Abstract is missing.
- An Improved Particle Swarm Optimizer for Truss Structure OptimizationLijuan Li, Zhibin Huang, Feng Liu. 1-10 [doi]
- Two-Phase Quantum Based Evolutionary Algorithm for Multiple Sequence AlignmentHongwei Huo, Vojislav Stojkovic. 11-21 [doi]
- A Further Discussion on Convergence Rate of Immune Genetic Algorithm to Absorbed-StateXiaoping Luo, Wenyao Pang, Ji Huang. 22-28 [doi]
- Linear Programming Relax-PSO Hybrid Bound Algorithm for a Class of Nonlinear Integer Programming ProblemsYuelin Gao, Chengxian Xu, Jimin Li. 29-35 [doi]
- An Improved Ant Colony System and Its ApplicationXiangpei Hu, Qiulei Ding, Yongxian Li, Dan Song. 36-45 [doi]
- Molecular Diagnosis of Tumor Based on Independent Component Analysis and Support Vector MachinesShulin Wang, Huowang Chen, Ji Wang, Dingxing Zhang, Shutao Li. 46-56 [doi]
- Gene Selection Using Wilcoxon Rank Sum Test and Support Vector Machine for Cancer ClassificationChen Liao, Shutao Li, Zhiyuan Luo. 57-66 [doi]
- General Particle Swarm Optimization Based on Simulated Annealing for Multi-specification One-Dimensional Cutting Stock ProblemXianjun Shen, Yuanxiang Li, Bojin Zheng, Zhifeng Dai. 67-76 [doi]
- Neurodynamic Analysis for the Schur Decomposition of the Box ProblemsQuanju Zhang, Fuye Feng, Zhenghong Wei. 77-86 [doi]
- A New Model Based Multi-objective PSO AlgorithmJingxuan Wei, Yuping Wang. 87-94 [doi]
- A New Multi-objective Evolutionary Optimisation Algorithm: The Two-Archive AlgorithmKata Praditwong, Xin Yao. 95-104 [doi]
- Labeling of Human Motion by Constraint-Based Genetic AlgorithmFu Yuan Hu, Hau-San Wong, Zhi-Qiang Liu, Hui-yang Qu. 105-114 [doi]
- Genetic Algorithm and Pareto Optimum Based QoS Multicast Routing Scheme in NGIXingwei Wang, Pengcheng Liu, Min Huang. 115-122 [doi]
- A Centralized Network Design Problem with Genetic Algorithm ApproachGengui Zhou, Zhenyu Cao, Jian Cao, Zhiqing Meng. 123-132 [doi]
- CGA: Chaotic Genetic Algorithm for Fuzzy Job Scheduling in Grid EnvironmentDan Liu, Yuanda Cao. 133-143 [doi]
- Population-Based Extremal Optimization with Adaptive Lévy Mutation for Constrained OptimizationMin-Rong Chen, Yong-Zai Lu, GenKe Yang. 144-155 [doi]
- An Analysis About the Asymptotic Convergence of Evolutionary AlgorithmsLixin Ding, Jinghu Yu. 156-166 [doi]
- Seeker Optimization AlgorithmChaohua Dai, Yunfang Zhu, Weirong Chen. 167-176 [doi]
- Game Model Based Co-evolutionary Algorithm and Its Application for Multiobjective Nutrition Decision Making Optimization ProblemsGaoping Wang, Liyuan Bai. 177-183 [doi]
- A Novel Optimization Strategy for the Nonlinear Systems IdentificationXin Tan, Huaqian Yang. 184-190 [doi]
- A New Schema Survival and Construction Theory for One-Point CrossoverLiang Ming, Yuping Wang. 191-201 [doi]
- Adaptive Parallel Immune Evolutionary StrategyCheng Bo, Zhenyu Guo, Binggang Cao, Junping Wang. 202-208 [doi]
- About the Time Complexity of Evolutionary Algorithms Based on Finite Search SpaceLixin Ding, Yingzhou Bi. 209-219 [doi]
