Efficient public key encryption with user-friendly keywords search for searchable cloud storageKuo-Chang Chen, Yu-Chi Chen, Gwoboa Horng, Raylin Tso. 724-733 [doi]
- Reversible Data Hiding Method based on CSD Data RepresentationKuo-Hui Li, Chien-Sung Li, Shuenn-Shyang Wang, Yi-Pin Liao. 734-745 [doi]
- Classification of Generalized Graph-type (2, n)-Visual Secret Sharing Schemes and Optimal Construction for Multiple SecretsYuji Suga. 746-755 [doi]
- A Virtual Primary Key for Reversible Watermarking Textual Relational DatabasesChin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin. 756-769 [doi]
- A New Cryptosystem Based on Three Knapsacks with Plaintext EncodingYao-Zhang Huang, Ching-Tsung Hsueh, Yi-Ju Chiang, Yen Chieh Ouyang. 770-781 [doi]
- Cryptanalysis of Anonymous Authenticated and Key Agreement Scheme Based on Biometric for Multi-Server EnvironmentWen-Chung Kuo, Hong-Ji Wei, Yu-Hui Chen, Jiin-Chiou Cheng. 782-787 [doi]
- A Privacy-Preserving Encoding for Efficient Comparison Queries and Access Control from Predicate EncryptionShao-Heng Chen, Fu-Kuo Tseng, Rong-Jaye Chen. 788-797 [doi]
- Designing QR Code with Authentication CapabilitiesWen-Chen Wu, Chu-Hsing Lin, Jung-Chun Liu, Ssu-Ying Lin. 801-810 [doi]
- Heap Spraying Revelation: Heap-spraying Detection based on Minimal Length Sequence and Argument AnalysisPei-Chen Yeh, Hahn-Ming Lee, Hsiao-Rong Tyan, Kuo-Ping Wu. 811-820 [doi]
- Detecting Malware in Malicious Virtual Machines Using Tensor Analysis TechniquesTing-Yao Chang, Wei-Yu Lai, Tien-Ruey Hsiang, Ching-Hao Mao. 821-830 [doi]
- A Trustworthy Assurance-as-a-Service ArchitectureMahalingam Ramkumar, Somya D. Mohanty. 831-840 [doi]
- On the Effectiveness of Scheduling Fuzz TestingWei-Jun Chen, Hsiao-Rong Tyan, Shih-Kun Huang. 841-849 [doi]
- A New Investigation Approach for Tracing Source IP in DDoS attack from Proxy ServerJia-Rong Sun, Min-Shiang Hwang. 850-857 [doi]
- Regulatory Framework for Information Security in Taiwan's New Personal Information Protection Act of 2012Wei-min Liao. 858-865 [doi]
- Efficiently tracking TANET suspicious packets and identifying the devices using SplunkHung-Yu Chien, Meng-Yuan Chiang, Yi-Ting Hsin, Chun-Pei Hung. 866-874 [doi]
- A High Capacity Reversible Multiple-Image Hiding SchemeChin-Feng Lee, Jui-Yu Chen, Si-Ting Chen. 875-884 [doi]
- Information Hiding Scheme based on Replace Function and Wavelet TransformTzu-Chuen Lu, Sue-Chen Hsueh, Chun-Ya Tseng, Pei-Lun Chen. 885-893 [doi]
- Hybrid Intrusion Detection Framework for Advanced Metering InfrastructureHe-Ming Ruan, Gan Wei Yeap, Chin-Laung Lei. 894-903 [doi]
- Frameworks in Evidence Collection in Forensics by Analyzing Temporal Cloud Storage ForensicsDa-Yu Kao, Min-Jung Chung, Shiuh-Jeng Wang. 904-913 [doi]
