|
Accepted Papers in Regular Session
|
| Paper Number |
Paper Title |
Corresponding Author |
| IIH-MSP 2008-0020 |
Research on an IPTV QoS Implement Mechanism in WLAN |
zhang, jin-yu |
| IIH-MSP 2008-0026 |
An Optimal Neural-Network-based Predictive Polling Mechanism on EPON |
zhang, jin-yu |
| IIH-MSP 2008-0030 |
An Efficient USR Eliminating Mechanism on EPON |
zhang, jin-yu |
| IIH-MSP 2008-0033 |
Research and Applications on Network System of Centralized Monitoring and Control for Coal Mine Safety |
XIAO, Han |
| IIH-MSP 2008-0036 |
Research on Remote Monitoring System Key Techniques Based on Data Point Table |
XIAO, Han |
| IIH-MSP 2008-0041 |
An Asymmetric Multicast Fingerprinting Scheme Based on Secret Sharing |
yanzhen, ren |
| IIH-MSP 2008-0044 |
Adaptive FMO Selection Strategy for Error Resilient H.264 Coding |
Hao, Chen |
| IIH-MSP 2008-0048 |
Using Timestamp to Realize Audio-Video Synchronization in Real-time Streaming Media Transmission |
Yanna, Wei |
| IIH-MSP 2008-0053 |
FACE RECOGNITION USING ROUGH SET THEORY AND NEURAL NETWORK |
zahra, elmi |
| IIH-MSP 2008-0058 |
An Embedded and Efficient Low Memory Hierarchical Image Coder |
Ren-long, Wang |
| IIH-MSP 2008-0063 |
Design and Realization of LBS System based on BREW Platform |
Xi-Long, Qu |
| IIH-MSP 2008-0066 |
Integration of Distributed Biological Information Database Based on Web Service and Multi-Agent |
Xi-Long, Qu |
| IIH-MSP 2008-0071 |
Parallel Genetic Algorithm Model Based on AHP and Neural Networks for Enterprise Comprehensive Business |
Xi-Long, Qu |
| IIH-MSP 2008-0074 |
An Adaptive and Fragile Image Watermarking Algorithm Based on Composite Chaotic Iterative Dynamic System |
Che, Shengbing |
| IIH-MSP 2008-0080 |
Application and Construction of General Prediction Model for Drugs Marketing System |
Nannan, Geng |
| IIH-MSP 2008-0086 |
Image retrieval based on fuzzy color histogram |
qiang, xu |
| IIH-MSP 2008-0090 |
Location scheme in Wireless Sensor Networks |
Yao, Ye |
| IIH-MSP 2008-0093 |
A Novel ICA-Based Extraction Scheme for Image Watermarking |
Gaorong, Zeng |
| IIH-MSP 2008-0099 |
A Holonic Model in Wireless Sensor Networks |
Yao, Ye |
| IIH-MSP 2008-0102 |
Design and Implementation of A New Practical Grid |
Ang, Li |
| IIH-MSP 2008-0106 |
Comparison of Two Modern Pattern Recognition Methods |
xiaochun, shi |
| IIH-MSP 2008-0115 |
A Bit-Plane Color Histogram Based Image Retrieval Scheme |
xiangyang, wang |
| IIH-MSP 2008-0130 |
An Improved Dynamic Framed Slotted ALOHA Algorithm for RFID Tag Identification |
Ya-Qi, Wang |
| IIH-MSP 2008-0141 |
Based MATLAB on Advanced Encryption Standard (AES) IP Validation |
Xinsheng, Wang |
| IIH-MSP 2008-0149 |
Fingerprint Identification System Using Huffman Coding |
Abdurazzag , Aburas |
| IIH-MSP 2008-0156 |
A Certificateless Restrictive Partially Blind Signature Scheme |
Chang-Ji, Wang |
| IIH-MSP 2008-0161 |
Parallel Constructing-Density-Tree Clustering Algorithm based on Data Partitioning |
Yunpeng, Zhang |
| IIH-MSP 2008-0167 |
Cryptanalysis of threshold proxy signature scheme |
feng, liu |
| IIH-MSP 2008-0172 |
High Performance Hardware Implementation Architecture for DWT of Lifting Scheme |
ying, liu |
| IIH-MSP 2008-0176 |
A Multi-Semantics based Color Image Retrieval |
hongying, yang |
| IIH-MSP 2008-0180 |
A Statistical Attack on a Kind ofWord-Shift Text-Steganography |
Ling-Jun, Li |
| IIH-MSP 2008-0186 |
The Research of The Model Of E-government Cooperation Work Based on Semantics And Multi-Agent |
hua, zhang |
| IIH-MSP 2008-0189 |
A Perceptual Auto-regressive Texture Synthesis for Video Coding |
Lirong, Yuan |
| IIH-MSP 2008-0193 |
An Extended Self-adaptive Kalman Filtering Object Motion Prediction Model |
Yunpeng, Zhang |
| IIH-MSP 2008-0201 |
Based on fading channel the distributed detection arithmetic of tree configuration |
ying-kun, liu |
| IIH-MSP 2008-0205 |
