


default search action
IIH-MSP 2007: Kaohsiung, Taiwan
- Bin-Yih Liao, Jeng-Shyang Pan, Lakhmi C. Jain, Mark Liao, Hideki Noda, Anthony T. S. Ho:

3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), Kaohsiung, Taiwan, 26-28 November 2007, Proceedings. IEEE Computer Society 2007, ISBN 978-0-7695-2994-3
Volume I
Novel Approaches to Multimedia Applications
- Bao Rong Chang, Hsiu Fen Tsai:

Forecasting Typhoon Moving Path Using BPNN-Weighted Grey-C3LSP Tuned by Quantum-Neuron-Based Adaptive Support Vector Regression with Nested Local Adiabatic Evolution. 3-6 - Chuan-Yu Chang, Chi-Fang Li, Hung-Jen Wang:

Using Principal Component Analysis and Radial Basis Function Neural Networks for Image Contents Classification. 7-10 - Tsung-Ching Lin, Chien-Wen Chen, Chien-Chang Lin, Trieu-Kien Truong:

Very Low Bit Rate Video Coding Using H.264 Codec and Cubic Spline Interpolation. 11-14 - Chu-Fu Wang, Chun-Chia Lee, Hui-Sheng Chu:

Optimal Deployment for Wireless Sensor Networks Using Lifetime Expectation Estimation. 15-18 - Trong-Yen Lee, Yang-Hsin Fan

, Yu-Min Cheng, Chia-Chun Tsai, Rong-Shue Hsiao:
Enhancement of Hardware-Software Partition for Embedded Multiprocessor FPGA Systems. 19-22 - Tsang-Long Pao, Wen-Yuan Liao, Yu-Te Chen, Jun-Heng Yeh, Yun-Maw Cheng, Charles S. Chien:

Comparison of Several Classifiers for Emotion Recognition from Noisy Mandarin Speech. 23-26 - Chih-Chung Kao, Liang-Hwei Lee, Chih-Chiang Tai, Yung-Chung Wei:

Extracting the Ocean Surface Feature of Non-linear Internal Solitary Waves in MODIS Satellite Images. 27-30 - Huey-Min Sun, Wen-Lin Cheng:

The Input-Interface of Webcam Applied in the Digital Content Interaction. 31-34 - Tsang-Long Pao, Charles S. Chien, Yu-Te Chen, Jun-Heng Yeh, Yun-Maw Cheng, Wen-Yuan Liao:

Combination of Multiple Classifiers for Improving Emotion Recognition in Mandarin Speech. 35-38 - Tsang-Long Pao, Wen-Yuan Liao, Yu-Te Chen:

Audio-Visual Speech Recognition with Weighted KNN-based Classification in Mandarin Database. 39-42 - Liang-Hwei Lee, Shiahn-Wern Shyue, Ming-Jer Huang:

Building Corner Feature Extraction Based on Fusion Technique with Airborne LiDAR Data and Aerial Imagery. 43-46 - Tsang-Long Pao, Charles S. Chien, Jun-Heng Yeh, Yu-Te Chen, Yun-Maw Cheng:

Continuous Tracking of User Emotion in Mandarin Emotional Speech. 47-52
Intelligent Systems for Image and Signal Processing
- C. R. Hema, Murugesa Pandiyan Paulraj, R. Nagarajan, Sazali Yaacob, Abdul Hamid Adorn:

Fuzzy Based Classification of EEG Mental Tasks for a Brain Machine Interface. 53-56 - M. Karthigayan, R. Nagarajan, Mohamed Rizon, Sazali Yaacob:

Personalized Face Emotion Classification Using Optimized Data of Three Features. 57-60 - Chen Change Loy, Weng-Kin Lai, Chee Peng Lim:

Keystroke Patterns Classification Using the ARTMAP-FD Neural Network. 61-64 - Shing Chiang Tan, M. V. C. Rao, Chee Peng Lim:

A Mutation-Based Evolving Neural Network Model and Its Application to Condition Monitoring. 65-68 - Chun Farn Leong

, Bee Ee Khoo
, Zalina B. binti Abdul Aziz:
Performance Analysis of Digital Image Fingerprinting Based on Design of Experiments. 69-72 - Xuansen He:

A Dynamic Step-Size Updating Rule for Single Distribution Blind Source Separation. 73-76 - Yongyi Zhao, Bo Song, Jin Li:

A Map Matching Algorithm in GPS-based Car Navigation System. 77-80 - Jen-Bang Feng, Iuon-Chang Lin, Yen-Ping Chu:

An Edge Enhanced Technique for Digital Halftoning Using Error Diffusion. 81-86 - Ming-Sui Lee, Mei-Yin Shen, C.-C. Jay Kuo

:
A Content-Adaptive Up-Sampling Technique for Image Resolution Enhancement. 87-90 - Yu-Long Qiao, Chun-Yan Song, Chun-Hui Zhao:

Double-Density Discrete Wavelet Transform Based Texture Classification. 91-94 - Te-Jen Su, Hsin-Chih Wang, Jia-Wei Liu:

Particle Swarm Optimization for Image Noise Cancellation. 95-98 - Zhenyu Wu, Bin Tang:

An Arbitrary Block Resizing Algorithm in Transform Domain. 99-102 - Qiong Li, Guoqiang Li, Yi-Liang He, Xiamu Niu:

Improved Adaptive Lifting Scheme for Wavelet-Based Image Compression. 103-108
Computation Intelligence for Image Processing and Pattern Recognition
- Yen-Wei Chen, Kenji Kubo:

A Robust Eye Detection and Tracking Technique Using Gabor Filters. 109-112 - Xian-Hua Han, Yen-Wei Chen, Keishi Kitamura, Akihiro Ishikawa, Yoshihiro Inoue, Kouichi Shibata, Yukio Mishina, Yoshihiro Mukuta:

An ICA Based Noise Reduction for PET Reconstructed Images. 113-116 - Tomoko Tateyama, Zensho Nakao, Yen-Wei Chen:

Brain Matters Emphasis in MRI by Kernel Independent Component Analysis. 117-120 - Xuemei Yang, Yen-Wei Chen, Masahiro Ito, Ikuko Nishikawa:

Principal Component Analysis of O-linked Glycosylation Sites in Protein Sequence. 121-126 - Qingdong Du, Jie Liu:

A New Neural Fusion Recognition Method with Multi-Agent. 127-130 - Jun-Bao Li, Shu-Chuan Chu

, Jeng-Shyang Pan:
2D(PC)2 A for Face Recognition with One Training Image per Person. 131-134 - Yujian Li, Xingli Li:

HMM Based Eyebrow Recognition. 135-138 - Jen-Chun Lee, Ping Sheng Huang, Chien-Ping Chang, Te-Ming Tu:

Novel and Fast Approach for Iris Location. 139-142 - Jia-Dong Ren, Yafei Sun, Sheng Guo:

Maximal Sequential Pattern Mining Based on Simultaneous Monotone and Anti-monotone Constraints. 143-146 - Guangming Lu, Jiayin Qi, Qingmin Liao:

A New Scheme of Iris Image Quality Assessment. 147-150 - Yong Tian, Jianing Wang, Jiuwen Zhang, Yida May:

Contextual Hidden Markov Tree Model Image Denoising Using a New Nonuniform Quincunx Directional Filter Banks. 151-154 - Guo-Shiang Lin, Min-Kuan Chang

, Shien-Tang Chiu:
Dissolve Detection Scheme with Transition Duration Refinement. 155-158 - Yuqin Sun, Shenghong Chen, Zhifang Wang, Qiong Li:

Performance Evaluation of Fingerprint Orientation Estimation Algorithms. 159-164
Recent Advances in Multimedia Coding and Retrieval: Algorithms and Applications
- Kebin Jia, Zhipin Deng, Xin-Yue Zhuang:

The Research of Video Matching Algorithm Based on Spatio-temporal Feature. 165-168 - Pengyu Liu, Kebin Jia, Zhuozheng Wang:

An Effective Image Retrieval Method Based on Color and Texture Combined Features. 169-172 - Zhen Sun, Zhe-Ming Lu, Hai-Jun Jin:

Image Retrieval with Long-Term Memory Learning and Short-Time Relevance Feedback. 173-177 - Zhen Li, Zhe-Ming Lu, Lei Sun:

Dynamic Extended Codebook Based Vector Quantization Scheme for Mesh Geometry Compression. 178-181 - Xu He, Pengyu Liu, Kebin Jia, Yanhua Zhang:

A Fast Intra-frame Prediction Algorithm Based on the Characteristic of Macro-block and 2D-histogram for H.264/AVC Standard. 182-185 - Yong Zhang, Weixin Li, Xiamu Niu:

A Method of Bucket Index over Encrypted Character Data in Database. 186-189 - Yongqing Ye, Qingge Ji:

Real-Time Path Planning of Large-scale Virtual Crowd. 190-193 - Danny Fernandes, Ce Zhu:

Overlapped Block Motion Compensation Using Modified Sigmoid Window. 194-197 - Zhi-Cheng Zhao, An-Ni Cai:

Selective Extraction of Visual Saliency Objects in Images and Videos. 198-201 - Vincent S. Tseng, Ja-Hwung Su, Chih-Jen Chen:

Effective Video Annotation by Mining Visual Features and Speech Features. 202-205 - Te-Wei Chiang, Tienwei Tsai, Mann-Jung Hsiao:

A Hierarchical Grid-Based Indexing Method for Content-Based Image Retrieval. 206-209 - Feng-Cheng Chang

, Hsiang-Cheh Huang
:
A Programming Model for Distributed Content-Based Image Retrieval. 210-213 - Bo Di:

An Efficient Image Retrieval Approach base on Color Clustering. 214-220
Networking and Information Security
- Jiehong Wu, Guiran Chang, Jia Li:

A Scheme for Protecting Mobile Agents Based on Combining Obfuscated Data and Time Checking Technology. 221-224 - Chang-yin Liang, Ang Li, Xiamu Niu:

Video Authentication and Tamper Detection Based on Cloud Model. 225-228 - Yong Zhang, Qin-tao Song, Xiamu Niu:

The Key Management of the Encrypted Database Based on XML. 229-232 - Bo Shen, Yong Xu, Guangming Lu, David Zhang

:
Detecting Iris Lacunae Based on Gaussian Filter. 233-236 - Xuan Wang, Jiancheng Lin, Yong Sun:

Applying Feature Extraction of Speech Recognition on VOIP Auditing. 237-240 - Zhe-Ming Lu, Hong-Yi Zheng, Ji-Wu Huang:

A Digital Watermarking Scheme Based on DCT and SVD. 241-244 - Chao-Wen Chan, Chung-Chih Lin:

The Improvement of Lee-Chiu's Remote User Authentication Scheme. 245-248 - Chao-Wen Chan, Rong-Yuan Wang:

Improving the Security of the Chien-Jan Protocol for Large Mobile Networks. 249-252 - Hui-Feng Huang:

A New Design of Efficient Key Pre-distribution Scheme for Secure Wireless Sensor Networks. 253-256 - Huajun Huang, Xingming Sun, Guang Sun, Junwei Huang:

Detection of Hidden Information in Tags of Webpage Based on Tag-Mismatch. 257-260 - Kuo-Ching Liu, Hsin-Wei Wang, Hui-Feng Huang:

Enhancement of the Mutual Authentication protocol on RFID Passive Tags. 261-264 - Jia-lin Ma, Xu Wei, Jie Liu:

Security Analysis of RFID Based on Multiple Readers. 265-268 - Li Li, Jing Wu, Xiaowei Guo, Meng Li, Xiamu Niu:

Framework for Windows Password Function Security Enhancement. 269-274
Digital Watermarking and Multimedia Security
- Y. K. Sek, Lee-Ming Cheng

, L. L. Cheng, Chi-Kwong Chan:
A Novel Lossy Image-Hiding Scheme Based on Block Difference. 275-278 - H. Y. Leung, Lee-Ming Cheng

, L. L. Cheng, Chi-Kwong Chan:
Hardware Realization of Steganographic Techniques. 279-282 - Xi Zhao, Anthony T. S. Ho

, Helen Treharne
, Vinod Pankajakshan, Chris Culnane
, Weina Jiang:
A Novel Semi-Fragile Image Watermarking, Authentication and Self-Restoration Technique Using the Slant Transform. 283-286 - Vinod Pankajakshan, Anthony T. S. Ho

:
Improving Video Steganalysis Using Temporal Correlation. 287-290 - Ning Zhong, Jingming Kuang, Zunwen He:

A GA-based Optimal Image Watermarking Technique. 291-294 - Longjiang Yu, Sheng-He Sun:

Image Authentication in Print-and-scan Scenario. 295-298 - Hao Luo, Zhenfei Zhao, Jianming Huang, Zhe-Ming Lu:

Halftone Image Watermarking Based on the Binary Pseudo-Wavelet Transform. 299-302 - Hao Luo, Jeng-Shyang Pan, Zhe-Ming Lu:

Hiding Multiple Watermarks in Transparencies of Visual Cryptography. 303-306 - Hsien-Wen Tseng, Feng-Rong Wu, Chi-Pin Hsieh:

Data Hiding for Binary Images Using Weight Mechanism. 307-310 - Fu-Hao Yeh, Greg C. Lee, Cheng-Chieh Chiang:

Reversible Fragile Watermarking Based on Pyramidal Structure and Gradient Predicting Image. 311-314 - Chin-Feng Lee, Hsing-Ling Chen:

High-Capacity Data Hiding Using Virtual Window Partition. 315-318 - Brian K. Lien, Bo-Wei Shiue:

Hiding Data in Ordered Dithering Halftone Images by Bit Interleaving. 319-322 - Peining Tao, Ahmet M. Eskicioglu:

Robust Block-based Image Watermarking in Curvelet Transform. 323-328
Computer Graphics
- Ren-Jie Wang, Chung-Ming Wang:

Effective Color Ink Diffusion Synthesis. 329-332 - Shih-Pin Chao, Chen-Lan Yen, Chien-Chun Kuo:

Neural ISOMAP. 333-336 - Jun-Wei Chang, Su Ian Eugene Lei, Chun-Fa Chang, Yu-Jung Cheng:

Real-Time Rendering of Splashing Stream Water. 337-340 - Tainchi Lu, Daosheng Mu, Minchih Tsai:

Facial Expressions for 3D Game Applications. 341-344 - Chang-Hung Liang, Pai-Cheng Tao, Tsai-Yen Li:

IMHAP - An Experimental Platform for Humanoid Procedural Animation. 345-348 - Yao-Yang Tsai

, Hung-Kuo Chu
, Kuangyou B. Cheng, Tong-Yee Lee, Chen-Lan Yen:
Animation Generation and Retargeting Based on Physics Characteristics. 349-352 - Yu-Shuen Wang, Tong-Yee Lee:

WYSIWYG: Mesh Decomposition for Static Models. 353-356 - Shyh-Kuang Ueng, Wei-Yang Sun:

Multi-resolution Unsteady Flow Visualization. 357-360 - Mika Sato-Ilic, Lakhmi C. Jain:

Asymmetric Clustering Based on Self-Similarity. 361-364 - Chang-Yun Jhou, Jeng-Shyang Pan, Ding Chou:

Reversible Data Hiding Base on Histogram Shift for 3D Vertex. 365-370
Multimedia Coding
- Chunyu Lin

, Yao Zhao, Huihui Bai:
Three-Channel Multiple Description Image Coding Based on Special Lattice Vector Quantization. 371-374 - Yuanyuan Xu, Yao Zhao:

Three-Description Image Coding Using Optimal Dead-Zone Lattice Vector Quantization. 375-378 - Byung-Ho Cha, C.-C. Jay Kuo

:
Design of Multiuser Collusion-Free Hiding Codes with Delayed Embedding. 379-382 - Yubin Cui, Bojin Zhuang, Anni Cai:

MB-Activity Measure Based Slice Grouping and Unequal Error Protection for H.264/AVC Video Transmission over Wireless Networks. 383-386 - Yongjin Cho, C.-C. Jay Kuo

, Ming Hsieh, Do-Kyoung Kwon:
GOP-based Rate Control for H.264/SVC with Hierarchical B-pictures. 387-390 - H. P. Lee, H. Y. Chen, H. C. Chang:

A Method for Decoding the (24, 15, 5) Cyclic Code. 391-394 - Chuang Lin, Jeng-Shyang Pan, Tsong-Yi Chen, Kuang-Chih Huang:

A Covert Communication Scheme for the DCT Based Image Multiple Description Coding System. 395-398 - Tien-Yan Ma, Ting-Wei Hou, Shau-Yin Tseng:

Hierarchical Key Management of Scalable Video Coding. 399-402 - Said E. El-Khamy

, Mona Chong-Qing Lotfy, Adel Hamdi Ali:
The Enhanced Fuzzy Bit generator (EFBG): A Cryptographically Secure Pseudorandom Bit Generator. 403-406 - Navin Angkura, Supavadee Aramvith

, Supakorn Siddhichai:
Directional Texture Feature Extraction using Context Labels of Significance Coding for JPEG2000 Compressed Domain Image Retrieval. 407-410 - Bai Yu-Jie, Luo Wei-Xiong, Han Li:

Application of LDPC Codes over GF(q) to DFH Communication System. 411-414 - Meng Wang, Hui-Ping Ma, Chongqing Zhou, Bian Yang:

An Improved Multi-stage Vector Quantization for Image Coding. 415-420
Intelligent Watermark Hiding and Digital Image Processing
- Tzungher Chen, Chang-Sian Wu, Wei-Bin Lee:

A Novel Subliminal Channel Found in Visual Cryptography and Its Application to Image Hiding. 421-424 - Li Li, Nina Sun, Bin Luo

:
A Digital Watermarking Algorithm for Certificate Identifying. 425-428 - Li Li:

Image Watermarking Robust to Four-Color Printing and Fragile to High Resolution Copy. 429-432 - Chiang-Lung Liu, Der-Chyuan Lou

, Chien-Chung Lee:
Reversible Data Embedding Using Reduced Difference Expansion. 433-436 - Der-Chyuan Lou

, Chiang-Lung Liu, Chih-Lin Lin, Shin-Her Wang:
Length Estimation for Embedded Message Using Support Vector Machine. 437-440 - Zhiping Zhou, Lihua Zhou:

A Novel Algorithm for Robust Audio Watermarking Based on Quantification DCT Domain. 441-444 - Cheng-Hsing Yang, Shiuh-Jeng Wang, Chi-Yao Weng:

Analyses of Pixel-Value-Differencing Schemes with LSB Replacement in Stegonagraphy. 445-448 - Hong-Wei Sun, Kwok-Yan Lam, Jia-Guang Sun, Siu Leung Chung:

Dynamically Constructing Mixed Pyramid for Fast VQ Encoding. 449-452 - Xiaofen Zhang, Hong Wang, Jing Sun:

An Information Hiding Method based on SOAP. 453-456 - Lijun Yan, Jeng-Shyang Pan:

Generalized Discrete Fractional Hadamard Transformation and its Application on the Image Encryption. 457-460 - Michael Gulbis, Erika Müller, Martin Steinebach:

Combining Multilevel Manipulation Estimation with Content-Based Authentication Watermarking. 461-464 - Chih-Chien Wu, Te-Ming Tu, Jyh-Chian Chang, Chien-Ping Chang, Ping Sheng Huang:

Blind Color Watermarking Approach for Secret Text Hiding. 465-472
Intelligent Watermarking Techniques, Image Authentication and Visual Cryptography
- Chin-Chen Chang, Wei-Liang Tai

, Kuo-Nan Chen:
Improvements of EMD Embedding for Large Payloads. 473-476 - Jeanne Chen, Tung-Shou Chen:

Content-based Rate Controlled Data Hiding in JPEG-LS. 477-480 - Chin-Chen Chang, The Duc Kieu:

Reversible Data Embedding for Vector Quantization Indices. 481-484 - Chu-Hsing Lin, Wen-Kui Chang, Yu-Ying Lin, Lun-Yuen Cheng:

Binary Document Images Authentication by Thinning Digital Patterns. 485-488 - Chin-Chen Chang, Chin-Feng Lee, Lin-Yi Chuang:

Using Dynamic Programming Strategy to Find an Optimal Solution to Exploiting Modification Direction Embedding Method. 489-492 - Meng-Hsiun Tsai, Fang-Yu Hsu, Jun-Dong Chang, Hsien-Chu Wu:

Fragile Database Watermarking for Malicious Tamper Detection Using Support Vector Regression. 493-496 - Chin-Feng Lee, Yi-Ren Wang, Chin-Chen Chang:

A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction. 497-500 - Chung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan, Iuon-Chang Lin:

A Flexible Fragile Watermarking Scheme for Binary Images with Reversibility. 501-504 - Chin-Chen Chang, Yung-Chen Chou:

High Payload Data Embedding with Hybrid Strategy. 505-508 - Chi-Nan Lin, Chin-Chen Chang:

A Best-pair-first Capacity-distortion Control for Data Hiding on VQ Compression Domain. 509-514 - Chang-Chu Chen, Chin-Chen Chang:

Secret Image Sharing Using Quadratic Residues. 515-518 - Wen Pinn Fang:

Visual Cryptography in reversible style. 519-524
Network-aware Multimedia: QoS and Security
- Hongjun Wang, Lili Wang, Hua Li:

A Fast Multiple Reference Frame Selection Algorithm Based on H.264/AVC. 525-528 - Hongjun Wang, Yan-yan Hou, Hua Li:

H.264/AVC Video Encoder Algorithm Optimization Based on TI TMS320DM642. 529-532 - Shuzhong Ba, Ju Liu, Guoxia Sun, Wei Zhang:

Text Independent Speaker Verification Based on Mixing ICA Overcomplete Basis Functions. 533-536 - Huiqiang Sun, Guoxia Sun, Xing Liang, Ju Liu:

Influence of Joint Action of Fluid Shear Stress and Signal Transduction Ligand Inhibitor on Osteoclasts' Differentiation and Maturation. 537-541 - Mehdi Rezaei

, Imed Bouazizi, Moncef Gabbouj
:
Fuzzy Joint Encoding and Statistical Multiplexing of Multiple Video Sources with Independent Quality of Services for Streaming over DVB-H. 542-545 - Hongfeng Zhu, Tianhua Liu, Jie Liu, Guiran Chang:

A Method for Making Three-Party Password-Based Key Exchange Resilient to Server Compromise. 546-549 - V. Valli Kumari

, Y. Aditya Kumar, K. V. S. V. N. Raju, K. Venkata Ramana, R. V. V. S. V. Prasad:
Policy Based Controlled Migration of Mobile Agents to Untrusted Hosts. 550-553 - Mohammad Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza:

Sending Mobile Software Activation Code by SMS Using Steganography. 554-557 - Saeed Sedghi, Yôiti Suzuki:

Reducing Host Interference from Spread Spectrum Watermarking. 558-561 - Jinfu Chen, Yansheng Lu, Xiaodong Xie:

An Auto-Generating Approach of Transactions Profile Graph in Detection of Malicious Transactions. 562-565 - Abid Khan

, Xiamu Niu, Yong Zhang:
Protecting Mobile Agent's Computation Results with Reversible Watermarking and Digital Signature. 566-569 - Chuanjun Wang, Xiamu Niu, Yong Zhang:

Anonymity in PKI Environment. 570-576
Intelligent Surveillance and Pattern Recognition
- Yao-Hsien Huang, Chung-Hsin Liu:

A Practical Color Transfer Algorithm for Image Sequences. 577-580 - I-Horng Jeng, Tai-Ning Yang, Chih-Jen Lee, Shih-Yun Lin, Tsung-Hsien Wu:

Intelligent Surveillance by Using 2D Heterogeneous Multimodal Sensations and Information Transcoding. 581-584 - Wei-Lieh Hsu, Chang-Lung Tsai, Tsung-Lun Chen:

Traffic Detection at Nighttime Using Entropy Measurement. 585-588 - Li-Ping Chou, Jenn-Dong Sun, Mei-Ling Chen:

A New Application Framework for Intelligent Surveillance Sensor Networks. 589-591 - Chih-Shan Liu, Jen-Chun Lin

, Nai-Chung Yang, Chung Ming Kuo:
Motion Vector Re-estimation for Trans-coding Using Kalman Filter. 592-595 - Kaset Sirisantisamrid, Kitti Tirasesth, Takenobu Matsuura:

An Algorithm for Coplanar Camera Calibration. 596-599 - Chiung-Chin Lin, Yu-Ming Lee, Yinyi Lin:

Fast Motion Search Using Early Zero-block Detection. 600-603 - Jian Xiang, Hongli Zhu:

Ensemble HMM Learning for Motion Retrieval with Non-linear PCA Dimensionality Reduction. 604-607 - Qi Han, Qiong Li, Xiongdong Huang, Tong Zhou, Xiamu Niu:

Eyes Tracking in a Video Sequence Based-On Haar-like Features and Skin Color. 608-611 - Haifang Li, Jin Li, Jiancheng Song, Junjie Chen:

Extracting Emotional Semantics from Color Image using Analytical Hierarchy Process. 612-618
Intelligent Information Processing and Multimedia Services for Digital Home
- Hao-Yun Kao:

Usability Testing of AMC Hospital's Website for Home Users: Case Study for On-Site Registration Design. 619-622 - Neng-Wen Wang, Yueh-Min Huang:

User's Authentication in Media Services by using One-Time Password Authentication Scheme. 623-626 - Jeng-Wei Lee, Yi-Tsung Chen, Yau-Hwang Kuo:

Energy-Efficient Geographic Relay for Ad-Hoc Wireless Networks. 627-630 - Sue-Chen Hsueh, Ming-Yen Lin

, Kun-Lin Lu:
Mining Generalized Association Rules for Service Recommendations for Digital Home Applications. 631-634 - Yuh-Ming Cheng, Lih-Shyang Chen, Sheng-Feng Weng, Yong-Guo Chen, Chyi-Her Lin:

Applications of a Pedagogical Agent Mechanism in a Web-based Clinical Simulation System for Medical Education. 635-638 - Jing Sun, Zhongxiao Wang, Hong Wang, Xiaofen Zhang:

Research on Routing Protocols Based on ZigBee Network. 639-642 - Mao-Cheng Huang, Jyun-Ciang Huang, Jing-Cyun You, Gwo-Jia Jong:

The Wireless Sensor Network for Home-Care System Using ZigBee. 643-646
Volume II
Techniques and Algorithms for Multimedia Security
- Yuki Ashino, Ryôichi Sasaki:

Proposal of Digital Forensic System Using Security Device and Hysteresis Signature. 3-7 - Mariko Irisawa, Yuki Ashino, Keisuke Fujita, Ryôichi Sasaki:

Development and Application of Digital Forensic Logging System for Data from a Keyboard and Camera. 8-11 - Hideaki Tanaka, Shoichi Sasaki, Isao Echizen, Hiroshi Yoshiura:

Secure Generation of Digital Signature on Compromised Computer. 12-15 - Maki Yoshida, Itaru Kitamura, Toru Fujiwara:

A New Scheme for Optimum Decoding of Additive Watermarks Embedded in Spatial Domain. 16-19 - Isao Echizen, Yusuke Atomori, Shinta Nakayama, Hiroshi Yoshiura:

HVS-Based Robust Video Watermarking with Dual-plane Correlation. 20-24 - Ryu Ebisawa, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka, Isao Echizen:

Use of Gap-Filling Operation to Enhance Image Quality of Binary Image Watermarking. 25-28 - Sho Tanaka, Michiharu Niimi, Hideki Noda:

A Study on Reversible Information Hiding Using Complexity Measure for Binary Images. 29-32 - Akiomi Kunisa:

Host-Cooperative Metadata Embedding Framework. 33-36 - Feng-Cheng Chang

, Chiao-Lin Wu, Hsueh-Ming Hang:
A Switchable DRM Structure for Embedded Device. 37-40 - Mian Cai, Jia Jia, Yan Lei:

An H.264 Video Encryption Algorithm Based On Entropy Coding. 41-44 - Ya-Fen Chang:

Non-Interactive t-out-of-n Oblivious Transfer Based on the RSA Cryptosystem. 45-50
Wired and Wireless Multimedia Networking and Applications
- Takuo Nakashima, Akari Ono, Toshinori Sueyoshi:

Queueing Analysis for Self-similar Traffic by Simulator. 51-54 - Shunsuke Oshima, Takuo Nakashima, Yusuke Nishikido:

Extraction for Characteristics of Anomaly Accessed IP Packets Based on Statistical Analysis. 55-58 - Ningping Sun, Toru Ayabe, Takahiro Nishizaki:

Efficient Spline Interpolation Curve Modeling. 59-62 - Ningping Sun, Daisuke Sato, Ryohei Takaki:

An Approach to Camera Work Based Animation. 63-66 - Amnach Khawne, Orachat Chitsobhuk

, Toshiyuki Nakamiya:
A Study of using L1-norm with Image Watermarking on SVD Domain. 67-70 - Jih-Hsin Ho, Wen-Shyang Hwang, Wen-Ping Chen:

A Novel Multimedia Network backbone Architecture base on Proportional Delay Differentiation. 71-74 - Fuke Shen, Change Pan, Xiaoli Ren:

Research of P2P Traffic Identification Based on BP Neural Network. 75-78 - Hang Li, Jie Liu, Jing Bi:

Fault Tolerant Reconstruction Algorithm Based on Distributed Agents for Network Management. 79-82 - Zenggang Xiong, Yang Yang, Xuemin Zhang, Fu Chen, Li Liu:

Integrating Genetic and Ant Algorithm into P2P Grid Resource Discovery. 83-86 - Jin-Bao Liu, Xian-Qing Hu, Qiong Li, Xiamu Niu:

Design and Implementation of a PKI-Based Electronic Documents Protection Management System. 87-92
Digital Forensics and Data Hiding Discovery
- Antonio Savoldi, Paolo Gubian:

Blind Multi-Class Steganalysis System Using Wavelet Statistics. 93-96 - Seokhee Lee, Antonio Savoldi, Sangjin Lee, Jongin Lim:

Password Recovery Using an Evidence Collection Tool and Countermeasures. 97-102 - Lei Pan

, Lynn Margaret Batten:
An Effective and Efficient Testing Methodology for Correctness Testing for File Recovery Tools. 103-107 - Ricci S. C. Ieong:

How to Balance Privilege and Digital Forensics Investigation. 108-111 - Qinglong Wang, Zhen Han, Xiuhua Geng:

Crytanalysis and Improvement on Chang et al.'s Signature Scheme. 112-114 - Tao Meng, Xinping Zhang, Shenghe Sun:

An ID-based Multi-signature Scheme. 115-117 - Ching-Yu Yang:

Color Image Steganography Based on Module Substitutions. 118-121 - Iuon-Chang Lin, Yang-Bin Lin, Chung-Ming Wang:

An Efficient Steganography Scheme for M-Commerce. 122-125 - Gang Luo, Xingming Sun, Lingyun Xiang, Junwei Huang:

An Evaluation Scheme for Steganalysis-proof Ability of Steganographic Algorithms. 126-129 - Mian Cai, Li Kang, Jia Jia:

A Multiple Grade Blind Proxy Signature Scheme. 130-133 - Jing-Ming Guo:

Complementary Steganography in Error-Diffused Block Truncation Coding Images. 134-140
Soft Computing and Intelligent System
- Lieyun Ding

, Guang Zeng, Ying Zhou
:
Design and Application of Large-scale Project Management System based on Software Bus. 141-144 - Tao Jin, Yuchen Fu, Xinhong Lin, Quan Liu, Zhiming Cui:

A Method of Ontology Mapping Based on Instance. 145-148 - Xiao-lin Wang, Zheng-Jie Yin:

Artificial Immune Recognition System as a New Classifier for Reservoir Operating Rules Extraction. 149-153 - Yun Wu, Yong Zhao, Jianshi Li:

Brief Analysis of the H.264 Coding Standard. 154-157 - WenHua Dai, Cuizhen Jiao, Tingting He:

Research of K-means Clustering Method Based on Parallel Genetic Algorithm. 158-161 - Zhenwen Zhang, Xueguang Chen, Chen Chen:

The Surplus Partition in a Simultaneous Offers Bargaining Game. 162-165 - Jihui Zhang, Qi Luo:

Application of Data Mining in Physical Statistics and Evaluation. 166-169 - Xiaogang Xiang, Zhenwen Zhang:

Analysis of Insurance Contract with the Auditing Efforts. 170-173 - Chuan-Sheng Zhou, Jie Liu:

Research and Design of Software Bus Based Generic Software Agent Architecture. 174-178 - Yi-Bei Nian, Yong-Ai Zheng:

Synchronization for Rössler Chaotic Systems Using Fuzzy Impulsive Controls. 179-182 - Jeng-Ming Yih, Yuan-Horng Lin:

A Fuzzy Basis on Knowledge Structure Analysis for Cognition Diagnosis and Application on Geometry Concepts for Pupils. 183-186 - Jeng-Ming Yih, Yuan-Horng Lin:

An Integration of Fuzzy theory and ISM for Concept Structure Analysis with Application of Learning MATLAB. 187-190 - Bo Li, RenYue Xiao:

The Particle Swarm Optimization Algorithm: How to Select the Number of Iteration. 191-196
Biomedical Engineering
- Sh-Hussain Salleh, Ismail Kamarulafizam, Asasul Islam Chowdhury, Mohd. Zin Zamri:

Signal Processing Application for Telemedicine. 197-200 - Arief R. Harris, Daniel J. Strauss

:
Adaptive Frame Decomposition in Slow Wave Cortical Responses to Transcranial Magnetic Stimulation. 201-204 - Zaleha Salleh, Mohd. Yusoff Mashor, Nor Rizuan Mat Noor

, Shazmin Aniza
, N. Abdul Rahim, A. S. W. Wahab, S. S. Md. Noor, F. Mohamad Idris, Habsah Hasan
:
Colour Contrast Enhancement Based on Bright and Dark Stretching for Ziehl-Neelsen Slide Images. 205-208 - Nazahah Mustafa, Nor Ashidi Mat Isa

, Mohd. Yusoff Mashor, Nor Hayati Othman:
Colour Contrast Enhancement on Preselected Cervical Cell for ThinPrep® Images. 209-212 - Farah I. Corona-Strauss, Wolfgang Delb, Marc Bloching, Sheikh Hussain, Daniel J. Strauss

:
The Johor Screening Scheme: Is an Area-Wide Newborn Hearing Screening Possible in Malaysia? 213-216 - Dirk Benyoucef

, Daniel J. Strauss:
Optimized Computational Instrumentation in Biomedicine: A Review. 217-220 - Chin-Feng Lin, Rung-Hua Shiu:

A Ka Band WCDMA-based LEO Multi-satellites Mobile Medicine System. 221-224 - Peng Wu, Aixia Wang, Jingjiao Li:

Smart Embed Tension Tensor Based on Internet. 225-228 - Puu-An Juang, Ming-Ni Wu:

MRI Brain Phase Image Unwrapping Process by Wavelet Zero-Padding Technique. 229-232 - Chin-Feng Lin, Cheng-Hsing Chung, Zhi-Lu Chen, Chang-Jin Song, Zhi-Xiang Wang:

A Chaos Based Unequal Encryption Mechanism in Mobile Medicine System. 233-236 - Puu-An Juang, Ming-Ni Wu:

X-ray Image Reconstruction by Radon Transform Simulation with Fan-Beam Allocation. 237-240 - Chung-Hong Lee, Chih-Hong Wu, Hsiang-Hang Chung, Hsin-Chang Yang

:
A Unified Multilingual and Multimedia Data Mining Approach for Cancer Knowledge Discovery. 241-244 - Ming-Ni Wu, Chia-Chen Lin

, Chin-Chen Chang:
Brain Tumor Detection Using Color-Based K-Means Clustering Segmentation. 245-250
Advanced Data Hiding and Coding Techniques for Audio Signals
- Naofumi Aoki:

Potential of Value-Added Speech Communications by Using Steganography. 251-254 - Yuta Nakashima, Ryuki Tachibana, Noboru Babaguchi:

Maximum-Likelihood Estimation of Recording Position Based on Audio Watermarking. 255-258 - Akinori Ito

, Shozo Makino:
Increasing Correlation using a Few Bits for Multiple Description Coding. 259-262 - Ming Li, Yun Lei, Xiang Zhang, Jian Liu, Yonghong Yan:

Authentication and Quality Monitoring based on Audio Watermark for Analog AM Shortwave Broadcasting. 263-266 - Hyun-Ho Kang, Koutarou Yamaguchi, Brian M. Kurkoski:

Psychoacoustically-Adapted Patchwork Algorithm for Watermarking. 267-270 - Tetsuya Munekata, Toshimitsu Yamaguchi, Hiroki Handa, Ryouichi Nishimura, Yôiti Suzuki:

A Portable Acoustic Caption Decoder Using IH Techniques for Enhancing Lives of the People Who Are Deaf or Hard-of-Hearing - System Configuration and Robustness for Airborne Sound -. 271-274 - Akira Nishimura:

Presentation of Information Synchronized with the Audio Signal Reproduced by Loudspeakers using an AM-based Watermark. 275-278 - Kotaro Sonoda

, Katsunari Yoshioka
, Osamu Takizawa:
Information Hiding for Public Address Audio Signal using FH/FSK Spread-spectrum Scheme. 279-282 - Ahmad Delforouzi, Mohammad Pooyan:

Adaptive Digital Audio Steganography Based on Integer Wavelet Transform. 283-286 - Mohammad Pooyan, Ahmad Delforouzi:

Adaptive and Robust Audio watermarking in Wavelet Domain. 287-290 - Che-Jen Hsieh, Jung-Shian Li, Cheng-Fu Hung:

A Robust Audio Fingerprinting Scheme for MP3 Copyright. 291-294 - Yuhua Jiao, Yubo Tian, Qiong Li, Xiamu Niu:

Content Integrity Verification for G.729 Coded Speech. 295-300
Web Intelligence and Computational Intelligence
- Mingzhang Zuo, Lingyun Yi, Gannian Zhang:

Using Knowledge Management Technologies to Develop Reflective Learning. 301-304 - Chun-hong Hu, Ming Zhao:

Construction of Collaborative Virtual Learning Communities in Peer-to-peer Networks. 305-308 - Shijue Zheng, Shiqian Wu

:
Research and Application of an Improved Genetic Algorithm on the Net Platform of "Digitized Party School". 309-312 - Wei-dong Yang, Ming Zhao:

Research on Knowledge Management Framework Based on Peer-to-peer Computing. 313-316 - Weitao Zheng, Zihua Zhang, Ting Liao, Tuanjie Zhao, Yong Ma:

Study on the Division Tactics of Top Swimming Athletes Home and Abroad in the 400m Freestyle Swimming Race. 317-320 - Jingjing Liu, Bing Wu:

A Multi-agent System for the Flexible Resource Constrained Project Scheduling. 321-324 - Xiaoyan Hao, Xiaoming Chang, Kaiying Liu:

A Rule-based Chinese Question Answering System for Reading Comprehension Tests. 325-329 - Mingzhi Huang, Chengwei Fan:

Research on the Partner Selection of Virtual Enterprise Based on Self-adaptive Genetic Algorithm. 330-333 - Xianzhi Tian:

Research on Scientific Constructions of CAI English Teaching System. 334-337 - Xiang Li, Ximing Liang:

A Hybrid Adaptive Evolutionary Algorithm for Constrained Optimization. 338-341 - Chunhe Song, Hai Zhao, Wei Cai, Haohua Zhang, Ming Zhao, Wei Gao, Xuanjie Ning, Xudong Han, Peng Zhu, Jie Gao, Tianyu Qi, Hongyan Gong:

The Distance-Guided Particle Swarm Optimizer with Dynamic Mutation. 342-345 - Bo Yang, Ding-Xue Zhang, Rui-Quan Liao:

A Modified Particle Swarm Optimization Algorithm with Dynamic Adaptive. 346-349 - Jun-Jie Chen, Haifang Li, Yu-Xing Yang, Ji-Lan Ma:

A DNA Algorithm of Graph Vertex Coloring Problem Based on Multi-separation. 350-356
Software and Hardware Designs of Multimedia Networking Embedded Systems
- Jeng-Wei Lee, Jia-Ming Yang, Chao-Lieh Chen, Yau-Hwang Kuo:

Video Streaming Using Overlay Multicast Scheme with Efficient and Load-Balance Path Diversity. 357-360 - Lien-Fa Lin:

Search RNN on Broadcast Environment. 361-364 - Wen-Chuan Hsieh, Wei-Chung Hsu, Yu-Yuan Hsu:

An Architecture for the Interoperability of Multimedia Messaging Services between GPRS and PHS Cellular Networks. 365-368 - Ming-Harng Lee, Mong-Fong Horng, Bo-Chao Chang:

A DC-based Approach to Robust Watermarking with Hamming-Code. 369-372 - Tian-Hua Liu, Hong-Feng Zhu, Chuan-Sheng Zhou, Gui-Ran Chang:

Design and Simulation of VHDL based ARP Cache. 373-376 - Chuan-Sheng Zhou, Chong Fu:

Implementation of a General Reduced TCP/IP Protocol Stack for Embedded Web Server. 377-380 - Zhiyi Sun, ChaoZhen Hou:

Fuzzy Control for Networked Control System. 381-384 - Liang-Bi Chen

, Ching-Chi Hu, Yen-Ling Chen, Chi-Wei Chu, Ing-Jer Huang:
The AES Design Space Exploration with a Soft IP Generator. 385-388 - Tony Gladvin George, N. Malmurugan:

The Architecture of Fast H.264 CAVLC Decoder and its FPGA Implementation. 389-392 - Min-Chuan Lin, Guo-Ruey Tsai, Chun-Rong Wu, Ching-Hui Lin:

Watermarking Technique for HDL-based IP Module Protection. 393-396 - Yuh-Yih Lu, Zhi-Hua Chen, Hsiang-Cheh Huang

:
The System for the Reduction of Conducted Electromagnetic Interference Emission from Switching Power Supply. 397-402
Video Surveillance and Recognizing Human Behavior
- Wen-Shiung Chen, Yao-Shan Chiang, Yen-Hsun Chiu:

Biometric Verification by Fusing Hand Geometry and Palmprint. 403-406 - Yu-Ting Chen, Chu-Song Chen:

Cascading Rectangle and Edge Orientation Features for Fast Pedestrian Detection. 407-410 - Kan-Ru Chen, Chia-Te Chou, Sheng-Wen Shih, Wen-Shiung Chen, Duan-Yu Chen:

Feature Selection for Iris Recognition with AdaBoost. 411-414 - Sin-Yu Chen, Jun-Wei Hsieh:

Edge-based Lane Change Detection and its Application to Suspicious Driving Behavior Analysis. 415-418 - Chih-Chung Hsu

, Hsuan-Ting Chang, Ting Cheng Chang:
An Improved Face Detection Method in Low-resolution Video. 419-422 - Ying-Nong Chen, Gang-Feng Ho, Kuo-Chin Fan, Chin-Chuan Han:

Face Detection and Authentication in a Large Space. 423-426 - Cheng-Chang Lien, Jian-Cheng Wang, Yue-Min Jiang:

Multi-mode Target Tracking on a Crowd Scene. 427-430 - Yuan-Kai Wang

, Chun-Hao Huang:
Facial Expression Recognition with Discriminative Common Vector. 431-434 - Yea-Shuan Huang, Hua-Ching Yan, Ting-Chia Hsu:

Cascaded Face Detector with Multiple Templates. 435-440
Information Hiding and Digital Watermarking
- Hioki Hirohisa:

A Steganographic Method Based on a File Attribute. 441-444 - Xiao-Yan Liu, Li-Hong Ma, Hu-Yun Yin:

New Video Watermarking Scheme by Using Dither Modulation to Local Energy. 445-448 - Ko-Chin Chang, Ping Sheng Huang, Te-Ming Tu, Chien-Ping Chang:

Image Steganographic Scheme Using Tri-way Pixel-Value Differencing and Adaptive Rules. 449-452 - Yuan-Liang Tang, Hui-Tzu Huang:

Robust Near-Reversible Data Embedding Using Histogram Projection. 453-456 - Chin-Chen Chang, The Duc Kieu:

Secret Sharing and Information Hiding by Shadow Images. 457-460 - Hsiang-Cheh Huang

, Yu-Hsiu Huang, Jeng-Shyang Pan, Yuh-Yih Lu:
Information Protection and Recovery with Reversible Data Hiding. 461-464 - Hsiang-Cheh Huang

, Jeng-Shyang Pan, Chi-Ming Chu:
Optimized Copyright Protection Systems with Genetic-Based Robust Watermarking. 465-468 - Dong Zhang, Depei Qian, Pen Han:

A New Attributes-Priority Matching Watermarking Algorithm Satisfying Topological Conformance for Vector Map. 469-472 - Sandipan Dey, Ajith Abraham, Sugata Sanyal:

An LSB Data Hiding Technique Using Natural Number Decomposition. 473-476 - Kyung-Su Kim, Min-Jeong Lee, Heung-Kyu Lee:

Blind Image Watermarking Scheme in DWT-SVD Domain. 477-480 - Jianlong Yang, Jianmin Wang

, Chaokun Wang, Deyi Li:
A Novel Scheme for Watermarking Natural Language Text. 481-484 - Florent Autrusseau, Patrick Le Callet, Alexandre Ninassi:

A Study of Content based Watermarking using an Advanced HVS Model. 485-488 - Chien-Chang Chen

, De-Sheng Kao:
DCT-Based Reversible Image Watermarking Approach. 489-492 - Jia-Hong Lee, Mei-Yi Wu:

An Iterative Method for Lossless Data Embedding in BMP Images. 493-498
Intelligent Video Processing
- Hsi-Kuan Chen, Chin-Hsing Chen, Shih-Jen Wang:

Applying the CDHS to Improve the MAP-Based Algorithm in Super Resolution Reconstruction from Sequences. 499-502 - De-Ji Liu, Chien-Hung Lin, Shu-Chung Yi, Jin-Jia Chen:

A Resistor String DAC for Video Processing. 503-506 - Shun-He Huang, Chien-Hung Lin, Shu-Chung Yi, Jin-Jia Chen:

A Chinese Abacus DAC for Video Applications. 507-510 - Chung-Chi Lin, Zeng-Chuan Wu, Wen-Kai Tsai, Ming-Hwa Sheu, Huann-Keng Chiang:

The VLSI Design of Winscale for Digital Image Scaling. 511-514 - Thou-Ho Chen, Zhi-Hong Lin, Chin-Hsing Chen, Cheng-Liang Kao:

A Fast Video Noise Reduction Method by Using Object-Based Temporal Filtering. 515-518 - Thou-Ho Chen, Jun-Liang Chen, Chin-Hsing Chen, Chao-Ming Chang:

Vehicle Detection and Counting by Using Headlight Information in the Dark Environment. 519-522 - Thou-Ho Chen, Chao-Yu Chen, Chin-Hsing Chen:

An Adaptive Random-valued Impulse Noise Reduction Method Based on Noise Ratio Estimation in Highly Corrupted Images. 523-526 - Chin-Fa Hsieh, Tsung-Han Tsai, Shu-Ping Chang, Tai-An Shan:

A Cost-Effective Noise-Reduction Filtering Structure Based on Unsymmetrical Working Windows. 527-530 - Thou-Ho Chen, Chao-Yu Chen, Shi-Feng Huang, Chin-Hsing Chen:

A Real-Time Video Noise Reduction Algorithm in the Dusk Environment. 531-534 - Chih-Hsien Hsia

, Jen-Shiun Chiang, Ying-Hong Wang, Tsai-Yuan:
Fast Intra Prediction Mode Decision Algorithm for H.264/AVC Video Coding Standard. 535-538 - Lifang Wu, Xiuli Han, Hao Cui, Wei Shen:

Shot Segmentation and Classification in Basketball Videos. 539-542 - Wei-Han Chang, Nai-Chung Yang, Chung Ming Kuo, Ching-Hsuan Lin:

Template-Based Scene Classification for Baseball Videos Using Efficient Playfield Segmentation. 543-548
Novel Computation on Finance and Management
- Chou-Wen Wang, Chia-Chien Chang:

Pricing Credit-Linked Notes Issued by the Protection Buyer and an SPV. 549-552 - Jui-Chuan Chang:

Financial Accelerator Effect and Macroeconomic Fluctuations. 553-556 - Naiwei Chen, Yakuang Liu:

Application of Artificial Neural Network to Corporate Liquidity Determination. 557-560 - Pen-Yuan Liao:

Optimal Pricing Strategy for Queuing Systems with Capacity Constraint Problem. 561-564 - Tien-Tsai Huang:

The Application of Fuzzy Evaluating Approach on Banking Operating Performance in Taiwan: An Empirical Study. 565-569 - Wei-Shen Tai, Chen-Tung Chen:

An Intellectual Capital Performance Evaluation Based on Fuzzy Linguistic. 570-573 - Chiu-Lien Lee, Ming-Hung Shu:

Fault-Tree Analysis of Intuitionistic Fuzzy Sets for Liquefied Natural Gas Terminal Emergency Shut-Down System. 574-577 - Yueqin Zhang, Jinfeng Liu, Fu Duan, Jing Ren:

Genetic Algorithm in Vehicle Routing Problem. 578-581 - Lei Sun, Tzu-Chieh Lin, Hsiang-Cheh Huang

, Bin-Yih Liao, Jeng-Shyang Pan:
An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index. 582-585 - Shouda Jiang, Lianlei Lin, Chao Sun:

A Fast Training Algorithm for Least Squares SVM. 586-592
Intelligent Data Analysis
- Cheng-Chung Hsu, Sheng-Tun Li, Chih-Chuan Chen, Ti-Yen Yang:

An Enhanced ACO Algorithm for Multi-objective Maintenance Scheduling of Oil Tanks. 593-596 - Sheng-Tun Li, Chih-Chuan Chen, Jian Wei Li:

A Multi-objective Particle Swarm Optimization Algorithm for Rule Discovery. 597-600 - Sheng-Tun Li, Hei-Fong Ho:

Fuzzy Rating Framework for Knowledge Management. 601-604 - Jen-Peng Huang, Guo-Cheng Lan, Huang-Cheng Kuo, Tzung-Pei Hong:

A Decomposition Approach for Mining Frequent Itemsets. 605-608 - Chan-Sheng Kuo, Tzung-Pei Hong, Chuen-Lung Chen:

Integrating Multiple Knowledge Sources by Genetic Programming. 609-612 - Xiao-wei Wang, Ying-ming Liu, Feng Li:

Imitation Output Characteristic of Turbine Control Based on Servos Interface Technology. 613-616 - Lingjun Xu, Gang Su, Zhijun Liu, Yong Wang, Ping Zhang:

A High-Efficiency Recursive Algorithm without Numerical Instability for Polynomial Predistorter Design. 617-620 - Te-Shun Chou, Kang K. Yen, Niki Pissinou, Kia Makki:

Fuzzy Belief Reasoning for Intrusion Detection Design. 621-624 - Jiadong Ren, Ke Li:

Find Recent Frequent Items with Sliding Windows in Data Streams. 625-628 - Said E. El-Khamy

, Mohamed Essam Khedr
, Ahmad Al-Kabbany:
Punched Image Watermarking: A Novel Fast Fractal Coding Based Technique. 629-632 - Changyuan Fan, Xiayu Mu:

On the Convergence Behavior of the FastICA Algorithm with the Kurtosis Cost Function. 633-638
Intelligent Information Processing in Wireless Sensor Networks
- Yung-Tsung Hou, Chia-Mei Chen, Bingchiang Jeng:

Distributed Detection of Wormholes and Critical Links in Wireless Sensor Networks. 639-642 - Wei-Yu Lai, Chia-Mei Chen, Bingchiang Jeng, Gu Hsin Lai, Hsiao-Chung Lin:

Information Exchange Mechanism Based on Reputation in Mobile P2P Networks. 643-646 - Wei Kuang Lai, Chen-Da Tsai:

Scalable Anycast System based on OSPF. 647-650 - Jie Liu, Qingdong Du:

A Multi-Sensor Fusion Method Applied to Stability Diagnosis Based on Distributed Neyman-Pearson Algorithm. 651-654 - Ying Liang, Hang Li:

An Energy-Efficient Clustering Algorithm for Wireless Sensor Network. 655-658 - Min-Hua Shao:

An Effective Privacy-Preserving RFID Scheme against Desynchronization. 659-662 - Xuemin Zhang, Zenggang Xiong:

Research on pertinence of QoS Metrics Based on IEEE 802.15.4 in Wireless Sensor Networks. 663-666 - Minghua Yang, Yuanda Cao, Li Tan, Changyou Zhang, Jiong Yu:

A New Multi-quality Image Fusion Method in Visual Sensor Network. 667-670 - Che-Wei Hsu, Chin-Shiuh Shieh, Wei Kuang Lai:

A Multi-path Routing Protocol with Reduced Control Messages for Wireless Sensor Networks. 671-675

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