- Design of Proxy Signature Schemes Using Self-Certified Public Keys from PairingsChien-Lung Hsu, Yu-Hao Chuang, Pei-Ling Tsai. 914-924 [doi]
- An efficient honeypot based malware classification systemChia-Mei Chen, Gu Hsin Lai. 925-933 [doi]
- WSD-AIS: an Artificial Immune System Approach against Web SpamYan Zhu, Fan Yang, Shou-Hong Tang. 934-943 [doi]
- On Reversible Data Hiding Schemes for JPEG Images from the Modified Quantization TableJen-Chun Chang, Chen-Hsuan Lee, Hsin-Lung Wu. 944-953 [doi]
- Wavelet-Based Reversible and Visible Image Watermarking SchemeChien-Chang Chen, Han-Wei Tsai. 954-963 [doi]
- Protection of Privacy Data in a Cloud EnvironmentJeang-Kuo Chen, Fang-Sheng Chang. 964-971 [doi]
- Design of Hypervisor-based Integrated Intrusion Detection System in Cloud Computing EnvironmentChih-Hung Wang, Xuan-Liang Chen. 972-981 [doi]
- A Comparative Survey on RFID Grouping Authentication ProtocolsJian Shen, Haowen Tan, Sai Ji, Yongjun Ren, Jin Wang. 982-993 [doi]
- A Security Assessment Environment and Process Design for Smart Meter Vendor Production LineChien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen, Chin-Laung Lei. 994-1001 [doi]
- Content-aware Stereoscopic Image Retargeting Using Non-homogeneous WarpingYu-Hao Chang, Jin-Jang Leou. 1005-1014 [doi]
- A New Single Image Deblurring Algorithm Using Hyper Laplacian PriorsChia-Feng Chang, Jiunn-lin Wu. 1015-1022 [doi]
- A (n, n)-threshold Secret Sharing Scheme for Barcode ApplicationPei-Yu Lin, Yi-Hui Chen, Jun-Chou Chuang. 1023-1028 [doi]
- A Dual-Camera Tracking Scheme with Object Information HidingSheng-Hao Chang, Po-Chyi Su, Yung-Chieh Joseph Chou. 1029-1042 [doi]
- Massive Parallel Computing of Super-Resolution with Sparse RepresentationHao-Rong Ding, Chih-Hung Kuo, Po-Hung Kuo, Yan-Tse Chuang. 1043-1051 [doi]
- A Robust Vision-Based Heart Rate EvaluationKuan-Yi Lin, Duan-Yu Chen, Suh-Yin Lee. 1052-1061 [doi]
- Classify Blog Articles Using Queried KeywordsYi-Hui Chen, Eric Jui-Lin Lu, Tsai-Ying Wu, Tsung Hau Lin. 1062-1068 [doi]
- Brain Stroke Evaluation from Multi-image Modalities Using Image Registration and Segmentation TechniquesChing-Fen Jiang, Wan-Chi Huang. 1069-1076 [doi]
- A Real-Time Image Contrast Enhancement Technique for Medical UsageMeng-Ting Wu, Yeah Su, Wang Lei. 1077-1086 [doi]
- Banding Effect Removal for Digital MultitoningJing-Ming Guo, Jia-Yu Chang, Yun-Fu Liu. 1087-1096 [doi]
- An improved method for circle detectionWen-Yen Wu. 1097-1106 [doi]
- Integer-based Quality Assessment Measure Using Fixed-point Arithmetic OperationsYi-Chong Zeng, Shih-Jui Yang, Wen-Tsung Chang. 1107-1115 [doi]
- A fully automatic method to mammary gland segmentationChien-Chuan Ko, Chun-Hung Lin, Kai-Sheng Liao, Chi-Yang Chen. 1116-1124 [doi]
- Evaluation of Crack Flaws in Ultrasonic ImagingRen-Jean Liou, Kuang-Chian Kao, Chin-Yung Yeh. 1125-1134 [doi]
