IIHMSP-2007-0008 |
A NEW OPTIMAL DWT DOMAIN IMAGE WATERMARKING
TECHNIQUE VIA GENETIC ALGORITHM |
Zhong, Ning
|
IIHMSP-2007-0012 |
AN ENHANCEMENT ALGORITHM BASED ON PYRAMID
STRUCTURE FOR RADIOGRAPHIES |
wei, liu
|
IIHMSP-2007-0015 |
Crytanalysis and Improvement on Chang et al.’s Signature Scheme |
Wang, ingLong |
IIHMSP-2007-0018 |
Design and Simulation of VHDL based ARP Cache |
liu, tianhua
|
IIHMSP-2007-0024 |
Improving Handover Performance by Switching
between Unicast and Anycast Addressing |
Shieh, Chin-Shiuh |
IIHMSP-2007-0033 |
A Secure Image Steganographic Algorithm Based
on DCT Domain |
Gui, Qi
|
IIHMSP-2007-0053 |
A Novel Multimedia Network backbone
Architecture base on Proportional Delay Differentiation |
Ho, Jih |
IIHMSP-2007-0056 |
FPGA-based Multi-bit All Status Pseudo-Random
Sequences Generators |
duan, yingni
|
IIHMSP-2007-0066 |
Yet Another Authorization Model in E-DRM
System |
Chin-Ling, Chen |
IIHMSP-2007-0071 |
The Improvement of Lee-Chiu's Remote User
Authentication Scheme |
Chan, Chao |
IIHMSP-2007-0076 |
Improving the Security of Chien-Jan Protocol
for Large |
Chan, Chao |
IIHMSP-2007-0079 |
Image Authentication in Print-and-scan
Scenario |
Yu, Longjiang |
IIHMSP-2007-0085 |
A Ka band WCDMA Based LEO Multi-Satellites
Mobile Medicine System |
Lin, Chin-Feng |
IIHMSP-2007-0091 |
Research and Design of Software Bus based
Generic Software Agent Architecture |
Zhou, Chuansheng |
IIHMSP-2007-0099 |
Implementation of a General Reduced TCP/IP
Protocol Stack for Embedded Web Server |
Zhou, Chuansheng |
IIHMSP-2007-0102 |
Halftone Image Watermarking Based on the
Binary Pseudo-Wavelet Transform |
Luo, Hao
|
IIHMSP-2007-0105 |
Hiding Multiple Watermarks in Transparencies
of Visual Cryptography |
Luo, Hao
|
IIHMSP-2007-0110 |
Traffic detection at nighttime using entropy measurement |
Hsu, Wei |
IIHMSP-2007-0113 |
Smart Embed Tension Tensor Based on Internet |
peng, wu
|
IIHMSP-2007-0117 |
A Multi-Sensor Fusion Method Applied to
Stability Diagnosis Based on Distributed Neyman-Pearson Algorithm |
du, qing
|
IIHMSP-2007-0123 |
A New Neural Fusion Recognition Method With
Multi-Agent |
du, qing
|
IIHMSP-2007-0129 |
RESEARCH OF P2P TRAFFIC IDENTIFICATION BASED
ON BP NEURAL NETWORK |
Shen, Fuke
|
IIHMSP-2007-0140 |
Data Hiding for Binary Images Using Weight Mechanism |
Tseng, Hsien-Wen |
IIHMSP-2007-0148 |
Synchronization for Rossler
chaotic systems using fuzzy impulsive controls |
zheng, yongai
|
IIHMSP-2007-0152 |
Fast Intra Prediction Mode Decision Algorithm
for H.264/AVC Video Coding Standard |
Chih-Hsien, Hsia
|
IIHMSP-2007-0156 |
Fuzzy Control for Networked Control System |
Sun, Zhiyi |
IIHMSP-2007-0159 |
A New Design of Efficient Key Pre-distribution
Scheme for Secure Wireless Sensor Networks |
Huang, Hui-Feng |
IIHMSP-2007-0164 |
Detection of Hidden Information in Tags of
Webpage Based on Tag-Mismatch |
