Abstract is missing.
- Possible Disease-Link Genetic Pathways Constructed by Hierarchical Clustering and Conditional Probabilities of Ovarian Carcinoma Microarray DataHsiao-Han Ko, Kuo-Jin Tseng, Li-Min Wei, Meng-Hsiun Tsai. 1-4 [doi]
- An Efficient Source Authentication for Multicast Based on Merkle Hash TreeIuon-Chang Lin, Chia-Chang Sung. 5-8 [doi]
- An Improved Digital Signature Scheme with Fault Tolerance in RSAIuon-Chang Lin, Hsing-Lei Wang. 9-12 [doi]
- Chaos-Based Image Integrity Authentication CodeTzung-Her Chen, Wei-Lun Huang, Chih-Yang Lin. 13-16 [doi]
- The Information Hiding Technology Based on the Similar Sample Blocks of Grayscale ImageTzu-Chuen Lu, Siang-Ru Liao, Chun-Ming Chang. 17-20 [doi]
- A Robust Public Watermarking Scheme Based on DWTChin-Chen Chang, Kuo-Nan Chen, Ming-Huang Hsieh. 21-26 [doi]
- Enhancement of Two-Factor User Authentication in Wireless Sensor NetworksHui-Feng Huang, Ya-Fen Chang, Chun-Hung Liu. 27-30 [doi]
- A Data Hiding Scheme on Word Documents Using Multiple-Base Notation SystemIuon-Chang Lin, Ping-Kun Hsu. 31-33 [doi]
- A Reversible Data Hiding Scheme for Digital Images Using LAU-Side Match PredictionChin-Fang Lee, Huei-Ju Tsai. 34-38 [doi]
- Reversible Watermarking by Coefficient Adjustment MethodChing-Yu Yang, Chih-Hung Lin, Wu-Chih Hu. 39-42 [doi]
- A (2, 3) Threshold Secret Sharing Scheme Using SudokuYung-Chen Chou, Chih-Hung Lin, Pao-Ching Li, Yu-Chiang Li. 43-46 [doi]
- Reversible Authentication and Cross-Recovery of Images Using (t, n) Threshold and Modified-RCM WatermarkingYeh-Shun Chen, Ran-Zan Wang. 47-50 [doi]
- Steganalysis Scheme Using the Difference Image of Calibrated Sub-samplingJeong-Chun Joo, Tae-Woo Oh, Jung-Ho Choi, Heung-Kyu Lee. 51-54 [doi]
- Improved Watermark Estimation Scheme Based on Neighborhood FilterTae-Woo Oh, Seung-Jin Ryu, Ji Won Lee, Won-Young Yoo, Heung-Kyu Lee. 55-58 [doi]
- Multi-layer Secret Image SharingWen-Pinn Fang. 59-61 [doi]
- Graylevel Images Encrypting Based on the n-Graylevel Encoding Method and the Lowest Common Multiple TechniqueKuang Tsan Lin. 62-65 [doi]
- Data Hiding Based on Side Match Vector Quantization and Modulus FunctionLee Shu-Teng Chen, Wen-Tarn Chang, Suiang-Shyan Lee, Ja-Chen Lin. 66-69 [doi]
- High-Payload Image Hiding Scheme Using k-Way Block MatchingShang-Kuan Chen, Ran-Zan Wang. 70-73 [doi]
- High Embedding Reversible Data Hiding Scheme for JPEGWen-Chung Kuo, Shao-Hung Kuo, Lih-Chyau Wuu. 74-77 [doi]
- Secure Hybrid Spread Spectrum System for Steganography in Auditive MediaMarcus Nutzinger, Christian Fabian, Marion Marschalek. 78-81 [doi]
- Robust Watermarking of H.264-Encoded Video: Extension to SVCPeter Meerwald, Andreas Uhl. 82-85 [doi]
- A Robust Digital Image Watermarking Algorithm Based on CHIRPLET TransformMinghui Deng, Xiuli Zhou. 86-89 [doi]
- An Information-Theoretic Model for Dispersed Ordered Dithered Halftone Image Watermarking by Hilbert Curve DecompositionBrian K. Lien. 90-93 [doi]