- Rain Removal Using Single Image based on Non-negative Matrix FactorizationPin-Hsian Liu, Chih-Yang Lin, Chia-Hung Yeh, Li-Wei Kang, Kyle Shih-Huang Lo, Tai-Hwei Hwang, Chia-Chen Kuo. 1137-1146 [doi]
- An Efficient ZZW Construction Using Low-Density Generator-Matrix Embedding TechniquesJyun-Jie Wang, Chi-Yuan Lin, Meng-Hui Chu. 1147-1156 [doi]
- Fast Seriation of Multiple Homogeneous-content Videos Using Audio-visual FeaturesYi-Chong Zeng, Wen-Tsung Chang. 1157-1166 [doi]
- Combining Center-Symmetric Local Ternary Pattern and Local Sign Directional Pattern for Gender ClassificationChih-Chin Lai, Yen-Chun Huang. 1167-1174 [doi]
- 2D to 3D Video Conversion via Depth InferenceTien-Ying Kuo, Cheng-Hong Hsieh, Kuan-Hung Wan, Yan-Jhu Chen. 1175-1183 [doi]
- Finding Acceptable Trade-off between Rate and Distortion in Multiple Description Coding based on Zero PaddingRong-Hua Chang, Chieh-Wei Su, Chow-Sing Lin. 1184-1194 [doi]
- A Near-Duplicate Video Detection Method Based on Invariant Moments and Feature Point MatchingTang-You Chang, Min-Yuan Guo, Shen-Chuan Tai, Guo-Shiang Lin. 1195-1204 [doi]
- Combining SURF Features with GMM Classifier in Multi-Pose Face RecognitionShinfeng D. Lin, Ding-En Wang, Chih-Yao Chuang. 1205-1212 [doi]
- Estimation and Evaluation of Body Language in a Presentation Scenario Using RGBD DataYi-Chieh Wu, Wen-Hung Liao. 1213-1222 [doi]
- Model-based Tooth Segmentation from Dental Panoramic RadiographsChia-Hsiang Wu, Jia-Kuang Liu, Wan-Hua Tsai, Ying-Hui Chen, Yung-Nien Sun. 1223-1228 [doi]
- Automatically Categorizing Blog Articles Using Ontology Tree Built by DBpediaYi-Hui Chen, Eric Jui-Lin Lu, Hsueh-Chun Chien. 1229-1238 [doi]
- Vision-based Detection of Steel Billet Surface Defects via Fusion of Multiple Image FeaturesChao-Yung Hsu, Li-Wei Kang, Chih-Yang Lin, Chia-Hung Yeh, Chia-Tsung Lin. 1239-1247 [doi]
- Content-based Video Retrieval with Multi FeaturesJhih-Long Lin, Ou-Yang Chien, Han-Yen Yu, Jiann-Jone Chen. 1248-1257 [doi]
- Quadtree Segmented Wavelet Transform Image CodingJia-Chyi Wu, Ming-Kai Shih. 1258-1265 [doi]
- Spatial-Temporal FAST Corner Detector for VideosChia-Chun Lee, Yun-Jung Chang, Yen-Yu Lin, Chun-Rong Huang. 1266-1276 [doi]
- Efficient Coding Unit and Mode Decision Algorithm for HEVC Intra PredictionKuang-Han Tai, Xin-Zhi Li, Mei-Juan Chen. 1277-1286 [doi]
- Fast Coding Unit Depth Decision Method for HEVC EncodersChou-Chen Wang, Hsiang-Chun Wang, Ming-Shum Jhou. 1287-1295 [doi]
- Fast CU Partition Algorithm Based on Rate-Distortion Variation in HEVCYih-Chuan Lin, Hsu-Chun Cheng. 1296-1304 [doi]
- Gantry-Mounted Laser-Stripe Scanning System for Face Shape RecoverySheng-Wen Huang, Po-Sen Huang, Jia-Hong Zhang, Yu-Mei Hong, Chia-Yen Chen, Bao Rong Chang. 1305-1314 [doi]
