Journal: JCP

Volume 4, Issue 9

795 -- 796Huadong Ma, Guojun Wang. Guest Editorial
797 -- 805Gui Gui, Paul D. Scott. Measuring Software Component Reusability by Coupling and Cohesion Metrics
806 -- 812Lianwei Zhang, Wei Wang, Yan Li, Xiaolin Liu, Meiping Shi, Hangen He. A Method for Surface Reconstruction Based on Support Vector Machine
813 -- 820Yemei Qin, Ji Wang. Distribution Network Reconfiguration Based on Particle Clonal Genetic Algorithm
821 -- 828Chuanming Song, Xiang-Hai Wang, Fuyan Zhang. Visually Lossless Accuracy of Motion Vector in Overcomplete Wavelet-based Scalable Video Coding
829 -- 836Zhijian Wang, Dingguo Wei. Modeling Complex System Using T-subnet based Hierarchical Petri Nets
837 -- 844Jin-Cherng Lin, Jan-Min Chen. An Automated Mechanism for Secure Input Handling
845 -- 852Jin Zheng, Weijia Jia, Guojun Wang. Data Management of Mobile Object Tracking Applications in Wireless Sensor Networks
853 -- 861Zhigang Chen, Jiaqi Liu, Deng Li, Hui Liu, Athanasios V. Vasilakos. SOBIE: A Novel Super-node P2P Overlay Based on Information Exchange
862 -- 872Lingli Deng, Ziyao Xu, Yeping He. Trust-Based Constraint-Secure Interoperation for Dynamic Mediator-Free Collaboration
873 -- 880Mianxiong Dong, Long Zheng, Kaoru Ota, Song Guo, Minyi Guo, Li Li. Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment
881 -- 890Kerrie J. Long, Frank J. Zajaczkowski, Sue Ellen Haupt, L. Joel Peltier. Modeling a Hypothetical Chlorine Release on a College Campus
896 -- 904Ashok Kumar Das. A Location-Adaptive Key Establishment Scheme for Large-Scale Distributed Wireless Sensor Networks
905 -- 912Sabah Mohammed, Jinan Fiaidhi, Osama Mohammed. Sharing Biomedical Learning Knowledge for Social Ambient Intelligence
913 -- 919Spyros Sioutas, Dimitrios Sofotassios, Kostas Tsichlas, Dimitrios Sotiropoulos, Panayiotis Vlamos. Canonical Polygon Queries on the Plane: A New Approach

