Accepted Papers in Invited Sessions of IIH-MSP-2010

 

IIH-MSP-2010-IS01-01

Possible Disease-link Genetic Pathways Constructed by Hierarchical Clustering and Conditional Probabilities for Ovarian Carcinoma Microarray Data

Hsiao-Han Ko, Kuo-Jin Tseng, Li-Min Wei, Meng-Hsiun Tsai

 

IIH-MSP-2010-IS01-02

An Efficient Source Authentication for Multicast based on Merkle Hash Tree

Iuon-Chang Lin and Chia-Chang Sung

 

IIH-MSP-2010-IS01-03

An Improved Digital Signature Scheme with Fault Tolerance in RSA

Iuon-Chang Lin and Hsing-Lei Wang

 

IIH-MSP-2010-IS01-04

Chaos-based Image Integrity Authentication Code

Tzung-Her Chen, Wei-Lun Huang and Chih-Yang Lin

 

IIH-MSP-2010-IS01-05

The Information Hiding Technology Based on the Similar Sample Blocks

Tzu-Chuen Lu and Siang-Ru Liao

 

IIH-MSP-2010-IS01-06

A Robust Public Watermarking Scheme Based on DWT

Chin-Chen Chang, Kuo-Nan Chen and Ming-Huang Hsieh

 

IIH-MSP-2010-IS01-07

Enhancement of Two-Factor User Authentication in Wireless Sensor Networks

Hui-Feng Huang and Ya-Fen Chang

 

IIH-MSP-2010-IS01-08

A Data Hiding Scheme on Word Documents Using Multiple-base Notation System

Iuon-Chang Lin and Ping-Kun Hsu

 

IIH-MSP-2010-IS01-09

A Reversible Data Hiding Scheme for Digital Images Using LAU-Side Match Prediction

Chin-Feng Lee and Huei-Ju Tsai

 

IIH-MSP-2010-IS02-01

Coefficient Adjustment Method for Reversible Watermarking

Ching-Yu Yang, Chih-Hung Lin, and Wu-Chih Hu

 

IIH-MSP-2010-IS02-02

A (2, 3) Threshold Secret Sharing Scheme Using Sudoku

Yung-Chen Chou, Chih-Hung Lin, Po-Chin Li, and Yu-Chiang Li

 

IIH-MSP-2010-IS02-03

Reversible Authentication and Cross-recovery of Images Using (t, n) Threshold and Modified-RCM Watermarking

Yeh-Shun Chen and Ran-Zan Wang

 

IIH-MSP-2010-IS02-04

Steganalysis Scheme Using the Difference Image of Calibrated Sub-sampling

Jeong-Chun Joo, Tae-Woo Oh, Jeong-Ho Choi, and Heung-Kyu Lee

 

IIH-MSP-2010-IS02-05

Improved Watermark Estimation Scheme Based on Neighborhood Filter

Tae-Woo Oh, Seung-Jin Ryu, Ji-Won Lee, and Heung-Kyu Lee

 

IIH-MSP-2010-IS02-06

Multi-layer Secret Image Sharing

Wen-Pinn Fang

 

IIH-MSP-2010-IS02-07

Graylevel Images Encrypting Based on the n-graylevel Encoding Method and the Lowest Common Multiple Technique

Kuang Tsan Lin

 

IIH-MSP-2010-IS02-08

Data Hiding Based on Side Match Vector Quantization and Modulus Function

Lee Shu-Teng Chen, Suiang-Shyan Lee, Wen-Tarn Chang, and Ja-Chen Lin

 

IIH-MSP-2010-IS02-09

High-payload Image Hidingmethod Using k-way Block Matching

Shang-Kuan Chen and Ran-Zan Wang

 

IIH-MSP-2010-IS02-10

High Embedding Reversible Data Hiding Scheme for JPEG

Wen-Chung Kuo, Shao-Hung Kuo, and Lih-Chyau Wuu

 

