Accepted Papers in Invited Sessions of
IIH-MSP-2010
IIH-MSP-2010-IS01-01
Possible Disease-link Genetic Pathways Constructed by Hierarchical Clustering and Conditional Probabilities for Ovarian Carcinoma Microarray Data
Hsiao-Han Ko, Kuo-Jin Tseng, Li-Min Wei, Meng-Hsiun Tsai
IIH-MSP-2010-IS01-02
An Efficient Source Authentication for Multicast based on Merkle Hash Tree
Iuon-Chang Lin and Chia-Chang Sung
IIH-MSP-2010-IS01-03
An Improved Digital Signature Scheme with Fault Tolerance in RSA
Iuon-Chang Lin and Hsing-Lei Wang
IIH-MSP-2010-IS01-04
Chaos-based Image Integrity Authentication Code
Tzung-Her Chen, Wei-Lun Huang and Chih-Yang Lin
IIH-MSP-2010-IS01-05
The Information Hiding Technology Based on the Similar Sample Blocks
Tzu-Chuen Lu and Siang-Ru Liao
IIH-MSP-2010-IS01-06
A Robust Public Watermarking Scheme Based on DWT
Chin-Chen Chang, Kuo-Nan Chen and Ming-Huang Hsieh
IIH-MSP-2010-IS01-07
Enhancement of Two-Factor User Authentication in Wireless Sensor Networks
Hui-Feng Huang and Ya-Fen Chang
IIH-MSP-2010-IS01-08
A Data Hiding Scheme on Word Documents Using Multiple-base Notation System
Iuon-Chang Lin and Ping-Kun Hsu
IIH-MSP-2010-IS01-09
A Reversible Data Hiding Scheme for Digital Images Using LAU-Side Match Prediction
Chin-Feng Lee and Huei-Ju Tsai
IIH-MSP-2010-IS02-01
Coefficient Adjustment Method for Reversible Watermarking
Ching-Yu Yang, Chih-Hung Lin, and Wu-Chih Hu
IIH-MSP-2010-IS02-02
A (2, 3) Threshold Secret Sharing Scheme Using Sudoku
Yung-Chen Chou, Chih-Hung Lin, Po-Chin Li, and Yu-Chiang Li
IIH-MSP-2010-IS02-03
Reversible Authentication and Cross-recovery of Images Using (t, n) Threshold and Modified-RCM Watermarking
Yeh-Shun Chen and Ran-Zan Wang
IIH-MSP-2010-IS02-04
Steganalysis Scheme Using the Difference Image of Calibrated Sub-sampling
Jeong-Chun Joo, Tae-Woo Oh, Jeong-Ho Choi, and Heung-Kyu Lee
IIH-MSP-2010-IS02-05
Improved Watermark Estimation Scheme Based on Neighborhood Filter
Tae-Woo Oh, Seung-Jin Ryu, Ji-Won Lee, and Heung-Kyu Lee
IIH-MSP-2010-IS02-06
Multi-layer Secret Image Sharing
Wen-Pinn Fang
IIH-MSP-2010-IS02-07
Graylevel Images Encrypting Based on the n-graylevel Encoding Method and the Lowest Common Multiple Technique
Kuang Tsan Lin
IIH-MSP-2010-IS02-08
Data Hiding Based on Side Match Vector Quantization and Modulus Function
Lee Shu-Teng Chen, Suiang-Shyan Lee, Wen-Tarn Chang, and Ja-Chen Lin
IIH-MSP-2010-IS02-09
High-payload Image Hidingmethod Using k-way Block Matching
Shang-Kuan Chen and Ran-Zan Wang
IIH-MSP-2010-IS02-10
High Embedding Reversible Data Hiding Scheme for JPEG
Wen-Chung Kuo, Shao-Hung Kuo, and Lih-Chyau Wuu
IIH-MSP-2010-IS03-01
Design of 3-D FIR Cone-Shaped Filters by a Nest of McClellan Transformations
Jong-Jy Shyu, Soo-Chang Pei, and Yun-Da Huang
IIH-MSP-2010-IS03-02
Reversible Data Hiding with Improved Histogram Alteration Method
Hsiang-Cheh Huang, Yueh-Hong Chen, and I-Hung Wang
IIH-MSP-2010-IS03-03
A RFID-Based Hybrid Building Fire Evacuation System on Mobile Phone
Liou Chu
IIH-MSP-2010-IS03-04
A New Integrated Mobile Architecture for Heterogeneous Wireless Networks
Shih-Jung Wu
IIH-MSP-2010-IS03-05
Preliminary Survey of Multiview Synthesis Technology
