2915 | -- | 2924 | Ying Zhao, Yanyu Lu, Yukun Tian, Liming Li, QiuShi Ren, Xinyu Chai. Image processing based recognition of images with a limited number of pixels using simulated prosthetic vision |
2925 | -- | 2939 | Shao-Hu Peng, Deok-Hwan Kim, Seok-Lyong Lee, Chin-Wan Chung. A visual shape descriptor using sectors and shape context of contour lines |
2940 | -- | 2959 | Sun Zheng. An intensive restraint topology adaptive snake model and its application in tracking dynamic image sequence |
2960 | -- | 2978 | Tongyan Li, Xingming Li. Novel alarm correlation analysis system based on association rules mining in telecommunication networks |
2979 | -- | 2990 | Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo Lee, Murad Khalid, Ravi Sankar. Activity-oriented access control to ubiquitous hospital information and services |
2991 | -- | 3005 | Zuqiang Long, Ximing Liang, Lirong Yang. Some approximation properties of adaptive fuzzy systems with variable universe of discourse |
3006 | -- | 3020 | Bart Van Gasse, Glad Deschrijver, Chris Cornelis, Etienne E. Kerre. Filters of residuated lattices and triangle algebras |
3021 | -- | 3032 | Bijan Davvaz, M. Fathi, A. R. Salleh. Fuzzy hyperrings (H::v::-rings) based on fuzzy universal sets |
3033 | -- | 3044 | Mohammad Hossein Fazel Zarandi, Adel Alaeddini. A general fuzzy-statistical clustering approach for estimating the time of change in variable sampling control charts |
3045 | -- | 3058 | Chin-Chen Chang, The Duc Kieu. A reversible data hiding scheme using complementary embedding strategy |
3059 | -- | 3064 | Lein Harn, Changlu Lin. Strong (n, t, n) verifiable secret sharing scheme |