- Mobile Services and Implementation of Digital Watermarks in Audio FilesManabu Hirakawa, Junichi Iijima. 94-97 [doi]
- A Watermarking Based Tamper Detection Solution for RFID TagsAli Nur Mohammad Noman, Kevin Curran, Tom Lunney. 98-101 [doi]
- A Novel Image Watermarking Technique Using Fuzzy-BP NetworkCharu Agarwal, Anurag Mishra. 102-105 [doi]
- Differential Histogram Modification-Based Reversible Watermarking with Predicted Error CompensationDong-Gyu Yeo, Hae-Yeoun Lee, Byeong Man Kim. 106-109 [doi]
- A Visually Enhanced Approach to Watermarking 3D ModelsShinichi Nakazawa, Sho Kasahara, Shigeo Takahashi. 110-113 [doi]
- Robustness Evaluation of Digital Watermarking Based on Discrete Wavelet TransformKiyoharu Okagaki, Kenichi Takahashi, Hiroaki Ueda. 114-117 [doi]
- Impulsive Synchronization for Coupled Reaction-Diffusion System and Its Application in Information HidingWanli Yang, Suwen Zheng, Li Huang. 118-122 [doi]
- Digital Image Watermarking in DCT Domain Using Finite Newton Support Vector RegressionRajesh Mehta, Anurag Mishra, Rampal Singh, Navin Rajpal. 123-126 [doi]
- Fast Watermarking Based on QR Decomposition in Wavelet DomainYashar Naderahmadian, Saied Hosseini-Khayat. 127-130 [doi]
- Intelligent Watermarking with Multi-objective Population Based Incremental LearningBassem S. Rabil, Robert Sabourin, Eric Granger. 131-134 [doi]
- Self-Synchronous Time-Domain Audio Watermarking Based on Coded-WatermarksRaúl Martínez-Noriega, Mariko Nakano, Kazuhiko Yamaguchi. 135-138 [doi]
- Intelligent Watermarking of Document Images as a Dynamic Optimization ProblemEduardo Vellasques, Robert Sabourin, Eric Granger. 139-142 [doi]
- A Novel Audio Watermarking Algorithm Based on Reduced Singular Value DecompositionJian Wang, Ron Healy, Joe Timoney. 143-146 [doi]
- Design of 3-D FIR Cone-Shaped Filters by a Nest of McClellan TransformationsJong-Jy Shyu, Soo-Chang Pei, Yun-Da Huang. 147-150 [doi]
- Reversible Data Hiding with Improved Histogram Alteration MethodHsiang-Cheh Huang, Yueh-Hong Chen, I.-Hung Wang. 151-154 [doi]
- A RFID-Based Hybrid Building Fire Evacuation System on Mobile PhoneLiou Chu. 155-158 [doi]
- A New Integrated Mobile Architecture for Heterogeneous Wireless NetworksShih-Jung Wu. 159-162 [doi]
- Preliminary Survey of Multiview Synthesis TechnologyEllen Sharma Shijagurumayum, Feng-Cheng Chang. 163-166 [doi]
- Systematic Review of Applying Service Oriented Architecture in NetworkingDuen-Kai Chen. 167-170 [doi]
- Adjacent Quad Modification Algorithm for Reversible Data HidingHsiang-Cheh Huang, Ting-Wei Chen, Feng-Cheng Chang. 171-174 [doi]
- Electrical Network Frequency as a Tool for Audio Concealment ProcessFeng-Cheng Chang, Hsiang-Cheh Huang. 175-178 [doi]
- New Hidden and Secure Data Transmission Method Proposal for Military IEEE 802.11 NetworksZbigniew Piotrowski, Krzysztof Sawicki, Mariusz Bednarczyk, Piotr Gajewski. 179-183 [doi]
- Compression of 3D Triangle Meshes with a Generalized Parallelogram Prediction Scheme Based on Vector QuantizationZhongbao Chen, Fuliang Bao, Zhigang Fang, Zhen Li. 184-187 [doi]
