Previous

1985~2006 Subject Index

[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M]

[N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

A

[][]ACCESS CONTROL

1.       A Pseudo-Key Scheme for Dynamic Access Control in a Hierarchy
Narn-Yih Lee and Tzonelih Hwang......Vol. 10, No.4, pp.601-610

ADVANCED DATABASE SYSTEMS

2.       A Localized Approach to Query Optimization in Heterogeneous Database Systems
Rauray S. M. Tsai and Arbee L. P. Chen......Vol.9, No.4, pp.605-623

3.       An Incremental Approach to Dynamic Hashing for Expansible Files
Ye-In Chang and Chien-I Lee......Vol.9, No.4, pp.495-521

4.       Performance Evaluation of Implementations in Temporal Object-Oriented Databases
Chih-Kuang Li and Shiwei Wang......Vol.9, No.4, pp.541-564

5.       Redundant Inheritance Detection for Object-Oriented Database
Ding-An Chiang, Chi-Ming Chung and Ming-Chi Lee......Vol.9, No.4, pp.523-540

6.       Schema Evolution through Changes to ER Diagrams
Chien-Tsai Liu, Panos K. Chrysanthis and Shi-Kuo Chang......Vol. 9, No.4, pp.657-683

7.       Strategies for Selection from Heterogeneous Relations
Chiang Lee and Cheng-Lun Tsai......Vol. 9, No.4, pp.587-604

8.       TBSAMlink: A Structure for Concurrent Operations on Statistical Data
F. Wu, J. K. Chen and Y. H. Chin......Vol. 9, No.4, pp.625-655

9.       The Design and Implementation of a Distributed Transaction Processing System
Shyan-Ming Yuan, Jiann-Hung Lin and Cheng-Yao Ni......Vol. 9, No.4, pp.565-586

Advanced Networks

10.    A High-Throughput Cell Scheduling Algorithm for Delay-Sensitive Traffic in Broadband Switching Systems
Wen-Tsuen Chen, Huai-Jen Liu and Yeong-Tsong Tsay......Vol. 8, No.4, pp.603-620

Algorithms

11.    (N5/6) Time Complexity of Fault Diagnosis Algorithms in NxN Dilated Blcoking Photonic Switching Networks
I-Shyan Hwang, Hung-Chang Lin and San-Nan Lee......Vol. 19, No.4, pp.653-665

12.    A Branch-and-Bound Algorithm for Reliability-Oriented Task Assignmentin Bus Network Systems
Rong-Hong Jan and Shiow-Ling Chen......Vol. 10, No.1, pp.81-97

13.    A Different Approach for Solving the Specified Diameter Partition Problem
Chiou-Kuo Liang, Chuan-Yi Tang and R. C. T. Lee......Vol. 9, No.3, pp.337-357

14.    A Fast Implementation for Recurrent DSP Scheduing Using Final Matrix
Daniel Y. Chao......Vol. 16, No.3, pp.391-421

15.    A Near-Quadratic Algoirthm for the Alpha-Connected Two-Center Problem
Po-Hsueh Huang, Yin-Te Tsai and Chuan-Yi Tang......Vol.22, No.6, pp.1317-1324

16.    A New Graph Invariant for Graph Isomorphism: Probability Propagation Matrix
Gow-Hsing King and Wen-Guey Tzeng......Vol.15, No.3, pp.337-352

17.    A Self-Organizing Genetic Algorithm With a Eugenic Strategy Optimization
Jorng-Tzong Horng, Ying-Ping Chen and Cheng-Yan Kao......Vol.17, No.1, pp.35-45

18.    A Theoretical Aspect of a Stochastic Sketching Method for Global Optimization
Jorng-Tzong Horng, Ying-Ping Chen and Cheng-Yan Kao......Vol.17, No.1, pp.47-71

19.    A Training Approach for Efficient VQ Codeword Search
J. S. Pan......Vol.15, No.3, pp.375-382

20.    Alogrithms for Imprecise Tasks With 0/1-Constaints
Kun-Ming Yu......Vol.17, No.1, pp.73-83

21.    Amortized Analysis of Disk Scheduling AlgorithmV(R)
Tung-Shou Chen and Wei-Pang Yang......Vol.8, No.2, pp.223-242

22.    An Efficient Algorithm for the Reliability of Consecutive-k-n Networks
Jen-Chun Chang, Rong-Jaye Chen and Frank K. Hwang..........Vol.19, No.1, pp.159-166

23.    An Extended Algorithm for Solving Special Tridiagonal Systems
Wen-Ming Yan and Kuo-Kiang Chung......Vol.12, No.3, pp.467-480

24.    An Optimal Algorithm for Edge Searching an Interval Graph
Ruay Shiung Chang......Vol. 9, No.3, pp.421-430

25.    Asymmetric High-Radix Signed-Digit Number Systems for Carry-Free Addition
Shao-Hui Shieh and Cheng-Wen Wu..........Vol.19, No.6, pp.1015-1039

26.    Bottleneck Domination and Bottleneck Independent Domination on Graphs
William Chung-Kung Yen......Vol. 18, No.2, pp.311-331

27.    Clustering Algorithm for Network Partitioning with a Hypergraph Model
Jing Lee, Jung-Hua Chou and Shen-Li Fu......Vol. 9, No.3, pp.359-378

28.    Computational Geometry on the Broadcast Communication Model
Chang-Biau Yang.......Vol.15, No.3, pp.383-395

29.    Computing the Minimum Directed Distances Between Convex Polyhedra
Ching-long Shih and Jane-Yu Liu......Vol.15, No.3, pp.353-373

30.    Construction N£^ Latin Squares for£^¡Ú2£\
Shian-Shyong Tseng, Bertrand M.T. Lin and Sue Huei Liu......Vol.13, No.4, pp. 605-613

31.    Efficient and Complete Coverage of 2D Environments by Connectivity Graphs for Motion Planning Algorithms
Leena Lulu and Ashraf Elnagar......Vol.22, No.6, pp.1355-1366

32.    Efficient Parallel Algorithms for Finding the Majority Element
Chin-Laung Lei and Horng-Twu Liaw......Vol. 9, No.2, pp.319-334

33.    Efficient Prefix Computation on Faulty Hypercubes
Yu-Wei Chen and Kuo-Liang Chung......Vol.17, No.1, pp.1-21

34.    FasterDSP: A Faster Approximation Algorithm for Direted Steiner Tree Problem
Ming-I Hsieh, Eric Hsiao-Kuang Wu and Meng-Feng Tsai......Vol.22, No.6, pp.1409-1425

35.    Fuzzy palmer Scheduling for Flow Shops with More than Two Machines
Tzung-Pei Hong and Tzung-Nan Chuang......Vol.15, No.3, pp.397-406

36.    Graph Embedding Aspect of IEH Graphs
Hung-Yi Chang and Rong-Jaye Chen......Vol.17, No.1, pp.23-33

37.    Hamiltonian Cycle Problem on Distance-Hereditary Graphs
Ruo-Wei Hung, Shaur-Ching Wu and Maw-Shang Chang..........Vol.19, No.5, pp.827-838

38.    Heuristic Algorithm for Optimal Design of the Two-Level Wireless ATM Network
Der-Rong Din and S. S. Tseng......Vol.17, No.4, pp.647-665

39.    Knitting Technique with TP-PT Generations for Petri Net Synthesis
Daniel Yuh Chao......Vol.22, No.4, pp.909-923

40.    Maximum and Minimum Matchings for Seriew-Parallel Networks
Shih-Yih Wang and Lih-Hsing Hsu......Vol.12, No.1, pp.127-142

41.    Multicast Routing Based on Genetics Algorithms
Ren-Hung Hwang, Wei-Yuan Do and Shyi-chang Yang......Vol. 16, No.6, pp.885-901

42.    On the Performance Guarantees of the Minimum Multisets Binding (MMB) Problem
Yuan-Long Jeang, Jhing-Fa Wang and Jau-Yien Lee......Vol. 7, No.2, pp.203-215

43.    Optimal Algorithm for Matrix Transpose on Wormhole-Switched Meshes
Jyh-Jong Tsay, Kuo-Shun Ding and Wen-Tsong Wang..........Vol.19, No.1, pp.167-177

44.    Optimal k-Fault-Tolerant Networks for Token Rings
Ting-Yi Sung, Tung-Yang Ho, Chien-Ping Chang and Lih-Hsing Hsu......Vol. 16, No.3, pp.381-390

45.    Performance Assessment of Fuzzy Logic Control Routing Algorithm with Different Wavelength Assignments in DWDM Networks
I-Shyan Hwang, San-Nan Lee and I-Cheng Chang......Vol.22, No.2, pp.461-473

46.    Parallel Decomposition of Generalized Series-Parallel Graphs
Chin-Wen Ho, Sun-Yuan Hsieh and Gen-Huey Chen......Vol.15, No.3, pp.407-417

47.    Shortest Weighted Length Addition Chains
Yuh-Jiun Chen, Chin-Chen Chang and Wei-Pang Yang......Vol. 11, No.2, pp.295-305

48.    Triangle Graphs and Simple Trapezoid Graphs
Yaw-Ling Lin......Vol. 18, No.3, pp.467-473

49.    Uni-directional Alternating Group Graphs
Jung-Sing Jwo and Tai-Ching Tuan......Vol.15, No.3, pp.419-427

50.    Using Conflicts to Derive Efficient Algorithms on the Single-Channel Broadcast Communication Model
Chuan Yi Tang and Yuh Hann Liang......Vol.8, No.2, pp.187-206

Approximation

51.    Parallel Algorithms for Solving Linear Systems on Hypercube Computers
Wen-Tsuen Chen and Ruey-Feng Chang......Vol. 5, No.2, pp.123-142

Artificial Intelligence

52.    A Category-Theoretic Treatment of Automated Theorem Proving
Maria Paola Bonacina and Jieh Hsiang......Vol.12, No.1, pp.101-125

53.    A Classification Tree Based on Discriminant Functions
Been-Chain Chien, Jung-Yi Lin and Wei-Pang Yang......Vol.22, No.3, pp.573-594

54.    A Genetics-Based Approach to Knowledge Integration and Refinement
Ching-Hung Wang, Tzung-Pei Hong and Shian-Shyong Tseng......Vol.17, No.1, pp.85-94

55.    A Knowledge-Based Approach to the Rapid Prototyping of Data Intensive Software
Pei-Min Chen and Ching-Roung Chou......Vol.5, No.3, pp.179-212

56.    A New Algorithm for Deterministic Parsing and Its Application to Grammar and Style Checking
Rey-Long Liu and Von-Wun Soo......Vol.10, No.3, pp.369-385

57.    A New Apprach to Verifying Conceptual Models
Jonathan Lee and Lein F. Lai......Vol.14, No.2, pp.347-367

58.    A New Efficient Encoding Mode of Genetic Algorithm for the Generalized Plant Allocation Problem
Young-Chang Hou and Ying-Hua Chang......Vol.20, No.5, pp.1019-1034

59.    A New Environment for Developing Fuzzy Expert Systems
Gwo-Jen Hwang......Vol.15, No.1, pp.53-69

60.    A New Hybrid Learning Algorithm for Non-Linear Boundaries
Ching-Hung Wang, Tzung-Pei Hong and Shian-Shyong Tseng......Vol.14, No.2, pp.305-325

61.    A Temporal Arithmetic Based Reasoning System for Systolic Array Designs
Timothy K. Shih and Nam Ling......Vol.10, No.3, pp.317-338

62.    Adapting Crossover and Mutation Rates in Genetic Algorithms
Wen-Yang Lin, Wen-Yang Lee and Tzung-Pei Hong..........Vol.19, No.5, pp.889-903

63.    An Object-Oriented Approach to Knowledge Acquisition
Bingchiang Jeng and Meng Chang Chen......Vol.13, No.4, pp. 563-583

64.    Automatic Rule Base Inspection for Data-Access Oriented Knowledge-Based Systems
Fang-Yie Leu and Chien-Chiao Yang......Vol. 7, No.1, pp.53-79

65.    Automatically Adjusting Crossover Ratios of Multiple Crossover Operators
Tzung-Pei Hong and Hong-Shung Wang......Vol.14, No.2, pp.369-390

66.    Case Instance Generation and Refinement for Case-Based Criminal Summary Judgments in Chinese
Chao-Lin Liu, Cheng-Tsung Chang and Jim-How Ho......Vol.20, No.4, pp.783-800

67.    Completeness of the LELS Inference Rule in Automated Theorem Proving
Chung-Hsuen Jeff Ho......Vol.15, No.1, pp.153-164

68.    Design and Implementation of a Computer Go Program Archmage 1.1
Shun-Chin Hsu, Jeng-Chi Yan and Hongsen Chang......Vol.10, No.2, pp.239-258

69.    Design of a Parallel Theorem Prover for First Order Logic
Wen-Tsuen Chen, Tzren-Ru Chou, Kuen-Rong Hsieh and Huai-Jen Liu......Vol. 7, No.3, pp.385-403

70.    Design of a Self-Adaptive Brain Tumor Diagnostic System
Ching-Hung Wang, Shian-Shyong Tseng and Tzung-Pei Hong......Vol.11, No.2, pp.275-294

71.    Evidential Relaxation Labeling Scheme to Perform Non-Monotonic and Uncertain Reasoning
Wei-Chang Lin and Von-Wun Soo......Vol.10, No.2, pp.159-176

72.    Generating Logical Forms of Chinese Sentences
Hsin-His Chen and Hsin-Ming Yang......Vol.10, No.3, pp.295-316

73.    Generating Weighted Fuzzy Rules from Training Instances using Genetic Algorithms to Handle the Iris Data Classification Problem?
Shyi-Ming Chen and Hao-Lin Lin......Vol.22, No.1, pp.175-188

74.    Knowledge Elicitation and Integration from Multiple Experts
Gwo-Jen Hwang......Vol.10, No.1, pp.99-109

75.    Knowledge Validation in Eliciting Implicit Expertise under Uncertainty
Gwo-Jen Hwang......Vol.10, No.4, pp.587-600

76.    Network Tournament Pedagogical Approach Involving Game Playing in Artificial Intelligence
Ming-Da Wu, Ying-Hong Liao and Chuen-Tsai Sun..........Vol.19, No.4, pp.589-603

77.    Primal-Dual Version Spaces for Acquisition of Disjunctive Concepts
Tzung-Pei Hong and Shian-Shyong Tseng......Vol.14, No.2, pp.327-345

78.    Ranking Genes for Discriminability on Microarray Data
Han-Yu Chuang, Huai-Kuang Tsai, Yuan-Fan Tsai and Cheng-Yan Kao..........Vol.19, No.6, pp.953-966

79.    Recognition of Semantically Inconsistent Rules by Back-Propagation
Li-Min Fu......Vol.5, No.3, pp.213-228

80.    Rules Generation From the Decision Tree
Ding-An Chiang, Wei Chen, Yi-Fan and Lain-Jinn Hwang......Vol.17, No.3, pp.325-339

81.    SPEC: A Specification Processing Environment with Controls
Timothy Kuo-Chen Shih and Ruth E. Davis......Vol.10, No.4, pp.495-526

82.    Temporal Knowledge Management in IB-TEMPLOG
Hsin-Hsi Chen and Cheng-Hsih Chang......Vol. 7, No.3, pp.437-457

83.    Vague Reasoning and Knowledge Repressentation Using Extended Fuzzy Petri Nets
Shyi-Ming Chen and Yuh-shih Shiau......Vol.14, No.2, pp.391-408

B

Bioinformatics

84.    A Computational Approach to Discover Differential Cooperation of Regulatory Sites in Functionally Related Genes in Yeast Genome
Jorng-Tzong Horng, Hsien-Da Huang, Tsung-Shan Tsou, Jing-Yue Hong and Baw-Jhiune Liu......Vol.20, No.6, pp.1141-1159

85.    A Data Mining Method to Predict Transcriptional Regulatory Sites Based on Differentially Expressed Genes in Human Genome
Hsien-Da Huang, Huei-Lin Chang, Tsung-Shan Tsou, Baw-Jhiune Liu and Jorng-Tzong Horng..........Vol.19, No.6, pp.923-942

86.    An Efficient Approach to Identifying and Validating Clusters in Multivaritate Datasets with Applications in Gene Expression Analysis
Vincent Shin-Mu Tseng and Ching-Ping Kao......Vol.20, No.4, pp.665-677

87.    Finding Regularity in Various Types of Secondary Protein Structures
Yen-Wei Chu and Jinn-Moon Yang..........Vol.19, No.6, pp.943-952

88.    Mining Correlations of Human Gene Expression from Digital Gene Expression Profiles
Jorng-Tzong Horng, Hsien-Da Huang, Kuo-Yen Tseng, Tsung-Shan Tsou, Baw-Jhiune Liu and Cheng-Yan Kao..........Vol.19, No.6, pp.909-921

89.    Ranking Genes for Discriminability on Microarray Data
Han-Yu Chuang, Huai-Kuang Tsai, Yuan-Fan Tsai and Cheng-Yan Kao..........Vol.19, No.6, pp.953-966

C

Chinese Information Processing

90.    A Chinese Character Retrieval Scheme Using Shuang Pinyin
Jen-Nan Chen and Chin-Chen Chang......Vol. 8, No.3, pp.487-507

91.    A Linguistic Approach to a Chinese Query Sections
Tyne Liang and Tzyy-Chyang Wu......Vol.17, No.1, pp.113-132

92.    A Locally Adaptive Coding Scheme for Chinese Text Files
Henry Ker-Chang Chang and Shing-Hong Chen......Vol. 11, No.1, pp.51-71

93.    A Stroke-Based Handwritten Chinese Character Recognition System Using Greedy Matching Method
Ai-Jia Hsieh, Kuo-Chin Fan, Tzu-I Fan and Chin-Wen Ho......Vol.11, No.1, pp.1-22

94.    A Study on Chinese Carbon-Signature Recognition
Sheng-Fuu Lin, Yu-Wei Chang and Chien-Kun Su......Vol. 18, No.2, pp.257-280

95.    A Vowel-Driven Connected Mandarin Digit Recognition System
Ruey-Ching Shyu, Jhing-Fa Wang, Chaug-Ching Huang, Chung-Hsien Wu and Jau-Yien Lee......Vol.12, No.3, pp.365-379

