Volume 24,
Number 1,
January 2008
- Chieh-Feng Chiang, Jimmy J. M. Tan:
A Novel Approach to Comparison-Based Diagnosis.
1-9
- Chien-Hung Liu, Chuan-Wen Chang:
A State-Based Testing Approach for Aspect-Oriented Programming.
11-31
- Ming-Yen Lin, Sue-Chen Hsueh, Chia-Wen Chang:
Mining Closed Sequential Patterns with Time Constraints.
33-46
- Shiao-Li Tsao, Chih-Chien Hsu:
A Dynamic Load Balancing Scheme for VoIP over WLANs.
47-60
- Chien Chen, Chia-Jen Hsu, Chi-Chia Huang:
Fast Packet Classification Using Bit Compression with Fast Boolean Expansion.
61-81
- Ying-Chieh Chen, Sin-Jhen Chiu, Hsiang-Ting Chen, Chun-Fa Chang:
Physically-Based Analysis and Rendering of Bidirectional Texture Functions Data.
83-98
- Guan-Yu Chen, Ying-Cheng Chen, Chu-Fang Lin, An-Chi Hu, Cheng-Chi Wu, Yung-Chang Chen:
Template-Based Automatic Segmentation of /Drosophila/ Mushroom Bodies.
99-113
- Chao-Hung Lu, Hung-Ming Chen, Chien-Nan Jimmy Liu:
An Effective Decap Insertion Method Considering Power Supply Noise during Floorplanning.
115-127
- Ye-In Chang, Jun-Hong Shen, Tsu-I Chen:
A Data Mining-Based Method for the Incremental Update of Supporting Personalized Information Filtering.
129-142
- Hua-Tsung Chen, Hsuan-Sheng Chen, Ming-Ho Hsiao, Wen-Jiin Tsai, Suh-Yin Lee:
A Trajectory-Based Ball Tracking Framework with Visual Enrichment for Broadcast Baseball Videos.
143-157
- Sathya Peri, Neeraj Mittal:
Improving the Efficacy of a Termination Detection Algorithm.
159-174
- Tetz C. Huang, Chih-Yuan Chen, Cheng-Pin Wang:
A Linear-Time Self-Stabilizing Algorithm for the Minimal 2-Dominating Set Problem in General Networks.
175-187
- Z. M. Ma, Li Yan:
A Literature Overview of Fuzzy Database Models.
189-202
- Yu-Liang Kuo, Eric Hsiao-Kuang Wu, Gen-Huey Chen:
Performance Evaluation for Next Generation Differentiated Services in Wireless Local Area Networks.
203-220
- Kyung-Taeg Rho, Soo-Mok Jung, Jung Hun Kang, Wonil Choi, Myong-Soon Park:
AHS: Advanced Handoff Scheme for Nested Mobile Networks.
221-236
- Jeng-Jong Lin:
A GA-based Multi-Objective Decision Making for Optimal Vehicle Transportation.
237-260
- Shen-Yi Lin, Chih-Shen Chen, Li Liu, Chua-Huang Huang:
Tensor Product Formulation for Hilbert Space-Filling Curves.
261-275
- Ying-Hong Wang, Chih-Hsiao Tsai, Hung-Jen Mao:
A Hierarchical Multiple-Choice Routing Protocol for Wireless Sensor Networks.
277-291
- Yong Zhou, Rong Xu, Xiaofeng Hu, Qingtai Ye:
A Lane Departure Warning System Based on Virtual Lane Boundary.
293-305
- Tzu-Chi Huang, Ce-Kuen Shieh, Bo-Yang Lai, Yu-Ben Miao:
Tapster: Transparent Proxy Redirector for Mobile Computing.
307-316
Volume 24,
Number 2,
March 2008
- Farhan Siddiqui, Sherali Zeadally:
Ubiquitous Wireless Connectivity across Cellular and Wireless Local Area Networks.
327-342
- Minjae Park, Kwanghoon Kim:
Control-path Oriented Workflow Intelligence Analyses.
343-359
- Pooya Shareghi, Hamid Sarbazi-Azad:
The Stretched Network: Properties, Routing, and Performance.