IIH-MSP-2010-IS03-01

Design of 3-D FIR Cone-Shaped Filters by a Nest of McClellan Transformations

Jong-Jy Shyu, Soo-Chang Pei, and Yun-Da Huang

 

IIH-MSP-2010-IS03-02

Reversible Data Hiding with Improved Histogram Alteration Method

Hsiang-Cheh Huang, Yueh-Hong Chen, and I-Hung Wang

 

IIH-MSP-2010-IS03-03

A RFID-Based Hybrid Building Fire Evacuation System on Mobile Phone

Liou Chu

 

IIH-MSP-2010-IS03-04

A New Integrated Mobile Architecture for Heterogeneous Wireless Networks

Shih-Jung Wu

 

IIH-MSP-2010-IS03-05

Preliminary Survey of Multiview Synthesis Technology

Ellen Sharma Shijagurumayum and Feng-Cheng Chang

 

IIH-MSP-2010-IS03-06

Systematic Review of Applying Service Oriented Architecture in Networking

Duen-Kai Chen

 

IIH-MSP-2010-IS03-07

Adjacent Quad Modification Algorithm for Reversible Data Hiding

Hsiang-Cheh Huang, Ting-Wei Chen, and Feng-Cheng Chang

 

IIH-MSP-2010-IS03-08

Electrical Network Frequency as a Tool for Audio Concealment Process

Feng-Cheng Chang and Hsiang-Cheh Huang

 

IIH-MSP-2010-IS04-01

A Framework for Face Recognition Using Laplacian Eigenmaps and Nearest Feature Mixtures

Chen-Ta Hsieh, Chang-Hsing Lee, Chin-Chuan Han and Ching-Chien Chuang

 

IIH-MSP-2010-IS04-02

Facial Feature Alignment by Manifold Learning of Active Appearance Models

Yuan-Kai Wang, Wei-Ren Chen

 

IIH-MSP-2010-IS04-03

Improvement of Face Recognition by Eyeglass Removal

Jang-Jia Hau, Luo-Wei Tasi, Yuan-Kai Wang, Kuo-Chin Fan

 

IIH-MSP-2010-IS04-04

Fast Forgery Detection with the Intrinsic Resampling Properties

Cheng-Chang Lien, Cheng-Lun Shih, and Chih-Hsun Chou

 

IIH-MSP-2010-IS04-05

Moving Object Detection for Night Vision

Yuan-Kai Wang, Chin-Tang Fan

 

IIH-MSP-2010-IS04-06

Implementation of a Smart Traffic Prediction and Flow Control Mechanism for Video Streaming

Yue-Ru Chuang, Chia-Sheng Hsu, and Je-Wei Chen

 

IIH-MSP-2010-IS05-01

An Alternative-path Approach to Support Reliable TCP Connections in Wireless Mesh Networks

Mong-Fong Horng, Yi, Ting Chien, and Jeng-Pong Hsu

 

IIH-MSP-2010-IS05-02

A Fast and Efficient FEC Enhancement Scheme for Delay-sensitive Video Transmissions

Chun-I Kuo, Chi-Huang Shih, Ce-Kuen Shieh, and Wen-Shyang Hwang

 

IIH-MSP-2010-IS05-03

Adaptive Forward Error Correction Combined with Packet Size Control for Wireless Video

Chi-Huang Shih

 

IIH-MSP-2010-IS05-04

Performance Evaluation of Vehicle License Plate Recognition System Using Wavelet Transform and Neural Network

Mu-Liang Wang and Yi Hwang Liu

 

IIH-MSP-2010-IS05-05

Improving the Multimedia Processing of Relay Nodes in Mesh Wireless Networks

Chun-Ting Huang

 

IIH-MSP-2010-IS05-06

Available Bandwidth Detection of Asymmetric Link Between Residential Users and ISPs for Multimedia Services

Chun-Chin Lo, Shih-Po Tang, Mong-Fong Horng, Yu-Cheng Sheu, Jeng-Pong Hsu, and Yau-Hwang Kuo

 