96.    Approximating False Hits of Disyllabic Terms in a Chinese Signature
Tyne Liang, Suh-Yin Lee and Wei-Piang Yang......Vol. 11, No.1, pp.35-49

97.    Different Probabilistic Language Models for Natural Language Generation: Comparison and Combination
Hsin-Hsi Chen and Yue-Shi Lee......Vol. 11, No.1, pp.89-108

98.    Error-Correcting Isomorphism of Directed Graphs by Genetic-Based Search
Yuan-Kai Wang, Kuo-Chin Fan and Jorng-Tzong Horng......Vol.11, No.1, pp.127-151

99.    Extracting Chinese Frequent Strings Without Dictionary From a Chinese Corpus and its Applications
Yih-Jeng Lin and Ming-Shing Yu......Vol. 17, No.5, pp.805-824

100.Neural Network Learning and Encoding of Thematic Role Assignments in Parsing of Simple Chinese Sentences
Koong H. C. Lin, Tung-Bo Chen and Von-Wun Soo......Vol. 11, No.1, pp.109-126

101.Speaker Identification Based on Continuous Mandarin Digits Using Small Training Data and Fast Algorithms
Chung-Hsien Wu, Jau-Hung Chen and Jhing-Fa Wang......Vol. 11, No.1, pp.73-87

102.Speeding up Contextual Postprocessing by Using a Dictionary with Compressed Two-Character Indices
Cheng-Huang Tung and Hsi-Jian Lee ......Vol.11, No.1, pp.23-34

Chinese Recognition

103.Handwritten Chinese Character Recognition Using Stroke Structural Sequence Code
Chi-Wei Lee and Zen Chen......Vol.13, No.4, pp. 631-648

Coding and Information Theory

104.A Modified Approach to Determine the Most Appropriate Spreading Codes for a DS/CDMA System with Exponentially Weighted Despreading Sequences
Cebrail Ciftlikli and Ibrahim Develi..........Vol.19, No.6, pp.1041-1057

105.Faster Implementation of Canonical Minimum Redundancy Prefix Codes
Kuo-Liang Cheng and Jung-Gen Wu......Vol. 17, No.2, pp.341-345

Communication Networks

106.Media Access Protocol Impact on a WDMA Passive Star Photonic Network with Distributed Shared Memory System
I-Shyan Hwang and Patrick W. Dowd......Vol.11, No.3, pp.345-369

107.Overflow Process Approximations in a Multi-Class Isochronous Traffic Environment
Chien-Hwa Chiou, Zsehong Tsai and Jin-Fu Chang......Vol.11, No.3, pp.323-343

Communication Protocol

108.A Mulit-Event-One-Transition Plus Incremental Processing Protocol Verification Method
Chung-Ming Huang, Huei-Yang Lai and Duen-Tay Huang......Vol.12, No.2, pp.215-241

Compiler

109.A Lattice Framework for Analyzing Context-Free Languages with Applications in Parser Simplification and Data-Flow Analysis
Wuu Yang......Vol.15, No.2, pp.287-306

110.A Release Combined Scheduling Scheme for Non-Uniform Dependence Loops
Der-Lin Pean, Huey-Ting Chua and Cheng Chen......Vol. 18, No.2, pp.223-255

111.An Optimized Three Region Partitioning Technique to Maximize Parallelism of Nested Loops With Non-uniform Dependences
Der-Lin Pean and Cheng Chen......Vol. 17, No.3, pp.463-489

112.Constructing a Language-Based Editor With Object-Oriented Techniques
Chung-Hua Hu, Feng-Jian Wang, and Jei-Chung Wang......Vol.11, No.4, pp.541-565

113.Locating Free Positions in LR(k) Grammars
Shih-Ting Ouyang, Pei-Chi Wu and Feng-Jian Wang......Vol. 18, No.3, pp.411-423

114.Register Allocation Via Dynamically Updated Information
Feipei Lai, Chia-Cheng Yeh and Hung-Chang Lee......Vol.8, No.3, pp.393-413

Compiler Techniques for High-Performance Computing

115.Algorithmic Concept Recognition Support for Automatic Parallelization: A Case Study on Loop Optimization and Parallelization
Beniamino Di Martino......Vol.14, No.1, pp. 191-203

116.An Interprocedural Framework for Determining Efficient Array Data Redistributeions
S.K.S. Gupta and S. Drishnamurthy......Vol.14, No.1, pp.27-51

117.Compiler Techniques for Minimizing Link Contention of Linear-Constant Communication onk-aryn-cubes
Chien-Min Wang, Yomin Hou and Chiu-Yu Ku......Vol.14, No.1, pp.53-78

118.Design and Implementation of a Communication-Efficient Data-Parallel Program Compiling System
Kuei-Ping Shih, Ching-Ying Lai, Jang-Ping Sheu and Yu-Chee Tseng......Vol. 17, No.5, pp.825-839

119.Determining the Idle Time of a Tiling: New Results
Frederic Desprez, Jack Dongarra, Fabrice Rastello and Yves Robert......Vol.14, No.1, pp. 167-190

120.Efficient Run-Time Parallelization for DO Loops
Chao-Tung Yang, Shian-Shyong Tseng, Ming-Huei Hsieh and Shih-Hung Kao......Vol.14, No.1, pp. 237-253

121.Efficient Run-Time Scheduling for Parallelizing Partially Parallel Loops
Tsung-Chuan Huang, Po-Hsueh Hsu and Tze-Nan Sheng......Vol.14, No.1, pp. 255-264

122.Integrating Parallelizing Compilation Technology and Processor Architecture for Cost-Effective Concurrent multithreading
Jenn-Yuan Tsai, Zhenzhen Jiang, Zhiyuan Li, David J. Lilja, Xin Wang, Pen-Chung Yew, Bixia Zheng and Stephen J. Schwinn......Vol.14, No.1, pp. 205-222

123.KU-Loop Scheme: An Efficient Loop Unfolding Scheme for Multithreaded Computation
Sanngho Ha and Heunghwan Kim......Vol.14, No.1, pp. 223-236

124.Locality Optimization Algorithms for Compilation of Out-of-Core Codes
M. Kandermir, A. Choudhary, J.Ramanujam and M. Kandaswamy......Vol.14, No.1, pp. 107-138

125.On the Effectiveness of Compiler-Time Scheduling Approaches for Distributed Memory Multiprocessor
Jing-Chiou Liou and Michael A. Palis......Vol.14, No.1, pp.7-26

126.Reducing Register Pressure in Software Pipelining
Fermin Sanchez and Jordi Cortadella......Vol.14, No.1, pp. 265-279

127.Replication and Partitioning for Data Arrays in Distributed Memory Systems
Sheng-De Wang and Wei-Der Jwo......Vol.14, No.1, pp. 281-298

128.Simulated Evolution Based Parallel Code Generation for Programmable DSP Processors
Yin-Tsung Hwang and Jer-Sho Hwang......Vol.14, No.1, pp. 139-165

129.Supporting Efficieent Tree Structures for Distributed Scientific Computation
Pangfeng Liu and Jan-Jan Wu......Vol.14, No.1, pp. 79-105

Computer Aided Design

130.A Branch-and-Bound Algorithm for Single-Row Routing
Rong-Jaye Chen and Yu-Song Hou......Vol.7, No.3, pp.335-345

131.A Linear Time Algorithm for Planar Moat Routing
Chia-Chun Tsai and Sao-Jie Chen......Vol.10, No.1, pp.111-127

132.Logic Rewiring for Dealy and Power Minimization
Andreas Veneris......Vol.20, No.6, pp.1231-1238

Computer Aided Engineering

133.An H-V Tile-Expansion Router
Chia-Chun Tsai, Sao-Jie Chen and Wu-Shiung Feng......Vol.6, No.3, pp.173-189

Computer and Education

134.A Computer-Assisted Approach to Diagnosig Student Learning Problems in Science Courses
Gwo-Jen Hwang, Chia-Lin Hsiao and Judy C. R. Tseng..........Vol.19, No.2, pp.229-248

135.A New Courseware Diagram for Quantitative Measurement of Distance Learning Courses
Flora Chia-I Chang, Lun-Ping Hung and Timothy K. Shih..........Vol.19, No.6, pp.989-1014

136.Effective Two-Phase Cooperative Learning on the WWW
Bin-Shyang Jong, Tsong-Wuu Lin, Yu-Lung Wu and Te-Yi Chan......Vol.22, No.2, pp.425-446.

137.The Design of a Synchronous Virtual Writing Clinic
Chin-Hwa Kuo, David Wible, Meng-Chang Chen, Li-Chun Sung and Chia-Lin Chio..........Vol.19, No.2, pp.249-265

Computer Applications

138.A Software Tool for Fault Tolerance
Goutam Kumar Saha......Vol.22, No.4, pp.953-964

139.A Portable Auto Attendant System With Sophisticated Dialog Structure
Jhing-Fa Wang and Hsien-Chang Wang......Vol. 18, No.4, pp.627-636

140.An Anonymous Endorsement System
Wei-Chi Ku and Sheng-De Wang......Vol. 18, No.1, pp.107-114

141.Interest-Based Lookup Protocols for Mobile Ad Hoc Networks
Yi-Chung Chen and Jang-Ping Sheu......Vol.22, No.6, pp.1427-1445

142.The Design and Implementation of Realistic Fish Animation Play System Using Video Sequence
Tong-Yee Lee and Hung-Yi Chen..........Vol.19, No.6, pp.1071-1085

Computer Architecture

143.A Case Study: Synthesis and Exploration of Instruction Set Design for Application-Specific Symbolic Computing
Ing-Jer Huang......Vol.14, No.4, pp.821-842

144.A New Class of Cache Memory Controllers
Adnan Shaout and Larry Colagiovanni......Vol. 17, No.5, pp.841-855

145.A Parallel Approach for Embedding Large Pyramids Into Smaller Hypercubes With Load Balancing
Yu-Wei Chen and Kuo-Liang Chung......Vol. 16, No.1, pp.117-126

146.A Power-Aware Motion Estimation Architecture using Content-based Subsampling
Hsien-Wen Cheng and Lan-Rong Dung......Vol.22, No.4, pp.799-818

147.Adaptive Multi-Grain Remote Access Cache in Ring Based NUMA System
Jong Wook Kwak and Chu Shik Jhon......Vol.22, No.6, pp.1543-1554

148.Advanced High-Level Cache Management by Processor Access Information
Jong Wook Kwak, Cheo Hong Kim, Sunghoon Shim and Chu Shik Jhon......Vol.22, No.1, pp.215-227

149.Aggressive Scheduling for Memory Accesses of CISC Superscalar Microprocessors
R-Ming Shiu, Hiu-Yue Hwang and Jean Jhy-Jiun Shann......Vol. 17, No.5, pp.787-803

150.An Optimal Matched and Parallel Mixed-Radix Converter
Hao-Yung Lo......Vol.10, No.3, pp.411-421

151.Design of Instruction Address Queue for High Degree X86 Superscalar Architectures
Jih-Ching chiu, Michael Jin-Yi Wang and Chung-Ping Chung......Vol. 18, No.3, pp.393-409

152.Effectvie Branch Prediction through Caching of Aliasing Branches
Wei-Ming Lin and An-Yi Yang......Vol.20, No.4, pp.557-574

153.Energy Efficient Caching-on-Cache Architectures for Embedded Systems
Hung-Cheng Wu, Tien-Fu Chen, Hung-Yu Li and Jinn-Shyan Wang..........Vol.19, No.5, pp.809-825

154.Performance of Shared Caches on Multithreaded Architectures
Yunn-Yen Chen, Jih-Kwon Peir and Chung-Ta King......Vol.14, No.2, pp.499-514

155.Practical Capacity and Attraction Radix Analysis of Exponential Bidirectional Associative Memory
Chua-Chin Wang......Vol. 12, No.4, pp.511-523

156.Techniques for The Efficient Analysis of Cache Performance
Tien-Fu Chen......Vol. 12, No.4, pp.483-509

Computer Communications

157.VP Layout Planning in Survivable ATM Networks
Cheng-Shong Wu and Shi-Wei Lee......Vol.15, No.1, pp.71-89

Computer Communication Networks

158.A Fast Optimal Non-Continuous Slot Reuse Scheme for CRMA High-Speed Networks
Pi-Rong Sheu and Charng-Maw Lin......Vol. 17, No.2, pp.217-228

159.A Lazy Caching Location Strategy with Bypass Pointers in PCS
SinLing Lee, Hwa-Chuan Lin and Pei-Xian Kou......Vol.20, No.4, pp.617-641

160.A Novel Application of the Phone Card and Its Authentication in Mobile Communications
C. H. Lee, M. S. Hwang and W. P. Yang......Vol.15, No.4, pp.471-484

161.A Packet Switch for Broadband ISDN
Cheng-Ming Weng and Hsu-Feng Cheng......Vol. 6, No.3, pp.239-265

162.Ad Hoc On-Demand Backup Node Setup Routing Protocol
Ying-Hong Wang and Chih-Chieh Chuang......Vol.20, No.5, pp.821-843

163.Adaptive Slot Allocation to Control Queueing Delaying in TDMA Wireless Base Station
Mong-Fong Horng, Yau-Hwang Kuo, Jang-Pong Hsu and Ren-Hao Cheng......Vol.20, No.5, pp.845-868

164.An Efficient Probabilistic Dynamic Multicast Routing in ATM Networks
Kuochen Wang and Jun-Hung Chen......Vol.15, No.4, pp.485-504

165.An Efficient Authentication Protocol for Mobile Networks
Shiuh-Pyng Shieh, Fu-Shen Ho and Yu-Lun Huang......Vol.15, No.4, pp.505-520

166.An Evaluation of Deficit Round Robin Fair Queuing Applied in Router Congestion Control
Jung-Shian Li......Vol. 18, No.2, pp.333-339

167.Constructing Delay-Bounded Multicast Trees in Computer Networks
Lih-Chyau Wuu, Long Song Lin and Shing-Chyi Shiao......Vol. 17, No.3, pp.507-524

168.An Integrated Voice/Data Protocol for Token Ring Networks with Fair Accesses
Wen-Tsuen Chen, Rong-Ruey Lee, Jiunn-Hwa Yu and Ching-Ho Huang......Vol.7, No.1, pp.81-100

169.Design and Analysis of an ATM Switch With Priority Discarding Scheme
Kuochen Wang and Hsin-Jung Wang......Vol. 17, No.2, pp.229-243

170.Design and Implementation of a Fault Tolerant ATM Switch
Kuochen Wang and Feng-Ming Lin.......Vol.15, No.4, pp.521-541

171.Effective Intrusion Detection Model through the Combination of a Signature-based Intrusion Detection System and a Machine Learning-based Intrusion Detection System
Ill-Young Weon, Doo Heon Song and Chang-Hoon Lee......Vol.22, No.6, pp.1447-1464

172.Multipath QoS Routing with Interference Provision in Ad Hoc Wireless Network
Ying-Hong Wang Hung-Zu Lin......Vol.22, No.6, pp.1325-1338

173.Optimal Bandwidth Allocations for VoIP Latency Guarantees
Reu-Ching Chen, Wei-Tsong Lee and Jim-Min Lin......Vol.20, No.5, pp.869-884

174.Petri Net Synthesis and Synchronization Using Knitting Technique
Daniel Y. Chao......Vol.15, No.4, pp.3543-568

175.Profile-Based Lifetime Determination Schemes for Mobility Management in HMIPv6
Sun Ok Yang, SungSuk Kim and chong-Sun Hwang......Vol.22, No.3, pp.659-674?