- Single Band Statistics and Steganalysis PerformancePham Hai Dang Le, Matthias O. Franz. 188-191 [doi]
- A Fine Grained RBAC Model Supporting Flexible Administrative Separation of DutyYong-Zhong He, Zhan Han, Ying Cai. 192-195 [doi]
- NLOS Mitigation Method for TDOA MeasurementHao Jiang, Jie Xu, Zhen Li. 196-199 [doi]
- A New SETUP for Factoring Based AlgorithmsConstantinos Patsakis, Nikolaos Alexandris. 200-203 [doi]
- A Fast Modular Multiplication MethodAli Sentürk, Mustafa Gök. 204-207 [doi]
- Chaotic Iterations versus Spread-Spectrum: Chaos and Stego SecurityChristophe Guyeux, Nicolas Friot, Jacques M. Bahi. 208-211 [doi]
- Controlled Distortion for High Capacity Data-in-Speech Spectrum SteganographyFatiha Djebbar, Habib Hamam, Karim Abed-Meraim, Driss Guerchi. 212-215 [doi]
- A Fast 8*8 2D IDCT Architecture, Avoiding Zero Transformed CoefficientsThomas Tziortzios, Stavros Dokouzyannis. 216-219 [doi]
- A Framework for Face Recognition Using Laplacian Eigenmaps and Nearest Feature MixturesChen-Ta Hsieh, Chang-Hsing Lee, Chin-Chuan Han, Ching-Chien Chuang. 220-223 [doi]
- Facial Feature Alignment by Manifold Learning of Active Appearance ModelYuan-Kai Wang, Wei-Ren Chen. 224-227 [doi]
- Improvement of Face Recognition by Eyeglass RemovalYuan-Kai Wang, Jia-Hau Jang, Luo-Wei Tsai, Kuo-Chin Fan. 228-231 [doi]
- Fast Forgery Detection with the Intrinsic Resampling PropertiesCheng-Chang Lien, Cheng-Lun Shih, Chih-Hsun Chou. 232-235 [doi]
- Moving Object Detection for Night SurveillanceYuan-Kai Wang, Ching-Tang Fan. 236-239 [doi]
- Implementation of a Smart Traffic Prediction and Flow Control Mechanism for Video StreamingYue-Ru Chuang, Chia-Sheng Hsu, Je-Wei Chen. 240-243 [doi]
- A Recovery Algorithm for the Details of the Low Resolution Video SequenceJin Jing, Yuan Jie. 244-247 [doi]
- An Alternative-Path Approach to Improve Robustness of TCP Connections in Wireless Mesh NetworksYi-Ting Chien, Mong-Fong Horng, Yu-Cheng Sheu, Jeng-Pong Hsu, Yau-Hwang Kuo, Chin-Shiuh Shieh. 248-251 [doi]
- A Fast and Efficient FEC Enhancement Scheme for Delay-Sensitive Video TransmissionsChun-I. Kuo, Chi-Huang Shih, Ce-Kuen Shieh, Wen-Shyang Hwang. 252-255 [doi]
- Adaptive Forward Error Correction Combined with Packet Size Control for Wireless VideoChi-Huang Shih. 256-259 [doi]
- Improving the Multimedia Processing of Relay Nodes in Mesh Wireless NetworksChun-Ting Huang. 260-263 [doi]
- Frame Interpolation Method Based on Adaptive Threshold and Adjacent PixelsHyeongchul Oh, Joohyun Lee, Changki Min, Jechang Jeong. 264-267 [doi]
- Low-Complexity DC-Compensated Weighted 2BT-Based Motion EstimationChangryoul Choi, Jechang Jeong. 268-271 [doi]
- Autoregressive Video Modeling through 2D Wavelet StatisticsMona Omidyeganeh, Shahrokh Ghaemmaghami, Shervin Shirmohammadi. 272-275 [doi]
- Low-Cost and Shared Architecture Design of Recursive DFT/IDFT/IMDCT Algorithms for Digital Radio Mondiale SystemShin-Chi Lai, Sheau-Fang Lei, Ching-Hsing Luo. 276-279 [doi]