IIH-MSP-2010-IS06-01

Low-Cost and Shared Architecture Design of Recursive DFT/IDFT/IMDCT Algorithms for Digital Radio Mondiale System

Shin-Chi Lai, Sheau-Fang Lei, and Ching-Hsing Luo

 

IIH-MSP-2010-IS06-02

Lossless Coding of Multiband Images Using Interband Data Correlation and Error Feedback Prediction Scheme

Cheng-Chen Lin, Yin-Tsung Hwang, Yi-Chen Chang, Jiun-Jiang Chen, and Ming-Wei Liu

 

IIH-MSP-2010-IS06-03

Area-Efficient H.264 VLC Decoder Using Sub-tree Classification

Chia-Cheng Lo, Chia-Wei Hsu, and Ming-Der Shieh

 

IIH-MSP-2010-IS06-04

The Use of k-Means Algorithm to Compute the Line Spectrum Pair Frequencies with Tschirnhaus Transform

Shi-Huang Chen and Ming-Lung Hsu

 

IIH-MSP-2010-IS06-05

Efficient Multi-Layer Background Model on Complex Environment for Foreground Object Detection

Wen-Kai Tsai, Ming-Hwa Sheu, and Chung-Chi Lin

 

IIH-MSP-2010-IS06-06

A Pipelined Program Decompression Engine Generator Based on Partial Field-partitioned (PFP) Compression Technique for Embedded Systems

Yuan-Long Jeang and Ko-Yen Hu

 

IIH-MSP-2010-IS09-01

Unobtrusive User-Authentication on Mobile Phones using Biometric Gait Recognition

Mohammad O. Derawi, Claudia Nickel, Patrick Bours, and Christoph Busch

 

IIH-MSP-2010-IS09-02

Improved Cycle Detection for Accelerometer Based Gait Authentication

Mohammad O. Derawi, Patrick Bours, and Kjetil Holien

 

IIH-MSP-2010-IS09-03

Capturing Hand or Wrist Vein Images for Biometrics Using Low-cost Devices

J. Enrique Suarez Pascual, Jaime Uriarte-Antonio, Raul Sanchez-Reillo, and Michael G. Lorenz

 

IIH-MSP-2010-IS09-04

Teeth Segmentation and Feature Extraction for Odontological Biometrics

Danish Mairaj, Stephen D. Wolthusen, and Christoph Busch

 

IIH-MSP-2010-IS09-05

3D Face Recognition with Local Binary Patterns

Xuebing Zhou, Silvia Araujo S’ anchez, and Arjan Kuijper

 

IIH-MSP-2010-IS09-06

Usability Evaluation of Fingerprint Based Access Control Systems

Belen Fernandez-Saavedra, Raul Alonso-Moreno, Aitor Mendaza-Ormaza, and Raul Sanchez-Reillo

 

IIH-MSP-2010-IS12-01

Blackbox Security of Biometrics

Julien Bringer, Herve Chabanne, and Koen Simoens

 

IIH-MSP-2010-IS12-02

Spectral Minutiae Representations for Fingerprint Recognition

Haiyun Xu and R. N.J. Veldhuis

 

IIH-MSP-2010-IS12-03

A Survey of the Security and Privacy Measures for Anonymous Biometric Authentication Systems

Ileana Buhan, Emile Kelkboom, and Koen Simoens

 

IIH-MSP-2010-IS12-04

Privacy Preserving Identification: Order Statistics List Decoding Perspective

Farzad Farhadzadeh, Sviatoslav Voloshynovskiy, and Oleksiy Koval

 

IIH-MSP-2010-IS12-05

Fusion in Fingerprint Authentication: Two Finger Scenarios

Davrondzhon Gafurov, Christoph Busch, Patrick Bours, and Bian Yang

 

IIH-MSP-2010-IS13-01

The Application of the Technique of 2D fragments Stitching Based on Outline Feature in Rejoining Oracle Bones

Yongge Liu

 

