2. CIS 2005:
Xi'an,
China
Yue Hao, Jiming Liu, Yuping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao (Eds.):
Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II.
Lecture Notes in Computer Science 3802 Springer 2005, ISBN 3-540-30819-9 BibTeX
Cryptography and Coding
- Sosun Kim, Nam Su Chang, Chang Han Kim, Young-Ho Park, Jongin Lim:
A Fast Inversion Algorithm and Low-Complexity Architecture over GF(2m).
1-8
Electronic Edition (link) BibTeX
- Chunxiang Gu, Yuefei Zhu, YaJuan Zhang:
An ID-Based Optimistic Fair Signature Exchange Protocol from Pairings.
9-16
Electronic Edition (link) BibTeX
- Toshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii:
FMS Attack-Resistant WEP Implementation Is Still Broken.
17-26
Electronic Edition (link) BibTeX
- Ping Dong, Xiangdong Shi, Jiehui Yang:
Design of a New Kind of Encryption Kernel Based on RSA Algorithm.
27-32
Electronic Edition (link) BibTeX
- Yoon Cheol Lee, Hiroshi Doi:
On the Security of Condorcet Electronic Voting Scheme.
33-42
Electronic Edition (link) BibTeX
- Qian Yin, Yunlun Luo, Ping Guo:
Special Distribution of the Shortest Linear Recurring Sequences in Z /(p) Field.
43-48
Electronic Edition (link) BibTeX
- Jingmei Liu, Xiangguo Cheng, Xinmei Wang:
Cryptanalysis of a Cellular Automata Cryptosystem.
49-54
Electronic Edition (link) BibTeX
- Geoff Skinner, Song Han, Elizabeth Chang:
A New Conceptual Framework Within Information Privacy: Meta Privacy.
55-61
Electronic Edition (link) BibTeX
- Fengtong Wen, Wenling Wu, Qiaoyan Wen:
Error Oracle Attacks on Several Modes of Operation.
62-67
Electronic Edition (link) BibTeX
- Lihua Dong, Yong Zeng, Yupu Hu:
Stability of the Linear Complexity of the Generalized Self-shrinking Sequences.
68-73
Electronic Edition (link) BibTeX
- Yajing Li, Weihong Chen:
On the Construction of Some Optimal Polynomial Codes.
74-79
Electronic Edition (link) BibTeX
- Xuebing Zhou, Martin Schmucker, Christopher L. Brown:
Perceptual Hashing of Video Content Based on Differential Block Similarity.
80-85
Electronic Edition (link) BibTeX
Cryptographic Protocols
- Seung Wook Jung, Christoph Ruland:
Secure Software Smartcard Resilient to Capture.
86-95
Electronic Edition (link) BibTeX
- Kewei Lv:
Revised Fischlin's (Blind) Signature Schemes.
96-103
Electronic Edition (link) BibTeX
- Lichen Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian:
Certificateless Threshold Signature Schemes.
104-109
Electronic Edition (link) BibTeX
- M. Choudary Gorantla, Ashutosh Saxena:
An Efficient Certificateless Signature Scheme.
110-116
Electronic Edition (link) BibTeX
- Xiaofeng Chen, Fangguo Zhang, Shengli Liu:
ID-Based Restrictive Partially Blind Signatures.
117-124
Electronic Edition (link) BibTeX
- Seungwon Lee, Seongje Cho, Jongmoo Choi, Yookun Cho:
Batch Verification with DSA-Type Digital Signatures for Ubiquitous Computing.
125-130
Electronic Edition (link) BibTeX
- Sujing Zhou, Dongdai Lin:
On Anonymity of Group Signatures.
131-136
Electronic Edition (link) BibTeX
- Yuqing Zhang, Zhiling Wang, Bo Yang:
The Running-Mode Analysis of Two-Party Optimistic Fair Exchange Protocols.
137-142
Electronic Edition (link) BibTeX
- Jin Wook Byun, Dong Hoon Lee, Jongin Lim:
Password-Based Group Key Exchange Secure Against Insider Guessing Attacks.
143-148
Electronic Edition (link) BibTeX
- Qiang Tang, Chris J. Mitchell:
On the Security of Some Password-Based Key Agreement Schemes.
149-154
Electronic Edition (link) BibTeX
- Yong Xu, Yuxiang Sun:
A New Group Rekeying Method in Secure Multicast.
