Abstract is missing.
- POISE - Achieving Content-Based Picture Organisation for Image Search EnginesDa Deng, Heiko Wolf. 1-7 [doi]
- Estimation of the Hierarchical Structure of a Video Sequence Using MPEG-7 Descriptors and GCSMasoumeh D. Saberi, Sergio Carrato, Irena Koprinska, James Clark. 8-15 [doi]
- Using Relevance Feedback to Learn Both the Distance Measure and the Query in Multimedia DatabasesChotirat (Ann) Ratanamahatana, Eamonn J. Keogh. 16-23 [doi]
- Multi-level Semantic Analysis for Sports VideoDian Tjondronegoro, Yi-Ping Phoebe Chen. 24-30 [doi]
- Aerial Photograph Image Retrieval Using the MPEG-7 Texture DescriptorsSang Kim, Sung Baik, Yung Jo, Seungbin Moon, Dae Woong Rhee. 31-36 [doi]
- Yet Another Induction AlgorithmJiyuan An, Yi-Ping Phoebe Chen. 37-44 [doi]
- An Implementation of Learning Classifier Systems for Rule-Based Machine LearningAn-Pin Chen, Mu-Yen Chen. 45-54 [doi]
- Learning-by-Doing Through Metaphorical SimulationPedro Pablo Gómez-Martín, Marco Antonio Gómez-Martín, Pedro A. González-Calero. 55-64 [doi]
- Emergence of Immune Memory and Tolerance in an Asymmetric Idiotype NetworkKouji Harada. 65-71 [doi]
- Mutual Repairing System Using Immunity-Based Diagnostic Mobile AgentYuji Watanabe, Shigeyuki Sato, Yoshiteru Ishida. 72-78 [doi]
- A Network Self-repair by Spatial Strategies in Spatial Prisoner s DilemmaYoshiteru Ishida, Toshikatsu Mori. 79-85 [doi]
- A Critical Phenomenon in a Self-repair Network by Mutual CopyingYoshiteru Ishida. 86-92 [doi]
- A Worm Filter Based on the Number of Unacknowledged RequestsTakeshi Okamoto. 93-99 [doi]
- Comparison of Wavenet and Neuralnet for System ModelingSeda Postalcioglu, Kadir Erkan, Emine Dogru Bolat. 100-107 [doi]
- Neurone Editor: Modelling of Neuronal Growth with Synapse Formation for Use in 3D Neurone NetworksJohan Iskandar, John D. Zakis. 108-115 [doi]
- A Hybrid Decision Tree - Artificial Neural Networks Ensemble Approach for Kidney Transplantation Outcomes PredictionFariba Shadabi, Robert Cox, Dharmendra Sharma, Nikolai Petrovsky. 116-122 [doi]
- Performance Comparison for MLP Networks Using Various Back Propagation Algorithms for Breast Cancer DiagnosisS. Esugasini, Mohd. Yusoff Mashor, Nor Ashidi Mat Isa, Nor Hayati Othman. 123-130 [doi]
- Combining Machine Learned and Heuristic Rules Using GRDR for Detection of Honeycombing in HRCT Lung ImagesPramod K. Singh, Paul Compton. 131-137 [doi]
- Automatic Detection of Breast Tumours from Ultrasound Images Using the Modified Seed Based Region Growing TechniqueNor Ashidi Mat Isa, Shahrill Sabarudin, Umi Kalthum Ngah, Kamal Zuhairi Zamli. 138-144 [doi]
- An Automatic Body ROI Determination for 3D Visualization of a Fetal Ultrasound VolumeTien Dung Nguyen, Sang Hyun Kim, Nam Chul Kim. 145-153 [doi]
- Swarm Intelligence and the Holonic Paradigm: A Promising Symbiosis for a Medical Diagnostic SystemRainer Unland, Mihaela Ulieru. 154-160 [doi]
- Analysis Between Lifestyle, Family Medical History and Medical Abnormalities Using Data Mining Method - Association Rule AnalysisMitsuhiro Ogasawara, Hiroki Sugimori, Yukiyasu Iida, Katsumi Yoshida. 161-171 [doi]