IIH-MSP-2010-IS13-02

A Study on Theory and Practice for Multimedia Intelligence Course and Intelligence Classroom

Qingsheng Li

 

IIH-MSP-2010-IS13-03

Design and Implementation for Personalize Web Page Editor Based on Visual Documents and Database Technique

Qingsheng Li

 

IIH-MSP-2010-IS13-04

A New Credit Scoring System

Xiao Yi

 

IIH-MSP-2010-IS13-05

Revisit LSB Matching

Xiao Yi Yu

 

IIH-MSP-2010-IS14-01

An Image Level Set Method for Denoising

Dazhi Zhang, Boying Wu, and Jiebao Sun

 

IIH-MSP-2010-IS14-02

A Perceptual Metric Based on Salient Information Entropy for 3D Mesh Distortion

Zhenfeng Shi, Xiamu Niu

 

IIH-MSP-2010-IS14-03

Encryption Scheme Based on Invertible Watermarking

Jinwei Wang

 

IIH-MSP-2010-IS14-04

A Novel Self-Adaptive Image Steganography Algorithm Based on Cover-Coding and Markov Chain Model

Zhan Zhang, Guangjie Liu, Yuewei Dai, Zhiquan Wang

 

IIH-MSP-2010-IS15-01

An Object-Based Web System for Building a Virtual Community

S. R. Tsai, J. Y. Fang, Y. T. Chen, U.S. Huang, B. L. Chen, C. M. Lee, U. L. Dai, G. H. Huang, and J. N. Lee

 

IIH-MSP-2010-IS15-02

A Snapshot-Based Evaluation Method for Garbage Collection

Chin-Yang Lin, Ting-Wei Hou, and Fuh-Gwo Chen

 

IIH-MSP-2010-IS15-03

Enhanced UPnP Quality of Service by Intelligent Access Points

Chia-Feng Kang, Kai-Hua Kuo, Ya-Chun Li, Wei-Tsong Lee, and Jim-Min Lin

 

IIH-MSP-2010-IS15-04

Color-based Semantic Image Retrieval with Fuzzy-ART

Chuan-Yu Chang, Hung-Jen Wang, and Ru-Hao Jian

 

IIH-MSP-2010-IS16-02

An Image Structure Information based Robust Hash for Tamper Detection and Localization

Zhaoqing Liu, Qiong Li, Hui Zhang, and Xiyuan Peng

 

IIH-MSP-2010-IS16-03

Tamper Detection for Shifted Double JPEG Compression

Xian-zhe Meng, Shao-zhang Niu, and Jian-cheng Zou

 

IIH-MSP-2010-IS16-04

A Novel Robust Watermarking Method for Certificates Based on DFT and Hough Transforms

Jiancheng Zou, Xin Yang, and Shaozhang Niu

 

IIH-MSP-2010-IS16-05

Spread Spectrum-based Image Watermarking Resistant to Rotation and Scaling Using Radon Transform

Huawei Tian, Yao Zhao, Rongrong Ni, and Jeng-Shyang Pan

 

IIH-MSP-2010-IS16-06

A High Payload Histogram-based Reversible Watermarking Using Linear Prediction

Bo Ou, Yao Zhao, Rongrong Ni, and Gang Cao

 

IIH-MSP-2010-IS16-07

An Error Driven 3D Face Modeling Scheme based on Partial Differential Equations

Chuanjun Wang, Zhenfeng Shi, and Xiamu Niu

 

IIH-MSP-2010-IS16-08

Image Retrieval Based on RST Invariant Features Extracted from Scale Invariant Keypoints

Zhe-Ming Lu and Wei-Min Zheng

 

IIH-MSP-2010-IS17-01

ASM-SPV: A Model Checker for Security Protocols

Jianhua Peng, Feng Liu,Zhenju Zhao, Danqing Huang, and Rui Xue

 

IIH-MSP-2010-IS17-02

Camera Model Identification for JPEG Images via Tensor Analysis

Ming Liu, Nenghai Yu, and Weihai Li

 

