:facetid:toc:\"db/conf/iih-msp/iih-msp2009.bht\"OK:facetid:toc:db/conf/iih-msp/iih-msp2009.bhtYihun AlemuJong-bin KohMuhammad Ikram 0001Dong-Kyoo KimImage Retrieval in Multimedia Databases: A Survey.IIH-MSP681-6892009Conference and Workshop Papersclosedconf/iih-msp/AlemuKIK0910.1109/IIH-MSP.2009.159https://doi.org/10.1109/IIH-MSP.2009.159https://dblp.org/rec/conf/iih-msp/AlemuKIK09URL#5163983Naofumi AokiImprovement of a Band Extension Technique for G.711 Telephony Speech by Using Steganography.IIH-MSP487-4902009Conference and Workshop Papersclosedconf/iih-msp/Aoki0910.1109/IIH-MSP.2009.252https://doi.org/10.1109/IIH-MSP.2009.252https://dblp.org/rec/conf/iih-msp/Aoki09URL#5163984Patrick BoursChristopher Johnsrud FulluA Login System Using Mouse Dynamics.IIH-MSP1072-10772009Conference and Workshop Papersclosedconf/iih-msp/BoursF0910.1109/IIH-MSP.2009.77https://doi.org/10.1109/IIH-MSP.2009.77https://dblp.org/rec/conf/iih-msp/BoursF09URL#5163985Zhi ChaiKai-Kuang MaZhengguang LiuComplex Wavelet-Based Face Recognition Using Independent Component Analysis.IIH-MSP832-8352009Conference and Workshop Papersclosedconf/iih-msp/ChaiML0910.1109/IIH-MSP.2009.325https://doi.org/10.1109/IIH-MSP.2009.325https://dblp.org/rec/conf/iih-msp/ChaiML09URL#5163986Chien-Lung ChanChia-Li LinDeterminants of Satisfaction and Intention of Use Self-service Technology - Technology Readiness and Computer Self-efficacy.IIH-MSP893-8972009Conference and Workshop Papersclosedconf/iih-msp/ChanL0910.1109/IIH-MSP.2009.115https://doi.org/10.1109/IIH-MSP.2009.115https://dblp.org/rec/conf/iih-msp/ChanL09URL#5163987Chin-Chen Chang 0001Yung-Chen ChouMing-Huang HsiehA Simple and Efficient Data Hiding Scheme Suitable for Low Power Computation Environments.IIH-MSP624-6272009Conference and Workshop Papersclosedconf/iih-msp/ChangCH0910.1109/IIH-MSP.2009.149https://doi.org/10.1109/IIH-MSP.2009.149https://dblp.org/rec/conf/iih-msp/ChangCH09URL#5163988Chin-Chen Chang 0001Chi-Shiang ChanZhi-Hui Wang 0001Mingchu LiReversible Steganography for VQ Indices Using the Modified State Codebook.IIH-MSP320-3232009Conference and Workshop Papersclosedconf/iih-msp/ChangCWL0910.1109/IIH-MSP.2009.66https://doi.org/10.1109/IIH-MSP.2009.66https://dblp.org/rec/conf/iih-msp/ChangCWL09URL#5163989Feng-Cheng ChangHsiang-Cheh HuangA Study on the Cache Miss Rate in a Genetic Algorithm Implementation.IIH-MSP795-7982009Conference and Workshop Papersclosedconf/iih-msp/ChangH0910.1109/IIH-MSP.2009.56https://doi.org/10.1109/IIH-MSP.2009.56https://dblp.org/rec/conf/iih-msp/ChangH09URL#5163990Chuan-Yu ChangRu-Hao JianHung-Jen WangTwo-phase Fuzzy-ART with Independent Component Analysis for Semantic Image Classification.IIH-MSP799-8022009Conference and Workshop Papersclosedconf/iih-msp/ChangJW0910.1109/IIH-MSP.2009.257https://doi.org/10.1109/IIH-MSP.2009.257https://dblp.org/rec/conf/iih-msp/ChangJW09URL#5163991Jui-Fang ChangChi-Ming KuanYu-Wen LinForecasting Exchange Rates by Genetic Algorithms Based Back Propagation Network Model.IIH-MSP791-7942009Conference and Workshop