- A Moving-Mass Control System for Spinning Vehicle Based on Neural Networks and Genetic AlgorithmSong-yan Wang, Ming Yang, Zicai Wang. 172-178 [doi]
- Two-Dimensional Fitting of Brightness Profiles in Galaxy Images with a Hybrid AlgorithmJuan Carlos Gomez, Olac Fuentes, Ivanio Puerari. 179-185 [doi]
- A Hybrid Tabu Search Based Clustering AlgorithmYongguo Liu, Yan Liu, Libin Wang, Kefei Chen. 186-192 [doi]
- Neural Network Based Feedback Scheduling of Multitasking Control SystemsFeng Xia, Youxian Sun. 193-199 [doi]
- An HILS and RCP Based Inter-working Scheme for Computational Evaluation of Manipulators and Trajectory ControllerYeon-Mo Yang, Nitaigour-Premchand Mahalik, Sung-Cheal Byun, See-Moon Yang, Byung-Ha Ahn. 200-206 [doi]
- Modeling of Nonlinear Static System Via Neural Network Based Intelligent TechnologyDongwon Kim, Jang-Hyun Park, Sam-Jun Seo, Gwi-Tae Park. 207-213 [doi]
- Bayesian Inference Driven Behavior Network Architecture for Avoiding Moving ObstaclesHyeun Jeong Min, Sung-Bae Cho. 214-221 [doi]
- Loss Minimization Control of Induction Motor Using GA-PSODong Hwa Kim, Jin Ill Park. 222-227 [doi]
- Context-Restricted, Role-Oriented Emotion Knowledge Acquisition and RepresentationXi Yong, Cungen Cao, Haitao Wang. 228-235 [doi]
- User Preference Learning for Multimedia Personalization in Pervasive Computing EnvironmentZhiwen Yu, Daqing Zhang, Xingshe Zhou, Changde Li. 236-242 [doi]
- Emotion-Based Smart Recruitment SystemRajiv Khosla, Chris Lai. 243-250 [doi]
- Evolvable Recommendation System in the Portable Device Based on the Emotion AwarenessSeong-Joo Kim, Jong Soo Kim, Sung Hyun Kim, Yong-Min Kim. 251-257 [doi]
- Emotional Extraction System by Using the Color CombinationKeiko Sato, Yasue Mitsukura, Minoru Fukumi. 258-262 [doi]
- Research on Individual Recognition System with Writing Pressure Based on Customized Neuro-template with Gaussian FunctionLina Mi, Fumiaki Takeda. 263-269 [doi]
- Context-Aware Evolvable System Framework for Environment Identifying SystemsPhill-Kyu Rhee, Mi Young Nam, In Ja Jeon. 270-283 [doi]
- Context-Aware Computing Based Adaptable Heart Diseases Diagnosis AlgorithmTae-Seon Kim, Hyun Dong Kim. 284-290 [doi]
- Multiple Sensor Fusion and Motion Control of Snake Robot Based on Soft-ComputingWoo-Kyung Choi, Seong-Joo Kim, Hong-Tae Jeon. 291-297 [doi]
- Human Face Detection Using Skin Color Context Awareness and Context-Based Bayesian ClassifiersMi Young Nam, Phill-Kyu Rhee. 298-307 [doi]
- Adaptive Gabor Wavelet for Efficient Object RecognitionIn Ja Jeon, Mi Young Nam, Phill-Kyu Rhee. 308-318 [doi]
- An Evolvable Hardware System Under Uneven EnvironmentIn Ja Jeon, Phill-Kyu Rhee, Hanho Lee. 319-326 [doi]
- An Efficient Face Location Using Integrated Feature SpaceMi Young Nam, Phill-Kyu Rhee. 327-335 [doi]
- Fuzzy Predictive Preferential Dropping for Active Queue ManagementLichang Che, Bin Qiu. 336-342 [doi]
- A Fuzzy Method for Measuring Efficiency Under Fuzzy EnvironmentHsuan-Shih Lee, Pei-Di Shen, Wen-Li Chyr. 343-349 [doi]