Huang, Huajun |
IIHMSP-2007-0183 |
MRI Brain Phase Image Unwrapping Process by
Wavelet Zero-Padding Technique |
Juang, Puu-An
|
IIHMSP-2007-0191 |
REVERSIBLE FRAGILE WATERMARKING BASED ON
PYRAMIDAL STRUCTURE AND GRADIENT PREDICTING IMAGE |
Yeh, Fu |
IIHMSP-2007-0196 |
An ID-based Multi-signature Scheme |
Yu, Longjiang |
IIHMSP-2007-0202 |
An Improved Medium-Field Equation (MFE) Multivariate
Public Key Encryption Scheme |
Wang, Zhiwei |
IIHMSP-2007-0206 |
Color Image Steganography
based on Module Substitutions |
YANG, CHING |
IIHMSP-2007-0212 |
Study of The Spatial Object’s Attitude Angle
Measurement Based on Linear CCD |
ai, lili
|
IIHMSP-2007-0216 |
Presentation, Design and Application of a
Real-Time Demosaicing Generic FPGA Model |
SHAN, Bao |
IIHMSP-2007-0232 |
A NOVEL REAL-TIME IMPLEMENTATION FOR NETWORK
ECHO CANCELLATION SYSTEM |
Wang, Xinyi |
IIHMSP-2007-0241 |
Fault Tolerant Reconstruction Algorithm Based
on Distributed Agents for Network Management |
li, hang |
IIHMSP-2007-0247 |
An efficient steganography
scheme for m-commerce |
Lin, Iuon-Chang |
IIHMSP-2007-0256 |
A Dynamic Step-Size Updating Rule for Single
Distribution Blind Source Separation |
He, Xuansen |
IIHMSP-2007-0259 |
Enhancement of the Mutual Authentication
protocol on RFID Passive Tags |
Huang, Hui-Feng |
IIHMSP-2007-0264 |
A Chaos Based Unequal Encryption Mechanism in |
Lin, Chin-Feng |
IIHMSP-2007-0270 |
Fuzzy Joint Encoding and Statistical
Multiplexing of Multiple Video Sources with Independent Quality of Services
for Streaming over DVB-H |
Rezaei, Mehdi
|
IIHMSP-2007-0278 |
Visual Cryptography in reversible style |
Fang, Wen-Pinn |
IIHMSP-2007-0284 |
Selective Extraction of Visual Saliency
Objects in Images and Videos |
zhao, zhicheng
|
IIHMSP-2007-0293 |
Adaptive Digital Audio Steganography Based on
Integer Wavelet Transform |
Pooyan, Mohammad |
IIHMSP-2007-0303 |
Shot segmentation and classification in
Basketball Videos |
Wu, fang |
IIHMSP-2007-0321 |
2D(PC) |
Li, Jun-Bao |
IIHMSP-2007-0326 |
An Information Hiding Method based on SOAP |
xiaofen, zhang
|
IIHMSP-2007-0332 |
Security Analysis of RFID Based on Multiple
Readers |
jialin, ma |
IIHMSP-2007-0335 |
HMM BASED EYEBROW RECOGNITION |
Li, Yujian |
IIHMSP-2007-0340 |
Generalized Discrete Fractional Hadamard
Transformation and its Application Application on the Image Encryption |
Yan, Li-Jun |
IIHMSP-2007-0345 |
A Method for Making Three-Party Password-Based
Key Exchange Resilient to Server Compromise |
Zhu, Hongfeng |
IIHMSP-2007-0351 |
AN ENERGY-EFFICIENT CLUSTERING ALGORITHM FOR
WIRELESS SENSOR NETWORKS |
liang, ying
|
IIHMSP-2007-0355 |
A Map Matching Algorithm in GPS-based Car
Navigation System |
Zhao, Yong |
IIHMSP-2007-0370 |
Reversible data hiding by exploiting DCT
structure information in JPEG images |
Cai, Hong |
IIHMSP-2007-0374 |
Adaptive and Robust Audio watermarking in