155-160
Electronic Edition (link) BibTeX
- Jian Liao, Yinghao Qi, Peiwei Huang, Mentian Rong:
Pairing-Based Provable Blind Signature Scheme Without Random Oracles.
161-166
Electronic Edition (link) BibTeX
- Qin Wang, Zhenfu Cao:
Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear Pairings.
167-172
Electronic Edition (link) BibTeX
- Changgen Peng, Xiang Li:
An Identity-Based Threshold Signcryption Scheme with Semantic Security.
173-179
Electronic Edition (link) BibTeX
- Li Hui, Shen Ting:
A Token-Based Single Sign-On Protocol.
180-185
Electronic Edition (link) BibTeX
- Shaohua Tang:
Simple Threshold RSA Signature Scheme Based on Simple Secret Sharing.
186-191
Electronic Edition (link) BibTeX
- Qiang Tang, Chris J. Mitchell:
Efficient Compilers for Authenticated Group Key Exchange.
192-197
Electronic Edition (link) BibTeX
- Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto:
Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys.
198-203
Electronic Edition (link) BibTeX
Intrusion Detection
- Ki-Won Yeom, Ji-Hyung Park:
An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks.
204-211
Electronic Edition (link) BibTeX
- Ping Wang, Binxing Fang, Xiao-chun Yun:
A New User-Habit Based Approach for Early Warning of Worms.
212-219
Electronic Edition (link) BibTeX
- Il-Seop Song, Youngseok Lee, Taeck-Geun Kwon:
A Multi-gigabit Virus Detection Algorithm Using Ternary CAM.
220-227
Electronic Edition (link) BibTeX
- Yong Zeng, Jianfeng Ma:
Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems.
228-235
Electronic Edition (link) BibTeX
- Saraswathi Sachidananda, Srividya Gopalan, Sridhar Varadarajan:
Hardware-Software Hybrid Packet Processing for Intrusion Detection Systems.
236-243
Electronic Edition (link) BibTeX
- Junfeng Tian, Weidong Zhao, Ruizhong Du:
D-S Evidence Theory and Its Data Fusion Application in Intrusion Detection.
244-251
Electronic Edition (link) BibTeX
- Yuji Waizumi, Daisuke Kudo, Nei Kato, Yoshiaki Nemoto:
A New Network Anomaly Detection Technique Based on Per-Flow and Per-Service Statistics.
252-259
Electronic Edition (link) BibTeX
- Seongje Cho, Hye-Young Chang, HongGeun Kim, WoongChul Choi:
SoIDPS: Sensor Objects-Based Intrusion Detection and Prevention System and Its Implementation.
260-266
Electronic Edition (link) BibTeX
- Ming Li, Wei Zhao:
A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services.
267-272
Electronic Edition (link) BibTeX
- Vidyasagar Potdar, Chen Wu, Elizabeth Chang:
Tamper Detection for Ubiquitous RFID-Enabled Supply Chain.
273-278
Electronic Edition (link) BibTeX
- Wei Yan:
Measuring the Histogram Feature Vector for Anomaly Network Traffic.
279-284
Electronic Edition (link) BibTeX
- Kyunghwan Baek, Heejun Jang, Youngjun Han, Hernsoo Hahn:
Efficient Small Face Detection in Surveillance Images Using Major Color Component and LDA Scheme.
285-290
Electronic Edition (link) BibTeX
- Jin Zheng, Bo Li, Bing Zhou, Wei Li:
Fast Motion Detection Based on Accumulative Optical Flow and Double Background Model.
291-296
Electronic Edition (link) BibTeX
- Jangbok Kim, Jaehong Shim, Gihyun Jung, Kyunghee Choi:
Reducing Worm Detection Time and False Alarm in Virus Throttling.
297-302
Electronic Edition (link) BibTeX
- Jin Ho You, Seong Chae Seo, Young Dae Kim, Jun Yong Choi, Sang Jun Lee, Byung Ki Kim:
Protection Against Format String Attacks by Binary Rewriting.
303-308
Electronic Edition (link) BibTeX
- Zhanchun Li, Zhitang Li, Yao Li, Bin Liu:
Masquerade Detection System Based on Principal Component Analysis and Radial Basics Function.