Research On An Arithmetic In Large Distributed Detection System Based On Constraint Energy |
ying-kun, liu |
| IIH-MSP 2008-0209 |
A Method on Impendance Control of Robots Based on the Neural Network |
yang, zhen |
| IIH-MSP 2008-0215 |
Application Research of Secondary Development Technology for the Replacement of Furniture Part Based on Inventor API |
Lexiao, Ye |
| IIH-MSP 2008-0220 |
A H.264 Based Joint Source Channel Coding Scheme over Wireless Channels |
Xue-Juan, Gao |
| IIH-MSP 2008-0225 |
A New Sphere-Structure Multi-Class Classifier |
Tu, Xu |
| IIH-MSP 2008-0234 |
A Real-time Video Watermarking Using Adjacent Luminance Blocks Correlation Based on Compressed Domain |
Shao-Hui, Liu |
| IIH-MSP 2008-0240 |
Broadcast Video Logo Detection and Removing |
Wei-Han, Chang |
| IIH-MSP 2008-0245 |
Double-Domains-Based Covert Communication Scheme for A RS-Code-Based Multiple Description Image Coding System |
chuang, lin |
| IIH-MSP 2008-0248 |
Parameter Selection of Generalized Fuzzy Entropy-based Thresholding Segmentation Method base on Particle Swarm Optimization |
Bo, Lei |
| IIH-MSP 2008-0253 |
Covert Communication based on Subliminal Channel in Broadcast Multi Signature |
Longjiang, Yu |
| IIH-MSP 2008-0258 |
Research on the Application of Six Sigma in Software Process Improvement |
XiaoSong, Zhao |
| IIH-MSP 2008-0264 |
New Neural Network Based on Ant Colony Algorithm for Financial Data Forecasting |
Wei, Gao |
| IIH-MSP 2008-0272 |
The heuristic route algorithm of multiple restrictions based on Quality of Service |
xianhe, shao |
| IIH-MSP 2008-0276 |
A Fragile Document Watermaking Technique Based on Wet Paper Code |
Li, Jianfei |
| IIH-MSP 2008-0279 |
An Adaptive Cross-Layer Scheduling Algorithm for Multimedia Networks |
XiuYuan, Li |
| IIH-MSP 2008-0285 |
An effective motion estimation scheme for H.264/AVC |
pengyu, liu |
| IIH-MSP 2008-0288 |
A New and Fast Mode Decision Algorithm for Inter-frame in H.264/AVC |
pengyu, liu |
| IIH-MSP 2008-0294 |
Brain-Computer Interface Design Using Slow Cortical Potentials |
Haibin, Zhao |
| IIH-MSP 2008-0300 |
Improved Hidden Markov Tree Model and its Application in Image Denoising |
Wenzhe, Lu |
| IIH-MSP 2008-0306 |
Fault Diagnosis of Distribution Network Based on distributed chaotic fuzzy RBF neural networks |
Gao, Qing |
| IIH-MSP 2008-0314 |
Face Recognition Based on Chaotic Fuzzy RBF Neural Network |
Gao, Qing |
| IIH-MSP 2008-0320 |
A Digital Fingerprint Coding Based on BIBD Code |
Zhiguang, Zhang |
| IIH-MSP 2008-0324 |
Face Recognition on Feature Fusion |
Sheng-Gen, Ju |
| IIH-MSP 2008-0329 |
Digital Watermarking Algorithms for CAD Vector Images |
Yi, Wang |
| IIH-MSP 2008-0335 |
The Security Technology of USIM Based on OTA Model |
Ge, Huang |
| IIH-MSP 2008-0339 |
DATA HIDING IN IMAGE AND EXTRACTION USING VHDL |
nikhlesh, singh |
| IIH-MSP 2008-0347 |
A Fractional-step DDoS Attack Source Traceback Algorithm Based on Autonomous System |
Chun, Huang |
| IIH-MSP 2008-0350 |
A Model of Smart Home Fusing Multi-Intelligence |
Jun-feng, Man |
| IIH-MSP 2008-0353 |
Robust Digital Image Watermarking Against Shearing Based on Haar Orthogonal Function System |
Ming-Hui, Deng |
| IIH-MSP 2008-0358 |
Sign Language Synthesis of Individuation Based on Data Model |
Feng, Jiang |
| IIH-MSP 2008-0367 |
DTW/ISODATA algorithm and Multilayer architecture in Sign Language Recognition with large vocabulary |
Feng, Jiang |
| IIH-MSP 2008-0370 |
Improving Harbin method for content based landscape image retrieval |
Nguyen , Quynh |
| IIH-MSP 2008-0376 |
Shallow Semantic Parsing for Lexical Units in Chinese FrameNet |
yan-zi, hao |
| IIH-MSP 2008-0379 |
Image retrieval based on spatial feature of texture primitive |
shan, zhao |
| IIH-MSP 2008-0382 |
Cryptanalysis of A New Instance of TTM Cryptosystems |
Xu-Yun, Nie |
| IIH-MSP 2008-0389 |
A Novel Algorithm of Fast Detection and Segmentation of Moving Object |
Zhuoyi, Lv |