Ellen Sharma Shijagurumayum and Feng-Cheng Chang
IIH-MSP-2010-IS03-06
Systematic Review of Applying Service Oriented Architecture in Networking
Duen-Kai Chen
IIH-MSP-2010-IS03-07
Adjacent Quad Modification Algorithm for Reversible Data Hiding
Hsiang-Cheh Huang, Ting-Wei Chen, and Feng-Cheng Chang
IIH-MSP-2010-IS03-08
Electrical Network Frequency as a Tool for Audio Concealment Process
Feng-Cheng Chang and Hsiang-Cheh Huang
IIH-MSP-2010-IS04-01
A Framework for Face Recognition Using Laplacian Eigenmaps and Nearest Feature Mixtures
Chen-Ta Hsieh, Chang-Hsing Lee, Chin-Chuan Han and Ching-Chien Chuang
IIH-MSP-2010-IS04-02
Facial Feature Alignment by Manifold Learning of Active Appearance Models
Yuan-Kai Wang, Wei-Ren Chen
IIH-MSP-2010-IS04-03
Improvement of Face Recognition by Eyeglass Removal
Jang-Jia Hau, Luo-Wei Tasi, Yuan-Kai Wang, Kuo-Chin Fan
IIH-MSP-2010-IS04-04
Fast Forgery Detection with the Intrinsic Resampling Properties
Cheng-Chang Lien, Cheng-Lun Shih, and Chih-Hsun Chou
IIH-MSP-2010-IS04-05
Moving Object Detection for Night Vision
Yuan-Kai Wang, Chin-Tang Fan
IIH-MSP-2010-IS04-06
Implementation of a Smart Traffic Prediction and Flow Control Mechanism for Video Streaming
Yue-Ru Chuang, Chia-Sheng Hsu, and Je-Wei Chen
IIH-MSP-2010-IS05-01
An Alternative-path Approach to Support Reliable TCP Connections in Wireless Mesh Networks
Mong-Fong Horng, Yi, Ting Chien, and Jeng-Pong Hsu
IIH-MSP-2010-IS05-02
A Fast and Efficient FEC Enhancement Scheme for Delay-sensitive Video Transmissions
Chun-I Kuo, Chi-Huang Shih, Ce-Kuen Shieh, and Wen-Shyang Hwang
IIH-MSP-2010-IS05-03
Adaptive Forward Error Correction Combined with Packet Size Control for Wireless Video
Chi-Huang Shih
IIH-MSP-2010-IS05-04
Performance Evaluation of Vehicle License Plate Recognition System Using Wavelet Transform and Neural Network
Mu-Liang Wang and Yi Hwang Liu
IIH-MSP-2010-IS05-05
Improving the Multimedia Processing of Relay Nodes in Mesh Wireless Networks
Chun-Ting Huang
IIH-MSP-2010-IS05-06
Available Bandwidth Detection of Asymmetric Link Between Residential Users and ISPs for Multimedia Services
Chun-Chin Lo, Shih-Po Tang, Mong-Fong Horng, Yu-Cheng Sheu, Jeng-Pong Hsu, and Yau-Hwang Kuo
IIH-MSP-2010-IS06-01
Low-Cost and Shared Architecture Design of Recursive DFT/IDFT/IMDCT Algorithms for Digital Radio Mondiale System
Shin-Chi Lai, Sheau-Fang Lei, and Ching-Hsing Luo
IIH-MSP-2010-IS06-02
Lossless Coding of Multiband Images Using Interband Data Correlation and Error Feedback Prediction Scheme
Cheng-Chen Lin, Yin-Tsung Hwang, Yi-Chen Chang, Jiun-Jiang Chen, and Ming-Wei Liu
IIH-MSP-2010-IS06-03
Area-Efficient H.264 VLC Decoder Using Sub-tree Classification
Chia-Cheng Lo, Chia-Wei Hsu, and Ming-Der Shieh
IIH-MSP-2010-IS06-04
The Use of k-Means Algorithm to Compute the Line Spectrum Pair Frequencies with Tschirnhaus Transform
Shi-Huang Chen and Ming-Lung Hsu
IIH-MSP-2010-IS06-05
Efficient Multi-Layer Background Model on Complex Environment for Foreground Object Detection
Wen-Kai Tsai, Ming-Hwa Sheu, and Chung-Chi Lin
IIH-MSP-2010-IS06-06
A Pipelined Program Decompression Engine Generator Based on Partial Field-partitioned (PFP) Compression Technique for Embedded Systems
Yuan-Long Jeang and Ko-Yen Hu