309-314
Electronic Edition (link) BibTeX
- Cheng Zhang, Qinke Peng:
Anomaly Detection Method Based on HMMs Using System Call and Call Stack Information.
315-321
Electronic Edition (link) BibTeX
- Xiaojuan Sun, Xinliang Zhou, Ninghui Sun, Mingyu Chen:
Parallel Optimization Technology for Backbone Network Intrusion Detection System.
322-327
Electronic Edition (link) BibTeX
- Linru Ma, Lin Yang, Jianxin Wang:
Attack Scenario Construction Based on Rule and Fuzzy Clustering.
328-333
Electronic Edition (link) BibTeX
- Lingjuan Li, Wenyu Tang, Ruchuan Wang:
A CBR Engine Adapting to IDS.
334-339
Electronic Edition (link) BibTeX
- Hee Suk Seo, Tae Ho Cho:
Application of Fuzzy Logic for Distributed Intrusion Detection.
340-347
Electronic Edition (link) BibTeX
Security Models and Architecture
- Syed Naqvi, Michel Riguidel:
Dynamic Access Control for Pervasive Grid Applications.
348-355
Electronic Edition (link) BibTeX
- Xinghua Li, Jianfeng Ma, Sang-Jae Moon:
On the Security of the Canetti-Krawczyk Model.
356-363
Electronic Edition (link) BibTeX
- Yi Shi, Xinyu Yang:
A Novel Architecture for Detecting and Defending Against Flooding-Based DDoS Attacks.
364-374
Electronic Edition (link) BibTeX
- Dayin Wang, Dongdai Lin, Wenling Wu:
A Variant of Poly1305 MAC and Its Security Proof.
375-380
Electronic Edition (link) BibTeX
- Jianjun Shen, Sihan Qing, Qingni Shen, Liping Li:
Covert Channel Identification Founded on Information Flow Analysis.
381-387
Electronic Edition (link) BibTeX
- André Årnes, Karin Sallhammar, Kjetil Haslum, Tønnes Brekne, Marie Elisabeth Gaup Moe, Svein J. Knapskog:
Real-Time Risk Assessment with Network Sensors and Intrusion Detection Systems.
388-397
Electronic Edition (link) BibTeX
- Xiaofeng Rong, Xiaojuan Gao, Ruidan Su, Lihua Zhou:
Design and Implementation of a Parallel Crypto Server.
398-406
Electronic Edition (link) BibTeX
- Xuegang Lin, Rongsheng Xu, Miaoliang Zhu:
Survivability Computation of Networked Information Systems.
407-414
Electronic Edition (link) BibTeX
- Yongzheng Zhang, Binxing Fang, Yue Chi, Xiao-chun Yun:
Assessment of Windows System Security Using Vulnerability Relationship Graph.
415-420
Electronic Edition (link) BibTeX
- Hui-Xian Li, Chun-Tian Cheng, Liao-Jun Pang:
A New (t, n)-Threshold Multi-secret Sharing Scheme.
421-426
Electronic Edition (link) BibTeX
- Sang-ho Park, Taekyoung Kwon:
An Efficient Message Broadcast Authentication Scheme for Sensor Networks.
427-432
Electronic Edition (link) BibTeX
- Fan Zhang, Xinhong Zhang, Zhiguo Chen:
Digital Image Authentication Based on Error-Correction Codes.
433-438
Electronic Edition (link) BibTeX
- Duhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park, Ohyoung Song:
Design and Implementation of Efficient Cipher Engine for IEEE 802.11i Compatible with IEEE 802.11n and IEEE 802.11e.
439-444
Electronic Edition (link) BibTeX
- Shanshan Duan, Zhenfu Cao, Yuan Zhou:
Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme.
445-450
Electronic Edition (link) BibTeX
- Seong Chae Seo, Jin Ho You, Young Dae Kim, Jun Yong Choi, Sang Jun Lee, Byung Ki Kim:
Building Security Requirements Using State Transition Diagram at Security Threat Location.
451-456
Electronic Edition (link) BibTeX
- Weiping Liu, Wandong Cai:
Study on Security iSCSI Based on SSH.
457-462
Electronic Edition (link) BibTeX
- Kenli Li, Yan He, Renfa Li, Tao Yang:
A Scheduling Algorithm Based on a Trust Mechanism in Grid.