- The Time Machine in NoSQLChia-Ping Tsai, Hung-Chang Hsiao, Yu-Chang Chao, Cheng-Lung Chu, Yeh-Ching Chung. 1317-1326 [doi]
- Cloud Computing for Intelligent Information System: Large Scale Video Analysis for Long-Term Monitoring of Coral FishesHsiu-Mei Chou, Jih-Sheng Chang, Sun-In Lin, Fang-Pang Lin. 1327-1334 [doi]
- Adaptive OpenCL Computation Offloading Framework on Mobile DeviceOlivier Valery, Wei-Shu Hung, Ju-Cheng Chou, Pangfeng Liu, Jan-Jan Wu. 1335-1344 [doi]
- Green Computing: An SLA-based Energy-aware Methodology for Data CentersYao-Chung Chang, Sheng-Lung Peng, Yi Hsuan Liao, Ruay Shiung Chang. 1345-1354 [doi]
- A Distributed PTX Compilation and Execution System on Hybrid CPU/GPU ClustersTyng-Yeu Liang, Hung-Fu Li, Bi-Shing Chen. 1355-1364 [doi]
- The LOAD-BALANCED Routing In Industrial Wireless Sensor NetworkChing-Lung Chang, Hao-Ting Lee, Chien-Chung Chen. 1365-1374 [doi]
- Design and Implementation of a RESTful Notification ServiceYao-Wen Chang, Ruey-Kai Sheu, Syuan-Ru Jhu, Yue-Shan Chang. 1375-1385 [doi]
- An Environmental Monitoring System for Air Quality ControlChao-Tung Yang, Jung-Chun Liu, Yun-Ting Wang, Chia-Cheng Wu, Fang-Yie Leu. 1386-1395 [doi]
- Supporting Load-Balanced Virtual Machine Placement for Cloud Infrastructure as a ServiceWei-Jen Wang, Shao-Jui Chen, Jui-Hao Yang, Tzu-Ming Chan. 1396-1405 [doi]
- A Big Data Processing Platform for Medical Records in CloudChao-Tung Yang, Jung-Chun Liu, Hsin-Wen Lu, Yin-Zhen Yan, Cheng-Chung Chu. 1406-1415 [doi]
- Adaptive Block Partition of Geographic Map Based on Road Coverage in Urban EnvironmentGuang-Ting Wu, Ruey-Kai Sheu, Chih-Tien Fan, Yue-Shan Chang, Chih-Hua Tai. 1416-1425 [doi]
- The Rule Search Method for Association Signatures on NetDPIMing-Yi Liao, Tsung-Sheng Cheng, Chu-Sing Yang. 1426-1435 [doi]
- Integrated Software and Platform Deployment on Cloud EnvironmentWei-Liang Hsu, Yue-Shan Chang, Zheng-Han Tan. 1436-1445 [doi]
- Scientific Evaluation on a Virtual MachineChau-Yi Chou, Kuen-Tsann Chen. 1446-1455 [doi]
- A Run-time Manager for Multithreading of Multi-core SystemsCheng-Hung Hsieh, Jer Min Jou. 1456-1465 [doi]
- Construction of GPU Virtualization Using PCI Direct Pass-Through in CloudChao-Tung Yang, Wei-Shen Ou, Yu-Shang Lo, Chao-Wei Huang, Chih-Hung Chang. 1466-1475 [doi]
- A Survey of Intelligent Video Surveillance Systems: History, Applications and FutureChung Shuo Fan, Jia-Ming Liang, Yi-Ting Lin, Kun-Ru Wu, Kuan-Yi Li, Ting-Yu Lin, Yu-Chee Tseng. 1479-1488 [doi]
- An NFC-driven Home Automation Framework: an Integration of WSN, Social Networks and Cloud ComputingZheng-Xun Jiang, Yue-Liang Chen, Jen-Jee Chen, Wen-Tai Wu. 1489-1498 [doi]
- Cost Analysis of Deep Packet Inspection in PCC ArchitectureChuan-Sheng Lin, Sok-Ian Sou. 1499-1507 [doi]
