The SCEAS System
Navigation Menu

Conferences in DBLP

Computational and Information Science (cis)
2006 (conf/cis/2006)

  1. Lijuan Li, Zhibin Huang, Feng Liu
    An Improved Particle Swarm Optimizer for Truss Structure Optimization. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:1-10 [Conf]
  2. Hongwei Huo, Vojislav Stojkovic
    Two-Phase Quantum Based Evolutionary Algorithm for Multiple Sequence Alignment. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:11-21 [Conf]
  3. Xiaoping Luo, Wenyao Pang, Ji Huang
    A Further Discussion on Convergence Rate of Immune Genetic Algorithm to Absorbed-State. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:22-28 [Conf]
  4. Yuelin Gao, Chengxian Xu, Jimin Li
    Linear Programming Relax-PSO Hybrid Bound Algorithm for a Class of Nonlinear Integer Programming Problems. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:29-35 [Conf]
  5. Xiangpei Hu, Qiulei Ding, Yongxian Li, Dan Song
    An Improved Ant Colony System and Its Application. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:36-45 [Conf]
  6. Shulin Wang, Huowang Chen, Ji Wang, Dingxing Zhang, Shutao Li
    Molecular Diagnosis of Tumor Based on Independent Component Analysis and Support Vector Machines. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:46-56 [Conf]
  7. Chen Liao, Shutao Li, Zhiyuan Luo
    Gene Selection Using Wilcoxon Rank Sum Test and Support Vector Machine for Cancer Classification. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:57-66 [Conf]
  8. Xianjun Shen, Yuanxiang Li, Bojin Zheng, Zhifeng Dai
    General Particle Swarm Optimization Based on Simulated Annealing for Multi-specification One-Dimensional Cutting Stock Problem. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:67-76 [Conf]
  9. Quanju Zhang, Fuye Feng, Zhenghong Wei
    Neurodynamic Analysis for the Schur Decomposition of the Box Problems. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:77-86 [Conf]
  10. Jingxuan Wei, Yuping Wang
    A New Model Based Multi-objective PSO Algorithm. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:87-94 [Conf]
  11. Kata Praditwong, Xin Yao
    A New Multi-objective Evolutionary Optimisation Algorithm: The Two-Archive Algorithm. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:95-104 [Conf]
  12. Fu Yuan Hu, Hau-San Wong, Zhi Qiang Liu, Hui-yang Qu
    Labeling of Human Motion by Constraint-Based Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:105-114 [Conf]
  13. Xingwei Wang, Pengcheng Liu, Min Huang
    Genetic Algorithm and Pareto Optimum Based QoS Multicast Routing Scheme in NGI. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:115-122 [Conf]
  14. Gengui Zhou, Zhenyu Cao, Jian Cao, Zhiqing Meng
    A Centralized Network Design Problem with Genetic Algorithm Approach. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:123-132 [Conf]
  15. Dan Liu, Yuanda Cao
    CGA: Chaotic Genetic Algorithm for Fuzzy Job Scheduling in Grid Environment. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:133-143 [Conf]
  16. Min-Rong Chen, Yong-zai Lu, GenKe Yang
    Population-Based Extremal Optimization with Adaptive Lévy Mutation for Constrained Optimization. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:144-155 [Conf]
  17. Lixin Ding, Jinghu Yu
    An Analysis About the Asymptotic Convergence of Evolutionary Algorithms. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:156-166 [Conf]
  18. Chaohua Dai, Yunfang Zhu, Weirong Chen
    Seeker Optimization Algorithm. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:167-176 [Conf]
  19. Gaoping Wang, Liyuan Bai
    Game Model Based Co-evolutionary Algorithm and Its Application for Multiobjective Nutrition Decision Making Optimization Problems. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:177-183 [Conf]
  20. Xin Tan, Huaqian Yang
    A Novel Optimization Strategy for the Nonlinear Systems Identification. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:184-190 [Conf]
  21. Liang Ming, Yuping Wang
    A New Schema Survival and Construction Theory for One-Point Crossover. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:191-201 [Conf]
  22. Cheng Bo, Zhenyu Guo, Binggang Cao, Junping Wang
    Adaptive Parallel Immune Evolutionary Strategy. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:202-208 [Conf]