Volume 4, Issue 8

689 -- 690Carlos Alberto Ochoa Ortíz Zezzatti, Alejandro Padilla. Guest Editorial
691 -- 696Humberto Ochoa, Osslan Osiris Vergara-Villegas, Vianey Guadalupe Cruz Sánchez, Efrén Gútierrez. A Hybrid System Based on a Filter Bank and a Successive Approximations Threshold for Microcalcifications Detection
697 -- 704Jose Mireles, Frank L. Lewis, Roberto C. Ambrosio, Edgar Martínez. Development of a Discrete Event Controller Supervisor using a Hybrid Matrix Formulation with Fuzzy Logic Conflict Resolution
705 -- 712Ricardo Mendoza González, Miguel Vargas Martin, Jaime Muñoz Arteaga, Francisco Álvarez Rodríguez, Carlos Alberto Ochoa Ortíz Zezzatti. Web Service-Security Specification based on Usability Criteria and Pattern Approach
713 -- 720Alberto Ochoa, Angel Eduardo Muñoz Zavala, Arturo Hernández Aguirre. A Hybrid System Approach to Determine the Ranking of a Debutant Country in Eurovision
721 -- 726Rodolfo A. Pazos, José A. Martínez Flores, Javier González B., María Lucila Morales-Rodríguez, Alberto Castro H.. Semi-automatic Generation of Subcategorization Frames for Spanish Verbs Using Ontologies and Verbs Functional Class
727 -- 733Claudia Gómez Santillán, Laura Cruz Reyes, Eustorgio Meza Conde, Tania Turrubiates López, Marco Antonio Aguirre Lam, Satu Elisa Schaeffer. Improving Distributed Resource Search through a Statistical Methodology of Topological Feature Selection
734 -- 737Simonné Suarent, Alberto Ochoa, S. Jöns, Fernando Montes, Alessandra Spianetta. Evolving Optimization to Improve Diorama s Representation using a Mosaic Image
738 -- 741Alberto Ochoa, Julio Ponce, Arturo Hernández, Liang Li. Resolution of a Combinatorial Problem using Cultural Algorithms
742 -- 746Alberto Ochoa, Saúl González, Cynthia Esquivel, Girolama Matozzi, Abigaíl Maffucci. Musical Recommendation on Thematic Web Radio
747 -- 754Junfeng Man, Zhicheng Wen, Changyun Li, Xiangbing Wen. Research on Running Time Behavior Analyzing and Trend Predicting of Modern Distributed Software
755 -- 762Peng Yang, Qingsheng Zhu, Xun Zhong. Subtractive Clustering Based RBF Neural Network Model for Outlier Detection
763 -- 770Muwei Jian, Haoyan Guo, Lei Liu. Texture Image Classification Using Visual Perceptual Texture Features and Gabor Wavelet Features
771 -- 777Kaushik Deb, Hyun-Uk Chae, Kang-Hyun Jo. Vehicle License Plate Detection Method Based on Sliding Concentric Windows and Histogram
778 -- 786Weihui Dai, Xingyun Dai, Tao Sun. A Smart Targeting System for Online Advertising
787 -- 793Yuhua Zhang, Longhua Qian, Qiang Lv, Peide Qian, Shengchao Guo. A Practical Dynamic Frequency Scaling Solution to DPM in Embedded Linux Systems

Volume 4, Issue 7

567 -- 575Arash Azizi Mazreah, Mohammad Taghi Manzuri, Ali Mehrparvar. A High Density and Low Power Cache Based on Novel SRAM Cell
576 -- 584Wen-Shyong Yu. H∞ Tracking Performance Design for Fuzzy-Model-Based Descriptor Systems Subject to Parameter Uncertainties
585 -- 592Jian Shu, Ronglei Zhang, Linlan Liu, Zhenhua Wu, Zhiping Zhou. Cluster-based Three-dimensional Localization Algorithm for Large Scale Wireless Sensor Networks
593 -- 600Naotoshi Sugano, Shou Komatsuzaki, Hiroyuki Ono, Yuko Chiba. Fuzzy Set Theoretical Analysis of Human Membership Values on the Color Triangle
601 -- 609Suhyeon Kim, Hyungrae Kim, Tae-Kyu Yang. Increasing SLAM Performance by Integrating Grid and Topology Map
615 -- 622Xinghao Jiang, Tanfeng Sun, Bin Chen, Rongjie Li, Bing Feng. A Novel Video Content Understanding Scheme Based on Feature Combination Strategy
623 -- 630Adalet N. Abiyev. A New Signal Processing based Method for Reactive Power Measurements
631 -- 640Hidehisa Takamizawa, Kazuhiro Saji, Masayoshi Aritsugi. A Replica Management Protocol in a Binary Balanced Tree Structure-Based P2P Network
641 -- 645Mohammed Blej, Mostafa Azizi. Modeling and Analysis of a Real-Time System Using the Networks of Extended Petri
646 -- 653Jun Zhang, Yuping Hu, Zhibin Yuan. Detection of LSB Matching Steganography using the Envelope of Histogram
654 -- 662Samer Younes, Ramzi A. Haraty. An Enhanced Quorum Selection Algorithm
663 -- 669Kirsi Helkala, Einar Snekkenes. Password Generation and Search Space Reduction
670 -- 680Alan McCabe, Jarrod Trevathan. Handwritten Signature Verification Using Complementary Statistical Models
681 -- 688Hongwei Li, Rui Li, Fasong Wang. Multiresolution Subband Blind Source Separation: Models and Methods