176.Survivability Performance Analysis of Rerouting Schemes in an ATMVP Mesh Transport Networks
Kyamakya Kyandoghere......Vol. 17, No.2, pp.191-216

177.The Transfer Delays and Buffer Requirements in a General Cut-through Switching Network under Two Error Control Strategies
Chung-Ju Chang and Jin-Ing Wang......Vol.7, No.3, pp.423-436

178.Threat Evaluation Method for Distributed Network Environment
Keun-Hee Han, Il-Gon Kim, Kang-Won Lee, Jin-Young Choi and Sang-Hun Jeon......Vol.22, No.4, pp.889-907

179.Window Adaptvie TCP for EGPRS Networks
duan-Shin Lee and Chia-Chun Lin......Vol.20, No.5, pp.805-820

Computer Graphics and Virtual Reality

180.A Fuzzy-based Approach to Mesh Simplification
Chin-Chen Chang, Shu-Kai Yang, Ding-Zhou Duan and Ming-Fen Lin......Vol. 18, No.3, pp.333-339

181.A Novel Cache-based Approach to Large Polygonal Mesh Simplification
Hung-Kuang Chen, Chin-Shyurng Fahn, Jeffrey J. P. Tsai and Ming-Bo Lin......Vol.22, No.4, pp.843-861

182.An Efficient and Stable Ray Tracing Algorithm for Parametric Surfaces
Shyue-Wu Wang, Zen-Chung Shih and Ruei-Chuan Chang......Vol. 18, No.4, pp.541-561

183.An Efficient Edge-Based Compression Algorithm for 3D Models with Holes and Handles
Bin-Shyan Jong, Wen-Hao Yang and shawan Song......Vol.22, No.2, pp.401-423

184.An Object-Oriented Graphics System Adopting User Interface Management Techniques
Yin-Hsong Hsu, Yue-Sun Kuo and Chyan-Goei Chung......Vol.10, NO.3, pp.339-367

185.Aesthetic Measures for Assessing Graphic Screens
David Chek Ling Ngo, Azman Samsudin and Rosni Abdullah......Vol. 16, No.1, pp.97-116

186.Automatic Generation of Shape Preserving Curves by a Dynamic Tangent Algorithm
Jenn-Hua Lee......Vol.8, No.1, pp.121-130

187.Botanical Tree Construction by Parameters
Der-Baau Perng, Din-Hoo Tsai and Ahn-Ying Lee......Vol.10, No.2, pp.203-219

188.Boundary Control of Subdivision Using Open Uniform Quadratic Subdivision Scheme
Wei-Chung Hwang and Jung-Hong Chuang..........Vol.19, No.5, pp.745-763

189.Hierarchical Feature-Based Volume Morphing
Hao-Ren Ke, Yu-Pao Tsai and Zen-Chun Shih......Vol. 18, No.1, pp.85-106

190.N-Sided Hole Filling and Vertex Blending Using Subdivision Surfaces
Wei-Chung Hwang and Jung-Hong Chuang..........Vol.19, No.5, pp.857-879

191.Charging the Internet Without Bandwidth Reservation: An Overview and Bibliograpy of Mathematical Approach
Bruno Tuffin..........Vol.19, No.5, pp.765-786

192.Non-Photorealistic Rendering for Aesthetic Virtual Environments
Chung-Ming Wang and Jiunn-Shyan Lee......Vol.20, No.5, pp.923-948

193.On the Clustering of Head-Related Transfer Functions Used for 3-D Sound Localization
Chin-Shyurng Fahn and Yueh-Chuan Lo..........Vol.19, No.1, pp.141-157

194.Practice and Experience: Interactive Rendering of the Colonic Environment on PC-platforms
Tong-Yee Lee, Ping-Hsien Lin and Chao-Hung Lin......Vol. 17, No.1, pp.297-312

195.Provide Multicast Service in a Combined IntServ and DiffServ Environment
Heng-Chi Su and Ren-Hung Hwang..........Vol.19, No.4, pp.615-636

196.Surface Rendering for Multi-axial Cross Sections
Ming-Dar Tsai and Ming-Shium Hsihe......Vol. 17, No.1, pp.113-132

197.The Modeling and Animation of Human Hair
Zen-Chung Shih and Hurng-Dar Guo......Vol.11, No.3, pp.465-488

Computer Hardware

198.Hybrid ROM Strategy (H-ROM) for Conversion Between Binary Numbers and Logarithms
Hao-Yung Lo, Hsiu-Feng Lin and Chiang-Shiang Wan......Vol.10, No.1, pp.51-69

Computer Methodologies

199.A Programming?Methodology for Designing Block Recursive Algorithms??
Min-Hsuan Fan, Chua-Huang Huang, Yeh-Ching Chung, Jen-Shiuh Liu and Jei-Zhii Lee......Vol.22, No.1, pp.95-121

Computer Networks

200.An Asymmetrical Polling System with Noncyclic Service Order and Nonexhaustive Service Discipline
Chung-Ju Chang, I-Hui Chen and Lain-Chyr Hwang......Vol.10, No.2, pp.141-158

201.Application of a Synthesis Algorithm to Flexible Manufacturing System
Daniel Y. Chao......Vol.14, No.2, pp.409-447

202.Performance Analysis of p-persistent CSMA/CD and CSMA Protocols with Buffered Users
Chung-Yung Tseng and Szu-Lin Su......Vol.10, No.2, pp.271-292

203.Tightly-Synchronizable Protocol Test Generation Via the Duplex Technique
Wen-Huei Chen and Chuan Yi Tang......Vol.8, No.2, pp.167-186

Computer Security

204.Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimensional Linear Space
Chi-Sung Laih, Lein Harn, Jau-Yien Lee and Tzonelih Hwang......Vol.7, No.1, pp.13-23

Computer Systems Organizations

205.A Fault-Tolerance Strategy for Pyramid Architecture
Kuo-Liang Chung, Ferng-Ching Lin and R. C. T. Lee......Vol.5, No.2, pp.105-121

Computer Vision

206.A Thick-Line Pattern Recognition Model Based on Human Visual Perception
Chun-Yuan Wu, Yung-Sheng Chen and Wen-Hsing Hsu......Vol.6, No.4, pp.385-408

207.A Two-Layer Area-Level Edge Detector-A New Approach
Ling-Hwei Chen and Shu-Sang Wang......Vol.6, No.4, pp.311-323

208.Constructing a Vector Field to Accomplish Autonomous Navigation
Cheng-Yuan Liou and Jiann-Ming Wu......Vol.12, No.3, pp.443-465

209.Corner Detection by Optimization
Hsi-Jian Lee and Jer-Dar Lee......Vol.6, No.4, pp.409-423

210.Determining Camera Models From Multiple Frames
His-Jian Lee and Chin-Tsing Deng......Vol.12, No.2, pp.193-214

211.Environmental Studies of ICM Segmentation Algorithm
Chaur-Chin Chen and Richard C. Dubes......Vol.6, No.4, pp.325-337

212.Inferring CSG-Based Object Representation Using Range Image
Wei-Chung Lin and Tsu-Wang Chen......Vol.6, No.4, pp.361-384

213.Least-Squares Algorithms for Motion and Shape Recovery Under Perspective Projection
Chiou-Shann Fuh and Petros Maragos......Vol.12, No.1, pp.1-23

214.Monitoring of Nonperiodical Robot Operations By 3-D Computer Vision
Yieh-Rong Chen and Wen-Hsiang Tsai......Vol. 6, No.4, pp.425-443

215.On Evidential Relaxation Labeling-A Scheme Toward Knowledge-Based Vision
Von-Wun Soo and Karen Huang......Vol.9, No.2, pp.153-175

216.Range Finding Systems for 3-D Object Recognition
Yukio Sato......Vol. 6, No.4, pp.285-310

217.The Constrained Maximum Rectangular Parallelepiped Representation of a 3D Object from Multiple Views
Young-Hua Fenh, Jun S. Huang and Jau-Yien Lee......Vol.8, No.1, pp.31-60

218.2-D Contour and 3-D Shape Analysis of Straight Homogeneous Generalized Cylinders
Chung Lin Huang......Vol. 6, No.4, pp.339-360

CPU Hardware

219.A Uniform and Squared Direct Two's Complement Multiplier
Hao-Yung Lo......Vol.13, No.1, pp.171-17
9

Cryptology and Information Security

220.A New Design of the Hash Functions With All-or-Nothing Property
Sang Uk and Kyung Hyune Rhee......Vol. 17, No.6, pp.945-957

221.A New Method for Construction Multiple Assignment Schemes for Generalized Secret Sharing
Gwoboa Horng......Vol. 17, No.6, pp.959-965

222.An Efficient Construction for Fail-Stop Signature for Long Messages
Rei Safavi-Naini, Willy Susilo and Huzxiong Wang......Vol. 17, No.6, pp.879-898

223.An Intrusion Detection Model Based Upon Intrusion Detection Markup Language
Yao-Tsung Lin, Shian-Shyong Tseng and Shun-Chieh Lin......Vol. 17, No.6, pp.899-919

224.An Improved Administration Method on Role-Based Access Control in the Enterprise Environment
Sejong Oh and Seog Park......Vol. 17, No.6, pp.921-944

225.Practical and Efficient Electronic Voting Schemes
Zhi-Jia Tzeng and Wen-Guey Tzeng......Vol. 17, No.6, pp.865-877

226.VLSI Design of RSA Cryptosystem Based on the Chinese Remainder Theorem
Chung-Hsien Wu, Jin-Hua Hong and Cheng-Wen Wu......Vol. 17, No.6, pp.967-980

D

Data Encryption and Cryptography

227.(t, n) Threshold Untraceable Signatures
Narn-Yih, Tzonelih Hwang and chuan-Ming Li......Vol. 16, No.6, pp.835-846

228.A New Digital Multisignature Scheme With Distinguished Signing Authorities
Shin-Jia Hwang, Min-Shiang Hwang and Shiang-Feng Tzeng..........Vol.19, No.5, pp.881-887

229.A Secure Server-Aided RSA Signature Computation Protocol for Smart Car5ds
Gwoboa Horng......Vol. 16, No.6, pp.847-855

230.A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash
Chun-I Fan and Chin-Laung Lei......Vol.18, No.1, pp.47-58

231.An Efficient Authenticated Encryption Scheme With Message Linkages and Low Communication Costs
Yuh-Min Tseng and Jinn-Ke Jan......Vol.18, No.1, pp.41-46

232.An Embedding Algorithm for Multiple Watermarks
Chin-Shiuh Shieh, Hsiang-Cheh Huang, Feng-Hsing Wang and Jeng-Shyang Pan..........Vol.19, No.2, pp.381-395

[233.]Authentication Protocols Using Hoover-Kausik’s Software Token???
Wei-Chi Ku and Hui-Lung Lee......Vol.22, No.3, pp.
691-699

234.Cryptanalysis of Improved Liaw’s Broadcasting Cryptosystem??
J. Munoz Masque and A. Peinado......Vol.22, No.2, pp.391-399

235.Cryptanalysis of Public-Key Cryptosystem Using the Pascal Triangle
Chi Sung Laih......Vol.8, No.4, pp.633-640

236.Dynamic GOST
Chu-Hsing Lin, Yi-Shiung Yeh and Chan-Chi Wang......Vol. 16, No.6, pp.857-861

237.Efficient Key-Envolving Protocol for teh GQ Signature
Cheng-Fen Lu and Shiuhpyng Shieh......Vol.20, No.4, pp.763-769

238.Efficient Three-Party Authentication and Key Agreement Protocol Resistant to Password Guessing Attacks
Her-Tyan Yeh, Hung-Min Sun and Tzonelih Hwang..........Vol.19, No.6, pp.1059-1070

239.Enhancing the Security of the McEliece Public-Key Cryptosystem
Hung-Ming Sun......Vol. 16, No.6, pp.799-812

240.Modular Design for Round-Oriented Password Authentication Protocols??
Chi-Chao Chang and Tzonelih Hwang......Vol.22, No.5, pp.1295-1308

241.On Nonlinearity and Autocorrelation Properties of Correlation immune Boolean Functions
Subhamoy Maitra......Vol.20, No.2, pp.305-323

242.On the Design of RSA With Short Exponent
Hung-Min Sun, Wu-Chuan Yang and Chi Sung Laih......Vol.18, No.1, pp.1-18

243.On the Security of a Variation of Cramer-Shoup's Public Key Scheme
Hung-Min Sun......Vol.18, No.1, pp.19-22

244.Provably Secure Blind Threshold Signatures Based on Discrete Logarithm
Chin-Laung Lei, Wen-Shenq Juang and Pei-Ling YU......Vol.18, No.1, pp.23-39

245.Secure Key-Evolving for Public Key Cryptosystems Based on the Discrete Logarithm Problem
Cheng-Fen Lu and Shiuhpyng Shieh......Vol.20, No.2, pp.391-400

246.The Block Cipher: SEA2 With Provable Resistance Against DC and LC Attacks
Shih-Hsu Chang, Fang-Hsuan Chen and Wen-Hsing Hsu......Vol. 16, No.6, pp.813-834

Database Management

247.A Concurrency Control Algorithm for an Open and Safe Nested Transaction Model: Formalization and Correctness
Sanjay Kumar Madria, S. N. Maheshwari and B. Chandra..........Vol.19, No.2, pp.283-328

248.A Sliding Window Method for Finding Recently Frequent Itemsets over Online Data Streams
Joong Hyuk Chang and Won Suk Lee......Vol.20, No.4, pp.753-762

249.A Study of Disjunctive Information in Fuzzy Relation Databases??
Ming-Hua Wang, Huan-chao Keh, Nan-Chen Hsieh and Tsong-Sheng Wang......Vol.22, No.1, pp.199-213

250.Adaptive Transaction Management Protocols for Mobile Client Caching DBMSs
IlYoung Chung, Le Gruenwald, Chong-Sun Hwang and Soon Young Jung......Vol.18, No.3, pp.445-457

251.An Approach to Querying Multiple Object Databases
Jia-Ling Koh and Arbee L. P. Chen......Vol.18, No.2, pp.281-310

252.An Efficient Signature Extraction Method for Image Similarity Retrieval??
Wei-Horng Yeh and Ye-In Chang......Vol.22, No.1, pp.63-94

253.Building Signature Trees into OODBs
Yangjun Chen......Vol.20, No.2, pp.275-304

254.D-Tree: A Multi=Dimensional Indexing Structure for Constructing Document Warehouses??
Frank S. C. Tseng and Wen-Ping Lin......Vol.22, No.4, pp.819-841

255.Efficient Image Retrieval Based on Minimal Spatial Relationships??
Soo-Cheol Lee, EenJun Hwang and Jung-Geun Han......Vol.22, No.2, pp.447-459

256.Fragment Allocation in Distributed Database Design
Yi-Fu Huang and Jyh-Her Chen......Vol. 17, No.6, pp.525-529

257.Mining Quantitative Association Rules in a Large Database of Sales Transactions
Pauray S. M. Tsai and Chien-Ming Chen......Vol. 17, No.4, pp.667-68
1

258.Mobile Real-Time Real-Only Transaction Processing in Broadcast Disks??
Hong-Ya Wang, Guo-Qin Ning, Guo-Hui Li and Kam-Yiu Lam......Vol.22, No.5, pp.1249-1264

Data Files

259.Gray Codel as a De-clustering Scheme for Concurrent Disk Retrieval
C. C. Chang and C. Y. Chen......Vol.3, No.2, pp.177-188

260.New Multistage Secret Sharing Scheme Based on the Factorization Problem
Narn-Yih Lee and Tzonelih Hwang......Vol. 17, No.3, pp.525-529

261.Some Properties of Cartesian Product Files for Disk Modulo Allocation Method in a Two-Disk System
C. C. Chang and C. Y. Chen......Vol.3, No.2, pp.151-176

Data Security

262.A New Dynamic Access Control Method Using Locks
Jinn-Ke Jan and Min-Jinn Jan......Vol.11, No.3, pp.371-389

263.Multi-Signature for Specified Group of Verifiers
Chi-Sing Laih and Sung-Ming Yen......Vol.12, No.1, pp.143-152

Data Storage Representations

264.Concurrent Operations in Multi-Dimensional Extendible Hashing
Pao-Chung Ho and Wei-Pang Yang......Vol.5, No.1, pp.51-72

Database Management

265.A Systematic Method for Query Evaluation in Distributed Heterogeneous Databases
Yangjun Chen......Vol. 16, No.4, pp.463-497

266.An Object-Oriented Query Model: an Algebraic Approach
Reda Alhajj......Vol. 16, No.4, pp.499-533

267.An Ordering Based Concurrency Control Protocol and Its Mathematical Behavior
Yin-Fu Huang and Yeh-Hao Chin......Vol.5, No.1, pp.73-101

268.Imprecise Database, Imprecise Queries and View Navigation
Howard M. Dreizen and Shi-Kuo Chang......Vol.1, No.1, pp.21-43

269.Integrating Heterogeneous OO Schemas
Yangjun Chen......Vol. 16, No.4, pp.555-591

270.On Optimistic Methods for Mobile Transactions
San-Yih Hwang......Vol. 16, No.4, pp.535-554

271.Partial Natural Outerjoin-An Operation for Interoperability in a Multidatabase Environment
Pauray S. M. Tsai and Arbee L. P. Chen......Vol. 16, No.4, pp.593-617

Databases

272.A Composite Perfect Hashing Scheme for Large Letter-Oriented Key Sets
Chin-Chen Chang......Vol.7, No.2, pp.173-186

273.A Design and Implementation of Museum Multimedia Information System
Yin-Fu Huang and Tien-Yu Hsu......Vol.15, No.2, pp.273-286

274.A High Performance Hybrid Architecture for Concurrent Query Execution
Kien A. Hua, Chiang Lee and Jih-Kwon Peir......Vol. 9, No.2, pp.177-199

275.A New Relation Partitioning Scheme for Distriibuted Query Optimization
Wen-Fang Wang and Arbee L.P. Chen......Vol.12, No.1, pp.79-99

276.A Priority-Based Scheduling Algorithm for Real-Time Databases
Sang Hyuk Son and Seog Park......Vol.11, No.2, pp.233-248

277.A Study on the Database Management System's Performance from the Viewpoint of Buffer Page Replacement Algorithms and Disk Scheduling Algorithms
J. H. Chou and Y. H. Chin......Vol.8, No.2, pp.243-259

278.Acquisition of Entity Relationship Models for Maintenance-Dealing with Data Intensive Programs in a Transformation System
Hongji Yang and William C. Chu......Vol.15, No.2, pp.173-198

279.Allocation of Signature File on Parallel Device for WWW Index Servers
Man-Kwan Shan and Suh-Yin Lee......Vol.15, No.2, pp.199-215

280.Design of a New Indexing Organization for a Class-Aggregation Hierarchy in Object-Oriented Databases
Chien-I Lee, Ye-In Chang and Wei-Pang Yang......Vol.15, No.2, pp.217-241

281.Direct Composition Algorithms
Yao-Nan Lien......Vol. 12, No.4, pp.547-565

282.Extended Spiral Hashing for Expansible Files
Ye-In Chang, Chien-I Lee and Wann-Bay Chang Liaw.......Vol.15, No.2, pp.243-271

283.Implementing the Division Operation on a Database containing Uncertain Data
Frank S.C. Tseng, Arbee L.P. Chen and Wei-Pang Yang......Vol.12, No.1, pp.51-78

284.Improving Distributed Query Processing by Hash-Semijoins
Judy C. R. Tseng and Arbee L. P. Chen......Vol.8, No.4, pp.525-540

285.Informance in The Extended Fuzzy Relational Database
Ding-An Chiang, Louis R. Chow and Nan-Chen Hsien......Vol.13, No.1, pp.1-27

286.Optimal Two-Attribute Cartesian Product Files for Orthogonal Range Queries
Annie Y. H. Chou, Wei-Pang Yang and Chin-Chen Chang......Vol.11, No.4, pp.625-647

287.Optimizing Multidatabase Queries by Query Transformation
Arbee L. P. Chen......Vol.7, No.2, pp.279-296

288.Reformulating Semantic Integrity Constraints Precisely
Heng-Li Yang......Vol.11, No.4, pp.513-540

289.Spatial Match Retrieval of Symbolic Pictures
Chin-Chen Chang......Vol.7, No.3, pp.405-422

290.The Design and Implementation of An Easy-to-Use Object-Oriented Database (EODB)
Wen-Wei Pan and Wei-Pang Yang......Vol.13, No.1, pp.29-61

291.VDBMS: A Solution to Integrating Heterogeneous Data Sources
Shu-Chin Su Chen, Mike Yu, Yen-Yao Yao, San-Yih Hwang and B. Paul Lin......Vol.13, No.4, pp. 585-603

292.View Derivation in an Object-Oriented Database System
Baw-Jhiune Liu, Bang-Whang Liu, Jorng-Tzong Horng and Te-Son Kuo......Vol.7, No.1, pp.125-151

