imgae 

 

 

 


ALGORITHMS

A Linear-Time Self-Stabilizing Algorithm for the Minimal 2-Dominating Set Problem in General Networks

Tetz C. Huang, Chih-Yuan Chen and Cheng-Pin Wang......................... Vol. 24, No. 1, pp. 175-187

A Self-adaptive Predictive Policy for Pursuit-evasion Game

Zhen Luo, Qi-Xin Cao and Yan-Zheng Zhao......................................... Vol. 24, No. 5, pp. 1397-1407

 

Arithmetic and Logic Structures

A Register Array Based Low Power FFT Processor for Speech Recognition

Gin-Der Wu and Yin Lei......................................................................... Vol. 24, No. 3, pp. 981-991

 

Artificial Intelligence

Ant Colony Optimization Approaches to the Degree-constrained Minimum Spanning Tree Problem

Yoon-Teck Bau, Chin-Kuan Ho and Hong-Tat Ewe............................... Vol. 24, No. 4, pp. 1081-1094

 

Computer Architectures

Behavior-Based Branch Prediction by Dynamically Clustering Branch Instructions

Hans Vandierendonck, Veerle Desmet and Koen De Bosschere......... Vol. 24, No. 3, pp. 919-931

Filtering of Unnecessary Branch Predictor Lookups for Low-power Processor Architecture

Wei-Hau Chiao and Chung-Ping Chung.................................................. Vol. 24, No. 4, pp. 1127-1142

Mobile Media Content Sharing in UPnP-Based Home Network Environment

Chih-Lin Hu, Wei-Shun Liao and Yen-Ju Huang.................................... Vol. 24, No. 6, pp. 1753-1769

Saving Register-File Leakage Energy by Register-usage Exploiting

Wann-Yun Shieh and Chien-Chen Chen................................................ Vol. 24, No. 5, pp. 1429-1444

The Multi-context Reconfigurable Processing Unit for Fine-grain Computing

Jih-Ching Chiu, Yu-Liang Chou and Ren-Bang Lin................................. Vol. 24, No. 3, pp. 965-979

The Stretched Network: Properties, Routing, and Performance

P. Shareghi and H. Sarbazi-Azad.......................................................... Vol. 24, No. 2, pp. 361-378

 

Computer Graphics and Virtual Reality

Hamiltonian Connectivity, Pancyclicity and 3*-Connectivity of Matching Composition Networks

Shin-Shin Kao, Jui-Chia Wu and Yuan-Kang Shih................................. Vol. 24, No. 2, pp. 615-625

A New Seed-Set Finding Approach for Iso-Surface Extraction

Chuan-Kai Yang and Chiang-Han Hung................................................. Vol. 24, No. 6, pp. 1771-1785

 

Computer Methodologies

Tensor Product Formulation for Hilbert Space-Filling Curves

Shen-Yi Lin, Chih-Shen Chen, Li Liu and Chua-Huang Huang............... Vol. 24, No. 1, pp. 261-275

 

Computer-Aided Design

A Two-level Simultaneous Test Data and Time Reduction Technique for SOC

Yu-Te Liaw, Bing-Chuan Bai and James C. M. Li.................................. Vol. 24, No. 3, pp. 841-857

 

Computer-Aided Engineering

Hooke-Jeeves’ Method Applied to a New Economic Dispatch Problem Formulation

Lahouaria Benasla, Abderrahim Belmadani and Mostefa Rahli............. Vol. 24, No. 3, pp. 907-917

 

Computer-Communication Networks

A Hierarchical Multiple-Choice Routing Path Protocol for Wireless Sensor Networks

Ying-Hong Wang, Chih-Hsiao Tsai and Hung-Jen Mao.......................... Vol. 24, No. 1, pp. 277-291

A Stability-Based Clustering Technique and Routing Protocol for Mobile Ad Hoc Networks

Chun-Chuan Yang and Yu-Chong Chang.............................................. Vol. 24, No. 2, pp. 469-481

An Evaluation Framework for More Realistic Simulations of MPEG Video Transmission

Chih-Heng Ke, Ce-Kuen Shieh, Wen-Shyang Hwang and Artur Ziviani..Vol. 24, No. 2, pp. 425-440

Design and Implementation of Mobile Robot for Nodes Replacement in Wireless

Sensor Networks

Jang-Ping Sheu, Kun-Ying Hsieh and Po-Wen Cheng........................... Vol. 24, No. 2, pp. 393-410