  23. Lixin Ding, Yingzhou Bi
    About the Time Complexity of Evolutionary Algorithms Based on Finite Search Space. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:209-219 [Conf]
  24. Seng Kah Phooi, Ang L. M
    New Radial Basis Function Neural Network Training for Nonlinear and Nonstationary Signals. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:220-230 [Conf]
  25. Rangsipan Marukatat
    Structure-Based Rule Selection Framework for Association Rule Mining of Traffic Accident Data. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:231-239 [Conf]
  26. Zhiqing Meng, Lifang Peng, Gengui Zhou, Yihua Zhu
    A Multi-classification Method of Temporal Data Based on Support Vector Machine. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:240-249 [Conf]
  27. Frank Chiang, Robin Braun
    Towards a Management Paradigm with a Constrained Benchmark for Autonomic Communications. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:250-258 [Conf]
  28. Fuyan Liu, Shaoyi Lu
    A Feature Selection Algorithm Based on Discernibility Matrix. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:259-269 [Conf]
  29. Shilei Huang, Xiang Xie, Jingming Kuang
    Using Hybrid Hadamard Error Correcting Output Codes for Multi-class Problem Based on Support Vector Machines. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:270-276 [Conf]
  30. Seyed Eghbal Ghobadi, Klaus Hartmann, Otmar Loffeld, Wolfgang Weihs
    Range Image Based Classification System Using Support Vector Machines. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:277-287 [Conf]
  31. Alain Delaplace, Thierry Brouard, Hubert Cardot
    Two Evolutionary Methods for Learning Bayesian Network Structures. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:288-297 [Conf]
  32. YoungAh Lee, SeokMi Hong
    Fuzzy Q-Map Algorithm for Reinforcement Learning. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:298-307 [Conf]
  33. Binbin He, Cuihua Chen
    Spatial Data Mining with Uncertainty. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:308-316 [Conf]
  34. Dug Hun Hong, Changha Hwang, Joo Yong Shim, Kyung Ha Seok
    Locally Weighted LS-SVM for Fuzzy Nonlinear Regression with Fuzzy Input-Output. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:317-325 [Conf]
  35. Chan-Yun Yang, Che-Chang Hsu, Jr-Syu Yang
    Learning SVM with Varied Example Cost: A k NN Evaluating Approach. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:326-335 [Conf]
  36. Chuen-Tsai Sun, Ji-Lung Hsieh, Chung-Yuan Huang
    Using Evolving Agents to Critique Subjective Music Compositions. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:336-346 [Conf]
  37. Gang Li, Yongqiang Li, Linyan Sun, Ping Ji
    Multi-agent Coordination Schemas in Decentralized Production Systems. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:347-356 [Conf]
  38. Dongwon Jeong, Keunhwan Jeon, Jang-won Kim, Jinhyung Kim, Doo-Kwon Baik
    Ontology-Based RFID System Model for Supporting Semantic Consistency in Ubiquitous Environment. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:357-366 [Conf]
  39. SeokMi Hong, SeungGwan Lee
    Multiagent Search Strategy for Combinatorial Optimization Problems in Ant Model. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:367-373 [Conf]
  40. Fuchun Guo, Zhide Chen, Yi Mu, Li Xu, Shengyuan Zhang
    Secure and Efficient Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:374-384 [Conf]
  41. Masa-Aki Fukase, Hiroki Takeda, Tomoaki Sato
    Hardware/Software Co-design of a Secure Ubiquitous System. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:385-395 [Conf]
  42. Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto
    Efficient Implementation of Tate Pairing on a Mobile Phone Using Java. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:396-405 [Conf]
  43. Fagen Li, Yupu Hu, Shuanggen Liu
    ID-Based ( t , n ) Threshold Proxy Signcryption for Multi-agent Systems. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:406-416 [Conf]
  44. JeaHoon Park, Hoon Jae Lee, JaeCheol Ha, Yongje Choi, Howon Kim, Sang-Jae Moon
    A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:417-426 [Conf]
  45. Mun-Kyu Lee, Dowon Hong, Dong Kyue Kim
    Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:427-434 [Conf]
  46. Ying Cai, Zhen Han