361-378
- Arthur M. D. Shr, Alan Liu, Peter P. Chen:
Load Balancing Among Photolithography Machines in the Semiconductor Manufacturing System.
379-391
- Jang-Ping Sheu, Kun-Ying Hsieh, Po-Wen Cheng:
Design and Implementation of Mobile Robot for Nodes Replacement in Wireless Sensor Networks.
393-410
- Kai-Tai Song, Jen-Chao Tai:
Real-Time Background Estimation of Traffic Imagery Using Group-Based Histogram.
411-423
- Chih-Heng Ke, Ce-Kuen Shieh, Wen-Shyang Hwang, Artur Ziviani:
An Evaluation Framework for More Realistic Simulations of MPEG Video Transmission.
425-440
- Licheng Wang, Zhenfu Cao, Feng Cao, Haifeng Qian, Haiyong Bao:
Biased Bit Commitment and Applications.
441-452
- Chung-Feng Jeffrey Kuo, Chung-Yang Shih, Jiunn-Yih Lee:
Separating Color and Identifying Repeat Pattern Through the Automatic Computerized Analysis System for Printed Fabrics.
453-467
- Chun-Chuan Yang, Yu-Chong Chang:
A Stability-Based Clustering Technique and Routing Protocol for Mobile Ad Hoc Networks.
469-481
- Der-Rong Din:
Heuristic and Simulated Annealing Algorithms for Wireless ATM Backbone Network Design Problem.
483-501
- Kuo-Liang Chung, Yong-Huai Huang:
A Pruning-and-Voting Strategy to Speed up the Detection for Lines, Circles, and Ellipses.
503-520
- Kuo-Liang Chung, Shih-Wei Yu, Hsueh-Ju Yeh, Yong-Huai Huang, Ta-Jen Yao:
New Fuzzy Object Segmentation Algorithm for Video Sequences.
521-537
- Yanxia Wang, Qiuqi Ruan:
Palmprint Images Enhancement Using Steerable Filters based Fuzzy Unsharp Masking.
539-551
- Tian-Luu Wu, Shyi-Chyi Cheng:
Utilization of Principle Axis Analysis for Fast Nearest Neighbor Searches in High-Dimensional Image Databases.
553-571
- Vinay Madenur, Neeraj Mittal:
A Delay-Optimal Group Mutual Exclusion Algorithm for a Tree Network.
573-583
- Dowming Yeh, Ray J. Tsai, Pei-Chen Sun, Jia-Wen Lee:
Linear Regression Models for Assessing the Ranking of Web Sites Based on Average Numbers of Visits.
585-599
- Lu Zhen, Zuhua Jiang:
Innovation-Oriented Knowledge Query in Knowledge Grid.
601-613
- Shin-Shin Kao, Jui-Chia Wu, Yuan-Kang Shih:
Hamiltonian Connectivity, Pancyclicity and 3^*-Connectivity of Matching Composition Networks.
615-625
- Nan-Chen Hsieh:
Handling Redundancies for Disjunctive Information with Exclusive-or Semantics.
627-638
Volume 24,
Number 3,
May 2008
- Namgyu Kim, Sangwon Lee, Songchun Moon:
Formalized Entity Extraction Methodology for Changeable Business Requirements.
649-671
- Ming-Yang Cheng, Mi-Ching Tsai, Chun-Jen Chen:
Dynamic Visual Tracking Using SDG-Like Matching.
673-690
- Rong-Chi Chang, Timothy K. Shih, Hui-Huang Hsu:
A Strategic Decomposition for Adaptive Image Transmission.
691-707
- Sang-Bum Han, Keun-Ho Lee, Chong-Sun Hwang:
Region-based Shadow Registration Scheme for Efficient Mobility Management in the SIP.
709-725
- Pao-Ta Yu, Chih-Chia Yao:
Dichotomous Learning Algorithm for the Optimal Design of Weighted Order Statistic Filters.
727-742
- Hamid Reza Shahriari, Yasser Ganjisaffar, Rasool Jalili, Jafar Habibi:
Topological Analysis of Multi-phase Attacks using Expert Systems.
743-767
- Chin-Jung Huang, Min-Yuan Cheng:
Similarity Measurement of Rule-based Knowledge using Conditional Probability.
