img 

 

 

 

 

 


ALGORITHMS

A Near-Quadratic Algorithm for the Alpha-Connected Two-Center Problem

Po-Hsueh Huang, Yin-Te Tsai and Chuan-Yi Tang................................ Vol. 22, No. 6, pp. 1317-1324

Efficient and Complete Coverage of 2D Environments by Connectivity Graphs for Motion Planning Algorithms

Leena Lulu and Ashraf Elnagar............................................................. Vol. 22, No. 6, pp. 1355-1366

FasterDSP: A Faster Approximation Algorithm for Directed Steiner Tree Problem

Ming-I Hsieh, Eric Hsiao-Kuang Wu and Meng-Feng Tsai...................... Vol. 22, No. 6, pp. 1409-1425

Knitting Technique with TP-PT Generations for Petri Net Synthesis

Daniel Yuh Chao.................................................................................... Vol. 22, No. 4, pp. 909-923

Performance Assessment of Fuzzy Logic Control Routing Algorithm with Different Wavelength Assignments in DWDM Networks

I-Shyan Hwang, San-Nan Lee and I-Cheng Chang............................... Vol. 22, No. 2, pp. 461-473

 

ARTIFICIAL INTELLIGENCE

Generating Weighted Fuzzy Rules from Training Instances using Genetic Algorithms to Handle the Iris Data Classification Problem

Shyi-Ming Chen and Hao-Lin Lin............................................................ Vol. 22, No. 1, pp. 175-188

A Classification Tree Based on Discriminant Functions

Been-Chian Chien, Jung-Yi Lin and Wei-Pang Yang............................. Vol. 22, No. 3, pp. 573-594

 

COMPUTER AND EDUCATION

Effective Two-Phase Cooperative Learning on the WWW

Bin-Shyang Jong, Tsong-Wuu Lin, Yu-Lung Wu and Te-Yi Chan......... Vol. 22, No. 2, pp. 425-446

 

COMPUTER APPLICATIONS

A Software Tool for Fault Tolerance

Goutam Kumar Saha.............................................................................. Vol. 22, No. 4, pp. 953-964

Interest-Based Lookup Protocols for Mobile Ad Hoc Networks

Yi-Chung Chen and Jang-Ping Sheu...................................................... Vol. 22, No. 6, pp. 1427-1445

 

COMPUTER ARCHITECTURES

Adaptive Multi-Grain Remote Access Cache in Ring Based NUMA System

Jong Wook Kwak and Chu Shik Jhon.................................................... Vol. 22, No. 6, pp. 1543-1554

Advanced High-Level Cache Management by Processor Access Information

Jong Wook Kwak, Cheol Hong Kim, Sunghoon Shim and Chu Shik Jhon

........................................................... Vol. 22, No. 1, pp. 215-227

A Power-Aware Motion Estimation Architecture using Content-based Subsampling

Hsien-Wen Cheng and Lan-Rong Dung................................................. Vol. 22, No. 4, pp. 799-818

 

COMPUTER COMMUNICATION NETWORKS

Effective Intrusion Detection Model through the Combination of a Signature-based Intrusion Detection System and a Machine Learning-based Intrusion Detection System

Ill-Young Weon, Doo Heon Song and Chang-Hoon Lee......................... Vol. 22, No. 6, pp. 1447-1464

Multipath QoS Routing with Interference Provision in Ad Hoc Wireless Network

Ying-Hong Wang and Hung-Zu Lin........................................................ Vol. 22, No. 6, pp. 1325-1338

Profile-Based Lifetime Determination Schemes for Mobility Management in HMIPv6

Sun Ok Yang, SungSuk Kim and Chong-Sun Hwang............................ Vol. 22, No. 3, pp. 659-674

Threat Evaluation Method for Distributed Network Environment

Keun-Hee Han, Il-Gon Kim, Kang-Won Lee, Jin-Young Choi and Sang-Hun Jeon

................................................................. Vol. 22, No. 4, pp. 889-907

 

COMPUTER GRAPHICS AND VIRTUAL REALITY

A Novel Cache-based Approach to Large Polygonal Mesh Simplification

Hung-Kuang Chen, Chin-Shyurng Fahn, Jeffrey J. P. Tsai and Ming-Bo Lin

................................................................. Vol. 22, No. 4, pp. 843-861