Digital Signal Processing

293.Rayleigh Quotient Iterative Algorithms for Frequency Estimation and Direction Finding
Jyh-Chern Ho and Jar-Ferr Yang......Vol.8, No.2, pp.305-320

Digital System Design

294.Does There Exist a Combinational TSC Checker for 1/3 Code Using Only Primitive Gates?
Wen-Feng Chang and Cheng-Wen Wu......Vol.13, No.4, pp.681-695

Discrete Mathematics

295.A Neural Network Processing Methodology for Zero-One Knapsack Problems
Hahn-Ming Lee and Ching-Chi Hsu......Vol.5, No.2, pp.167-177

296.A Distributed Model for the Interpretation of Concurrent Prolog
Ching-Chi Hsu and Shen-Tzay Huang......Vol.4, No.1, pp.73-85

297.The Reciprocal Stable Matching Problem and Its Properties
Ruey-Tyng Kuo and Shian-Shyong Tseng......Vol.5, No.3, pp.275-285

Discrete Mathematics-Graph Theory

298.Minimal Graphs of Partial 3-Trees
Sing-Bor Tong and Leeping Tung......Vol.6, No.3, pp.191-209

Distributed Computation

Distributed and Parallel Computing

299.A Distributed Instrusion Detection Model for the Domain Name System
Chang-Sheng Chen, Shian-Shyong Tseng and Chien-Liang Liu......Vol.18, No.6, pp.999-1009

300.A Distributed Mobile Agent Framework for Maintaining Persistent Distance Education
Lawrence Y. Deng, Timothy K. Shih, The-Sheng Huang, Yi-Chung Liao, Ying-Hong Wang and Hui-Huang Hsu......Vol.18, No.4, pp.489-506

301.A Family of Trivalent 1-Hamiltonian Graphs With Diameter O(log n)
Jeng-Jung Wang, Ting-Yi Sung and Lih-Hsing Hsu......Vol. 17, No.4, pp.535-548

302.A Forwarding Pointer-Based Cache Scheme for Reducing Location Management Cost in PCS Networks
Ki-Sik Kong, Joon-Min Gil, Youn-Hee Han, Ui-Sung Song and Chong-Sun Hwang......Vol.18, No.6, pp.1011-1025

303.A Hybrid Approach to Query Sets Broadcasting Scheduling for Multiple Channel in Mobile Information Systems
Ye-In Chang and Shih-Ying Chiu......Vol.18, No.5, pp.641-666

304.A Rotate-Tiling Image Compositing Method for Sort-Last Parallel Volume Rendering Systems on Distributed memory Multicomputers
Chin-Feng Lin, Shih-Kuan Liao, Yeh-Ching Chung and Don-Lin Yang......Vol.20, No.4, pp.643-664

305.A Scalable Core Migratin Protocol for Dynamic Multicast Tree
Ting-Yuan Wang, Lih-Chyau Wuu and Shing-Tsaan Huang..........Vol.19, No.3, pp.479-501

306.Adaptive Communication-Induced Checkpointing Protocols with Domino-Effect Freedom
Jichiang Tsai, Chi-Yi Lin and Sy-Yen Kuo......Vol.20, No.5, pp.885-901

307.Adaptive Live Broadcasting for Highly-Demand Videos
Hung-Chang Yang, Hsiang-Fu Yu and Li-Ming Tseng..........Vol.19, No.3, pp.531-549

308.Broadcasting on Uni-directional Hypercubes and Its Applications
Huang-Ming Huang, Chang-Biau Yang and Kuo-Tsung Tseng..........Vol.19, No.2, pp.183-203

309.Designing Deadlock-Free Turn-Testricted Routing Algorithms for Irregular Wormhole-Routed Networks
Jenq-Shyan Yang and Chung-Ta King......Vol. 17, No.4, pp.575-594

310.Distributed Fault-Tolerant Embedding of Several Topologies in Hypercubes
Shih-Chang Wang, Yuh-Rong Leu and Sy-Yen Kuo......Vol.20, No.4, pp.707-732

311.Efficiency and Reliability in Cluster Based Peer-to-Peer Systems??
Ching-Wei Huang and Wuu Yang......Vol.22, No.5, pp.1177-1203

312.Efficient Checkpoint-based Failure Recovery Techniques in Mobile Computing Systems
Cheng-Min Lin and Chyi-Ren Dow......Vol. 17, No.4, pp.549-573

313.File Allocation Algorithms to Minimize Data Transmission Time in Distributed Computing Systems
Pao-Yuan Chang, Deng-Jyi Chen and Krishna M. Kavi......Vol. 17, No.4, pp.633-646

314.k-Arbiter Join Operation
Yu-Chen Kuo......Vol. 17, No.4, pp.615-631

315.Management of Fault Tolerance Information for Coordinated Checkpointing Prototocl without Sympathetic Rollbacks
Kwang Sik Chung, Young Jun Lee, HeoChang Yu and WonGyu Lee......Vol.20, No.2, pp.379-390

316.Novel Hierarchical Interconnection Networks for High-Performance Multicomputer Systems
Gene Eu Jan, Yuan-Shin Hwang, Ming-Bo Lin and Deron Liang......Vol.20, No.6, pp.1213-1229

317.Path Selection on VC-Networks within a Distributed Media Server for Concurrent Stream Retrieval
Chun-Chao Yeh and Jie-Yong Juang......Vol.20, No.2, pp.305-323

318.UMPAL: An Unstructured Mesh Partitioner and Load Balancer on World Wide Web
William C. Chu, Don-Lin Yang, Jen-Chih Yu and Yeh-Ching Chung......Vol. 17, No.4, pp.595-614

Distributed Systems

319.Design of Mutual Exclusion Algorithms for Real-Time Distributed Systems
Ye-In Chang......Vol.10, No.4, pp.527-548

320.Distributed Self-Stabilizing Systems
Lih-Chyau Wuu and Shing Tsaan Huang......Vol.11, No.2, pp.307-319

321.An Efficient Quorum Generating Approach for Distributed Mutual Exclusion
David Shou and Sheng-De Wang......Vol.9, No.2, pp.201-227

322.Object Movements in a Heterogeneous Distributed Smalltalk
Feng-Jian Wang, Yen-Sung Lee and Jin-Woei Hwang......Vol.10, No.4, pp.449-469

323.Time-Constrained Distributed Program Reliability Analysis
Deng-Jyi Chen, Ming-Sang Chang, Ming-Cheng Sheng and Maw-Sheng Horng......Vol.14, No.4, pp.891-911

Distributed and Parallel Computing

324.A Compiler-Based Speculative Execution Scheme for ILP Enhancement
L. Wang and Ted C. Yang......Vol. 16, No.1, pp.1-23

325.A Cost-Effective Forward Recovery Checkpointing Scheme in Multiprocessor Systems
Kuochen Wang Chien-Chun Wang......Vol. 16, No.1, pp.65-80

326.A Fault-Tolerant Reconfiguration Scheme in the Faulty Star Graph
Yuh-Shyan Chen and Jang-Ping Sheu......Vol. 16, No.1, pp.25-40

327.A Hybrid Approach to Query Sets Broadcasting Scheduling for Multiple Channel in Mobile Information Systems
Ye-In Chang and Shih-Ying Chiu......Vol.18, No.5, pp.641-666

328.A New Log-Based Approach to Independent Recovery in Distributed shared Memory Systems
Jenn-Wei Lin and Sy-Yen Kuo......Vol. 16, No.2, pp.271-290

329.A New Program-Driven Parallel Machine Simulation Envrionment
Po-Zung Chen and Shyh-Nong Chen......Vol. 16, No.2, pp.201-224

330.A Note on Efficient Color visual Encryption
Ching-Nung Yang......Vol.18, No.3, pp.367-372

331.An Optimistic-Based Partition-Processing Approach for Distributed Shared Memory Systems
Jenn-Wei Lin and Sy-Yen Kuo......Vol.18, No.6, pp.853-869

332.A Portable Auto Attendant System With Sophisticated Dialog Structure
Jhing-Fa Wang and Hsien-Chang Wang......Vol.18, No.4, pp.627-636

333.A Scalable and Efficient Systolic Algorithm for the Longest Common Subsequence Problem
Yen-Chun Lin and Jih-Wei Yeh......Vol.18, No.4, pp.519-532

334.A Second-Level Cache With the Distance-Aware Replacement Policy for NUMA Systems
Sung Woo Chung, Jeong-Heon Shin, Hyong-Shik Kim and Chu Shik Jhon......Vol.18, No.5, pp.803-813

335.Allocation-Time-Based Processor Allcation Scheme for 2D Mesh Architecture
Xiaomei Zhu and Wei-Ming Lin......Vol. 16, No.2, pp.301-311

336.An Algebraic Theory for Modeling Multistage Interconnection Networks
Shivnandan Kaushik, Sanjay Sharma and Chua-Huang Huang......Vol.9, No.1, pp.1-26

337.An Intelligent Parallel Loop Sceduling for Parallelizing Compilers
Yun-Woei Fann, Chao-Tung Yang, Shian-Shyong Tseng and Chang-Jiun Tsai......Vol. 16, No.2, pp.169-200

338.Bit-serial AB2 Multiplier Using Modified Inner Product
Jun-Cheol Jeon, Hyun-Sung Kim, Kyung-Mok Lee and Kee-Young Yoo......Vol.18, No.4, pp.507-518

339.Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines
Min-Shian Hwang, Cheng-Chi Lee and Ting-Yi Chang......Vol.18, No.3, pp.373-379

340.Code Generation Methods for Tiling Transformations
Georgios Goumas, Maria Athanasaki and Nectarios Koziris......Vol.18, No.5, pp.667-691

341.Concentrations, Load Balancing, Multicasting and Partial Permutation Routing on Hypercube Parallel Computers
Gene Eu Jan, Frank Yeong-Sung Lin, Ming-Bo Lin and Deron Liang......Vol.18, No.5, pp.693-712

342.Design and Analysis of Traffic Control for Guaranteed Services on the Internet
Pi-Chung Wang, Chia-Tai Chan and Yaw-Chng Chen......Vol. 16, No.3, pp.349-364

343.Design Issues for Optimistic Distributed Discrete Event Simulation
Yi-Bing Lin......Vol. 16, No.2, pp.243-269

344.Designing a Complete Model of Role-based Access Control System for Distributed Networks
Chang N. Zhang and Cungang Yang......Vol.18, No.6, pp.871-889

345.Detecting Termination of Distributed Computations by External Agents
Shing-Tsaan Huang and Pei-Wen Kao......Vol.7, No.2, pp.187-201

346.Development and Evaluation of QoS Measurement System for Internet Applications by Client Observation
Hiroki Saito......Vol.18, No.6, pp.891-904

347.Distributed Workflows: A Framework for Electronic Commerce
Vlad Ingar Wietrzyk and Makoto Takizawa..........Vol.19, No.1, pp.15-38

348.Efficient Cellular Automata Based Versatile Multiplier for GF(2m)
Hua Li and Chang N. Zhang......Vol.18, No.4, pp.479-488

349.Efficient Parallel Neighbor Finding Algorithms for Quadtrees on Hypercubes
Shi-Nine Yang and Ruen-Rone Lee......Vol. 9, No.1, pp.81-102

350.Efficient Location Traffic Management With Multiple Virtual Layers
Daewoo Chung, Hyngseung Choo, Hee yong Youn and Seong-Moo Yoo..........Vol.19, No.5, pp.787-808

351.Efficient Parallel Prefix Algorithms on Multicomputers
Yen-Chun Lin and C. M. Lin......Vol. 16, No.1, pp.41-64

352.Enhancing Availability of Cooperative Applications Through Interoperabile Middleware
Carlo Marchetti, Antonino Virgillito and Roberto Baldoni..........Vol.19, No.1, pp.38-58

353.Evaluating Influence of Compiler Optimizations on Data Speculation
Toshinori Sato, Kiichi sugitani, Akihiko Hamano and Itsujiro Arita......Vol.18, No.6, pp.1027-1036

354.Evaluating the Performance of a Distributed Database of Repetitive Elements in Complete Genomes
Jorng-Tzong Horng......Vol.18, No.4, pp.533-539

355.Experience in Building a Real-Time Extension Library for Java
Hsin-Ta Chiao, Scott Hsu-Jing Kao, Yue-Shan chang, Shen-Tzay Huang......Vol.18, No.6, pp.905-927

356.Fast and Scalable Parallel Algorithms for Matrix Chain Product and Matrix Powers on Reconfigurable Pipelined Optical Buses
Keqin Li......Vol.18, No.5, pp.713-727

357.Fault-Tolerant FFT Butterfly Network Design
Cheng-Wen Wu and Jiann-Yuan Choue......Vol.9, No.1, pp.137-150

358.Flat Indexing Scheme: A New Compilation Texhnique to Enhance Parallelism of Logic Programs
Hiecheol Kim, Kangwoo Lee and Jean-Luc Gaudiot......Vol. 16, No.2, pp.225-242

359.Fractal Image Process Based Image Comparision Search Engine
Kwang-Fu Li, Tung-Shou Chen and Kuei-Hao Chen..........Vol.19, No.1, pp.1-14

360.Group Mutual Exclusion in Tree Networks
Jeffroy Beauauier, Sebastien Cantarellell, Akoy K. Datta and Franck Petit..........Vol.19, No.3, pp.415-432

361.Group Protocol for Distributed Object-based Systems
Youhei Timura, Katsuya Tanaka and Makoto Takizawa......Vol.18, No.5, pp.729-743

362.Hash Join Algorithms on SMPs Clusters: Effects of Netcaches on Its Scalability and Performance
Edward David Moreno Ordonez......Vol.18, No.5, pp.815-824

363.Incrementally Extensible Folded Hypercube Graphs
Hung-Yi Chang and Rong-Jaye Chen......Vol. 16, No.2, pp.291-300

364.Improvements on Audio and Optical Cryptography
Ching-Nung Yang......Vol.18, No.3, pp.381-391

365.Locality-Preserving Dynamic Load Balancing for Data-Parallel Applications on Distributed-Memory Multiprocessors
Pangfeng Liu, Jan-Jan Wu and Chih-Hsuae Yang......Vol.18, No.6, pp.1037-1048

366.Local-Safety-Information-Based FAult-Tolerant Broadcasting in Hypercubes
Dong Xiang, Ai Chen and Jie Wu..........Vol.19, No.3, pp.467-478

367.Message and Time Optimal Crash Recovery in Tree Networks
Tony Tong-Ying Juang and S. Venkatesan......Vol.9, No.1, pp.103-122

368.Migrating-Home Protocol for Software Distributed Shared Memory
Benny Wang-Leung Cheung, Cho-Li Wang and Francis Chi-Moon Lau......Vol.18, No.6, pp.929-957

369.Multi-Node Multicast in Multi-Dimensional Wormhole Tori and Meshes With Load Balance
Ming-Hour Yang, Yu-Chee Tseng and Ming-Shian Jian......Vol.18, No.6, pp.959-980

370.Multicasts on WDM All-Optical Butterfly Networks
Xinchen Liu and Qian-Ping Gu......Vol.18, No.6, pp.1049-1058

371.Neko: A Single Environment to Simulate and Prototype Distributed Algorithms
Peter Urban, Xavier Defago and Andre Schiper......Vol.18, No.6, pp.981-997

372.New Reliability Evaluation Algorithms for Distributed Computing Systems
Min-Sheng Lin and Deng-Jyi Chen......Vol.8, No.3, pp.353-391

373.Optimal Parallel Prefix on the Postal Model
Yen-Chun Lin and Ching-Sung Yeh..........Vol.19, No.1, pp.75-83

374.Parallel Architectures and Adaptation Algorithms for Programmable FIR Digital Filters With Fully Pipelined Data and Control Flows
Behrooz Parhami and Ding-Ming Kwai..........Vol.19, No.1, pp.59-74

375.Performance Analysis of General cut-Through Switching on Buffered MIN Switches
Chan L. Liao and Woei Lin......Vol.18, No.5, pp.745-762

376.Performance Modeling and Evaluation of MPI-I/O on a Cluster
Jacobo Barro, Juan Tourino, Ramon Doallo and Victor M. Gulias......Vol.18, No.5, pp.825-836

377.Performance of Parallel Iterative Solvers: a Library, a Prediction Model, and a Visualization Tool
V. Blanco, P. Gonzalez, J. C. Cabaleiro, D. B. Heras, T. F. Pena, J. J. Pombo and F. F. rivera......Vol.18, No.5, pp.763-785

378.Polar: A Storage Architecture for Fast Checkpointing
Tzi-Cker Chiueh......Vol.9, No.1, pp.61-80

379.Properties and Embeddings of Interconnection Networks Based on the Hexube
Jung-Sing Jwo, Show-May Chen, Chin-Yun Hsieh and Yu Chin Cheng......Vol. 16, No.1, pp.81-95

380.Quick Buddy-Subcube Compaction in Hypercubes
Hsing-Lung Chen and Shu-Hua Hu...........Vol.19, No.2, pp.205-227

381.Quorum-Based Replication in Object-Based Systems
Katsuya Tanaka, Kyoji Hasegawa and Makoto Takizawa......Vol. 16, No.3, pp.317-331

382.Reaching Strong Consensus in a General Network
Hsien-Sheng Hsiao, Yeh-Hao Chin and Wei-Pang Yang......Vol.18, No.4, pp.601-625

383.Real-Time Gang Scheduling with Workload Models for Parallel Computers
Wei-Kuan Shih, Chung-Der Lin, Yar-Wen Chang and Jenq-Kuen Lee......Vol. 16, No.3, pp.333-347

384.Resource Allocation for Independent Real-Time Tasks in Heterogeneous Systems for Energy Minimization
Yang Yu and Viktor K. Prasanna..........Vol.19, No.3, pp.433-449

385.Robust TCP Connections for Fault Tolerant Computing
Richard Ekwall, Peter Urban and Andre Schiper..........Vol.19, No.3, pp.503-516

386.Self-Stabilizing Wormhole Routing on Ring Networks
Ajoy K. Datta, Maria Gradinariu, Anthony B. Kenitzki and Sebastien Tixeuil..........Vol.19, No.3, pp.401-414

