default search action
IIH-MSP 2007: Kaohsiung, Taiwan
- Bin-Yih Liao, Jeng-Shyang Pan, Lakhmi C. Jain, Mark Liao, Hideki Noda, Anthony T. S. Ho:
3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), Kaohsiung, Taiwan, 26-28 November 2007, Proceedings. IEEE Computer Society 2007, ISBN 978-0-7695-2994-3
Volume I
Novel Approaches to Multimedia Applications
- Bao Rong Chang, Hsiu Fen Tsai:
Forecasting Typhoon Moving Path Using BPNN-Weighted Grey-C3LSP Tuned by Quantum-Neuron-Based Adaptive Support Vector Regression with Nested Local Adiabatic Evolution. 3-6 - Chuan-Yu Chang, Chi-Fang Li, Hung-Jen Wang:
Using Principal Component Analysis and Radial Basis Function Neural Networks for Image Contents Classification. 7-10 - Tsung-Ching Lin, Chien-Wen Chen, Chien-Chang Lin, Trieu-Kien Truong:
Very Low Bit Rate Video Coding Using H.264 Codec and Cubic Spline Interpolation. 11-14 - Chu-Fu Wang, Chun-Chia Lee, Hui-Sheng Chu:
Optimal Deployment for Wireless Sensor Networks Using Lifetime Expectation Estimation. 15-18 - Trong-Yen Lee, Yang-Hsin Fan, Yu-Min Cheng, Chia-Chun Tsai, Rong-Shue Hsiao:
Enhancement of Hardware-Software Partition for Embedded Multiprocessor FPGA Systems. 19-22 - Tsang-Long Pao, Wen-Yuan Liao, Yu-Te Chen, Jun-Heng Yeh, Yun-Maw Cheng, Charles S. Chien:
Comparison of Several Classifiers for Emotion Recognition from Noisy Mandarin Speech. 23-26 - Chih-Chung Kao, Liang-Hwei Lee, Chih-Chiang Tai, Yung-Chung Wei:
Extracting the Ocean Surface Feature of Non-linear Internal Solitary Waves in MODIS Satellite Images. 27-30 - Huey-Min Sun, Wen-Lin Cheng:
The Input-Interface of Webcam Applied in the Digital Content Interaction. 31-34 - Tsang-Long Pao, Charles S. Chien, Yu-Te Chen, Jun-Heng Yeh, Yun-Maw Cheng, Wen-Yuan Liao:
Combination of Multiple Classifiers for Improving Emotion Recognition in Mandarin Speech. 35-38 - Tsang-Long Pao, Wen-Yuan Liao, Yu-Te Chen:
Audio-Visual Speech Recognition with Weighted KNN-based Classification in Mandarin Database. 39-42 - Liang-Hwei Lee, Shiahn-Wern Shyue, Ming-Jer Huang:
Building Corner Feature Extraction Based on Fusion Technique with Airborne LiDAR Data and Aerial Imagery. 43-46 - Tsang-Long Pao, Charles S. Chien, Jun-Heng Yeh, Yu-Te Chen, Yun-Maw Cheng:
Continuous Tracking of User Emotion in Mandarin Emotional Speech. 47-52
Intelligent Systems for Image and Signal Processing
- C. R. Hema, Murugesa Pandiyan Paulraj, R. Nagarajan, Sazali Yaacob, Abdul Hamid Adorn:
Fuzzy Based Classification of EEG Mental Tasks for a Brain Machine Interface. 53-56 - M. Karthigayan, R. Nagarajan, Mohamed Rizon, Sazali Yaacob:
Personalized Face Emotion Classification Using Optimized Data of Three Features. 57-60 - Chen Change Loy, Weng-Kin Lai, Chee Peng Lim:
Keystroke Patterns Classification Using the ARTMAP-FD Neural Network. 61-64 - Shing Chiang Tan, M. V. C. Rao, Chee Peng Lim:
A Mutation-Based Evolving Neural Network Model and Its Application to Condition Monitoring. 65-68 - Chun Farn Leong, Bee Ee Khoo, Zalina B. binti Abdul Aziz:
Performance Analysis of Digital Image Fingerprinting Based on Design of Experiments. 69-72 - Xuansen He:
A Dynamic Step-Size Updating Rule for Single Distribution Blind Source Separation. 73-76 - Yongyi Zhao, Bo Song, Jin Li:
A Map Matching Algorithm in GPS-based Car Navigation System. 77-80 - Jen-Bang Feng, Iuon-Chang Lin, Yen-Ping Chu:
An Edge Enhanced Technique for Digital Halftoning Using Error Diffusion. 81-86 - Ming-Sui Lee, Mei-Yin Shen, C.-C. Jay Kuo:
A Content-Adaptive Up-Sampling Technique for Image Resolution Enhancement. 87-90 - Yu-Long Qiao, Chun-Yan Song, Chun-Hui Zhao:
Double-Density Discrete Wavelet Transform Based Texture Classification. 91-94 - Te-Jen Su, Hsin-Chih Wang, Jia-Wei Liu:
Particle Swarm Optimization for Image Noise Cancellation. 95-98 - Zhenyu Wu, Bin Tang:
An Arbitrary Block Resizing Algorithm in Transform Domain. 99-102 - Qiong Li, Guoqiang Li, Yi-Liang He, Xiamu Niu:
Improved Adaptive Lifting Scheme for Wavelet-Based Image Compression. 103-108
Computation Intelligence for Image Processing and Pattern Recognition
- Yen-Wei Chen, Kenji Kubo:
A Robust Eye Detection and Tracking Technique Using Gabor Filters. 109-112 - Xian-Hua Han, Yen-Wei Chen, Keishi Kitamura, Akihiro Ishikawa, Yoshihiro Inoue, Kouichi Shibata, Yukio Mishina, Yoshihiro Mukuta:
An ICA Based Noise Reduction for PET Reconstructed Images. 113-116 - Tomoko Tateyama, Zensho Nakao, Yen-Wei Chen:
Brain Matters Emphasis in MRI by Kernel Independent Component Analysis. 117-120 - Xuemei Yang, Yen-Wei Chen, Masahiro Ito, Ikuko Nishikawa:
Principal Component Analysis of O-linked Glycosylation Sites in Protein Sequence. 121-126 - Qingdong Du, Jie Liu:
A New Neural Fusion Recognition Method with Multi-Agent. 127-130 - Jun-Bao Li, Shu-Chuan Chu, Jeng-Shyang Pan:
2D(PC)2 A for Face Recognition with One Training Image per Person. 131-134 - Yujian Li, Xingli Li:
HMM Based Eyebrow Recognition. 135-138 - Jen-Chun Lee, Ping Sheng Huang, Chien-Ping Chang, Te-Ming Tu:
Novel and Fast Approach for Iris Location. 139-142 - Jia-Dong Ren, Yafei Sun, Sheng Guo:
Maximal Sequential Pattern Mining Based on Simultaneous Monotone and Anti-monotone Constraints. 143-146 - Guangming Lu, Jiayin Qi, Qingmin Liao:
A New Scheme of Iris Image Quality Assessment. 147-150 - Yong Tian, Jianing Wang, Jiuwen Zhang, Yida May:
Contextual Hidden Markov Tree Model Image Denoising Using a New Nonuniform Quincunx Directional Filter Banks. 151-154 - Guo-Shiang Lin, Min-Kuan Chang, Shien-Tang Chiu:
Dissolve Detection Scheme with Transition Duration Refinement. 155-158 - Yuqin Sun, Shenghong Chen, Zhifang Wang, Qiong Li:
Performance Evaluation of Fingerprint Orientation Estimation Algorithms. 159-164
Recent Advances in Multimedia Coding and Retrieval: Algorithms and Applications
- Kebin Jia, Zhipin Deng, Xin-Yue Zhuang:
The Research of Video Matching Algorithm Based on Spatio-temporal Feature. 165-168 - Pengyu Liu, Kebin Jia, Zhuozheng Wang:
An Effective Image Retrieval Method Based on Color and Texture Combined Features. 169-172 - Zhen Sun, Zhe-Ming Lu, Hai-Jun Jin:
Image Retrieval with Long-Term Memory Learning and Short-Time Relevance Feedback. 173-177 - Zhen Li, Zhe-Ming Lu, Lei Sun:
Dynamic Extended Codebook Based Vector Quantization Scheme for Mesh Geometry Compression. 178-181 - Xu He, Pengyu Liu, Kebin Jia, Yanhua Zhang:
A Fast Intra-frame Prediction Algorithm Based on the Characteristic of Macro-block and 2D-histogram for H.264/AVC Standard. 182-185 - Yong Zhang, Weixin Li, Xiamu Niu:
A Method of Bucket Index over Encrypted Character Data in Database. 186-189 - Yongqing Ye, Qingge Ji:
Real-Time Path Planning of Large-scale Virtual Crowd. 190-193 - Danny Fernandes, Ce Zhu:
Overlapped Block Motion Compensation Using Modified Sigmoid Window. 194-197 - Zhi-Cheng Zhao, An-Ni Cai:
Selective Extraction of Visual Saliency Objects in Images and Videos. 198-201 - Vincent S. Tseng, Ja-Hwung Su, Chih-Jen Chen:
Effective Video Annotation by Mining Visual Features and Speech Features. 202-205 - Te-Wei Chiang, Tienwei Tsai, Mann-Jung Hsiao:
A Hierarchical Grid-Based Indexing Method for Content-Based Image Retrieval. 206-209 - Feng-Cheng Chang, Hsiang-Cheh Huang:
A Programming Model for Distributed Content-Based Image Retrieval. 210-213 - Bo Di:
An Efficient Image Retrieval Approach base on Color Clustering. 214-220
Networking and Information Security
- Jiehong Wu, Guiran Chang, Jia Li:
A Scheme for Protecting Mobile Agents Based on Combining Obfuscated Data and Time Checking Technology. 221-224 - Chang-yin Liang, Ang Li, Xiamu Niu:
Video Authentication and Tamper Detection Based on Cloud Model. 225-228 - Yong Zhang, Qin-tao Song, Xiamu Niu:
The Key Management of the Encrypted Database Based on XML. 229-232 - Bo Shen, Yong Xu, Guangming Lu, David Zhang:
Detecting Iris Lacunae Based on Gaussian Filter. 233-236 - Xuan Wang, Jiancheng Lin, Yong Sun:
Applying Feature Extraction of Speech Recognition on VOIP Auditing. 237-240 - Zhe-Ming Lu, Hong-Yi Zheng, Ji-Wu Huang:
A Digital Watermarking Scheme Based on DCT and SVD. 241-244 - Chao-Wen Chan, Chung-Chih Lin:
The Improvement of Lee-Chiu's Remote User Authentication Scheme. 245-248 - Chao-Wen Chan, Rong-Yuan Wang:
Improving the Security of the Chien-Jan Protocol for Large Mobile Networks. 249-252 - Hui-Feng Huang:
A New Design of Efficient Key Pre-distribution Scheme for Secure Wireless Sensor Networks. 253-256 - Huajun Huang, Xingming Sun, Guang Sun, Junwei Huang:
Detection of Hidden Information in Tags of Webpage Based on Tag-Mismatch. 257-260 - Kuo-Ching Liu, Hsin-Wei Wang, Hui-Feng Huang:
Enhancement of the Mutual Authentication protocol on RFID Passive Tags. 261-264 - Jia-lin Ma, Xu Wei, Jie Liu:
Security Analysis of RFID Based on Multiple Readers. 265-268 - Li Li, Jing Wu, Xiaowei Guo, Meng Li, Xiamu Niu:
Framework for Windows Password Function Security Enhancement. 269-274
Digital Watermarking and Multimedia Security
- Y. K. Sek, Lee-Ming Cheng, L. L. Cheng, Chi-Kwong Chan:
A Novel Lossy Image-Hiding Scheme Based on Block Difference. 275-278 - H. Y. Leung, Lee-Ming Cheng, L. L. Cheng, Chi-Kwong Chan:
Hardware Realization of Steganographic Techniques. 279-282 - Xi Zhao, Anthony T. S. Ho, Helen Treharne, Vinod Pankajakshan, Chris Culnane, Weina Jiang:
A Novel Semi-Fragile Image Watermarking, Authentication and Self-Restoration Technique Using the Slant Transform. 283-286 - Vinod Pankajakshan, Anthony T. S. Ho:
Improving Video Steganalysis Using Temporal Correlation. 287-290 - Ning Zhong, Jingming Kuang, Zunwen He:
A GA-based Optimal Image Watermarking Technique. 291-294 - Longjiang Yu, Sheng-He Sun:
Image Authentication in Print-and-scan Scenario. 295-298 - Hao Luo, Zhenfei Zhao, Jianming Huang, Zhe-Ming Lu:
Halftone Image Watermarking Based on the Binary Pseudo-Wavelet Transform. 299-302 - Hao Luo, Jeng-Shyang Pan, Zhe-Ming Lu:
Hiding Multiple Watermarks in Transparencies of Visual Cryptography. 303-306 - Hsien-Wen Tseng, Feng-Rong Wu, Chi-Pin Hsieh:
Data Hiding for Binary Images Using Weight Mechanism. 307-310 - Fu-Hao Yeh, Greg C. Lee, Cheng-Chieh Chiang:
Reversible Fragile Watermarking Based on Pyramidal Structure and Gradient Predicting Image. 311-314 - Chin-Feng Lee, Hsing-Ling Chen:
High-Capacity Data Hiding Using Virtual Window Partition. 315-318 - Brian K. Lien, Bo-Wei Shiue:
Hiding Data in Ordered Dithering Halftone Images by Bit Interleaving. 319-322 - Peining Tao, Ahmet M. Eskicioglu:
Robust Block-based Image Watermarking in Curvelet Transform. 323-328
Computer Graphics
- Ren-Jie Wang, Chung-Ming Wang:
Effective Color Ink Diffusion Synthesis. 329-332 - Shih-Pin Chao, Chen-Lan Yen, Chien-Chun Kuo:
Neural ISOMAP. 333-336 - Jun-Wei Chang, Su Ian Eugene Lei, Chun-Fa Chang, Yu-Jung Cheng:
Real-Time Rendering of Splashing Stream Water. 337-340 - Tainchi Lu, Daosheng Mu, Minchih Tsai:
Facial Expressions for 3D Game Applications. 341-344 - Chang-Hung Liang, Pai-Cheng Tao, Tsai-Yen Li:
IMHAP - An Experimental Platform for Humanoid Procedural Animation. 345-348 - Yao-Yang Tsai, Hung-Kuo Chu, Kuangyou B. Cheng, Tong-Yee Lee, Chen-Lan Yen:
Animation Generation and Retargeting Based on Physics Characteristics. 349-352 - Yu-Shuen Wang, Tong-Yee Lee:
WYSIWYG: Mesh Decomposition for Static Models. 353-356 - Shyh-Kuang Ueng, Wei-Yang Sun:
Multi-resolution Unsteady Flow Visualization. 357-360 - Mika Sato-Ilic, Lakhmi C. Jain:
Asymmetric Clustering Based on Self-Similarity. 361-364 - Chang-Yun Jhou, Jeng-Shyang Pan, Ding Chou:
Reversible Data Hiding Base on Histogram Shift for 3D Vertex. 365-370
Multimedia Coding
- Chunyu Lin, Yao Zhao, Huihui Bai:
Three-Channel Multiple Description Image Coding Based on Special Lattice Vector Quantization. 371-374 - Yuanyuan Xu, Yao Zhao:
Three-Description Image Coding Using Optimal Dead-Zone Lattice Vector Quantization. 375-378 - Byung-Ho Cha, C.-C. Jay Kuo:
Design of Multiuser Collusion-Free Hiding Codes with Delayed Embedding. 379-382 - Yubin Cui, Bojin Zhuang, Anni Cai:
MB-Activity Measure Based Slice Grouping and Unequal Error Protection for H.264/AVC Video Transmission over Wireless Networks. 383-386 - Yongjin Cho, C.-C. Jay Kuo, Ming Hsieh, Do-Kyoung Kwon:
GOP-based Rate Control for H.264/SVC with Hierarchical B-pictures. 387-390 - H. P. Lee, H. Y. Chen, H. C. Chang:
A Method for Decoding the (24, 15, 5) Cyclic Code. 391-394 - Chuang Lin, Jeng-Shyang Pan, Tsong-Yi Chen, Kuang-Chih Huang:
A Covert Communication Scheme for the DCT Based Image Multiple Description Coding System. 395-398 - Tien-Yan Ma, Ting-Wei Hou, Shau-Yin Tseng:
Hierarchical Key Management of Scalable Video Coding. 399-402 - Said E. El-Khamy, Mona Chong-Qing Lotfy, Adel Hamdi Ali:
The Enhanced Fuzzy Bit generator (EFBG): A Cryptographically Secure Pseudorandom Bit Generator. 403-406 - Navin Angkura, Supavadee Aramvith, Supakorn Siddhichai:
Directional Texture Feature Extraction using Context Labels of Significance Coding for JPEG2000 Compressed Domain Image Retrieval. 407-410 - Bai Yu-Jie, Luo Wei-Xiong, Han Li:
Application of LDPC Codes over GF(q) to DFH Communication System. 411-414 - Meng Wang, Hui-Ping Ma, Chongqing Zhou, Bian Yang:
An Improved Multi-stage Vector Quantization for Image Coding. 415-420
Intelligent Watermark Hiding and Digital Image Processing
- Tzungher Chen, Chang-Sian Wu, Wei-Bin Lee:
A Novel Subliminal Channel Found in Visual Cryptography and Its Application to Image Hiding. 421-424 - Li Li, Nina Sun, Bin Luo:
A Digital Watermarking Algorithm for Certificate Identifying. 425-428 - Li Li:
Image Watermarking Robust to Four-Color Printing and Fragile to High Resolution Copy. 429-432 - Chiang-Lung Liu, Der-Chyuan Lou, Chien-Chung Lee:
Reversible Data Embedding Using Reduced Difference Expansion. 433-436 - Der-Chyuan Lou, Chiang-Lung Liu, Chih-Lin Lin, Shin-Her Wang:
Length Estimation for Embedded Message Using Support Vector Machine. 437-440 - Zhiping Zhou, Lihua Zhou:
A Novel Algorithm for Robust Audio Watermarking Based on Quantification DCT Domain. 441-444 - Cheng-Hsing Yang, Shiuh-Jeng Wang, Chi-Yao Weng:
Analyses of Pixel-Value-Differencing Schemes with LSB Replacement in Stegonagraphy. 445-448 - Hong-Wei Sun, Kwok-Yan Lam, Jia-Guang Sun, Siu Leung Chung:
Dynamically Constructing Mixed Pyramid for Fast VQ Encoding. 449-452 - Xiaofen Zhang, Hong Wang, Jing Sun:
An Information Hiding Method based on SOAP. 453-456 - Lijun Yan, Jeng-Shyang Pan:
Generalized Discrete Fractional Hadamard Transformation and its Application on the Image Encryption. 457-460 - Michael Gulbis, Erika Müller, Martin Steinebach:
Combining Multilevel Manipulation Estimation with Content-Based Authentication Watermarking. 461-464 - Chih-Chien Wu, Te-Ming Tu, Jyh-Chian Chang, Chien-Ping Chang, Ping Sheng Huang:
Blind Color Watermarking Approach for Secret Text Hiding. 465-472
Intelligent Watermarking Techniques, Image Authentication and Visual Cryptography
- Chin-Chen Chang, Wei-Liang Tai, Kuo-Nan Chen:
Improvements of EMD Embedding for Large Payloads. 473-476 - Jeanne Chen, Tung-Shou Chen:
Content-based Rate Controlled Data Hiding in JPEG-LS. 477-480 - Chin-Chen Chang, The Duc Kieu:
Reversible Data Embedding for Vector Quantization Indices. 481-484 - Chu-Hsing Lin, Wen-Kui Chang, Yu-Ying Lin, Lun-Yuen Cheng:
Binary Document Images Authentication by Thinning Digital Patterns. 485-488 - Chin-Chen Chang, Chin-Feng Lee, Lin-Yi Chuang:
Using Dynamic Programming Strategy to Find an Optimal Solution to Exploiting Modification Direction Embedding Method. 489-492 - Meng-Hsiun Tsai, Fang-Yu Hsu, Jun-Dong Chang, Hsien-Chu Wu:
Fragile Database Watermarking for Malicious Tamper Detection Using Support Vector Regression. 493-496 - Chin-Feng Lee, Yi-Ren Wang, Chin-Chen Chang:
A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction. 497-500 - Chung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan, Iuon-Chang Lin:
A Flexible Fragile Watermarking Scheme for Binary Images with Reversibility. 501-504 - Chin-Chen Chang, Yung-Chen Chou:
High Payload Data Embedding with Hybrid Strategy. 505-508 - Chi-Nan Lin, Chin-Chen Chang:
A Best-pair-first Capacity-distortion Control for Data Hiding on VQ Compression Domain. 509-514 - Chang-Chu Chen, Chin-Chen Chang:
Secret Image Sharing Using Quadratic Residues. 515-518 - Wen Pinn Fang:
Visual Cryptography in reversible style. 519-524
Network-aware Multimedia: QoS and Security
- Hongjun Wang, Lili Wang, Hua Li:
A Fast Multiple Reference Frame Selection Algorithm Based on H.264/AVC. 525-528 - Hongjun Wang, Yan-yan Hou, Hua Li:
H.264/AVC Video Encoder Algorithm Optimization Based on TI TMS320DM642. 529-532 - Shuzhong Ba, Ju Liu, Guoxia Sun, Wei Zhang:
Text Independent Speaker Verification Based on Mixing ICA Overcomplete Basis Functions. 533-536 - Huiqiang Sun, Guoxia Sun, Xing Liang, Ju Liu:
Influence of Joint Action of Fluid Shear Stress and Signal Transduction Ligand Inhibitor on Osteoclasts' Differentiation and Maturation. 537-541 - Mehdi Rezaei, Imed Bouazizi, Moncef Gabbouj:
Fuzzy Joint Encoding and Statistical Multiplexing of Multiple Video Sources with Independent Quality of Services for Streaming over DVB-H. 542-545 - Hongfeng Zhu, Tianhua Liu, Jie Liu, Guiran Chang:
A Method for Making Three-Party Password-Based Key Exchange Resilient to Server Compromise. 546-549 - V. Valli Kumari, Y. Aditya Kumar, K. V. S. V. N. Raju, K. Venkata Ramana, R. V. V. S. V. Prasad:
Policy Based Controlled Migration of Mobile Agents to Untrusted Hosts. 550-553 - Mohammad Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza:
Sending Mobile Software Activation Code by SMS Using Steganography. 554-557 - Saeed Sedghi, Yôiti Suzuki:
Reducing Host Interference from Spread Spectrum Watermarking. 558-561 - Jinfu Chen, Yansheng Lu, Xiaodong Xie:
An Auto-Generating Approach of Transactions Profile Graph in Detection of Malicious Transactions. 562-565 - Abid Khan, Xiamu Niu, Yong Zhang:
Protecting Mobile Agent's Computation Results with Reversible Watermarking and Digital Signature. 566-569 - Chuanjun Wang, Xiamu Niu, Yong Zhang:
Anonymity in PKI Environment. 570-576
Intelligent Surveillance and Pattern Recognition
- Yao-Hsien Huang, Chung-Hsin Liu:
A Practical Color Transfer Algorithm for Image Sequences. 577-580 - I-Horng Jeng, Tai-Ning Yang, Chih-Jen Lee, Shih-Yun Lin, Tsung-Hsien Wu:
Intelligent Surveillance by Using 2D Heterogeneous Multimodal Sensations and Information Transcoding. 581-584 - Wei-Lieh Hsu, Chang-Lung Tsai, Tsung-Lun Chen:
Traffic Detection at Nighttime Using Entropy Measurement. 585-588 - Li-Ping Chou, Jenn-Dong Sun, Mei-Ling Chen:
A New Application Framework for Intelligent Surveillance Sensor Networks. 589-591 - Chih-Shan Liu, Jen-Chun Lin, Nai-Chung Yang, Chung Ming Kuo:
Motion Vector Re-estimation for Trans-coding Using Kalman Filter. 592-595 - Kaset Sirisantisamrid, Kitti Tirasesth, Takenobu Matsuura:
An Algorithm for Coplanar Camera Calibration. 596-599 - Chiung-Chin Lin, Yu-Ming Lee, Yinyi Lin:
Fast Motion Search Using Early Zero-block Detection. 600-603 - Jian Xiang, Hongli Zhu:
Ensemble HMM Learning for Motion Retrieval with Non-linear PCA Dimensionality Reduction. 604-607 - Qi Han, Qiong Li, Xiongdong Huang, Tong Zhou, Xiamu Niu:
Eyes Tracking in a Video Sequence Based-On Haar-like Features and Skin Color. 608-611 - Haifang Li, Jin Li, Jiancheng Song, Junjie Chen:
Extracting Emotional Semantics from Color Image using Analytical Hierarchy Process. 612-618
Intelligent Information Processing and Multimedia Services for Digital Home
- Hao-Yun Kao:
Usability Testing of AMC Hospital's Website for Home Users: Case Study for On-Site Registration Design. 619-622 - Neng-Wen Wang, Yueh-Min Huang:
User's Authentication in Media Services by using One-Time Password Authentication Scheme. 623-626 - Jeng-Wei Lee, Yi-Tsung Chen, Yau-Hwang Kuo:
Energy-Efficient Geographic Relay for Ad-Hoc Wireless Networks. 627-630 - Sue-Chen Hsueh, Ming-Yen Lin, Kun-Lin Lu:
Mining Generalized Association Rules for Service Recommendations for Digital Home Applications. 631-634 - Yuh-Ming Cheng, Lih-Shyang Chen, Sheng-Feng Weng, Yong-Guo Chen, Chyi-Her Lin:
Applications of a Pedagogical Agent Mechanism in a Web-based Clinical Simulation System for Medical Education. 635-638 - Jing Sun, Zhongxiao Wang, Hong Wang, Xiaofen Zhang:
Research on Routing Protocols Based on ZigBee Network. 639-642 - Mao-Cheng Huang, Jyun-Ciang Huang, Jing-Cyun You, Gwo-Jia Jong:
The Wireless Sensor Network for Home-Care System Using ZigBee. 643-646
Volume II
Techniques and Algorithms for Multimedia Security
- Yuki Ashino, Ryôichi Sasaki:
Proposal of Digital Forensic System Using Security Device and Hysteresis Signature. 3-7 - Mariko Irisawa, Yuki Ashino, Keisuke Fujita, Ryôichi Sasaki:
Development and Application of Digital Forensic Logging System for Data from a Keyboard and Camera. 8-11 - Hideaki Tanaka, Shoichi Sasaki, Isao Echizen, Hiroshi Yoshiura:
Secure Generation of Digital Signature on Compromised Computer. 12-15 - Maki Yoshida, Itaru Kitamura, Toru Fujiwara:
A New Scheme for Optimum Decoding of Additive Watermarks Embedded in Spatial Domain. 16-19 - Isao Echizen, Yusuke Atomori, Shinta Nakayama, Hiroshi Yoshiura:
HVS-Based Robust Video Watermarking with Dual-plane Correlation. 20-24 - Ryu Ebisawa, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka, Isao Echizen:
Use of Gap-Filling Operation to Enhance Image Quality of Binary Image Watermarking. 25-28 - Sho Tanaka, Michiharu Niimi, Hideki Noda:
A Study on Reversible Information Hiding Using Complexity Measure for Binary Images. 29-32 - Akiomi Kunisa:
Host-Cooperative Metadata Embedding Framework. 33-36 - Feng-Cheng Chang, Chiao-Lin Wu, Hsueh-Ming Hang:
A Switchable DRM Structure for Embedded Device. 37-40 - Mian Cai, Jia Jia, Yan Lei:
An H.264 Video Encryption Algorithm Based On Entropy Coding. 41-44 - Ya-Fen Chang:
Non-Interactive t-out-of-n Oblivious Transfer Based on the RSA Cryptosystem. 45-50
Wired and Wireless Multimedia Networking and Applications
- Takuo Nakashima, Akari Ono, Toshinori Sueyoshi:
Queueing Analysis for Self-similar Traffic by Simulator. 51-54 - Shunsuke Oshima, Takuo Nakashima, Yusuke Nishikido:
Extraction for Characteristics of Anomaly Accessed IP Packets Based on Statistical Analysis. 55-58 - Ningping Sun, Toru Ayabe, Takahiro Nishizaki:
Efficient Spline Interpolation Curve Modeling. 59-62 - Ningping Sun, Daisuke Sato, Ryohei Takaki:
An Approach to Camera Work Based Animation. 63-66 - Amnach Khawne, Orachat Chitsobhuk, Toshiyuki Nakamiya:
A Study of using L1-norm with Image Watermarking on SVD Domain. 67-70 - Jih-Hsin Ho, Wen-Shyang Hwang, Wen-Ping Chen:
A Novel Multimedia Network backbone Architecture base on Proportional Delay Differentiation. 71-74 - Fuke Shen, Change Pan, Xiaoli Ren:
Research of P2P Traffic Identification Based on BP Neural Network. 75-78 - Hang Li, Jie Liu, Jing Bi:
Fault Tolerant Reconstruction Algorithm Based on Distributed Agents for Network Management. 79-82 - Zenggang Xiong, Yang Yang, Xuemin Zhang, Fu Chen, Li Liu:
Integrating Genetic and Ant Algorithm into P2P Grid Resource Discovery. 83-86 - Jin-Bao Liu, Xian-Qing Hu, Qiong Li, Xiamu Niu:
Design and Implementation of a PKI-Based Electronic Documents Protection Management System. 87-92
Digital Forensics and Data Hiding Discovery
- Antonio Savoldi, Paolo Gubian:
Blind Multi-Class Steganalysis System Using Wavelet Statistics. 93-96 - Seokhee Lee, Antonio Savoldi, Sangjin Lee, Jongin Lim:
Password Recovery Using an Evidence Collection Tool and Countermeasures. 97-102 - Lei Pan, Lynn Margaret Batten:
An Effective and Efficient Testing Methodology for Correctness Testing for File Recovery Tools. 103-107 - Ricci S. C. Ieong:
How to Balance Privilege and Digital Forensics Investigation. 108-111 - Qing-Long Wang, Zhen Han, Xiu-Hua Geng:
Crytanalysis and Improvement on Chang et al.'s Signature Scheme. 112-114 - Tao Meng, Xinping Zhang, Shenghe Sun:
An ID-based Multi-signature Scheme. 115-117 - Ching-Yu Yang:
Color Image Steganography Based on Module Substitutions. 118-121 - Iuon-Chang Lin, Yang-Bin Lin, Chung-Ming Wang:
An Efficient Steganography Scheme for M-Commerce. 122-125 - Gang Luo, Xingming Sun, Lingyun Xiang, Junwei Huang:
An Evaluation Scheme for Steganalysis-proof Ability of Steganographic Algorithms. 126-129 - Mian Cai, Li Kang, Jia Jia:
A Multiple Grade Blind Proxy Signature Scheme. 130-133 - Jing-Ming Guo:
Complementary Steganography in Error-Diffused Block Truncation Coding Images. 134-140
Soft Computing and Intelligent System
- Lieyun Ding, Guang Zeng, Ying Zhou:
Design and Application of Large-scale Project Management System based on Software Bus. 141-144 - Tao Jin, Yuchen Fu, Xinhong Lin, Quan Liu, Zhiming Cui:
A Method of Ontology Mapping Based on Instance. 145-148 - Xiao-lin Wang, Zheng-Jie Yin:
Artificial Immune Recognition System as a New Classifier for Reservoir Operating Rules Extraction. 149-153 - Yun Wu, Yong Zhao, Jianshi Li:
Brief Analysis of the H.264 Coding Standard. 154-157 - WenHua Dai, Cuizhen Jiao, Tingting He:
Research of K-means Clustering Method Based on Parallel Genetic Algorithm. 158-161 - Zhenwen Zhang, Xueguang Chen, Chen Chen:
The Surplus Partition in a Simultaneous Offers Bargaining Game. 162-165 - Jihui Zhang, Qi Luo:
Application of Data Mining in Physical Statistics and Evaluation. 166-169 - Xiaogang Xiang, Zhenwen Zhang:
Analysis of Insurance Contract with the Auditing Efforts. 170-173 - Chuan-Sheng Zhou, Jie Liu:
Research and Design of Software Bus Based Generic Software Agent Architecture. 174-178 - Yi-Bei Nian, Yong-Ai Zheng:
Synchronization for Rössler Chaotic Systems Using Fuzzy Impulsive Controls. 179-182 - Jeng-Ming Yih, Yuan-Horng Lin:
A Fuzzy Basis on Knowledge Structure Analysis for Cognition Diagnosis and Application on Geometry Concepts for Pupils. 183-186 - Jeng-Ming Yih, Yuan-Horng Lin:
An Integration of Fuzzy theory and ISM for Concept Structure Analysis with Application of Learning MATLAB. 187-190 - Bo Li, RenYue Xiao:
The Particle Swarm Optimization Algorithm: How to Select the Number of Iteration. 191-196
Biomedical Engineering
- Sh-Hussain Salleh, Ismail Kamarulafizam, Asasul Islam Chowdhury, Mohd. Zin Zamri:
Signal Processing Application for Telemedicine. 197-200 - Arief R. Harris, Daniel J. Strauss:
Adaptive Frame Decomposition in Slow Wave Cortical Responses to Transcranial Magnetic Stimulation. 201-204 - Zaleha Salleh, Mohd. Yusoff Mashor, Nor Rizuan Mat Noor, Shazmin Aniza, N. Abdul Rahim, A. S. W. Wahab, S. S. Md. Noor, F. Mohamad Idris, Habsah Hasan:
Colour Contrast Enhancement Based on Bright and Dark Stretching for Ziehl-Neelsen Slide Images. 205-208 - Nazahah Mustafa, Nor Ashidi Mat Isa, Mohd. Yusoff Mashor, Nor Hayati Othman:
Colour Contrast Enhancement on Preselected Cervical Cell for ThinPrep® Images. 209-212 - Farah I. Corona-Strauss, Wolfgang Delb, Marc Bloching, Sheikh Hussain, Daniel J. Strauss:
The Johor Screening Scheme: Is an Area-Wide Newborn Hearing Screening Possible in Malaysia? 213-216 - Dirk Benyoucef, Daniel J. Strauss:
Optimized Computational Instrumentation in Biomedicine: A Review. 217-220 - Chin-Feng Lin, Rung-Hua Shiu:
A Ka Band WCDMA-based LEO Multi-satellites Mobile Medicine System. 221-224 - Peng Wu, Aixia Wang, Jingjiao Li:
Smart Embed Tension Tensor Based on Internet. 225-228 - Puu-An Juang, Ming-Ni Wu:
MRI Brain Phase Image Unwrapping Process by Wavelet Zero-Padding Technique. 229-232 - Chin-Feng Lin, Cheng-Hsing Chung, Zhi-Lu Chen, Chang-Jin Song, Zhi-Xiang Wang:
A Chaos Based Unequal Encryption Mechanism in Mobile Medicine System. 233-236 - Puu-An Juang, Ming-Ni Wu:
X-ray Image Reconstruction by Radon Transform Simulation with Fan-Beam Allocation. 237-240 - Chung-Hong Lee, Chih-Hong Wu, Hsiang-Hang Chung, Hsin-Chang Yang:
A Unified Multilingual and Multimedia Data Mining Approach for Cancer Knowledge Discovery. 241-244 - Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang:
Brain Tumor Detection Using Color-Based K-Means Clustering Segmentation. 245-250
Advanced Data Hiding and Coding Techniques for Audio Signals
- Naofumi Aoki:
Potential of Value-Added Speech Communications by Using Steganography. 251-254 - Yuta Nakashima, Ryuki Tachibana, Noboru Babaguchi:
Maximum-Likelihood Estimation of Recording Position Based on Audio Watermarking. 255-258 - Akinori Ito, Shozo Makino:
Increasing Correlation using a Few Bits for Multiple Description Coding. 259-262 - Ming Li, Yun Lei, Xiang Zhang, Jian Liu, Yonghong Yan:
Authentication and Quality Monitoring based on Audio Watermark for Analog AM Shortwave Broadcasting. 263-266 - Hyun-Ho Kang, Koutarou Yamaguchi, Brian M. Kurkoski:
Psychoacoustically-Adapted Patchwork Algorithm for Watermarking. 267-270 - Tetsuya Munekata, Toshimitsu Yamaguchi, Hiroki Handa, Ryouichi Nishimura, Yôiti Suzuki:
A Portable Acoustic Caption Decoder Using IH Techniques for Enhancing Lives of the People Who Are Deaf or Hard-of-Hearing - System Configuration and Robustness for Airborne Sound -. 271-274 - Akira Nishimura:
Presentation of Information Synchronized with the Audio Signal Reproduced by Loudspeakers using an AM-based Watermark. 275-278 - Kotaro Sonoda, Katsunari Yoshioka, Osamu Takizawa:
Information Hiding for Public Address Audio Signal using FH/FSK Spread-spectrum Scheme. 279-282 - Ahmad Delforouzi, Mohammad Pooyan:
Adaptive Digital Audio Steganography Based on Integer Wavelet Transform. 283-286 - Mohammad Pooyan, Ahmad Delforouzi:
Adaptive and Robust Audio watermarking in Wavelet Domain. 287-290 - Che-Jen Hsieh, Jung-Shian Li, Cheng-Fu Hung:
A Robust Audio Fingerprinting Scheme for MP3 Copyright. 291-294 - Yuhua Jiao, Yubo Tian, Qiong Li, Xiamu Niu:
Content Integrity Verification for G.729 Coded Speech. 295-300
Web Intelligence and Computational Intelligence
- Mingzhang Zuo, Lingyun Yi, Gannian Zhang:
Using Knowledge Management Technologies to Develop Reflective Learning. 301-304 - Chun-hong Hu, Ming Zhao:
Construction of Collaborative Virtual Learning Communities in Peer-to-peer Networks. 305-308 - Shijue Zheng, Shiqian Wu:
Research and Application of an Improved Genetic Algorithm on the Net Platform of "Digitized Party School". 309-312 - Wei-dong Yang, Ming Zhao:
Research on Knowledge Management Framework Based on Peer-to-peer Computing. 313-316 - Weitao Zheng, Zihua Zhang, Ting Liao, Tuanjie Zhao, Yong Ma:
Study on the Division Tactics of Top Swimming Athletes Home and Abroad in the 400m Freestyle Swimming Race. 317-320 - Jingjing Liu, Bing Wu:
A Multi-agent System for the Flexible Resource Constrained Project Scheduling. 321-324 - Xiaoyan Hao, Xiaoming Chang, Kaiying Liu:
A Rule-based Chinese Question Answering System for Reading Comprehension Tests. 325-329 - Mingzhi Huang, Chengwei Fan:
Research on the Partner Selection of Virtual Enterprise Based on Self-adaptive Genetic Algorithm. 330-333 - Xianzhi Tian:
Research on Scientific Constructions of CAI English Teaching System. 334-337 - Xiang Li, Ximing Liang:
A Hybrid Adaptive Evolutionary Algorithm for Constrained Optimization. 338-341 - Chunhe Song, Hai Zhao, Wei Cai, Haohua Zhang, Ming Zhao, Wei Gao, Xuanjie Ning, Xudong Han, Peng Zhu, Jie Gao, Tianyu Qi, Hongyan Gong:
The Distance-Guided Particle Swarm Optimizer with Dynamic Mutation. 342-345 - Bo Yang, Ding-Xue Zhang, Rui-Quan Liao:
A Modified Particle Swarm Optimization Algorithm with Dynamic Adaptive. 346-349 - Jun-Jie Chen, Haifang Li, Yu-Xing Yang, Ji-Lan Ma:
A DNA Algorithm of Graph Vertex Coloring Problem Based on Multi-separation. 350-356
Software and Hardware Designs of Multimedia Networking Embedded Systems
- Jeng-Wei Lee, Jia-Ming Yang, Chao-Lieh Chen, Yau-Hwang Kuo:
Video Streaming Using Overlay Multicast Scheme with Efficient and Load-Balance Path Diversity. 357-360 - Lien-Fa Lin:
Search RNN on Broadcast Environment. 361-364 - Wen-Chuan Hsieh, Wei-Chung Hsu, Yu-Yuan Hsu:
An Architecture for the Interoperability of Multimedia Messaging Services between GPRS and PHS Cellular Networks. 365-368 - Ming-Harng Lee, Mong-Fong Horng, Bo-Chao Chang:
A DC-based Approach to Robust Watermarking with Hamming-Code. 369-372 - Tian-Hua Liu, Hong-Feng Zhu, Chuan-Sheng Zhou, Gui-Ran Chang:
Design and Simulation of VHDL based ARP Cache. 373-376 - Chuan-Sheng Zhou, Chong Fu:
Implementation of a General Reduced TCP/IP Protocol Stack for Embedded Web Server. 377-380 - Zhiyi Sun, ChaoZhen Hou:
Fuzzy Control for Networked Control System. 381-384 - Liang-Bi Chen, Ching-Chi Hu, Yen-Ling Chen, Chi-Wei Chu, Ing-Jer Huang:
The AES Design Space Exploration with a Soft IP Generator. 385-388 - Tony Gladvin George, N. Malmurugan:
The Architecture of Fast H.264 CAVLC Decoder and its FPGA Implementation. 389-392 - Min-Chuan Lin, Guo-Ruey Tsai, Chun-Rong Wu, Ching-Hui Lin:
Watermarking Technique for HDL-based IP Module Protection. 393-396 - Yuh-Yih Lu, Zhi-Hua Chen, Hsiang-Cheh Huang:
The System for the Reduction of Conducted Electromagnetic Interference Emission from Switching Power Supply. 397-402
Video Surveillance and Recognizing Human Behavior
- Wen-Shiung Chen, Yao-Shan Chiang, Yen-Hsun Chiu:
Biometric Verification by Fusing Hand Geometry and Palmprint. 403-406 - Yu-Ting Chen, Chu-Song Chen:
Cascading Rectangle and Edge Orientation Features for Fast Pedestrian Detection. 407-410 - Kan-Ru Chen, Chia-Te Chou, Sheng-Wen Shih, Wen-Shiung Chen, Duan-Yu Chen:
Feature Selection for Iris Recognition with AdaBoost. 411-414 - Sin-Yu Chen, Jun-Wei Hsieh:
Edge-based Lane Change Detection and its Application to Suspicious Driving Behavior Analysis. 415-418 - Chih-Chung Hsu, Hsuan-Ting Chang, Ting Cheng Chang:
An Improved Face Detection Method in Low-resolution Video. 419-422 - Ying-Nong Chen, Gang-Feng Ho, Kuo-Chin Fan, Chin-Chuan Han:
Face Detection and Authentication in a Large Space. 423-426 - Cheng-Chang Lien, Jian-Cheng Wang, Yue-Min Jiang:
Multi-mode Target Tracking on a Crowd Scene. 427-430 - Yuan-Kai Wang, Chun-Hao Huang:
Facial Expression Recognition with Discriminative Common Vector. 431-434 - Yea-Shuan Huang, Hua-Ching Yan, Ting-Chia Hsu:
Cascaded Face Detector with Multiple Templates. 435-440
Information Hiding and Digital Watermarking
- Hioki Hirohisa:
A Steganographic Method Based on a File Attribute. 441-444 - Xiao-Yan Liu, Li-Hong Ma, Hu-Yun Yin:
New Video Watermarking Scheme by Using Dither Modulation to Local Energy. 445-448 - Ko-Chin Chang, Ping Sheng Huang, Te-Ming Tu, Chien-Ping Chang:
Image Steganographic Scheme Using Tri-way Pixel-Value Differencing and Adaptive Rules. 449-452 - Yuan-Liang Tang, Hui-Tzu Huang:
Robust Near-Reversible Data Embedding Using Histogram Projection. 453-456 - Chin-Chen Chang, The Duc Kieu:
Secret Sharing and Information Hiding by Shadow Images. 457-460 - Hsiang-Cheh Huang, Yu-Hsiu Huang, Jeng-Shyang Pan, Yuh-Yih Lu:
Information Protection and Recovery with Reversible Data Hiding. 461-464 - Hsiang-Cheh Huang, Jeng-Shyang Pan, Chi-Ming Chu:
Optimized Copyright Protection Systems with Genetic-Based Robust Watermarking. 465-468 - Dong Zhang, Depei Qian, Pen Han:
A New Attributes-Priority Matching Watermarking Algorithm Satisfying Topological Conformance for Vector Map. 469-472 - Sandipan Dey, Ajith Abraham, Sugata Sanyal:
An LSB Data Hiding Technique Using Natural Number Decomposition. 473-476 - Kyung-Su Kim, Min-Jeong Lee, Heung-Kyu Lee:
Blind Image Watermarking Scheme in DWT-SVD Domain. 477-480 - Jianlong Yang, Jianmin Wang, Chaokun Wang, Deyi Li:
A Novel Scheme for Watermarking Natural Language Text. 481-484 - Florent Autrusseau, Patrick Le Callet, Alexandre Ninassi:
A Study of Content based Watermarking using an Advanced HVS Model. 485-488 - Chien-Chang Chen, De-Sheng Kao:
DCT-Based Reversible Image Watermarking Approach. 489-492 - Jia-Hong Lee, Mei-Yi Wu:
An Iterative Method for Lossless Data Embedding in BMP Images. 493-498
Intelligent Video Processing
- Hsi-Kuan Chen, Chin-Hsing Chen, Shih-Jen Wang:
Applying the CDHS to Improve the MAP-Based Algorithm in Super Resolution Reconstruction from Sequences. 499-502 - De-Ji Liu, Chien-Hung Lin, Shu-Chung Yi, Jin-Jia Chen:
A Resistor String DAC for Video Processing. 503-506 - Shun-He Huang, Chien-Hung Lin, Shu-Chung Yi, Jin-Jia Chen:
A Chinese Abacus DAC for Video Applications. 507-510 - Chung-Chi Lin, Zeng-Chuan Wu, Wen-Kai Tsai, Ming-Hwa Sheu, Huann-Keng Chiang:
The VLSI Design of Winscale for Digital Image Scaling. 511-514 - Thou-Ho Chen, Zhi-Hong Lin, Chin-Hsing Chen, Cheng-Liang Kao:
A Fast Video Noise Reduction Method by Using Object-Based Temporal Filtering. 515-518 - Thou-Ho Chen, Jun-Liang Chen, Chin-Hsing Chen, Chao-Ming Chang:
Vehicle Detection and Counting by Using Headlight Information in the Dark Environment. 519-522 - Thou-Ho Chen, Chao-Yu Chen, Chin-Hsing Chen:
An Adaptive Random-valued Impulse Noise Reduction Method Based on Noise Ratio Estimation in Highly Corrupted Images. 523-526 - Chin-Fa Hsieh, Tsung-Han Tsai, Shu-Ping Chang, Tai-An Shan:
A Cost-Effective Noise-Reduction Filtering Structure Based on Unsymmetrical Working Windows. 527-530 - Thou-Ho Chen, Chao-Yu Chen, Shi-Feng Huang, Chin-Hsing Chen:
A Real-Time Video Noise Reduction Algorithm in the Dusk Environment. 531-534 - Chih-Hsien Hsia, Jen-Shiun Chiang, Ying-Hong Wang, Tsai-Yuan:
Fast Intra Prediction Mode Decision Algorithm for H.264/AVC Video Coding Standard. 535-538 - Lifang Wu, Xiuli Han, Hao Cui, Wei Shen:
Shot Segmentation and Classification in Basketball Videos. 539-542 - Wei-Han Chang, Nai-Chung Yang, Chung Ming Kuo, Ching-Hsuan Lin:
Template-Based Scene Classification for Baseball Videos Using Efficient Playfield Segmentation. 543-548
Novel Computation on Finance and Management
- Chou-Wen Wang, Chia-Chien Chang:
Pricing Credit-Linked Notes Issued by the Protection Buyer and an SPV. 549-552 - Jui-Chuan Chang:
Financial Accelerator Effect and Macroeconomic Fluctuations. 553-556 - Naiwei Chen, Yakuang Liu:
Application of Artificial Neural Network to Corporate Liquidity Determination. 557-560 - Pen-Yuan Liao:
Optimal Pricing Strategy for Queuing Systems with Capacity Constraint Problem. 561-564 - Tien-Tsai Huang:
The Application of Fuzzy Evaluating Approach on Banking Operating Performance in Taiwan: An Empirical Study. 565-569 - Wei-Shen Tai, Chen-Tung Chen:
An Intellectual Capital Performance Evaluation Based on Fuzzy Linguistic. 570-573 - Chiu-Lien Lee, Ming-Hung Shu:
Fault-Tree Analysis of Intuitionistic Fuzzy Sets for Liquefied Natural Gas Terminal Emergency Shut-Down System. 574-577 - Yueqin Zhang, Jinfeng Liu, Fu Duan, Jing Ren:
Genetic Algorithm in Vehicle Routing Problem. 578-581 - Lei Sun, Tzu-Chieh Lin, Hsiang-Cheh Huang, Bin-Yih Liao, Jeng-Shyang Pan:
An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index. 582-585 - Shouda Jiang, Lianlei Lin, Chao Sun:
A Fast Training Algorithm for Least Squares SVM. 586-592
Intelligent Data Analysis
- Cheng-Chung Hsu, Sheng-Tun Li, Chih-Chuan Chen, Ti-Yen Yang:
An Enhanced ACO Algorithm for Multi-objective Maintenance Scheduling of Oil Tanks. 593-596 - Sheng-Tun Li, Chih-Chuan Chen, Jian Wei Li:
A Multi-objective Particle Swarm Optimization Algorithm for Rule Discovery. 597-600 - Sheng-Tun Li, Hei-Fong Ho:
Fuzzy Rating Framework for Knowledge Management. 601-604 - Jen-Peng Huang, Guo-Cheng Lan, Huang-Cheng Kuo, Tzung-Pei Hong:
A Decomposition Approach for Mining Frequent Itemsets. 605-608 - Chan-Sheng Kuo, Tzung-Pei Hong, Chuen-Lung Chen:
Integrating Multiple Knowledge Sources by Genetic Programming. 609-612 - Xiao-wei Wang, Ying-ming Liu, Feng Li:
Imitation Output Characteristic of Turbine Control Based on Servos Interface Technology. 613-616 - Lingjun Xu, Gang Su, Zhijun Liu, Yong Wang, Ping Zhang:
A High-Efficiency Recursive Algorithm without Numerical Instability for Polynomial Predistorter Design. 617-620 - Te-Shun Chou, Kang K. Yen, Niki Pissinou, Kia Makki:
Fuzzy Belief Reasoning for Intrusion Detection Design. 621-624 - Jiadong Ren, Ke Li:
Find Recent Frequent Items with Sliding Windows in Data Streams. 625-628 - Said E. El-Khamy, Mohamed Essam Khedr, Ahmad Al-Kabbany:
Punched Image Watermarking: A Novel Fast Fractal Coding Based Technique. 629-632 - Changyuan Fan, Xiayu Mu:
On the Convergence Behavior of the FastICA Algorithm with the Kurtosis Cost Function. 633-638
Intelligent Information Processing in Wireless Sensor Networks
- Yung-Tsung Hou, Chia-Mei Chen, Bingchiang Jeng:
Distributed Detection of Wormholes and Critical Links in Wireless Sensor Networks. 639-642 - Wei-Yu Lai, Chia-Mei Chen, Bingchiang Jeng, Gu Hsin Lai, Hsiao-Chung Lin:
Information Exchange Mechanism Based on Reputation in Mobile P2P Networks. 643-646 - Wei Kuang Lai, Chen-Da Tsai:
Scalable Anycast System based on OSPF. 647-650 - Jie Liu, Qingdong Du:
A Multi-Sensor Fusion Method Applied to Stability Diagnosis Based on Distributed Neyman-Pearson Algorithm. 651-654 - Ying Liang, Hang Li:
An Energy-Efficient Clustering Algorithm for Wireless Sensor Network. 655-658 - Min-Hua Shao:
An Effective Privacy-Preserving RFID Scheme against Desynchronization. 659-662 - Xuemin Zhang, Zenggang Xiong:
Research on pertinence of QoS Metrics Based on IEEE 802.15.4 in Wireless Sensor Networks. 663-666 - Minghua Yang, Yuanda Cao, Li Tan, Changyou Zhang, Jiong Yu:
A New Multi-quality Image Fusion Method in Visual Sensor Network. 667-670 - Che-Wei Hsu, Chin-Shiuh Shieh, Wei Kuang Lai:
A Multi-path Routing Protocol with Reduced Control Messages for Wireless Sensor Networks. 671-675
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.