| IIH-MSP 2008-0392 |
Wireless Multimedia Framework Based on STBC-OFDM |
xizheng, zhang |
| IIH-MSP 2008-0397 |
Automatic Real-Rime Face Detection and Tracking Based on Space-Temporal Mutual Feedback for Video Sequence |
li, chao |
| IIH-MSP 2008-0400 |
A Light Weight Survivable Clustered Keying Scheme For Wireless Sensor Network |
xizheng, zhang |
| IIH-MSP 2008-0420 |
DATA AND FRACTAL IMAGE COMPRESSION |
mohit, Jain |
| IIH-MSP 2008-0429 |
Printed Chinese Character Recognition based on Pixels Distribution Probability of Character Image |
Ning, Wang |
| IIH-MSP 2008-0439 |
Cooperative Configurations for Kernels |
LEI, CAI |
| IIH-MSP 2008-0444 |
Multiple Description Image Coding Based on DSC and Pixel Interleaving |
anhong, wang |
| IIH-MSP 2008-0455 |
Supporting Multiple Classes of Services in IP over WDM Ring Network |
Jih, Ho |
| IIH-MSP 2008-0460 |
Content-Aware Video Transcoding via Visual Attention Model Analysis |
Shih-Meng, Chen |
| IIH-MSP 2008-0464 |
Deblocking Filter by Color Psychology Analysis for H.264/AVC Video Coders |
Kai-Lin, Huang |
| IIH-MSP 2008-0469 |
A Forward Secure Ring Signature Scheme |
wansu, Bao |
| IIH-MSP 2008-0474 |
Steganalysis Based on Statistical Moments of Contourlet Transform Coefficients |
Hedieh, Sajedi |
| IIH-MSP 2008-0484 |
Source Code Watermarking Based on Function Dependency Oriented Sequencing |
gaurav, gupta |
| IIH-MSP 2008-0489 |
Intelligent Hospital Space Platform Combined with RFID and Wireless Sensor Network |
Gwo-Jiun, Horng |
| IIH-MSP 2008-0492 |
Optimization ClusterSVM Using Improved Nonlinear Kernel |
ya-li, qi |
| IIH-MSP 2008-0502 |
Trust Derivation and Recommendation Management in a Trust Model |
Li-Fen, Li |
| IIH-MSP 2008-0506 |
Speaker Recognition based on LS-SVM |
Zhiping, DAN |
| IIH-MSP 2008-0511 |
Research and Implementation on Middleware of Database Workload Autonomic Adaptation |
Yuxing, Wang |
| IIH-MSP 2008-0517 |
A Novel Watermarking Scheme Based on Tchebichef Moments |
Wan-Li, Lv |
| IIH-MSP 2008-0523 |
Motion Vector Re-estimation for Video Trans-coding with Arbitrary Downsizing |
Wei-Han, Chang |
| IIH-MSP 2008-0529 |
A Novel Global Robust Stability Criterion of Uncertain Neural Networks with Time-varying Delays |
Wei, Feng |
| IIH-MSP 2008-0534 |
On Ant Colony Algorithm for Solving Continuous Optimization Problem |
hong, li |
| IIH-MSP 2008-0546 |
Secure Peer Joining Process in Structured P2P System |
wei, song |
| IIH-MSP 2008-0551 |
A New Visually Imperceptible and Robust Image Watermarking Scheme in Contourlet Domain |
M. Shahram, Moin |
| IIH-MSP 2008-0556 |
Reversible Data Hiding for Audio Based on Prediction Error Expansion |
Diqun, Yan |
| IIH-MSP 2008-0567 |
Robust Audio Watermarking Algorithm Based on Histogram Specification |
Xiaoming, Zhang |
| IIH-MSP 2008-0572 |
Improvements of Image-Steganalysis using Boosted Combinatorial Classifiers and Guassian High Pass Filtering |
Nima, Asadi |
| IIH-MSP 2008-0575 |
An FFT-based DS-SS Signal Acquisition Algorithm Research |
Jing, Xue |
| IIH-MSP 2008-0580 |
Combination of wavelet and SIFT Features for Image Classification Using Trained Gaussian Mixture model |
Zhen, Ren |
| IIH-MSP 2008-0584 |
Damageless Information Hiding Technique using Neural Network |
Kensuke, Naoe |
| IIH-MSP 2008-0590 |
The research of Trusted Computing based on the model of trusted Meta data of BSCM |
liu, zhong |
| IIH-MSP 2008-0594 |
A NAS Model Based on Diameter Protocol |
li-chuan, gu |
| IIH-MSP 2008-0599 |
Emotion Recognition of Finger Braille |
Yasuhiro, Matsuda |
| IIH-MSP 2008-0604 |
Audio quality-based authentication using wavelet packet decomposition and best tree selection |
Wei, Li |
| IIH-MSP 2008-0607 |
Secure Communication Based on Synchronization of Unified Chaotic Systems |
Qu, shao-cheng |
| IIH-MSP 2008-0613 |
Chaotic Parameter Modulation Secure Communication Scheme based on Pinning Control |
Qu, shao-cheng |