    Binary Sequences with Three and Four Level Autocorrelation. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:435-442 [Conf]
  47. Niansheng Liu, Donghui Guo
    Security Analysis of Public-Key Encryption Scheme Based on Neural Networks and Its Implementing. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:443-450 [Conf]
  48. Jiho Kim, Duhyun Bae, Sehyun Park, Ohyoung Song
    Enhanced Security Scheme for Managing Heterogeneous Server Platforms. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:451-459 [Conf]
  49. Chang Han Kim, Yongtae Kim, Sung Yeon Ji, IlWhan Park
    A New Parallel Multiplier for Type II Optimal Normal Basis. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:460-469 [Conf]
  50. Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma
    Identity-Based Key-Insulated Signature Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:470-480 [Conf]
  51. Yong Zhang, Xiamu Niu, Juncao Li, Chun-ming Li
    Research on a Novel Hashing Stream Cipher. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:481-490 [Conf]
  52. Seung Wook Jung, Souhwan Jung
    Secure Password Authentication for Distributed Computing. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:491-501 [Conf]
  53. Yu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen
    A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:502-512 [Conf]
  54. Wei Wang, Jianfeng Ma, Sang-Jae Moon
    Ternary Tree Based Group Key Management in Dynamic Peer Networks. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:513-522 [Conf]
  55. Shuhua Wu, Yuefei Zhu
    Practical Password-Based Authenticated Key Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:523-533 [Conf]
  56. Zehui Wang, Zhiguo Zhang
    XTR + : A Provable Security Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:534-544 [Conf]
  57. Jin Li, Xiaofeng Chen, Tsz Hon Yuen, Yanming Wang
    Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:545-555 [Conf]
  58. Jianhong Zhang, Jian Mao
    Linkability Analysis of Some Blind Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:556-566 [Conf]
  59. Yoon-Su Jeong, Bong-Keun Lee, Sang Ho Lee
    An Efficient Device Authentication Protocol Using Bioinformatic. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:567-575 [Conf]
  60. Vidyasagar Potdar, Song Han, Elizabeth Chang, Chen Wu
    Subjective and Objective Watermark Detection Using a Novel Approach - Barcode Watermarking. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:576-586 [Conf]
  61. Jia Yu, Fanyu Kong, Rong Hao
    Forward Secure Threshold Signature Scheme from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:587-597 [Conf]
  62. Yong-Zhen Li, Yoon-Su Jeong, Ning Sun, Sang Ho Lee
    Low-Cost Authentication Protocol of the RFID System Using Partial ID. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:598-604 [Conf]
  63. Sung Bum Pan, Daesung Moon, Kichul Kim, Yongwha Chung
    A VLSI Implementation of Minutiae Extraction for Secure Fingerprint Authentication. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:605-615 [Conf]
  64. Xinshan Zhu
    Image-Adaptive Watermarking Using the Improved Signal to Noise Ratio. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:616-625 [Conf]
  65. Boyun Zhang, Jianping Yin, Jingbo Hao, Shulin Wang, Dingxing Zhang
    New Malicious Code Detection Based on N-Gram Analysis and Rough Set Theory. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:626-633 [Conf]
  66. Goo-Rak Kwon, Seung-Won Jung, Sung-Jea Ko
    An Efficient Watermarking Technique Using ADEW and CBWT for Copyright Protection. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:634-641 [Conf]
  67. Jin Wook Shin, Ju Cheng Yang, Sook Yoon, Dong-Sun Park
    An Image Protection Scheme Using the Wavelet Coefficients Based on Fingerprinting Technique. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:642-651 [Conf]
  68. Huang Jianzhong, Xie Changsheng, Li Xu
    iOBS3: An iSCSI-Based Object Storage Security System. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:652-660 [Conf]
  69. Hui Zhang, Bin Pang, Ke Xie, Hui Wu
    An Efficient Algorithm for Clustering Search Engine Results. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:661-671 [Conf]
  70. Hongyu Yang, Feng Xie, Yi Lu
    Network Anomalous Attack Detection Based on Clustering and Classifier. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:672-682 [Conf]