463-468
Electronic Edition (link) BibTeX
- Byungil Lee, Howon Kim:
Enhanced Security and Privacy Mechanism of RFID Service for Pervasive Mobile Device.
469-475
Electronic Edition (link) BibTeX
- Yunkai Zhang, Fangwei Wang, Changguang Wang, Jianfeng Ma:
Worm Propagation Modeling and Analysis on Network.
476-481
Electronic Edition (link) BibTeX
- Hong Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu:
An Extensible AAA Infrastructure for IPv6.
482-487
Electronic Edition (link) BibTeX
- Fan Zhang, Jianfeng Ma, Sang-Jae Moon:
The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i.
488-493
Electronic Edition (link) BibTeX
- Chang-Won Park, Sung Jin Choi, Hee Yong Youn:
A Noble Key Pre-distribution Scheme with LU Matrix for Secure Wireless Sensor Networks.
494-499
Electronic Edition (link) BibTeX
Security Management
- Haibo Tian, Xi Sun, Yumin Wang:
A Virtual Bridge Certificate Authority Model.
500-507
Electronic Edition (link) BibTeX
- Jorma Kajava, Reijo Savola, Rauno Varonen:
Weak Signals in Information Security Management.
508-517
Electronic Edition (link) BibTeX
- Wu Liu, Hai-Xin Duan, Jianping Wu, Xing Li:
PDTM: A Policy-Driven Trust Management Framework in Distributed Systems.
518-525
Electronic Edition (link) BibTeX
- Mengquan Lin, Qiangmin Wang, Jianhua Li:
Methodology of Quantitative Risk Assessment for Information System Security.
526-531
Electronic Edition (link) BibTeX
- Mei-juan Huang, Jian-zhong Zhang, Shu-cui Xie:
A Secure and Efficient (t, n) Threshold Verifiable Multi-secret Sharing Scheme.
532-537
Electronic Edition (link) BibTeX
- Chin-Chen Chang, Jung-San Lee:
Improvement on an Optimized Protocol for Mobile Network Authentication and Security.
538-541
Electronic Edition (link) BibTeX
- Qian-Mu Li, Man-Wu Xu, Hong Zhang, Fengyu Liu:
Neural Network Based Flow Forecast and Diagnosis.
542-547
Electronic Edition (link) BibTeX
- Bat-Odon Purevjii, Masayoshi Aritsugi, Sayaka Imai, Yoshinari Kanamori, Cherri M. Pancake:
Protecting Personal Data with Various Granularities: A Logic-Based Access Control Approach.
548-553
Electronic Edition (link) BibTeX
- Hui-Feng Huang, Chin-Chen Chang:
Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function.
554-559
Electronic Edition (link) BibTeX
- Hui He, Mingzeng Hu, Weizhe Zhang, Hongli Zhang, Zhi Yang:
Topology-Based Macroscopical Response and Control Technology for Network Security Event.
560-566
Electronic Edition (link) BibTeX
Watermarking and Information Hiding
- Chin-Chen Chang, Chia-Chen Lin, Jun-Bin Yeh:
Adaptive Hiding Scheme Based on VQ-Indices Using Commutable Codewords.
567-572
Electronic Edition (link) BibTeX
- Xiaoping Liang, Xiaoyun Wu, Jiwu Huang:
Reversible Data Hiding for Image Based on Histogram Modification of Wavelet Coefficients.
573-580
Electronic Edition (link) BibTeX
- Young-Ran Park, Hyun-Ho Kang, Sanguk Shin, Ki-Ryong Kwon:
An Image Steganography Using Pixel Characteristics.
581-588
Electronic Edition (link) BibTeX
- Konstantinos Papapanagiotou, Emmanouel Kellinis, Giannis F. Marias, Panagiotis Georgiadis:
Alternatives for Multimedia Messaging System Steganography.
589-596
Electronic Edition (link) BibTeX
- Shuai Wan, Yilin Chang, Fuzheng Yang:
Error Concealment for Video Transmission Based on Watermarking.
597-604
Electronic Edition (link) BibTeX
- Tran Minh Triet, Duong Anh Duc:
Applying the AES and Its Extended Versions in a General Framework for Hiding Information in Digital Images.
605-610
Electronic Edition (link) BibTeX
- Bin Liu, Zhitang Li, Zhanchun Li:
An Image Hiding Algorithm Based on Bit Plane.