Wavelet Domain |
ahmad, delforouzi
|
IIHMSP-2007-0378 |
Research on Routing Protocols Based on ZigBee
Network |
jing, sun |
IIHMSP-2007-0388 |
An Evaluation Scheme for Steganalysis-proof
Ability of Steganographic Algorithms |
Luo, Gang |
IIHMSP-2007-0399 |
Design of multiuser collusion-free
hiding codes with delayed embedding |
Cha, Byungho |
IIHMSP-2007-0404 |
High-Capacity Data Hiding Using Virtual Window
Partition |
Lee, Chin-Feng |
IIHMSP-2007-0407 |
Template-Based Scene Classification for Baseball
Videos Using Efficient Playfield Segmentation |
Chang, Wei-Han |
IIHMSP-2007-0417 |
Motion Vector Re-estimation for Trans-coding
Using Kalman Filter |
Chang, Wei-Han |
IIHMSP-2007-0435 |
An Algorithm for Coplanar Camera Calibration |
Sirisantisamrid, Kaset
|
IIHMSP-2007-0440 |
Hiding data in ordered dithering halftone
images by bit interleaving |
lien, brian |
IIHMSP-2007-0452 |
A Switchable DRM
Structure for Embedded Device |
Chang, Feng-Cheng |
IIHMSP-2007-0455 |
MB-Activity-Based Slice Grouping and Unequal
Error Protection for H.264 Video Transmission over Wireless Networks |
Cui, Yubin |
IIHMSP-2007-0461 |
A Steganographic
Method Based on A File Attribute |
Hioki, Hirohisa |
IIHMSP-2007-0469 |
A Multiple Grade Blind Proxy Signature Scheme |
Kang, Li |
IIHMSP-2007-0484 |
Reversible Data Hiding by Exploiting DCT
Structure Information in JPEG Images |
Cai, Hong |
IIHMSP-2007-0492 |
Combining multilevel Manipulation Estimation
with content-based authentication Watermarking |
Gulbis, Michael |
IIHMSP-2007-0507 |
Controlled migration of mobile agents to
untrusted hosts |
Vatsavayi, Valli
|
IIHMSP-2007-0510 |
NEW VIDEO WATERMARKING SCHEME BY USING DITHER
MODULATION TO LOCAL ENERGY |
liu, xiao-yan
|
IIHMSP-2007-0513 |
Logical Wavelet Based Data Hiding for Binary
Images |
Cherukuri, Ravindranath
|
IIHMSP-2007-0519 |
A Robust Audio Fingerprinting Scheme for MP3
Copyright |
Hsieh, Che |
IIHMSP-2007-0536 |
An Edge Enhanced Technique for Digital
Halftoning Using Error Diffusion |
Lin, Iuon-Chang |
IIHMSP-2007-0542 |
Brain Tumor Detection Using Color-Based
K-Means Clustering Segmentation |
WU, MINGNI |
IIHMSP-2007-0553 |
A Secure Medium-Field Equation (MFE) Public
Key Encryption Scheme |
Wang, Zhiwei |
IIHMSP-2007-0565 |
An Effective Privacy-Preserving RFID Scheme
against Desynchronization |
Shao, Min-Hua
|
IIHMSP-2007-0573 |
Comparison of Several Classifiers for Emotion Recognition
from Noisy Mandarin Speech |
Chen, Yu-Te |
IIHMSP-2007-0578 |
Blind Color Watermarking Approach for Secret
Text Hiding |
Wu, Chih-chien |
IIHMSP-2007-0590 |
A Fuzzy Basis on Knowledge Structure Analysis for
Cognition Diagnosis and Application on Geometry Concepts for Pupils |
JENG-MING, YIH |
IIHMSP-2007-0594 |
An Integration of Fuzzy theory and ISM for
Concept Structure Analysis with Application of Learning MATLAB |
JENG-MING, YIH |
IIHMSP-2007-0601 |