769-784
- Cheng-Yuan Tang, Yi-Leh Wu, Yueh-Hung Lai:
Fundamental Matrix Estimation using Evolutionary Algorithms with Multi-Objective Functions.
785-800
- Feng-Tse Lin:
A Genetic Algorithm for Linear Programming With Fuzzy Constraints.
801-817
- Jiun-Long Huang, Jui-Nan Lin:
Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network.
819-840
- Yu-Te Liaw, Bing-Chuan Bai, James Chien-Mo Li:
A Two-level Simultaneous Test Data and Time Reduction Technique for SOC.
841-857
- Jia-Hong Dai, Ching-Han Chen:
A Low Complexity Fingerprint Verification Algorithm with Reduced Hardware Resources.
859-873
- Yi-Sheng Huang, Ta-Hsiang Chung:
Modeling and Analysis of Urban Traffic Lights Control Systems Using Timed CP-nets.
875-890
- Jeen-Shing Wang, Yu-Liang Hsu:
Dynamic Nonlinear System Identification Using a Wiener-Type Recurrent Network with OKID Algorithm.
891-905
- Lahouaria Benasla, Abderrahim Belmadani, Mostefa Rahli:
Hooke-Jeeves' Method Applied to a New Economic Dispatch Problem Formulation.
907-917
- Hans Vandierendonck, Veerle Desmet, Koen De Bosschere:
Behavior-Based Branch Prediction by Dynamically Clustering Branch Instructions.
919-931
- Gwan-Hwan Hwang, Chih-Hao Yu, Chun-Chin Sy, Chiu-Yang Chang:
WSNFS: A Web-Services-Based Network File System.
933-947
- Jeng-Jong Lin:
A GA-Based Search Approach to Creative Weave Structure Design.
949-963
- Jih-Ching Chiu, Yu-Liang Chou, Ren-Bang Lin:
The Multi-context Reconfigurable Processing Unit for Fine-grain Computing.
965-979
- Gin-Der Wu, Ying Lei:
A Register Array Based Low Power FFT Processor for Speech Recognition.
981-991
Volume 24,
Number 4,
May 2008
- Pei-Yeh Wu, Jen-Jee Chen, Yu-Chee Tseng, Hung-Wei Lee:
Design of QoS and Admission Control for VoIP Services Over IEEE 802.11e WLANs.
1003-1022
- Cho-Chin Lin:
On Message Sequences for Incremental Network Computing.
1023-1040
- Kuo-Yu Huang, Chia-Hui Chang, Kuo-Zui Lin:
Efficient Discovery of Frequent Continuities by Projected Window List Technology.
1041-1064
- Yang-Jing Wu, Jen-Hung Chiu, Tsang-Ling Sheu:
A Modified EDCA with Dynamic Contention Control for Real-Time Traffic in Multi-hop Ad Hoc Networks.
1065-1079
- Yoon-Teck Bau, Chin Kuan Ho, Hong Tat Ewe:
Ant Colony Optimization Approaches to the Degree-constrained Minimum Spanning Tree Problem.
1081-1094
- Kuo-Liang Chung, Ta-Jen Yao, Yong-Huai Huang:
New Prediction- and Affine Transformation-Based Three-Step Search Scheme for Motion Estimation With Application.
1095-1109
- Reza Sabzevari, Gholam Ali Montazer:
An Intelligent Data Mining Approach Using Neuro-Rough Hybridization to Discover Hidden Knowledge from Information Systems.
1111-1126
- Wei-Hau Chiao, Chung-Ping Chung:
Filtering of Unnecessary Branch Predictor Lookups for Low-power Processor Architecture.
1127-1142
- Jian Weng, Xiangxue Li, Kefei Chen, Shengli Liu:
Identity-Based Parallel Key-Insulated Signature Without Random Oracles.
1143-1157
- Shih-Tung Wu, Kuo-Liang Chung, Yong-Huai Huang, Jung-Gen Wu:
A Unified Min-Max Transition-Based Data Hiding Algorithm for Mixed Text/Halftone Images.
1159-1173
- Sung Tak Kang, Yon Dohn Chung, Myoung-Ho Kim:
A Temporal Aggregation Method for Update-Intensive Applications.
