排版用圖片 

 

 

 

 

 


<Hardware<

control structures and microprogramming

Hardware Context-Switch Methodology for Dynamically Partially Reconfigurable Systems

Trong-Yen Lee, Che-Cheng Hu, Li-Wen Lai and Chia-Chun Tsai.......... Vol. 26, No. 4, pp. 1289-1305

 

memory structures

The Basic Block Reassembling Instruction Stream Buffer with LWBTB for X86 ISA

Jih-Ching Chiu, Yu-Liang Chou and Tseng-Kuei Lin.............................. Vol. 26, No. 4, pp. 1273-1288

 

register-transfer-level implementation

Resource Selection and Binding of Nonzero Clock Skew Circuits for Standby Leakage Current Minimization

Shih-Hsu Huang and Chun-Hua Cheng.................................................. Vol. 26, No. 6, pp. 2249-2266

 

logic design

An Optimal Round-Robin Arbiter Design for NoC

Jer-Min Jou And Yun-Lung Lee.............................................................. Vol. 26, No. 6, pp. 2047-2058

 

integrated circuits

Adaptive Two-Level Blocking Coordinated Checkpointing for High Performance Cluster Computing Systems

Mehdi Lotfi and Seyed Ahmad Motamedi............................................... Vol. 26, No. 3, pp. 951-966

An Efficient Architecture of Extended Linear Interpolation for Image Processing

Chung-Chi Lin, Ming-Hwa Sheu, Huann-Keng Chiang, Chishyan Liaw, Zeng-Chuan Wu

and Wen-Kai Tsai................................................................................... Vol. 26, No. 2, pp. 631-648

Implementation of a 2.45GHz Passive RFID Transponder Chip in 0.18um CMOS

Meng-Lieh Sheu, Yu-Sheng Tiao, Hang-Yu Fan and Ji-Jin Huang........ Vol. 26, No. 2, pp. 597-610

Low Parasitic Capacitance and Low-Power CMOS Capacitive Fingerprint Sensor

Meng-Lieh Sheu, Wei-Hung Hsu and Yuan-Chang Huang.................... Vol. 26, No. 2, pp. 585-595

 

<Computer systems organization<

A New Variant of 3GPP-MAC With Provable Security and Higher Efficiency

Li-Ting Zhang, Wen-Ling Wu and Peng Wang....................................... Vol. 26, No. 4, pp. 1539-1552

New Disturbance Vector for SHA-0 Collision

Shuang Wu, Deng-Guo Feng and Wen-Ling Wu................................... Vol. 26, No. 6, pp. 2143-2157

Size-Independent Self-Stabilizing Asynchronous Phase Synchronization in General Graphs

Chi-Hung Tzeng, Jehn-Ruey Jiang and Shing-Tsaan Huang................. Vol. 26, No. 4, pp. 1307-1322

System-on-Chip Architecture for Speech Recognition

Gin-Der Wu and Kuei-Ting Kuo.............................................................. Vol. 26, No. 3, pp. 1073-1089

Task Scheduling for Multiprocessor Systems with Automous Performance-Optimizing Control

Hsiu-Jy Ho and Wei-Ming Lin................................................................. Vol. 26, No. 2, pp. 347-361

 

computer-communication networks

A Node Revocation Scheme Using Public-Key Cryptography in Wireless Sensor Networks

Po-Jen Chuang, Shao-Hsuan Chang and Chih-Shin Lin........................ Vol. 26, No. 5, pp. 1859-1873

Adaptive Data Collection Scheme with Dynamic Grid-Length Adjustments in Wireless Sensor Networks

Tsang-Ling Sheu and Wei-Chang Liu.................................................... Vol. 26, No. 4, pp. 1363-1378

A-MAC: A MAC Protocol Using Alternative Wakeup Schedules to Achieve Energy Efficiency for Wireless Sensor Networks

Po-Jen Chuang and Chih-Shin Lin.......................................................... Vol. 26, No. 6, pp. 2127-2141

