Multiple-model Based Intelligent Control Techniques for LTI Systems with Unknown External Delays Part II: Unknown Rational Component | 1251-1266 | |
Asier Ibeas, Ramon Vilanova, Pedro Balaguer and Manuel de la Sen | Abstract | |
A New Adaptive Iterative Learning Control Motivated by Discrete-time Adaptive Control | 1267-1274 | |
Ronghu Chi, Zhongsheng Hou, Shulin Sui, Lei Yu and Wenlong Yao | Abstract | |
Guaranteed Cost and Positive Real Control of Uncertain Systems via Static Output Feedback | 1275-1281 | |
Yuanqing Xia, Jie Chen, Peng Shi, Guoping Liu and David Rees | Abstract | |
Contractive Predictive Control of Mixed Logical Dynamical Hybrid Systems | 1283-1297 | |
Jalal Habibi, Behzad Moshiri and Ali Khaki Sedigh | Abstract | |
Design and Control System over WWW for Regional CWDM Optical IP Networks with Reconfigurable Optical Add/Drop Multiplexers | 1299-1313 | |
Michio Hashimoto, Akira Ueno, Masahiro Taniue, Satoshi Kawase, Osanori Koyama and Yutaka Katsuyama | Abstract | |
Multi-relationship Based Relevance Feedback Scheme in Web Image Retrieval | 1315-1324 | |
Hai Jin, Ruhan He and Wenbing Tao | Abstract | |
Novel Approach for Web Filtering Based on User Interest Focusing Degree | 1325-1334 | |
A-ning Du and Binxing Fang | Abstract | |
An Efficient Generalized Group-oriented Signature Scheme | 1335-1345 | |
Chih-Ying Chen, Hsiu-Feng Lin and Chin-Chen Chang | Abstract | |
A Multi-policy Threshold Signature Scheme with Traceable Participant Cosigners | 1347-1356 | |
Chia-Ho Chu, Hsiu-Feng Lin, Chin-Chen Chang and Chih-Ying Chen | Abstract | |
A Novel Authentication Protocol for Multi-server Architecture without Smart Cards | 1357-1364 | |
Jung-San Lee, Ya-Fen Chang and Chin-Chen Chang | Abstract | |
Low-computation Oblivious Transfer Scheme for Private Information Retrieval | 1365-1370 | |
Hui-Feng Huang and Chin-Chen Chang | Abstract | |
Automatic Super-function Extraction for Translation of Spoken Dialogue | 1371-1381 | |
Manabu Sasayama, Fuji Ren and Shingo Kuroiwa | Abstract | |
A Hierarchical Search and Updating Database Strategy for Lazy Learning | 1383-1392 | |
Tianhong Pan and Shaoyuan Li | Abstract | |
A Generalized LMI-based Approach to the Global Asymptotic Stability of Discrete-time Delayed Recurrent Neural Networks | 1393-1399 | |
Qiang Zhang, Xiaopeng Wei and Jin Xu | Abstract | |
Optimization Algorithm for Computing Exact Minkowski Sum of 3D Convex Polyhedra | 1401-1410 | |
Xijuan Guo, Yanli Gao, Yong Liu and Lei Xie | Abstract | |
Double Rule Learning in Boosting | 1411-1420 | |
Hong Gao, Degen Huang, Wei Liu and Yuansheng Yang | Abstract | |
An Accurate Algorithm for the Valuation of the Capped and Path-dependent Structured Products: The Case of Principal-protected Notes | 1421-1432 | |
Fen-Ying Chen | Abstract | |
Face Image Retrieval Based on Concentric Circular Fourier-Zernike Descriptors | 1433-1443 | |
Yonghua Xie, Lokesh Setia and Hans Burkhardt | Abstract | |
Fuzzy Distance of Trapezoidal Fuzzy Numbers and Application | 1445-1454 | |
Shanhuo Chen and Chienchung Wang | Abstract | |
Fuzzy Genetic Algorithm Based on Principal Indices Operation and Quasi-linear Fuzzy Number and Its Performance | 1455-1464 | |
Fachao Li, Limin Liu and Yan Shi | Abstract | |
On Using Noising Method for Clustering Analysis | 1465-1476 | |
Yongguo Liu, Xiaorong Pu, Zhang Yi, Xiaofeng Liao and Kefei Chen | Abstract | |
Three Positive Solutions for High-order m-point Boundary Value Problems with all Derivatives | 1477-1488 | |
Weihua Jiang, Jiqing Qiu and Yanping Guo | Abstract | |
A Multimedia Conversation System with Application in Supervised Learning Methods and Ranking Function | 1489-1498 | |
Zhi Teng, Ye Liu and Fuji Ren | Abstract | |
2D Pattern vs. Surrounding 3D Pattern for Fisheye Camera Calibration | 1499-1506 | |
Haijiang Zhu, Taiki Takeshita and Shigang Li | Abstract | |
Techniques for Handling Missing Data: Applications to Online Condition Monitoring | 1507-1526 | |
Fulufhelo Vincent Nelwamondo and Tshilidzi Marwala | Abstract |