2001 Subject Index

Database Management

Distributed and Parallel Computing

Hardware Design and Testing

Image Processing and Computer Vision

Information Systems and Applications

Neural Networks and Fuzzy Sets

Pattern Recognition

Software Engineering

Theory of Computation

 
 


Algorithms

Artificial Intelligence

Chinese Information Processing

Coding and Information Theory

Compilers

Computer Architectures

Computer Graphics and Virtual Reality

Computer-Communication Networks

Cryptology and Information Security

 

 

Algorithms

A Self-Organizing Genetic Algorithm With a Eugenic Strategy

Optimization

Jorng-Tzong Horng, Ying-Ping Chen and Cheng-Yan Kao………………Vol. 17, No. 1, pp. 35-45

A Theoretical Aspect of a Stochastic Sketching Method for

Global Optimization

Jorng-Tzong Horng, Ying-Ping Chen and Cheng-Yan Kao………………Vol. 17, No. 1, pp. 47-71

Algorithms for Imprecise Tasks With 0/1-Constaints                           

Kun-Ming Yu………………………...………………………...….………Vol. 17, No. 1, pp. 73-83

Efficient Prefix Computation on Faulty Hypercubes

Yu-Wei Chen and Kuo-Liang Chung ……………………………………....Vol. 17, No. 1, pp. 1-21

Graph Embedding Aspect of IEH Graphs

Hung-Yi Chang and Rong-Jaye Chen……………….………………….…Vol. 17, No. 1, pp. 23-33

Heuristic Algorithm for Optimal Design of the Two-Level Wireless

ATM Network

Der-Rong Din and S. S. Tseng…..……………….………………….….Vol. 17, No. 4, pp. 647-665

 

 

Artificial Intelligence

A Genetics-Based Approach to Knowledge Integration and Refinement

Ching-Hung Wang, Tzung-Pei Hong and Shian-Shyong Tseng…………Vol. 17, No. 1, pp. 85-94

Rules Generation From the Decision Tree

Ding-An Chiang, Wei Chen, Yi-Fan Wang and Lain-Jinn Hwang……..Vol. 17, No. 2, pp. 325-339

 

 

Chinese Information Processing

A Linguistic Approach to a Chinese Query Sections

Tyne Liang and Tzyy-Chyang Wu………..……………….………..… Vol. 17, No. 1, pp. 113-132

Extracting Chinese Frequent Strings Without Dictionary From

a Chinese Corpus and its Applications

Yih-Jeng Lin and Ming-Shing Yu……………………..……….……...Vol. 17, No. 5, pp. 805-824

 

 

Coding and Information Theory

Faster Implementation of Canonical Minimum Redundancy

Prefix Codes

Kuo-Liang chung and Jung-Gen Wu……..……………….………..…..Vol. 17, No. 2, pp. 341-345

 

 

Compilers

An Optimized Three Region Partitioning Technique to Maximize

Parallelism of Nested Loops With Non-uniform Dependences

Der-Lin Pean and Cheng Chen…………………………………...……..Vol. 17, No. 3, pp. 463-489

Design and Implementation of a Communication-Efficient Data-

Parallel Program Compiling System

Kuei-Ping Shih, Ching-Ying Lai, Jang-Ping Sheu and Yu-Chee Tseng…..Vol. 17, No. 5, pp. 825-839

 

 

Computer Architectures

Aggressive Scheduling for Memory Accesses of CISC

Superscalar Microprocessors

R-Ming Shiu, Hiu-Yue Hwang and Jean Jhy-Jiun Shann……….……...Vol. 17, No. 5, pp. 783-803

A New Class of Cache Memory Controllers

Adnan Shaout and Larry Colagiovanni………………………….……...Vol. 17, No. 5, pp. 841-855

 

 

Computer-Communication Networks

A Fast Optimal Non-Continuous Slot Reuse Scheme for

CRMA High-Speed Networks

Pi-Rong Sheu and Charng-Maw Lin …………………………………..Vol. 17, No. 2, pp. 217-228

An Efficient Scheme of General Weighted Fair allocation for

Enhanced Best-Effort Service in High Speed Networks

Yen-Jen Chen and Suh-Yin Lee…………..……………….………..….Vol. 17, No. 2, pp. 163-190

Constructing Delay-Bounded Multicast Trees in

Computer Networks

Lih-Chyau Wuu, Long Song Lin and Shing-Chyi Shiao………...……..Vol. 17, No. 3, pp. 507-524