611-616
Electronic Edition (link) BibTeX
- Xiangyang Wang, Hong Zhao:
A Blind Audio Watermarking Algorithm Robust Against Synchronization Attack.
617-622
Electronic Edition (link) BibTeX
- Hyun-Mi Kim, Ik-Hwan Cho, A-Young Cho, Dong-Seok Jeong:
Semi-fragile Watermarking Algorithm for Detection and Localization of Temper Using Hybrid Watermarking Method in MPEG-2 Video.
623-628
Electronic Edition (link) BibTeX
- Zhiqiang Yao, Liping Chen, Rihong Pan, Boxian Zou, Licong Chen:
Public Watermarking Scheme Based on Multiresolution Representation and Double Hilbert Scanning.
629-634
Electronic Edition (link) BibTeX
- Daesung Moon, Taehae Kim, Seunghwan Jung, Yongwha Chung, Kiyoung Moon, Dosung Ahn, Sang-Kyoon Kim:
Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems.
635-642
Electronic Edition (link) BibTeX
- Seong-Whan Kim, HyunSung Sung:
An Improvement of Auto-correlation Based Video Watermarking Scheme Using Independent Component Analysis.
643-648
Electronic Edition (link) BibTeX
- Chen Xu, Weiqiang Zhang, Francis R. Austin:
A Digital Watermarking Technique Based on Wavelet Packages.
649-654
Electronic Edition (link) BibTeX
- Long Ma, Changjun Li, Shuni Song:
A Spectral Images Digital Watermarking Algorithm.
655-660
Electronic Edition (link) BibTeX
- Niladri B. Puhan, Anthony T. S. Ho:
Restoration in Secure Text Document Image Authentication Using Erasable Watermarks.
661-668
Electronic Edition (link) BibTeX
Web and Network Applications
- Won-Hyuck Choi, Doo-Hyun Kim, Kwang-Jae Lee, Jung-Sun Kim:
The Study of RED Algorithm Used Multicast Router Based Buffer Management.
669-678
Electronic Edition (link) BibTeX
- Lei Cao, Jian Cao, Minglu Li:
Genetic Algorithm Utilized in Cost-Reduction Driven Web Service Selection.
679-686
Electronic Edition (link) BibTeX
- Xiaohua Luo, Kougen Zheng, Zhaohui Wu, Yunhe Pan:
MacroOS: A Pervasive Computing Platform Supporting Context Awareness and Context Management.
687-694
Electronic Edition (link) BibTeX
- Qin Liu, Chanle Wu:
A Frame for Selecting Replicated Multicast Servers Using Genetic Algorithm.
695-702
Electronic Edition (link) BibTeX
- Shaohe Lv, Jianping Yin, Zhiping Cai, Chi Liu:
On a Novel Methodology for Estimating Available Bandwidth Along Network Paths.
703-710
Electronic Edition (link) BibTeX
- Liyuan Zhao, Keqin Liu, Jun Zheng:
A New AQM Algorithm for Enhancing Internet Capability Against Unresponsive Flows.
711-718
Electronic Edition (link) BibTeX
- Terry C. House:
Client Server Access: Wired vs. Wireless LEO Satellite-ATM Connectivity; A (MS-Ro-BAC) Experiment.
719-724
Electronic Edition (link) BibTeX
- Jinhyung Kim, Dongwon Jeong, Doo-Kwon Baik:
An Algorithm for Automatic Inference of Referential Integrities During Translation from Relational Database to XML Schema.
725-730
Electronic Edition (link) BibTeX
- Shuning Cui, Boqin Feng:
A Fuzzy Integral Method to Merge Search Engine Results on Web.
731-736
Electronic Edition (link) BibTeX
- Sungjune Hong, Sunyoung Han:
The Next Generation PARLAY X with QoS/QoE.
737-742
Electronic Edition (link) BibTeX
- Seong-Woo Kim, Young-Chul Jung, Young-Tak Kim:
A Design of Platform for QoS-Guaranteed Multimedia Services Provisioning on IP-Based Convergence Network.
743-748
Electronic Edition (link) BibTeX
- Tai Sik Lee, Dong Wook Lee, Jeong Hyun Kim:
Introduction of Knowledge Management System for Technical Support in Construction Industries.
749-756
Electronic Edition (link) BibTeX
- Qiuhua Zheng, Yuntao Qian:
An Event Correlation Approach Based on the Combination of IHU and Codebook.