IIH-MSP-2010-IS09-01
Unobtrusive User-Authentication on Mobile Phones using Biometric Gait Recognition
Mohammad O. Derawi, Claudia Nickel, Patrick Bours, and Christoph Busch
IIH-MSP-2010-IS09-02
Improved Cycle Detection for Accelerometer Based Gait Authentication
Mohammad O. Derawi, Patrick Bours, and Kjetil Holien
IIH-MSP-2010-IS09-03
Capturing Hand or Wrist Vein Images for Biometrics Using Low-cost Devices
J. Enrique Suarez Pascual, Jaime Uriarte-Antonio, Raul Sanchez-Reillo, and Michael G. Lorenz
IIH-MSP-2010-IS09-04
Teeth Segmentation and Feature Extraction for Odontological Biometrics
Danish Mairaj, Stephen D. Wolthusen, and Christoph Busch
IIH-MSP-2010-IS09-05
3D Face Recognition with Local Binary Patterns
Xuebing Zhou, Silvia Araujo S’ anchez, and Arjan Kuijper
IIH-MSP-2010-IS09-06
Usability Evaluation of Fingerprint Based Access Control Systems
Belen Fernandez-Saavedra, Raul Alonso-Moreno, Aitor Mendaza-Ormaza, and Raul Sanchez-Reillo
IIH-MSP-2010-IS12-01
Blackbox Security of Biometrics
Julien Bringer, Herve Chabanne, and Koen Simoens
IIH-MSP-2010-IS12-02
Spectral Minutiae Representations for Fingerprint Recognition
Haiyun Xu and R. N.J. Veldhuis
IIH-MSP-2010-IS12-03
A Survey of the Security and Privacy Measures for Anonymous Biometric Authentication Systems
Ileana Buhan, Emile Kelkboom, and Koen Simoens
IIH-MSP-2010-IS12-04
Privacy Preserving Identification: Order Statistics List Decoding Perspective
Farzad Farhadzadeh, Sviatoslav Voloshynovskiy, and Oleksiy Koval
IIH-MSP-2010-IS12-05
Fusion in Fingerprint Authentication: Two Finger Scenarios
Davrondzhon Gafurov, Christoph Busch, Patrick Bours, and Bian Yang
IIH-MSP-2010-IS13-01
The Application of the Technique of 2D fragments Stitching Based on Outline Feature in Rejoining Oracle Bones
Yongge Liu
IIH-MSP-2010-IS13-02
A Study on Theory and Practice for Multimedia Intelligence Course and Intelligence Classroom
Qingsheng Li
IIH-MSP-2010-IS13-03
Design and Implementation for Personalize Web Page Editor Based on Visual Documents and Database Technique
Qingsheng Li
IIH-MSP-2010-IS13-04
A New Credit Scoring System
Xiao Yi
IIH-MSP-2010-IS13-05
Revisit LSB Matching
Xiao Yi Yu
IIH-MSP-2010-IS14-01
An Image Level Set Method for Denoising
Dazhi Zhang, Boying Wu, and Jiebao Sun
IIH-MSP-2010-IS14-02
A Perceptual Metric Based on Salient Information Entropy for 3D Mesh Distortion
Zhenfeng Shi, Xiamu Niu
IIH-MSP-2010-IS14-03
Encryption Scheme Based on Invertible Watermarking
Jinwei Wang
IIH-MSP-2010-IS14-04
A Novel Self-Adaptive Image Steganography Algorithm Based on Cover-Coding and Markov Chain Model
Zhan Zhang, Guangjie Liu, Yuewei Dai, Zhiquan Wang
IIH-MSP-2010-IS15-01
An Object-Based Web System for Building a Virtual Community
S. R. Tsai, J. Y. Fang, Y. T. Chen, U.S. Huang, B. L. Chen, C. M. Lee, U. L. Dai, G. H. Huang, and J. N. Lee
IIH-MSP-2010-IS15-02
A Snapshot-Based Evaluation Method for Garbage Collection
Chin-Yang Lin, Ting-Wei Hou, and Fuh-Gwo Chen
IIH-MSP-2010-IS15-03
Enhanced UPnP Quality of Service by Intelligent Access Points
Chia-Feng Kang, Kai-Hua Kuo, Ya-Chun Li, Wei-Tsong Lee, and Jim-Min Lin