- A Handoff Probability Prediction Based Resource Management Scheme for LTE FemtocellsChenn-Jung Huang, Chih-Tai Guan, Heng-Ming Chen, Kai-Wen Hu, Sheng-Yuan Chien. 1508-1515 [doi]
- A New Multipath AODV Routing Protocol for VANET Based on Expected Link LifetimeTianli Hu, Minghui LiWang, Lianfen Huang, Yuliang Tang. 1516-1524 [doi]
- The Rate of Merging Collision in TDMA-Based VANETsJeng-Ji Huang, Min-Hui Ho. 1525-1534 [doi]
- A Fast Handover Control Scheme Using the Optimistic Ready-Tunneling (ORT) ApproachMeng-Shu Chiang, Chung-Ming Huang. 1535-1542 [doi]
- A New Energy-efficient Time Synchronization AlgorithmWeidong Guo, Tie Qiu, Lei Wang, Jie Liu, Chengdang Song. 1543-1550 [doi]
- Dynamic Time Periods Collaborative Filtering Recommendation System based on Contextual Information and Social NetworkJian-Zhong Wu, Chi-Fu Hung, Chiu-Ching Tuan. 1551-1560 [doi]
- A System for Front Vehicle Detection and Fast Indexing Using a Single Car-Mounted CameraChun-Chieh Hsu, Yi-Chien Wu, Hua-Tsung Chen, Suh-Yin Lee. 1561-1570 [doi]
- A Low-Cost Localization Algorithm for Mobile Sensor NetworksDar-Wei Chiou, Guey-Yun Chang, Jen-Feng Huang. 1571-1579 [doi]
- A Visual-based Positioning SystemCheng-Sheng Chien, Min-Te Sun, Yi-Chang Wang, Jen You Kuo. 1580-1590 [doi]
- An Enhanced Fuzzy Model For Cluster Head Election In Wireless Sensor NetworksWalaa A. Afifi, Hesham A. Hefny. 1593-1607 [doi]
- Study on time synchronization algorithm for structural health monitoring based on wireless sensor networksQingJian Liang, Sai Ji, Ping Guo, Xin Xu, Jin Wang. 1608-1615 [doi]
- Joint Adaptation of IEEE 802.11 Link Rate and Backoff Parameters: Prototyping ValidationKun-Ru Wu, Ting-Yu Lin. 1616-1626 [doi]
- Scalable Routing Protocol for Wireless Sensor Networks Based on Gosper IslandsChi-Chang Chen, Yukon Chang, Jui-Ying Hung, Jin-Hung Liang. 1627-1636 [doi]
- Switched Capacitor Low-Pass Filter Chip Design for LTE Wireless Communication and Mobile Computing ApplicationWen Cheng Lai, Jhin-Fang Huang, Wei-Chih Chen, Ta Chen Chiu. 1637-1645 [doi]
- A Fast Window-based Scalar Multiplication Algorithm for Elliptic Curve Cryptography in Wireless Sensor NetworksHung-Nan Ye, Kuochen Wang, Rong-Hong Jan, Yuh-Jyh Hu, Yu-Chee Tseng, Yi-Huai Hsu. 1646-1655 [doi]
- Energy-Efficient Multimedia Multicast Transmission Scheduling using Scalable Video Coding in LTE-Advanced Wireless NetworksWei-Wen Wang, Shih-Lin Wu. 1656-1664 [doi]
- Linked List Routing Algorithm with Wormhole Mechanism for Data Collecting Wireless NetworkJih-Ching Chiu, Wen-Shin Wang, Chien-Lung Chen. 1665-1674 [doi]
- Grid-based Hole Recovery Mechanism using Virtual Force in Hybrid WSNsKuo-Feng Huang, Po-Ju Chen. 1675-1688 [doi]
- A Handover Prediction Mechanism Based on Mobility in LTE-AYing-Hong Wang, Kuo-Feng Huang, Yi-Hsun Lin. 1689-1700 [doi]