- New Radial Basis Function Neural Network Training for Nonlinear and Nonstationary SignalsSeng Kah Phooi, Ang L. M. 220-230 [doi]
- Structure-Based Rule Selection Framework for Association Rule Mining of Traffic Accident DataRangsipan Marukatat. 231-239 [doi]
- A Multi-classification Method of Temporal Data Based on Support Vector MachineZhiqing Meng, Lifang Peng, Gengui Zhou, Yihua Zhu. 240-249 [doi]
- Towards a Management Paradigm with a Constrained Benchmark for Autonomic CommunicationsFrank Chiang, Robin Braun. 250-258 [doi]
- A Feature Selection Algorithm Based on Discernibility MatrixFuyan Liu, Shaoyi Lu. 259-269 [doi]
- Using Hybrid Hadamard Error Correcting Output Codes for Multi-class Problem Based on Support Vector MachinesShilei Huang, Xiang Xie, Jingming Kuang. 270-276 [doi]
- Range Image Based Classification System Using Support Vector MachinesSeyed Eghbal Ghobadi, Klaus Hartmann, Otmar Loffeld, Wolfgang Weihs. 277-287 [doi]
- Two Evolutionary Methods for Learning Bayesian Network StructuresAlain Delaplace, Thierry Brouard, Hubert Cardot. 288-297 [doi]
- Fuzzy Q-Map Algorithm for Reinforcement LearningYoungAh Lee, SeokMi Hong. 298-307 [doi]
- Spatial Data Mining with UncertaintyBinbin He, Cuihua Chen. 308-316 [doi]
- Locally Weighted LS-SVM for Fuzzy Nonlinear Regression with Fuzzy Input-OutputDug Hun Hong, Changha Hwang, Joo Yong Shim, Kyung Ha Seok. 317-325 [doi]
- Learning SVM with Varied Example Cost: A ::::k:::: NN Evaluating ApproachChan-Yun Yang, Che-Chang Hsu, Jr-Syu Yang. 326-335 [doi]
- Using Evolving Agents to Critique Subjective Music CompositionsChuen-Tsai Sun, Ji-Lung Hsieh, Chung-Yuan Huang. 336-346 [doi]
- Multi-agent Coordination Schemas in Decentralized Production SystemsGang Li, Yongqiang Li, Linyan Sun, Ping Ji. 347-356 [doi]
- Ontology-Based RFID System Model for Supporting Semantic Consistency in Ubiquitous EnvironmentDongwon Jeong, Keunhwan Jeon, Jang-won Kim, Jinhyung Kim, Doo-Kwon Baik. 357-366 [doi]
- Multiagent Search Strategy for Combinatorial Optimization Problems in Ant ModelSeokMi Hong, SeungGwan Lee. 367-373 [doi]
- Secure and Efficient Trust NegotiationFuchun Guo, Zhide Chen, Yi Mu, Li Xu, Shengyuan Zhang. 374-384 [doi]
- Hardware/Software Co-design of a Secure Ubiquitous SystemMasa-Aki Fukase, Hiroki Takeda, Tomoaki Sato. 385-395 [doi]
- Efficient Implementation of Tate Pairing on a Mobile Phone Using JavaYuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto. 396-405 [doi]
- ID-Based ( ::::t:::: , ::::n:::: ) Threshold Proxy Signcryption for Multi-agent SystemsFagen Li, Yupu Hu, Shuanggen Liu. 406-416 [doi]
- A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation UnitJeaHoon Park, Hoon Jae Lee, JaeCheol Ha, YongJe Choi, Howon Kim, Sang-Jae Moon. 417-426 [doi]
- Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri s Message Authentication SchemeMun-Kyu Lee, Dowon Hong, Dong Kyue Kim. 427-434 [doi]
- Binary Sequences with Three and Four Level AutocorrelationYing Cai, Zhen Han. 435-442 [doi]