387.Shared Translation Lookaside Buffers on Multiprocessors and a Performance Study
Wei-Tsung Sun, Yunn-Yen Chen, Jih-Kwon Peir and Chung-Ta King......Vol.9, No.1, pp.123-135

388.Significant Message Precedence in Object-Based Systems
Katsuya Tanaka, Tomoya Enokido, Hiroaki Higaki and Mokoto Takizawa......Vol. 16, No.2, pp.147-168

389.Simultaneous Task Migration Problem on Partitionable Circuit-Switched Hypercubes
Liang Liu, Hyeong-Ah Choi and Shmuel Rotenstreich......Vol.9, No.1, pp.27-44

390.Slice-and-Patch--An Algorithm to Support VBR Video Streaming in a Multicast-based Video-on-Demand System
C. W. Kong and Jack Y. B. Lee..........Vol.19, No.3, pp.517-530

391.Specializing Java Programs in a Distributed Environment
Jung Gyu Park and Myong-Soon Park......Vol.18, No.5, pp.787-801

392.The Design and Implemntation of a Multi-Threaded Object Request Broker
Winston Lo, Yue-Shan Chang, Shyan-Ming Yuan dna Deron Liang......Vol. 16, No.3, pp.365-379

393.Toward Ensuring Fair Service Among ECN and non ECN TCP
Salahuddin Muhammad Salim Zabir, Ahmed Ashir, Gen Kitagata, Takuo Suganuma and NOrio Shiratori......Vol.18, No.5, pp.837-847

394.Two-Layered Protocol for a Large-Scale Group of Processes
Kojiro Taguchi and Makoto Takizawa..........Vol.19, No.3, pp.451-465

395.Virtual Parallelism Support in Reconfigurable Processor Arrays
Massimo Maresca and Hungwen Li......Vol.9, No.1, pp.45-60

E

Error Control Coding

396.Parallel Decoding of the (31,16,7) Quadratic Residue Code
Tzonelih Hwang and Yihfuh Wang......Vol.8, No.1, pp.157-166

Expert Systems

397.Neural Network-Based Match Subsystems for Production Systems
Cheng-Seen Ho and Chien-Chang Hsu......Vol.9, No.3, pp.395-420

F

Fault Tolerant Computation

398.Fault Tolerant Distributed Simulation
Yi-Bing Lin......Vol.10, No.2, pp.259-269

File Processing

399.Multidisk Smaller sized MKH File Allocation for Partial Match Retrieval
C.Y. Chen, H.F. Lin, C.C. Chang and R.C.T. Lee......Vol.13, No.1, pp.125-141

400.Reducing File-related Network Traffic in TreadMarks via Parallel File Input/Output
Ce-Kuen Shieh, Su-Cheong Mac and Bor-Jyh Shieh......Vol.15, No.4, pp.569-583

Function Testing

401.A General Structure of Feedback Shift Registers for Built-In Self Test
Kuen-Jong Lee, Wei-Lun Wang and Jhing-Fa Wang......Vol.14, No.3, pp.645-667

G

Graph Algorithms

402.Finding Maximum Matching in Bipartite Graphs on a Single-Channel Broadcast Communication Model
Nan-Ling Kuo and Jang-Ping Sheu......Vol.6, No.1, pp.37-49

403.Polynomial Algorithms for Weighted Perfect Domination Problems on Interval and Circular-Arc Graphs
Maw-Shang Chang and Yi-Chang Liu......Vol.10, No.4, pp.549-568

Graph Theory

404.Computing Dominators on Interval Graphs
Tzong-Wann Kao and Shi-Jinn Horng......Vol.13, No.4, pp. 615-629

405.Optimal Algorithms for Interval Graphs
Yue-Li Wang, Kuo-Ching Chiang and Ming-Shing Yu......Vol.14, No.2, pp.449-459

406.Properties of Star Graph, Bubble-sort Graph, Perfix-reversal Graph and Complete-transposition Graph
Jung-Sing Jwo......Vol. 12, No.4, pp.603-617

407.The Integral of a Tree
Frank Harary......Vol. 4, No.1, pp.87-92

408.The Number of Spanning Trees of the Regular Graphs
Mei-Hwei Wu, Jhing-Fa Wang and Chu-Sing Yang......Vol.7, No.1, pp.25-35

Graph Theory-Path and Circuit Problems

409.Constrained Chinese Postman Problem with Its Application on Synchronizable Protocol Test Generation
Wen-Huei Chen, Ching-Sung Lu, Jinn-Tuu Wang and Richard-Jinjr Lee......Vol.6, No.2, pp.149-157

Graphics

410.One and Two-Parameter Blending for Parametric Surfaces
Jung-Hong Chuang and Feng-Liang Lieh......Vol.14, No.2, pp.461-477

Graphics Systems

411.Modeling GIS Data Using OMEGA
Chiang Lee and Shyh-Chih Wang......Vol.12, No.3, pp.345-364

H

Hardware Description Languages

412.A Logical Fault Model for Library Coherence Checking
Shing-Wu Tung and Jing-Yang Jou......Vol.14, No.3, pp.567-586

413.A Unified Approach to Object-Oriented VHDL
Martin Radetzki, Wolfram Putzke-Roming and Wolfgang Nebel......Vol.14, No.3, pp.523-545

414.Control / Data-Flow Analysis for VHDL Semantic Extraction
Yee-Wing Hsieh and Steven P. Levitan......Vol.14, No.3, pp.547-565

415.Embedded System Design Using Soft-Core Processor and Valen-C
Hiroto Yasuura, Hiroyuki Tomiyama, Akihiko Inoue and Eko Fajar N.......Vol.14, No.3, pp.587-603

416.Entity Overloading for Mixed-Signal Abstraction in VHDL
C.-J. Richard Shi......Vol.14, No.3, pp.633-644

417.Rapid Prototyping of Hardware / Software Codesign for Embedded Signal Processing
Yin-Tsung Hwang, Yuan-Hung Wang and Jer-Sho Hwang......Vol.14, No.3, pp.605-632

Hardware Design and Testing

418.A Systematic Approach for Parallel CRC Computations
Ming-Der Shieh, Ming-Hwa Sheu, Chung-Ho Chen and Hsin-Fu Lo......Vol. 17, No.3, pp.445-461

419.Easily Testable Cellular Array Multipliers
Kun-Jin Lin and Cheng-Wen Wu......Vol.7, No.3, pp.367-383

420.Efficient Double Fault Diagnosis for DMOS Logica Circuits With a Specific Application to Generic Bridging Faults
Hong-Chou Kao, Ming-Fu Tsai, Shi-Yu Huang, Cheng-Wen Wu, Wen-Feng Chang and Shyue-Kung Lu..........Vol.19, No.4, pp.571-587

421.Structure-Based Specification-Constrained Test Frequency Generation for Linear Analog Circuits
Soon-Jyh Chang, Chung-Len Lee and Jwu E Chen..........Vol.19, No.4, pp.637-651

422.Using Stack REconstructin on RTL Orthogonal Scan Chain Design??
Chia-Chun Tsai, Hann-Cheng Huang, Trong-Yen Lee, Wen-Ta Lee and Jan-Ou Wu......Vol.22, No.6, pp.1585-1599

423.TSC Berger-Code Checker Design for 2r-1-Bit Information
Wen-Feng Chang and Cheng-Wen Wu......Vol.15, No.3, pp.429-441

High-Speech Networks

424.Performance of A Multicast ATM Switch with Finite Input and Output Buffers
Zsehong Tsai and Ta-Chun Lo......Vol.13, No.1, pp.143-154\

Human computer interaction

425.A Generic and Visual Interfacing Framework for Bridging the Interface between Application Systems and Recognizers?
Shih-Jung Peng, Jan Karel Ruzicka and Deng-Jyi Chen......Vol.22, No.5, pp.1077-1091

426.A Taking Face Driven by Voice using Hidden Markov Model
Guang-Yi Wang, Mau-Tsuen Yang, Cheng-Chin Chiang and Wen-Kai Tai......Vol.22, No.5, pp.1059-1075

427.American Sign Language Recognition Using Multi-dimensional Hidden Markov Models
Honggang Wang, Ming C. Leu and Cemil Oz......Vol.22, No.5, pp.1109-1123

428.Chording with Spatial Mnemonics: Automatic Error Correction for Eyes-Free Text Entry?
Frode Eika Sandnes and Yo-Ping Huang......Vol.22, No.5, pp.1015-1031

429.Facial Expression Classificatin Using PCA and Hierarchical Radial Basis Function Network???
Daw-Tung Lin......Vol.22, No.5, pp.1033-1046

430.New Approach for Static Gesture REcognition?
Chin-Chen Chang, Jiann-Jone Chen, Wen-Kai Tai and Chin-Chuan Han......Vol.22, No.5, pp.1047-1057

431.MAP-Based Perceptual Modeling for Noisy Speech Recognition?
Yung-Ji Sher, Yeou-Jiunn Chen, Yu-Hsien Chiu, Kao-Chi Chung and Chung-Hsien Wu......Vol.22, No.5, pp.999-1013

432.Multiband Subspace Tracking Speech Enhancement for In-Car Human Computer Speech Interaction
Chung-Hsien Yang, Jia-Ching Wang, Jhing-Fa Wang, Hsiao-Ping Lee, Chung-Hsien Wu and Kai-Hsing Chang......Vol.22, No.5, pp.1093-1107

I

I/O Systems

433.Designing I/O Servers on Multithreaded Microkernels
Hau-Yang Cheng, Yunn-Yen Chen and Chung-Ta King......Vol.12, No.2, pp.291-305

Image Processing

434.A Fast Search Algorithm for Vector Quantization
Chin-Chen Chang, Ruey-Feng Chang, Wen-Tsai Lee and Ching-Lin Kuo......Vol. 12, No.4, pp.593-602

435.A Kohonen-Based Structured Codebook Design for Image Compression
Hsien-Chung Wei, Yung-Ching Chang and Jia-Shung Wang......Vol.9, No.3, pp.431-443

436.A New Motion-Compensated Image Sequence Coding Scheme
Che-Shun Ho and Jin-Jang Leou......Vol.12, No.3, pp.429-441

437.A New Pyramid Architecture for Bottom-Up Image Analysis
Kuo-Liang Chung......Vol.2, No.1, pp.83-97

438.A New Self_Adaptive Image Coder
J. M. Quan and S. C. Tai......Vol.10, No.1, pp.129-137

439.A New Thinning Algorithm for Removing Noise-Spurs and Retaining End-points
Jun S. Huang and Wen J. Lee......Vol.1, No.1, pp.45-57

440.A Semantic-Syntactic Approach to Image Analysis
King-Sun Fu......Vol.1, No.1, pp.1-20

441.Extracting Strokes of a Chinese Character Based on Cross-Section Sequence Graph
Jun S. Huang, Tzung Rern Jang and Fu Chang......Vol.8, No.4, pp.512-524

442.Filtering Algorithm Based on Innovayions Theory for White Gaussian Plus Colored Observation Noise
Seiichi Nakamori......Vol.5, No.2, pp.157-166

443.Finding the Rib Cage from Chest X-Ray Images by Inexact Hough Transform
Long-Wen Chang and Huan-Chau Hwang......Vol.5, No.1, pp.1-15

444.Finding Trajectories of Feature Points in an Image Sequence Via Multistage Bipartite Matching
Shou-Hsin Lee and Jin-Jang Leou......Vol.10, No.4, pp.471-494

445.Incremental Extraction of Houses and Buildings from Aerial Photographs
His-Jian Lee, Der-Soul Liu and Chin-Hwa Lee......Vol.4, No.1, pp.15-34

446.Infrared Target Detection and Tracking by Region Correspondence in Image Sequences
Kung-Puu Tang and Wen-Hsiang Tsai......Vol.6, No.1, pp.1-24

447.Misregistration Effects on Classification Performance
Carlos A. Pomalaza-Raez......Vol. 6, No.3, pp.267-283

448.Motion Parameter Estimation in Three-Dimensional Dynamic Scenes: a Hadamard Transform Approach
Chang-Wu Fu, Shang-Hong Lai and Shyang Chang......Vol.8, No.3, pp.321-341

449.Multiresolutional Image Representation and Coding Using Morphological Pyramids
Rong-Jian Chen and Bin-Chang Chieu......Vol.12, No.3, pp.415-428

450.Neural Networks for Step Edge Detection Using Simulated Annealing Technique
Hong-Yuan Liao and Mitchell Middler......Vol.8, No.2, pp.207-222

451.On-Line Chinese Character Recognition by a Knowledge Model Based Method
Chang-Keng Lin, Kuo-Chin Fan and Bor-Shenn Jeng......Vol.9, No.2, pp.229-251

452.Parallel Thinning by a Recurrent Neural Network
Rei-Yao Wu and Wen-Hsiang Tsai......Vol.10, No.2, pp.221-237

453.Partial Matching of Two Dimensional Shapes Using Random Coding
Chin-Hwa Lee and Gim Pew Quek......Vol.7, No.1, pp.101-124

454.Reshading From Shaded Images
Chi Chang and Yu-Tai Ching......Vol.12, No.2, pp.243-259

455.Segmentation-Based Motion Estimation and Residual Coding for Packet Video
Day-Fann Shen, Member, IEEE......Vol.12, No.3, pp.397-413

456.Trajectories Finding Using Motion Smoothness Constraints
Chung-Lin Huang and Chi-Hou Wu......Vol.8, No.1, pp.1-29

457.Two-Stage Region Matching of Multiple Moving Objects
Hsi-Jian Lee and Chen-Chiung Hsieh......Vol. 6, No.3, pp.211-237

458.3-D Object Recognition by Line Features Using Binocular Image
Wen-Hsiang Tsai, Shu-In Gao and Nai-Yuan Yeh......Vol.2, No.1, pp.99-123

Image Processing and Computer Vision

459.A Compression Algorithm Based on the Classified Interpolative Block Truncation Coding and Vector Quantization
Chun-Hung Kuo, Chang-Fuu Chen and Wen-Nan Hsia......Vol.15, No.1, pp.1-9

460.A Computing Architecture of Adjustable Convolution System for Image Processing
Po-Ning Chen, Yung-Sheng Chen and Wen-Hsing Hsu......Vol. 3, No.1, pp.63-79

461.A Fast Algorithm for Multilevel Thresholding
Ping-Sung Liao, Tse-Sheng Chen and Pau-Choo Chung......Vol. 17, No.5, pp.713-727

462.A Geometric Invariant Approach to Human Face Verification
Li-Wei He, Tsorng-Lin Chia and Chen-Kuei Yang......Vol.22, No.3, pp.511-534

463.A HVS-Directed Neural-Network-Based Approach for Salt-Pepper Impulse Noise REmoval
Shih-Mao Lu, Sheng Fu Liang and Chin-Teng Lin......Vol.22, No.4, pp.925-939

464.A Model-Constrained Rule Based Pattern Matching System for Object Recognition
Yu-Shan Fong and Ramprasad A. Shetty......Vol. 3, No.1, pp.39-62

465.A Nearly Optimum Generalized Multilevel Block Truncation Coding Algorithms With a Fast Nonexhaustive Search Based on a Mean Square Error Criterion
Chung-Hung Kuo and Chang-Fuu Chen......Vol. 17, No.4, pp.697-708

466.A New 2D Quadrature Mirror FIR Filters for Image Sub-Band Coding
Soo-Chang Pei and Sy-Been Jaw......Vol. 3, No.1, pp.97-109

467.A New Approach to Video Format Conversion Using Bidirectiona Motion Estimation and Hybrid Error Concealment
Dang-Jiang Wang and Jin-Jang Leou......Vol. 17, No.5, pp.763-777

468.A New Two-Path Search Algorithm for Block Motion Estimatin of Video Data
Chin-Chen Chang, Lin-Li Chen and Tung-Shou Chen......Vol. 17, No.3, pp.405-415

469.A Novel Non-Iterative Scheme for Fractal Image Coding
Hsuan T. Chang and Chung J. Kuo......Vol. 17, No.3, pp.429-443

470.A Robust Image Hiding Method Using Wavelet Technique
Chih-Yang Lin and Yu-Tai Ching......Vol.22, No.1, pp.163-174

471.A Tabu Search Based Maximum Descent Algorithm for VQ Codebook Design
Hsiang-Cheh Huang, Shu-Chuan Chu, Jeng-Shyang Pan and Zhe-Ming Lu......Vol. 17, No.5, pp.753-762

472.Accelerating Fractal Compression With a Real-Time Decoder
Hsueh-Ting Chu and Chaur-Chin Chen......Vol. 17, No.3, pp.417-427

473.Adaptive Schemes for Improving Fractal Block Coding of Images
Hsuan T. Chang and Chung J. Kuo......Vol.15, No.1, pp.11-25

474.Automatic Facial Feature Extraction in Model-based Coding
Mao-Meng Chuang, Ruey-Feng Chang and Yu-Len Huang......Vol. 16, No.3, pp.447-458

475.Automatic White Balance for Digital Still Cameras
Varsha Chikane and Chiou-Shann Fuh......Vol.22, No.3, pp.497-509

476.BCH Code-Based Robust Audio Watermarking in the Cepstrum Domain
Shi-Cheng Liu and Shinfeng D. Lin......Vol.22, No.3, pp.535-543

477.Binarization Method Based on Pixel-level Dynamic Thresholds for Change Detection in Image Sequences
Hsu-Yung Cheng, Quen-Zong Wu, Kuo-Chin Fan and Bor-Shenn Jeng......Vol.22, No.3, pp.545-557

478.Color Image Retrieval Using Geometric Properties
Ing-Sheen Hsieh and Kuo-Chin Fan......Vol. 17, No.5, pp.729-751

479.Combining Morphological Feature Extraction and Geometric Hashing for Three-Dimensional Object Recognition Using Range Images
Chu-Song Chen, Yi-Ping Hung and Ja-Ling Wu......Vol. 17, No.3, pp.347-369

480.Computing 3-D Location and Shape Parameters of Cones Using Structured Lights
Tsorng-Lin Chia......Vol.15, No.1, pp.27-40

481.Copyright Protection against Print-and-Scan Operations by Watermarking for Color Images
Yen-Chung Chiu and Wen-Hsiang Tsai......Vol.22, No.3, pp.483-496