Volume 4, Issue 6

433 -- 435Li Ming, Mingwen Wang, Deng Yi Zhang, Chin-Chen Chang, Fei Yu. Editorial
436 -- 443Liyi Zhang, Mingzhu Zhu, Wei Huang. A Framework for an Ontology-based E-commerce Product Information Retrieval System
444 -- 452Jiguo Li, Lizhong Xu, Yichen Zhang. Provably Secure Certificate-based Proxy Signature Schemes
453 -- 460Zhixin Sun, Lin Jiao. Research of Intelligent Rule-base Based on Multilayer Intrusion Detection
461 -- 468Yuanzhuo Wang, Chuang Lin, Kun Meng, Junjie Lv. Analysis of Attack Actions for E-Commerce Based on Stochastic Game Nets Model
469 -- 476Han Zhu. Axiomatic Systems for the Bisimilarity on Finite Fair Ambient Processes
477 -- 484Peng Zhao, Dawei Wang, Ming Yan, Sikun Li. Parallel Processing of Sequential Media Algorithms on Heterogeneous Multi-Processor System-on-Chip
485 -- 493Yuxiang Dong, Yunni Xia, Qingsheng Zhu, Ruilong Yang. A Stochastic Approach to Predicting Performance of Web Service Composition
494 -- 501Huanchun Peng, Jun Gu, Xiaojun Ye. Towards Compliance and Accountability: a Framework for Privacy Online
502 -- 509Tongyang Wang, Pengfei Yu, Jun-jun Wu, Xin-long Ma. Research on On-card Bytecode Verifier for Java Cards
510 -- 518Ran Yang, Chuang Lin, Fujun Feng. A Time and Mutable Attribute-Based Access Control Model
519 -- 526Yefei Zhao, Zong-yuan Yang, Jinkui Xie, Qiang Liu. Formal Model and Analysis of Sliding Window Protocol Based on NuSMV
527 -- 534Qihai Zhou, Yujun Li, Zhuma Pudu, Xun Lin. China s E-business Model Innovation Analysis
535 -- 541Mehdi Eghbal, Naoto Yorino, Yoshifumi Zoka. Comparative Study on the Application of Modern Heuristic Techniques to SVC Placement Problem
542 -- 553Justin L. Rice, Khalid H. Abed, Gerald R. Morris. Design Heuristics for Mapping Floating-Point Scientific Computational Kernels onto High Performance Reconfigurable Computers
554 -- 566Evelyn Brannock, Michael Weeks, Robert Harrison. The Effect of Wavelet Families on Watermarking

Volume 4, Issue 5

355 -- 356Luca Spalazzi, Ratan Guha. Editorial
357 -- 365Matthias Becker, Martin Drozda, Sven Schaust, Sebastian Bohlmann, Helena Szczerbicka. On Classification Approaches for Misbehavior Detection in Wireless Sensor Networks
366 -- 377Massimo Benerecetti, Nicola Cuomo, Adriano Peron. TPMC: A Model Checker For Time-Sensitive Security Protocols
378 -- 386Massimo Bernaschi, Mauro Bisson, Emanuele Gabrielli, Simone Tacconi. An Architecture for Distributed Dictionary Attacks to Cryptosystems
387 -- 394Angelo Biscotti, Gianluca Capuzzi, Egidio Cardinale, Francesco Pagliarecci, Luca Spalazzi. An IPS for Web Applications
395 -- 404Jérémy Briffaut, Jean-François Lalande, Christian Toinard. Security and Results of a Large-Scale High-Interaction Honeypot
405 -- 414Jianyong Dai, Ratan K. Guha, Joohan Lee. Efficient Virus Detection Using Dynamic Instruction Sequences
415 -- 422Joni Hahkala, Henri Mikkonen, Mika Silander, John White. A Pseudonymity System for Grids
423 -- 432Mathieu Blanc, Patrice Clemente, Jonathan Rouzaud-Cornabas, Christian Toinard. Classification of Malicious Distributed SELinux Activities