- Security Analysis of Public-Key Encryption Scheme Based on Neural Networks and Its ImplementingNiansheng Liu, Donghui Guo. 443-450 [doi]
- Enhanced Security Scheme for Managing Heterogeneous Server PlatformsJiho Kim, Duhyun Bae, Sehyun Park, Ohyoung Song. 451-459 [doi]
- A New Parallel Multiplier for Type II Optimal Normal BasisChang-Han Kim, Yongtae Kim, Sung Yeon Ji, IlWhan Park. 460-469 [doi]
- Identity-Based Key-Insulated Signature Without Random OraclesJian Weng, Shengli Liu, Kefei Chen, Changshe Ma. 470-480 [doi]
- Research on a Novel Hashing Stream CipherYong Zhang, Xiamu Niu, Juncao Li, Chun-ming Li. 481-490 [doi]
- Secure Password Authentication for Distributed ComputingSeung Wook Jung, Souhwan Jung. 491-501 [doi]
- A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgeryYu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen. 502-512 [doi]
- Ternary Tree Based Group Key Management in Dynamic Peer NetworksWei Wang, Jianfeng Ma, Sang-Jae Moon. 513-522 [doi]
- Practical Password-Based Authenticated Key Exchange ProtocolShuhua Wu, Yuefei Zhu. 523-533 [doi]
- XTR::: + :::: A Provable Security Public Key CryptosystemZehui Wang, Zhiguo Zhang. 534-544 [doi]
- Proxy Ring Signature: Formal Definitions, Efficient Construction and New VariantJin Li, Xiaofeng Chen, Tsz Hon Yuen, Yanming Wang. 545-555 [doi]
- Linkability Analysis of Some Blind Signature SchemesJianhong Zhang, Jian Mao. 556-566 [doi]
- An Efficient Device Authentication Protocol Using BioinformaticYoon-Su Jeong, Bong-Keun Lee, Sang Ho Lee. 567-575 [doi]
- Subjective and Objective Watermark Detection Using a Novel Approach - Barcode WatermarkingVidyasagar Potdar, Song Han, Elizabeth Chang, Chen Wu. 576-586 [doi]
- Forward Secure Threshold Signature Scheme from Bilinear PairingsJia Yu, Fanyu Kong, Rong Hao. 587-597 [doi]
- Low-Cost Authentication Protocol of the RFID System Using Partial IDYong-Zhen Li, Yoon-Su Jeong, Ning Sun, Sang Ho Lee. 598-604 [doi]
- A VLSI Implementation of Minutiae Extraction for Secure Fingerprint AuthenticationSung Bum Pan, Daesung Moon, Kichul Kim, Yongwha Chung. 605-615 [doi]
- Image-Adaptive Watermarking Using the Improved Signal to Noise RatioXinshan Zhu. 616-625 [doi]
- New Malicious Code Detection Based on N-Gram Analysis and Rough Set TheoryBoyun Zhang, Jianping Yin, Jingbo Hao, Shulin Wang, Dingxing Zhang. 626-633 [doi]
- An Efficient Watermarking Technique Using ADEW and CBWT for Copyright ProtectionGoo-Rak Kwon, Seung-Won Jung, Sung Jea Ko. 634-641 [doi]
- An Image Protection Scheme Using the Wavelet Coefficients Based on Fingerprinting TechniqueJin Wook Shin, Ju Cheng Yang, Sook Yoon, Dong-Sun Park. 642-651 [doi]
- iOBS3: An iSCSI-Based Object Storage Security SystemJianzhong Huang, Changsheng Xie, Xu Li. 652-660 [doi]
- An Efficient Algorithm for Clustering Search Engine ResultsHui Zhang, Bin Pang, Ke Xie, Hui Wu. 661-671 [doi]
- Network Anomalous Attack Detection Based on Clustering and ClassifierHongyu Yang, Feng Xie, Yi Lu. 672-682 [doi]
