2003 Subject Index
文字方塊: 2003 Subject Index
JISEJISEJISE

  

 

 

 

 


ALGORITHMS

Q(N5/6) Time Complexity of Fault Diagnosis Algorithms in N´N Dilated Blocking Photonic Switching Networks

I-Shyan Hwang, Hung-Chang Lin and San-Nan Lee…....…….…Vol. 19, No. 4, pp. 653-665

An Efficient Algorithm for the Reliability of Consecutive-k-n Networks

Jen-Chun Chang, Rong-Jaye Chen and Frank K. Hwang....……Vol. 19, No. 1, pp. 159-166

Asymmetric High-Radix Signed-Digit Number Systems for Carry-Free Addition

Shao-Hui Shieh and Cheng-Wen Wu……..……….…....………Vol. 19, No. 6, pp. 1015-1039

Hamiltonian Cycle Problem on Distance-Hereditary Graphs

Ruo-Wei Hung, Shaur-Ching Wu and Maw-Shang Chang….…Vol. 19, No. 5, pp. 827-838

Optimal Algorithm for Matrix Transpose on Wormhole-Switched Meshes

Jyh-Jong Tsay, Kuo-Shun Ding and Wen-Tsong Wang..………..…Vol. 19, No. 1, pp. 167-177

 

ARTIFICIAL INTELLIGENCE

Adapting Crossover and Mutation Rates in Genetic Algorithms

Wen-Yang Lin, Wen-Yuan Lee and Tzung-Pei Hong.……..………Vol. 19, No. 5, pp. 889-903

Finding Regularity in Various Types of Secondary Protein Structures

Yen-Wei Chu and Jinn-Moon Yang……………………………………Vol. 19, No. 6, pp. 943-952

Network Tournament Pedagogical Approach Involving Game Playing in Artificial Intelligence

Ming-Da Wu, Ying-Hong Liao and Chuen-Tsai Sun……....…….…Vol. 19, No. 4, pp. 589-603

Ranking Genes for Discriminability on Microarray Data

Han-Yu Chuang, Huai-Kuang Tsai, Yuan-Fan Tsai and

Cheng-Yan Kao…………………………………………………………….Vol. 19, No. 6, pp. 953-966

 

BIOINFORMATICS

A Data Mining Method to Predict Transcriptional Regulatory Sites Based on Differentially Expressed Genes in Human Genome

Hsien-Da Huang, Huei-Lin Chang, Tsung-Shan Tsou, Baw-Jhiune Liu

and Jorng-Tzong Horng………………….……...……………………….Vol. 19, No. 6, pp. 923-942

Mining Correlations of Human Gene Expression from Digital Gene Expression Profiles

Jorng-Tzong Horng, Hsien-Da Huang, Kuo-Yen Tseng, Tsung-Shan Tsou,

Baw-Jhiune Liu and Cheng-Yan Kao…………………………………Vol. 19, No. 6, pp. 909-921

 

CODING AND INFORMATION THEORY

A Modified Approach to Determine the Most Appropriate Spreading Codes for a DS/CDMA System with Exponentially Weighted Despreading Sequences

Cebrail Ciftlikli and Ibrahim Develi……….…..……..…………Vol. 19, No. 6, pp. 1041-1057

 

COMPILERS

Automatic Assembly Program Retargeting for Microcontrollers

Ing-Jer Huang and Dao-Zhen Chen………………….....…………Vol. 19, No. 5, pp. 717-743

COMPUTER ARCHITECTURES

Energy Efficient Caching-on-Cache Architectures for Embedded Systems

Hung-Cheng Wu, Tien-Fu Chen, Hung-Yu Li and

Jinn-Shyan Wang……………………………………………………………..Vol. 19, No. 5, pp. 809-825

 

COMPUTER AND EDUCATION

A Computer-Assisted Approach to Diagnosing Student Learning Problems in Science Courses

Gwo-Jen Hwang, Chia-Lin Hsiao and Judy C. R. Tseng….……Vol. 19, No. 2, pp. 229-248

A New Courseware Diagram for Quantitative Measurement of Distance Learning Courses

Flora Chia-I Chang, Lun-Ping Hung and Timothy K. Shih……..…Vol. 19, No. 6, pp. 989-1014

The Design of a Synchronoous Virtual Writing Clinic

Chin-Hwa Kuo, David Wible, Meng-Chang Chen, Li-Chun Sung

and Chia-Lin Chio …………………………………….….......………Vol. 19, No. 2, pp. 249-265

 

COMPUTER APPLICATIONS

The Design and Implementation of Realistic Fish Animation Play System Using Video Sequence

Tong-Yee Lee and Hung-Yi Chen……..…………………...……Vol. 19, No. 6, pp. 1071-1085

 