Design and Analysis of an ATM Switch With Priority

Discarding Scheme

Kuochen Wang and Hsin-Jung Wang ………………………………….Vol. 17, No. 2, pp. 229-243

Resilience on Pre-assigned ATM Multicast Tree

Jen-Fa Huang and Yih-Fuh Wang …………………………………..….Vol. 17, No. 2, pp. 245-259

Survivability Performance Analysis of Rerouting Schemes

in an ATM/VP Mesh Transport Networks

Kyamakya Kyandoghere……………………………………….……….Vol. 17, No. 2. pp. 191-216

 

 

Computer Graphics and Virtual Reality

Practice and Experience: Interactive Rendering of the Colonic

Environment on PC-platforms

Tong-Yee Lee, Ping-Hsien Lin and Chao-Hung Lin…...….………..….Vol. 17, No. 2, pp. 297-312

Surface Rendering for Multi-axial Cross Sections

Ming-Dar Tsai and Ming-Shium Hsieh…..……………..….………..….Vol. 17, No. 1, pp. 113-132

 

 

Cryptology and Information Security

A New Design of the Hash Functions With All-or-Nothing Property

Sang Uk Shin and Kyung Hyune Rhee…………………………………Vol. 17, No. 6, pp. 945-957

A New Method for Construction Multiple Assignment Schemes

for Generalized Secret Sharing

Gwoboa Horng……………………………………...…………………Vol. 17, No. 6, pp. 959-965

An Efficient Construction for Fail-Stop Signature for

Long Messages

Rei Safavi-Naini, Willy Susilo and Huaxiong Wang...…………………Vol. 17, No. 6, pp. 879-898

An Intrusion Detection Model Based Upon Intrusion Detection

Markup Language

Yao-Tsung Lin, Shian-Shyong Tseng and Shun-Chieh Lin….…………Vol. 17, No. 6, pp. 899-919

An Improved Administration Method on Role-Based Access

Control in the Enterprise Environment

Sejong Oh and Seog Park…………………………….…………………Vol. 17, No. 6, pp. 921-944

Practical and Efficient Electronic Voting Schemes

Zhi-Jia Tzeng and Wen-Guey Tzeng……………………………………Vol. 17, No. 5, pp. 865-877

VLSI Design of RSA Cryptosystem Based on the Chinese

Remainder Theorem

Chung-Hsien Wu, Jin-Hua Hong and Cheng-Wen Wu…………………Vol. 17, No. 6, pp. 967-980

 

 

Database Management

Fragment Allocation in Distributed Database Design

Yi-Fu Huang and Jyh-Her Chen………...……………………………....Vol. 17, No. 3, pp. 525-529

Mining Quantitative Association Rules in a Large Database

of Sales Transactions

Pauray S. M. Tsai and Chien-Ming Chen……….………………….…..Vol. 17, No. 4, pp. 667-681

 

 

Data Encryption and Cryptography

New Multistage Secret Sharing Scheme Based on

the Factorization Problem

Narn-Yih Lee and Tzonelih Hwang……………………………...……..Vol. 17, No. 3, pp. 525-529

 

 

Distributed and Parallel Computing

A Family of Trivalent 1-Hamiltonian Graphs With Diameter O(log n)

Jeng-Jung Wang, Ting-Yi Sung and Lih-Hsing Hsu…………...……….Vol. 17, No. 4, pp. 535-548

Designing Deadlock-Free Turn-Restricted Routing Algorithms

for Irregular Womhole-Routed Networks

Jenq-Shyan Yang and Chung-Ta King.………………………...……….Vol. 17, No. 4, pp. 575-594

Efficient Checkpoint-based Failure Recovery Techniques

in Mobile Computing Systems

Cheng-Min Lin and Chyi-Ren Dow….………………………...……….Vol. 17, No. 4, pp. 549-573

File Allocation Algorithms to Minimize Data Transmission Time

in Distributed Computing Systems

Pao-Yuan Chang, Deng-Jyi Chen and Krishna M. Kavi………....……..Vol. 17, No. 4, pp. 633-646

k-Arbiter Join Operation

Yu-Chen Kuo……………………...……………………………...……..Vol. 17, No. 4, pp. 615-631

UMPAL: An Unstructured Mesh Partitioner and Load Balancer

on World Wide Web

William C. Chu, Don-Lin Yang, Jen-Chih Yu and Yeh-Ching Chung……Vol. 17, No. 4, pp. 595-614