Dynamic Transmission Control Method for WLANs

Jain-Shing Liu and Chun-Hung Richard Lin............................................ Vol. 24, No. 5, pp. 1461-1472

Heuristic and Simulated Annealing Algorithms for Wireless ATM Backbone Network

Design Problem

Der-Rong Din.......................................................................................... Vol. 24, No. 2, pp. 483-501

Provisioning Erlang-B Model Based Flow Admission Control for Packet Networks

L. Senthilkumar and V. Sankaranarayanan........................................... Vol. 24, No. 5, pp. 1537-1550

Region-based Shadow Registration Scheme for Efficient Mobility Management in the SIP

Sang-Bum Han, Keun-Ho Lee and Chong-Sun Hwang......................... Vol. 24, No. 3, pp. 709-725

Tapster: Transparent Proxy Redirector for Mobile Computing

Tzu-Chi Huang, Ce-Kuen Shieh, Bo-Yang Lai and Yu-Ben Miao........... Vol. 24, No. 1, pp. 307-316

Ubiquitous Wireless Connectivity across Cellular and Wireless Local Area Networks

F. Siddiqui and S. Zeadally..................................................................... Vol. 24, No. 2, pp. 327-342

A Modified EDCA with Dynamic Contention Control for Real-Time Traffic in Multihop Ad Hoc Networks

Yang-Jing Wu, Jen-Hung Chiu and Tsang-Ling Sheu............................ Vol. 24, No. 4, pp. 1065-1079

AHS: Advanced Handoff Scheme for Nested Mobile Networks

Kyung-Taeg Rho, Soo-Mok Jung, Jung Hun Kang, Wonil Choi and

Myong-Soon Park................................................................................... Vol. 24, No. 1, pp. 221-236

Design of QoS and Admission Control for VoIP Services Over IEEE 802.11e WLANs

Pei-Yeh Wu, Jen-Jee Chen, Yu-Chee Tseng and Hung-Wei Lee.......... Vol. 24, No. 4, pp. 1003-1022

Energy-Efficient Key-Management (EEKM) Protocol for Large-Scale Distributed

Sensor Networks

Kwang-Jin Paek, Ui-Sung Song, Hye-Young Kim and Jongwan Kim.... Vol. 24, No. 6, pp. 1837-1858

Shared Self-Organized GKM Protocol for MANETs

Juan Hernández-Serrano, Josep Pegueroles, and Miguel Soriano....... Vol. 24, No. 6, pp. 1629-1646

 

Data Encryption and Cryptography

A Generic Construction for Intrusion-Resilent Signatures from Linear Feedback Shift Register

Zheng Gong, Xiangxue Li, Dong Zheng and Kefei Chen....................... Vol. 24, No. 5, pp. 1347-1360

Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions

Juan M. Estevez-Tapiador, Julio C. Hernandez-Castro, Pedro Peris-Lopez and Arturo Ribagorda

............................................................................................................... Vol. 24, No. 5, pp. 1485-1504

Biased Bit Commitment and Applications

Li-Cheng Wang, Zhen-Fu Cao, Feng Cao, Hai-Feng Qian and Hai-Yong Bao

............................................................................................................... Vol. 24, No. 2, pp. 441-452

A Secure Query Language for XML Documents

Tao-Ku Chang and Gwan-Hwan Hwang.............................................. Vol. 24, No. 6, pp. 1901-1916

 

Data Management

A Literature Overview of Fuzzy Database Models

Z. M. Ma and Li Yan............................................................................... Vol. 24, No. 1, pp. 189-202

Control-path Oriented Workflow Intelligence Analyses

Minjae Park and Kwanghoon Kim........................................................... Vol. 24, No. 2, pp. 343-359

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network

Jiun-Long Huang and Jui-Nan Lin.......................................................... Vol. 24, No. 3, pp. 819-840

Handling Redundancies for Disjunctive Information with Exclusive-or Semantics

Nan-Chen Hsieh..................................................................................... Vol. 24, No. 2, pp. 627-638

 

Distributed and Parallel Computing

A Delay-Optimal Group Mutual Exclusion Algorithm for a Tree Network

Vinay Madenur and Neeraj Mittal........................................................... Vol. 24, No. 2, pp. 573-583

An Approach for Synthesis Petri Nets for Modeling and Verifying Composite

Web Service

Zhi-Jun Ding, Jun-Li Wang and Chang-Jun Jiang.................................. Vol. 24, No. 5, pp. 1309-1328