Papersclosedconf/iih-msp/ChangKL0910.1109/IIH-MSP.2009.245https://doi.org/10.1109/IIH-MSP.2009.245https://dblp.org/rec/conf/iih-msp/ChangKL09URL#5163992Ya-Fen ChangYen-Cheng LaiMu-Yen ChenFurther Remarks on Identity-Based RSA Multi-signature.IIH-MSP750-7532009Conference and Workshop Papersclosedconf/iih-msp/ChangLC0910.1109/IIH-MSP.2009.137https://doi.org/10.1109/IIH-MSP.2009.137https://dblp.org/rec/conf/iih-msp/ChangLC09URL#5163993Chin-Chen Chang 0001Chia-Yin LeeWei-Bin LeeCryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications.IIH-MSP902-9042009Conference and Workshop Papersclosedconf/iih-msp/ChangLL0910.1109/IIH-MSP.2009.172https://doi.org/10.1109/IIH-MSP.2009.172https://dblp.org/rec/conf/iih-msp/ChangLL09URL#5163994Chin-Chen Chang 0001Chia-Chen Lin 0001Pei-Yan PaiYen-Chang ChenA Novel Retinal Blood Vessel Segmentation Method Based on Line Operator and Edge Detector.IIH-MSP299-3022009Conference and Workshop Papersclosedconf/iih-msp/ChangLPC0910.1109/IIH-MSP.2009.232https://doi.org/10.1109/IIH-MSP.2009.232https://dblp.org/rec/conf/iih-msp/ChangLPC09URL#5163995Bao Rong ChangHsiu Fen TsaiApplying Visual Image and Satellite Positioning for Fast Vehicle Detection and Lane Marking Recognition.IIH-MSP518-5212009Conference and Workshop Papersclosedconf/iih-msp/ChangT0910.1109/IIH-MSP.2009.160https://doi.org/10.1109/IIH-MSP.2009.160https://dblp.org/rec/conf/iih-msp/ChangT09URL#5163996Jen-Chun ChangHsin-Lung WuA Hybrid RFID Protocol against Tracking Attacks.IIH-MSP865-8682009Conference and Workshop Papersclosedconf/iih-msp/ChangW0910.1109/IIH-MSP.2009.140https://doi.org/10.1109/IIH-MSP.2009.140https://dblp.org/rec/conf/iih-msp/ChangW09URL#5163997Ji-Hong ChenChin-Hsing ChenA Watermarking Scheme Using Code Division Multiple Access and DWT.IIH-MSP13-162009Conference and Workshop Papersclosedconf/iih-msp/ChenC0910.1109/IIH-MSP.2009.207https://doi.org/10.1109/IIH-MSP.2009.207https://dblp.org/rec/conf/iih-msp/ChenC09URL#5163998Roger Y. ChenMing-Jen ChangA CMOS Variable-gain Fully-differential Transimpedance Amplifier for Multimedia Data Links.IIH-MSP402-4052009Conference and Workshop Papersclosedconf/iih-msp/ChenC09a10.1109/IIH-MSP.2009.285https://doi.org/10.1109/IIH-MSP.2009.285https://dblp.org/rec/conf/iih-msp/ChenC09aURL#5163999Yi-Ting ChenShu-Chuan ChuMong-Fong HorngJeng-Shyang Pan 0001An Adaptive Approach Based on Genetic Algorithm to Information Hiding for Halftone Images.IIH-MSP823-8272009Conference and Workshop Papersclosedconf/iih-msp/ChenCHP0910.1109/IIH-MSP.2009.324https://doi.org/10.1109/IIH-MSP.2009.324https://dblp.org/rec/conf/iih-msp/ChenCHP09URL#5164000Chao-Yu ChenChao-Ho ChenYi-Li KuoChin-Hsing ChenA Two-Pass Filter for Impulse Noise Reduction Based on Edge Characteristics.IIH-MSP5-82009Conference and Workshop Papersclosedconf/iih-msp/ChenCKC0910.1109/IIH-MSP.2009.291https://doi.org/10.1109/IIH-MSP.2009.291https://dblp.org/rec/conf/iih-msp/ChenCKC09URL#5164001Sin-Yu ChenJun-Wei HsiehJui-Chen WuYung-Sheng ChenVehicle Retrieval Using Eigen Color and Multiple Instance Learning.IIH-MSP657-6602009Conference and Workshop