An Analytical Study of People Mobility in Opportunistic Networks

Ling-Jyh Chen and Yung-Chih Chen...................................................... Vol. 26, No. 1, pp. 197-214

An Energy-Aware, Cluster-Based Routing Algorithm for Wireless Sensor Networks

Jyh-Huei Chang...................................................................................... Vol. 26, No. 6, pp. 2159-2171

Bit and Power Allocation for Multi-user MIMO OFDM Systems with Subcarrier Reuse

Yung-Fang Chen, Chun-Ye Lin and Liang-Ying Chen........................... Vol. 26, No. 6, pp. 2283-2296

DCLS: A Fair and Efficient Scheduling with Bandwidth Guarantee in WiMAX Mesh Networks

Tein-Yaw Chung, Huai-Lei Fu and Hsiao-Chih Lee............................... Vol. 26, No. 4, pp. 1429-1442

Design and Implementation of High Availability OSPF Router

Chia-Tai Tsai, Rong-Hong Jan and Kuochen Wang................................ Vol. 26, No. 6, pp. 2173-2198

Differential Dynamic Traffic Control for IEEE 802.15.4 Networks

Wook Kim and Sun-Shin An................................................................... Vol. 26, No. 1, pp. 255-266

Dynamic Addressing in Wireless Sensor Networks without Location Awareness

R. C. Doss, D. Chandra, L. Pan, W. Zhou and M. U. Chowdhury.......... Vol. 26, No. 2, pp. 443-460

Event Reporting with Fairness in Wireless Sensor Networks

Faisal-Bashir Hussain and Yalcin Cebi.................................................. Vol. 26, No. 3, pp. 1091-1106

Optimization of IEEE 802.11 Multirate Wireless LAN

A. V. Babu, Lillykutty Jacob and S. Abdul Subhan................................ Vol. 26, No. 5, pp. 1771-1785

Performance Analyses of High-Efficiency EDCA for Reducing Contention Collision and Increasing Throughput in QoS-based IEEE 802.11e Wireless Networks

Ben-Jye Chang, Ying-Hsin Liang and Jyh-Woei Chu............................. Vol. 26, No. 6, pp. 1991-2007

Semi-Probabilistic Routing in Intermittently Connected Mobile Ad Hoc Networks

Ke Shi..................................................................................................... Vol. 26, No. 5, pp. 1677-1693

 

special-purpose and application-based systems

Active RFID System with Cryptography and Authentication Mechanisms

Hsi-Wen Wang, Ren-Guey Lee, Chun-Chieh Hsiao and Guan-Yu Hsieh..   Vol. 26, No. 4, pp. 1323-1344

CA-RBAC: Context Aware RBAC Scheme in Ubiquitous Computing Environments

Jung Hwan Choi, Hyunsu Jang and Young Ik Eom................................ Vol. 26, No. 5, pp. 1801-1816

Two-phase Pattern Matching for Regular Expressions in Intrusion Detection Systems

Chang-Ching Yang, Chen-Mou Cheng and Sheng-De Wang................. Vol. 26, No. 5, pp. 1563-1582

Weighted Characteristic P-vector and Deadlock Control of WS3PR

Daniel Yuh Chao.................................................................................... Vol. 26, No. 3, pp. 1121-1136

 

miscellaneous

VBLM: High-Accuracy Localization Method with Verification Mechanism for Unstable-Signal Sensor Networks

Chao-Chun Chen, Ding-Chau Wang and Yong-Ming Huang.................. Vol. 26, No. 4, pp. 1459-1478

 

<software<

software engineering

A Quality-Driven Web Service Composition Methodology for Ubiquitous Services

Heejung Chang and Kangsun Lee......................................................... Vol. 26, No. 6, pp. 1957-1971

operating systems

An Efficient Stack Management for Senor Operating Systems

Junyoung Heo, Boncheol Gu, Yookun Cho and Jiman Hong................. Vol. 26, No. 3, pp. 1137-1150