- RSSI-based Localization for Wireless Sensor Networks with Grid TopologiesChen-Yu Ho, Wei-Mei Chen. 1701-1709 [doi]
- Using Wi-Fi Direct to Assist Real-Time Traffic Conditions DeliveryYeong-Chang Maa, Mao-Hsu Yen, Yi-Chin Li, Ying-Shin Lai. 1710-1719 [doi]
- Research of Clustering Routing Algorithm for Structural Health Monitoring Based on Wireless Sensor NetworksSai Ji, Ping Yang, Ping Guo, Xin Xu, Jin Wang. 1720-1729 [doi]
- A Design for Multi-Pricing High-Performance Computing SystemLung-Pin Chen, Mike Kao, I-Chen Wu, Ting-Han Wei. 1733-1742 [doi]
- An Extended SOA for Distributing Workload to Service Providers Using XMPPCheng-Zhe Li, Min-Yu Hsieh, Kuo-Hsun Hsu. 1743-1752 [doi]
- Applying reverse engineering and complexity analysis to refine a cost estimation model based on function pointDowming Yeh, Yi-Hong Chen, Chih-Ying Yang, Li-Wei Chen, Ying-Hsiu Wang, Kai-Wei Chen. 1753-1762 [doi]
- Code Smells Detection and Visualization of Software SystemsShin-Jie Lee, Xavier Lin, Li Hsiang Lo, Yu-Cheng Chen, Jonathan Lee. 1763-1771 [doi]
- Establish Controllable Process Performance Model for Software Cost Prediction and Management in Software DevelopmentShu-Chen Chen, Chih-Ping Chu. 1772-1784 [doi]
- Scheduling Moldable Jobs with Deadline in HPC-as-a-Service Software SystemKuo-Chan Huang, Chun-Hao Hung, Wei Hsieh. 1785-1794 [doi]
- Analyzing Abstract Factory and Strategy Design Patterns using Design Structure Matrix: A Role-Playing Game CaseWen-Tin Lee, Ting-Shao Chang, Chieh-Ting Tsai, William Chen, Eden Hsu. 1795-1804 [doi]
- Measuring Strength of Coupling between Java ClassesJonathan Lee, Shin-Jie Lee, Dong-Sheng Hung, Pei-Yuan Hung, Ray Chin, Chia-Chih Wu. 1805-1814 [doi]
- A Leading Indicator of Post-Release Defect Density in Refactoring-based Software Maintenance - A Case StudyYu Chin Cheng, Jung-Sing Jwo, Ching-Tsorng Tsai. 1815-1821 [doi]
- Vulnerabilities and Threats in Cloud Software Engineering SecurityWeider D. Yu, Maryam Runiassy, Yijun Yin. 1822-1831 [doi]
- Reducing Anomaly Detection in a TS WorkflowFeng-Jian Wang, Thanh-Thuy Thi Nguyen, Parameswaramma Mandalapu. 1832-1845 [doi]
- Predicting Severity of Bug Reports using Implicit TagsWei-Chen Kao, Chao-Yuan Lee, Chih-Chuan Yang, Cheng-Zen Yang. 1846-1855 [doi]
- System Migration for a Weapon Maintenance Data Collection and Analysis System: An Experience ReportDer-Hong Ting, Nien-Lin Hsueh. 1856-1864 [doi]
- RobotDroid - A Keyword-Driven Testing Tool for Android ApplicationsChien-Hung Liu, Shu-Ling Chen, Huang-Ke Chen. 1865-1874 [doi]
- Prototype development approach based on application of Program Design in cloud platformDong-Meau Chang, Tse-Chuan Hsu, Hsin-Jan Lee. 1875-1884 [doi]
- Context-Aware RESTful Service Delivery Mechanism for SmartphonesShang-Pin Ma, Ping-Chang Chen, Chi-Chia Li, Wen-Tin Lee. 1885-1894 [doi]