482.Efficient Solutions for Image Interpolation Treated as an Inverse Problem
S. E. El-Khamy, M. M. Hadhoud, M. I. Dessouky, B. M. Salam and F. E. Adb El-Samie......Vol.22, No.6, pp.1569-1583

483.Detection and Concealment of Transmission Errors in MMPEG-4 Images
Chien-Ming Lee and Jin-Jang Leou......Vol.20, No.4, pp.679-706

484.Fast Octree Construction Endowed with an Error Bound Controlled Subdivision Scheme
Hong-Long Chou and Zen Chen......Vol.22, No.3, pp.641-657

485.Fast Progressive Image Transmission Without Table Look-up, Computation and Error Propagation
Soo-Chang Pei, Sy-Been Jaw and In-Chen Chu......Vol. 3, No.1, pp.81-95

486.Images Coding Using Two-Pass Side-Match Finite-State Vector Quantization
Ruey-Feng Chang and Wen-Jia Kuo.......Vol.15, No.1, pp.41-51

487.Inter-Subband Correlation for Predictive Pyramid Coding
Chung J. Kuo and Chia L. Lee......Vol. 17, No.5, pp.779-786

488.Image Restoration Using a Nonstationary Image Model
Long-Wen Chang and Jien-Hua Huang......Vol. 3, No.1, pp.111-124

489.Learning Visual Concepts from Image Instance
Jun-Wei Hsieh, Cheng-Chiin Chiang, Yea-Shuan Huang and W. E. Grimson......Vol.20, No.6, pp.1197-1212

490.Machine Vision for Industry Prospects and Future Trends
Joseph Wilder......Vol. 3, No.1, pp.1-37

491.Modified Hough Transforms for Object Feature Extraction
Jar-Ferr Yang and Shu-Sheng Hao......Vol. 17, No.1, pp.133-145

492.Morphological De-ringing Filter Design for JEPG-2000
Shen-Chuan Tai, chuen-Ching Wang, Ling-Shiou Huang and Ying-Ru Chen..........Vol.19, No.4, pp.667-680

493.Optimal Feature-based Vector Quantization of Image Coding Using Integral Projection
Yih-Chuan Lin......Vol. 16, No.4, pp.661-668

494.Parallel Execution of a Connected Component Labeling Operation on a Linear Array Architecturepar
Kuang-Bor Wang, Tsorng-Lin Chia, Zen Chen and Der-Chyuan Lou..........Vol.19, No.2, pp.353-370

495.Real-Time Software Method for Preserving Eye Contact in Video Conferencing
Yu-Pao Tsai, Ching-Che Kao, Yi-Ping Hung and Zen-Chung Shih......Vol.20, No.5, pp.1001-1017

496.Salt-Pepper Impulse Noise Detection and Removal Using Multiple Thresholds for Image Restoration
Tzu-Chao Lin and Pao-Ta Yu......Vol.22, No.1, pp.189-198

497.Skeleton-based Walking Motion Analysis Using Hidden Markov Model and Active Shape Models
I-Cheng Chang and Chung-Lin Huang......Vol. 17, No.3, pp.371-403

498.Texture Synthesis in Image Processing and Computer Graphics
L. W. Chang and Hon-Wen Pon......Vol. 3, No.1, pp.125-133

499.Texture Synthesis: A Review and Experiments
Chaur-Chin Chen and Chien-Chang Chen..........Vol.19, No.2, pp.371-380

Information Security

500.A Digital Multisignature Scheme Based upon the Digital Signature Scheme of a Modified E1Gamal Public Key Cryptosystem
Chin-Chen Chang and Feng-Yi Liou......Vol.10, No.3, pp.423-432

501.An Improved One-Time Digital Signature Scheme Based on One-Way Function
Tzong-Chen Wu and Hung-Sung Sung......Vol.12, No.3, pp.387-395

502.Cryptanalysis of the Secret Exponent of the RSA Scheme
Chien-Yuan Chen, Chin-Chen Chang and Wei-Pang Yang......Vol.12, No.2, pp.277-290

503.On Key Changeable ID-Based Digital Signature Scheme
Wei-Bin Lee and Chin-Chen Chang......Vol.12, No.3, pp.381-3
86

Information Storage and Retrieval

504.An Inverted File Cache for Fast Information Retrieval
Wann Yun Shieh, Jean Jyh-Jiun Shann and Chung Ping Chung..........Vol.19, No.4, pp.681-695

505.Dimensionality Reduction for Indexing Time Series Based on the Miniumum Distance
Sangjun lee, Dongseop Kwon and Sukho Lee..........Vol.19, No.4, pp.697-711

506.Hybrid Architecture for Web Search Systems Based on Hierarchical Taxonomies?
Fidel Cacheda, Victor Carneiro, Carmen Guerrero and Angel Vina......Vol.22, No.4, pp.863-887

507.NA-Trees: A Dynamic Index for Spatial Data
Ye-In Chang, Cheng-Huang Liao and Hue-Ling Chen..........Vol.19, No.1, pp.103-139

508.Querying Image Databased by Video Content
C. H. Wang, H. C. Lin, C. C. Shih, H. R. Tyan, C. F. Lin and H. Y. Mark Liao..........Vol.19, No.6, pp.967-987

509.The Exclusive-or Disjunctive Information in Relational Databases
Chien-Chou Shih, Ding-An Chiang and Wen-Hsing Kao......Vol.20, No.5, pp.981-999

Information Systems and Applications

510.A Syntax-based Gateway Between SQL3 and ODMG Languages
Jia-Lang Seng and Kai-Chung Wei......Vol. 17, No.2, pp.261-295

511.A WAP-based, Push-enabled Mobile Internet Application Platform?
Hsuan-Hao Chen, Kuochen Wang and Hung-Cheng Shih......Vol.22, No.5, pp.1279-1293

512.Implementation for the Arrangement and Mining Analysis of Travel Schedules??
Yin-Fu Huang and Chao-Na Chen......Vol.22, No.1, pp.123-146

513.Integrated Business Agents for Processing Free Texxt Information
I-Heng Meng, Shin-Mu Tseng and Wei-Pang Yang......Vol.20, No.2, pp.325-347

514.Load Balancing for the Parallel Map Overlay-Operation in the Geographic Information System
Yu-Tai Ching......Vol.15, No.3, pp.441-449

515.MRBAC/AR: an Information Flow Control Model to Prevent Both Intra- and Inter-Application Information Leakage?
Shih-Chien Chou......Vol.22, No.1, pp.147-161

516.Multi-class Named Entities Extraction from Biomedical Literature?
Tyne Liang and Jian-Shin chen......Vol.22, No.4, pp.1339-1353

517.Multi-User Decision Support Systems
Michael S. Y. Wang and Donald R. Jones......Vol.3, No.2, pp.135-150

518.OCR Error Correction of an Inflectional Indian Language Using Morphological Parsing
U. Pal, P. K. Kundu and B. B. Chaudhuri......Vol. 16, No.6, pp.903-922

519.The Context Driven Component Supporting the Context Adaptation and the Content Extension?
Hoijin Yoon and Byoungju Choi......Vol.22, No.6, pp.1485-1504

520.To Develop A Relational Data-Knowledge Base System for Solving Decision Problems with Large Data
Han-Lin Li......Vol. 2, No.1, pp.59-82

Information Systems-Parsing

521.A Dynamic Access Control Mechanism in Information Protection Systems
Chu-Hsing Lin, R. C. T. Lee and Chin-Chen Chang......Vol.6, No.1, pp.25-35

InteGRATED CIRCUITS

522.A Brief Comparision of Two-phase and NOR-based Four-phase Pipelined Asynchronous Systems?
Ying-Haw Shu, Shing Tenqchen, Ming-Chang Sun and Wu-Shiung Feng......Vol.22, No.4, pp.941-952

523.Improved 32-bit Conditional Sum Adder for Low-Power High-Speed Applications
Kuo-Hsing Cheng and Shun-Wen Cheng......Vol.22, No.4, pp.975-989

Interconnection Networks

524.An Algebraic Theory for Modeling Directt Interconnection Networks
S.D. Kaushik, S. Sharma, C.H. Huang, J.R. Johnson, R.W. Johnson and P. Sadayappan......Vol.12, No.1, pp.25-49

525.Terminal Reliability Modeling & Analysis of Hypercube Networks
Deng-Jyi Chen and M. S. Horng Kuo-Lung Ku......Vol.8, No.1, pp.79-104

J

K

L

Language Processors-Parsing

526.Parallel Operator-Precedence Parsing
Ruei-Chuan Chang and Kun-Mao Chao......Vol.6, No.1, pp.51-61

Local Area Networks

527.A Distributed Topology Learning Algorithm for LAN Interconnection-Analysis and Complexity Comparisons
Jean-Lien C. Wu and Tsang-Min Chen......Vol.11, No.2, pp.207-232

Logic Design

528.A Heuristic Algorithm for PLA Block Folding
Y. S. Kuo and C. Chen...... Vol. 2, No.1, pp.43-57

Logic Design-Testing

529.Relating Tiling and Coloring to Testing of Combinational Iterative Logic Arrays
Cheng-Wen Wu......Vol.6, No.1, pp.63-72

M

Management Information System

530.Solving Probabilistic Multiobjective Decision Problems by Constructing Maximum Probabilistic Deduction Graphs
Han-Lin Li......Vol.7, No.2, pp.237-251

Mathematical Logic and Formal Language Grammars

531.On Properties of ExtendedLL(k)Grammars
I-Peng Lin and Ching-Chi Hsu......Vol.1, No.1, pp.73-81

Mathematics of Computing

532.Why is 1 + 1 = 2?
Wuu Yang......Vol.18, No.3, pp.425-
443

Mobile Computing

533.Path Pruning in Mailbox-based Mobile Agent Communications
Jiannong Cao, Liang Zhang, Xinyu Feng and Sajal K. Das......Vol.20, No.3, pp.405-424

534.Extending the Lifetime of Multicast Trees in WANETs
Bin Wang and Sandeep K. S. Gupta......Vol.20, No.3, pp.449-475

535.Integrating Sensing Perspectives for Better Self Organization of Ad Hoc Wireless Sensor
Manish Kochhal, Loren Schwiebert and Sandeep Gupta......Vol.20, No.3, pp.449-475

536.Maximizing Sensor Reuse Based on New Geometric Concepts
Guangbin Fan and Jingyuang Zhang......Vol.20, No.3, pp.447-489

537.On Power Managed Multiple Access Control in an IEEE 802.11 Based Ad Hoc Wireless Network
Xia-Hui Lin, Yu-Kwong Kwok and Vincent K. N. Lau......Vol.20, No.3, pp.491-515

538.Modeling and Tracking Complexly Moving Objects in Location Based Services
MoonBae Song, KwangJin Park, Jehyok Ryu and Chong-Sung Hwang......Vol.20, No.3, pp.517-534

539.MZRP: An Extension of the Zone Routing Protocol for Multicasting in MANETs
Xiaofeng Zhang and Lillykutty Jacob......Vol.20, No.3, pp.535-551

Multimedia Information Systems

540.A Fast Finite-State Algorithm for Generating RGB Palettes of Color Quantized Image
Yu-Len Huang and Ruey-Feng Chang......Vol.20, No.4, pp.771-782

541.A Domain-Independent and Personalized Video Abstraction Algorithm
Jinguk Jeong, Jongho Nang and Hojung Cha......Vol.20, No.6, pp.1183-1
196

542.Automatic Closed Caption Detection and Filtering in MPEG Videos for Video Structuring?
Duan-Yu Chen, Ming-Ho Hsiao and Suh-Yin Lee......Vol.22, No.5, pp.1145-1162

543.Similarity-based Motion Track Management for Video Retrieval?
Pei-Yi Chen and Arbee L. P. Chen......Vol.22, No.6, pp.1519-1527

544.Visual-based Emotinal Descriptor and Feedback Mechanism for Image Retrieval?
Hun-Woo Yoo......Vol.22, No.5, pp.1205-1227

Multiple Data Stream Architectures

545.A Systolic Design to Generate Combinations
Chau-Jy Lin and Jong-Chuang Tsay......Vol.4, No.1, pp.35-47

546.Equivalent Transformations on Systolic Design Represented by Generating Functions
Young-Chang Hou and Jong-Chuang Tsay......Vol.5, No.3, pp.229-250

547.On Fault-Tolerant Routing of Benes Network
Shing-Tsaan Huang and Chin-Hsiang Tung......Vol. 4, No.1, pp.1-13

Multiprocessors

548.Rearrangeability of Cascaded Delta Networks
Nian-Shing Chen, Shing-Tsaan Huang and Kung-Chung Hsieh......Vol.7, No.1, pp.1-12

N

Natural Language Processing

549.Deterministic Chinese Parsing Using Formal Semantics
Jingye Zhou and Shi-Kuo Chang......Vol. 2, No.1, pp.1-42

Networks

550.Adaptive Routing in VP-based ATM Networks
Ren-Hung Hwang......Vol.11, No.4, pp.595-624

Neural Networks and Fuzzy Sets

551.A Concurrent Training Algorithm for Supervised Learning in Artificial Neural Networks
C.R. Chow and C.H. Chu......Vol.13, No.2, pp.267-291

552.A Connectionist Fuzzy Classifier for Speech Recognition
Yau-Hwang Kuo, Cheng-I Kao and Jiahn-Jung Chen......Vol.10, No.1, pp.1-20

553.A Constant-Time Neural Network for Multiple Selection of Extreme Values
Wen-Kuang Chou, David Y. Y. Yun and Chien-Chao Tseng......Vol.9, No.3, pp.445-459

554.A Fast Learning Multilayer Neural Model and Its Array Processor Implementation
Cheng-Chin Chiang and Hsin-Chia Fu......Vol.8, No.2, pp.283-304

555.A Faster Winner-Take-All Neural Networks With the Dynamic Ratio
Chi-Ming Chen, Ming-Hung Hsu and Tien-Yo Wang......Vol.18, No.2, pp.187-210

556.A Fuzzy Neural Network Model for Fuzzy Rule Verification, Refinement and Generation
Hahn-Ming Lee, Fu-Tyan Lin and Jyh-Ming Chen......Vol.13, No.2, pp.311-333

557.A Hierarchical Neural Network for Hidden Markov Models
Wen-Kuang Chou......Vol.13, No.2, pp.207-234

558.A Match-Based Clustering Neural Network for Stable Category Learning of Multiple-Value patterns
Cheng-An Hung and Sheng-Fuu Lin......Vol.13, No.4, pp. 543-562

559.A New ISF-FLANN Channel Equalizer for 4QAM Digital Communication Systems and Its FPGA Verification?
Wan-De Weng, Chin-Tsu Yen and Rui-Chang Lin......Vol.22, No.5, pp.1163-1176

560.A New SCHMM/MNN Hybrid Model for Mandarin Speech Recognition
Shin-Lun Tung and Yau-Trang Juang......Vol.13, No.2, pp.355-365

561.An Associative Architecture of CMAC for Mobile Robot Motion Control
Yuan-Pao Hsu, Kao-Shing Hwang and Jinn-Shyan Wang......Vol.18, No.2, pp.145-161

562.An Associative Representation of Stack Neural Networks-Maximum Stacking Vector Representation
Pao-Ta Yu and Rong-Chung Chen......Vol. 12, No.4, pp.525-546

563.An Optimal Design of Fuzzy (m,n) Rank Order Filtering with Hard Decision Neural Learning
Rong-Chung Chen and Pao-Ta Yu......Vol.11, No.4, pp.567-593

564.Applying Genetic Algorithms to Solve the Fuzzy Optimal Profit Problem
Feng-Tse Lin and Jing-Shing Yao......Vol.18, No.4, pp.563-580

565.Conglomerate'Neural Network Architectures: The Way Ahead for Simulating Early Language Development
Syed Sibte Raza Abidi and Khrushid Ahmad......Vol.13, No.2, pp.235-266

566.Construction of Neural Networks from Desicion Trees
Shie-Jue Lee, Mu-Tune Jone and Hsien-Leing Tsai......Vol.11, No.3, pp.391-415

567.Elman Network with Embedded Memory for System Identification?
Adem Kalinli and Seref Sagiroglu......Vol.22, No.6, pp.1555-1568

568.Forecasting and Analysis of Marketing Data Using Neural Networks
Jingtao Yao, Nicholas, Hean-Lee Poh and Chew Lim Tan......Vol.14, No.4, pp.843-862

569.Fuzzy ARTRON: A General-Purpose Classifier Empowered by Fuzzy ART and Error Back-Propagation Learning
Cheng-Seen Ho and Jia-Shian Chou......Vol. 17, No.4, pp.683-695

570.Fuzzy Modeling Employing Fuzzy Polyploidy Genetic Algorithms
Ming-Da Wu and Chuen-Tsai Sun......Vol.18, No.2, pp.163-186

571.Fuzzy Shortest-Path Network Problems With Uncertain Edge Weights
Jing-Shing Yao and Feng-Tse Lin..........Vol.19, No.2, pp.329-351

572.Inconsistency Resolution and Rule Insertion for Fuzzy Rule-Based Systems
Hahn-Ming Lee, Jyh-Ming Chen and Chun-Lin Liu......Vol.18, No.2, pp.187-210

573.Intelligent Stock Trading Decision Support System Using Dual Adaptive-Structure Neural Networks
Gia-Shuh Jang, Feipei Lai and Tai-Ming Parng......Vol.9, No.2, pp.271-297

574.Maximum Likelihood Density Estimation by Means of an Artificial Neural Networks

575.Modeling and Analysis of Acoustic Musical Strings by Using Kelly-Lochbaum Lattice Networks
Sheng-Fu Liang and Alvin W. Y. Su......Vol.20, No.6, pp.1161-1182

Jian-Xiong Wu and Chorkin Chan......Vol.7, No.2, pp.153-172

576.Neural Mesh for The Steiner Tree Problem
Cheng-Yuan Liou and Quan-Ming Chang......Vol.13, No.2, pp.335-354

577.On the Capability of a New Multilayer Perceptron for Two-Class Classification Problems
Cheng-Chin Chiang and Hsin-Chia Fu......Vol.8, No.4, pp.567-585

578.PDP Estimation of Density and PDP Bayes Classifier
Jian-Xiong Wu and Chorkin Chan......Vol.7, No.1, pp.37-52