  71. Zhu Lei, DaeHun Nyang, Kyunghee Lee, Hyotaek Lim
    Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:683-693 [Conf]
  72. Kjetil Haslum, André Årnes
    Multisensor Real-Time Risk Assessment Using Continuous-Time Hidden Markov Models. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:694-703 [Conf]
  73. Alex K. S. Ng, Janet Efstathiou, Henry Y. K. Lau
    A Load Scattering Algorithm for Dynamic Routing of Automated Material Handling Systems. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:704-713 [Conf]
  74. Vojislav Stojkovic, Hongwei Huo
    Software Agents Action Securities. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:714-724 [Conf]
  75. Xiaolong Li, Yaping Lin, Siqing Yang, Yeqing Yi, Jianping Yu, Xinguo Lu
    A Key Distribution Scheme Based on Public Key Cryptography for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:725-732 [Conf]
  76. Jae-Min Seol, Seong-Whan Kim
    Collision-Resilient Multi-state Query Tree Protocol for Fast RFID Tag Identification. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:733-742 [Conf]
  77. Misun Moon, Dong Seong Kim, Jong Sou Park
    Toward Modeling Sensor Node Security Using Task-Role Based Access Control with TinySec. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:743-749 [Conf]
  78. Qingqi Pei, Kefeng Fan, Jinxiu Dai, Jianfeng Ma
    An Intelligent Digital Content Protection Framework Between Home Network Receiver Devices. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:750-757 [Conf]
  79. Xuefei Cao, Weidong Kou, Huaping Li, Jie Xu
    An Efficient Anonymous Registration Scheme for Mobile IPv4. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:758-766 [Conf]
  80. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:767-777 [Conf]
  81. Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi
    An Efficient and Secure RFID Security Method with Ownership Transfer. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:778-787 [Conf]
  82. Yong-Zhen Li, Young-Bok Cho, Nam-Kyoung Um, Sang Ho Lee
    Security and Privacy on Authentication Protocol for Low-Cost RFID. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:788-794 [Conf]
  83. Jun-Cheol Park, Geonu Yu
    Securing Overlay Activities of Peers in Unstructured P2P Networks. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:795-805 [Conf]
  84. Kaiyu Wan, Vasu S. Alagar
    Security Contexts in Autonomic Systems. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:806-816 [Conf]
  85. Madihah Saudi, Nazean Jomhari
    Knowledge Structure on Virus for User Education. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:817-823 [Conf]
  86. Yang Bo, Lin Piyuan, Zhang Wenzheng
    An Efficient Anonymous Fingerprinting Protocol. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:824-832 [Conf]
  87. Jorma Kajava, Juhani Anttila, Rauno Varonen, Reijo Savola, Juha Röning
    Senior Executives Commitment to Information Security - from Motivation to Responsibility. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:833-838 [Conf]
  88. Mengyao Zhu, Ming Zhang, Xiaoling Chen, Ding Zhang, Zhijie Huang
    A Hierarchical Key Distribution Scheme for Conditional Access System in DTV Broadcasting. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:839-846 [Conf]
  89. Jin Wang, Jia Yu, Daxing Li, Xi Bai, Zhongtian Jia
    Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:847-857 [Conf]
  90. Young-Gab Kim, Dongwon Jeong, Soo-Hyun Park, Jongin Lim, Doo-Kwon Baik
    Modeling and Simulation for Security Risk Propagation in Critical Information Systems. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:858-868 [Conf]
  91. Xin Lü, Zhi Ma
    Information Assurance Evaluation for Network Information Systems. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:869-877 [Conf]
  92. Zhongwen Li, Yang Xiang, Dongsheng He
    Simulation and Analysis of DDoS in Active Defense Environment. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:878-886 [Conf]
  93. Dong Seong Kim, Taek-Hyun Shin, Byungil Lee, Jong Sou Park
    Access Control and Authorization for Security of RFID Multi-domain Using SAML and XACML. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:887-893 [Conf]
  94. Jin Li, Xiaofeng Chen, Fangguo Zhang, Yanming Wang
    Generalization of the Selective-ID Security Model for HIBS Protocols. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:894-902 [Conf]