An Efficient Cluster-Based Routing Algorithm in Ad Hoc Networks with Unidirectional Links

Yi-Yu Su, Shiow-Fen Hwang and Chyi-Ren Dow................................. Vol. 24, No. 5, pp. 1409-1428

Improving the Efficacy of a Termination Detection Algorithm

Sathya Peri and Neeraj Mittal................................................................. Vol. 24, No. 1, pp. 159-174

On Message Sequences for Incremental Network Computing

Cho-Chin Lin........................................................................................... Vol. 24, No. 4, pp. 1023-1040

The Self-Stabilizing Edge-Token and Its Applications

Su-Shen Hung and Shing-Tsaan Huang................................................ Vol. 24, No. 6, pp. 1859-1872

 

Human Computer Interaction

Linear Regression Models for Assessing the Ranking of Web Sites Based on Average

Numbers of Visits

Dowming Yeh, Ray Tsai, Pei-Chen Sun and Jia-Wen Lee..................... Vol. 24, No. 2, pp. 585-599

 

Image Processing and Computer Vision

A Pruning-and-Voting Strategy to Speed up the Detection for Lines, Circles, and Ellipses

Kuo-Liang Chung and Yong-Huai Huang............................................... Vol. 24, No. 2, pp. 503-520

A Quadtree-based Progressive Lossless Compression Technique for Volumetric Data Sets

Gregor Klajnsek, Borut Zalik, Franc Novak and Gregor Papa................ Vol. 24, No. 4, pp. 1187-1195

A Strategic Decomposition for Adaptive Image Transmission

Rong-Chi Chang, Timothy K. Shih and Hui-Huang Hsu.......................... Vol. 24, No. 3, pp. 691-707

Dynamic Visual Tracking Using SDG-Like Matching

Ming-Yang Cheng, Mi-Ching Tsai and Chun-Jen Chen.......................... Vol. 24, No. 3, pp. 673-690

Fundamental Matrix Estimation Using Evolutionary Algorithms with Multi-Objective Functions

Cheng-Yuan Tang, Yi-Leh Wu and Yueh-Hung Lai............................... Vol. 24, No. 3, pp. 785-800

New Fuzzy Object Segmentation Algorithm for Video Sequences

Kuo-Liang Chung, Shih-Wei Yu, Hsueh-Ju Yeh, Yong-Huai Huang and Ta-Jen Yao

............................................................................................................... Vol. 24, No. 2, pp. 521-537

Palmprint Images Enhancement Using Steerable Filters based Fuzzy Unsharp Masking

Yanxia Wang and Qiuqi Ruan................................................................ Vol. 24, No. 2, pp. 539-551

Real-Time Background Estimation of Traffic Imagery Using Group-Based Histogram

Kai-Tai Song and Jen-Chao Tai.............................................................. Vol. 24, No. 2, pp. 411-423

The Segmented-Matrix Algorithm for Haar Discrete Wavelet Transform

Po-Yueh Chen, En-Chi Liao and Chung-Wei Liang................................ Vol. 24, No. 4, pp. 1273-1282

A Geometry-Based Secret Image Sharing Approach

Chien-Chang Chen and Wen-Yin Fu...................................................... Vol. 24, No. 5, pp. 1567-1577

A Lossless Image Coder Integrating Predictors and Block-Adaptive Prediction

Feng-Yang Hsieh, Chia-Ming Wang, Chun-Chieh Lee and

Kuo-Chin Fan......................................................................................... Vol. 24, No. 5, pp. 1579-1591

A Robust and Accurate Calibration Method by Computer Vision Techniques for Coordinate Transformation between Display Screens and Their Images

Sheng-Wen Jeng and Wen-Hsiang Tsai................................................ Vol. 24, No. 4, pp. 1197-1211

Calibration of Motorized Object Rig and Its Applications

Pang-Hung Huang, Yu-Pao Tsai, Wan-Yen Lo, Sheng-Wen Shih and

Yi-Ping Hung.......................................................................................... Vol. 24, No. 5, pp. 1551-1565

Estimating Optical Flow by Integrating Multi-Frame Information

Chia-Ming Wang, Kuo-Chin Fan and Cheng-Tzu Wang......................... Vol. 24, No. 6, pp. 1719-1731