| IIH-MSP 2008-0619 |
An Improved Adaptive QIM Watermark Iterative Algorithm |
Jiande, Sun |
| IIH-MSP 2008-0624 |
A Speech Chaotic Encryption Algorithm Based on Network |
Jing, Liu |
| IIH-MSP 2008-0628 |
Image Recovery Based on Effective Image Completion |
Wei-Han, Chang |
| IIH-MSP 2008-0634 |
The Design and Research of Remote Terminal Unit Based on Radio Technology |
zhenqi, wang |
| IIH-MSP 2008-0639 |
SUCCESSIVE APPROXIMATIONS - BASED ALGORITHM FOR INDEPENDENT COMPONENT ANALYSIS |
Doru, Constantin |
| IIH-MSP 2008-0643 |
AN ALGORITHM FOR LICENSE PLATE RECOGNITION SYSTEM FOR NON-STOP TOLL STATION |
Bo, Li |
| IIH-MSP 2008-0648 |
A Middleware Design for Block Cipher Seamless Connected into Stream Cipher Mode |
luo, lan |
| IIH-MSP 2008-0651 |
Image Auto-Mosaic for Large Angle of Obliquity Close-Range Sequential Images to Realize Cyber City |
Chang, Li |
| IIH-MSP 2008-0656 |
Rethinking Receive Buffer Blocking In Concurrent Multipath Transfer |
Jiemin, Liu |
| IIH-MSP 2008-0659 |
Asymmetric Path Optimization In Mobile Multi-homed SCTP Multimedia Transport |
Jiemin, Liu |
| IIH-MSP 2008-0663 |
Reducing Handover Latency with mSCTP In Fast Mobile IPv6 |
Jiemin, Liu |
| IIH-MSP 2008-0669 |
Video Key Frame Extraction Based on Spatial-Temporal Color Distribution |
Zhong-Hua, Sun |
| IIH-MSP 2008-0673 |
UNIFICATION OF NON-BLIND AND BLIND GAUSSIAN DISTRIBUTED FINGERPRINTS FOR TRACING MULTIMEDIA CONTENT |
Zhenyong, Chen |
| IIH-MSP 2008-0677 |
Cooperative QoS-aware Routing Algorithm based on IEEE 802.11 Multi-rate over Mobile Ad Hoc Networks |
Hwangjun, Song |
| IIH-MSP 2008-0680 |
Path Virtualization using Fountain Code for Video Streaming over Heterogeneous Networks |
Hwangjun, Song |
| IIH-MSP 2008-0685 |
An Information Hiding Scheme for the MDC-OFDM Wireless Networks |
chuang, lin |
| IIH-MSP 2008-0689 |
Non-native Speaker Identity Verification Based on Speech |
wei, hong |
| IIH-MSP 2008-0692 |
Software Watermarking Based on Dynamic Program Slicing |
xiaohong, deng |
| IIH-MSP 2008-0697 |
A Numeric Watermark Method Based on Valve-Value Surface |
Zhihua, Hu |
| IIH-MSP 2008-0705 |
Design Theory of Intellectualized Computer Aided Instruction and Its Applications |
Wang, Aimin |
| IIH-MSP 2008-0711 |
The Web Services model checking based on Temporal Logics of Knowledge |
Xiang-yu, Luo |
| IIH-MSP 2008-0720 |
An Algorithm of Webpage Information Hiding Based on Attributes Permutation |
Hua-jun, Huang |
| IIH-MSP 2008-0726 |
A Scheduling Model based on Communication task Deadline for Wireless Industrial Control system |
jun, wang |
| IIH-MSP 2008-0732 |
Research on Media Adaptation in MPEG-21 DIA, the Framework, Current Activities and Open Issues |
tian-yun, huang |
| IIH-MSP 2008-0737 |
Multiple Description and Adaptive Delivery of Media Content over Wireless |
tian-yun, huang |
| IIH-MSP 2008-0741 |
A Fast Motion Estimation Algorithm by Using Immune Quantum Algorithm |
Zhen, Liu |
| IIH-MSP 2008-0746 |
A Super-Resolution based Algorithm for Improving ORC Text Recognition |
Po, Yang |
| IIH-MSP 2008-0757 |
The Design and Analysis of Constraint Networks for Uncertain Temporal Interval Relations |
Liguo, Deng |
| IIH-MSP 2008-0761 |
Reduced-State detection for continuous phase modulation (CPM) Signals |
zhang, nan |
| IIH-MSP 2008-0765 |
A Robust Watermarking Scheme using Selective Curvelet Coefficients |
Hon-Yin, Leung |
| IIH-MSP 2008-0768 |
A New Symmetric Image Encryption Approach Based on a New Invertible Two-dimensional Map |
feng, huang |
| IIH-MSP 2008-0778 |
Trust Evaluation Model for Composite Service Based on Subjective Logic |
Meihua, Chen |
| IIH-MSP 2008-0782 |
A compression algorithm of hyperspectral image based on the eight-fork tree division and three-dimensional fractal coding |
yi, zou |
| IIH-MSP 2008-0787 |
Fast Implementation of SMS4 Cryptographic Algorithms on Smart Card |
dawei, Zhang |
| IIH-MSP 2008-0791 |