COMPUTER GRAPHICS AND VIRTUAL REALITY

N-Sided Hole Filling and Vertex Blending Using Subdivision Surfaces

Wei-Chung Hwang and Jung-Hong Chuang….…...……….…Vol. 19, No. 5, pp. 857-879

Boundary Control of Subdivision Using Open Uniform Quadratic Subdivision Scheme

Wei-Chung Hwang and Jung-Hong Chuang……...…..………Vol. 19, No. 5, pp. 745-763

On the Clustering of Head-Related Transfer Functions Used for 3-D Sound Localization

Chin-Shyurng Fahn and Yueh-Chuan Lo……….………..………Vol. 19, No. 1, pp. 141-157

 

COMPUTER-COMMUNICATION NETWORKS

Charging the Internet Without Bandwidth Reservation: An Overview and Bibliography of Mathematical Approach

Bruno Tuffin………………………………………………...………Vol. 19, No. 5, pp. 765-786

Provide Multicast Service in a Combined IntServ and DiffServ Environment

Heng-Chi Su and Ren-Hung Hwang…………..……...…………Vol. 19, No. 4, pp. 615-636

 

DATA ENCRYPTION AND CRYPTOGRAPHY

A New Digital Multisignature Scheme With Distinguished Signing Authorities

Shin-Jia Hwang, Min-Shiang Hwang and Shiang-Feng TzengVol. 19, No. 5, pp. 881-887

An Embedding Algorithm for Multiple Watermarks

Chin-Shiuh Shieh, Hsiang-Cheh Huang, Feng-Hsing Wang and

Jeng-Shyang Pan ………………...…….….……………………….…Vol. 19, No. 2, pp. 381-395

Efficient Three-Party Authentication and Key Agreement Protocols Resistant to Password Guessing Attacks

Her-Tyan Yeh, Hung-Min Sun and Tzonelih Hwang……......……Vol. 19, No. 6, pp. 1059-1070

 

 

DATABASE MANAGEMENT

A Concurrency Control Algorithm for an Open and Safe Nested Transaction Model: Formalization and Correctness

Sanjay Kumar Madria, S. N. Maheshwari and B. Chandra..……Vol. 19, No. 2, pp. 283-328

 

HARDWARE DESIGN AND TESTING

Efficient Double Fault Diagnosis for CMOS Logic Circuits With a Specific Application to Generic Bridging Faults

Hong-Chou Kao, Ming-Fu Tsai, Shi-Yu Huang, Cheng-Wen Wu,

Wen-Feng Chang and Shyue-Kung Lu.………………….…………Vol. 19, No. 4, pp. 571-587

Structure-Based Specification-Constrained Test Frequency Generation for Linear Analog Circuits

Soon-Jyh Chang, Chung-Len Lee, and Jwu E Chen ………...…. Vol. 19, No. 4, pp. 637-651

 

IMAGE PROCESSING AND COMPUTER VISION

Morphological De-ringing Filter Design for JPEG-2000

Shen-Chuan Tai, Chuen-Ching Wang, Ling-Shiou Huang

and Ying-Ru Chen………………………………………………………....Vol. 19, No. 4, pp. 667-680

Parallel Execution of a Connected Component Labeling Operation on a Linear Array Architecture

Kuang-Bor Wang, Tsorng-Lin Chia, Zen Chen and

Der-Chyuan Lou………………………………………………….....Vol. 19, No. 2, pp. 353-370

Texture Synthesis: A Review and Experiments

Chaur-Chin Chen and Chien-Chang Chen……………....………Vol. 19, No. 2, pp. 371-380

 

INFORMATION STORAGE AND RETRIEVAL

An Inverted File Cache for Fast Information Retrieval

Wann Yun Shieh, Jean Jyh-Jiun Shann and Chung Ping Chung..Vol. 19, No. 4, pp. 681-695

Dimensionality Reduction for Indexing Time Series Based on the Minimum Distance

Sangjun Lee, Dongseop Kwon and Sukho Lee………...………Vol. 19, No. 4, pp. 697-711

NA-Trees: A Dynamic Index for Spatial Data

Ye-In Chang, Cheng-Huang Liao and Hue-Ling Chen……..……Vol. 19, No. 1, pp. 103-139

Querying Image Database by Video Content

C. H. Wang, H. C. Lin, C. C. Shih, H. R. Tyan, C. F. Lin and

H. Y. Mark Liao……………………………………………………....………Vol. 19, No. 6, pp. 967-987

 

NEURAL NETWORKS AND FUZZY SETS

Fuzzy Shortest-Path Network Problems With Uncertain Edge Weights

Jing-Shing Yao and Feng-Tse Lin………...……….………....………Vol. 19, No. 2, pp. 329-351

 