579.Rechargeable Parallel Learning Architecture: REPLA
Wen-Kuang Chou and David Y. Y. Yun......Vol.9, No.2, pp.299-317

580.Sampling Effects on Trajectory Production and Attractor Prediction
Daw-Tung Lin......Vol.13, No.2, pp.293-310

581.Stable Input-Output Linearization Using Static Neural Networks
A. Delgado......Vol.13, No.2, pp.183-206

582.Target Components Discrimination using Adaptive Time-Delay Neural Network
Daw-Tung Lin......Vol.20, No.5, pp.959-980

583.The Multi-User Detection in Code Division Multiple Access with Adaptive Neuro-Fuzzy Inference System?
Yalcin Isik and Necmi Taspinar......Vol.22, No.6, pp.1529-1542

584.Wavelet Neural Networks with a Hybrid Learning Approach?
Cheng-Jian Lin......Vol.22, No.6, pp.1367-1387

Nonnumerical Algorithms

585.A New Distributed Maximum Flow Algorithm for Planar Directed Network
Jyh-Horng Chern and Shian-Shyong Tseng......Vol.6, No.3, pp.159-172

Nonumerical Algorithms and Problems

586.Distributed Matching for Communicating Sequential Processes
Jau-Yueh Wang and Shing-Tsaan Huang......Vol.5, No.1, pp.35-49

587.The Optimality of the Number ofk-Sorters of a Parallel Merging Algorithm
S. S. Tseng and R. C. T. Lee......Vol.1, No.1, pp.59-71

Numerical Analysis

588.A Numerical Method for Solving Time-Invariant System by Generalized Inverse Vandermonde Matrix
Kao-Shing Hwang and Feng-Cheng Chang......Vol.15, No.2, pp.321-327

589.Comparisons of Iterative Algorithms for Linear Systems
Hung-Hsin Wu and Mu-Shieung Liu......Vol.8, No.3, pp.449-486

O

Operating System

590.Estimating and Measuring Covert Channel Bandwidth in Multilevel Secure Operating Systems
Shiuh-Pyng Shieh......Vol.15, No.1, pp.91-106

591.Experiences in Porting£g-Kernel Operating System to the CONVEX Supercomputer
Paul C.H. Lee, Mei-Ling Chiang, Shang-Te Hsu, Ta-Chuan Liu, Wu-Yang Chung and Ruei-Chuan Chang......Vol.12, No.2, pp.167-192

Operating System-Security and Protection

592.A New Password Authentication Scheme
Chin-Chen Chang and Ling-Hua Wu......Vol.6, No.2, pp.139-147

Operating System-Storage Management

593.An Intelligent Page Replacement Method for DBMS Buffer Management
Y. H. Chin and M. C. Jer......Vol.4, No.1, pp.49-72

P

[]Parallel Compilers]

594.Applications and Performance Analysis of An Optimization Approach for List Scheduling Algorithms on Distributed Memory Multiprocessors
Yeh-Ching Chung, Chia-Cheng Liu and Jenshiuh Liu......Vol.11, No.2, pp.155-181

595.Automamtic Assembly Program Retargeting for Microcontrollers
Ing-Jer Huang and Dao-Zhen Chen..........Vol.19, No.5, pp.717-743

Parallel Computation

596.An Embedding of Large Binary Trees into Hypercube Multiprocessors of Limited Size
Ming-Yi Fang and Wen-Tsuen Chen......Vol.8, No.1, pp.105-119

597.Generalized Wormhole Routing Strategies in Hypercubes
Hsing-Lung Chen and Han-Shing Yihng......Vol.10, No.3, pp.387-410

Parallel processing

598.A New Relaxed Memory Consistency Model for Shared-Memory Multiprocessors with Parallel-Multithreaded Processing Elements
Chao-Chin Wu and Cheng Chen......Vol.14, No.4, pp.785-808

599.A Parallel Maximal Cliques Algorithm for Interval Graphs with Applications
Chi-Su Wang and Ruay-Shiung Chang......Vol.13, No.4, pp. 649-663

600.Adaptive and Fault-Tolerant Wormhole Routing in Hypercube Network
Chu-Sing Yang and Yi-Min Tsai......Vol.9, No.2, pp.253-270

601.Compiler Techniques for Extracting Loop-Level Parallelism
Sheng-De Wang and Chien-Min Wang......Vol.7, No.4, pp.543-563

602.An Or-Parallel Inference Model Based on Multi RISC-Style Processing System
Cheng Chen, Chung Ping Chung, Cheng Chin Chiang, Hsin Chia Fu and S. J. Wang......Vol.7, No.4, pp.487-512

603.Architectural Design of Orthogonal Multiprocessor for Multidimensional Information Processing
Kai Hwang and Dhabaleswar K. Panda.....Vol.7, No.4, pp.459-485

604.Compiling Array References with Affine Functions for Data-Parallel Programs
Wen-Hsing Wei, Kuei-Ping Shih and Jang-Ping Sheu......Vol.14, No.4, pp.695-723

605.Design and Implementation of Cohesion
Ce-Kuen Shieh, Jyh-Chang Ueng and An-Chow Lai......Vol.14, No.4, pp.725-741

606.Design of an Integrated Parallel Processing System with Systolic VLSI Chips
Wen-Tsuen Chen, Jia-Shung Wang, Chia-Cheng Liu, Shi-Jinn Horng, Chang-Biau Yang, Ruey-Zone Huang and Bern-Cherng Liaw......Vol.7, No.2, pp.217-235

607.Determining the Global Progress of Parallel Simulation
Yi-Bing Lin......Vol.9, No.3, pp.379-393

608.Efficient Embedding Hypercube on Arrangement Graphs
Shun-Shan Tsai and Shi-Jinn Horng......Vol. 12, No.4, pp.585-592

609.Efficient Execution of Parallel Functional Programs Using Complexity Information
Piyush Maheshwari......Vol.12, No.2, pp.261-275

610.Embeddings and Communication Algorithms in Faulty Hypercubes
Jin-Kun Wang......Vol.11, No.2, pp.249-274

611.Extended Tree Contraction for Some parallel Algorithms on Series-Parallel Networks
Jeng-Jung Wang, Shih-Yih Wang, Lih-Hsiang Hsu and Ting-Yi Sung......Vol.13, No.4, pp. 665-680

612.Fast Subcube Compaction in Hypercubes with the Buddy Allocation Strategy
Hsing-Lung Chen......Vol.11, No.3, pp.453-463

613.Fault-Tolerant Routing Algorithm for Meshes without Using Virtual Channels
Kuo-Hsuan Chen and Ge-Ming Chiu......Vol.14, No.4, pp.765-783

614.Finding Space-Optimal Linear Array for Uniform Dependence Algorithms with Arbitrary Convex Index Sets
Jenn-Yang Ke and Jong-Chuang Tsay......Vol.14, No.4, pp.743-763

615.Hierarchical Spanning Trees in Incomplete Hypercubes
Jenn-Yang Tien and Wei-Pang Yang......Vol.7, No.4, pp.613-633

616.Major Architectural Features of the Spectra-I Superscalar Microprocessor
Yen-Jen Oyang, Chun-Hung Wen, Ching-Chuan Chiang, Ching-Te Lin, Yu-Fen Chen, Shu-May Lin, Chao-Yi Fang, Fu-Li Chen and Chou-Yu Ku......Vol. 7, No.4, pp.513-527

617.Multi-Node Broadcasting in Hypercubes and Star Graphs
Yu-Chee Tseng......Vol.14, No.4, pp.809-820

618.Multilevel Hypercubes: An Efficient Class of Hypercube Interconnection Networks for Massively Parallel Systems
Wei-Kuo Chiang and Rong-Jaye Chen......Vol.12, No.3, pp.317-343

619.Optimal Embedding of Large Complete Binary Trees into Hypercubes
Chui-Cheng Chen and Rong-Jaye Chen......Vol.12, No.2, pp.307-314

620.Performance of Multi-Rate Data Flow Graphs for Concurrent Processing
Daniel Y. Chao......Vol.13, No.1, pp.85-123

621.Poisson Generators on Mesh-Connected Computers With Multiple Broadcasing
Yu-Song Hou and Rong-Jaye Chen......Vol.11, No.4, pp.663-673

622.Resilient and Flexible Ring Embedding in An Injured Hypercube
Yu-Chee Tseng......Vol. 12, No.4, pp.567-583

623.Scheduling Multiprocessing Systems for Parallel Programs with Nonhomogeneous Parallelism Profiles
Yao-Jen Chang and Jean-Lien Chen Wu......Vol.7, No.4, pp.593-611

624.Skewed Partition Method-Theory and Practice
Chung-Ta King......Vol.7, No.4, pp.565-592

625.Synthesizing the Parallelism of Nested Loops Using An Index Shift Method
Lang-Sheng Liu, Chin-Wen Ho and Jang-Ping Sheu......Vol.7, No.4, pp.529-541

PaTTERN recognition

626.A Branch and Bound Decision Tree Bayes Classifier for Robust Multi-font Printed Chinese Character Recognition
Chorkin Chan and Pak-Kwong Wong......Vol.8, No.3, pp.343-351

627.A Coarse Classification Scheme on Printed Chinese Characters by Encoding the Feature Points
Ming-Gang Wen, Chin-Chuan Han, Kuo-Chin Fan and Da-Way Tang..........Vol.19, No.4, pp.555-570

628.A New Approach to Robot Guidance in an Unfamiliar Environment Using Indication-Posts
Jiann-Der Lee, Jau-Yien Lee, Chin-Hsing Chen, King-Chu Hung and Chia-Nian Shyi......Vol.7, No.3, pp.301-333

629.Candidate Selection in On-Line Chinese Character Recognition System Using Voting Scheme
Chien-Cheng Tseng, Bor-Shenn Jeng and Kuo-Sen Chou......Vol.15, No.3, pp.451-462

630.Classification of Chinese Characters using Pseudo Skeleton Features
Ming-Gang Wen, Kuo-Chin Fan and Chin-Chuan Han......Vol.20, No.5, pp.903-922

631.Discriminant Analysis Based on Hyperellipsoid Distribution
Jun S. Huang and Mark C. K. Yang......Vol.10, No.1, pp.71-79

632.Finding the Rib Cage from Chest X-Ray Images by Inexact Hough Transform
Long-Wen Chang and Huan-Chau Hwang......Vol.5, No.1, pp.1-15

633.Fuzzy Adaptive Hamming Net for Pattern Clustering
Cheng-An Hung and Sheng-Fuu Lin......Vol.11, No.4, pp.491-511

634.Information Distributiono f the Central Projection Method for Chinese Character Recognition
Yu Tao, Ernest C. M. Lam, Chin S. Huang an dYUan Y. Tang......Vol. 16, No.1, pp.127-139

635.Modified Earley Parsing and MPM Method for Attributed Grammar and Seismic Pattern Recognition
Kou-Yuan Huang and Dar-Ren Leu......Vol.8, No.4, pp.541-565

636.Multiple Facial Features Representation for Real-Time Face Recognition?
Ching-Han Chen, Chia-Te Chu, Jia-Hong Dai and Chih-Yung Chen......Vol.22, No.6, pp.1601-1610

637.New Fuzzy Hierarchical Clustering Algorithms
Perng-Cherng Wang and Jin-Jang Leou......Vol.9, No.3, pp.461-489

638.Optical Recognition of Handwritten Chinese Characters by Partial Matching
An-Bang Wang, Kuo-Chin Fan and Jun Shon Huang......Vol.10, No.4, pp.569-585

639.Pattern Recognition by Dynamic Look-up-Table Programming -The Dynamic Pyramid Approach
Yung-Lung Ma and Jung-Shin Jour......Vol.1, No.1, pp.83-97

640.Pattern Recognition by High-Capacity Polynomial Bidirectional Hetero-Associative Network
Chua-Chin Wang, Cheng-Fa Tsai and Yu-Tsun Chien......Vol. 17, No.2, pp.313-324

641.Ring Data for Invariant Recognition of Handwwritten Chinese Characters
Din-Chang Tseng, Hung-Pin Chiu and Jen-Chieh Cheng......Vol.14, No.2, pp.479-497

Personal computing

642.Evaluation of Distributed and Replicated HLR for Location Management in PCS Network
Guan-Chi Chen and Suh-Yin Lee..........Vol.19, No.1, pp.85-101

643.Modeling Frequently Accessed Wireless Data With Weak Consistency
Yi-Bing Lin and Yung-Chang Chang......Vol.18, No.4, pp.581
-600

Probability and statistics

644.Statistical Detection and Estimation of Signal Changes with Applications to Image Processing
Jun S. Huang and Dong H. Tseng......Vol.5, No.2, pp.143-155

Programming language

645.A New Method Dispatcher to Improve Execution Speed for Object-Oriented Programming Systems
Deng-Jyi Chen, Shih-Kun Huang and Wu-Chi Chen......Vol.11, No.4, pp.649-661

646.Iterators: Taxonomy, Strength, Weakness, and Efficiency
Pei-Chi Wu and Feng-Jian Wang..........Vol.19, No.5, pp.839-856

647.Towards a Practical Visual Object-Oriented Programming Environment: Desirable Functionalities and their Implementation
Chung-Hua Hu and Feng-Jian Wang......Vol.15, No.4, pp.585-614

Q

queueing theory

648.Time Analysis of a Heterogeneous Multi-Server Queue with a General Service Time Requirement
Jau-Hsiung Huang and Jun-Song Lee......Vol.7, No.3, pp.347-366

R

r.o.c. computational linguistics workshops ii 1989

649.Computer Interpretation of Chinese Declarative Sentences Based on Situation Semantics
His-Jian Lee and Chun-Hsiao Lee......Vol. 5, No.4, pp.379-394

650.The Formal Architecture of Lexical-Functional Grammar
Ronald M. Kaplan......Vol. 5, No.4, pp.305-322

651.The Identification of Thematic Roles in Parsing Mandarin Chinese
Keh-Jiann Chen, Chu-Ren Huang and Li-Ping Chang......Vol. 5, No.4, pp.349-366

652.Long-Distance Dependencies in a Logic Grammar: SCP
Akira Ishikawa and Seiki Akama......Vol. 5, No.4, pp.367-377

653.NTUMT Strategy for Prepositional-Phrase Attachment
Ka-Wai Chui, Yia-Ping Lin, Shuanfan Huang and I-Peng Lin......Vol. 5, No.4, pp.449-460

654.The Syntactic Projection Problem and the Comparative Syntax of Locative Inversion
Joan Bresnan......Vol. 5, No.4, pp.287-303

655.Systemic Generation of Chinese Sentences
Jyun-Sheng Chang and Hwei-Ming Kuo......Vol. 5, No.4, pp.421-436

656.Translating from English to Logic in Tarski's World
Lauri Karttunen......Vol. 5, No.4, pp.323-348

657.A Unification-Based Approach to Lexicography for Machine Translation Systems
Shu-Chuan Chen, Mei-Hui Wang and Keh-Yih Su......Vol. 5, No.4, pp.437-448

658.A Unification-Based Approach to Mandarin Questions
Yu-Ling Shiu and Chu-Ren Huang......Vol. 5, No.4, pp.395-420

real-time and media systems

659.Criticality-Based Load Adjustment in Adaptive Real-Time Systems
Shie-Kai Ni, Tei-Wei Kuo and Giun-Haur Huang......Vol.13, No.3, pp.447-460

660.Design and Implementation of A Memory-Based Object Server for Hand-Held Computers
Mei-Ling Chiang, Paul C.H. Lee, Shih-Yueh Lo and Ruei-Chuan Chang......Vol.13, No.3, pp.431-446

661.Design and Model of A Rate-Based Flow Control Scheme
An-Chi Liu and Yee-Hsiang Chang......Vol.13, No.3, pp.489-516

662.Efficient Utilization of Zoned-Disk Bandwidth for Video Servers
Shiao-Li Tsao and Yueh-Min Huang......Vol.13, No.3, pp.399-416

663.On Multicast Routing in Clos Networks
Jan-Ming Ho, De-Ron Liang and Kuo-Hui Tsai......Vol.13, No.3, pp.417-429

664.On Multicast Routing in Single Rate Loss Networks
Ren-Hung Hwang......Vol.13, No.3, pp.461-474

665.On The Prototyping, Analysis and Performance Improvement of Video Conference Systems on FDDI Networks
Y.C. Chen and J.H. Kuo......Vol.13, No.3, pp.475-488

666.Temporal Properties Underlying Multimedia Presentations with Z Notations
Timothy K. Shih, Hung-Chao Keh, Ying-Hong Wang and Ying-Feng Kuo......Vol.15, No.1, pp.107-129

667.Vega: A Multimedia Database System Supporting Content-Based Retrieval
Chin-Chin Liu and Arbee L.P. Chen......Vol.13, No.3, pp.369-398

robotics

668.On the Motion Planning Problem: The Case of a Polygonal Object Moving Amidst Obstacles of Arbitrary Shape
Ping-Lih Lin, Yat-Chen Chen and Shyang Chang......Vol.8, No.1, pp.131-156

669.On-Line Collision-Avoidance Trajectory Planning of Two Planar Robots Based on Geometric Modeling
Kao-Shing Hwang and Ming-Der Tsai......Vol.15, No.1, pp.131-152

670.On Controlling and Manipulating Objects Using Coordinated Robots
Maw-Kae Hor......Vol.10, No.3, pp.433-446

S

security and protection

671.A Cascade Exponentiation Evaluation Scheme Based on the Lempel-Ziv-Welch Compression Algorithm
Chin-Chen Chang, Woan-Jing Horng and Daniel J. Buehrer......Vol.11, No.3, pp.417-431

[672.]A New Design for a Pratical Secure Cookies System?
Jong-Phil Yang and Kyung Hyune Rhee......Vol.22, No.3, pp.
559-571

673.An Approach to XML-Based Administration and Secure Information Flow Analysis on an Object Oriented Role-Based Access Control Model?
Cungang Yang and Chang N. Zhang......Vol.22, No.1, pp.49-61

674.An Efficient Sealed-Bid Auction Protocol with Two Servers?
Sang Uk Shin......Vol.22, No.6, pp.1505-1518