Volume 4, Issue 4

283 -- 287Prechanon Kumkratug. Application of UPFC to Increase Transient Stability of Inter-Area Power System
288 -- 294Ye Li, Barbara J. Lence, Sander M. Calisal. Modeling the Energy Output from an In-Stream Tidal Turbine Farm
295 -- 302Qian Zhang, Yong-Fei Zhang, Shi-Yin Qin. Modeling and Analysis for Obstacle Avoidance of a Behavior-Based Robot with Objected Oriented Methods
303 -- 310Mário J. G. C. Mendes, Bruno M. S. Santos, José Sá da Costa. Multi-agent Platform and Toolbox for Fault Tolerant Networked Control Systems
311 -- 318Thomas M. Hemmerling, Samer Charabati, Emile Salhab, David Bracco, Pierre A. Mathieu. The Analgoscore: A Novel Score to Monitor Intraoperative Nociception and its Use for Closed-Loop Application of Remifentanil
319 -- 329Alexander M. Yemelyanov. Modeling and Decision Support for Analysis of Operator Errors in Complex Systems
330 -- 337Jinyue Zhang. SSWP: A Social Semantic Web Portal for Effective Communication in Construction
338 -- 346Chen-Wei Lin, Jiun-Lang Huang. A Charge-Sensing-Capable Source Driver for TFT Array Testing in System-on-Panel Displays
347 -- 354Wenzhong Gao, Xi Chen. Distributed Generation Placement Design and Contingency Analysis with Parallel Computing Technology

Volume 4, Issue 3

177 -- 178Qi Luo, Ben K. M. Sim. Editorial
179 -- 183Weixiang Wang, Youlin Shang. A New T-F Function Approach for Discrete Global Optimization
184 -- 192Bo Meng. A Formal Logic Framework for Receipt-freeness in Internet Voting Protocol
193 -- 200Wang Chu, Depei Qian. Design Web Services: Towards Service Reuse at the Design Level
201 -- 207Youyao Liu, Jungang Han, Huimin Du. DL(2m): A New Scalable Interconnection Network for System-on-Chip
208 -- 214Ling Chen, Lingjun Zou, Li Tu. Stream Data Classification Using Improved Fisher Discriminate Analysis
215 -- 221Xinsheng Zhang, Xinbo Gao, Ying Wang. MCs Detection with Combined Image Features and Twin Support Vector Machines
222 -- 229Wei-Peng Liu, Jun Hu, Xing Zhang. A Novel Secure Terminal System Based on Trusted Hardware: U-Key
230 -- 237Yong Zhou, Youwen Li, Shixiong Xia. An Improved KNN Text Classification Algorithm Based on Clustering
238 -- 244Yan Liu, Renfa Li, Cheng Xu, Fei Yu. HW-SW Framework for Multimedia Applications on MPSoC: Practice and Experience
245 -- 250Jingtao Sun, Qiuyu Zhang, Zhanting Yuan. Application of Refined LSA and MD5 Algorithms in Spam Filtering
251 -- 258Xianfang Wang, Zhiyong Du, Jindong Chen, Feng Pan. Dynamic Modeling of Biotechnical Process Based on Online Support Vector Machine
259 -- 264Xiaoqiang Yang, Huimin Du, Jungang Han. Topology and Routing Algorithm Based on the Combination Gray Code with Johnson Code
265 -- 270Peide Liu, Zhongliang Guan. Evaluation Research on the Quality of the Railway Passenger Service Based on the Linguistic Variables and the Improved PROMETHEE-II Method
271 -- 275Pei-yu Liu, Li-Wei Zhang, Zhen-fang Zhu. Research on E-mail Filtering Based On Improved Bayesian
276 -- 282Yongqing Wei, Peide Liu. Risk Evaluation Method of High-technology Based on Uncertain Linguistic Variable and TOPSIS Method

