Optimization of the Emergency Materials Distribution Network with Time Windows in Anti-bioterrorism System | 3615-3624 | |
Ming Liu and Lindu Zhao | Abstract | |
Enhanced Stochastic Learning for Feature Selection in Intrusion Classification | 3625-3635 | |
Gil-Jong Mun, Bong-Nam Noh and Yong-Min Kim | Abstract | |
Probabilistic Production Cost Credit Evaluation of Wind Turbine Generators | 3637-3646 | |
Jeongje Park, Wu Liang, Jaeseok Choi, A. A. El-Keib and Junzo Watada | Abstract | |
Real-time Risk Measurement for Business Activity Monitoring (BAM) | 3647-3657 | |
Bokyoung Kang, Nam Wook Cho and Suk-Ho Kang | Abstract | |
Impact of Time and Costs when Determining Batch Size in a Supply Chain | 3659-3666 | |
Ruedee Masuchun, Kitti Tirasesth, Teerawat Thepmanee, Wiboon Masuchun, Yan Shi and Hirofumi Sasaki | Abstract | |
Application of Co-evolutionary System for Strategy Developments of Teams in the Same Generation to Team Match-up Games | 3667-3676 | |
Jun-ichi Kushida, Iori Nakaoka, Katsuari Kamei and Yukinobu Hoshino | Abstract | |
A PDF-matched Short-term Linear Predictability Approach to Blind Source Separation | 3677-3690 | |
Mahdi Khosravy, Mohammad Reza Asharif and Katsumi Yamashita | Abstract | |
A Real-Time Intelligent System for Order Processing in B2C E-Commerce | 3691-3706 | |
Xiangpei Hu, Xuyin Wang, Lijun Sun and Zhichao Xu | Abstract | |
A Parallel Ant Colony Optimization Algorithm Based on Fine-grained Model with GPU-acceleration | 3707-3716 | |
Jianming Li, Xiangpei Hu, Zhanlong Pang and Kunming Qian | Abstract | |
An Efficient Spam Filtering Method by Analyzing E-mail's Header Session Only | 3717-3731 | |
Jyh-Jian Sheu and Ko-Tsung Chu | Abstract | |
Stability Analysis of Fuzzy Control Systems Using Polynomial Methods | 3733-3744 | |
Hung-Yuan Chung and Sheng-Chung Chan | Abstract | |
A Hierarchical and Chord-based Semantic Service Discovery System in the Universal Network | 3745-3753 | |
Ying Zhang, Houkuan Huang, Dong Yang and Hongke Zhang | Abstract | |
Multicriteria Tradeoffs in Inventory Control Using Memetic Particle Swarm Optimization | 3755-3768 | |
Chin-Hsiung Hsu, Ching-Shih Tsou and Fong-Jung Yu | Abstract | |
Output Synchronization and Stability Analysis of Complex Dynamical Networks | 3769-3777 | |
Lifu Wang, Yuanwei Jing and Zhi Kong | Abstract | |
Evaluating Brand Equity for Container-based Ocean Carriers in Taiwan: An Empirical Study | 3779-3796 | |
Ji-Feng Ding | Abstract | |
Tree-trust: A Novel and Scalable P2P Reputation Model Based on Human Cognitive Psychology | 3797-3807 | |
Xiaoyong Li and Xiaolin Gui | Abstract | |
A Study on Fuzzy Decision and Preferred Enterprise Strategy | 3809-3826 | |
Yu-Fang Chung, Yuan Lung Yu and Tsung-Chin Hsiao | Abstract | |
Fault-tolerant H-infinity Filter Design of a Class of Switched Systems with Sensor Failures 3827 | 3827-3838 | |
Shuhui Shi, Zhonghu Yuan and Qingling Zhang | Abstract | |
H-infinity Controller Design for a Class of SISO Nonlinear Stochastic Systems without Solving HJIs | 3839-3848 | |
Zhongwei Lin, Yan Lin and Weihai Zhang | Abstract | |
Excluding Background Initial Segmentation for Radiographic Image Segmentation | 3849-3860 | |
San-Ging Shu, Hsiu-Hsia Lin, Shiau-Wei Kuo and Shyr-Shen Yu | Abstract | |
An Efficient Fair Electronic Payment System Based upon Non-signature Authenticated Encryption Scheme | 3861-3873 | |
Jen-Ho Yang and Chin-Chen Chang | Abstract | |
An Iterative Based Novel Multi-nucleus Detection Scheme for Protozoan Parasite Microscopic Images | 3875-3886 | |
Ching-Hao Lai, Hsiao-Yu Wang, Yi-Chuan Tsai and Shyr-Shen Yu | Abstract | |
Fast Randomization Schemes for Chaum Blind Signatures | 3887-3900 | |
Chun-I Fan, Chih-I Wang and Wei-Zhe Sun | Abstract | |
A Secure mCoupon Scheme Using Near Field Communication | 3901-3909 | |
Han-Cheng Hsiang, Hsiang-Chou Kuo and Wei-Kuan Shih | Abstract | |
An Efficient and Provably Secure Id-based Signature Scheme with Batch Verifications | 3911-3922 | |
Yuh-Min Tseng, Tsu-Yang Wu and Jui-Di Wu | Abstract | |
A New Design of Cryptographic Key Management for HIPAA Privacy and Security Regulations | 3923-3931 | |
Hui-Feng Huang, Kuo-Ching Liu and Hsin-Wei Wang | Abstract | |
Growing Radial Basis Function Networks Using Genetic Algorithm and Orthogonalization | 3933-3948 | |
Cheol W. Lee and Yung C. Shin | Abstract | |
Robust Task-space Control of Robot Manipulators under Imperfect Transformation of Control Space | 3949-3960 | |
Mohammad Mehdi Fateh and Mohammad Reza Soltanpour | Abstract | |
An Effective Immune Algorithm for Multiple-valued Logic Minimization Problems | 3961-3969 | |
Shangce Gao, Zheng Tang and Catherine Vairappan | Abstract | |
Optimized Ordering Strategy for Food Supply Chain with Bidirectional Options | 3971-3982 | |
Lindu Zhao, Zhi Li and Ming Liu | Abstract | |
Fast Deblocking Filter Implementation Method for H.264/AVC | 3983-3993 | |
Tian Song, Yoshinori Hayashi and Takashi Shimamoto | Abstract | |
Parameter Self-tuning Based Industrial Batching and Weighting Control System | 3995-4005 | |
Bailin Hang and Lianming Sun | Abstract | |
Simulation Modeling Method of Batch Annealing Production Scheduling Problem Based on SystemC | 4007-4016 | |
Zhigang Wang, Quanli Liu and Wei Wang | Abstract | |
Evolution of Neural Controllers in Real Mobile Robots for Task Switching Behaviors | 4017-4024 | |
Genci Capi and Shin-ichiro Kaneko | Abstract | |
Midpoint Validation Method for Support Vector Machines with Margin Adjustment Technique | 4025-4032 | |
Hiroki Tamura and Koichi Tanno | Abstract |