- System Analysis and Design of an Online Group-Buying System with AndroidYan-Fu Lin, Yan Lin Li, Che-Chern Lin. 1895-1904 [doi]
- Prostate Segmentation and Volume Estimation in MRIChuan-Yu Chang, Chuan-Huan Chiu, Yuh-Shyan Tsai. 1907-1917 [doi]
- Biomolecular Docking Sites Selection by Surface Filtration and RefinementChen-En Hsieh, Grace Shiahuy Chen, Chun-Jung Chen, Yaw-Ling Lin. 1918-1929 [doi]
- Missing Value Imputation on Multiple Measurements for Prediction of Liver Cancer Recurrence: A Comparative StudyXiao-Ou Ping, Yi-Ju Tseng, Ja-Der Liang, Guan-Tarn Huang, Pei-Ming Yang, Feipei Lai. 1930-1939 [doi]
- Non-invasive Detection of Sound Signals for Diagnosis of Ligament Injuries around Knee based on Mel-frequency CepstrumYa-Tien Chiang, Chi-Heng Lu, Chiu-Ching Tuan, Tsair-Fwu Lee, Yu-Chih Huang, Mei-Chuan Chen. 1940-1949 [doi]
- Transcriptome analysis of Orange-Spotted Grouper between Ranavirus and Megalocytivirus InfectionsCing-Han Yang, Yu-Cheng Hsiao, Chien-Ming Chen, Tun-Wen Pai, Ming-Hung Wu, Hsin-Yiu Chou. 1950-1959 [doi]
- Prefix Block-Interchanges on Binary StringsShih Wen Chou, Chung-Han Yang, Kun-Tze Chen, Chin Lung Lu. 1960-1969 [doi]
- Weighted Radial Basis Function Kernel-Based Support Vector Machines for Multispectral Magnetic Resonance Brain Image ClassificationClayton Chi-Chang Chen, Shih-Yu Chen, Hsian-Min Chen, Bor-Hung Lin, Yen Chieh Ouyang, Jyh Wen Chai, Ching-Wen Yang, San-Kan Lee, Chein-I Chang. 1970-1982 [doi]
- A Novel Light Weight Balance Monitoring Tool for Elderly CareWilliam Cheng-Chung Chu, Chih-Hung Chang, Tse-Chuan Hsu, Ferdaus Ahmed Kawsar, Nadiyah Johnson, Piyush Saxena, Drew Williams, Sheikh Iqbal Ahamed, Chia-Yu Tsao. 1983-1992 [doi]
- Phased Array and Image Enhancement Method Based Structural Health MonitoringSai Ji, Lu Li, Ping Guo, Jian Shen, Jin Wang, Yajie Sun. 1993-2000 [doi]
- A Cloud-based Mobile Healthcare SystemChin Fu Lin, Shih-Hsuan Lin, Sheng-Lung Peng, Ruay Shiung Chang. 2001-2010 [doi]
- A Method of Signal Sparse in Wireless structural health monitoring based on Compressive SensingSai Ji, Ping Yang, Ping Guo, Xin Xu, Jin Wang, Yajie Sun. 2011-2018 [doi]
- Metagenomic Analysis of Human Oral Microbiome Composition on the Cloud PlatformWen-Pei Chen, Suh-Jen Jane Tsai, Ming-Li Liou, Chi-Ying Tsai, Ki-Hok Liao, Chun-Jung Chen, Yaw-Ling Lin. 2019-2029 [doi]
- Heartbeat measurement based on laser speckle fingerprintKahlil Muchtar, Chia-Hung Yeh, Cheng-Wei Lee, Wen-Hung Xu, Po-Yi Sung, Chia-Chen Kuo. 2030-2036 [doi]
- Feature Selection for Multispectral Brain Image Segmentation in Magnetic Resonance ImagingJyh Wen Chai, Jachih Fu, Chia-Hao Chen, Carol Troy, Hsian-Min Chen, Clayton Chi-Chang Chen. 2037-2043 [doi]