- Anytime Iterative Optimal Control Using Fuzzy Feedback SchedulerFeng Xia, Youxian Sun. 350-356 [doi]
- A Coupled Fuzzy Logic Control for Routers Queue Management over TCP/AQM NetworksZhi Li, Zhongwei Zhang. 357-363 [doi]
- Iris Pattern Recognition Using Fuzzy LDA MethodHyoun-Joo Go, Keun Chang Kwak, Mann-Jun Kwon, Myung-Geun Chun. 364-370 [doi]
- Precision Tracking Based-on Fuzzy Reasoning Segmentation in Cluttered Image SequencesJae-Soo Cho, Byoung-Ju Yun, Yun-Ho Ko. 371-377 [doi]
- Fuzzy Lowpass FilteringYasar Becerikli, M. Mucteba Tutuncu, H. Engin Demiray. 378-385 [doi]
- Fuzzy Logic Based Intelligent Tool for DatabasesSevinc Ilhan, Nevcihan Duru. 386-392 [doi]
- Modelling from Knowledge Versus Modelling from Rules Using UMLAnne Håkansson. 393-402 [doi]
- Meeting the Need for Knowledge Management in Schools with Knowledge-Based Systems - A Case StudyAnneli Edman. 403-409 [doi]
- Aspects of Consideration When Designing Educational Knowledge Based Hypermedia SystemsNarin Mayiwar. 410-415 [doi]
- Semantic Tags: Evaluating the Functioning of Rules in a Knowledge Based SystemTorsten Palm. 416-421 [doi]
- Knowledge Management for Robot Activities in a Real World Context. A Case for Task Pattern Analysis (TAPAS)Lars Oestreicher. 422-429 [doi]
- Temporal Knowledge Representation and Reasoning Model for Temporally Rich DomainsSlobodan Ribaric. 430-436 [doi]
- Reciprocal Logic: Logics for Specifying, Verifying, and Reasoning About Reciprocal RelationshipsJingde Cheng. 437-445 [doi]
- A New Paradigm Vertical Handoff Algorithm in CDMA-WLAN Integrated NetworksKyung-Soo Jang, Jang-Sub Kim, Jae Sang Cha, Dong Ryeol Shin. 446-452 [doi]
- Efficient Revocation of Security Capability in Certificateless Public Key CryptographyHak Soo Ju, Dae Youb Kim, Dong-Hoon Lee, Jongin Lim, Kilsoo Chun. 453-459 [doi]
- A Study on Privacy-Related Considerations in Ubiquitous Computing EnvironmentJang Mook Kang, Jo Nam Jung, Jae Sang Cha, Chun su Lee. 460-463 [doi]
- Optimal Operation for Cogenerating System of Micro-grid NetworkPhil-Hun Cho, Hak-Man Kim, Myong-chul Shin, Jae Sang Cha. 464-469 [doi]
- An Efficient and Secured Media Access Mechanism Using the Intelligent Coordinator in Low-Rate WPAN EnvironmentJoon Heo, Choong Seon Hong. 470-476 [doi]
- Pilot-Symbol Aided SFBC-OFDM Channel Estimation for Intelligent Multimedia ServiceSang Soon Park, Juphil Cho, Heung Ki Baik. 477-482 [doi]
- Cryptographic Protocol Design Concept with Genetic AlgorithmsKyeongmo Park, Chuleui Hong. 483-489 [doi]
- An Efficient Backoff Scheme for IEEE 802.11e EDCF Differential ServiceHo-Jin Shin, Jang-Sub Kim, Dong Ryeol Shin. 490-499 [doi]
- Some Properties of Grounding Modal Conjunctions in Artificial Cognitive AgentsRadoslaw Katarzyniak. 500-506 [doi]
- Multi-agent System for Web AdvertisingPrzemyslaw Kazienko. 507-513 [doi]
- A Mobile Agent Approach to Intrusion Detection in Network SystemsGrzegorz Kolaczek, Agnieszka Pieczynska-Kuchtiak, Krzysztof Juszczyszyn, Adam Grzech, Radoslaw Katarzyniak, Ngoc Thanh Nguyen. 514-519 [doi]
