| 95 | -- | 103 | Huimin Lu, Yujie Li, Shiyuan Yang, Seiichi Serikawa. Image restoration using anisotropic multivariate shrinkage function in contourlet domain |
| 104 | -- | 112 | Zhe Tang, Qiang Zhou, Fang Qi, Jianxin Wang. Optimal transitional trajectory generation for automatic machines |
| 113 | -- | 123 | Chong Fu, Zhan-kao Wen, Zhiliang Zhu, Hai Yu. A security improved image encryption scheme based on chaotic Baker map and hyperchaotic Lorenz system |
| 124 | -- | 132 | Liu Yang, Zhigang Hu, Jun Long. Expert selection service system by fuzzy ontology modelling |
| 133 | -- | 145 | Liqiong Chen, Guisheng Fan, Yunxiang Liu. A formal method to model and analyse QoS-aware fault tolerant service composition |
| 146 | -- | 154 | Caiyan Dai, Ling Chen. An algorithm for mining frequent closed itemsets with density from data streams |
| 155 | -- | 165 | Joao Gramacho, Alvaro Wong, Dolores Rexachs, Emilio Luque. Predicting robustness against transient faults of MPI based programs |
| 166 | -- | 175 | Dohyun Kim, Younghee Lee. Isolation-based subsumption reasoning with enormous volume of web ontologies for scalable semantic service discovery |
| 176 | -- | 185 | Huakang Li, Xiaofeng Xu, Longbin Lai, Yao Shen. Online commercial intention detection framework based on web pages |
| 186 | -- | 191 | Haitao Wu, Ningbo Hao, Wen-Kuang Chou. SAT-based algorithm for finding all maximal cliques |
| 192 | -- | 208 | Shinji Kikuchi, Subhash Bhalla. Evolution of distributed monitoring for scalable business process management in cloud-based databases |
| 209 | -- | 236 | Chein-I Chang, Wei Xiong, Shih-Yu Chen. Convex cone volume analysis for finding endmembers in hyperspectral imagery |
| 237 | -- | 253 | Ash Mohammad Abbas, Khaled Abdullah Mohammed Al Soufy. A queue state driven analysis of IEEE 802.11 DCF for ad hoc networks under non-saturation conditions |
| 254 | -- | 263 | Usha Bhanu Nageswaran, A. Chilambuchelvan. VLSI architectures for high speed and low power implementation of 5/3 lifting discrete wavelet transform |