675.An Organization Structure-Based Administration Model for Decentralized Access Control?
Sejong Oh, Changwoo Byun and Seog Park......Vol.22, No.6, pp.1465-1483

676.Design of Proxy Signature in the Digital Signature Algorithm (DSA)
I-Te Chen, Ming-Hsin Chang and Yi-Shiung Yeh......Vol.22, No.4, pp.965-973

677.New Audio Secret Sharing Schemes Wtih Time Division Technique
Chen-Chi Lin, Chi-Sung Laih and Ching-Nung Yang..........Vol.19, No.4, pp.605-614

678.Practical Construtions to Multiple Designated Confirmer Signatures?
Chih-Hung Wang......Vol.22, No.6, pp.1389-1407

679.Secure Authentication Protocols Resistant to Guessing Attacks?
Jia-Ning Luo, Shiuhpyng Shieh and Ji-Chiang Shen......Vol.22, No.5, pp.1125-1143

680.Semi-fragile Image Authentication Using Real Symmetric Matrix?
Ching-Tang Hsieh, Yeh-Kuang Wu, Chyi-Jang Lee and Hong-Yu Chen......Vol.22, No.3, pp.701-712

681.Single Switch Chinese Phonetic Communication System
Cheng-Hong Yang, Cheng-Huei Yang, Li-Yeh Chuang and Ching-Hsing Luo......Vol.18, No.1, pp.115-124

682.Storage Efficient Key Management Technique for Secure Multicasting?
Ganapathi Padmavathi and Samukutty Annadurai......Vol.22, No.3, pp.675-689

signal and speech processing

683.A Segmentation Method for Continuous Speech Utilizing Hybrid Neuro-Fuzzy Network
Ching-Tang Hsieh, Mu-Chun Su, Eugene Lai and Chih-Hsu Hsu......Vol.15, No.4, pp.615-628

684.Improvement on Connected Mandarin Digit Recognition by Explicitly Modeling Coarticulartory Information
Ruey-Ching Shyu, Jhing-Fa Wang and Jau-Yien Lee......Vol. 16, No.4, pp.649-660

685.Optimization of HMM by the Tabu Search Algorithm
Tsong-Yi Chen, Xiao-Dan Mei, Jeng-Shyang Pan and Sheng-He Sun......Vol.20, No.5, pp.949-957

686.Robust Speaker Identification System Based on Wavelet Transform and Gaussian Mixture Model
Ching-Tang Hsieh, Eugene Lai and You-Chuang Wang..........Vol.19, No.2, pp.267-282

single data stream architecture

687.Design of the Dual-ALU CRISC and Its Concurrent Execution
Chung-Ping Chung, Shyi-Chyi Jeng, Hong-Chich Chou and Cheng Chen......Vol.5, No.3, pp.251-274

signal processing

688.A Windowed Search Method for the Pitch Predictor in Celp Coder
Chih-Chung Kuo, Ron-Chuan Pan, Fu-Rong Jean and Hsiao-Chuan Wang......Vol.8, No.3, pp.415-430

689.Design of A Software Tool for Vocal Tract Simulation Systems
Dong-Hwa Lu, Shen-Nan Huang and K.Y. Cheng......Vol.13, No.1, pp.155-169

simulation

690.A New Simulation Model for Wave Generation
Der-Baau Perng and Jia-Lin Tsai......Vol.12, No.1, pp.153-163

simulation and modeling

691.Automatic Simulation and Verification of Pipelined Microcontrollers
Ing-Jer Huang and Li-Rong Wang......Vol.15, No.2, pp.307-320

692.On Checkpointing in Time Warp Parallel Simulation
Shu-Yuen Hwang and Yi-Bing Lin......Vol.8, No.4, pp.587-602

693.Some Properties of Conservative Parallel Discrete Event Simulation
Yi-Bing Lin, Edward D. Lazowska and Shu-Yuen Hwang......Vol.8, No.1, pp.61-77

software publication track

694.Boosting Ethernet using Regular Switching Hubs?
Chih-Wen Hsueh, Hsin-Hung Lin and Guo-Chiuan Huang......Vol.22, No.4, pp.721-734

695.Control Component Development of Information Appliances on Networks?
Po-Cheng Huang, Kuan-Rong Lee, Wei-Tsung Su, Yau-Hwang Kuo, Mong-Fong Horng, Chien-Chou Lin and Yu-Chang Chen ......Vol.22, No.4, pp.771-784?

696.Design and Implementation of the OpenMP Programming Interface on Linux-based CMP Clusters?
Tyng-Yeu Liang, Shih-Hsien Wang, Ce-Kuen Shieh, Ching-Min Huang and Liang-I Chang......Vol.22, No.4, pp.785-798?

697.Drought Forecast Model and Framework Using Wireless Sensor Networks?
Hsu-Yang Kung, Jing-Shiuan Hua and Chaur-Tzuhn Chen......Vol.22, No.4, pp.751-769?

698.Open Soruce Licenses and the Creative Commons Framework: License Selection and Comparison?
Yi-Hsuan Lin, Tung-Mei Ko, Tyng-Ruey Chuang and Kwei-Jay Lin......Vol.22, No.1, pp.1-17?

699.Real-Time Linux with Budget-Based Resource Reservation?
Nei-chiung Perng, Chin-Shuang Liu and Tei-Wei Kuo......Vol.22, No.1, pp.31-47

700.SOTS-CE: A Sonography Ovarian Tumor System with Case Exchange?
Chow-Sing Lin and Chin-Ju Hsieh......Vol.22, No.4, pp.735-750

software engineering

701.A Case Study on Improving Changeability of COTS-Based System Using Aspect-Oriented Programming?
Jingyue Li, Axel Adners Kvale and Reidar Conradi......Vol.22, No.2, pp.375-390

702.A Fully Distributed Approach to Repositories of Reusable Software Components
Yuen-Chang Sun, Ming-Lin Kao and Chin-Laung Lei......Vol. 17, No.1, pp.147-158

703.A Pattern-based Development Methodology for Communication Protocols
YoungJoon Byun and Beverly A. Sanders......Vol.22, No.2, pp.315-335

704.A Project Model for Software Development
Bin-Shiang Liang, Jenn-Nan Chen and Feng-Jian Wang......Vol. 16, No.3, pp.423-446

705.A Software Product Model Emphasizing Relationships
Shih-Chien Chou and Chun-Wei Huang......Vol.20, No.2, pp.349-377

706.A Survey of the Influence of Programming Constructs and Mechanisms on Software Quality
Deng-Jyi Chen, Wu-Chi Chen, Shih-Kun Huang and David T. K. Chen......Vol.10, No.2, pp.177-201

707.A Validation Assistant for A Distributed Office Information System Modeled by Office Procedure Model
Fang Yie Leu, Shi-Kuo Chang and Chien-Chiao Yang......Vol.11, No.2, pp.183-206

708.Component Identification Methods Applying Method Call Types between Classes
Misook Choi and Eunsook Cho......Vol.22, No.2, pp.247-267

709.Constructing and Object-Oriented Architecture for Web Application Testing
Ji-Tzay Yang, Jiun-Ling Huang, Feng-Jian Wang and William C. Chu......Vol.18, No.1, pp.59-84

710.Data Type Based Measurement of Composite Module Cohesion
William Cheng-Chung Chu and Sukesh Patel......Vol.13, No.1, pp.63-83

711.Flow Analysis of Class Relationships for Object-Oriented Programs
Jiun-Liang Chen and Feng-Jian Wang......Vol. 16, No.4, pp.619-647

712.Fuzzy Decision Tree Approach for Embedding Risk Assessment Information into Software Cost Estimation Model ?/span>
Sun-Jen Huang, Chieh-Yi Lin and Nan-Hsing Chiu......Vol.22, No.2, pp.297-313

713.Inheritance-Based Metric for Complexity Analysis in Object-Oriented Design
Chi-Ming Chung and Ming-Chi Lee......Vol.8, No.3, pp.431-447

714.Integration of Reusable Software Components and Frameworks Into a Visual Software Construction Approach
Deng-Jyi Chen, Chorng-Shiuh Koong, Wu-Chi Chen, Shih-Kun Huang and N. W. P. van Diepen......Vol. 16, No.6, pp.863-884

715.OOSZ: An Integration of Bailin's Object-Oriented Analysis and Formal Specifications
Jonathan Lee, Jiann-I Pan and Wei T. Huang......Vol.13, No.4, pp.517-542

716.Organizing and Visualizing Software Repositories Using the Growing Hierarchical Self-Organizing Map ?/span>
Songsri Tangsripairoj and M. H. Samadzadeh......Vol.22, No.2, pp.283-295

717.Process and Planning Support for Iterative Porting ?/span>
Pradeep Varma......Vol.22, No.2, pp.337-356

718.Some Complexity Metrics for Object-Oriented Programs Based on Information Flow: A Study of C++ Programs
Yen-Sung Lee, Bin-Shiang Liang and Feng-Jian Wang......Vol.10, No.1, pp.21-50

719.Space-Efficient Page-Level Incremental Checkpointing
Junyoung Heo, Sangho Yi, Yookun Cho and Jiman Hong......Vol.22, No.2, pp.237-246

720.The Evolution of an Object-Oriented Specification for Compilers
Pei-Chi Wu and Feng-Jian Wang......Vol.11, No.3, pp.433-452

721.Towards Quality of Software in TUG
Chia-Chu Chiang......Vol.20, No.4, pp.575-615

722.Verification of UML Model Elements Using B
Ninh Thuan Truong and Jeanine Souquieres......Vol.22, No.2, pp.357-373

723.Wrapper-Based Framework for Domain-Specific Software Reuse
Hisham M. Haddad and Ying Xie......Vol.22, No.2, pp.269-282

724.TeMeFr: Towards a Reuse-Based Development for Conference-Oriented Telemedicine Systems
Hewijin Christine Jiau, Jinghong Cox Chen, Kuo-Feng Ssu and Jim-Min Lin......Vol.22, No.3, pp.625-640

software requirements

725.A Frame-Based Software Requirements Specification Language and Its Environment
Shun-Tzu Tsai, Chien-Chiao Yang and Chih-Cheng Lien......Vol.6, No.2, pp.73-99

speech processing

726.Prosodic Rules for Connected Mandarin Synthesis
Ngor-Chi Chan and Chorkin Chan......Vol.8, No.2, pp.261-281

speech recognition

727.On Segmentation and Recognition of Connected Spoken Digits Based on a Neural Network Model
Chung-Hsien Wu, Jhing-Fa Wang, Ruey-Chinq Shyu and Jau-Yien Lee......Vol.6, No.2, pp.101-116

statistics

728.Number of Solutions of SAT Instances: A Probability Distributions Study
Habiba Drias......Vol.8, No.4, pp.621-631

system performance

[729.]A Fault-Tolerant Protocol for Generating Sequence Numbers for Total Ordering Group Communication in Distributed Systems
Chih-Ming Hsiao and Ge-Ming Chiu......Vol.22, No.5, pp. 1265-1277?

730.Bounding DMA Interference on Hard-Real-Time Embedded Systems
Tai-Yi Huang, Chih-Chieh Chou and Po-Yuan Chen......Vol.22, No.5, pp.1229-1247

731.Mobile Real-Time Read-Only Transaction Processing in Broadcast Disks ?/span>
Hong-Ya Wang, Guo-Qin Ning, Guo-Hui Li and Kam-Yiu Lam......Vol.22, No.5, pp.1249-1264

732.Stochastic Data flow Graph Models for the Reliability Analysis of Interconnection and Computer Networks
Deng-Jyi Chen and Krishna M. Kavi......Vol.7, No.2, pp.253-278

systolic algorithms

733.Three-Level FP Programs and the Derivation of Problem-Size-Dependent/Independent Systolic Algorithms
Yen-Chun Lin and Ferng-Ching Lin......Vol.6, No.2, pp.117-137

T

theory of computation

734.A Depth 3 Circuit Lower Bound for the Parity Function
Shi-Chun Tsai......Vol. 17, No.5, pp.857-860

U

V

vlsi aID DESIGN

735.A Two-Phase Fault Simulation Scheme for Sequential Circuits
Wen-Ching Wu, Chung Len Lee and Jwu E Chen......Vol.14, No.3, pp.669-686

VLSI COMPUTER AIDS DESIGN ENGINEERING

736.Concurrent Error Detection, Diagnosis, and Fault Tolerance for Switched-Capacitor Filters
Kuen-Jong Lee and Cheng-Hsuing Kuo......Vol.14, No.4, pp.863-890

VLSI TESTING

737.A Behavior-Level Fault Model for the Closed-Loop Operational Amplifier
Yeong-Jar Chang, Chung Len Lee Jwu E Chen, Chauchin Su......Vol.16, No.5, pp.751-766

738.A Probabilistic Model for Path Delay Fault Testing
Chih-Yuang Su and Cheng-Wen Wu......Vol.16, No.5, pp.783-794

739.Compact Test Generation Using a Frozen Clock Testng Strategy
Elizabeth M. Rudnick and Miron Abramovici......Vol.16, No.5, pp.703-717

740.Flip-Flop Selection for MIxed Scan and Reset Design Based on Test Generation and Structure of Sequential Circuits
Hsing-Chung Liang and Chung Len Lee......Vol.16, No.5, pp.687-702

741.Impulse Response Fault Model and Fault Extraction for Functional Level Analog Circuit Diagnosis
Chauchin Su, Yue-Tsang Chen and Shen-Shung Chiang......Vol.16, No.5, pp.719-731

742.Testability Improvement by Branch Point Control for Conditional Statements With Multiple Branches
Sying-Jyan Wang and Chia-Chun Lien......Vol.16, No.5, pp.719-731

743.Testable Path Delay Fault Cover for Sequential Circuits
Angela Krstic, Srimat T. Chakradhar, Kwang-Ting Cheng......Vol.16, No.5, pp.673-686

744.Testing Configurable LUT-Based FPGAs
shyue-Kung Lu and Jen-Sheng Shih......Vol.16, No.5, pp.733-750

W

X

Y

Z

SPECIAL SECTION FOR SELECTED PAEPRS FROM NATIONAL COMPUTER SYMPOSIUM

1.       A Novel Color Transfer Algorithm for Image Sequences
Chung-Ming Wang and Yao-Hsien Huang......Vol.20, No.6, pp.1039-1056

2.       Adaptive Learning Environment to Meet Pedagogical Needs
Jun-Ming Su, Shian-Shyong Tseng, Ching-Tai Chen and Wen-Nung Tsai......Vol.20, No.6, pp.1057-1077

3.       Abnormal Event Detection for Network Flooding Attacks
Chi-Shih Chao, Yu-Xin Chen and An-Chi Liu......Vol.20, No.6, pp.1079-1091

4.       An Application-Oriented Linux Kernel Customization for Embedded Systems
Chi-Tai Lee, Jim-Min Lin, Zeng-Wei Hong and Wei-Tsong Lee......Vol.20, No.6, pp.1093-1107

5.       A Multicast Routing Protocol with Dynamic Tree Adjustment for Mobile IPv6
Ruay-Shiung Chang and Yun-Sheng Yen......Vol.20, No.6, pp.1109-1124

6.       Content Delivery Network with Hot-Video Broadcasting and Peer-to-peer Approach
Julian Liu, Su-Chiu Yang, Hsiang-Fu Yu and Li-Ming Tseng......Vol.20, No.6, pp.1125
-1139

SPECIAL ISSUE FOR SELECTED PAPER FROM INTERNATIONAL COMPUTER SYMPOSIUM

7.       On the Corssing Distribtion Problem in Two Regions
T. K. Yu and D. T. Lee......Vol.20, No.1, pp.1-25

8.       Energy-Efficient topology control for Wireless Ad Hoc Sensor Networks
Yu-Chee Tseng, Yen-Ning Chang and bour-Hour Tzeng......Vol.20, No.1, pp.27-37

9.       Construction Fault-Tolerant Communication Trees in Hypercubes
Po-Jen Chuang, Shih-Yuan Chen and Juei-Tang chen......Vol.20, No.1, pp.39-55

10.    Mining Control Patterns from Java Program Corpora
Deng-Jyi Chen, chung-Chien Hwang, Shih-Kun Huang and David T. K. Chen......Vol.20, No.1, pp.57-83

11.    Distributed Bandwidth-Constrained Routing for Data Streaming across Multiple Routes for Improving Call Blocking Rate and Channel Utilization in Wireless Ad Hoc Newtorks
Chung-Hung Richard Lin and Yi-Siang Huang......Vol.20, No.1, pp.85-103

12.    Optimal Algorithms for 2xn AB Games-A graph-Partition Approach
Shan-Tai Chen and Shun-Shii Lin......Vol.20, No.1, pp.105-126

13.    On the Array Embeddings and Layouts of Quadtrees and Pyramids
Gene Eu Jan, Shao=Wei Leu and Cheng-Hung Li......Vol.20, No.1, pp.127-141

14.    Optimal Independence Spanning Trees on Hypercubes
Shyue-Ming Tang, Yue-Li Wang and Yung-Ho Leu......Vol.20, No.1, pp.143-156

15.    Power-Efficient Geographic Routing for MANETs
Lan Luan, Wen-Jing Hsu and Rui Zhang......Vol.20, No.1, pp.157-180

16.    Constructing Evolutionary Treees from Rooted Triples
Bang Ye Wu......Vol.20, No.1, pp.181-190

17.    Legion Structure for Quorum-Based Location Management in Mobile Computing
Ming-Jeng Yang, Yao-Ming yeh and Yao-Ming Chang......Vol.20, No.1, pp.191-202

18.    Stickness, Edge-Thickness, and Clique-Thickness in Graphs
Ton Kloks, Chuan Min Lee and Jiping Liu......Vol.20, No.2, pp.207-217

19.    Modeling of Volcanic Clouds using CML
Ryoichi Mizuno, Yoshinori Dobashi and Tomoyuki Nishita......Vol.20, No.2, pp.219-232

20.    ISRVT: An Interactive Spectral Rendering Visualization Tool
Jin-Ren Chern and Chung-Ming Wang......Vol.20, No.2, pp.233-261

21.    A Parallel Loop Self-Scheduling on Extremely Heterogeneous PC Clusters
Chao-Tung Yang and Shun-Chyi Chang......Vol.20, No.2, pp.263-273