Novel and Fast Approach for Iris Location |
Lee, Jen-Chun |
IIHMSP-2007-0604 |
Watermarking technique for HDL-based IP Module
Protection |
Lin, Min-Chuan |
IIHMSP-2007-0609 |
Image Steganographic
Scheme Using Tri-way Pixel-Value Differencing and Adaptive Rules |
Chang, Ko Chin |
IIHMSP-2007-0614 |
A Content-Adaptive Up-Sampling Technique for
Image Resolution Enhancement |
Lee, Ming-Sui |
IIHMSP-2007-0624 |
Robust Near-Reversible Data Embedding Using
Histogram Projection |
Tang, Yuan-Liang |
IIHMSP-2007-0628 |
Double-Density Discrete Wavelet Transform
Based Texture Classification |
Qiao, Yu-Long |
IIHMSP-2007-0649 |
Asymmetric Clustering based on Self-Similarity |
Sato-Ilic, Mika |
IIHMSP-2007-0653 |
GOP-based rate control for H.264/SVC with
hierarchical B-pictures |
Cho, Yongjin
|
IIHMSP-2007-0662 |
Sending |
Shirali-Shahreza, Mohammad |
IIHMSP-2007-0665 |
A Novel Encryption model for Multimedia Data |
ye, dengpan |
IIHMSP-2007-0669 |
Secret Sharing and Information Hiding by
Shadow Images |
Kieu, The Duc
|
IIHMSP-2007-0679 |
Particle Swarm Optimization for Image Noise
Cancellation |
Su, Te-Jen |
IIHMSP-2007-0688 |
A New Large-Scale Terrain Real-Time
Simplification Algorithm Based on Delaunay Triangulation |
WU, Hui-xin |
IIHMSP-2007-0698 |
X-ray Image Reconstruction by Radon Transform
Simulation with Fan-Beam Allocation |
Juang, Puu-An
|
IIHMSP-2007-0709 |
Information Protection and Recovery with
Reversible Data Hiding |
Huang, Hsiang-Cheh |
IIHMSP-2007-0712 |
Non-interactive t-out-of-n Oblivious Transfer
based on the RSA Cryptosystem |
Chang, Ya-Fen |
IIHMSP-2007-0715 |
An arbitrary block resizing Algorithm in
Transform Domain |
Wu, Zhenyu |
IIHMSP-2007-0721 |
A New Maximal frequent Itemsets Mining Method
Based on Bitmap Matrix |
zhang, shi-ling |
IIHMSP-2007-0726 |
Maximal Sequential pattern mining based on
simultaneous Monotone and Anti-monotone constraints |
sun, ya |
IIHMSP-2007-0730 |
Storing RDF in Oracle RDBMS |
WANG, Cuimin |
IIHMSP-2007-0734 |
Extracting the Ocean Surface Feature of
Non-linear Internal Solitary Waves in MODIS Satellite Images |
Kao, Chih-chung |
IIHMSP-2007-0739 |
COMPLEMENTARY STEGANOGRAPHY IN ERROR-DIFFUSED
BLOCK TRUNCATION CODING IMAGES |
Guo, Jing-Ming
|
IIHMSP-2007-0743 |
Imitation Output Characteristic of turbine
control Based on servos interface technology |
wang, xiao
|
IIHMSP-2007-0747 |
Online Data Stream Mining of Recent Frequent
Itemsets Based on Sliding Window Model |
Li, Ke |
IIHMSP-2007-0751 |
Fast Motion Search using early Zero-block
Detection |
Lee, Yu-Ming |
IIHMSP-2007-0754 |
Ensemble HMM Learning for Motion Retrieval
with Temporal-Spatial Features |
Xiang, Jian
|
IIHMSP-2007-0763 |
A Hybrid Adaptive Evolutionary Algorithom for
Constrained Optimization |
Li, Xiang |
IIHMSP-2007-0769 |
An Adaptive Routing Based on an Improved Ant
Colony Optimization In LEO Satellite Networks |