- Non-textual Document Ranking Using Crawler Information and Web Usage MiningMaciej Kiewra, Ngoc Thanh Nguyen. 520-526 [doi]
- A Propagation Strategy Implemented in Communicative EnvironmentDariusz Król. 527-533 [doi]
- Using Recommendation to Improve Negotiations in Agent-Based SystemsMateusz Lenar, Janusz Sobecki. 534-540 [doi]
- Fault Diagnosis of Discrete Event Systems Using Place InvariantsIwan Tabakow. 541-547 [doi]
- A Robust-Fragile Dual Watermarking System in the DCT DomainMoussa Habib, Sami Sarhan, Lama Rajab. 548-553 [doi]
- A Data Hiding Scheme to Reconstruct Missing Blocks for JPEG Image TransmissionJia-Hong Lee, Jyh-Wei Chen, Mei-Yi Wu. 554-559 [doi]
- Adaptive Selection of Coefficient s Portions in the Transform Domain WatermarkingYoon Ho Kim, Hag-hyun Song, Heau-Jo Kang. 560-566 [doi]
- Copyright Authentication Enhancement of Digital Watermarking Based on Intelligent Human Visual System SchemeYangsun Lee, Heau-Jo Kang, Yoon Ho Kim. 567-572 [doi]
- Image Retrieval Based on a Multipurpose Watermarking SchemeZhe-Ming Lu, Henrik Skibbe, Hans Burkhardt. 573-579 [doi]
- Compressed Domain Video Watermarking in Motion VectorHao-Xian Wang, Yue-Nan Li, Zhe-Ming Lu, Sheng-He Sun. 580-586 [doi]
- Analysis of Quantization-Based Audio Watermarking in DA/AD ConversionsShijun Xiang, Jiwu Huang, Xiaoyun Feng. 587-592 [doi]
- A Lossless Watermarking Technique for Halftone ImagesPing-Sung Liao, Jeng-Shyang Pan, Yen Hung Chen, Bin-Yih Liao. 593-599 [doi]
- Implementation of Current Mode Fuzzy-Tuning PI Control of Single Phase UPS Inverter Using DSPEmine Dogru Bolat, H. Metin Ertunç. 600-607 [doi]
- Knowledge-Based Fuzzy Control of Pilot-Scale SBR for Wastewater TreatmentByong-Hee Jun, Jang-Hwan Park, Myung-Geun Chun. 608-614 [doi]
- Finely Tuned Cascaded Fuzzy Controllers with VHDL - A Case Study for Linerization of V-I Characteristics of a ConvertorAvinash Keskar, Kishor Kadbe, Nikhil Damle, Pooja Deshpande. 615-621 [doi]
- Control System for Optimal Flight Trajectories for Terrain Collision AvoidanceTapan Sharma, Cees Bil, Andrew Eberhard. 622-627 [doi]
- Optimal Remediation Design in Groundwater Systems by Intelligent TechniquesHone-Jay Chu, Chin-Tsai Hsiao, Liang-Cheng Chang. 628-634 [doi]
- Choquet Integral-Based Decision Making Approach for Robot SelectionE. Ertugrul Karsak. 635-641 [doi]
- Fuzzy Logic and Neuro-fuzzy Modelling of Diesel Spray PenetrationShaun H. Lee, Robert J. Howlett, Simon D. Walters, Cyril Crua. 642-650 [doi]
- Integrating Architecture of Digital Library and e-Learning Based on Intelligent AgentSun-Gwan Han, Hee-Seop Han. 651-657 [doi]
- A Pedagogical Overview on e-LearningJavier Andrade Garda, Juan Ares Casal, Rafael García Vázquez, Santiago Rodríguez Yánez, María Seoane, Sonia Suárez. 658-664 [doi]
- Modeling Understanding Level of Learner in Collaborative Learning Using Bayesian NetworkAkira Komedani, Tomoko Kojiri, Toyohide Watanabe. 665-672 [doi]
- Dynamic Generation of Diagrams for Supporting Solving Process of Mathematical ExercisesYosuke Murase, Tomoko Kojiri, Toyohide Watanabe. 673-680 [doi]