Multilayer Inpainting on Digitalized Artworks

Rong-Chi Chang and Timothy K. Shih.................................................... Vol. 24, No. 4, pp. 1241-1255

 

Information Storage and Retrieval

Innovation-Oriented Knowledge Query in Knowledge Grid

Lu Zhen and Zu-Hua Jiang.................................................................... Vol. 24, No. 2, pp. 601-613

Utilization of Principle Axis Analysis for Fast Nearest Neighbor Searches in High- Dimensional Image Databases

Tian-Luu Wu and Shyi-Chyi Cheng........................................................ Vol. 24, No. 2, pp. 553-571

 

Information Systems and Applications

A GA-Based Search Approach to Creative Weave Structure Design

Jeng-Jong Lin......................................................................................... Vol. 24, No. 3, pp. 949-963

A Temporal Aggregation Method for Update-Intensive Applications

Sung Tak Kang, Yon Dohn Chung and Myoung Ho Kim......................... Vol. 24, No. 4, pp. 1175-1186

An Intelligent Data Mining Approach Using Neuro-Rough Hybridization to Discover Hidden Knowledge of Informatin Systems

Reza Sabzevari and Gh. A. Montazer................................................... Vol. 24, No. 4, pp. 1111-1126

Efficient Discovery of Frequent Continuities by Projected Window List Technology

Kuo-Yu Huang, Chia-Hui Chang and Kuo-Zui Lin.................................. Vol. 24, No. 4, pp. 1041-1064

FASiRec: A Fast Session Recovery Scheme for Large-scale VPNs Using IPSec

Jeong-Beom Kim, MoonBae Song, Chong-Sun Hwang and SangKeun Lee

............................................................................................................... Vol. 24, No. 5, pp. 1329-1346

Formalized Entity Extraction Methodology for Changeable Business Requirements

Namgyu Kim, Sangwon Lee and Songchun Moon................................. Vol. 24, No. 3, pp. 649-671

Load Balancing Among Photolithography Machines in the Semiconductor Manufacturing System

Arthur M. D. Shr, Alan Liu and Peter P. Chen........................................ Vol. 24, No. 2, pp. 379-391

Description-Based Semantic Prefetching Scheme for Data Management in Location-

Based Services

Sang-Won Kang, Joon-Min Gil, Jongwan Kim, Seokjin Im and Sangkeun Lee

............................................................................................................... Vol. 24, No. 6, pp. 1799-1820

Implementation of an Intelligent Urban Traffic Management System Based on a City Grid Infrastructure

Feilong Tang, Minyi Guo, Minglu Li and Cho-Li Wang............................. Vol. 24, No. 6, pp. 1821-1836

Impromptu Service Discovery and Delivery in Mobile Environments

Choonhwa Lee, Sumi Helal and David Nordstedt.................................. Vol. 24, No. 6, pp. 1733-1751

 

Mathematics of Computing

Fuzzy System Reliability Analysis Using Triangular Fuzzy Numbers Based on Statistical Data

Jing-Shing Yao, Jin-Shieh Su and Teng-San Shih................................. Vol. 24, No. 5, pp. 1521-1535

 

Memory Structures

Using the Similarity of Main Melodies to Identify Cover Versions of Popular Songs for Music Document Retrieval

Wei-Ho Tsai, Hung-Ming Yu and Hsin-Min Wang................................... Vol. 24, No. 6, pp. 1669-1687

 

Miscellaneous Computing Issues

Predicting Subcellular Locations of Eukaryotic Proteins Using Bayesian and k-Nearest

Neighbor Classifiers

Han C. W. Hsiao, Shih-Hao Chen, Judson Pei-Chun Chang and Jeffrey J. P. Tsai

............................................................................................................... Vol. 24, No. 5, pp. 1361-1375

 

Multimedia Information Systems

Extension of Timeline-based Editing for Non-deterministic Temporal Behavior in SMIL2.0 Authoring

Chun-Chuan Yang, Chen-Kuei Chu and Yung-Chi Wang...................... Vol. 24, No. 5, pp. 1377-1395

New Prediction- and Affine Transformation-Based Three-Step Large Search Scheme for

Motion Estimation With Application

Kuo-Liang Chung, Ta-Jen Yao and Yong-Huai Huang.......................... Vol. 24, No. 4, pp. 1095-1109

The Application-Level Protocol for QoS Supporting in Synchronized Multimedia Sessions

Chun-Chuan Yang, Sze-Horng Lee and Li-Yuan Cheng....................... Vol. 24, No. 4, pp. 1257-1271