An Efficient Edge-Based Compression Algorithm for 3D Models with Holes and Handles

Bin-Shyan Jong, Wen-Hao Yang and Shawan Song............................ Vol. 22, No. 2, pp. 401-423

 

COMPUTING METHODOLOGIES

A Programming Methodology for Designing Block Recursive Algorithms

Min-Hsuan Fan, Chua-Huang Huang, Yeh-Ching Chung, Jen-Shiuh Liu and Jei-Zhii Lee

                              ............................................................. Vol. 22, No. 1, pp. 95-121

 

DATA ENCRYPTION AND CRYPTOGRAPHY

Authentication Protocols Using Hoover-Kausik’s Software Token

Wei-Chi Ku and Hui-Lung Lee................................................................ Vol. 22, No. 3, pp. 691-699

Cryptanalysis of Improved Liaw’s Broadcasting Cryptosystem

J. Munoz Masque and A. Peinado.......................................................... Vol. 22, No. 2, pp. 391-399

Modular Design for Round-Oriented Password Authentication Protocols

Chi-Chao Chang and Tzonelih Hwang................................................... Vol. 22, No. 5, pp. 1295-1308

 

DATABASE MANAGEMENT

A Study of Disjunctive Information in Fuzzy Relational Databases

Ming-Hua Wang, Huan-Chao Keh, Nan-Chen Hsieh and Tsong-Sheng Wang

.......................................................... Vol. 22, No. 1, pp. 199-213

An Efficient Signature Extraction Method for Image Similarity Retrieval

Wei-Horng Yeh and Ye-In Chang.......................................................... Vol. 22, No. 1, pp. 63-94

D-Tree: A Multi-Dimensional Indexing Structure for Constructing Document Warehouses

Frank S. C. Tseng and Wen-Ping Lin..................................................... Vol. 22, No. 4, pp. 819-841

Efficient Image Retrieval Based on Minimal Spatial Relationships

Soo-Cheol Lee, EenJun Hwang and Jung-Geun Han............................ Vol. 22, No. 1, pp. 447-459

Mobile Real-Time Read-Only Transaction Processing in Broadcast Disks

Hong-Ya Wang, Guo-Qin Ning, Guo-Hui Li and Kam-Yiu Lam............... Vol. 22, No. 5, pp. 1249-1264

 

DISTRIBUTED AND PARALLEL COMPUTING

Efficiency and Reliability in Cluster Based Peer-to-Peer Systems

Ching-Wei Huang and Wuu Yang.......................................................... Vol. 22, No. 5, pp. 1177-1203

 

HARDWARE DESIGN AND TESTING

Using Stack Reconstruction on RTL Orthogonal Scan Chain Design

Chia-Chun Tsai, Hann-Cheng Huang, Trong-Yen Lee, Wen-Ta Lee and

Jan-Ou Wu............................................................................................. Vol. 22, No. 6, pp. 1585-1599

 

HUMAN COMPUTER INTERACTION

A Talking Face Driven by Voice using Hidden Markov Model

Guang-Yi Wang, Mau-Tsuen Yang, Cheng-Chin Chiang and Wen-Kai Tai

................................................................. Vol. 22, No. 5, pp. 1059-1075

American Sign Language Recognition Using Multi-dimensional Hidden Markov Models

Honggang Wang, Ming C. Leu and Cemil Oz.......................................... Vol. 22, No. 5, pp. 1109-1123

Chording with Spatial Mnemonics: Automatic Error Correction for Eyes-Free Text Entry

Frode Eika Sandnes and Yo-Ping Huang............................................... Vol. 22, No. 5, pp. 1015-1031

Facial Expression Classification Using PCA and Hierarchical Radial Basis Function Network

Daw-Tung Lin........................................................................................ Vol. 22, No. 5, pp. 1033-1046

New Approach for Static Gesture Recognition

Chin-Chen Chang, Jiann-Jone Chen, Wen-Kai Tai and Chin-Chuan Han

................................................................. Vol. 22, No. 5, pp. 1047-1057

A Generic and Visual Interfacing Framework for Bridging the Interface between Application Systems and Recognizers

Shih-Jung Peng, Jan Karel Ruzicka and Deng-Jyi Chen........................ Vol. 22, No. 5, pp. 1077-1091