- MOLEAS: Information Technology-Based Educational Software FrameworkSu-Jin Cho, Seongsoo Lee. 681-687 [doi]
- A Web-Based Information Communication Ethics Education System for the Gifted Elementary School Students in ComputerWoochun Jun, Sung-Keun Cho. 688-693 [doi]
- Design of a Web Based Lab Administration SystemSujan Pradhan, Hongen Lu. 694-700 [doi]
- Experiences with Pair and Tri Programming in a Second Level CourseMaryam Purvis, Martin K. Purvis, Bastin Tony Roy Savarimuthu, Mark George, Stephen Cranefield. 701-707 [doi]
- An Intelligent Safety Verification Based on a Paraconsistent Logic ProgramKazumi Nakamatsu, Seiki Akama, Jair Minoro Abe. 708-715 [doi]
- Paraconsistent Artificial Neural Network: An Application in Cephalometric AnalysisJair Minoro Abe, Neli Regina Siqueira Ortega, Maurício C. Mário, Marinho Del Santo. 716-723 [doi]
- Non-alethic Reasoning in Distributed SystemsJair Minoro Abe, Kazumi Nakamatsu, Seiki Akama. 724-731 [doi]
- A Connectionist Model for Predicate Logic Reasoning Using Coarse-Coded Distributed RepresentationsSriram G. Sanjeevi, Pushpak Bhattacharyya. 732-738 [doi]
- A General-Purpose Forward Deduction Engine for Modal LogicsShinsuke Nara, Takashi Omi, Yuichi Goto, Jingde Cheng. 739-745 [doi]
- A Deductive Semantic Brokering SystemGrigoris Antoniou, Thomas Skylogiannis, Antonis Bikakis, Nick Bassiliades. 746-752 [doi]
- Uncertainty Management in Logic Programming: Simple and Effective Top-Down Query AnsweringUmberto Straccia. 753-760 [doi]
- Specifying Distributed Authorization with Delegation Using Logic ProgrammingShujing Wang, Yan Zhang. 761-767 [doi]
- The Design and Implementation of SAMIRFabio Zambetta, Fabio Abbattista. 768-774 [doi]
- Intelligent Data Analysis, Decision Making and Modelling Adaptive Financial Systems Using Hierarchical Neural NetworksMasoud Mohammadian, Mark Kingham. 775-781 [doi]
- Electricity Load Prediction Using Hierarchical Fuzzy Logic SystemsMasoud Mohammadian, Ric Jentzsch. 782-788 [doi]
- MEDADVIS: A Medical Advisory SystemZul Waker Al-Kabir, Kim Le, Dharmendra Sharma. 789-795 [doi]
- Towards Adaptive Clustering in Self-monitoring Multi-agent NetworksPiraveenan Mahendra rajah, Mikhail Prokopenko, Peter Wang, Don Price. 796-805 [doi]
- Shared Learning Vector Quantization in a New Agent Architecture for Intelligent DeliberationPrasanna Lokuge, Damminda Alahakoon. 806-813 [doi]
- Patterns for Agent Oriented e-Bidding PracticesIvan Jureta, Manuel Kolp, Stéphane Faulkner, T. Tung Do. 814-820 [doi]
- Innovations in Intelligent AgentsJeffrey Tweedale, Nikhil Ichalkaranje. 821-824 [doi]
- Multi-agent Systems: New DirectionsNikhil Ichalkaranje, Jeffrey Tweedale. 825-830 [doi]
- Agent Technology for Coordinating UAV Target TrackingJisun Park, Karen Fullam, David C. Han, K. Suzanne Barber. 831-837 [doi]
- Cognitive Hybrid Reasoning Intelligent Agent SystemChristos Sioutis, Nikhil Ichalkaranje. 838-843 [doi]
- Beyond Trust: A Belief-Desire-Intention Model of Confidence in an Agent s IntentionsBevan Jarvis, Dan Corbett, Lakhmi C. Jain. 844-850 [doi]