Estimating Data Hiding Capacity of Gray Scale Images Based on its bitplanes Structure |
Farzin, Yaghmaee |
| IIH-MSP 2008-0794 |
Research of Gravity-based Outliers Detection |
Weixiang, Cheng |
| IIH-MSP 2008-0800 |
Grid distance-based Improving Accuracy Clustering Algorithm |
Weixiang, Cheng |
| IIH-MSP 2008-0804 |
Image Watermarking Scheme Using Singular Value Decomposition and Micro-genetic Algorithm |
Hsiang-Cheh, Huang |
| IIH-MSP 2008-0807 |
AN EFFICIENT MODEL FOR ISOLATED VIETNAMESE HANDWRITTEN RECOGNITION |
Pham, Phuong |
| IIH-MSP 2008-0812 |
Digital Video Multicasting System with Seamless Handover Mechanism |
Ren Guey, Lee |
| IIH-MSP 2008-0818 |
A Target Recognition Method of Multi-radar |
Xiao, Wang |
| IIH-MSP 2008-0824 |
ACEAC: A Novel Access Control Model for Cooperative Editing with Workflow |
Fei, ZHU |
| IIH-MSP 2008-0827 |
A New Watermark Algorithm based on Public Key Cryptogram for Relational Databases |
haiting, cui |
| IIH-MSP 2008-0831 |
WBISD: A Debugger of Web-Based Interactive Services |
Lei, Liu |
| IIH-MSP 2008-0834 |
Image Editing without Color Inconsistency Using Modified Poisson Equation |
Chuan, Qin |
| IIH-MSP 2008-0839 |
Halftone Image Data Hiding with Reference to Original Multitone Image |
Yi-Ting, chen |
| IIH-MSP 2008-0845 |
Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption |
Lu, Yang |
| IIH-MSP 2008-0851 |
Feature Selection Based on Relation between Fuzzy Features and Optimal Feature Fuzzy-Valued Subset Selection |
Jirong, Li |
| IIH-MSP 2008-0856 |
Research on Three-Dimensional Localization Algorithm in Wireless Sensor Network |
Kai, Li |
| IIH-MSP 2008-0861 |
Curve Watermarking Technique for Fingerprinting Digital Maps |
Yongjian, Hu |
| IIH-MSP 2008-0865 |
A Data Layout and Access Control Strategies of the Video Storage Server based Disk Array |
Yuan-Qing, He |
| IIH-MSP 2008-0874 |
Programming Method for Failure of Network Security Based on Game Model |
Xuansen, He |
| IIH-MSP 2008-0877 |
Low-complexity Real-time LDPC Encoder Design for CMMB |
Peng, Wang |
| IIH-MSP 2008-0883 |
A New Approach Against Color Attacks of Watermarked Images |
Lamri, Laouamer |
| IIH-MSP 2008-0887 |
LSB Data Hiding Detection Based on Gray Level Co-Occurrence Matrix |
Mojtaba, Abolghasemi |
| IIH-MSP 2008-0892 |
Calculation of Latent Semantic Weight Based on Fuzzy Membership |
Jing-Tao, Sun |
| IIH-MSP 2008-0897 |
Study on Spam Filtering System Using LSA and SHA Algorithms |
Jing-Tao, Sun |
| IIH-MSP 2008-0900 |
A Large Capacity Blind Information Hiding Algorithm Based on DCT Domain of Image |
Jianquan, XIE |
| IIH-MSP 2008-0903 |
A Novel Watermarking-Based Reversible Image Authentication Schem |
tie-gang, gao |
| IIH-MSP 2008-0910 |
Multi-person location and tracking method based on BP neural networks |
Zhizhan, Liu |
| IIH-MSP 2008-0916 |
Configuring RBAC to Simulate Bell Model |
Yong-Zhong, HE |
| IIH-MSP 2008-0921 |
BIOMETRICS AND IDENTITY |
EMILIO, Mordini |
| IIH-MSP 2008-0924 |
Implementation of Covert Communication based on Steganography |
Bo, Xiao |
| IIH-MSP 2008-0929 |
A Novel Soft-in-Soft-out Decoder for Nordstrom-Robinson Code |
Huan, Li |
| IIH-MSP 2008-0932 |
Sensation Based Clothes Search System |
Damon Shing-Min, Liu |
| IIH-MSP 2008-0935 |
New Criterion for Mining Strong Association Rules in unbalanced events |
Tong Yan, Li |
| IIH-MSP 2008-0940 |
The Study of Alarm Association Rules Mining in Telecommunication Networks |
Tong Yan, Li |
| IIH-MSP 2008-0944 |
Wide-band Low-noise Quadrature VCO design |
Wei, Peng |
| IIH-MSP 2008-0948 |
Hole Filling Algorithm in Surface reconstruction Based on Radial Basis Function Neural Network |
Xue-Mei, Wu |
| IIH-MSP 2008-0951 |
Research & Design of Bias Voltage on Variable-Capacitance Micro-mechanical Accelerometer |
Xue-Mei, Hu |
| IIH-MSP 2008-0956 |
An Image Fingerprinting Method Robust to Complicated Modifications |
Xinghua, Yu |