- Lossless Coding of Multiband Images Using Interband Data Correlation and Error Feedback Prediction SchemeCheng-Chen Lin, Yin-Tsung Hwang, Yi-Chen Chang, Jiun-Jiang Chen, Ming-Wei Liu. 280-283 [doi]
- Area-Efficient H.264 VLC Decoder Using Sub-tree ClassificationChia-Cheng Lo, Chia-Wei Hsu, Ming-Der Shieh. 284-287 [doi]
- The Use of k-Means Algorithm to Compute the Line Spectrum Pair Frequencies with Tschirnhaus TransformShi-Huang Chen, Ming-Lung Hsu. 288-291 [doi]
- Efficient Multi-Layer Background Model on Complex Environment for Foreground Object DetectionWen-Kai Tsai, Ming-Hwa Sheu, Chung-Chi Lin. 292-295 [doi]
- A Pipelined Program Decompression Engine Generator Based on Partial Field-Partitioned (PFP) Compression Technique for Embedded SystemsYuan-Long Jeang, Ko-Yen Hu. 296-299 [doi]
- A Simple and Efficient Anti-collision Algorithm for RFID SystemChuen-Ching Wang, Te-Yuan Wang, Tien-Hao Lien, Rong-Ming Su. 300-305 [doi]
- Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait RecognitionMohammad Omar Derawi, Claudia Nickel, Patrick Bours, Christoph Busch. 306-311 [doi]
- Improved Cycle Detection for Accelerometer Based Gait AuthenticationMohammad Omar Derawi, Patrick Bours, Kjetil Holien. 312-317 [doi]
- Capturing Hand or Wrist Vein Images for Biometric Authentication Using Low-Cost DevicesJ. Enrique Suarez Pascual, Jaime Uriarte-Antonio, Raul Sánchez-Reillo, Michael G. Lorenz. 318-322 [doi]
- Teeth Segmentation and Feature Extraction for Odontological BiometricsDANISH MAIRAJ, Stephen D. Wolthusen, Christoph Busch. 323-328 [doi]
- 3D Face Recognition with Local Binary PatternsXuebing Zhou, Silvia Araujo Sánchez, Arjan Kuijper. 329-332 [doi]
- Usability Evaluation of Fingerprint Based Access Control SystemsBelen Fernandez-Saavedra, Raul Alonso-Moreno, Aitor Mendaza-Ormaza, Raul Sánchez-Reillo. 333-336 [doi]
- Blackbox Security of Biometrics (Invited Paper)Julien Bringer, Hervé Chabanne, Koen Simoens. 337-340 [doi]
- Spectral Minutiae Representations for Fingerprint RecognitionHaiyun Xu, Raymond N. J. Veldhuis. 341-345 [doi]
- A Survey of the Security and Privacy Measures for Anonymous Biometric Authentication SystemsIleana Buhan, Emile Kelkboom, Koen Simoens. 346-351 [doi]
- Privacy Preserving Identification: Order Statistics List Decoding PerspectiveFarzad Farhadzadeh, Sviatoslav Voloshynovskiy, Oleksiy J. Koval. 352-355 [doi]
- Fusion in Fingerprint Authentication: Two Finger ScenariosDavrondzhon Gafurov, Christoph Busch, Patrick Bours, Bian Yang. 356-359 [doi]
- Acceleration Axis Selection in Biometric Technique Based on Gesture RecognitionJavier Guerra Casanova, Carmen Sánchez Ávila, Alberto de Santos Sierra, Gonzalo Bailador del Pozo, Vicente Jara Vera. 360-363 [doi]
- Two Stress Detection Schemes Based on Physiological Signals for Real-Time ApplicationsAlberto de Santos Sierra, Carmen Sánchez Ávila, Javier Guerra Casanova, Gonzalo Bailador del Pozo, Vicente Jara Vera. 364-367 [doi]
