1317 | -- | 1324 | Po-Hsueh Huang, Yin-Te Tsai, Chuan Yi Tang. A Near-Quadratic Algorithm for the Alpha-Connected Two-Center Problem |
1325 | -- | 1338 | Ying-Hong Wang, Hung-Zu Lin. Multipath QoS Routing with Interference Provision in Ad Hoc Wireless Network |
1339 | -- | 1353 | Tyne Liang, Jian-Shin Chen. Multi-class Named Entities Extraction from Biomedical Literature |
1355 | -- | 1366 | Leena Lulu, Ashraf Elnagar. Efficient and Complete Coverage of 2D Environments by Connectivity Graphs for Motion Planning Algorithms |
1367 | -- | 1387 | Cheng-Jian Lin. Wavelet Neural Networks with a Hybrid Learning Approach |
1389 | -- | 1407 | Chih-Hung Wang. Practical Constructions to Multiple Designated Confirmer Signatures |
1409 | -- | 1425 | Ming-I Hsieh, Eric Hsiao-Kuang Wu, Meng-Feng Tsai. FasterDSP: A Faster Approximation Algorithm for Directed Steiner Tree Problem |
1427 | -- | 1445 | Yi-Chung Chen, Jang-Ping Sheu. Interest-Based Lookup Protocols for Mobile Ad Hoc Networks |
1447 | -- | 1464 | Ill-Young Weon, Doo Heon Song, Chang-Hoon Lee. Effective Intrusion Detection Model through the Combination of a Signature-based Intrusion Detection System and a Machine Learning-based Intrusion Detection System |
1465 | -- | 1483 | Sejong Oh, Changwoo Byun, Seog Park. An Organizational Structure-Based Administration Model for Decentralized Access Control |
1485 | -- | 1504 | Hoijin Yoon, Byoungju Choi. The Context Driven Component Supporting the Context Adaptation and the Content Extension |
1505 | -- | 1518 | Sang Uk Shin. An Efficient Sealed-Bid Auction Protocol with Two Servers |
1519 | -- | 1527 | Pei-Yi Chen, Arbee L. P. Chen. Similarity-based Motion Track Management for Video Retrieval |
1529 | -- | 1542 | Yalçin Isik, Necmi Taspinar. The Multi-User Detection in Code Division Multiple Access with Adpative Neuro-Fuzzy Inference System |
1543 | -- | 1554 | Jong Wook Kwak, Chu Shik Jhon. Adaptive Multi-Grain Remote Access Cache in Ring Based NUMA System |
1555 | -- | 1568 | Adem Kalinli, Seref Sagiroglu. Elman Network with Embedded Memory for System Identification |
1569 | -- | 1583 | Said E. El-Khamy, M. M. Hadhoud, Moawad I. Dessouky, B. M. Salam, Fathi E. Abd El-Samie. Efficient Solutions for Image Interpolation Treated as an Inverse Problem |
1585 | -- | 1599 | Chia-Chun Tsai, Hann-Cheng Huang, Trong-Yen Lee, Wen-Ta Lee, Jan-Ou Wu. Using Stack Reconstruction on RTL Orthogonal Scan Chain Design |
1601 | -- | 1610 | Ching-Han Chen, Chia Te Chu, Jia-Hong Dai, Chih-Yung Chen. Multiple Facial Features Representation for Real-Time Face Recognition |