IIH-MSP-2010-IS17-03

A Novel Time Synchronization Algorithm Synchronizer-Based for Wireless Sensor Network Of Clustering Architecture

Jun-feng Tian,Huai-xiang Wen

 

IIH-MSP-2010-IS17-04

Secure and Efficient Generalized Signcryption Scheme Based on a Short ECDSA

Chuanrong Zhang and Yuqing Zhang

 

IIH-MSP-2010-IS17-05

Regular Quasi-Cyclic LDPC Codes With Girth 6 From Prime Fields

Qingji Zheng, Xiangxue Li, Dong Zheng, and Baoao Guo

 

IIH-MSP-2010-IS17-06

A Study of Mutual Authentication for P2P Trust Management

Chunling Wang and Jingyu Feng

 

IIH-MSP-2010-IS17-07

Enhanced Adaptive FEC based Multiple Description Coding for Internet Video Streaming over Wireless Network

Li Li and Xiamu Niu

 

IIH-MSP-2010-IS17-08

An Novel and Secure Image Interpolation Methods for Image Disguise

Shen Wang , Bian Yang, and Xiamu Niu

 

IIH-MSP-2010-IS17-09

Formal Verification of HMQV Using ASM-SPV

Danqing Huang,Rui Xue, Feng Liu, Jianhua Peng, Zhenju Zhao, and Dongyao Ji

 

IIH-MSP-2010-IS17-10

Certificates Distributed Storage Scheme in the Trust Management System

Ying Cai and Qinglong Wang

 

IIH-MSP-2010-IS19-01

Reduction of Interference for CDMA-Based Fingerprinting Scheme Based on Random Permutation

Minoru Kuribayashi

 

IIH-MSP-2010-IS19-02

On Some Properties of a Digital Watermarking Based on Complete Complementary Codes

Tetsuya Kojima, Yoshiya Horii, Naoki Ohtani, and Thierno Sene

 

IIH-MSP-2010-IS19-03

Detecting Revelation of Private Information from Online Social Network

Natsuki Watanabe and Hiroshi Yoshiura

 

IIH-MSP-2010-IS19-04

Unified Metric for Measuring Anonymity and Privacy with Application to Online Social Network

Komei Kamiyama, Tran Hong Ngoc, Isao Echizen, and Hiroshi Yoshiura

 

IIH-MSP-2010-IS19-05

Privacy by Data Provenance with Digital Watermarking

Sven Wohlgemuth, Jeremie Thauraud, Isao Echizen, Noboru Sonehara, and Gunter Muller

 

IIH-MSP-2010-IS20-01

Aerial Acoustic Modem that is Suitable to Decode Using a CELP-based Speech Encoder

Akira Nishimura

 

IIH-MSP-2010-IS20-02

Improvement of Packet Loss Concealment for MP3 Audio Based on Switching of Concealment Method and Estimation of MDCT Signs

Akinori Ito, Kiyoshi Konno, Masashi Ito and Shozo Makino

 

IIH-MSP-2010-IS20-03

Audio Information Hiding Based on Spatial Masking

Ryouichi Nishimura

 

IIH-MSP-2010-IS20-04

A Design of the IIR All-pass Filter Based on Cochlear Delay for Improving Embedding Limitations

Masashi Unoki, Tosizou Kosugi, Atsushi Haniu, and Ryota Miyauchi

 

IIH-MSP-2010-IS20-05

An Audio Steganography by a Low-bit Coding Method with Wave Files

Masahiro Wakiyama, Yasunobu Hidaka, and Koichi Nozaki

 

IIH-MSP-2010-IS20-06

A Semi-Lossless Steganography Technique for G.711 Telephony Speech

Naofumi Aoki

 

IIH-MSP-2010-IS20-07

A New Approach of Reversible Acoustic Steganography for Tampering Detection

Xuping Huang, Isao Echizen, and Akira Nishimura

 