- Reasoning About Time in a BDI ArchitectureBevan Jarvis, Dan Corbett, Lakhmi C. Jain. 851-857 [doi]
- A Delegation Model for Designing Collaborative Multi-agent SystemsStéphane Faulkner, Stéphane Dehousse. 858-865 [doi]
- An Interactive Visual Model for Web OntologiesYuxin Mao, Zhaohui Wu, Huajun Chen, Xiaoqing Zheng. 866-872 [doi]
- RDF-Based Ontology View for Relational Schema Mediation in Semantic WebHuajun Chen, Zhaohui Wu, Yuxin Mao. 873-879 [doi]
- Essentialized Conceptual Structures in Ontology ModelingPatryk Burek. 880-886 [doi]
- Turning Mass Media to Your Media: Intelligent Search with Customized ResultsJun Lai, Ben Soh. 887-893 [doi]
- Improving Search on WWW.HR Web Directory by Introducing OntologiesGordan Gledec, Maja Matijasevic, Damir Juric. 894-900 [doi]
- Designing a Tool for Configuring an Intelligent and Flexible Web-Based SystemDiego Magro, Anna Goy. 901-907 [doi]
- Location-Sensitive Tour Guide Services Using the Semantic WebJong Woo Kim, Ju-Yeon Kim, Hyun-Suk Hwang, Chang Soo Kim. 908-914 [doi]
- Semantic Discovery of Web ServicesHongen Lu. 915-921 [doi]
- Making Sense of Ubiquitous Data Streams - A Fuzzy Logic ApproachOsnat Horovitz, Mohamed Medhat Gaber, Shonali Krishnaswamy. 922-928 [doi]
- ::::sigma::::-SCLOPE: Clustering Categorical Streams Using Attribute SelectionPoh Hean Yap, Kok-Leong Ong. 929-935 [doi]
- Extraction of Gene/Protein Interaction from Text Documents with Relation KernelJae-Hong Eom, Byoung-Tak Zhang. 936-942 [doi]
- Combining an Order-Semisensitive Text Similarity and Closest Fit Approach to Textual Missing Values in Knowledge DiscoveryYi Feng, Zhaohui Wu, Zhongmei Zhou. 943-949 [doi]
- Support for Internet-Based Commonsense Processing - Causal Knowledge Discovery Using Japanese If FormsYali Ge, Rafal Rzepka, Kenji Araki. 950-956 [doi]
- APForecast: An Adaptive Forecasting Method for Data StreamsYong-li Wang, Hong-bing Xu, Yisheng Dong, Xue-jun Liu, Jiang-bo Qian. 957-963 [doi]
- Finding Closed Itemsets in Data StreamsHai Wang, Wenyuan Li, Zeng-zhi Li, Lin Fan. 964-971 [doi]
- An Efficient Schema Matching AlgorithmWei Cheng, Heshui Lin, Yufang Sun. 972-978 [doi]
- A Divisive Ordering Algorithm for Mapping Categorical Data to Numeric DataHuang-Cheng Kuo. 979-985 [doi]
- A Mutual Influence Algorithm for Multiple Concurrent Negotiations - A Game Theoretical AnalysisKa-man Lam, Ho-Fung Leung. 986-992 [doi]
- Vulnerability Evaluation Tools of Matching Algorithm and Integrity Verification in Fingerprint RecognitionHo-Jun Na, Deok-Hyun Yoon, Chang Soo Kim, Hyun-Suk Hwang. 993-999 [doi]
- Algorithms for CTL System ModificationYulin Ding, Yan Zhang. 1000-1006 [doi]
- A Robust Approach for Improving Computational Efficiency of Order-Picking ProblemsYu-Min Chiang, Shih-Hsin Chen, Kuo-Chang Wu. 1007-1014 [doi]
- An Efficient MDS Algorithm for the Analysis of Massive Document CollectionsYoshitatsu Matsuda, Kazunori Yamaguchi. 1015-1021 [doi]
- (SE-33)Intelligent ID-Based Threshold System by an Encryption and Decryption from Bilinear PairingYoung Whan Lee, Byung Mun Choi. 1022-1028 [doi]