gao, zi-he
|
IIHMSP-2007-0776 |
3D Texture Classification Using 3D Texture
Histogram Model and SVM |
Li, Meng |
IIHMSP-2007-0780 |
The Limited Mutation Particle Swarm Optimizer |
song, chun |
IIHMSP-2007-0785 |
The Input-interface of Webcam Applied in the
Digital Content Interaction |
Sun, Huey-Min |
IIHMSP-2007-0792 |
Optimized Copyright Protection Systems with
Genetic-Based Robust Watermarking |
Huang, Hsiang-Cheh |
IIHMSP-2007-0798 |
A New Method for Decoding the (24, 15, 5)
Cyclic Code |
Lee, Hung-Peng |
IIHMSP-2007-0804 |
A New Attributes-Priority Matching Watermarking
Algorithm Satisfying Topological Conformance for Vector Map |
Zhang, dong |
IIHMSP-2007-0807 |
Keystroke Patterns Classification using the
ARTMAP-FD Neural Network |
Loy, Chen-Change |
IIHMSP-2007-0812 |
An LSB Data Hiding Technique Using Natural
Numbers |
Abraham, Ajith |
IIHMSP-2007-0816 |
A Modified Particle Swarm Optimization
Algorithm with Dynamic Adaptive |
Zhang, Ding-Xue |
IIHMSP-2007-0825 |
A Unified Multilingual and Multimedia Data
Mining Approach for Cancer Knowledge Discovery |
Lee, Chung-Hong |
IIHMSP-2007-0828 |
Blind Image Watermarking Scheme in DWT-SVD
Domain |
Kim, Kyung-Su |
IIHMSP-2007-0844 |
A High-Efficiency Recursive Algorithm without
Numerical Instability for Polynomial Predistorter Design |
Xu, Lingjun
|
IIHMSP-2007-0855 |
A Covert Communication Scheme for the DCT
Based Image Multiple Description Coding System |
lin, chuang
|
IIHMSP-2007-0861 |
Research and Analysis on System Usability Evaluation
for Digital Libraries in |
Yu, Yaohua |
IIHMSP-2007-0864 |
A Novel Scheme for Watermarking Natural
Language Text |
Jianlong, Yang |
IIHMSP-2007-0867 |
A New Scheme of Iris Image Quality Assessment |
Lu, Guangming |
IIHMSP-2007-0871 |
A study of content based watermarking using an
advanced HVS model |
Autrusseau, Florent
|
IIHMSP-2007-0882 |
Reducing Host Interference from Spread
Spectrum Watermarking |
Sedghi, Saeed
|
IIHMSP-2007-0888 |
An Auto-generating Approach of Transactions Profile
Graph in Detection of Malicious Transactions |
Chen, Jin-Fu |
IIHMSP-2007-0891 |
Effective Video Annotation by Mining Visual
Features and Speech Features |
Su, Ja-Hwung |
IIHMSP-2007-0896 |
Fuzzy Belief Reasoning for Intrusion Detection
Design |
Chou, Te-Shun |
IIHMSP-2007-0900 |
The Wireless Sensor Network for Home-Care
System Using ZigBee |
Huang, Mao-Cheng |
IIHMSP-2007-0903 |
Hierarchical Key Management of Scalable Video
Coding |
Ma, Tien-Yan |
IIHMSP-2007-0906 |
Find Recent Frequent Items with Sliding
Windows in Data Streams |
Li, Ke |
IIHMSP-2007-0911 |
Punched Image Watermarking: A Novel Fast
Fractal Coding Based Technique |
El-Khamy, Said E. |
IIHMSP-2007-0917 |
A Hierarchical Grid-Based Indexing Method for
Content-Based Image Retrieval |
Tsai, Tienwei |
IIHMSP-2007-0923 |
The Enhanced Fuzzy Bit generator (EFBG): A