- Teaching of Emotional Expression Using Finger BrailleYasuhiro Matsuda, Tsuneshi Isomura. 368-371 [doi]
- Detecting Sustained Attention during Cognitive Work Using Heart Rate VariabilityCho-Yan Chen, Chih-Jen Wang, E-Liang Chen, Chi-Keng Wu, Yen-Kuang Yang, Jeen-Shing Wang, Pau-Choo Chung. 372-375 [doi]
- Gabor-Based Kernel Independent Component Analysis for Face RecognitionYanchuan Huang, MingChu Li, Chuang Lin, Linlin Tian. 376-379 [doi]
- Bayesian Decision Based Method for Assets Recognition of Risk AssessmentShenyu Liu, Xi He, Daofu Gong. 380-383 [doi]
- Bio-inspired Hybrid Face Recognition System for Small Sample Size and Large DatasetMuhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar. 384-388 [doi]
- Driving Conditions Recognition Using Heart Rate Variability IndexesJeen-Shing Wang, Pau-Choo Chung, Wei-Hsin Wang, Che-Wei Lin. 389-392 [doi]
- Facial Features Approximation for Expression Detection in Human-Robot InterfaceMohammad Ibrahim Khan, Md. Al-Amin Bhuiyan. 393-397 [doi]
- Research on Multimedia Intelligence Course and Intelligence Classroom Based on Multiple Intelligence TheoryQingsheng Li, Aimin Wang, Jinyu Kai, Jipeng Wang. 398-401 [doi]
- Design and Implementation of Personalized and Visual Web Page EditorQingsheng Li, Jipeng Wang, Xiaona Jiang. 402-405 [doi]
- Genetic Algorithm Based Bayesian Network for Customers' Behavior AnalysisXiao Yi Yu, Aiming Wang. 406-409 [doi]
- Revisit LSB MatchingXiao Yi Yu, Aiming Wang. 410-413 [doi]
- An Object-Based Web System for Building a Virtual CommunityS. R. Tsai, Y.-S. Huang, U. L. Dai, G. H. Huang, C. M. Lee, J.-Y. Fang, Y. T. Chen, J. N. Lee. 414-417 [doi]
- A Snapshot-Based Evaluation Method for Garbage CollectionChin-Yang Lin, Ting-Wei Hou, Fuh-Gwo Chen. 418-421 [doi]
- Enhancing UPnP Quality of Service by Intelligent Access PointChia-Feng Kang, Kai-Hua Kuo, Ya-Chun Li, Tin Yu Wu, Wei-Tsong Lee, Jim-Min Lin. 422-425 [doi]
- Color-Based Semantic Image Retrieval with Fuzzy-ARTChuan-Yu Chang, Hung-Jen Wang, Ru-Hao Jian. 426-429 [doi]
- An Image Structure Information Based Robust Hash for Tamper Detection and LocalizationZhaoqing Liu, Qiong Li, Hui Zhang, Xiyuan Peng. 430-433 [doi]
- Tamper Detection for Shifted Double JPEG CompressionXian-zhe Meng, Shao-zhang Niu, Jian-cheng Zou. 434-437 [doi]
- A Novel Robust Watermarking Method for Certificates Based on DFT and Hough TransformsJiancheng Zou, Xin Yang, Shaozhang Niu. 438-441 [doi]
- Spread Spectrum-Based Image Watermarking Resistant to Rotation and Scaling Using Radon TransformHuawei Tian, Yao Zhao, Rongrong Ni, Jeng-Shyang Pan. 442-445 [doi]
- A High Payload Histogram-Based Reversible Wartermarking Using Linear PredictionBo Ou, Yao Zhao, Rongrong Ni, Gang Cao. 446-449 [doi]
- An Error Driven 3D Face Modeling Scheme Based on Partial Differential EquationsChuanjun Wang, Zhenfeng Shi, Xiamu Niu. 450-453 [doi]
- Image Retrieval Based on RST Invariant Features Extracted from Scale Invariant KeypointsZhe-Ming Lu, Wei-min Zheng, Jing Wang. 454-457 [doi]