Papersclosedconf/iih-msp/ChenHWC0910.1109/IIH-MSP.2009.304https://doi.org/10.1109/IIH-MSP.2009.304https://dblp.org/rec/conf/iih-msp/ChenHWC09URL#5164002Xiuxin ChenKebin JiaZhipin DengA Video Retrieval Algorithm Based on Spatio-temporal Feature Curves and Key Frames.IIH-MSP1078-10812009Conference and Workshop Papersclosedconf/iih-msp/ChenJD0910.1109/IIH-MSP.2009.82https://doi.org/10.1109/IIH-MSP.2009.82https://dblp.org/rec/conf/iih-msp/ChenJD09URL#5164003Tzung-Her ChenYao-Sheng LeeYet Another Friendly Progressive Visual Secret Sharing Scheme.IIH-MSP353-3562009Conference and Workshop Papersclosedconf/iih-msp/ChenL0910.1109/IIH-MSP.2009.135https://doi.org/10.1109/IIH-MSP.2009.135https://dblp.org/rec/conf/iih-msp/ChenL09URL#5164004Chao-Lieh ChenChien-Hao LaiImplementation and ESL Verification of New Earliest-Deadline-First Scheduler for Video Streaming over Wireless Networks.IIH-MSP390-3932009Conference and Workshop Papersclosedconf/iih-msp/ChenL09a10.1109/IIH-MSP.2009.265https://doi.org/10.1109/IIH-MSP.2009.265https://dblp.org/rec/conf/iih-msp/ChenL09aURL#5164005Duan-Yu ChenKuan-Yi LinA Novel Viewer Counter for Digital Billboards.IIH-MSP653-6562009Conference and Workshop Papersclosedconf/iih-msp/ChenL09b10.1109/IIH-MSP.2009.211https://doi.org/10.1109/IIH-MSP.2009.211https://dblp.org/rec/conf/iih-msp/ChenL09bURL#5164006Shang-Kuan ChenSian-Jheng LinNon-expansible Flip-flop Visual Cryptography with Perfect Security.IIH-MSP949-9522009Conference and Workshop Papersclosedconf/iih-msp/ChenL09c10.1109/IIH-MSP.2009.63https://doi.org/10.1109/IIH-MSP.2009.63https://dblp.org/rec/conf/iih-msp/ChenL09cURL#5164007Long-Chang ChenTsair-Fwu LeePei-Ju ChaoWen-Cheng ChenAn Observer-Based Method for Secure Communication.IIH-MSP222-2252009Conference and Workshop Papersclosedconf/iih-msp/ChenLCC0910.1109/IIH-MSP.2009.168https://doi.org/10.1109/IIH-MSP.2009.168https://dblp.org/rec/conf/iih-msp/ChenLCC09URL#5164008Kuo-Nan ChenChin-Feng LeeChin-Chen Chang 0001Huang-Ching LinEmbedding Secret Messages Using Modified Huffman Coding.IIH-MSP278-2812009Conference and Workshop Papersclosedconf/iih-msp/ChenLCL0910.1109/IIH-MSP.2009.53https://doi.org/10.1109/IIH-MSP.2009.53https://dblp.org/rec/conf/iih-msp/ChenLCL09URL#5164009Yen-Wei Chen 0001Chen-Lun LinAya MimoriParticle Swarm Optimization for Reconstruction of Penumbral Images.IIH-MSP775-7782009Conference and Workshop Papersclosedconf/iih-msp/ChenLM0910.1109/IIH-MSP.2009.308https://doi.org/10.1109/IIH-MSP.2009.308https://dblp.org/rec/conf/iih-msp/ChenLM09URL#5164010Jiann-Jone ChenChun-Rong SuVolume Image Segmentaton by Dual Multi-Scale Morphological Reconstructions.IIH-MSP511-5142009Conference and Workshop Papersclosedconf/iih-msp/ChenS0910.1109/IIH-MSP.2009.295https://doi.org/10.1109/IIH-MSP.2009.295https://dblp.org/rec/conf/iih-msp/ChenS09URL#5164011Tsong-Yi ChenDa-Jinn WangThou-Ho ChenYi-Long LinA Compression-Resistant Invisible Watermarking Scheme for H.264.IIH-MSP17-202009Conference and Workshop Papersclosedconf/iih-msp/ChenWCL0910.1109/IIH-MSP.2009.323https://doi.org/10.1109/IIH-MSP.2009.323https://dblp.org/rec/conf/iih-msp/ChenWCL09URL#5164012