Cryptographically Secure Pseudorandom Bit Generator |
El-Khamy, Said E. |
IIHMSP-2007-0927 |
User’s Authentication
in Media Services by using One-Time Password Authentication Scheme |
Wang, Neng-Wen |
IIHMSP-2007-0933 |
The AES Design Space Exploration with a Soft
IP Generator |
Chen, Liang-Bi |
IIHMSP-2007-0938 |
Combination of Multiple Classifiers for Improving
Emotion Recognition in Mandarin Speech |
Chen, Yu-Te |
IIHMSP-2007-0944 |
The Architecture of Fast H.264 CAVLC Decoder
and its FPGA Implementation |
George, Tony |
IIHMSP-2007-0947 |
Contextual Hidden Markov Tree Model Image Denoising
using a new Nonuniform Quincunx Directional Filter Banks |
yong, tian
|
IIHMSP-2007-0951 |
Dissolve Detection Scheme with Transition
Duration Refinement |
Lin, Guo-Shiang |
IIHMSP-2007-0955 |
A Programming Model for Distributed Content-based
Image Retrieval |
Chang, Feng-Cheng |
IIHMSP-2007-0966 |
Protecting |
Khan, Abid |
IIHMSP-2007-0969 |
Data Embedding into Video Streams Using Color
Histogram and Wavelength Parameters |
cetin, ozdemir |
IIHMSP-2007-0974 |
Directional Texture Feature Extraction using
Context Labels of Significance Coding for JPEG2000 Compressed Domain Image
Retrieval |
Siddhichai, Supakorn
|
IIHMSP-2007-0978 |
REGULARIZATION SUPER-RESOLUTION RESTORATION
CONSIDERING INACCURATE IMAGE REGISTRATION AND OBSERVATION NOISE |
Yan, Hua
|
IIHMSP-2007-0990 |
Audio-Visual Speech Recognition with Weighted
KNN-based Classification in Mandarin Database |
Liao, Wen-Yuan
|
IIHMSP-2007-0995 |
Network Echo Cancellation System using Sliding
Window NLMS Algorithm |
Wang, Xinyi |
IIHMSP-2007-1007 |
DCT-Based Reversible Image Watermarking
Approach |
Chen, Chien-Chang |
IIHMSP-2007-1013 |
Building Corner Feature Extraction Based on
Fusion Technique with Airborne LiDAR Data and Aerial Imagery |
Huang, Ming-Jer |
IIHMSP-2007-1017 |
Continuous Tracking of User Emotion in
Mandarin Emotional Speech |
Chen, Yu-Te |
IIHMSP-2007-1027 |
Watermarking technique for HDL-based IP Module
Protection |
Lin, Min-Chuan |
IIHMSP-2007-1033 |
The System for the Reduction of Conducted
Electromagnetic Interference Emission from Switching Power Supply |
Huang, Hsiang-Cheh |
IIHMSP-2007-1043 |
Application of LDPC codes over GF(q) to DFH
communication system |
Bai, Yu-Jie
|
IIHMSP-2007-1047 |
An Iterative Method for Lossless Data
Embedding in BMP Images |
Lee, Jia-Hong |
IIHMSP-2007-1052 |
Robust Block-based Image Watermarking in
Curvelet Transform |
Tao, Peining |
IIHMSP-2007-1064 |
Integrating Genetic and Ant Algorithm into P2P
Grid Resource Discovery |
Xiong, Zeng-gang
|
IIHMSP-2007-1069 |
Research on pertinence of QoS Metrics based on
IEEE 802. |
Zhang, Xue-Min |
IIHMSP-2007-1072 |
Anonymity in PKI Environment |
Bian, Yang |
IIHMSP-2007-1076 |
THE DESIGN AND APPLICATION OF PHABS: A NOVEL
BENCHMARK PLATFORM FOR |
Bian, Yang |
IIHMSP-2007-1080 |