MAP-Based Perceptual Modeling for Noisy Speech Recognition

Yung-Ji Sher, Yeou-Jiunn Chen, Yu-Hsien Chiu, Kao-Chi Chung and Chung-Hsien Wu

............................................................... Vol. 22, No. 5, pp. 999-1013

Multiband Subspace Tracking Speech Enhancement for In-Car Human Computer Speech Interaction

Chung-Hsien Yang, Jia-Ching Wang, Jhing-Fa Wang, Hsiao-Ping Lee, Chung-Hsien Wu and

Kai-Hsing Chang.................................................................................... Vol. 22, No. 5, pp. 1093-1107

 

IMAGE PROCESSING AND COMPUTER VISION

A Geometric Invariant Approach to Human Face Verification

Li-Wei He, Tsorng-Lin Chia and Chen-Kuei Yang.................................. Vol. 22, No. 3, pp. 511-534

A HVS-Directed Neural-Network-Based Approach for Salt-Pepper Impulse Noise Removal

Shih-Mao Lu, Sheng Fu Liang and Chin-Teng Lin.................................. Vol. 22, No. 4, pp. 925-939

A Robust Image Hiding Method Using Wavelet Technique

Chih-Yang Lin and Yu-Tai Ching............................................................ Vol. 22, No. 1, pp. 163-174

Automatic White Balance for Digital Still Cameras

Varsha Chikane and Chiou-Shann Fuh.................................................. Vol. 22, No. 3, pp. 497-509

BCH Code-Based Robust Audio Watermarking in the Cepstrum Domain

Shi-Cheng Liu and Shinfeng D. Lin........................................................ Vol. 22, No. 3, pp. 535-543

Binarization Method Based on Pixel-level Dynamic Thresholds for Change Detection in Image Sequences

Hsu-Yung Cheng, Quen-Zong Wu, Kuo-Chin Fan and Bor-Shenn Jeng    

............................................................... Vol. 22, No. 3, pp. 545-557

Copyright Protection against Print-and-Scan Operations by Watermarking for Color Images Using Coding and Synchronization of Peak Locations in Frequency Domain

Yen-Chung Chiu and Wen-Hsiang Tsai................................................. Vol. 22, No. 3, pp. 483-496

Efficient Solutions for Image Interpolation Treated as an Inverse Problem

S. E. El-Khamy, M. M. Hadhoud, M. I. Dessouky, B. M. Salam and F. E. Abd El-Samie

................................................................. Vol. 22, No. 6, pp. 1569-1583

Fast Octree Construction Endowed with an Error Bound Controlled Subdivision Scheme

Hong-Long Chou and Zen Chen............................................................ Vol. 22, No. 3, pp. 641-657

Salt-Pepper Impulse Noise Detection and Removal Using Multiple Thresholds for Image Restoration

Tzu-Chao Lin and Pao-Ta Yu................................................................. Vol. 22, No. 1, pp. 189-198

INFORMATION STORAGE AND RETRIEVAL

Hybrid Architecture for Web Search Systems Based on Hierarchical Taxonomies

Fidel Cacheda, Victor Carneiro, Carmen Guerrero and Angel Vina...... Vol. 22, No. 4, pp. 863-887

 

INFORMATION SYSTEMS AND APPLICATIONS

A WAP-based, Push-enabled Mobile Internet Application Platform

Hsuan-Hao Chen, Kuochen Wang and Hung-Cheng Shih..................... Vol. 22, No. 5, pp. 1279-1293

Implementation for the Arrangement and Mining Analysis of Travel Schedules

Yin-Fu Huang and Chao-Na Chen.......................................................... Vol. 22, No. 1, pp. 123-146

MRBAC/AR: an Information Flow Control Model to Prevent Both Intra- and Inter-Application Information Leakage

Shih-Chien Chou.................................................................................... Vol. 22, No. 1, pp. 147-161

Multi-class Named Entities Extraction from Biomedical Literature

Tyne Liang and Jian-Shin Chen............................................................. Vol. 22, No. 16, pp. 1339-1353

The Context Driven Component Supporting the Context Adaptation and the Content Extension

Hoijin Yoon and Byoungju Choi.............................................................. Vol. 22, No. 1, pp. 1485-1504

 