- ASM-SPV: A Model Checker for Security ProtocolsJianhua Peng, Feng Liu, Zhenju Zhao, Danqing Huang, Rui Xue. 458-461 [doi]
- Camera Model Identification for JPEG Images via Tensor AnalysisMing Liu, Nenghai Yu, Weihai Li. 462-465 [doi]
- Secure and Efficient Generalized Signcryption Scheme Based on a Short ECDSAChuanrong Zhang, Long Chi, Yuqing Zhang. 466-469 [doi]
- Regular Quasi-cyclic LDPC Codes with Girth 6 from Prime FieldsQingji Zheng, Xiangxue Li, Dong Zheng, Baoan Guo. 470-473 [doi]
- A Study of Mutual Authentication for P2P Trust ManagementChunling Wang, Jingyu Feng. 474-477 [doi]
- Enhanced Adaptive FEC Based Multiple Description Coding for Internet Video Streaming over Wireless NetworkLi Li 0015, Qi Han, Xiamu Niu. 478-481 [doi]
- A Novel and Secure Image Interpolation Methods for Image DisguiseShen Wang, Qiong Li, Bian Yang, Xiamu Niu. 482-485 [doi]
- Formal Verification of HMQV Using ASM-SPVDanqing Huang, Rui Xue, Feng Liu, Jianhua Peng, Zhenju Zhao, Dongyao Ji. 486-489 [doi]
- Certificates Distributed Storage Scheme in the Trust Management SystemYing Cai, Qinglong Wang. 490-493 [doi]
- Reduction of Interference for CDMA-Based Fingerprinting Scheme Based on Random PermutationMinoru Kuribayashi. 494-497 [doi]
- On Some Properties of a Digital Watermarking Based on Complete Complementary CodesTetsuya Kojima, Yoshiya Horii, Naoki Ohtani, Thierno Sene. 498-501 [doi]
- Detecting Revelation of Private Information on Online Social NetworksNatsuki Watanabe, Hiroshi Yoshiura. 502-505 [doi]
- Unified Metric for Measuring Anonymity and Privacy with Application to Online Social NetworkKomei Kamiyama, Tran Hong Ngoc, Isao Echizen, Hiroshi Yoshiura. 506-509 [doi]
- Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health RecordsJérémie Tharaud, Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller, Pascal Lafourcade. 510-513 [doi]
- Aerial Acoustic Modem with Decoding Capabilities Using a CELP-Based Speech EncoderAkira Nishimura. 514-517 [doi]
- Improvement of Packet Loss Concealment for MP3 Audio Based on Switching of Concealment Method and Estimation of MDCT SignsAkinori Ito, Kiyoshi Konno, Masashi Ito, Shozo Makino. 518-521 [doi]
- Audio Information Hiding Based on Spatial MaskingRyouichi Nishimura. 522-525 [doi]
- Design of IIR All-Pass Filter Based on Cochlear Delay to Reduce Embedding LimitationsMasashi Unoki, Toshizo Kosugi, Atsushi Haniu, Ryota Miyauchi. 526-529 [doi]
- An Audio Steganography by a Low-Bit Coding Method with Wave FilesMasahiro Wakiyama, Yasunobu Hidaka, Koichi Nozaki. 530-533 [doi]
- A Semi-lossless Steganography Technique for G.711 Telephony SpeechNaofumi Aoki. 534-537 [doi]
- A New Approach of Reversible Acoustic Steganography for Tampering DetectionXuping Huang, Isao Echizen, Akira Nishimura. 538-542 [doi]
- Vision-Based Hand Gesture Recognition Using Combinational FeaturesChenglong Yu, Xuan Wang, Hejiao Huang, Jianping Shen, Kun Wu. 543-546 [doi]
- Example-Based Facial Portraiture Style LearningZhongmei Zhou, Xuan Wang, Zili Zhang, Chenglong Yu. 547-550 [doi]