| IIH-MSP 2008-0959 |
Performance Analysis On Capacitance MEMS Comb-finger Accelerometer |
Xue-Mei, Hu |
| IIH-MSP 2008-0962 |
A Speaker Identification System for Video Content Analysis |
Jing, Bi |
| IIH-MSP 2008-0967 |
Road Extraction in Remote Sensing Images Using a New Algorithm |
Ying, Liu |
| IIH-MSP 2008-0970 |
The 2nd BOWS contest: Wavelet-Based Bayesian Denoising Attack on Image Watermarking |
Larbi, Boubchir |
| IIH-MSP 2008-0974 |
A CHINESE TEXT WATERMARKING BASED ON STATISTIC OF PHRASE FREQUENCY |
Jin, Zhang |
| IIH-MSP 2008-0985 |
The Research of Vehicle Driving Multimedia Data Recording |
Hao, Meng |
| IIH-MSP 2008-0991 |
A Blind Steganalysis Algorithm of QIM-based Hiding |
Hai-ying, Gao |
| IIH-MSP 2008-0995 |
Design and Implementation of Secure Active RFID System with Cryptography and Authentication Mechanisms |
Ren Guey, Lee |
| IIH-MSP 2008-0998 |
A Method of Big Prime Number Generator based on NTL |
Longjiang, Yu |
| IIH-MSP 2008-1001 |
AN ADULT SHORT MESSAGE RECOGNITION ALGORITHM BASED ON RESTRICTED CLOSE TEST OPTIMIZATION |
Qin-Dong, sun |
| IIH-MSP 2008-1004 |
IDENTIFICATION OF NETWORK VIDEO STREAM PACKETS BY MULTIPLE PATTERN MATCHING |
Qin-Dong, sun |
| IIH-MSP 2008-1010 |
Study on Camera Calibration Based on Genetic programming |
Man, Cheng |
| IIH-MSP 2008-1016 |
New color image encryption algorithm based on chaotic sequences |
Hui-Jing, Pang |
| IIH-MSP 2008-1027 |
A New Variant of the Diffie-Hellman Key-Exchange Protocol Based on Block Triangular Matrix Groups |
Jun, Yang |
| IIH-MSP 2008-1030 |
Watermark Detection Using Channel Estimation in the Quantization Based Watermarking System |
Cagatay, Karabat |
| IIH-MSP 2008-1033 |
Robust Non-Blind Detection for Spread Spectrum Watermarking System |
Cagatay, Karabat |
| IIH-MSP 2008-1036 |
A New Stability Criterion for Neural Networks with Interval Time-varying Delays |
Haixia, Wu |
| IIH-MSP 2008-1040 |
Covert Channels Based on Jitter Field of the RTCP Header |
Linda, Bai |
| IIH-MSP 2008-1043 |
A Security Threshold Subliminal Channel Based on Elliptic Curve Cryptosystem |
yuhua, xie |
| IIH-MSP 2008-1049 |
Self-Adaptive Video Watermarking Based on the Motion Characteristic Detection and the Model of Entropy |
Zhi, Li |
| IIH-MSP 2008-1052 |
A Novel Information Entropy Shift Based Image Retrieval Algorithm |
Yan, Wang |
| IIH-MSP 2008-1065 |
Subblock-based BPE Scheme to Conquer Mismatch in Memory Access Pattern |
Bao-Feng, Li |
| IIH-MSP 2008-1069 |
A Capacity Variable Watermarking Algorithm for 2D Engineering Graphic Based on Complex Number System |
Xiao-Feng, Huang |
| IIH-MSP 2008-1074 |
A New Method for MLE Training Based on Multi-model Weighting |
ya-hui, wu |
| IIH-MSP 2008-1084 |
A Content-Adaptive Digital Watermarking Scheme in H.264/AVC Compressed Videos |
Pochyi, Su |
| IIH-MSP 2008-1088 |
A Software Birthmark Base on Dependence Graph of Component |
xiaoming, zhou |
| IIH-MSP 2008-1092 |
Using Semantics for Dynamic Access Control of XML Documents in Dynamic Coalition Environment |
tao, peng |
| IIH-MSP 2008-1095 |
Gay Intensity Images Processing for PD Pattern Recognition based on Genetic Programming |
Dening, Zhang |
| IIH-MSP 2008-1099 |
A Novel Grading Noise-pretreatment Algorithm Based on Time-frequency Blind Source Separation |
Er-Fu, Wang |
| IIH-MSP 2008-1102 |
A Computation Model for Capacity and Robustness of Robust Image Watermarking Scheme in Spatial Domain |
Yan-Jun, Hu |
| IIH-MSP 2008-1106 |
Stochastic Voltage Scheduling of Fixed-Priority tasks with Preemption Thresholds |
He, XiaoChuan |
| IIH-MSP 2008-1110 |
Biometric Systems and Data Protection Legislation in Germany |
Martin, Meints |
| IIH-MSP 2008-1120 |
Steganalysis of Data hiding in Two-dimensional Engineering Graphics Based on Characters Statistic |
Fei, Peng |
| IIH-MSP 2008-1123 |
An AVL Tree-Based Dynamic Key Management in Hierarchical Wireless Sensor Network |
Yiying, Zhang |
