Stop the war!
Остановите войну!
for scientists:
default search action
ICS 2014: Taichung, Taiwan
- William Cheng-Chung Chu, Han-Chieh Chao, Stephen Jenn-Hwa Yang:
Intelligent Systems and Applications - Proceedings of the International Computer Symposium (ICS) held at Taichung, Taiwan, December 12-14, 2014. Frontiers in Artificial Intelligence and Applications 274, IOS Press 2015, ISBN 978-1-61499-483-1 - Chen-Wan Lin, Bang Ye Wu:
A 2-approximation algorithm for the clustered minimum routing cost tree problem. 3-10 - Maw-Shang Chang, Li-Hsuan Chen, Ling-Ju Hung:
An efficient exact algorithm for P2-packing in cubic graphs. 11-21 - Van Bang Le, Sheng-Lung Peng:
Good characterizations and linear time recognition for 2-probe block graphs. 22-31 - Ssu-Ting Liu, Sheng-De Wang:
PFBF: Pre-Filtered Bloom Filters. 32-39 - Shih-Yuan Huang, Chung-Han Yang, Toan Thang Ta, Chin Lung Lu:
Approximate String Matching Problem under Non-Overlapping Inversion Distance. 40-48 - Chia-Wei Lee, Horng-Chyau Huang, Sun-Yuan Hsieh:
IDP: An Innovative Data Placement Algorithm for Hadoop Systems. 49-58 - Ting-Wei Chang, Ondrej Navrátil, Sheng-Lung Peng:
The End-to-end Longest Path Problem on a Mesh with a Missing Vertex. 59-66 - Tzu-Liang Kung, Hon-Chan Chen, Lih-Hsing Hsu, Chi-Lun Wang:
Toward the One-to-Two Balanced Disjoint-Path Cover of Matching Composition Networks. 67-76 - Shun-Chieh Chang, Jia Jie Liu, Yue-Li Wang:
The Weighted Independent Domination Problem in Series-Parallel Graphs. 77-84 - Kun-Fu Ding, Kung-Jui Pai, Jou-Ming Chang, Rueiher Tsaur:
Some Results of Incidence Coloring on Generalized Petersen Graphs. 85-91 - Cheng-Nan Lai:
On the Existence of All Shortest Vertex-Disjoint Paths in Cayley Graphs of Abelian Groups. 92-103 - Che-Nan Kuo:
Extended Cycles Embedding on Folded Hypercubes with Vertex-Fault-Tolerant. 104-111 - Yi Kung Shieh, Richard C. T. Lee:
An Efficient Algorithm to Solve the Nearest Neighbor Searching Problem. 112-121 - Hsia-Hsiang Chen, Shih-Kun Huang:
A Multi-Agent Intelligence Hybrid System Technique for Detection and Defense of DDoS Attacks. 125-139 - Yu-Ting Liu, Yang-Yin Lin, Tsung-Yu Hsieh, Shang-Lin Wu, Chin-Teng Lin:
A global optimized neuro-fuzzy system using artificial bee colony evolutionary algorithm. 140-149 - Ching-Yu Chiu, Chih-Yu Chen, Yang-Yin Lin, Shi-An Chen, Chin-Teng Lin:
Using a Novel LDA-Ensemble Framework to Classification of Motor Imagery Tasks for Brain-Computer Interface Applications. 150-156 - Sheng-Chin Hung, Chieh-Yang Chen, Chien-Hsueh Chiang, Yiming Li:
Circuit-Simulation-Based Multi-objective Evolutionary Algorithm with Multi-Level Clock Driving Technique for a-Si: H TFTs Gate Driver Circuit Design Optimization. 157-166 - Shin-Shou Chen, Chien-Feng Huang, Tzung-Pei Hong, Bao Rong Chang:
Using a Genetic Model for Asset Allocation in Stock Investment. 167-174 - Hou-Yu Chen, Shih-Hung Wu:
Automatic Adaptive Locomotion on Partially Breakdown Quadrupedal Biomorphic Robot by Multi-Objective Evolutionary Algorithms. 175-184 - Hsueh-Ting Chu, Tieh-Cheng Fu:
Analysis of exercise ventilation with autoregressive model and Hilbert-Huang transform. 185-192 - Chih-Sheng Lin, Shih-Meng Teng, Pao-Ann Hsiung:
Auto-Tuning for GPGPU Applications Using Performance and Energy Model. 195-204 - Chun-Yu Chen, Yun-Lung Lee, Jer-Min Jou:
A Transaction-based Design Model and Its MPEG-2 Encoder Design. 205-214 - Chin-Fu Kuo, Yung-Feng Lu:
Power Management Strategy for Non-DVS Multiprocessor System. 215-224 - Hung-Lin Chao, Pao-Ann Hsiung:
Micro-grid Design Modeling and Prototyping. 225-234 - Yung-Feng Lu, Chin-Fu Kuo, Pei-Lun Suei, Wei-Chen Pao:
An Optimal Budget Assignment of Real-Time Query Processing for Wireless Sensor Networks in Context of the Internet of Things. 235-245 - Wei-Kai Cheng, Yen-Heng Ciou:
A Data Migration Approach for L1 Cache Design with SRAM and Volatile STT-RAM. 246-253 - Trong-Yen Lee, Wei-Cheng Chen, Chi-Han Huang:
Design of Low-Complexity 4-Path Dynamic Reconfigurable MDC FFT Processor. 257-268 - Ing-Chao Lin, Yao-Te Wang, Shuen-Shiang Yang, Yi-Luen Wu:
Analyzing the BTI Effect on Multi-bit Retention Registers. 269-278 - Shiow-Jyu Lin, Ju-Xun He, Guan-Wei Chen, Wang-Wei Chen:
FPGA Implementation for Path and Wall Following Wheeled Robots. 279-288 - Kuan-Hung Chen:
A Low-Memory-Access Flexible Architecture for FFT. 289-297 - Ting-Hsuan Chien, Rong-Guey Chang:
Dynamic Voltage and Frequency Scaling Optimization for Multicore Architectures. 298-307 - Mao-Hsu Yen, Yeong-Chang Maa, Yih-Hsia Lin, Chih-Chen Lai, Shu-Ping Zheng:
VLSI Implementation of 8051 MCU with In-System Programming. 308-314 - Yang-Hsin Fan:
Line Probe Routing Algorithm Implementation for SOC. 315-320 - Chihhsiong Shih, Minlong Huang, Zhaolong Liang:
An Color Interference Checking Chip Dicing Plan for Multiple Project Wafer. 321-331 - Ming-Hung Wang, Chin-Laung Lei:
Forecasting the Impacts of Articles and Authors on the Social Forum during Emergencies. 335-344 - Chien-Yu Wu, Hann-Jang Ho, Sing-Ling Lee:
Optimization of Downlink Bandwidth Allocation for Energy Efficiency over OFDMA Wireless Networks. 345-354 - Fu Yuan Chua, Kang-Hao Lo, Yen-Wen Chen:
Study of Radio Resource Reallocation for Hotspots in LTE Network. 355-363 - Li-Der Chou, Chi-An Jen, David Chunhu Li, Chun-Tse Lin:
A DHT-based Resource Provision Enquiry for Cloud Computing Interoperability. 364-372 - Xiangyu Ren, Jin Liu, Qiuxia Song, Junjie Song, Bei Zhong:
A Novel Approach for Ontology Maintenance Based on Web Data. 373-380 - Jung-Hung Wang, Jian-Min Wu, Chow-Sing Lin:
A FEC Allocation Method for Unequal Loss Protection of H.264/AVC Videos Based on Macroblock Index. 381-390 - Rung-Shiang Cheng, Chia Peng Lin:
NFC Facility Inventory Control and Checking System. 391-400 - Peng-Hsiang Kao, Xuan-Bo Wang, Yu-Yun Lin, Lei Wang:
Extending lifespan of a sensor network by partial coverage strategy. 401-411 - Ting Lu, Guohua Liu, Shan Chang, Wenjing Guo, Qiubo Huang:
Maximum-Lifetime Least-Cost Multicasting in MANETs based on Heuristic Genetic Algorithm. 412-419 - Chui-Ming Chiu, Sheng-Wei Huang, Tzu-Chi Huang, Ce-Kuen Shieh, Ming-Fong Tsai, Lien-Wu Chen:
A Task Scheduling Policy for Heterogeneous MapReduce Cluster. 420-429 - Yanjun Cao, Jin Liu, Jingtai Zhang, Fei Li, Bei Zhong:
A Novel SVM Based Multi-Facet Ranking Method for Topic Specific Web Pages. 430-437 - Hung-Huan Liu, Chung-Wei Liao, Wei-Hsiang Lo:
WiFi-based Floor Estimation for Multi-Storey Building: A Case Study for a Crowded AP Environment. 438-444 - Yao-Chung Chang:
Machine to Machine Service Capability Architecture for LTE Communication System. 445-452 - Jin-Lih Shieh, Yau-Hwang Kuo, Wei-Hsun Lee:
A Hierarchical M-hops Idle Bandwidth Sharing Approach in Vehicular Ad-Hoc Network. 453-462 - Jian Shen, Chen Wang, Anxi Wang, Lei Li, Yu Yang, Jin Wang:
Performance Comparison of Typical Routing Protocols in Ad-hoc Networks. 463-473 - I-Hsien Liu, Tian-Li Wang, Jung-Shian Li:
An Effective Group Communications in Hybrid VANET. 474-481 - Jin Liu, Danliang Chu, Junjie Song, Bei Zhong, Biqi Cai:
A Rule Based DFA Driven Information Extractor for Content Extracting from Web Pages. 482-488 - Yu-Ann Chen, Pau-Choo Chung:
Enhanced Local Support Vector Machine With Fast Cross-Validation Capability. 491-500 - Yu-Feng Lin, Pei-Wen Jiang, Vincent S. Tseng:
Efficient Mining of Frequent Target Episodes from Complex Event Sequences. 501-510 - Jia-Ling Koh, Chia-Jung Chiang, Seng-Chih Chu, Yi-Chi Huang, Shao-Chun Peng, Sz-Han Wang, Te-Yu Liu, Hui-I Hsiao, Chien Lin, Arbee L. P. Chen:
A Graph Structure-based Asset Retrieval System. 511-520 - Ye-In Chang, Chia-En Li, Tzu-Lin Chin:
An Obstruction-Check Approach to Mining Closed Sequential Patterns in Data Streams. 521-530 - Kwan-Hua Sim, Isaac Yung Shen Goh, Kwan Yong Sim, Yiing Chee Tan:
Forecasting Price Volatility Range of Crude Palm Oil by Mining the Historical Data Using Hybrid Range Model. 531-540 - Xiao Yang, Yan Liu, Zunhe Liu, Buyang Cao:
Anomaly Detection in Hadoop Clusters Using PCA and DBSCAN. 541-552 - Bao Rong Chang, Hsiu Fen Tsai, Chia-Yen Chen, Hung-Ta Hsu:
Analysis of Big Data Sized NoSQL Database with Secondary Index. 553-558 - Wen-Hao Tsai, Wo-Chen Liu, Kuan-Rong Lee, Wei-Tsung Su, Pei-Yin Chen, Yau-Hwang Kuo:
Development of Graphical Editor for Supervisory Control and Data Acquisition System in Agriculture Greenhouse. 561-571 - Lung-Pin Chen, Wen-Nan Hsu:
An Automated Wrapper Generator for Semi-Structured Web Contents. 572-582 - Wen-Hao Tsai, Yan-Ting Lin, Kuan-Rung Lee, Yau-Hwang Kuo, Bing-Huei Lu:
Landscape Recommendation System Using Public Preference Mining and Social Influence Analysis. 583-592 - Hsuan-Hsuan Chin, Chun-Chih Lo, Pei-Yu Wu, Mong-Fong Horng, Yau-Hwang Kuo:
QoN-oriented Resilient Bandwidth Allocation for Medical Content Services in Software-Defined Hospital Networks. 593-602 - Tzu-Chi Lin, Cheng-Min Lin, Chong-Wey Lin:
The Design and Implementation of the Intelligent Crafts for Digital Arts. 603-610 - Lun-Chi Chen, I-En Liao, Chi-Hao Chen:
News Event Detection Using Random Walk with Restart. 611-620 - Tseng-Yi Chen, Heng-Yin Chen, Nai-Yuan Jhang, Wei-Kuan Shih:
A User Interactive Experience for One-handed Operation of Hand-held Devices. 621-630 - Wen-Bin Huang, Shuo-Wen Chang, Mei-Yun Xie, Chu-Rong Yen, Mong-Fong Horng:
A New Human-Machine Interaction of Smart Plants. 631-640 - Shiuh-Ku Weng, Chaur-Heh Hsieh, You-Zen Chy:
A Vision-based Virtual Keyboard Design. 641-647 - Yun-Ting Ching, Yi-Ming Chen:
The Research of Experimental State Feedback Mechanism Based on Windows API - Take Cloud Security Experimental Platform for Instance. 651-661 - Che-Wun Lin, Yun-Yuag Chiang, Wei-Ru Lai:
Implementation of Portal System of Online Tutoring for After School's Learning. 662-671 - Mark Pegrum:
Mobile Literacy: - Navigating New Learning Opportunities and Obligations. 672-679 - Szu-chia S. Lo:
Effectiveness of Constructing Information Literacy via Credited Information Literacy Program. 680-688 - Ko-Fong Lee, Kai-Yi Chin, Jim-Min Lin:
Interactive augmented reality system for supporting museum guided instruction. 689-698 - Hong-Ren Chen, Hsiao-Han Chiu:
Design of Chinese Language Learning APP in the Context-Aware Learning Environment. 699-706 - Kun-Huang Huarng:
Originality Assurance in Academic Publication. 707-712 - Jheng-Jia Huang, Wen-Shenq Juang, Chun-I Fan:
An Efficient Authentication and Service Key Agreement Scheme in IOT Environments. 715-723 - Kuo-Chang Chen, Yu-Chi Chen, Gwoboa Horng, Raylin Tso:
Efficient public key encryption with user-friendly keywords search for searchable cloud storage. 724-733 - Kuo-Hui Li, Chien-Sung Li, Shuenn-Shyang Wang, Yi-Pin Liao:
Reversible Data Hiding Method based on CSD Data Representation. 734-745 - Yuji Suga:
Classification of Generalized Graph-type (2, n)-Visual Secret Sharing Schemes and Optimal Construction for Multiple Secrets. 746-755 - Chin-Chen Chang, Thai-Son Nguyen, Chia-Chen Lin:
A Virtual Primary Key for Reversible Watermarking Textual Relational Databases. 756-769 - Yao-Zhang Huang, Ching-Tsung Hsueh, Yi-Ju Chiang, Yen-Chieh Ouyang:
A New Cryptosystem Based on Three Knapsacks with Plaintext Encoding. 770-781 - Wen-Chung Kuo, Hong-Ji Wei, Yu-Hui Chen, Jiin-Chiou Cheng:
Cryptanalysis of Anonymous Authenticated and Key Agreement Scheme Based on Biometric for Multi-Server Environment. 782-787 - Shao-Heng Chen, Fu-Kuo Tseng, Rong-Jaye Chen:
A Privacy-Preserving Encoding for Efficient Comparison Queries and Access Control from Predicate Encryption. 788-797 - Wen-Chen Wu, Chu-Hsing Lin, Jung-Chun Liu, Ssu-Ying Lin:
Designing QR Code with Authentication Capabilities. 801-810 - Pei-Chen Yeh, Hahn-Ming Lee, Hsiao-Rong Tyan, Kuo-Ping Wu:
Heap Spraying Revelation: Heap-spraying Detection based on Minimal Length Sequence and Argument Analysis. 811-820 - Ting-Yao Chang, Wei-Yu Lai, Tien-Ruey Hsiang, Ching-Hao Mao:
Detecting Malware in Malicious Virtual Machines Using Tensor Analysis Techniques. 821-830 - Mahalingam Ramkumar, Somya D. Mohanty:
A Trustworthy Assurance-as-a-Service Architecture. 831-840 - Wei-Jun Chen, Hsiao-Rong Tyan, Shih-Kun Huang:
On the Effectiveness of Scheduling Fuzz Testing. 841-849 - Jia-Rong Sun, Min-Shiang Hwang:
A New Investigation Approach for Tracing Source IP in DDoS attack from Proxy Server. 850-857 - Wei-min Liao:
Regulatory Framework for Information Security in Taiwan's New Personal Information Protection Act of 2012. 858-865 - Hung-Yu Chien, Meng-Yuan Chiang, Yi-Ting Hsin, Chun-Pei Hung:
Efficiently tracking TANET suspicious packets and identifying the devices using Splunk. 866-874 - Chin-Feng Lee, Jui-Yu Chen, Si-Ting Chen:
A High Capacity Reversible Multiple-Image Hiding Scheme. 875-884 - Tzu-Chuen Lu, Sue-Chen Hsueh, Chun-Ya Tseng, Pei-Lun Chen:
Information Hiding Scheme based on Replace Function and Wavelet Transform. 885-893 - He-Ming Ruan, Gan Wei Yeap, Chin-Laung Lei:
Hybrid Intrusion Detection Framework for Advanced Metering Infrastructure. 894-903 - Da-Yu Kao, Min-Jung Chung, Shiuh-Jeng Wang:
Frameworks in Evidence Collection in Forensics by Analyzing Temporal Cloud Storage Forensics. 904-913 - Chien-Lung Hsu, Yu-Hao Chuang, Pei-Ling Tsai:
Design of Proxy Signature Schemes Using Self-Certified Public Keys from Pairings. 914-924 - Chia-Mei Chen, Gu Hsin Lai:
An efficient honeypot based malware classification system. 925-933 - Yan Zhu, Fan Yang, Shouhong Tang:
WSD-AIS: an Artificial Immune System Approach against Web Spam. 934-943 - Jen-Chun Chang, Chen-Hsuan Lee, Hsin-Lung Wu:
On Reversible Data Hiding Schemes for JPEG Images from the Modified Quantization Table. 944-953 - Chien-Chang Chen, Han-Wei Tsai:
Wavelet-Based Reversible and Visible Image Watermarking Scheme. 954-963 - Jeang-Kuo Chen, Fang-Sheng Chang:
Protection of Privacy Data in a Cloud Environment. 964-971 - Chih-Hung Wang, Xuan-Liang Chen:
Design of Hypervisor-based Integrated Intrusion Detection System in Cloud Computing Environment. 972-981 - Jian Shen, Haowen Tan, Sai Ji, Yongjun Ren, Jin Wang:
A Comparative Survey on RFID Grouping Authentication Protocols. 982-993 - Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen, Chin-Laung Lei:
A Security Assessment Environment and Process Design for Smart Meter Vendor Production Line. 994-1001 - Yu-Hao Chang, Jin-Jang Leou:
Content-aware Stereoscopic Image Retargeting Using Non-homogeneous Warping. 1005-1014 - Chia-Feng Chang, Jiunn-Lin Wu:
A New Single Image Deblurring Algorithm Using Hyper Laplacian Priors. 1015-1022 - Pei-Yu Lin, Yi-Hui Chen, Jun-Chou Chuang:
A (n, n)-threshold Secret Sharing Scheme for Barcode Application. 1023-1028 - Sheng-Hao Chang, Po-Chyi Su, Yung-Chieh Joseph Chou:
A Dual-Camera Tracking Scheme with Object Information Hiding. 1029-1042 - Hao-Rong Ding, Chih-Hung Kuo, Po-Hung Kuo, Yan-Tse Chuang:
Massive Parallel Computing of Super-Resolution with Sparse Representation. 1043-1051 - Kuan-Yi Lin, Duan-Yu Chen, Suh-Yin Lee:
A Robust Vision-Based Heart Rate Evaluation. 1052-1061 - Yi-Hui Chen, Eric Jui-Lin Lu, Tsai-Ying Wu, Tsung Hau Lin:
Classify Blog Articles Using Queried Keywords. 1062-1068 - Ching-Fen Jiang, Wan-Chi Huang:
Brain Stroke Evaluation from Multi-image Modalities Using Image Registration and Segmentation Techniques. 1069-1076 - Meng-Ting Wu, Yeah Su, Lei Wang:
A Real-Time Image Contrast Enhancement Technique for Medical Usage. 1077-1086 - Jing-Ming Guo, Jia-Yu Chang, Yun-Fu Liu:
Banding Effect Removal for Digital Multitoning. 1087-1096 - Wen-Yen Wu:
An improved method for circle detection. 1097-1106 - Yi-Chong Zeng, Shih-Jui Yang, Wen-Tsung Chang:
Integer-based Quality Assessment Measure Using Fixed-point Arithmetic Operations. 1107-1115 - Chien-Chuan Ko, Chun-Hung Lin, Kai-Sheng Liao, Chi-Yang Chen:
A fully automatic method to mammary gland segmentation. 1116-1124 - Ren-Jean Liou, Kuang-Chian Kao, Chin-Yung Yeh:
Evaluation of Crack Flaws in Ultrasonic Imaging. 1125-1134 - Pin-Hsian Liu, Chih-Yang Lin, Chia-Hung Yeh, Li-Wei Kang, Kyle Shih-Huang Lo, Tai-Hwei Hwang, Chia-Chen Kuo:
Rain Removal Using Single Image based on Non-negative Matrix Factorization. 1137-1146 - Jyun-Jie Wang, Chi-Yuan Lin, Meng-Hui Chu:
An Efficient ZZW Construction Using Low-Density Generator-Matrix Embedding Techniques. 1147-1156