 

<data<

Transforming LSB Substitution for Image-based Steganography in Matching Algorithms

Cheng-Hsing Yang and Shiuh-Jeng Wang............................................ Vol. 26, No. 4, pp. 1199-1212

 

data encryption

A Forward-Backward Secure Signature Scheme

Dai-Rui Lin, Chih-I Wang and D. J. Guan................................................ Vol. 26, No. 6, pp. 2319-2329

Anonymous Coexistence Proofs for RFID Tags

Nai-Wei Lo and Kuo-Hui Yeh................................................................. Vol. 26, No. 4, pp. 1213-1230

Blind Steganalysis of Mp3stego

Julio C. Hernandez-Castro, Juan E. Tapiador, Esther Palomar

and Angel Romero-Gonzalez................................................................. Vol. 26, No. 5, pp. 1787-1799

Identity-based Hierarchical Designated Decryption

Shu-Hui Chang, Chuan-Ming Li and Tzonelih Hwang............................ Vol. 26, No. 4, pp. 1243-1259

Mutual RFID Authentication Scheme for Resource-constrained Tags

Nai-Wei Lo and Kuo-Hui Yeh................................................................. Vol. 26, No. 5, pp. 1875-1889

New Secure Broadcasting Scheme Realizing Information Granularity

Chin-I Lee, Tzong-Chen Wu, Bo-Yin Yang and Wen-Guey Tzeng........ Vol. 26, No. 4, pp. 1509-1523

Secure Identity-Based Blind Signature Scheme in the Standard Model

Xiao-Ming Hu and Shang-Teng Huang................................................... Vol. 26, No. 1, pp. 215-230

Transitive Signature Scheme from LFSR

Zheng Gong, Zheng Huang, Weidong Qiu and Kefei Chen................... Vol. 26, No. 1, pp. 131-143

 

coding and information theory

Coding Algorithm Based on Loss Compression using Scalar Quantization Switching Technique and Logarithmic Companding

Zoran Peric, Aleksandar Mosic and Stefan Panic................................. Vol. 26, No. 3, pp. 967-976

Efficient Decoding of Systematic (23, 12, 7) and (41, 21, 9) Quadratic Residue Codes

Yan-Haw Chen, Chih-Hua Chien, Chien-Hsiang Huang, Trieu-Kien Truong

and Ming-Haw Jing................................................................................ Vol. 26, No. 5, pp. 1831-1843

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints

Hsin-Wen Wei, Wan-Chen Lu, Pei-Chi Huang, Wei-Kuan Shih

and Ming-Yang Kao............................................................................... Vol. 26, No. 2, pp. 333-346

 

miscellaneous

Practical Certificateless Aggregate Signatures from Bilinear Maps

Zheng Gong, Yu Long, Xuan Hong and Kefei Chen.............................. Vol. 26, No. 6, pp. 2093-2106

 

<theory of computation<

analysis of algorithms and problem complexity

A Fault-Containing Self-Stabilizing Algorithm for 6-Coloring Planar Graphs

Ji-Cherng Lin and Ming-Yi Chiu.............................................................. Vol. 26, No. 1, pp. 163-181

 

 

<mathematics of computing<

A Fuzzy Inventory System with Deteriorating Items under Supplier Credits Linked Ordering Quantity

Liang-Yuh Ouyang, Jinn-Tsair Teng and Mei-Chuan Cheng.................. Vol. 26, No. 1, pp. 231-253

 

<information systems<

An Efficient Handoff Protocol for Causal Ordering Group Communication in Wireless Hybrid Networks

Chih-Ming Hsiao and Ge-Ming Chiu........................................................ Vol. 26, No. 2, pp. 673-684

Partial Loss Probability of OVSF Single-code Assignment with Space-limited Batch Arrival Queues: M[2X]/M/c/c

Jui-Chi Chen........................................................................................... Vol. 26, No. 1, pp. 267-278