1175-1186
- Gregor Klajnsek, Borut Zalik, Franc Novak, Gregor Papa:
A Quadtree-based Progressive Lossless Compression Technique for Volumetric Data Sets.
1187-1195
- Sheng-Wen Jeng, Wen-Hsiang Tsai:
A Robust and Accurate Calibration Method by Computer Vision Techniques for Coordinate Transformation between Display Screens and Their Images.
1197-1211
- Minho Kim, Çetin Kaya Koç:
A Secure Hash-Based Strong-Password Authentication Protocol Using One-Time Public-Key Cryptography.
1213-1227
- Huang-Chun Roan, Wen-Jyi Hwang, Wei-Jhih Huang, Chia-Tien Dan Lo:
Network Intrusion Detection Based on Shift-OR Circuit.
1229-1239
- Rong-Chi Chang, Timothy K. Shih:
Multilayer Inpainting on Digitalized Artworks.
1241-1255
- Chun-Chuan Yang, Sze-Horng Lee, Li-Yuan Cheng:
The Application-Level Protocol for QoS Supporting in Synchronized Multimedia Sessions.
1257-1271
- Po-Yueh Chen, En-Chi Liao, Chung-Wei Liang:
The Segmented-Matrix Algorithm for Haar Discrete Wavelet Transform.
1273-1282
Volume 24,
Number 5,
September 2008
- Woei-Kae Chen, Zheng-Wen Shen, Tung-Hung Tsai:
Integration of Specification-based and CR-based Approaches for GUI Testing.
1293-1307
- Zhijun Ding, Junli Wang, Changjun Jiang:
An Approach for Synthesis Petri Nets for Modeling and Verifying Composite Web Service.
1309-1328
- Jeong-Beom Kim, MoonBae Song, Chong-Sun Hwang, SangKeun Lee:
FASiRec: A Fast Session Recovery Scheme for Large-scale VPNs Using IPSec.
1329-1346
- Zheng Gong, Xiangxue Li, Dong Zheng, Kefei Chen:
A Generic Construction for Instrusion-Resilient Signatures from Linear Feedback Shift Register.
1347-1360
- Han C. W. Hsiao, Shih-Hao Chen, Judson Pei-Chun Chang, Jeffrey J. P. Tsai:
Predicting Subcellular Locations of Eukaryotic Proteins Using Bayesian and /k/-Nearest Neighbor Classifiers.
1361-1375
- Chun-Chuan Yang, Chen-Kuei Chu, Yung-Chi Wang:
Extension of Timeline-based Editing for Non-deterministic Temporal Behavior in SMIL2.0 Authoring.
1377-1395
- Zhen Luo, Qixin Cao, Yanzheng Zhao:
A Self-adaptive Predictive Policy for Pursuit-evasion Game.
1397-1407
- Yi-Yu Su, Shiow-Fen Hwang, Chyi-Ren Dow:
An Efficient Cluster-Based Routing Algorithm in Ad Hoc Networks with Unidirectional Links.
1409-1428
- Wann-Yun Shieh, Chien-Chen Chen:
Saving Register-File Leakage Energy by Register-usage Exploiting.
1429-1444
- Sheng-Chai Chi, Chih Chieh Yang:
A Two-stage Clustering Method Combining Ant Colony SOM and K-means.
1445-1460
- Jain-Shing Liu, Chun-Hung Richard Lin:
Dynamic Transmission Control Method for WLANs.
1461-1472
- Pin Lin, Wenling Wu, Chuankun Wu, Tian Qiu:
Analysis of All-or-Nothing Hash Functions.
1473-1484
- Juan M. Estévez-Tapiador, Julio César Hernández Castro, Pedro Peris-Lopez, Arturo Ribagorda:
Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions.
1485-1504
- Cheng-Jian Lin, Cheng-Hung Chen, Chi-Yung Lee:
Efficient Immune-Based Particle Swarm Optimization Learning for Neuro-Fuzzy Networks Design.
1505-1520
- Jing-Shing Yao, Jin-Shieh Su, Teng-San Shih:
Fuzzy System Reliability Analysis Using Triangular Fuzzy Numbers Based on Statistical Data.