- Development of an Intelligent Information Security Evaluation Indices System for an Enterprise OrganizationIl Seok Ko, Geuk Lee, Yun Ji Na. 1029-1035 [doi]
- A Study on the Centralized Database of the Multi-agents Based Integrated Security Management System for Managing Heterogeneous FirewallsDong-Young Lee. 1036-1042 [doi]
- Adaptive Modulation and Coding Scheme for Wireless Mobile Communication SystemJae Sang Cha, Juphil Cho. 1043-1049 [doi]
- Performance Analysis of a Antenna Array System Using a New Beamforming Algorithm in the CDMA2000 1X Wireless CommunicationSungsoo Ahn, Minsoo Kim, Jungsuk Lee, Dong-Young Lee. 1050-1055 [doi]
- Intelligent Tool for Enterprise Vulnerability Assessment on a Distributed Network Environment Using Nessus and OVALYoungsup Kim, Seung Yub Baek, Geuk Lee. 1056-1061 [doi]
- Design and Implementation of SMS Security System for Wireless EnvironmentYan Ha, Hea-Sook Park, Soon-Mi Lee, Young-Whan Park, Young-Shin Han. 1062-1068 [doi]
- Intelligent Method for Building Security Countermeasures by Applying Dr. T.H. Kim s Block ModelTai-Hoon Kim, Seung-youn Lee. 1069-1075 [doi]
- Print and Generation Copy Image Watermarking Based on Spread Spectrum TechniquePing Chen, Kagenori Nagao, Yao Zhao, Jeng-Shyang Pan. 1076-1082 [doi]
- Audio CoFIP (Contents Fingerprinting) Robust Against Collusion AttackKotaro Sonoda, Ryouichi Nishimura, Yôiti Suzuki. 1083-1089 [doi]
- A Low Cost and Efficient Sign Language Video Transmission SystemMohsen Ashourian, Reza Enteshari, Ioannis Lambadaris. 1090-1098 [doi]
- A New Watermark Surviving After Re-shooting the Images Displayed on a ScreenSeiichi Gohshi, Haruyuki Nakamura, Hiroshi Ito, Ryousuke Fujii, Mitsuyoshi Suzuki, Shigenori Takai, Yukari Tani. 1099-1107 [doi]
- Semi-fragile Watermarking Based on Zernike Moments and Integer Wavelet TransformXiaoyun Wu, Hongmei Liu, Jiwu Huang. 1108-1114 [doi]
- Shadow Watermark Extraction SystemFeng-Hsing Wang, Kang K. Yen, Lakhmi C. Jain, Jeng-Shyang Pan. 1115-1121 [doi]
- Development of Nearly Lossless Embedding Technology of Contactless Sensible Watermarks for Audio SignalsToshio Modegi. 1122-1128 [doi]
- SVG-Based Countermeasure to Geometric AttackLongjiang Yu, Xiamu Niu, Sheng-He Sun. 1129-1133 [doi]
- Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility AttackXinpeng Zhang, Shuozhong Wang. 1134-1144 [doi]
- System Architecture Analysis of a Hybrid Watermarking MethodChaw-Seng Woo, Jiang Du, Binh Pham, Hamud Ali Abdulkadir. 1145-1151 [doi]
- Audio Secret Sharing for 1-Bit AudioRyouichi Nishimura, Norihiro Fujita, Yôiti Suzuki. 1152-1158 [doi]
- Watermarking with Association Rules AlignmentJau-Ji Shen, Po-Wei Hsu. 1159-1167 [doi]
- A Reversible Watermark Scheme Combined with Hash Function and Lossless CompressionYongJie Wang, Yao Zhao, Jeng-Shyang Pan, ShaoWei Weng. 1168-1174 [doi]
- Improved Method of Spread Spectrum Watermarking Techniques Using Pixel-CorrelationsZheng Liu. 1175-1182 [doi]