757-763
Electronic Edition (link) BibTeX
Image and Signal Processing
- Bicheng Li, Hujun Yin:
Face Recognition Based on Support Vector Machine Fusion and Wavelet Transform.
764-771
Electronic Edition (link) BibTeX
- Jun Zhou, Guangda Su, Yafeng Deng, Kai Meng, Congcong Li:
A Dynamic Face and Fingerprint Fusion System for Identity Authentication.
772-779
Electronic Edition (link) BibTeX
- Kyu B. Doh, Jungho Ohn, Ting-C Poon:
Image Recognition for Security Verification Using Real-Time Joint Transform Correlation with Scanning Technique.
780-787
Electronic Edition (link) BibTeX
- Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling:
Binarized Revocable Biometrics in Face Recognition.
788-795
Electronic Edition (link) BibTeX
- Junping Wang, Yue Hao:
Short Critical Area Computational Method Using Mathematical Morphology.
796-803
Electronic Edition (link) BibTeX
- Yong Zhou, Xiaofeng Hu, Qingtai Ye:
A Robust Lane Detection Approach Based on MAP Estimate and Particle Swarm Optimization.
804-811
Electronic Edition (link) BibTeX
- Fuhai Li, Jinwen Ma, Dezhi Huang:
MFCC and SVM Based Recognition of Chinese Vowels.
812-819
Electronic Edition (link) BibTeX
- Zhe-Ming Lu, Hui Pei, Hans Burkhardt:
A Spatial/Frequency Hybrid Vector Quantizer Based on a Classification in the DCT Domain.
820-825
Electronic Edition (link) BibTeX
- Ji Bai, Lizhuang Ma, Li Yao, Tingting Yao, Ying Zhang:
Removing of Metal Highlight Spots Based on Total Variation Inpainting with Multi-sources-flashing.
826-831
Electronic Edition (link) BibTeX
- Kyoung-Mi Lee:
Component-Based Online Learning for Face Detection and Verification.
832-837
Electronic Edition (link) BibTeX
- Wenbing Fan, Jing Chen, Jina Zhen:
SPIHT Algorithm Based on Fast Lifting Wavelet Transform in Image Compression.
838-844
Electronic Edition (link) BibTeX
- Han-Suh Koo, Chang-Sung Jeong:
Modified EZW Coding for Stereo Residual.
845-850
Electronic Edition (link) BibTeX
- Xuemei Xie, Guangming Shi, Xuyang Chen:
Optimal Prototype Filters for Near-Perfect-Reconstruction Cosine-Modulated Filter Banks.
851-856
Electronic Edition (link) BibTeX
- Chan Lim, Hyun Soo Kang, Tae-Yong Kim:
Fast Motion Estimation Scheme for Real Time Multimedia Streaming with H.264.
857-862
Electronic Edition (link) BibTeX
- Guiguang Ding, Qionghai Dai, Wenli Xu:
Motion-Compensated 3D Wavelet Video Coding Based on Adaptive Temporal Lifting Filter Implementation.
863-868
Electronic Edition (link) BibTeX
- Shin-Hyoung Kim, Jong-Whan Jang, Seung Phil Lee, Jae-Ho Choi:
Accurate Contouring Technique for Object Boundary Extraction in Stereoscopic Imageries.
869-874
Electronic Edition (link) BibTeX
- Yunshu Hou, Yanning Zhang, Rongchun Zhao:
Robust Object Tracking Based on Uncertainty Factorization Subspace Constraints Optical Flow.
875-880
Electronic Edition (link) BibTeX
- Benlian Xu, Zhiquan Wang:
Bearings-Only Target Tracking Using Node Selection Based on an Accelerated Ant Colony Optimization.
881-886
Electronic Edition (link) BibTeX
- Weixing Wang:
Image Classification and Delineation of Fragments.
887-892
Electronic Edition (link) BibTeX
- Guoyou Wang, Wentao Wang:
A Novel Wavelet Image Coding Based on Non-uniform Scalar Quantization.
893-898
Electronic Edition (link) BibTeX
- Bai-Tao Zhou, Won Nah, Kang Woong Lee, Joong-Hwan Baek:
A General Image Based Nematode Identification System Design.