Volume 4, Issue 2

103 -- 111Feng Xia, Longhua Ma, Wenhong Zhao, Youxian Sun, Jinxiang Dong. Enhanced Energy-Aware Feedback Scheduling of Embedded Control Systems
112 -- 118Yi-Shiung Yeh, Ting-Yu Huang, Han-Yu Lin, Yu-Hao Chang. A Study on Parallel RSA Factorization
119 -- 126Mohammad Hossein Moaiyeri, Reza Faghih Mirzaee, Keivan Navi. Two New Low-Power and High-Performance Full Adders
127 -- 134Chiang S. Jao, Cathy M. Helgason, Donna A. Zych. Implementing a Computerized Charge Capture System to Improve Billing Work Flow and Reduce Errors in Data Entry
135 -- 146Asli Çelikyilmaz, I. Burhan Türksen. A Genetic Fuzzy System Based On Improved Fuzzy Functions
147 -- 153Hazem M. Abbas. System Identification Using Optimally Designed Functional Link Networks via a Fast Orthogonal Search Technique
154 -- 159V. Amudha, B. Venkataramani, R. Vinoth Kumar, S. Ravishankar. Software/Hardware Co-design of HMM Based Speaker Independent Isolated Digit Recognition System
160 -- 167Zhangjun Huang, Chengen Wang, Mingxu Ma. A Robust Archived Differential Evolution Algorithm for Global Optimization Problems

Volume 4, Issue 12

1187 -- 1187Jinrong Zhu. Guest Editorial
1188 -- 1194Dongxiao Niu, Jianjun Wang. Combination of Text Mining and Corrective Neural Network in Short-term Load Forecasting
1195 -- 1201Jicheng Ding, Lin Zhao, Weiquan Huang. Design of a General Single Frequency GPS Receiver Research Platform for High Dynamic and Weak Signal
1202 -- 1208Yazao Yang, Wenzhou Jin, Xiaoni Hao. Dynamic Pool Segmentation Model and Algorithm in the Car Rental Industry
1209 -- 1215Yongxiu He, Weihong Yang, Yu Zhang, Dezhi Li, Furong Li. Urban Electric Load Forecasting Using Combined Cellular Automata
1216 -- 1222Xiaochu Liu, Qitao Huang, Dacheng Cong, Junwei Han, Lin Xiao. Analysis of Performance Effect Factors of Three-Stage Electro-Hydraulic Servo Valve
1223 -- 1230Hua Jiang, Junhu Ruan. The Application of Genetic Neural Network in Network Intrusion Detection
1231 -- 1236Jinrong Zhu. A Modified Particle Swarm Optimization Algorithm
1237 -- 1242Liu-Juan Zhu, Wen-Zhong Cai, Shan-Tung Tu. Computational Micromechanics of Particle-reinforced Composites: Effect of Complex Three-dimensional Microstructures
1243 -- 1248Lin Xu, Xiaoming Wu, Yanru Zhang, Hengxin Yuan. The Optimization Study on Time Sequence of Enhanced External Counter-Pulsation in AEI-CPR
1249 -- 1254Jun Yuan, Yongchao Zhu, Minzhe Wu. Vibration Characteristics and Effectiveness of Floating Slab Track System
1255 -- 1262Douglas R. Isenberg, Y. P. Kakad. Simulating the Effects of a Non-Uniform Gravitational Field on a Space Robot
1263 -- 1274Mohammad Masumuzzaman Bhuiyan, Abu Sayed Md. Latiful Hoque. High Performance SQL Queries on Compressed Relational Database
1275 -- 1285Carlos E. Otero, Antonio Velazquez, Ivica Kostanic, Chelakara Subramanian, Jean-Paul Pinelli, Larry Buist. Real-Time Monitoring of Hurricane Winds using Wireless and Sensor Technology
1286 -- 1293Hicham Hihi. Structural Controllability of Switching Linear Systems
1294 -- 1300Wei Pan, Guowei Hua, Lean Yu, Jinlong Zhang, Gang Xie, Shouyang Wang. Determining Optimal Selling Price, Order Size and the Number of Price Changes with Weibull Distribution Deterioration
1301 -- 1308Xu Xu, Jie Lin. A Novel Time Advancing Mechanism for Agent-Oriented Supply Chain Simulation
1309 -- 1321Jimmie Wiklander, Jens Eliasson, Andrey Kruglyak, Per Lindgren, Johan Nordlander. Enabling Component-Based Design for Embedded Real-Time Software
1322 -- 1331Lanfranco Lopriore. Key-Lock Mechanisms for Object Protection in Single-Address-Space Systems
1332 -- 1339Zhengbing Hu, Kai Du. Towards High Availability and Performance Database Clusters for Archived Stream