  95. Qing Wang, Chuan-hua Zhou, Bao-Hua Zhao
    Discriminatively Learning Selective Averaged One-Dependence Estimators Based on Cross-Entropy Method. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:903-912 [Conf]
  96. Xinshan Zhu
    Image-Adaptive Spread Transform Dither Modulation Using Human Visual Model. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:913-923 [Conf]
  97. Ki-Hong Ko, Seong-Whan Kim
    Improvement of Film Scratch Inpainting Algorithm Using Sobel Based Isophote Computation over Hilbert Scan Line. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:924-934 [Conf]
  98. Lingyu Wang, Graham Leedham
    A Watershed Algorithmic Approach for Gray-Scale Skeletonization in Thermal Vein Pattern Biometrics. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:935-942 [Conf]
  99. Ronghua Li, Beihai Tan
    Estimation of Source Signals Number and Underdetermined Blind Separation Based on Sparse Representation. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:943-952 [Conf]
  100. Xiangzhi Bai, Fugen Zhou
    Edge Detection Based on Mathematical Morphology and Iterative Thresholding. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:953-962 [Conf]
  101. Shaoming Zhang, Ying Chen
    Image Denoising Based on Wavelet Support Vector Machine. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:963-971 [Conf]
  102. Min Li, Xiangchu Feng
    Variational Decomposition Model in Besov Spaces and Negative Hilbert-Sobolev Spaces. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:972-982 [Conf]
  103. Wenhui Zhou, Zhiyu Xiang, WeiKang Gu
    Performance Analysis of Cooperative Hopfield Networks for Stereo Matching. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:983-990 [Conf]
  104. Cheng Ma, Chengshun Jiang
    An Improved Entropy Function and Chaos Optimization Based Scheme for Two-Dimensional Entropic Image Segmentation. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:991-1000 [Conf]
  105. Li Yingchun, Su Guangda
    Face Pose Estimation and Synthesis by 2D Morphable Model. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:1001-1008 [Conf]
  106. Hua Cui, Guoxiang Song
    Study of the Wavelet Basis Selections. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:1009-1017 [Conf]
  107. Yiu-ming Cheung, Hong Zeng
    Feature Weighted Rival Penalized EM for Gaussian Mixture Clustering: Automatic Feature and Model Selections in a Single Paradigm. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:1018-1028 [Conf]
  108. Ju Cheng Yang, Jin Wook Shin, Dong-Sun Park
    Fingerprint Matching Using Invariant Moment Features. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:1029-1038 [Conf]
  109. Yun Xue, Chong Sze Tong, Weipeng Zhang
    Survey of Distance Measures for NMF-Based Face Recognition. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:1039-1049 [Conf]
  110. Rui-jun Gu, Wen-bo Xu
    Weighted Kernel Isomap for Data Visualization and Pattern Classification. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:1050-1057 [Conf]
  111. Yuehui Sun, Minghui Du
    DT-CWT Feature Combined with ONPP for Face Recognition. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:1058-1067 [Conf]
  112. Wencong Zhang, Hong Chen, Peng Yao, Bin Li, Zhenquan Zhuang
    Precise Eye Localization with AdaBoost and Fast Radial Symmetry. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:1068-1077 [Conf]
  113. Kyoung-Sic Cho, Yong-Guk Kim, Yang-Bok Lee
    Real-Time Expression Recognition System Using Active Appearance Model and EFM. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:1078-1084 [Conf]
  114. Ming Bao, Luyang Guan, Xiaodong Li, Jing Tian, Jun Yang
    Feature Extraction Using Histogram Entropies of Euclidean Distances for Vehicle Classification. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:1085-1096 [Conf]
  115. Xin Li, Bin Li, Hong Chen, Xianji Wang, Zhengquan Zhuang
    Full-Space LDA With Evolutionary Selection for Face Recognition. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:1097-1105 [Conf]
  116. Wen-Sheng Chen, Pong Chi Yuen, Jian-Huang Lai
    Subspace KDA Algorithm for Non-linear Feature Extraction in Face Identification. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:1106-1114 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002