 

models and principles

Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication Protocol

Hanjae Jeong, Dongho Won and Seungjoo Kim..................................... Vol. 26, No. 5, pp. 1845-1858

 

database management

A Literature Overview of Fuzzy Conceptual Data Modeling

Z. M. Ma and Li Yan............................................................................... Vol. 26, No. 2, pp. 427-441

A Schema Based Approach to Valid XML Access Control

Changwoo Byun and Seog Park............................................................ Vol. 26, No. 5, pp. 1719-1739

Active Adjustment: An Effective Method for Keeping the TPR*-tree Compact

Sang-Wook Kim, Min-Hee Jang and SungChae Lim............................... Vol. 26, No. 5, pp. 1583-1600

Context-Adaptive Approach for Automated Entity Relationship Modeling

Sangwon Lee, Namgyu Kim, and Songchun Moon................................ Vol. 26, No. 6, pp. 2229-2247

 

information storage and retrieval

A Hierarchical Bitmap Indexing Method for Similarity Search in High-Dimensional Multimedia Databases

Jongho Nang, Joohyoun Park, Jihoon Yang and Saejoon Kim............... Vol. 26, No. 2, pp. 393-407

Hybrid Image Compression Based on Set-Partitioning Embedded Block Coder and Residual Vector Quantization

Sheng-Fuu Lin, Hsi-Chin Hsin and Chien-Kun Su.................................. Vol. 26, No. 3, pp. 1011-1027

Identifying Prototypical Melodies by Extracting Approximate Repeating Patterns from Music Works

Ning-Han Liu, Yi-Hung Wu and Arbee L. P. Chen.................................. Vol. 26, No. 4, pp. 1181-1198

Japanese-Chinese Information Retrieval With an Iterative Weighting Scheme

Chu-Cheng Lin, Yu-Chun Wang and Richard Tzong-Han Tsai.............. Vol. 26, No. 2, pp. 685-697

Processing Strategy for Global XQuery Queries Based on XQuery Join Cost

Jong-Hyun Park and Ji-Hoon Kang........................................................ Vol. 26, No. 2, pp. 659-672

 

information systems applications

Adaptive Dynamic Scheduling Algorithms for Mapping Ongoing M-Tasks to PR2 Grid

Cho-Chin Lin, Chun-Wei Shih and Chih-Hsuan Hsu............................... Vol. 26, No. 6, pp. 2107-2125

An Automated Term Definition Extration System Using the Web Corpus in the Chinese Language

Fang-Yie Leu and Chih-Chieh Ko........................................................... Vol. 26, No. 2, pp. 505-525

Enabling Intelligent Service Discovery with GGODO

Mariano Rico, Francisco Garcia-Sanchez, Juan M. Gomez, Rafael Valencia-Garcia

and Jesualdo T. Fernandez-Breis.......................................................... Vol. 26, No. 4, pp. 1161-1180

Fast Handoff among IEEE 802.11r Mobility Domains

Kuang-Hui Chi, Chien-Chao Tseng and Ya-Hsuan Tsai......................... Vol. 26, No. 4, pp. 1345-1362

 

information interfaces and presentation

User Interface Design for Public Kiosks: An Evaluation of the Taiwan High Speed Rail Ticket Vending Machine

Frode Eika Sandnes, Hua-Li Jian, Yo-Ping Huang and Yueh-Min Huang… Vol. 26, No. 1, pp. 307-321

 

miscellaneous

A Workflow Event Logging Mechanism and Its Implications on Quality of Workflows

Minjae Park and Kwanghoon Kim........................................................... Vol. 26, No. 5, pp. 1817-1830

Feature-based Product Review Summarization Utilizing User Score

Jung-Yeon Yang, Han-Joon Kim and Sang-Goo Lee............................ Vol. 26, No. 6, pp. 1973-1990

 

<Computing methodologies<

An Efficient Predictive Watershed Video Segmentation Algorithm Using Motion Vectors