INTEGRATED CIRCUITS

A Brief Comparison of Two-phase and NOR-based Four-phase Pipelined Asynchronous Systems

Ying-Haw Shu, Shing Tenqchen, Ming-Chang Sun and Wu-Shiung Feng

................................................................. Vol. 22, No. 4, pp. 941-952

Improved 32-bit Conditional Sum Adder for Low-Power High-Speed Applications

Kuo-Hsing Cheng and Shun-Wen Cheng............................................... Vol. 22, No. 4, pp. 975-989

 

MULTIMEDIA INFORMATION SYSTEMS

Automatic Closed Caption Detection and Filtering in MPEG Videos for Video Structuring

Duan-Yu Chen, Ming-Ho Hsiao and Suh-Yin Lee.................................. Vol. 22, No. 5, pp. 1145-1162

Similarity-based Motion Track Management for Video Retrieval

Pei-Yi Chen and Arbee L. P. Chen......................................................... Vol. 22, No. 6, pp. 1519-1527

Visual-based Emotional Descriptor and Feedback Mechanism for Image Retrieval

Hun-Woo Yoo........................................................................................ Vol. 22, No. 5, pp. 1205-1227

NEURAL NETWORKS AND FUZZY SETS

A New ISF-FLANN Channel Equalizer for 4QAM Digital Communication Systems and Its FPGA Verification

Wan-De Weng, Chin-Tsu Yen and Rui-Chang Lin................................. Vol. 22, No. 5, pp. 1163-1176

Elman Network with Embedded Memory for System Identification

Adem Kalinli and Seref Sagiroglu........................................................... Vol. 22, No. 6, pp. 1555-1568

The Multi-User Detection in Code Division Multiple Access with Adaptive Neuro-Fuzzy Inference System

Yalcin Isik and Necmi Taspinar.............................................................. Vol. 22, No. 6, pp. 1529-1542

Wavelet Neural Networks with a Hybrid Learning Approach

Cheng-Jian Lin....................................................................................... Vol. 22, No. 6, pp. 1367-1387

 

PATTERN RECOGNITION

Multiple Facial Features Representation for Real-Time Face Recognition

Ching-Han Chen, Chia-Te Chu, Jia-Hong Dai and Chih-Yung Chen....... Vol. 22, No. 6, pp. 1601-1610

 

SECURITY AND PROTECTION

A New Design for a Practical Secure Cookies System

Jong-Phil Yang and Kyung Hyune Rhee................................................ Vol. 22, No. 3, pp. 559-571

An Approach to XML-Based Administration and Secure Information Flow Analysis on an Object Oriented Role-Based Access Control Model

Cungang Yang and Chang N. Zhang..................................................... Vol. 22, No. 1, pp. 49-61

An Efficient Sealed-Bid Auction Protocol with Two Servers

Sang Uk Shin.......................................................................................... Vol. 22, No. 6, pp. 1505-1518

An Organizational Structure-Based Administration Model for Decentralized Access Control

Sejong Oh, Changwoo Byun and Seog Park......................................... Vol. 22, No. 6, pp. 1465-1483

Design of Proxy Signature in the Digital Signature Algorithm (DSA)

I-Te Chen, Ming-Hsin Chang and Yi-Shiung Yeh................................... Vol. 22, No. 4, pp. 965-973

Practical Constructions to Multiple Designated Confirmer Signatures

Chih-Hung Wang.................................................................................... Vol. 22, No. 6, pp. 1389-1407

Secure Authentication Protocols Resistant to Guessing Attacks

Jia-Ning Luo, Shiuhpyng Shieh and Ji-Chiang Shen.............................. Vol. 22, No. 5, pp. 1125-1143

Semi-fragile Image Authentication Using Real Symmetric Matrix

Ching-Tang Hsieh, Yeh-Kuang Wu, Chyi-Jang Lee and Hong-Yu Chen.Vol. 22, No. 3, pp. 701-712

Storage Efficient Key Management Technique for Secure Multicasting

Ganapathi Padmavathi and Samukutty Annadurai................................. Vol. 22, No. 3, pp. 675-689

 

SOFTWARE

Boosting Ethernet using Regular Switching Hubs

Chih-Wen Hsueh, Hsin-Hung Lin and Guo-Chiuan Huang..................... Vol. 22, No. 3, pp. 721-734