- Fair Reputation Evaluating Protocol for Mobile Ad Hoc NetworkZhu Lei, DaeHun Nyang, KyungHee Lee, Hyotaek Lim. 683-693 [doi]
- Multisensor Real-Time Risk Assessment Using Continuous-Time Hidden Markov ModelsKjetil Haslum, André Årnes. 694-703 [doi]
- A Load Scattering Algorithm for Dynamic Routing of Automated Material Handling SystemsAlex K. S. Ng, Janet Efstathiou, Henry Y. K. Lau. 704-713 [doi]
- Software Agents Action SecuritiesVojislav Stojkovic, Hongwei Huo. 714-724 [doi]
- A Key Distribution Scheme Based on Public Key Cryptography for Sensor NetworksXiaolong Li, Yaping Lin, Siqing Yang, Yeqing Yi, Jianping Yu, Xinguo Lu. 725-732 [doi]
- Collision-Resilient Multi-state Query Tree Protocol for Fast RFID Tag IdentificationJae-Min Seol, Seong-Whan Kim. 733-742 [doi]
- Toward Modeling Sensor Node Security Using Task-Role Based Access Control with TinySecMisun Moon, Dong Seong Kim, Jong Sou Park. 743-749 [doi]
- An Intelligent Digital Content Protection Framework Between Home Network Receiver DevicesQingqi Pei, Kefeng Fan, Jinxiu Dai, Jianfeng Ma. 750-757 [doi]
- An Efficient Anonymous Registration Scheme for Mobile IPv4Xuefei Cao, Weidong Kou, Huaping Li, Jie Xu. 758-766 [doi]
- An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless SecuritySeongHan Shin, Kazukuni Kobara, Hideki Imai. 767-777 [doi]
- An Efficient and Secure RFID Security Method with Ownership TransferKyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi. 778-787 [doi]
- Security and Privacy on Authentication Protocol for Low-Cost RFIDYong-Zhen Li, Young-Bok Cho, Nam-Kyoung Um, Sang Ho Lee. 788-794 [doi]
- Securing Overlay Activities of Peers in Unstructured P2P NetworksJun-Cheol Park, Geonu Yu. 795-805 [doi]
- Security Contexts in Autonomic SystemsKaiyu Wan, Vasu S. Alagar. 806-816 [doi]
- Knowledge Structure on Virus for User EducationMadihah Saudi, Nazean Jomhari. 817-823 [doi]
- An Efficient Anonymous Fingerprinting ProtocolYang Bo, Lin Piyuan, Zhang Wenzheng. 824-832 [doi]
- Senior Executives Commitment to Information Security - from Motivation to ResponsibilityJorma Kajava, Juhani Anttila, Rauno Varonen, Reijo Savola, Juha Röning. 833-838 [doi]
- A Hierarchical Key Distribution Scheme for Conditional Access System in DTV BroadcastingMengyao Zhu, Ming Zhang, Xiaoling Chen, Ding Zhang, Zhijie Huang. 839-846 [doi]
- Combining User Authentication with Role-Based Authorazition Based on Identity-Based SignatureJin Wang, Jia Yu, Daxing Li, Xi Bai, Zhongtian Jia. 847-857 [doi]
- Modeling and Simulation for Security Risk Propagation in Critical Information SystemsYoung-Gab Kim, Dongwon Jeong, Soo-Hyun Park, Jongin Lim, Doo-Kwon Baik. 858-868 [doi]
- Information Assurance Evaluation for Network Information SystemsXin Lü, Zhi Ma. 869-877 [doi]
- Simulation and Analysis of DDoS in Active Defense EnvironmentZhongwen Li, Yang Xiang, Dongsheng He. 878-886 [doi]
- Access Control and Authorization for Security of RFID Multi-domain Using SAML and XACMLDong Seong Kim, Taek-Hyun Shin, Byungil Lee, Jong Sou Park. 887-893 [doi]