Kuo-Liang Chung, Yah-Syun Lai and Pei-Ling Huang........................... Vol. 26, No. 2, pp. 699-711

On Parallelizing H.264/AVC Rate-Distortion Optimization Baseline Profile Encoder

Jing-Xin Wang, Yung-Chang Chiu, Alvin W. Y. Su and Ce-Kuen Shieh Vol. 26, No. 2, pp. 409-426

 

artificial intelligence

Limited Dominance-based Rough Set Model and Knowledge Reductions in Incomplete Decision System

Gong-Zhi Luo and Xi-Bei Yang.............................................................. Vol. 26, No. 6, pp. 2199-2211

SOA-based Service Layering for Facilitating Dynamic Service Composition and Alternative Service Discovery

Meeyeon Lee, Jung-Won Lee, Seung Soo Park and We Duke Cho....... Vol. 26, No. 3, pp. 991-1010

The Dual-Kalman Filtering and Neural Solutions to Maneuvering Estimation Problems

Yi-Nung Chung, Dend-Jyi Juang, Kuo-Chang Hu, Ming-Liang Li

and Kai-Chih Chuang............................................................................. Vol. 26, No. 4, pp. 1479-1490

Variant Methods of Reduced Set Selection for Reduced Support Vector Machines

Li-Jen Chien, Chien-Chung Chang and Yuh-Jye Lee............................. Vol. 26, No. 1, pp. 183-196

 

computer graphics

A 3D Painterly Rendering Framework for Photon Mapping

Meng-Tsan Li and Chung-Ming Wang.................................................... Vol. 26, No. 4, pp. 1379-1395

Effective Wet-in-Wet Flow Synthesis for Ink Diffusion

Ren-Jie Wang and Chung-Ming Wang................................................... Vol. 26, No. 4, pp. 1397-1411

Example-based Deformation Transfer for 3D Polygon Models

Hung-Kuo Chu and Chao-Hung Lin........................................................ Vol. 26, No. 2, pp. 379-391

GPU-based Collision Detection and Response for Particles on 3D Models

Hsien-Hsi Hsieh, Wen-Kai Tai and Chin-Chen Chang............................ Vol. 26, No. 5, pp. 1619-1635

Image Information Processing System for Hemispherical Screen With Dual 1080P High-Resolution Projectors

Chun-Hsien Huang and Chung-Ling Wu................................................ Vol. 26, No. 1, pp. 145-161

Texture Tiling on 3D Models Using Automatic Polycube-maps and Wang Tiles

Chin-Chen Chang and Chen-Yu Lin....................................................... Vol. 26, No. 1, pp. 291-305

 

imge processing and computer vision

A Compressed-Domain Image Watermarking Scheme with the SPIHT Coding

Shih-Hsuan Yang and Wu-Jie Liao........................................................ Vol. 26, No. 5, pp. 1755-1770

A Novel Spectral Clustering Method Based on Pairwise Distance Matrix

Chi-Fang Chin, Arthur Chun-Chieh Shih and Kuo-Chin Fan................... Vol. 26, No. 2, pp. 649-658

A Performance-Driven Rotational Invariant Image Retrieval System

Yen-Tai Lai, Chi-Chou Kao, Tzu-Chiang Tai and Wen-Chun Yeh........... Vol. 26, No. 6, pp. 2009-2022

An Adaptive Tone Mapping Method for Displaying High Dynamic Range Images

Jinhua Wang, De Xu, Congyan Lang and Bing Li................................... Vol. 26, No. 3, pp. 977-990

An Efficient Auto Focus Method for Digital Still Camera Based on Focus Value Curve Prediction Model

Li-Cheng Chiu and Chiou-Shann Fuh..................................................... Vol. 26, No. 4, pp. 1261-1272

Artistic Painting Style Transformation Using a Patch-based Sampling Method

I-Cheng Chang, Yu-Ming Peng, Yung-Sheng Chen

and Shen-Chi Wang............................................................................... Vol. 26, No. 4, pp. 1443-1458