1521-1535
- Lakshmanan Senthilkumar, Venkadachalam Sankaranarayanan:
Provisioning Erlang-B Model Based Flow Admission Control for Packet Networks.
1537-1550
- Pang-Hung Huang, Yu-Pao Tsai, Wan-Yen Lo, Sheng-Wen Shih, Yi-Ping Hung:
Calibration of Motorized Object Rig and Its Applications.
1551-1565
- Chien-Chang Chen, Wen-Yin Fu:
A Geometry-Based Secret Image Sharing Approach.
1567-1577
- Feng-Yang Hsieh, Chia-Ming Wang, Chun-Chieh Lee, Kuo-Chin Fan:
A Lossless Image Coder Integrating Predictors and Block-Adaptive Prediction.
1579-1591
Volume 24,
Number 6,
November 2008
- Chong-Won Lee, Byungjeong Lee, Jaewoo Oh, Chisu Wu:
Identifying Metrics for Commercial-Off-the-Shelf Software with Inductive Inference Based on Characteristic Vectors.
1603-1628
- Juan Hernández-Serrano, Josep Pegueroles, Miguel Soriano:
Shared Self-Organized GKM Protocol for MANETs.
1629-1646
- Shih-Hsu Huang, Chun-Hua Cheng:
Power-Management Scheduling for Peak Power Minimization.
1647-1668
- Wei-Ho Tsai, Hung-Ming Yu, Hsin-Min Wang:
Using the Similarity of Main Melodies to Identify Cover Versions of Popular Songs for Music Document Retrieval.
1669-1687
- Sanjay Misra, Ibrahim Akman:
Weighted Class Complexity: A Measure of Complexity for Object Oriented Systems.
1689-1708
- Ji-Cherng Lin, Tetz C. Huang, Cheng-Pin Wang, Chih-Yuan Chen:
A Self-Stabilizing Algorithm for Finding a Minimal Distance-2 Dominating Set in Distributed Systems.
1709-1718
- Chia-Ming Wang, Kuo-Chin Fan, Cheng-Tzu Wang:
Estimating Optical Flow by Integrating Multi-Frame Information.
1719-1731
- Choonhwa Lee, Sumi Helal, David Nordstedt:
Impromptu Service Discovery and Delivery in Mobile Environments.
1733-1751
- Chih-Lin Hu, Wei-Shun Liao, Yen-Ju Huang:
Mobile Media Content Sharing in UPnP-Based Home Network Environment.
1753-1769
- Chuan-Kai Yang, Chiang-Han Hung:
A New Seed-Set Finding Approach for Iso-Surface Extraction.
1771-1785
- Shuangquan Wang, Xin Chen, Ningjiang Chen, Jie Yang:
Mobile-Agent-Based Distributed Decision Tree Classification in Wireless Sensor Networks.
1787-1798
- Sang-Won Kang, Joon-Min Gil, Jongwan Kim, SeokJin Im, SangKeun Lee:
Description-Based Semantic Prefetching Scheme for Data Management in Location-Based Services.
1799-1820
- Feilong Tang, Minyi Guo, Minglu Li, Cho-Li Wang:
Implementation of an Intelligent Urban Traffic Management System Based on a City Grid Infrastructure.
1821-1836
- Kwang-Jin Paek, Ui-Sung Song, Hye-Young Kim, Jongwan Kim:
Energy-Efficient Key-Management (EEKM) Protocol for Large-Scale Distributed Sensor Networks.
1837-1858
- Su-Shen Hung, Shing-Tsaan Huang:
The Self-Stabilizing Edge-Token and Its Applications.
1859-1872
- Wei-Ho Tsai:
Speaker Clustering Based on Bayesian Information Criterion.
1873-1886
- Chang-Jiu Chen, Wei-Min Cheng:
Reducing the TLB Context Switching Miss Ratio With Banked and Prefetching Mechanism.
1887-1900
- Tao-Ku Chang, Gwan-Hwan Hwang:
A Secure Query Language for XML Documents.
1901-1916
Copyright © Mon Mar 15 04:04:07 2010
by Michael Ley (ley@uni-trier.de)