- Generalization of the Selective-ID Security Model for HIBS ProtocolsJin Li, Xiaofeng Chen, Fangguo Zhang, Yanming Wang. 894-902 [doi]
- Discriminatively Learning Selective Averaged One-Dependence Estimators Based on Cross-Entropy MethodQing Wang, Chuan-hua Zhou, Bao-hua Zhao. 903-912 [doi]
- Image-Adaptive Spread Transform Dither Modulation Using Human Visual ModelXinshan Zhu. 913-923 [doi]
- Improvement of Film Scratch Inpainting Algorithm Using Sobel Based Isophote Computation over Hilbert Scan LineKi-Hong Ko, Seong-Whan Kim. 924-934 [doi]
- A Watershed Algorithmic Approach for Gray-Scale Skeletonization in Thermal Vein Pattern BiometricsLingyu Wang 0002, Graham Leedham. 935-942 [doi]
- Estimation of Source Signals Number and Underdetermined Blind Separation Based on Sparse RepresentationRonghua Li, Beihai Tan. 943-952 [doi]
- Edge Detection Based on Mathematical Morphology and Iterative ThresholdingXiangzhi Bai, Fugen Zhou. 953-962 [doi]
- Image Denoising Based on Wavelet Support Vector MachineShaoming Zhang, Ying Chen. 963-971 [doi]
- Variational Decomposition Model in Besov Spaces and Negative Hilbert-Sobolev SpacesMin Li, Xiangchu Feng. 972-982 [doi]
- Performance Analysis of Cooperative Hopfield Networks for Stereo MatchingWenHui Zhou, Zhiyu Xiang, WeiKang Gu. 983-990 [doi]
- An Improved Entropy Function and Chaos Optimization Based Scheme for Two-Dimensional Entropic Image SegmentationCheng Ma, Chengshun Jiang. 991-1000 [doi]
- Face Pose Estimation and Synthesis by 2D Morphable ModelLi Yingchun, Su Guangda. 1001-1008 [doi]
- Study of the Wavelet Basis SelectionsHua Cui, Guoxiang Song. 1009-1017 [doi]
- Feature Weighted Rival Penalized EM for Gaussian Mixture Clustering: Automatic Feature and Model Selections in a Single ParadigmYiu-ming Cheung, Hong Zeng. 1018-1028 [doi]
- Fingerprint Matching Using Invariant Moment FeaturesJu Cheng Yang, Jin Wook Shin, Dong-Sun Park. 1029-1038 [doi]
- Survey of Distance Measures for NMF-Based Face RecognitionYun Xue, Chong Sze Tong, Weipeng Zhang. 1039-1049 [doi]
- Weighted Kernel Isomap for Data Visualization and Pattern ClassificationRui-jun Gu, Wen-bo Xu. 1050-1057 [doi]
- DT-CWT Feature Combined with ONPP for Face RecognitionYuehui Sun, Minghui Du. 1058-1067 [doi]
- Precise Eye Localization with AdaBoost and Fast Radial SymmetryWencong Zhang, Hong Chen, Peng Yao, Bin Li, Zhenquan Zhuang. 1068-1077 [doi]
- Real-Time Expression Recognition System Using Active Appearance Model and EFMKyoung-Sic Cho, Yong-Guk Kim, Yang-Bok Lee. 1078-1084 [doi]
- Feature Extraction Using Histogram Entropies of Euclidean Distances for Vehicle ClassificationMing Bao, Luyang Guan, Xiaodong Li, Jing Tian, Jun Yang. 1085-1096 [doi]
- Full-Space LDA With Evolutionary Selection for Face RecognitionXin Li, Bin Li, Hong Chen, Xianji Wang, Zhenquan Zhuang. 1097-1105 [doi]
- Subspace KDA Algorithm for Non-linear Feature Extraction in Face IdentificationWen-Sheng Chen, Pong Chi Yuen, Jian-Huang Lai. 1106-1114 [doi]