 

 

Hardware Design and Testing

A Systematic Approach for Parallel CRC Computations

Ming-Der Shieh, Ming-Hwa Sheu, Chung-Ho Chen and Hsin-Fu Lo.....Vol. 17, No. 3, pp. 445-461

 

 

Information Systems and Applications

A Syntax-based Gateway Between SQL3 and ODMG Languages

Jia-Lang Seng and Kai-Chung Wei.……………………………...……..Vol. 17, No. 2, pp. 261-295

 

 

Image Processing and Computer Vision

A Fast Algorithm for Multilevel Thresholding

Ping-Sung Liao, Tse-Sheng Chen and Pau-Choo Chung……………….Vol. 17, No. 5, pp. 713-727

A Nearly Optimum Generalized Multilevel Block Truncation

Coding Algorithms With a Fast Nonexhaustive Search Based

on a Mean Square Error Criterion

Chung-Hung Kuo and Chang-Fuu Chen………….………………….…Vol. 17, No. 4, pp. 697-708

A New Approach to Video Format Conversion Using Bidirectional

Motion Estimation and Hybrid Error Concealment

Dang-Jiang Wang and Jin-Jang Leou……..……….…...…………….…Vol. 17, No. 5, pp. 763-777

A New Two-Path Search Algorithm for Block Motion Estimation

of Video Data

Chin-Chen Chang, Lin-Li Chen and Tung-Shou Chen…………..……..Vol. 17, No. 3, pp. 405-415

A Novel Non-Iterative Scheme for Fractal Image Coding

Hsuan T. Chang and Chung J. Kuo……………………………...……...Vol. 17, No. 3, pp. 429-443

A Tabu Search Based Maximum Descent Algorithm for

VQ Codebook Design

Hsiang-Cheh Huang, Shu-Chuan Chu, Jeng-Shyang Pan and Zhe-Ming Lu

………………………………………………………………………..…Vol. 17, No. 5, pp. 753-762

Accelerating Fractal Compression With a Real-Time Decoder

Hsueh-Ting Chu and Chaur-Chin Chen………………………...……....Vol. 17, No. 3, pp. 417-427

Color Image Retrieval Using Geometric Properties

Ing-Sheen Hsieh and Kuo-Chin Fan…………….………….……….….Vol. 17, No. 5, pp. 729-751

Combining Morphological Feature Extraction and Geometric Hashing

for Three-Dimensional Object Recognition Using Range Images

Chu-Song Chen, Yi-Ping Hung and Ja-Ling Wu.……………...…….....Vol. 17, No. 3, pp. 347-369

Inter-Subband Correlation for Predictive Pyramid Coding

Chung J. Kuo and Chia L. Lee…..………….………………….……….Vol. 17, No. 5, pp. 779-786

Modified Hough Transforms for Object Feature Extraction

Jar-Ferr Yang and Shu-Sheng Hao……………………………...………Vol. 17, No. 1, pp. 133-145

Skeleton-based Walking Motion Analysis Using Hidden Markov

Model and Active Shape Models

I-Cheng Chang and Chung-Lin Huang…………………………...……..Vol. 17, No. 3, pp. 371-403

 

 

Neural Networks and Fuzzy Sets

Fuzzy ARTRON: A General-purpose Classifier Empowered by

Fuzzy ART and Error Back-propagation Learning

Cheng-Seen Ho and Jia-Shian Chou…………….………………….…..Vol. 17, No. 4, pp. 683-695

 

 

Pattern Recognition

Pattern Recognition by High-Capcity Polynomial Bidirectional

Hetero-Associative Network

Chua-Chin Wang, Cheng-Fa Tsai and Yu-Tsun Chien…………………Vol. 17, No. 2, pp. 313-324

 

 

Software Engineering

A Fully Distributed Approach to Repositories of Reusable Software Components

Yuen-Chang Sun, Ming-Lin Kao and Chin-Laung Lei…………………Vol. 17, No. 1, pp. 147-158

 

 

Theory of Computation

A Depth 3 Circuit Lower Bound for the Parity Function

Shi-Chun Tsai………………………………………...…………………Vol. 17, No. 5, pp. 857-860