- Multi-class Relationship Extraction from Biomedical Literature Using Maximum EntropyLin Yao, Chengjie Sun, Xiaolong Wang, Xuan Wang. 551-554 [doi]
- Mirror-Like Gabor Features for Face Recognition under Varying Illumination ConditionsYingnan Zhao, Yan Ma, Zhong Jin. 555-558 [doi]
- An Image Level Set Method for DenoisingDazhi Zhang, Songsong Li, Boying Wu, Jiebao Sun. 559-562 [doi]
- A Perceptual Metric Based on Salient Information Entropy for 3D Mesh DistortionZhenfeng Shi, Qiong Li, Xiamu Niu. 563-566 [doi]
- Detecting Resized JPEG Images by Analyzing High Frequency Elements in DCT CoefficientsToshihiko Yamasaki, Tomoaki Matsunami, Kiyoharu Aizawa. 567-570 [doi]
- Kernel Canonical Correlation with Similarity Refinement for Automatic Image TaggingYanhui Xiao, Yao Zhao, Zhenfeng Zhu. 571-574 [doi]
- Multiple Description Wavelet Based Image Coding with ClassificationChunyu Lin, Yao Zhao. 575-578 [doi]
- Digital Image Forgery Detection by Local Statistical ModelsJiri Grim, Petr Somol, Pavel Pudil. 579-582 [doi]
- Novel (n, n) Secret Image Sharing Scheme Based on AdditionLin Dong, Min Ku. 583-586 [doi]
- Industrial Workflows Recognition by Computer Vision and AI TechnologiesEmmanuel Sardis, Theodora A. Varvarigou. 587-590 [doi]
- Robust Video Transmission Scheme Based on Network CodingSong Xiao, Ji Lu, Yangli Wang, Chengke Wu. 591-594 [doi]
- An Error Concealment Approach for Pixel Based Wyner-Ziv Video CodingYangli Wang, Chengke Wu, Song Xiao. 595-598 [doi]
- Optimized State-Distortion Extraction for Scalable Extension of H.264/AVCJi Lu, Song Xiao, Chengke Wu. 599-602 [doi]
- A Pixel-Level Rate Control Algorithm for the Optimal Prediction ResidualHongwei Li, Song Xiao, Chengke Wu, Yuli Feng. 603-606 [doi]
- Distributed Compressive Hyperspectral Image SensingHaiying Liu, Yunsong Li, Song Xiao, Chengke Wu. 607-610 [doi]
- A Digital Fingerprint Scheme Based on MPEG-2Yigang Zhou, Linghui Li, Jia Liu. 611-614 [doi]
- Content-Aware Video Seam Carving Based on Bag of Visual CubesDuan-Yu Chen, Yi-Shiou Luo. 615-618 [doi]
- Frequency-Tuned Nighttime Brake-Light DetectionDuan-Yu Chen, Yu-Hao Lin. 619-622 [doi]
- Multiple Object Motion Detection for Robust Image Stabilization Using Block-Based Hough TransformChi-Han Chuang, Yung-Chi Lo, Chin-Chun Chang, Shyi-Chyi Cheng. 623-626 [doi]
- Adaptive Ultrasound Image Matching for Automatic Liver Disease Diagnosis Using Generalized Hough TransformYu-Hsiang Wu, Yung-Chi Lo, Shyi-Chyi Cheng, Chih-Lang Lin. 627-630 [doi]
- Vision-Based Vehicle Surveillance and Parking Lot Management Using Multiple CamerasLi-Chih Chen, Jun-Wei Hsieh, Wei-Ru Lai, Chih-Xuan Wu, Sin-Yu Chen. 631-634 [doi]
- Human Activity Linkage Recording for Multiple Cameras with Disjoint ViewsI-Cheng Chang, Chieh-Yu Liu, Chung-Lin Huang. 635-638 [doi]
- Real-Time Video Enhancement for Moving-Object in the Dusk Environment Based on Pixel ClassificationChao-Ho Chen, Che-Ping Su, Tsong-Yi Chen, Da-Jinn Wang. 639-642 [doi]