- Detection and Classification of MS Lesions in Multispectral MR ImagesHsian-Min Chen, Jyh Wen Chai, Clayton Chi-Chang Chen, Yen Chieh Ouyang, Ching-Wen Yang, San-Kan Lee, Chein-I Chang. 2044-2049 [doi]
- Dynamic Resource Provisioning with Hotspot Anticipation for MMOG CloudsYenchih Chang, Kuochen Wang, Yi-Huai Hsu. 2053-2062 [doi]
- A Novel Parallel Deduplication and Noise Reduction Method for Vertical Search EngineJunjie Song, Jin Liu, Ming Ni, Fei Li, Jian Wang. 2063-2069 [doi]
- An Enhanced ID-Updating Hash-Based RFID Authentication Protocol with Strong Privacy ProtectionJian Shen, Haowen Tan, Yuhui Zheng, Sai Ji, Jin Wang. 2070-2079 [doi]
- An Adaptive Algorithm for Charger Deployment Optimization in Wireless Rechargeable Sensor NetworksJi-Hau Liao, Chi-Ming Hong, Jehn-Ruey Jiang. 2080-2089 [doi]
- A Cross Language Plagiarism Detection Based on Cloud ComputingChih-Tien Fan, Nguyen Dang Minh, Husaini Muhammad. 2090-2099 [doi]
- Design and Evaluation of Hybrid Wired and Wireless Sensor Networks with Cloud Services for Monitoring of Early-Stage Environmental CorrosionPaul I-Hai Lin, Max Yen, Dong Chen, Mengwei Li, Richard Lampo, Michael McInerney, Jeffrey Ryan. 2100-2111 [doi]
- Cloud Storage AggregatorMahamady Yemrao Chgo Sangla, Che-Pin Chang, Hsiang Chao, An-Ni Ren. 2112-2122 [doi]
- Load Balancing and Multicasting Using the Extended Dijkstra's Algorithm in Software Defined NetworkingJehn-Ruey Jiang, Widhi Yahya, Mahardeka Tri Ananta. 2123-2132 [doi]
- File Transfer and Synchronization over Multiple Clients/Server EnvironmentVolodymyr Andriychenko, Chih-Tien Fan, Yi-Hung Li. 2133-2142 [doi]
- The payoff pattern of Nash Equilibria By a Change of Risk in 2×2 Simulation-Based GameYao-Hsien Lee, Mei-Yu Lee. 2143-2151 [doi]
- A Cloud Based Dynamic Content Delivery NetworkChih-Tien Fan, Pawat Piboonudompornkul, Zong-You Wu. 2152-2161 [doi]
- A Novel Hash-Based RFID Grouping Authentication Protocol on Tag Groups and Multiple ReadersJian Shen, Haowen Tan, Yongjun Ren, Yuhui Zheng, Jin Wang. 2162-2171 [doi]
- Locating Wavelet Extrema for Henry-based Fingerprint Core Point DetectionJing-Wein Wang, Ngoc Tuyen Le. 2175-2180 [doi]
- A Study of User Experience for Enterprise ApplicationsJamie Lee, Jung-Sing Jwo. 2181-2184 [doi]
- A Solution to Improve Web Application PerformanceYi-Ming Huang, Ching-Wen Kuo, Ching-Tsorng Tsai. 2185-2188 [doi]
- An Architecture for Mobile App and Cloud Service IntegrationKevin Hu, Cheng-Chieh Huang. 2189-2192 [doi]
- A Multi-lingual Management Process for Software Interface ConsistencyHsin-Chen Chiang, Kevin Hu. 2193-2196 [doi]
- Private Cloud for Software Firms - A Case StudyYao-Chieh Yang, Jung-Sing Jwo. 2197-2200 [doi]
- Universal Forgery on Shen et al.'s Linkable and Convertible ID-based Ring Signature SchemeShin-Jia Hwang. 2201-2204 [doi]