 

Neural Networks and Fuzzy Sets

A Genetic Algorithm for Linear Programming With Fuzzy Constraints

Feng-Tse Lin.......................................................................................... Vol. 24, No. 3, pp. 801-817

A Lane Departure Warning System Based on Virtual Lane Boundary

Yong Zhou, Rong Xu, Xiao-Feng Hu and Qing-Tai Ye........................... Vol. 24, No. 1, pp. 293-305

A Two-stage Clustering Method Combining Ant Colony SOM and K-means

Sheng-Chai Chi and Chih-Chieh Yang................................................... Vol. 24, No. 5, pp. 1445-1460

Efficient Immune-Based Particle Swarm Optimization Learning for Neuro Fuzzy Networks Design

Cheng-Jian Lin, Cheng-Hung Chen and Chi-Yung Lee.......................... Vol. 24, No. 5, pp. 1505-1520

Numerical Analysis

Performance Evaluation for Next Generation Differentiated Services in Wireless Local

Area Networks

Yu-Liang Kuo, Eric Hsiao-Kuang Wu and Gen-Huey Chen................... Vol. 24, No. 1, pp. 203-220

 

Operation Systems

WSNFS: A Web-Services-Based Network File System

Gwan-Hwan Hwang, Chih-Hao Yu, Chun-Chin Sy and Chiu-Yang Chang..Vol. 24, No. 3, pp. 933-947

 

Pattern Recognition

A Low Complexity Fingerprint Verification Algorithm with Reduced Hardware Resources

Jia-Hong Dai and Ching-Han Chen......................................................... Vol. 24, No. 3, pp. 859-873

Separating Color and Identifying Repeat Pattern through the Automatic Computerized Analysis System for Printed Fabrics

Chung-Feng Jeffrey Kuo, Chung-Yang Shih and Jiunn-Yih Lee........... Vol. 24, No. 2, pp. 453-467

Mobile-Agent-Based Distributed Decision Tree Classification in Wireless Sensor Networks

Shuang-Quan Wang, Xin Chen, Ning-Jiang Chen and Jie Yang............ Vol. 24, No. 6, pp. 1787-1798

Speaker Clustering Based on Bayesian Information Criterion

Wei-Ho Tsai............................................................................................ Vol. 24, No. 6, pp. 1873-1886

 

Processor Architectures

Reducing the TLB Context Switching Miss Ratio With Banked and Prefetching Mechanism

Chang-Jiu Chen and Wei-Min Cheng...................................................... Vol. 24, No. 6, pp. 1887-1900

 

Programming Languages

Analysis of All-or-Nothing Hash Functions

Pin Lin, Wenling Wu, Chuankun Wu and Tian Qiu.................................. Vol. 24, No. 5, pp. 1473-1484

 

Programming Techniques

Identifying Metrics for Commercial-Off-the-Shelf Software with Inductive Inference Based on Characteristic Vectors

Chongwon Lee, Byungjeong Lee, Jaewon Oh and Chisu Wu.............. Vol. 24, No. 6, pp. 1603-1628

Integration of Specification-based and CR-based Approaches for GUI Testing

Woei-Kae Chen, Zheng-Wen Shen and Tung-Hung Tsai...................... Vol. 24, No. 5, pp. 1293-1307

Weighted Class Complexity: A Measure of Complexity for Object Oriented System

Sanjay Mısra.......................................................................................... Vol. 24, No. 6, pp. 1689-1708

 

Register-transfer-level Implementation

Power-Management Scheduling for Peak Power Minimization

Shih-Hsu Huang and Chun-Hua Cheng.................................................. Vol. 24, No. 6, pp. 1647-1668

 

Security and Protection

A Secure Hash-Based Strong-Password Authentication Protocol Using One-Time Public-Key Cryptography

Minho Kim and Cetin Kaya Koc.............................................................. Vol. 24, No. 4, pp. 1213-1227

A Unified Min-Max Transition-Based Data Hiding Algorithm for Mixed Text/Halftone Images

Shih-Tung Wu, Kuo-Liang Chung, Yong-Huai Huang and Jung-Gen Wu

............................................................................................................... Vol. 24, No. 4, pp. 1159-1173

Identity-Based Parallel Key-Insulated Signature Without Random Oracles

Jian Weng, Xiang-Xue Li, Ke-Fei Chen and Sheng-Li Liu...................... Vol. 24, No. 4, pp. 1143-1157