IIH-MSP-2010-IS22-07

Vision-Based Hand Gesture Recognition Using Combinational Features

Cheng-Long Yu, Xuan Wang, He-Jiao Huang, Jian-Ping Chen and Kun Wu

 

IIH-MSP-2010-IS22-10

Example-based Facial Portraiture Style Learning

Zhong-Mei Zhou, Xuan Wang, Zi-Li Zhang and Chenglong Yu

 

IIH-MSP-2010-IS22-13

Parallel Protocol Analysis in Gigabit High-speed Environment

Xiao-Dong Gao, Xuan Wang, Shu-Han Qi and Yang Wang

 

IIH-MSP-2010-IS22-16

Machining Learning Based Sentiment Analysis for Finance News Mining

Jian-Ping Shen, XuanWang, Wen-Xiao Zhang and Jia-Jia Zhang

 

IIH-MSP-2010-IS22-21

Multi-class Relationship Extraction from Biomedical Literature Using Maximum Entropy

Lin Yao, Cheng-Jie Sun, Xiao-Long Wang and Xuan Wang

 

IIH-MSP-2010-IS22-26

Mirror-like Gabor Features for Face Recognition Under Varying Illumination Conditions

Ying-Nan Zhao, Yan Ma and Zhong Jin

 

IIH-MSP-2010-IS23-01

Robust Video Transmission Algorithm Based on Network Coding

Song Xiao, Ji Lu, Yangli Wang, and Chengke Wu

 

IIH-MSP-2010-IS23-02

An Error Concealment Approach for Pixel Based Wyner-Ziv Video Coding

Yangli Wang, Chengke Wu, and Song Xiao

 

IIH-MSP-2010-IS23-03

Optimized State-Distortion Extraction for Scalable Extension of H.264/AVC

Ji Lu, Song Xiao and Chengke Wu

 

IIH-MSP-2010-IS23-04

A Pixel-level Rate Control Algorithm for the Optimal Prediction Residual

Hongwei Li, Song Xiao and Chengke Wu and Yuli Feng

 

IIH-MSP-2010-IS23-05

Distributed Compressed Hyperspectral Image Sensing

Haiying Liu, Yunsong Li, Song Xiao and Chengke Wu

 

IIH-MSP-2010-IS24-01

Content-Aware Video Seam Carving Based on Bag of Visual Cubes

Duan-Yu Chen and Yi-Shiou Luo

 

IIH-MSP-2010-IS24-02

Frequency-Tuned Nighttime Brake-Light Detection

Duan-Yu Chen and Yu-Hao Lin

 

IIH-MSP-2010-IS24-03

Title: Multiple Object Motion Detection for Robust Image Stabilization Using Block-Based Hough Transform

Chi-Han Chuang , Yung-Chi-Lo, Chin-Chun Chang, and Shyi-Chyi Cheng

 

IIH-MSP-2010-IS24-04

Adaptive Ultrasound Image Matching for Automatic Liver Disease Diagnosis Using Generalized Hough Transform

Yu-Hsiang Wu, Yung-Chi Lo, Shyi-Chyi Cheng, and Chih-Lang Lin

 

IIH-MSP-2010-IS24-05

Vision-Based Vehicle Surveillance and Parking Management Using Multiple Cameras

Li-Chih Chen, Jun-Wei Hsieh, Wei-Ru Lai, Chih-Xuan Wu, and Shin-Yu Chen

 

IIH-MSP-2010-IS24-06

Human Activity Linkage Recording for Multiple Cameras with Disjoint Views

I-Cheng Chang, Chieh-Yu Liu, and Chung-Lin Huang

 

IIH-MSP-2010-IS25-01

Title: Real-Time License-Plate Recognition for Moving Vehicles

Chao-Ho Chen, Tsong-Yi Chen, Da-Jinn Wang, and Chi-Ming Huang

 

IIH-MSP-2010-IS25-02

Real-Time Video Enhancement for Moving-Object in the Dusk Environment Based on Pixel Classification

Tsong-Yi Chen, Chao-Ho Chen, Da-Jinn Wang, and Che-Ping Su

 