- Apply Semi-fragile Watermarking to Authentication of Compressed Video DataTsong-Yi Chen, Da-Jinn Wang, Chih-Cheng Chiu, Chien-Hua Huang. 1183-1189 [doi]
- An Approach of Multi-level Semantics AbstractionHongli Xu, De Sun Zhijie Xu. 1190-1196 [doi]
- Effective Video Scene Detection Approach Based on Cinematic RulesYuliang Geng, De Xu, Aimin Wu. 1197-1203 [doi]
- 3-DWT Based Motion Suppression for Video Shot Boundary DetectionXu Yang, De Xu, Guan Tengfei, Aimin Wu, Congyan Lang. 1204-1209 [doi]
- Neural Network Based Image Retrieval with Multiple Instance Leaning TechniquesShun C. Chuang, Yeong-Yuh Xu, Hsin-Chia Fu. 1210-1216 [doi]
- Shot Type Classification in Sports Video Using Fuzzy Information GranularCongyan Lang, De Xu, Wengang Cheng, Yiwei Jiang. 1217-1223 [doi]
- Method for Searching Similar Images Using Quality Index MeasurementChin-Chen Chang, Tzu-Chuen Lu. 1224-1230 [doi]
- Edge Projection-Based Image RegistrationHua Yan, Ju Liu, Jiande Sun. 1231-1237 [doi]
- Automated Information Mining on Multimedia TV News ArchivesPor-Shen Lai, S. S. Cheng, S.-Yuh Sun, T.-Y. Huang, J. M. Su, Yeong Y. Xu, Y. H. Chen, Shun C. Chuang, C.-L. Tseng, C. L. Hsieh, Y. L. Lu, Y.-C. Shen, J. R. Chen, J. B. Nie, F. P. Tsai, H. C. Huang, Hsiao-Tien Pao, Hsin-Chia Fu. 1238-1244 [doi]
- An Emergency Model of Home Network Environment Based on Genetic AlgorithmHuey-Ming Lee, Shih-Feng Liao. 1245-1251 [doi]
- A Distributed Backup Agent Based on Grid Computing ArchitectureHuey-Ming Lee, Cheng-Hsiung Yang. 1252-1257 [doi]
- A Dynamic Supervising Model Based on Grid EnvironmentHuey-Ming Lee, Chao-Chi Hsu, Mu-Hsiu Hsu. 1258-1264 [doi]
- An Intelligent Extracting Web Content Agent on the InternetHuey-Ming Lee, Pin-Jen Chen, Yao-Jen Shih, Yuan-Chieh Tsai, Ching-Hao Mao. 1265-1271 [doi]
- A Rendering System for Image Extraction from Music and DanceChihaya Watanabe, Hisao Shiizuka. 1272-1282 [doi]
- Trend of Fuzzy Multivariant Analysis in Management EngineeringJunzo Watada. 1283-1290 [doi]
- Kansei Engineering for Comfortable Space ManagementMotoki Kohritani, Junzo Watada, Hideyasu Hirano, Naoyoshi Yubazaki. 1291-1297 [doi]
- Fuzzy Logic Experience Model in Human Resource ManagementZhen Xu, Binheng Song, Liang Chen. 1298-1304 [doi]
- Development of Business Rule Engine and Builder for Manufacture Process ProductivityHojun Shin, Haeng-Kon Kim, Boyeon Shim. 1305-1311 [doi]
- Automatic Detection of Failure Patterns Using Data MiningYoungshin Han, Junghee Kim, Chilgee Lee. 1312-1316 [doi]
- Logic Frameworks for Components Integration ProcessHaeng-Kon Kim, Deok-Soo Han. 1317-1324 [doi]
- Automatic Classification Using Decision Tree and Support Vector MachineYoungshin Han, Chilgee Lee. 1325-1330 [doi]
- Opportunity Tree Framework Design for Quality and Delivery of Software ProductSun-Myung Hwang, Ki-Won Song. 1331-1337 [doi]
- Breeding Value Classification in Manchego Sheep: A Study of Attribute Selection and ConstructionM. Julia Flores, José A. Gámez. 1338-1346 [doi]
- Learning Method for Automatic Acquisition of Translation KnowledgeHiroshi Echizen-ya, Kenji Araki, Yoshio Momouchi. 1347-1353 [doi]