Network Intruction Detection Based on Shift-OR Circuit

Huang-Chun Roan, Wen-Jyi Hwang, Wei-Jhih Huang and Chia-Tien Dan Lo

............................................................................................................... Vol. 24, No. 4, pp. 1229-1239

Topological Analysis of Multi-phase Attacks Using Expert Systems

Hamid Reza Shahriari, Yasser Ganjisaffar, Rasool Jalili and Jafar Habibi

............................................................................................................... Vol. 24, No. 3, pp. 743-767

 

Signal and Speech Processing

Dichotomous Learning Algorithm for the Optimal Design of Weighted Order Statistics Filters

Pao-Ta Yu and Chih-Chia Yao............................................................... Vol. 24, No. 3, pp. 727-742

 

Simulation and Modeling

A GA-based Multi-Objective Decision Making for Optimal Vehicle Transportation

Jeng-Jong Lin......................................................................................... Vol. 24, No. 1, pp. 237-260

Dynamic Nonlinear System Identification Using a Wiener-Type Recurrent Network with OKID Algorithm

Jeen-Shing Wang and Yu-Liang Hsu..................................................... Vol. 24, No. 3, pp. 891-905

Modeling and Analysis of Urban Traffic Lights Control Systems Using Timed CP-nets

Yi-Sheng Huang and Ta-Hsiang Chung................................................. Vol. 24, No. 3, pp. 875-890

 

Theory of Computing

A Self-Stabilizing Algorithm for Finding a Minimal Distance-2 Dominating Set in

Distributed Systems

Ji-Cherng Lin, Tetz C. Huang, Cheng-Pin Wang and Chih-Yuan Chen.. Vol. 24, No. 6, pp. 1709-1718

Similarity Measurement of Rule-based Knowledge Using Conditional Probability

Chin-Jung Huang and Min-Yuan Cheng................................................. Vol. 24, No. 3, pp. 769-784

 

SPECIAL ISSUE ON SELECTED PAPERS IN ICS 2006

A Data Mining-Based Method for the Incremental Update of Supporting Personalized

Information Filtering

Ye-In Chang, Jun-Hong Shen and Tsu-I Chen....................................... Vol. 24, No. 1, pp. 129-142

A Dynamic Load Balancing Scheme for VoIP over WLANs

Shiao-Li Tsao and Chih-Chien Hsu........................................................ Vol. 24, No. 1, pp. 47-60

A Novel Approach to Comparison-Based Diagnosis for Hypercube-Like Systems

Chieh-Feng Chiang and Jimmy J. M. Tan................................................ Vol. 24, No. 1, pp. 1-9

A State-Based Testing Approach for Aspect-Oriented Programming

Chien-Hung Liu and Chuan-Wen Chang................................................ Vol. 24, No. 1, pp. 11-31

A Trajectory-Based Ball Tracking Framework with Visual Enrichment for Broadcast Baseball Videos

Hua-Tsung Chen, Hsuan-Sheng Chen, Ming-Ho Hsiao, Wen-Jiin Tsai and Suh-Yin Lee

............................................................................................................... Vol. 24, No. 1, pp. 143-157

An Effective Decap Insertion Method Considering Power Supply Noise during Floorplanning

Chao-Hung Lu, Hung-Ming Chen and Chien-Nan Jimmy Liu................... Vol. 24, No. 1, pp. 115-127

Fast Packet Classification Using Bit Compression with Fast Boolean Expansion

Chien Chen, Chia-Jen Hsu and Chi-Chia Huang..................................... Vol. 24, No. 1, pp. 61-81

Mining Closed Sequential Patterns with Time Constraints

Ming-Yen Lin, Sue-Chen Hsueh and Chia-Wen Chang.......................... Vol. 24, No. 1, pp. 33-46

Physically-Based Analysis and Rendering of Bidirectional Texture Functions Data

Ying-Chieh Chen, Sin-Jhen Chiu, Hsiang-Ting Chen and Chun-Fa Chang

............................................................................................................... Vol. 24, No. 1, pp. 83-98

Template-Based Automatic Segmentation of Drosophila Mushroom Bodies

Guan-Yu Chen, Ying-Cheng Chen, Chu-Fang Lin, An-Chi Hu, Cheng-Chi Wu

and Yung-Chang Chen.......................................................................... Vol. 24, No. 1, pp. 99-113