| On Solving the DEA CCR Ratio Model |
| 2765-2773 |
| Chia-Hui Huang and Han-Ying Kao |
| Abstract |
|
|
|
| Mining Temporal Rare Utility Itemsets in Large Databases Using Relative Utility Thresholds |
| 2775-2792 |
| Chun-Jung Chu, Vincent S. Tseng and Tyne Liang |
| Abstract |
|
|
|
| A Predictive Control Based Approach to Networked Wiener Systems |
| 2793-2802 |
| Yun-Bo Zhao, Guo-Ping Liu and David Rees |
| Abstract |
|
|
|
| A New Efficient and Complete Remote User Authentication Protocol with Smart Cards |
| 2803-2808 |
| Hui-Feng Huang and Wei-Chen Wei |
| Abstract |
|
|
|
| Evaluation of Performance of a Novel Voltage Compensation Strategy for an AC Contactor During Voltage Sags |
| 2809-2822 |
| Chieh-Tsung Chi |
| Abstract |
|
|
|
| A Model-free Adaptive Control Approach for Freeway Traffic Density vai Ramp Metering |
| 2823-2832 |
| Ronghu Chi and Zhongsheng Hou |
| Abstract |
|
|
|
| Dissipativity Results for Linear Singular Time-delay Systems |
| 2833-2845 |
| Magdi S. Mahmoud, Fouad M. AL-Sunni and Yan Shi |
| Abstract |
|
|
|
| CT Image Analysis for Early Detection of Lung Cancer |
| 2847-2860 |
| Rachid Sammouda, Jamalabu Hassan and Mohammed Sammouda |
| Abstract |
|
|
|
| Robust Face Tracking Based on Region Correspondence and Its Application for Person Based Indexing System |
| 2861-2873 |
| Hanjin Ryu, Myunghoon Kim, Vietcuong Dinh, Seongsoo Chun and Sanghoon Sull |
| Abstract |
|
|
|
| An Efficient FUFP-tree Maintenance Algorithm for Record Modification |
| 2875-2887 |
| Tzung-Pei Hong, Chun-Wei Lin and Yu-Lung Wu |
| Abstract |
|
|
|
| Alternative Optimal Filter for Linear Systems with Multiple State and Observation Delays |
| 2889-2898 |
| Michael Basin and Dario Calderon-Alvarez |
| Abstract |
|
|
|
| An Effective Solution for Automating the Layout of Transactional Pages |
| 2899-2910 |
| Xinyong Zhang and Xiangshi Ren |
| Abstract |
|
|
|
| Nonnegative Tensor Factorization for Brain CT Image Retrieval |
| 2911-2917 |
| Weixiang Liu, Kehong Yuan, Jiying Zou, Shoujun Zhou, Wufan Chen, Shaowei Jia and Ping Xiao |
| Abstract |
|
|
|
| Self-repairing Control Against Sensor Failures |
| 2919-2926 |
| Masanori Takahashi |
| Abstract |
|
|
|
| A New Stochastic Dynamic Adaptive Local Search Algorithm for Elman Neural Network |
| 2927-2939 |
| Zhiqiang Zhang, Gang Yang, Junyan Yi, YunYi Zhu and Zheng Tang |
| Abstract |
|
|
|
| A Single Parameter Dynamic Searching Algorithm for Multi-layer Neural Networks (Part II) |
| 2941-2954 |
| Xuefeng Wang, Xin Zhao and Yingjun Feng |
| Abstract |
|
|
|
| Disruption Coordination of Closed-loop Supply Chain Network (I) - Models and Theorems - |
| 2955-2964 |
| Lindu Zhao, Linbo Qu and Ming Liu |
| Abstract |
|
|
|
| Neural Feedback Schedduling of Real-time Control Tasks |
| 2965-2975 |
| Feng Xia, Yu-Chu Tian, Youxian Sun and Jinxiang Dong |
| Abstract |
|
|
|
| Cross-layer Design for Flow Control in Cooperative Multi-hop Wireless Networks |
| 2977-2986 |
| Liang Zhou, Baoyu Zheng, Jingwu Cui, Shan Xu, Benoit Geller and Anne Wei |
| Abstract |
|
|
|
| Time-bound Based Authentication Scheme for Multi-server Architecture |
| 2987-2996 |
| Chin-Chen Chang, Jung-San Lee and Jui-Yi Kuo |
| Abstract |
|
|
|
| Convergence of Discrete-time Cellular Neural Networks with Time-varying Delays |
| 2997-3004 |
| Qiang Zhang, Xiaopeng Wei and Jin Xu |
| Abstract |
|
|
|
| Multiple Watermarking Based on Visual Secret Sharing |
| 3005-3026 |
| Tzung-Her Chen, Tsung-Hao Hung, Gwoboa Horng and Chia-Ming Chang |
| Abstract |
|
|
|
| DCT-based Zero Replacement Reversible Image Watermarking Approach |
| 3027-3036 |
| Chien-Chang Chen and De-Sheng Kao |
| Abstract |
|
|
|
| A Group-oriented Proxy CMAE Scheme with Computational Secrecy |
| 3037-3045 |
| Tzong-Sun Wu and Han-Yu Lin |
| Abstract |
|
|
|
| Electronic Signatures for Long-term Storage Purpose in Electronic Anamnesis |
| 3047-3058 |
| Yuan Lung Yu, Yu Fang Chung and Tzer Shyong Chen |
| Abstract |
|
|
|
| A Robust Object Segmentation Method |
| 3059-3065 |
| Lifang Wu and Xianglong Meng |
| Abstract |
|
|
|
| An Alternate Approach to the Analysis of a T-S Fuzzy Model |
| 3067-3077 |
| Hung-Yuan Chung and Sheng-Chung Chan |
| Abstract |
|
|
|
| Enrichment of Inner Information Representations in Bi-directional Computing Architecture for Time Series Prediction |
| 3079-3090 |
| Hiroshi Wakuya |
| Abstract |