| IIH-MSP 2008-1127 |
Automated Image Segmentation and Asymmetry Analysis for Breast Using Infrared Images |
Zengqiang, Ma |
| IIH-MSP 2008-1137 |
IMAGE MOSAIC BASED ON SIFT |
Zhan-Long, Yang |
| IIH-MSP 2008-1142 |
Image Registration using feature points Extraction and Pseudo-Zernike moments |
Zhan-Long, Yang |
| IIH-MSP 2008-1145 |
Development on the Partial Discharge on-line Monitoring System of Transformer based on Embedded System |
Dening, Zhang |
| IIH-MSP 2008-1151 |
Multicast video fingerprinting scheme with genetic algorithm |
Yueh-Hong, Chen |
| IIH-MSP 2008-1154 |
Stylometric Watermarking |
Qian, Zhang |
| IIH-MSP 2008-1157 |
New Steganography Scheme in Halftone Images |
Ching-Nung, Yang |
| IIH-MSP 2008-1161 |
The Design and Realization of Embedded Wireless Video monitoring System Based on GPRS |
zhao, chun |
| IIH-MSP 2008-1165 |
MST Clustering Algorithm Based on Optimized Grid |
Weixiang, Cheng |
| IIH-MSP 2008-1171 |
a grid resource discovery model using P2P technology |
Zeng-gang, Xiong |
| IIH-MSP 2008-1174 |
The Study of 3D Reconstruction Method based on Dynamic Threshold Method and Improved Ray Casting Algorithm |
Yudong, Zhao |
| IIH-MSP 2008-1177 |
A Multiple Encryption Algorithm for 2D Engineering Graphic Based on Fourier Descriptors and Chaos Scrambling |
tao, deng |
| IIH-MSP 2008-1186 |
A Multi-view Video Coding Method Based on Distributed Source Coding for Free Viewpoint Switching |
Guiguang, Ding |
| IIH-MSP 2008-1199 |
Cryptanalysis of SN3 Stream Cipher |
Mohammad-Ali, orumiehchi |
| IIH-MSP 2008-1204 |
Heritage Debris Classification based on 3D Texture Feature and SVM |
Meng, Li |
| IIH-MSP 2008-1207 |
ASCON - A Synchronization -Concurrency Control Model For Distributed Multimedia Systems |
Arthanari, Janani |
| IIH-MSP 2008-1213 |
Variance-Classified Capacity Watermarking Using Discrete Cosine Transform |
Guo, Jing-Ming |
| IIH-MSP 2008-1220 |
Intelligent Campus Multi-application RFID Integration System |
Chen, Bo |
| IIH-MSP 2008-1225 |
A Cost-Efficient Bit-Serial Architecture for Sub-Pixel Motion Estimation Of H.264/AVC |
Mohammadreza, Fatemi |
| IIH-MSP 2008-1228 |
Vehicle Information Communication Safety Combined with Mobile RFID System |
Wen-hao , Hsieh |
| IIH-MSP 2008-1232 |
NCPA: A Scheduling Algorithm for Multi-cipher and Multi-mode Reconfigurable Cryptosystem |
Liang-Bi, Chen |
| IIH-MSP 2008-1236 |
Particle Swarm Optimization for Gary-Scale Image Noise Cancellation |
Te-Jen, Su |
| IIH-MSP 2008-1241 |
A Novel Preservation Framework for Digital Image Archiving System |
Tien-Ying, Kuo |
| IIH-MSP 2008-1244 |
Fragile Video Watermarking Technique by Motion Field Embedding with Rate-distortion Minimization |
Tien-Ying, Kuo |
| IIH-MSP 2008-1257 |
Detection of H.264 Shot Change Using Intra Predicted Direction |
Tien-Ying, Kuo |
| IIH-MSP 2008-1260 |
Introducing A New Method for Estimation Image Complexity According To Calculate Watermark Capacity |
Farzin, Yaghmaee |
| IIH-MSP 2008-1266 |
Fast Local Motion Estimation and Robust Global Motion Decision for Digital Image Stabilization |
Tien-Ying, Kuo |
| IIH-MSP 2008-1271 |
Multiplicative Watermark Detection Using Locally Optimum Nonlinearity |
Tianyu, Ye |
| IIH-MSP 2008-1276 |
Mobile RFID Integration Home-Care System for Wireless Network |
Jing-Cyun, You |
| IIH-MSP 2008-1279 |
Hierarchical Speaker Verification Based on PCA and Kernel Fisher Discriminant |
Yu, Xing |
| IIH-MSP 2008-1284 |
A Novel Relational Database Watermarking Algorithm for Joint Ownership |
Yu, Fu |
| IIH-MSP 2008-1287 |
A Novel Feature Extraction Approach Based on PCA and Improved Fisher score |
Yu, Xing |
| IIH-MSP 2008-1290 |
Efficient Block-matching Motion Estimation Algorithm Based on Temporal and Spatial Correlation for H.264 |
Zhi-xiong, Zhang |
| IIH-MSP 2008-1296 |
Designated Verifier Proxy Signature Scheme |
Yongjian, Liao |
| IIH-MSP 2008-1302 |