IIH-MSP-2010-IS15-04 Color-based Semantic Image Retrieval with Fuzzy-ART Chuan-Yu Chang, Hung-Jen Wang, and Ru-Hao Jian IIH-MSP-2010-IS16-02 An Image Structure Information based Robust Hash for Tamper
Detection and Localization Zhaoqing Liu, Qiong Li, Hui Zhang, and Xiyuan Peng IIH-MSP-2010-IS16-03 Tamper Detection for Shifted Double JPEG Compression Xian-zhe Meng, Shao-zhang Niu, and Jian-cheng Zou IIH-MSP-2010-IS16-04 A Novel Robust Watermarking Method for Certificates Based on DFT and Hough Transforms Jiancheng Zou, Xin Yang, and Shaozhang Niu IIH-MSP-2010-IS16-05 Spread Spectrum-based Image Watermarking Resistant to
Rotation and Scaling Using Radon Transform Huawei Tian, Yao Zhao, Rongrong Ni, and Jeng-Shyang Pan IIH-MSP-2010-IS16-06 A High Payload Histogram-based Reversible Watermarking Using Linear Prediction Bo Ou, Yao Zhao, Rongrong Ni, and Gang Cao IIH-MSP-2010-IS16-07 An Error Driven 3D Face Modeling Scheme based on Partial Differential Equations Chuanjun Wang, Zhenfeng Shi, and Xiamu Niu IIH-MSP-2010-IS16-08 Image Retrieval Based on RST Invariant Features Extracted from
Scale Invariant Keypoints Zhe-Ming Lu and Wei-Min Zheng IIH-MSP-2010-IS17-01 ASM-SPV: A Model Checker for Security Protocols Jianhua Peng, Feng Liu,Zhenju Zhao, Danqing Huang, and Rui Xue IIH-MSP-2010-IS17-02 Camera Model Identification for JPEG Images via Tensor Analysis Ming Liu, Nenghai Yu, and Weihai Li IIH-MSP-2010-IS17-03 A Novel Time Synchronization Algorithm Synchronizer-Based for Wireless Sensor Network Of Clustering Architecture Jun-feng Tian,Huai-xiang Wen IIH-MSP-2010-IS17-04 Secure and Efficient Generalized Signcryption Scheme Based on a Short ECDSA Chuanrong Zhang and Yuqing Zhang IIH-MSP-2010-IS17-05 Regular Quasi-Cyclic LDPC Codes With Girth 6 From Prime Fields Qingji Zheng, Xiangxue Li, Dong Zheng, and Baoao Guo IIH-MSP-2010-IS17-06 A Study of Mutual Authentication for P2P Trust Management Chunling Wang and Jingyu Feng IIH-MSP-2010-IS17-07 Enhanced Adaptive FEC based Multiple Description Coding for Internet Video Streaming over Wireless Network Li Li and Xiamu Niu IIH-MSP-2010-IS17-08 An Novel and Secure Image Interpolation Methods for Image Disguise Shen Wang , Bian Yang, and Xiamu Niu IIH-MSP-2010-IS17-09 Formal Verification of HMQV Using ASM-SPV Danqing Huang,Rui Xue, Feng Liu, Jianhua Peng, Zhenju Zhao, and Dongyao Ji IIH-MSP-2010-IS17-10 Certificates Distributed Storage Scheme in the Trust Management System Ying Cai and Qinglong Wang IIH-MSP-2010-IS19-01 Reduction of Interference for CDMA-Based Fingerprinting Scheme Based on Random Permutation Minoru Kuribayashi IIH-MSP-2010-IS19-02 On Some Properties of a Digital Watermarking Based on Complete Complementary Codes Tetsuya Kojima, Yoshiya Horii, Naoki Ohtani, and Thierno Sene IIH-MSP-2010-IS19-03 Detecting Revelation of Private Information from Online Social Network Natsuki Watanabe and Hiroshi Yoshiura IIH-MSP-2010-IS19-04 Unified Metric for Measuring Anonymity and Privacy with Application to Online Social Network Komei Kamiyama, Tran Hong Ngoc, Isao Echizen, and Hiroshi Yoshiura IIH-MSP-2010-IS19-05 Privacy by Data Provenance with Digital Watermarking Sven Wohlgemuth, Jeremie Thauraud, Isao Echizen, Noboru Sonehara, and Gunter Muller IIH-MSP-2010-IS20-01 