1999 Subject Index
  1. Algorithms
  2. Artificial Intelligence
  3. Compiler
  4. Computer Communications
  5. Computer Communications Networks
  6. Databases
  7. File Processing
  8. Hardware Design and Testing
  9. Image Processing and Computer Vision
  1. Information Systems and Applications
  2. Numerical Analysis
  3. Operating System
  4. Pattern Recognition
  5. Programming Language
  6. Real-Time and Media Systems
  7. Robotics
  8. Signal and Speech Processing
  9. Simulation and Modeling


  1. A New Graph Invariant for Graph Isomorphism: Probability Propagation Matrix
    Gow-Hsing King and Wen-Guey Tzeng......Vol.15, No.3, pp.337-352

  2. A Training Approach for Efficient VQ Codeword Search
    J. S. Pan......Vol.15, No.3, pp.375-382

  3. Computational Geometry on the Broadcast Communication Model
    Chang-Biau Yang.......Vol.15, No.3, pp.383-395

  4. Computing the Minimum Directed Distances Between Convex Polyhedra
    Ching-long Shih and Jane-Yu Liu......Vol.15, No.3, pp.353-373

  5. Fuzzy palmer Scheduling for Flow Shops with More than Two Machines
    Tzung-Pei Hong and Tzung-Nan Chuang......Vol.15, No.3, pp.397-406

  6. Parallel Decomposition of Generalized Series-Parallel Graphs
    Chin-Wen Ho, Sun-Yuan Hsieh and Gen-Huey Chen......Vol.15, No.3, pp.407-417

  7. Uni-directional Alternating Group Graphs
    Jung-Sing Jwo and Tai-Ching Tuan......Vol.15, No.3, pp.419-427

    Artificial Intelligence

  8. A New Environment for Developing Fuzzy Expert Systems
    Gwo-Jen Hwang......Vol.15, No.1, pp.53-69

  9. Completeness of the LELS Inference Rule in Automated Theorem Proving
    Chung-Hsuen Jeff Ho......Vol.15, No.1, pp.153-164


  10. A Lattice Framework for Analyzing Context-Free Languages with Applications in Parser Simplification and Data-Flow Analysis
    Wuu Yang......Vol.15, No.2, pp.287-306

    Computer Communications

  11. VP Layout Planning in Survivable ATM Networks
    Cheng-Shong Wu and Shi-Wei Lee......Vol.15, No.1, pp.71-89

    Computer Communications Networks

  12. A Novel Application of the Phone Card and Its Authentication in Mobile Communications
    C. H. Lee, M. S. Hwang and W. P. Yang......Vol.15, No.4, pp.471-484

  13. An Efficient Probabilistic Dynamic Multicast Routing in ATM Networks
    Kuochen Wang and Jun-Hung Chen......Vol.15, No.4, pp.485-504

  14. An Efficient Authentication Protocol for Mobile Networks
    Shiuh-Pyng Shieh, Fu-Shen Ho and Yu-Lun Huang......Vol.15, No.4, pp.505-520

  15. Design and Implementation of a Fault Tolerant ATM Switch
    Kuochen Wang and Feng-Ming Lin.......Vol.15, No.4, pp.521-541

  16. Petri Net Synthesis and Synchronization Using Knitting Technique
    Daniel Y. Chao......Vol.15, No.4, pp.3543-568


  17. A Design and Implementation of Museum Multimedia Information System
    Yin-Fu Huang and Tien-Yu Hsu......Vol.15, No.2, pp.273-286

  18. Acquisition of Entity Relationship Models for Maintenance-Dealing with Data Intensive Programs in a Transformation System
    Hongji Yang and William C. Chu......Vol.15, No.2, pp.173-198

  19. Allocation of Signature File on Parallel Device for WWW Index Servers
    Man-Kwan Shan and Suh-Yin Lee......Vol.15, No.2, pp.199-215

  20. Design of a New Indexing Organization for a Class-Aggregation Hierarchy in Object-Oriented Databases
    Chien-I Lee, Ye-In Chang and Wei-Pang Yang......Vol.15, No.2, pp.217-241

  21. Extended Spiral Hashing for Expansible Files
    Ye-In Chang, Chien-I Lee and Wann-Bay Chang Liaw.......Vol.15, No.2, pp.243-271

    File Processing

  22. Reducing File-related Network Traffic in TreadMarks via Parallel File Input/Output
    Ce-Kuen Shieh, Su-Cheong Mac and Bor-Jyh Shieh......Vol.15, No.4, pp.569-583

    Hardware design and Testing

  23. TSC Berger-Code Checker Design for 2r-1-Bit Information
    Wen-Feng Chang and Cheng-Wen Wu......Vol.15, No.3, pp.429-441

    Image Processing and Computer Vision

  24. A Compression Algorithm Based on the Classified Interpolative Block Truncation Coding and Vector Quantization
    Chun-Hung Kuo, Chang-Fuu Chen and Wen-Nan Hsia......Vol.15, No.1, pp.1-9

  25. Adaptive Schemes for Improving Fractal Block Coding of Images
    Hsuan T. Chang and Chung J. Kuo......Vol.15, No.1, pp.11-25

  26. Computing 3-D Location and Shape Parameters of Cones Using Structured Lights
    Tsorng-Lin Chia......Vol.15, No.1, pp.27-40

  27. Images Coding Using Two-Pass Side-Match Finite-State Vector Quantization
    Ruey-Feng Chang and Wen-Jia Kuo.......Vol.15, No.1, pp.41-51

    Information Systems and Applications

  28. Load Balancing for the Parallel Map Overlay-Operation in the Geographic Information System
    Yu-Tai Ching......Vol.15, No.3, pp.441-449

    Numerical Analysis

  29. A Numerical Method for Solving Time-Invariant System by Generalized Inverse Vandermonde Matrix
    Kao-Shing Hwang and Feng-Cheng Chang......Vol.15, No.2, pp.321-327

    Operating System

  30. Estimating and Measuring Covert Channel Bandwidth in Multilevel Secure Operating Systems
    Shiuh-Pyng Shieh......Vol.15, No.1, pp.91-106

    Pattern Recognition

  31. Candidate Selection in On-Line Chinese Character Recognition System Using Voting Scheme
    Chien-Cheng Tseng, Bor-Shenn Jeng and Kuo-Sen Chou......Vol.15, No.3, pp.451-462

    Programming Language

  32. Towards a Practical Visual Object-Oriented Programming Environment: Desirable Functionalities and their Implementation
    Chung-Hua Hu and Feng-Jian Wang......Vol.15, No.4, pp.585-614

    Real-Time and Media Systems

  33. Temporal Properties Underlying Multimedia Presentations with Z Notations
    Timothy K. Shih, Hung-Chao Keh, Ying-Hong Wang and Ying-Feng Kuo......Vol.15, No.1, pp.107-129


  34. On-Line Collision-Avoidance Trajectory Planning of Two Planar Robots Based on Geometric Modeling
    Kao-Shing Hwang and Ming-Der Tsai......Vol.15, No.1, pp.131-152

    Signal and Speech Processing

  35. A Segmentation Method for Continuous Speech Utilizing Hybrid Neuro-Fuzzy Network
    Ching-Tang Hsieh, Mu-Chun Su, Eugene Lai and Chih-Hsu Hsu......Vol.15, No.4, pp.615-628

    Simulation and Modeling

  36. Automatic Simulation and Verification of Pipelined Microcontrollers
    Ing-Jer Huang and Li-Rong Wang......Vol.15, No.2, pp.307-320