Volume 4, Issue 11

1073 -- 1074Qi Luo, Ben K. M. Sim. Guest Editorial
1075 -- 1082Lin Sun, Hongjun Xiao, Shouju Li, Dequan Yang. Forecasting Fish Stock Recruitment and Planning Optimal Harvesting Strategies by Using Neural Network
1083 -- 1090Chunguang Wang, Jingfeng He, Guixian Li, Junwei Han. An Automated Test System for Flight Simulator Fidelity Evaluation
1091 -- 1100Shubo Liu, Jing Sun, ZhengQuan Xu. An Improved Image Encryption Algorithm based on Chaotic System
1101 -- 1108Ickjai Lee, Kyungmi Lee, Christopher Torpelund-Bruin. Voronoi Image Segmentation and Its Applications to Geoinformatics
1109 -- 1116Li Yang, Malin Song. Formation Mechanism of Green Strategic Alliances and Its Cooperative System for Coal-Mining Eco-Industrial Parks Based on Synthetic Decision Support System
1117 -- 1124Jimin Li, Zhen Li, Kunlun Li. Detection and Classification of Non-self Based on System Call Related to Security
1125 -- 1132Jiaxin Li, Feng Shi, Ning Deng, Qi Zuo, Zuo Wang, Mengxiao Liu. Intelligent Trace and Evaluation for Parallel Programming Based on Architectural Details
1133 -- 1138Minqiang Pan, Dehuai Zeng, Yong Tang, Dongqing Chen. CFD-based Study of Velocity Distribution among Multiple Parallel Microchannels
1139 -- 1144Zhibin Liu, Haifen Yang, Shaomei Yang. Integration of Multi-layer SVM Classifier and Multistage Dynamic Fuzzy Judgement and Its Application in SCDA Measurement
1145 -- 1150Shaomei Yang, Donglei Liu, Zhibin Liu. Evaluating the Network and Information System Security Based on SVM Model
1151 -- 1158Zhi-Hua Hu. A Hybrid System Based on Neural Network and Immune Co-Evolutionary Algorithm for Garment Pattern Design Optimization
1159 -- 1166Chunlai Chai. Efficient Intelligent Localization Scheme for Distributed Wireless Sensor Networks
1167 -- 1174Gang Liu, Wei Chen, Jun Guo. A Research on Mixture Splitting for CHMM Based on DBC
1175 -- 1181Rongdi Yuan, Huizong Feng, Ming Cen. Modeling and Simulation of Crush Natural Gas Turbo Engine
1182 -- 1186Yanduo Zhang, Kun Wang. The Application of Liquid State Machines in Robot Path Planning