Aerial Acoustic Modem that is Suitable to Decode Using a CELP-based Speech Encoder Akira Nishimura IIH-MSP-2010-IS20-02 Improvement of Packet Loss Concealment for MP3 Audio Based on Switching of Concealment Method and Estimation of MDCT Signs Akinori Ito, Kiyoshi Konno, Masashi Ito and Shozo Makino IIH-MSP-2010-IS20-03 Audio Information Hiding Based on Spatial Masking Ryouichi Nishimura IIH-MSP-2010-IS20-04 A Design of the IIR All-pass Filter Based on Cochlear Delay for Improving Embedding Limitations Masashi Unoki, Tosizou Kosugi, Atsushi Haniu, and Ryota Miyauchi IIH-MSP-2010-IS20-05 An Audio Steganography by a Low-bit Coding Method with Wave Files Masahiro Wakiyama, Yasunobu Hidaka, and Koichi Nozaki IIH-MSP-2010-IS20-06 A Semi-Lossless Steganography Technique for G.711 Telephony Speech Naofumi Aoki IIH-MSP-2010-IS20-07 A New Approach of Reversible Acoustic Steganography for Tampering Detection Xuping Huang, Isao Echizen, and Akira Nishimura IIH-MSP-2010-IS22-07 Vision-Based Hand Gesture Recognition Using Combinational Features Cheng-Long Yu, Xuan Wang, He-Jiao Huang, Jian-Ping Chen and Kun Wu IIH-MSP-2010-IS22-10 Example-based Facial Portraiture Style Learning Zhong-Mei Zhou, Xuan Wang, Zi-Li Zhang and Chenglong Yu IIH-MSP-2010-IS22-13 Parallel Protocol Analysis in Gigabit High-speed Environment Xiao-Dong Gao, Xuan Wang, Shu-Han Qi and Yang Wang IIH-MSP-2010-IS22-16 Machining Learning Based Sentiment Analysis for Finance News Mining Jian-Ping Shen, XuanWang, Wen-Xiao Zhang and Jia-Jia Zhang IIH-MSP-2010-IS22-21 Multi-class Relationship Extraction from Biomedical Literature Using Maximum Entropy Lin Yao, Cheng-Jie Sun, Xiao-Long Wang and Xuan Wang IIH-MSP-2010-IS22-26 Mirror-like Gabor Features for Face Recognition Under Varying Illumination Conditions Ying-Nan Zhao, Yan Ma and Zhong Jin IIH-MSP-2010-IS23-01 Robust Video Transmission Algorithm Based on Network Coding Song Xiao, Ji Lu, Yangli Wang, and Chengke Wu IIH-MSP-2010-IS23-02 An Error Concealment Approach for Pixel Based Wyner-Ziv Video Coding Yangli Wang, Chengke Wu, and Song Xiao IIH-MSP-2010-IS23-03 Optimized State-Distortion Extraction for Scalable Extension of H.264/AVC Ji Lu, Song Xiao and Chengke Wu IIH-MSP-2010-IS23-04 A Pixel-level Rate Control Algorithm for the Optimal Prediction Residual Hongwei Li, Song Xiao and Chengke Wu and Yuli Feng IIH-MSP-2010-IS23-05 Distributed Compressed Hyperspectral Image Sensing Haiying Liu, Yunsong Li, Song Xiao and Chengke Wu IIH-MSP-2010-IS24-01 Content-Aware Video Seam Carving Based on Bag of Visual Cubes Duan-Yu Chen and Yi-Shiou Luo IIH-MSP-2010-IS24-02 Frequency-Tuned Nighttime Brake-Light Detection Duan-Yu Chen and Yu-Hao Lin IIH-MSP-2010-IS24-03 Title: Multiple Object Motion Detection for Robust Image Stabilization Using Block-Based Hough Transform Chi-Han Chuang , Yung-Chi-Lo, Chin-Chun Chang, and Shyi-Chyi Cheng IIH-MSP-2010-IS24-04 Adaptive Ultrasound Image Matching for Automatic Liver Disease Diagnosis Using Generalized Hough Transform Yu-Hsiang Wu, Yung-Chi Lo, Shyi-Chyi Cheng, and Chih-Lang Lin IIH-MSP-2010-IS24-05 Vision-Based Vehicle Surveillance and Parking Management Using Multiple Cameras Li-Chih Chen, Jun-Wei