Control Component Development of Information Appliances on Networks

Po-Cheng Huang, Kuan-Rong Lee, Wei-Tsung Su, Yau-Hwang Kuo,

Mong-Fong Horng, Chien-Chou Lin and Yu-Chang Chen...................... Vol. 22, No. 3, pp. 771-784

Design and Implementation of the OpenMP Programming Interface on Linux-based CMP Clusters

Tyng-Yeu Liang, Shih-Hsien Wang, Ce-Kuen Shieh, Ching-Min Huang and Liang-I Chang

............................................................... Vol. 22, No. 3, pp. 785-798

Drought Forecast Model and Framework Using Wireless Sensor Networks

Hsu-Yang Kung, Jing-Shiuan Hua and Chaur-Tzuhn Chen................... Vol. 22, No. 3, pp. 751-769

Open Source Licenses and the Creative Commons Framework: License Selection and Comparison

Yi-Hsuan Lin, Tung-Mei Ko, Tyng-Ruey Chuang and Kwei-Jay Lin...... Vol. 22, No. 1, pp. 1-17

Real-Time Linux with Budget-Based Resource Reservation

Nei-Chiung Perng, Chin-Shuang Liu and Tei-Wei Kuo............................ Vol. 22, No. 1, pp. 31-47

SOTS-CE: A Sonography Ovarian Tumor System with Case Exchange

Chow-Sing Lin and Chin-Ju Hsieh......................................................... Vol. 22, No. 3, pp. 735-750

 

SOFTWARE ENGINEERING AND SOFTWARE

A Case Study on Improving Changeability of COTS-Based System Using Aspect-Oriented Programming

Jingyue Li, Axel Anders Kvale and Reidar Conradi............................... Vol. 22, No. 2, pp. 375-390

A Pattern-based Development Methodology for Communication Protocols

YoungJoon Byun and Beverly A. Sanders............................................ Vol. 22, No. 2, pp. 315-335

Component Identification Methods Applying Method Call Types between Classes

Misook Choi and Eunsook Cho............................................................... Vol. 22, No. 2, pp. 247-267

Fuzzy Decision Tree Approach for Embedding Risk Assessment Information into Software Cost Estimation Model

Sun-Jen Huang, Chieh-Yi Lin and Nan-Hsing Chiu................................ Vol. 22, No. 2, pp. 297-313

Organizing and Visualizing Software Repositories Using the Growing Hierarchical Self-Organizing Map

Songsri Tangsripairoj and M. H. Samadzadeh....................................... Vol. 22, No. 2, pp. 283-295

Process and Planning Support for Iterative Porting

Pradeep Varma...................................................................................... Vol. 22, No. 2, pp. 337-356

Space-Efficient Page-Level Incremental Checkponting

Junyoung Heo, Sangho Yi, Yookun Cho and Jiman Hong..................... Vol. 22, No. 2, pp. 237-246

Verification of UML Model Elements Using B

Ninh Thuan Truong and Jeanine Souquieres......................................... Vol. 22, No. 2, pp. 357-373

Wrapper-Based Framework for Domain-Specific Software Reuse

Hisham M. Haddad and Ying Xie............................................................ Vol. 22, No. 2, pp. 269-282

TeMeFr: Towards a Reuse-Based Development for Conference-Oriented Telemedicine Systems

Hewijin Christine Jiau, Jinghong Cox Chen, Kuo-Feng Ssu and Jim-Min Lin

................................................................. Vol. 22, No. 3, pp. 625-640

 

SYSTEM PERFORMANCE

Bounding DMA Interference on Hard-Real-Time Embedded Systems

Tai-Yi Huang, Chih-Chieh Chou and Po-Yuan Chen.............................. Vol. 22, No. 5, pp. 1229-1247

Mobile Real-Time Read-Only Transaction Processing in Broadcast Disks

Hong-Ya Wang, Guo-Qin Ning, Guo-Hui Li and Kam-Yiu Lam............... Vol. 22, No. 5, pp. 1249-1264

A Fault-Tolerant Protocol for Generating Sequence Numbers for Total Ordering Group Communication in Distributed Systems

Chih-Ming Hsiao and Ge-Ming Chiu........................................................ Vol. 22, No. 5, pp. 1265-1277