Volume 4, Issue 10

921 -- 926Kureshi Abdul Kadir, Mohd. Hasan. DTMOS Based Low Power High Speed Interconnects for FPGA
927 -- 942Muhammad Yasir Qadri, Hemal S. Gujarathi, Klaus D. McDonald-Maier. Low Power Processor Architectures and Contemporary Techniques for Power Optimization - A Review
943 -- 953Ryotaro Kamimura. Feature Discovery by Information Loss
954 -- 961László Horváth, Imre J. Rudas. Human Intent Representation in Knowledge Intensive Product Model
962 -- 974Toshiro Kubota. Designs of Second-Order Associated Memory Networks with Threshold Logics: Winner-Take-All and Selective Voting
975 -- 980Kristopher M. Thornburg, Geb W. Thomas. Robotic Exploration Utility for Urban Search and Rescue Tasks
981 -- 996Jose R. Celaya, Alan A. Desrochers, Robert J. Graves. Modeling and Analysis of Multi-agent Systems using Petri Nets
997 -- 1004Mamoru Yoshida, Hirokazu Tatano. Payment Plan for the Delegation of One or Two Inspection Agencies
1005 -- 1011Ming-Yih Lee, Kok Soon Soon, Chih-Feng Lin. New Computer Protocol with Subsensory Stimulation and Visual/Auditory Biofeedback for Balance Assessment in Amputees
1012 -- 1021Yukio Ohsawa, Yusuke Maeda. Eyes Draw Auxiliary Lines in Interpreting Images
1022 -- 1032Qing Wu, Mehrdad Saif. Model-based Robust Fault Diagnosis for Satellite Control Systems Using Learning and Sliding Mode Approaches
1033 -- 1042Marek Makowski. Management of Attainable Tradeoffs between Conflicting Goals
1043 -- 1052John T. Boardman, Brian J. Sauser, Dinesh Verma. In Search of Systems DNA
1053 -- 1063Sinan Kockara, Tansel Halic, Coskun Bayrak, K. Iqbal, Richard Rowe. Contact Detection Algorithms
1064 -- 1071Haijun Zhang, Jingjun Zhang, Ruizhen Gao. A Novel Method of Phase Current Compensation for Switched Reluctance Motor System Based on Finite Element

Volume 4, Issue 1

1 -- 2Fei Yu, Chin-Chen Chang, Ben M. Chen, Jian Shu, Guangxue Yue. Editorial
3 -- 10Qian Zhao, Tianjie Cao. Collecting Sensitive Information from Windows Physical Memory
11 -- 18Chih-Chien Wang, Chun-An Chen, Jui-Chin Jiang. The Impact of Knowledge and Trust on E-Consumers Online Shopping Activities: An Empirical Study
19 -- 26Yang Lu, Jiguo Li, Junmo Xiao. Constructing Efficient Certificate-based Encryption with Paring
27 -- 34Shu Chen, Guo Qing Wu. Modeling and Analysis of Workflow Based on TLA
35 -- 44Yun Wu, Yong Zhao, Ling Shen. The Analysis and Design of Nearly-Orthogonal Symmetric Wavelet Filter Banks
45 -- 52Suying Yang, Jianzhe Tai, Cheng Shao. Dynamic Partition of Elevator Group Control System with Destination Floor Guidance in Up-peak Traffic
53 -- 60Xiaojun Jia, Guangxue Yue, Fang Mei. The Mathematical Model and Applications of Coded Structured Light System for Object Detecting
61 -- 68Tianjie Cao, Shi Huang, Hui Cui, Yipeng Wu, Qihan Luo. Controlled Secret Leakage
69 -- 76Zhibin Liu, Xiangsong Meng. Integration of Improved BPNN Algorithm and Multistage Dynamic Fuzzy Judgement and Its Application on ESMP Evaluation
77 -- 85Dawei Wang, Peng Zhao, Sikun Li. System Level Distributed Cooperative Design of Media SoC Using Application Profiling
86 -- 93Guang Zheng, Lian Li, Wenbo Chen, Anping He, Jinzhao Wu. Process Algebra with Chaos Executing Policy for Unhealthy Systems
94 -- 101Bangzuo Zhang, WanLi Zuo. Reliable Negative Extracting Based on kNN for Learning from Positive and Unlabeled Examples