Automatic Traffic Surveillance System for Vision-Based Vehicle Recogntion and Tracking

Chung-Cheng Chiu, Min-Yu Ku and Chun-Yi Wang............................... Vol. 26, No. 2, pp. 611-629

Calibration-Based Auto White Balance Method for Digital Still Camera

Li-Cheng Chiu and Chiou-Shann Fuh..................................................... Vol. 26, No. 2, pp. 713-723

Color Constancy Using Ridge Regression

Rui Lu, De Xu and Bing Li....................................................................... Vol. 26, No. 1, pp. 119-130

Connectivity Based Human Body Modeling from Monocular Camera

Chih-Chang Yu, Ying-Nong Chen, Hsu-Yung Cheng, Jenq-Neng Hwang

and Kuo-Chin Fan.................................................................................. Vol. 26, No. 2, pp. 363-377

Enhanced TV-based Quotient Image Model and Its Application to Face Recognition with One Sample per Subject Employing Subspace Methods

Gao-Yun An, Ji-Ying Wu and Qiu-Qi Ruan............................................ Vol. 26, No. 1, pp. 279-290

Frequency-Based Environment Matting of Transparent Objects Using Kaczmarz Method

I-Cheng Chang, Tian-Lin Yang and Chung-Lin Huang........................... Vol. 26, No. 4, pp. 1413-1428

High Quality Inverse Halftoning Using Variance Gain-, Texture- and Decision Tree-Based Learning Approach

Kuo-Liang Chung, Yong-Huai Huang and Kang-Chieh Wu.................... Vol. 26, No. 6, pp. 2213-2227

Linear Quadtree Construction in Real Time

Chi-Yen Huang and Yu-Wei Chen......................................................... Vol. 26, No. 5, pp. 1917-1930

Low-Cost Smart Projector for Home Entertainment

Wun-Yi Lee and Tsorng-Lin Chia........................................................... Vol. 26, No. 5, pp. 1637-1655

Particle Filter-based Multi-part Human Tracking with Failure Adjustment in Video Sequences

San-Lung Zhao and Hsi-Jian Lee.......................................................... Vol. 26, No. 6, pp. 2267-2281

Robust Image Watermarking Using Adaptive Structure Based Wavelet Tree Quantization

Gin-Der Wu and Pang-Hsuan Huang..................................................... Vol. 26, No. 3, pp. 1049-1071

Robust Tracking of Maneuvering Target with Appearance Variation in Infrared Images Sequence

Jiu-Qing Wan, Xiao-Qing Zhang and Jin-Song Yu................................. Vol. 26, No. 6, pp. 2023-2046

Spike Defect Detection and Removal on Aged Films

Rong-Chi Chang and Timothy K. Shih.................................................... Vol. 26, No. 5, pp. 1741-1753

Text Image Restoration using Adaptive Fuzzy Median Based on 3D Tensors and Iterative Voting

Jong-Hyun Park, Gerard G. Medioni and Guee-Sang Lee..................... Vol. 26, No. 3, pp. 1029-1048

Texture Compression and Relighting of 3-D Color Objects Using Singular Value Decomposition

I-Cheng Chang, Hsin-Yo Chou and Chung-Lin Huang........................... Vol. 26, No. 2, pp. 485-503

Visual Attention Region Detection Using Texture and Object Features

Hsuan-Ying Chen and Jin-Jang Leou.................................................... Vol. 26, No. 5, pp. 1657-1675

Visual Morphing Based on the Compressed Domain

Yiwei Jiang, De Xu, Na Liu and Congyan Lang..................................... Vol. 26, No. 6, pp. 2075-2091

 

Pattern recognition

3D Face Recognition Using Patched Locality Preserving Projections

Xue-Qiao Wang and Qiu-Qi Ruan.......................................................... Vol. 26, No. 6, pp. 2297-2307

