1565 | -- | 1576 | Adnan, Mitsuhisa Sato. Dynamic Multiple Work Stealing Strategy for Flexible Load Balancing |
1577 | -- | 1589 | Dongxi Liu, Jack Lee, Julian Jang, Surya Nepal, John Zic. A New Cloud Architecture of Virtual Trusted Platform Modules |
1590 | -- | 1602 | Akihiro Inokuchi, Takashi Washio. FRISSMiner: Mining Frequent Graph Sequence Patterns Induced by Vertices |
1603 | -- | 1609 | Latsamy Saysourinhong, Bilan Zhu, Masaki Nakagawa. Online Handwritten Lao Character Recognition by MRF |
1610 | -- | 1618 | Shang Cai, Yeming Xiao, Jielin Pan, QingWei Zhao, YongHong Yan. Noise Robust Feature Scheme for Automatic Speech Recognition Based on Auditory Perceptual Mechanisms |
1619 | -- | 1627 | Yasuhiro Ohkawa, Kazuhiro Fukui. Hand-Shape Recognition Using the Distributions of Multi-Viewpoint Image Sets |
1628 | -- | 1635 | Jong-Min Lee, Whoi-Yul Kim. A New Shape Description Method Using Angular Radial Transform |
1636 | -- | 1645 | Yuanqi Su, Yuehu Liu, Xiao Huang. Circle Detection Based on Voting for Maximum Compatibility |
1646 | -- | 1655 | Jianfeng Xu, Koichi Takagi, Shigeyuki Sakazawa. Efficient Generation of Dancing Animation Synchronizing with Music Based on Meta Motion Graphs |
1656 | -- | 1667 | Takashi Nagamatsu, Yukina Iwamoto, Ryuichi Sugano, Junzo Kamahara, Naoki Tanaka, Michiya Yamamoto. Gaze Estimation Method Involving Corneal Reflection-Based Modeling of the Eye as a General Surface of Revolution about the Optical Axis of the Eye |
1668 | -- | 1675 | Chooi-Ling Goh, Taro Watanabe, Eiichiro Sumita. Japanese Argument Reordering Based on Dependency Structure for Statistical Machine Translation |
1676 | -- | 1679 | Young-Sik Eom, Jong Wook Kwak, Seong Tae Jhang, Chu Shik Jhon. Throttling Capacity Sharing Using Life Time and Reuse Time Prediction in Private L2 Caches of Chip Multiprocessors |
1680 | -- | 1683 | Guangchun Luo, Ying Ma, Ke Qin. Active Learning for Software Defect Prediction |
1684 | -- | 1686 | Eun-Jun Yoon, Kee-Young Yoo. On the Security of an Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme |
1687 | -- | 1689 | Eun-Jun Yoon, Kee-Young Yoo. Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications |
1690 | -- | 1693 | Ying Sun, Yong Yu, Yi Mu. Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme |
1694 | -- | 1697 | Mingfu Xue, Aiqun Hu, Chunlong He. Application-Oriented Confidentiality and Integrity Dynamic Union Security Model Based on MLS Policy |
1698 | -- | 1701 | Lili Pan, Mei Xie, Ling Mao. Iris Image Blur Detection with Multiple Kernel Learning |
1702 | -- | 1706 | Lin-bo Luo, Jong-Wha Chong. A Low-Cost Imaging Method to Avoid Hand Shake Blur for Cell Phone Cameras |
1707 | -- | 1712 | Cagatay Karabat, Hakan Erdogan. Error-Correcting Output Codes Guided Quantization for Biometric Hashing |
1713 | -- | 1716 | Shigang Li. Edge Point Grouping for Line Detection |