Hsieh, Wei-Ru Lai, Chih-Xuan Wu, and Shin-Yu Chen IIH-MSP-2010-IS24-06 Human Activity Linkage Recording for Multiple Cameras with Disjoint Views I-Cheng Chang, Chieh-Yu Liu, and Chung-Lin Huang IIH-MSP-2010-IS25-01 Title: Real-Time License-Plate Recognition for Moving Vehicles Chao-Ho Chen, Tsong-Yi Chen, Da-Jinn Wang, and Chi-Ming Huang IIH-MSP-2010-IS25-02 Real-Time Video Enhancement for Moving-Object in the Dusk Environment Based on Pixel Classification Tsong-Yi Chen, Chao-Ho Chen, Da-Jinn Wang, and Che-Ping Su IIH-MSP-2010-IS25-03 Real-Time Counting Method for a Crowd of Moving People Da-Jinn Wang, Chao-Ho Chen, Tsong-Yi Chen, and Tsang-Jie Chen IIH-MSP-2010-IS26-01 Broken Surface Matching by Integral Invariants and Spin-Images Long-Jiang Yu, Lei Sun, De-Long Zhang, and Sheng-He Sun IIH-MSP-2010-IS26-02 Comparative Analysis between TEDS and xTEDS Zhen Sun, Long-Jiang Yu, Jun-Bao Li, and Sheng-He Sun IIH-MSP-2010-IS27-01 A Saliency Map Model Based on Principle of Maximum Information Gain Takashi Toriu, Shigeyoshi Nakajima, and Hiromitsu Hama IIH-MSP-2010-IS27-02 Estimation of Human Movements from Body Acceleration Monitoring Using Nearest Neighbor method -- Ubiquitous Health Care -- Takaaki Kozaki, Shigeyoshi Nakajima, Tetsuo Tsujioka, Shinsuke Hara, Tadayuki Inoue, Hiroto Sugano, Hajime Nakamura, and Kazuhide Takeuchi IIH-MSP-2010-IS27-03 A Stochastic Model for Popularity Measures in Web Dynamics Hiromitsu Hama, Pyke Tin, Thi Thi Zin and Takashi Toriu IIH-MSP-2010-IS27-04 A Markov Random Walk Model for Loitering People Detection Thi Thi Zin, Pyke Tin, Takashi Toriu and Hiromitsu Hama IIH-MSP-2010-IS27-05 Real-time Updatable Volumetric Display System Based on Inclined Image Scanning Daisuke Miyazaki, Keisuke Ohno and Takaaki Mukai IIH-MSP-2010-IS29-01 A Decision Support System in Geriatric Care Nai-Wen Kuo IIH-MSP-2010-IS29-02 Attack Analysis for Automatic Monitoring System used in the Wireless Networks Chung-Hsin Liu and I Shao IIH-MSP-2010-IS29-03 The Study of Video Conference Transmission Security as an Example on Polycom Chung-Hsin Liu and Wu-Fan Hsu IIH-MSP-2010-IS29-04 Mobile Ad Hoc Network Applications in the Library Kuo-Kai Hsu and Dwen-Ren Tsai IIH-MSP-2010-IS29-05 Early Warning System for DDoS Attacking Based on Multilayer Deployment of Time Delay Neural Network Chang-Lung Tsai, Allen Y. Chang, and Huang Ming-Szu IIH-MSP-2010-IS29-06 Factors Affecting Consumers' Motivation in Online Group Buyers Pin-Hsiu Wu and Wuu-Yee Chen IIH-MSP-2010-IS29-07 Visual Development Platform for White-Box Algorithmic Trading Allen Y. Chang and Chia-Han Chou IIH-MSP-2010-IS29-08 Building Enterprise Data Centers Using Virtual and Cloud Sam-Wei Lin and Dwen-Ren Tsai IIH-MSP-2010-IS30-01 Congestion Control in Wireless Sensor Networks Jing Zhao, Lei Wang, Suran Li, Xiaokang Liu, and Zhuxiu Yuan IIH-MSP-2010-IS30-02 2.5D SIFT Descriptor for Facial Feature Extraction He Guo, Kai Zhang, and Qi Jia IIH-MSP-2010-IS30-03 A low-level Security Solving Method in Grid Weifeng Sun, Boxiang Dong, Zhenquan Qin, Lingyun Zhang, and Mingchu Li IIH-MSP-2010-IS30-04 An Efficient Trust Mechanism in P2P Network Zhenquan Qin, Lei Wang, Mingchu Li, and Weifeng Sun