An Orthogonal DLGE Algorithm With its Application to Face Recognition

Jiangfeng Chen and Baozong Yuan...................................................... Vol. 26, No. 5, pp. 1707-1718

Clustering Music Recordings Based on Genres

Wei-Ho Tsai and Duo-Fu Bao................................................................. Vol. 26, No. 6, pp. 2059-2074

Face Recognition Using L-Fisherfaces

Cheng-Yuan Zhang and Qiu-Qi Ruan.................................................... Vol. 26, No. 4, pp. 1525-1537

HIC: A Robust and Efficient Hyper-Image-Based Clustering for Very Large Datasets

Kun-Che Lu and Don-Lin Yang.............................................................. Vol. 26, No. 2, pp. 461-483

Particle Swarm Optimization for Semi-supervised Support Vector Machine

Qing Wu, San-Yang Liu and Le-You Zhang.......................................... Vol. 26, No. 5, pp. 1695-1706

Speaker Identification in Overlapping Speech

Wei-Ho Tsai and Shih-Jie Liao............................................................... Vol. 26, No. 5, pp. 1891-1903

Support Vector Regression Based on Adjustable Entropy Function Approach

Qing-Wu, San-Yang Liu and Le-You Zhang.......................................... Vol. 26, No. 6, pp. 2331-2339

 

simulation and modeling

Development of a Mandarin-English Bilingual Speech Recogntion System with Unified Acoustic Models

Qing-Qing Zhang, Jie-Lin Pan and Yong-Hong Yan.............................. Vol. 26, No. 4, pp. 1491-1507

Feature Construction Scheme for Efficient Intrusion Detection System

Eunhye Kim, Seungmin Lee, Kihoon Kwon and Sehun Kim................... Vol. 26, No. 2, pp. 527-547

 

document and text processing

A Layered Approach to the Polysemy Problems in a Chinese to Taiwanese TTS System

Yih-Jeng Lin, Ming-Shing Yu, Chin-Yu Lin and Yuan-Chun Lin............. Vol. 26, No. 5, pp. 1905-1915

Exploring Evolutionary Technical Trends From Academic Research Papers

Teng-Kai Fan and Chia-Hui Chang......................................................... Vol. 26, No. 1, pp. 97-117

 

<Computer applications<

A Greedy Two-stage Gibbs Sampling Method for Motif Discovery in Biological Sequences

Li-Fang Liu and Li-Cheng Jiao................................................................ Vol. 26, No. 6, pp. 2309-2318

Oriented Networks Design Problem

Jerome Galtier, Igor Pesek, Katja Prnaver and Janez Zerovnik............. Vol. 26, No. 4, pp. 1231-1242

Reduced Communication Costs via Network Flow and Scheduling for Partitions of Dynamically Reconfigurable FPGAs

Yung-Chuan Jiang and Jhing-Fa Wang................................................. Vol. 26, No. 2, pp. 565-583

 

Bioinformatics

Generating Remote Control Interface Automatically into Cellular Phone for Controlling Applications Running on PC

Deng-Jyi Chen, Shih-Jung Peng and Chin-Eng Ong............................... Vol. 26, No. 2, pp. 549-563

Reconstruction of Protein Backbone with the a-Carbon Coordinates

Jen-Hui Wang, Chang-Biau Yang and Chiou-Ting Tseng...................... Vol. 26, No. 3, pp. 1107-1119

Using Random Forest for Protein Fold Prediction Problem: An Empirical Study

Abdollah Dehzangi, Somnuk Phon-Amnuaisuk and Omid Dehzangi...... Vol. 26, No. 6, pp. 1941-1956

 

computer-aided engineering

FSM-Based Formal Compliance Verification of Interface Protocols

Che-Hua Shih, Ya-Ching Yang, Chia-Chih Yen, Juinn-Dar Huang

and Jing-Yang Jou................................................................................. Vol. 26, No. 5, pp. 1601-1617