Parameters Optimization of Fuzzy Controller Based on Improved Particle Swarm Optimization |
guan, wang |
| IIH-MSP 2008-1307 |
An Effective Approach Combining KPCA with Sparse LS_SVM for Speaker Identification |
rui-ling, Luo |
| IIH-MSP 2008-1314 |
Video Monitoring System Based on Amending Model of Motion Vector |
Zhi-xiong, Zhang |
| IIH-MSP 2008-1321 |
A Gene Immune Detection Algorithm with Complement Operator on the Basis of Biological Immune Principles |
Ya-Jing, Zhang |
| IIH-MSP 2008-1324 |
Efficient many-to-one and one-to-many multiparty quantum secure direct communication with authentication |
Wen-jie, Liu |
| IIH-MSP 2008-1332 |
A Novel Watermarking Method For Wyner-Ziv Video Coding |
Ning, Zhu |
| IIH-MSP 2008-1337 |
Wireless Grid and Storage System Design |
Wen-Ying, Zeng |
| IIH-MSP 2008-1341 |
An Improved Steganalysis Method of LSB Matching |
Xiaoyi, Yu |
| IIH-MSP 2008-1347 |
A New Synonym Text Steganography |
Mohammad, Shirali-Shahreza |
| IIH-MSP 2008-1353 |
A Volume Segmentation Algorithm for Medical Image Based on K-means Clustering |
Xinwu, Li |
| IIH-MSP 2008-1359 |
Setganalysis of LSB Matching Based on Co-Occurrence Matrix and Removing Most Significant Bit Planes |
Mojtaba, Abolghasemi |
| IIH-MSP 2008-1363 |
Review on Copyright Marking Technology of GIS Vector Data Producti |
An-bo, Li |
| IIH-MSP 2008-1368 |
A Video Summarization Approach based on Machine Learning For Video Management |
yuesheng, zhu |
| IIH-MSP 2008-1373 |
Mean-Classified and Hierarchical Block Matching Watermarking in Fractal Coding |
Guo, Jing-Ming |
| IIH-MSP 2008-1378 |
Framework for Distributed Video Surveillance in Heterogeneous Environment |
Fu, Xiang |
| IIH-MSP 2008-1384 |
Data Study on the Chaotic Synchronization Driven by External Chaotic Signal |
Yu-Long, Qiao |
| IIH-MSP 2008-1389 |
Bio-inspired Multimedia Traffic Support for Maximum Lifetime Data Aggregation |
Han, XUE |
| IIH-MSP 2008-1394 |
BP Neural Network to Distinguish Pregnant Woman by Arterial Pressure Pulse Waveform Analysis |
Lu, Wang |
| IIH-MSP 2008-1397 |
A Robust Watermarking Algorithm Based on Salient Image Features |
Yuan-Liang, Tang |
| IIH-MSP 2008-1401 |
TWO-STAGE BUFFER CONTROL FOR CONSTANT QUALITY TRANSMISSION OF MOTION JPEG2000 VIDEO STREAM |
Kuo-Cheng, Liu |
| IIH-MSP 2008-1405 |
Analysis Based on Generalized Vector Quantization for Information Hiding |
Hon-Yin, Leung |
| IIH-MSP 2008-1411 |
A New Wavelet Watermark Scheme of Color Image Based on Chaotic Sequences |
Hon-Yin, Leung |
| IIH-MSP 2008-1417 |
A Robust ImageWatermarking Scheme Based on A Novel HVS Model in |
Hon-Yin, Leung |
| IIH-MSP 2008-1423 |
ROBUST IMAGE RESTORATION FOR ROTARY MOTION DEGRADATIONS AND THE MOTION PARAMETER IDENTIFICATION |
Zheng, Yuan |
| IIH-MSP 2008-1429 |
The Research on Non-destructive Testing Method of Sheet Resistance in Micro Area of Silicon Wafer Based on EIT Technology |
Xinfu, Liu |
| IIH-MSP 2008-1433 |
A METRICS SUITE FOR STATIC STRUCTURE OF LARGE-SCALE SOFTWARE BASED ON COMPLEX NETWORKS |
Haohua, Zhang |
| IIH-MSP 2008-1439 |
Visualization and Cognition of Large-scale Software Structure using the k-core Analysis |
Haohua, Zhang |
| IIH-MSP 2008-1444 |
Copyright Protection for Images with EXIF Metadata |
Hsiang-Cheh, Huang |
| IIH-MSP 2008-1448 |
IGSOM: Incremental Clustering Based on Self-Organizing-Mapping |
Liu, Ming |
| IIH-MSP 2008-1451 |
Communications Security Research on "Man-in-the-loop" Television Guidance System Data Link |
Longjiang, Yu |
| IIH-MSP 2008-1456 |
Research and Design of Autonomic Software Agent Architecture |
Chuan-Sheng, Zhou |
| IIH-MSP 2008-1460 |
Application of MAC-based VLANs for Mobile Office in Campus Area Network |
Ning, Jiang |
| IIH-MSP 2008-1466 |
On the Security of WAI Protocol in the Third Version of WAPI |
Zhao-Hui, Tang |
| IIH-MSP 2008-1469 |
An Implementation of Fuzzy Clustering with Size and Shape Constraints |
Jian-hui, Wang |