PARALLEL AND DISTRIBUTED SYSTEMS

A Scalable Core Migration Protocol for Dynamic Multicast Tree

Ting-Yuan Wang, Lih-Chyau Wuu and Shing-Tsaan Huang..….…Vol. 19, No. 3, pp. 479-501

Adaptive Live Broadcasting for Highly-Demand Videos

Hung-Chang Yang, Hsiang-Fu Yu and Li-Ming Tseng....….……Vol. 19, No. 3, pp. 531-549

Broadcasting on Uni-directional Hypercubes and Its Applications

Huang-Ming Huang, Chang-Biau Yang and Kuo-Tsung Tseng…..Vol. 19, No. 2, pp. 183-203

 

Distributed Workflows: A Framework for Electronic Commerce

Vlad Ingar Wietrzyk and Makoto Takizawa….…..………....……..Vol. 19, No. 1, pp. 15-38

Efficient Location Traffic Management With Multiple Virtual Layers

Daewoo Chung, Hyngseung Choo, Hee Yong Youn and

Seong-Moo Yoo ……………………………………….…………………..Vol. 19, No. 5, pp. 787-808

Enhancing Availability of Cooperative Applications Through Interoperable Middleware

Carlo Marchetti, Antonino Virgillito and Roberto Baldoni.….……Vol. 19, No. 1, pp. 39-58

Fractal Image Process Based Image Comparison Search Engine

Kwang-Fu Li, Tung-Shou Chen and Kuei-Hao Chen…..……..……Vol. 19, No. 1, pp. 1-14

Group Mutual Exclusion in Tree Networks

Joffroy Beququier, Sébastien Cantarelell, Akoy K. Datta and

Franck Petit…......……………………………………………….……Vol. 19, No. 3, pp. 415-432

Local-Safety-Information-Based Fault-Tolerant Broadcasting in Hypercubes

Dong Xiang, Ai Chen and Jie Wu….….…………….………………Vol. 19, No. 3, pp. 467-478

Optimal Parallel Prefix on the Postal Model

Yen-Chun Lin and Ching-Sung Yeh………………….….......………Vol. 19, No. 1, pp. 75-83

Resource Allocation for Independent Real-Time Tasks in Heterogeneous Systems for Energy Minimization

Yang Yu and Viktor K. Prasanna….…………….……....………...…Vol. 19, No. 3, pp. 433-449

Parallel Architectures and Adaptation Algorithms for Programmable FIR Digital Filters With Fully Pipelined Data and Control Flows

Behrooz Parhami and Ding-Ming Kwai……………...…....……...…Vol. 19, No. 1, pp. 59-74

Quick Buddy-Subcube Compaction in Hypercubes

Hsing-Lung Chen and Shu-Hua Hu….…………...……....……….…Vol. 19, No. 2, pp. 205-227

Robust TCP Connections for Fault Tolerant Computing

Richard Ekwall, Péter Urbán and André Schiper…….....…………Vol. 19, No. 3, pp. 503-516

Self-Stabilizing Wormhole Routing on Ring Networks

Ajoy K. Datta, Maria Gradinariu, Anthony B. Kenitzki and

Sébastien Tixeuil….……………………………….....…….…..…Vol. 19, No. 3, pp. 401-414

Slice- and-Patch-An Algorithm to Support VBR Video Streaming in a Multicast-based Video-on-Demand System

C. W. Kong and Jack Y. B. Lee……….…………….……....……….Vol. 19, No. 3, pp. 517-530

Two-Layered Protocol for a Large-Scale Group of Processes

Kojiro Taguchi and Makoto Takizawa………….……....……….…Vol. 19, No. 3, pp. 451-465

 

PATTERN RECOGNITION

A Coarse Classification Scheme on Printed Chinese Characters by Encoding the Feature Points

Ming-Gang Wen, Chin-Chuan Han, Kuo-Chin Fan and

Da-Way Tang………………………………………………………………..Vol. 19, No. 4, pp. 555-570

 

PERSONAL COMPUTING

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network

Guan-Chi Chen and Suh-Yin Lee………………….…….…...……..Vol. 19, No. 1, pp. 85-101

 

PROGRAMMING LANGUAGES

Iterators: Taxonomy, Strength, Weakness, and Efficiency

Pei-Chi Wu and Feng-Jian Wang………………….…….…….…….Vol. 19, No. 5, pp. 839-856

 

SECURITY AND PROTECTION

New Audio Secret Sharing Schemes With Time Division Technique

Chen-Chi Lin, Chi-Sung Laih and Ching-Nung Yang……………..Vol. 19, No. 4, pp. 605-614

 

SIGNAL AND SPEECH PROCESSING

Robust Speaker Identification System Based on Wavelet Transform and Gaussian Mixture Model

Ching-Tang Hsieh, Eugene Lai and You-Chuang Wang….......…Vol. 19, No. 2, pp. 267-282