899-904
Electronic Edition (link) BibTeX
- Ling Zhang, Xianda Zhang:
A Novel SVD-Based RLS Blind Adaptive Multiuser Detector for CDMA Systems.
905-910
Electronic Edition (link) BibTeX
- Jung-Youp Suk, Gun Woo Lee, Kuhn-Il Lee:
New Electronic Digital Image Stabilization Algorithm in Wavelet Transform Domain.
911-916
Electronic Edition (link) BibTeX
- Z. W. Liao, S. X. Hu, T. Z. Huang:
Line Segments and Dominate Points Detection Based on Hough Transform.
917-922
Electronic Edition (link) BibTeX
- Jian Zhuang, Haifeng Du, Jinhua Zhang, Sunan Wang:
The Study of the Auto Color Image Segmentation.
923-928
Electronic Edition (link) BibTeX
- Vivek Maik, Jeongho Shin, Joon Ki Paik:
Regularized Image Restoration by Means of Fusion for Digital Auto Focusing.
929-934
Electronic Edition (link) BibTeX
- Gangyi Jiang, Liangzhong Fan, Mei Yu, Rangding Wang, Xien Ye, Yong-Deak Kim:
Fast Ray-Space Interpolation Based on Occlusion Analysis and Feature Points Detection.
935-940
Electronic Edition (link) BibTeX
- Fasong Wang, Hongwei Li, Rui Li, Shaoquan Yu:
Non-parametric ICA Algorithm for Hybrid Sources Based on GKNN Estimation.
941-946
Electronic Edition (link) BibTeX
- Kyu-Yeol Chae, Won-Pyo Dong, Chang-Sung Jeong:
SUSAN Window Based Cost Calculation for Fast Stereo Matching.
947-952
Electronic Edition (link) BibTeX
- Zhiliang Xu, Shengli Xie, Youjun Xiang:
An Efficient Adaptive De-blocking Algorithm.
953-958
Electronic Edition (link) BibTeX
- Lei Wang, Beiji Zou, Jiaguang Sun:
Facial Features Location by Analytic Boosted Cascade Detector.
959-964
Electronic Edition (link) BibTeX
- Zhilin Feng, Jianwei Yin, Zhaoyang He, Wuheng Zuo, Jinxiang Dong:
New Approach for Segmentation and Pattern Recognition of Jacquard Images.
965-970
Electronic Edition (link) BibTeX
- Jinwu Wei, Jiangxing Wu:
Nonstationarity of Network Traffic Within Multi-scale Burstiness Constraint.
971-976
Electronic Edition (link) BibTeX
- Li Zhang, Shiming Ji, Yi Xie, Qiaoling Yuan, Yuehua Wan, Guanjun Bao:
Principle of Image Encrypting Algorithm Based on Magic Cube Transformation.
977-982
Electronic Edition (link) BibTeX
- Dongdong Zhang, Wenjun Zhang, Li Song, Hongkai Xiong:
A Study on Motion Prediction and Coding for In-Band Motion Compensated Temporal Filtering.
983-988
Electronic Edition (link) BibTeX
- Qing Xu, Shiqiang Bao, Rui Zhang, Ruijuan Hu, Mateu Sbert:
Adaptive Sampling for Monte Carlo Global Illumination Using Tsallis Entropy.
989-994
Electronic Edition (link) BibTeX
Applications
- Zaiqiang Liu, Dengguo Feng:
Incremental Fuzzy Decision Tree-Based Network Forensic System.
995-1002
Electronic Edition (link) BibTeX
- Youqing Wang, Donghua Zhou:
Robust Reliable Control for a Class of Fuzzy Dynamic Systems with Time-Varying Delay.
1003-1010
Electronic Edition (link) BibTeX
- Hong Yan Yi, Beatriz de la Iglesia, Victor J. Rayward-Smith:
Using Concept Taxonomies for Effective Tree Induction.
1011-1016
Electronic Edition (link) BibTeX
- Jingtao Li, Yinan Jing, Peng Fu, Gendu Zhang, Yongqiang Chen:
A Similarity-Based Recommendation Filtering Algorithm for Establishing Reputation-Based Trust in Peer-to-Peer Electronic Communities.
1017-1024
Electronic Edition (link) BibTeX
- Kyu-Sik Park, Youn-Ho Cho, Sang-Hun Oh:
Automatic Classification of Korean Traditional Music Using Robust Multi-feature Clustering.
