1 | -- | 17 | Yi-Hsuan Lin, Tung-Mei Ko, Tyng-Ruey Chuang, Kwei-Jay Lin. Open Source Licenses and the Creative Commons Framework: License Selection and Comparison |
19 | -- | 29 | Wen-Dar Lin, Yun-Ching Chen, Jan-Ming Ho, Chung-Der Hsiao. GOBU: Toward an Integration Interface for Biological Objects |
31 | -- | 47 | Nei-Chiung Perng, Chin-Shuang Liu, Tei-Wei Kuo. Real-Time Linux with Budget-Based Resource Reservation |
49 | -- | 61 | Cungang Yang, Chang N. Zhang. An Approach to XML-Based Administration and Secure Information Flow Analysis on an Object Oriented Role-Based Access Control Model |
63 | -- | 94 | Wei-Horng Yeh, Ye-In Chang. An Efficient Signature Extraction Method for Image Similarity Retrieval |
95 | -- | 121 | Min-Hsuan Fan, Chua-Huang Huang, Yeh-Ching Chung, Jen-Shiuh Liu, Jei-Zhii Lee. A Programming Methodology for Designing Block Recursive Algorithms |
123 | -- | 146 | Yin-Fu Huang, Chao-Nan Chen. Implementation for the Arrangement and Mining Analysis of Travel Schedules |
147 | -- | 161 | Shih-Chien Chou. MRBAC/AR: an Information Flow Control Model to Prevent Both Intra- and Inter-Application Information Leakage |
163 | -- | 174 | Chih-Yang Lin, Yu-Tai Ching. A Robust Image Hiding Method Using Wavelet Technique |
175 | -- | 188 | Shyi-Ming Chen, Hao-Lin Lin. Generating Weighted Fuzzy Rules from Training Instances Using Genetic Algorithms to Handle the Iris Data Classification Problem |
189 | -- | 198 | Tzu-Chao Lin, Pao-Ta Yu. Salt-Pepper Impulse Noise Detection and Removal Using Multiple Thresholds for Image Restoration |
199 | -- | 213 | Ming-Hua Wang, Huan-Chao Keh, Nan-Chen Hsieh, Tsong-Sheng Wang. A Study of Disjunctive Information in Fuzzy Relational Databases |
215 | -- | 227 | Jong Wook Kwak, Cheol Hong Kim, Sung-Hoon Shim, Chu Shik Jhon. Advanced High-Level Cache Management by Processor Access Information |