IIH-MSP-2010-IS25-03

Real-Time Counting Method for a Crowd of Moving People

Da-Jinn Wang, Chao-Ho Chen, Tsong-Yi Chen, and Tsang-Jie Chen

 

IIH-MSP-2010-IS26-01

Broken Surface Matching by Integral Invariants and Spin-Images

Long-Jiang Yu, Lei Sun, De-Long Zhang, and Sheng-He Sun

 

IIH-MSP-2010-IS26-02

Comparative Analysis between TEDS and xTEDS

Zhen Sun, Long-Jiang Yu, Jun-Bao Li, and Sheng-He Sun

 

IIH-MSP-2010-IS27-01

A Saliency Map Model Based on Principle of Maximum Information Gain

Takashi Toriu, Shigeyoshi Nakajima, and Hiromitsu Hama

 

IIH-MSP-2010-IS27-02

Estimation of Human Movements from Body Acceleration Monitoring Using Nearest Neighbor method -- Ubiquitous Health Care --

Takaaki Kozaki, Shigeyoshi Nakajima, Tetsuo Tsujioka, Shinsuke Hara, Tadayuki Inoue, Hiroto Sugano, Hajime Nakamura, and Kazuhide Takeuchi

 

IIH-MSP-2010-IS27-03

A Stochastic Model for Popularity Measures in Web Dynamics

Hiromitsu Hama, Pyke Tin, Thi Thi Zin and Takashi Toriu

 

IIH-MSP-2010-IS27-04

A Markov Random Walk Model for Loitering People Detection

Thi Thi Zin, Pyke Tin, Takashi Toriu and Hiromitsu Hama

 

IIH-MSP-2010-IS27-05

Real-time Updatable Volumetric Display System Based on Inclined Image Scanning

Daisuke Miyazaki, Keisuke Ohno and Takaaki Mukai

 

IIH-MSP-2010-IS29-01

A Decision Support System in Geriatric Care

Nai-Wen Kuo

 

IIH-MSP-2010-IS29-02

Attack Analysis for Automatic Monitoring System used in the Wireless Networks

Chung-Hsin Liu and I Shao

 

IIH-MSP-2010-IS29-03

The Study of Video Conference Transmission Security as an Example on Polycom

Chung-Hsin Liu and Wu-Fan Hsu

 

IIH-MSP-2010-IS29-04

Mobile Ad Hoc Network Applications in the Library

Kuo-Kai Hsu and Dwen-Ren Tsai

 

IIH-MSP-2010-IS29-05

Early Warning System for DDoS Attacking Based on Multilayer Deployment of Time Delay Neural Network

Chang-Lung Tsai, Allen Y. Chang, and Huang Ming-Szu

 

IIH-MSP-2010-IS29-06

Factors Affecting Consumers' Motivation in Online Group Buyers

Pin-Hsiu Wu and Wuu-Yee Chen

 

IIH-MSP-2010-IS29-07

Visual Development Platform for White-Box Algorithmic Trading

Allen Y. Chang and Chia-Han Chou

 

IIH-MSP-2010-IS29-08

Building Enterprise Data Centers Using Virtual and Cloud

Sam-Wei Lin and Dwen-Ren Tsai

 

IIH-MSP-2010-IS30-01

Congestion Control in Wireless Sensor Networks

Jing Zhao, Lei Wang, Suran Li, Xiaokang Liu, and Zhuxiu Yuan

 

IIH-MSP-2010-IS30-02

2.5D SIFT Descriptor for Facial Feature Extraction

He Guo, Kai Zhang, and Qi Jia

 

IIH-MSP-2010-IS30-03

A low-level Security Solving Method in Grid

Weifeng Sun, Boxiang Dong, Zhenquan Qin, Lingyun Zhang, and Mingchu Li

 

IIH-MSP-2010-IS30-04

An Efficient Trust Mechanism in P2P Network

Zhenquan Qin, Lei Wang, Mingchu Li, and Weifeng Sun