1025-1029
Electronic Edition (link) BibTeX
- Changjie Wang, Ho-fung Leung:
A Private and Efficient Mobile Payment Protocol.
1030-1035
Electronic Edition (link) BibTeX
- Tianjie Cao, Dongdai Lin, Rui Xue:
Universal Designated-Verifier Proxy Blind Signatures for E-Commerce.
1036-1041
Electronic Edition (link) BibTeX
- Ulvi Dagdelen, Aytekin Bagis, Dervis Karaboga:
An Efficient Control Method for Elevator Group Control System.
1042-1047
Electronic Edition (link) BibTeX
- Qijian Xu, Naitong Zhang, Jie Zhang, Yu Sun:
Next Generation Military Communication Systems Architecture.
1048-1053
Electronic Edition (link) BibTeX
- Antti Tikkanen, Teemupekka Virtanen:
Early Warning for Network Worms.
1054-1059
Electronic Edition (link) BibTeX
- Xinhua You, Bin Fang, Xinge You, Zhenyu He, Dan Zhang, Yuan Yan Tang:
Skeleton Representation of Character Based on Multiscale Approach.
1060-1067
Electronic Edition (link) BibTeX
- Wenming Cao, Wanfang Chai, Shoujue Wang:
Channel Equalization Based on Two Weights Neural Network.
1068-1073
Electronic Edition (link) BibTeX
- Pawalai Kraipeerapun, Chun Che Fung, Warick Brown:
Assessment of Uncertainty in Mineral Prospectivity Prediction Using Interval Neutrosophic Set.
1074-1079
Electronic Edition (link) BibTeX
- Qiang Lei, Zhengtao Jiang, Yumin Wang:
Ring-Based Anonymous Fingerprinting Scheme.
1080-1085
Electronic Edition (link) BibTeX
- Jae-Min Seol, Seong-Whan Kim:
Scalable and Robust Fingerprinting Scheme Using Statistically Secure Extension of Anti-collusion Code.
1086-1091
Electronic Edition (link) BibTeX
- Xixiang Lv, Bo Yang:
Broadcast Encryption Using Identity-Based Public-Key Cryptosystem.
1092-1097
Electronic Edition (link) BibTeX
- Goo-Rak Kwon, Tea-Young Lee, Kyoung-Ho Kim, Jae-Do Jin, Sung-Jea Ko:
Multimedia Digital Right Management Using Selective Scrambling for Mobile Handset.
1098-1103
Electronic Edition (link) BibTeX
- Howon Kim, Mun-Kyu Lee, Dong Kyue Kim, Sang-Kyoon Chung, Kyoil Chung:
Design and Implementation of Crypto Co-processor and Its Application to Security Systems.
1104-1109
Electronic Edition (link) BibTeX
- Wenming Cao, Jianqing Li, Shoujue Wang:
Continuous Speech Research Based on HyperSausage Neuron.
1110-1115
Electronic Edition (link) BibTeX
- Changcai Han, Dongfeng Yuan:
Variable-Rate Channel Coding for Space-Time Coded MIMO System.
1116-1121
Electronic Edition (link) BibTeX
- Xiang-chu Feng, Yongdong Yang:
A New Watermarking Method Based on DWT.
1122-1126
Electronic Edition (link) BibTeX
- Daniel Kang, Byeong-Seok Shin:
Efficient Point Rendering Method Using Sequential Level-of-Detail.
1127-1133
Electronic Edition (link) BibTeX
- Tongqi Zhang, Qingjiang Chen:
Construction of a Class of Compactly Supported Biorthogonal Multiple Vector-Valued Wavelets.
1134-1139
Electronic Edition (link) BibTeX
- Yoo-Joo Choi, Jeong-Sik Kim, Min-Jeong Kim, Soo-Mi Choi, Myoung-Hee Kim:
Metabolic Visualization and Intelligent Shape Analysis of the Hippocampus.
1140-1148
Electronic Edition (link) BibTeX
- Kwangsun Ko, Insook Jang, Yong-hyeog Kang, Jinseok Lee, Young Ik Eom:
Characteristic Classification and Correlation Analysis of Source-Level Vulnerabilities in the Linux Kernel.
1149-1156
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:02:13 2009
by Michael Ley (ley@uni-trier.de)