Design and Implementation of a PKI-Based
Electronic Documents Protection Management System |
Bian, Yang |
IIHMSP-2007-1083 |
Framework for Windows Password Function
Security Enhancement |
Bian, Yang |
IIHMSP-2007-1086 |
A multi-quality image fusion method based on
region-mapping for video sensor network |
Yang, Ming-Hua |
IIHMSP-2007-1095 |
Very Low Bit Rate Video Coding using H.264
Codec and Cubic Spline Interpolation |
Chen, Chien-Wen |
IIHMSP-2007-1100 |
Genetic Algorithm in Vehicle Routing Problem |
Liu, Jin-Feng |
IIHMSP-2007-1108 |
On the Convergence Behavior of the FastICA Algorithm
with the Kurtosis Cost Function |
Fan, Chang |
IIHMSP-2007-1116 |
Design of Variable Fractional-Delay FIR
Filters by Using Coefficient Relationship |
Huang, yun-da |
IIHMSP-2007-1124 |
The Particle Swarm Optimization Algorithm: How
to Select the Number of Iteration |
Li, Bo |
IIHMSP-2007-1131 |
THE STUDYING OF KNOWLEDGE ACQUISITION BASED ON
STRUCTURAL MODELING |
Shan, Ping |
IIHMSP-2007-1137 |
Wrapper-based DWT-GMM for Image Segmentation |
Liu, Qian |
IIHMSP-2007-1142 |
Generalized Predictive Control of Fin
Stabilizer at Zero Speed |
Jin, Hong-Zhang |
IIHMSP-2007-1145 |
A new color cluster algorithm for image
retrieval |
Di, Bo |
IIHMSP-2007-1149 |
A DNA algorithm of graph vertex coloring problem
based on multi-separation |
haifangli, haifangli
|
IIHMSP-2007-1160 |
Eyes Tracking in a Video Sequence based-on
Haar-like Features and Skin Color |
Bian, Yang |
IIHMSP-2007-1163 |
Improved Adaptive Lifting Scheme for Wavelet-Based
Image Compression |
Bian, Yang |
IIHMSP-2007-1175 |
EXTRACTING EMOTIONAL SEMANTICTS FROM COLOR
IMAGE USING ANALYTICAL HIERARCHY PROCESS |
Li, Haifang |
IIHMSP-2007-1179 |
An Improved Multi-Stage Vector Quantization
for Image Coding |
Bian, Yang |
IIHMSP-2007-1186 |
Performance Evaluation of Fingerprint
Orientation Estimation Algorithms |
Bian, Yang |
IIHMSP-2007-1191 |
Content Integrity Verification for G.729 Coded
Speech |
Bian, Yang |
IIHMSP-2007-1196 |
Amelioration for Fault-tolerant Model in |
jiannan, ye |
IIHMSP-2007-1200 |
Reversible Data Hiding Base on Histogram Shift
for 3D vertex |
Jhou, Chang-Yun |
IIHMSP-2007-1206 |
The Push Registry using in Java mobile application
program |
chengming1, zhu |
IIHMSP-2007-1212 |
An Incentive Compatible Mechanism for
Multi-Agent Systems |
Zhang, Jie |
IIHMSP-2007-1232 |
GFC: An Efficient Grid Fractal-Based
Clustering Algorithm |
xiong, xiao
|
IIHMSP-2007-1241 |
An 8-bit D/A Converter for Video Applications |
Huang, Shun-He |
IIHMSP-2007-1251 |
A Digital to Analog Converter for Video
Applications |
Liu, De-Ji |
IIHMSP-2007-1257 |
An Optimized Approach on Applying Genetic Algorithm
to AdaptiveCluster Validity Index |
Huang, Hsiang-Cheh |
IIHMSP-2007-1262 |
A Fast Training Algorithm for |
lin, lei |
IIHMSP-2007-1263 |
Fractal Steganography
Using Artificially Generated Images |
Cai, Hong |