- Real-Time Counting Method for a Crowd of Moving PeopleTsong-Yi Chen, Chao-Ho Chen, Da-Jinn Wang, Tsang-Jie Chen. 643-646 [doi]
- A Fast Inter-frame Prediction Algorithm for H.264/AVCPengyu Liu, Kebin Jia. 647-650 [doi]
- A Self-Adaptive and Fast Motion Estimation Search Method for H.264/AVCPengyu Liu, Kebin Jia. 651-654 [doi]
- Key-Frame Extraction Using Kernel-Based Locality Preserving LearningZhongbao Chen, Fuliang Bao, Zhigang Fang, Zhen Li. 655-658 [doi]
- Overlapping Interval Differences-Based Fast Intra Mode Decision for H.264/AVCYanqiang Lei, Yuan-Gen Wang, Liang Fan. 659-663 [doi]
- A Novel Intra-frame Prediction Algorithm Based on Macro-block's Histogram for H.264/AVCPengyu Liu, Kebin Jia. 664-667 [doi]
- A Saliency Map Model Based on the Principle of Maximum Information GainTakashi Toriu, Shigeyoshi Nakajima, Hiromitsu Hama. 668-671 [doi]
- Estimation of Human Movements from Body Acceleration Monitoring Using One Nearest Neighbor Method - Ubiquitous Health CareTakaaki Kozaki, Shigeyoshi Nakajima, Tetsuo Tsujioka, Shinsuke Hara, Tadayuki Inoue, Hajime Nakamura, Kazuhide Takeuchi. 672-675 [doi]
- A Stochastic Model for Popularity Measures in Web DynamicsHiromitsu Hama, Pyke Tin, Thi Thi Zin, Takashi Toriu. 676-679 [doi]
- A Markov Random Walk Model for Loitering People DetectionThi Thi Zin, Pyke Tin, Takashi Toriu, Hiromitsu Hama. 680-683 [doi]
- Real-Time Updatable Volumetric Display System Based on Inclined-Image ScanningDaisuke Miyazaki, Keisuke Ohno, Takaaki Mukai. 684-687 [doi]
- A Decision Support System in Geriatric CareNai-Wen Kuo. 688-691 [doi]
- Attack Analysis for Automatic Monitoring System Used in the Wireless NetworksChung-Hsin Liu, I. Shao. 692-695 [doi]
- The Study of Video Conference Transmission Security as an Example on PolycomChung-Hsin Liu, Wu-Fan Hsu. 696-699 [doi]
- Mobile Ad Hoc Network Applications in the LibraryKuo-Kai Hsu, Dwen-Ren Tsai. 700-703 [doi]
- Early Warning System for DDoS Attacking Based on Multilayer Deployment of Time Delay Neural NetworkChang-Lung Tsai, Allen Y. Chang, Ming-Szu Huang. 704-707 [doi]
- Factors Affecting Consumers' Motivation in Online Group BuyersWuu-Yee Chen, Pin-Hsiu Wu. 708-711 [doi]
- Visual Development Platform for White-Box Algorithmic TradingChia-Han Chou, Allen Y. Chang. 712-715 [doi]
- Building Enterprise Data Centers Using Virtual and CloudDwen-Ren Tsai, Sheng-Wei Lin. 716-718 [doi]
- A Survey of Congestion Control Mechanisms in Wireless Sensor NetworksJing Zhao, Lei Wang 0005, Suran Li, Xiaokang Liu, Zhuxiu Yuan, Zhengjiu Gao. 719-722 [doi]
- 2.5D SIFT Descriptor for Facial Feature ExtractionHe Guo, Kai Zhang, Qi Jia. 723-726 [doi]
- A Low-Level Security Solving Method in GridWeifeng Sun, Boxiang Dong, Zhenquan Qin, Juanyun Wang, MingChu Li. 727-730 [doi]
- An Efficient Trust Mechanism in P2P NetworkZhenquan Qin, Lei Wang 0005, MingChu Li, Weifeng Sun. 731-734 [doi]
- Based on Private Matching and Min-attribute Generalization for Privacy Preserving in Cloud ComputingJian Wang, Jiajin Le. 735-738 [doi]