95 | -- | 103 | Huimin Lu, Yujie Li, Shiyuan Yang, Seiichi Serikawa. Image restoration using anisotropic multivariate shrinkage function in contourlet domain |
104 | -- | 112 | Zhe Tang, Qiang Zhou, Fang Qi, Jianxin Wang. Optimal transitional trajectory generation for automatic machines |
113 | -- | 123 | Chong Fu, Zhan-kao Wen, Zhiliang Zhu, Hai Yu. A security improved image encryption scheme based on chaotic Baker map and hyperchaotic Lorenz system |
124 | -- | 132 | Liu Yang, Zhigang Hu, Jun Long. Expert selection service system by fuzzy ontology modelling |
133 | -- | 145 | Liqiong Chen, Guisheng Fan, Yunxiang Liu. A formal method to model and analyse QoS-aware fault tolerant service composition |
146 | -- | 154 | Caiyan Dai, Ling Chen. An algorithm for mining frequent closed itemsets with density from data streams |
155 | -- | 165 | Joao Gramacho, Alvaro Wong, Dolores Rexachs, Emilio Luque. Predicting robustness against transient faults of MPI based programs |
166 | -- | 175 | Dohyun Kim, Younghee Lee. Isolation-based subsumption reasoning with enormous volume of web ontologies for scalable semantic service discovery |
176 | -- | 185 | Huakang Li, Xiaofeng Xu, Longbin Lai, Yao Shen. Online commercial intention detection framework based on web pages |
186 | -- | 191 | Haitao Wu, Ningbo Hao, Wen-Kuang Chou. SAT-based algorithm for finding all maximal cliques |
192 | -- | 208 | Shinji Kikuchi, Subhash Bhalla. Evolution of distributed monitoring for scalable business process management in cloud-based databases |
209 | -- | 236 | Chein-I Chang, Wei Xiong, Shih-Yu Chen. Convex cone volume analysis for finding endmembers in hyperspectral imagery |
237 | -- | 253 | Ash Mohammad Abbas, Khaled Abdullah Mohammed Al Soufy. A queue state driven analysis of IEEE 802.11 DCF for ad hoc networks under non-saturation conditions |
254 | -- | 263 | Usha Bhanu Nageswaran, A. Chilambuchelvan. VLSI architectures for high speed and low power implementation of 5/3 lifting discrete wavelet transform |