Conferences in DBLP
Lijuan Li , Zhibin Huang , Feng Liu An Improved Particle Swarm Optimizer for Truss Structure Optimization. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:1-10 [Conf ] Hongwei Huo , Vojislav Stojkovic Two-Phase Quantum Based Evolutionary Algorithm for Multiple Sequence Alignment. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:11-21 [Conf ] Xiaoping Luo , Wenyao Pang , Ji Huang A Further Discussion on Convergence Rate of Immune Genetic Algorithm to Absorbed-State. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:22-28 [Conf ] Yuelin Gao , Chengxian Xu , Jimin Li Linear Programming Relax-PSO Hybrid Bound Algorithm for a Class of Nonlinear Integer Programming Problems. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:29-35 [Conf ] Xiangpei Hu , Qiulei Ding , Yongxian Li , Dan Song An Improved Ant Colony System and Its Application. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:36-45 [Conf ] Shulin Wang , Huowang Chen , Ji Wang , Dingxing Zhang , Shutao Li Molecular Diagnosis of Tumor Based on Independent Component Analysis and Support Vector Machines. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:46-56 [Conf ] Chen Liao , Shutao Li , Zhiyuan Luo Gene Selection Using Wilcoxon Rank Sum Test and Support Vector Machine for Cancer Classification. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:57-66 [Conf ] Xianjun Shen , Yuanxiang Li , Bojin Zheng , Zhifeng Dai General Particle Swarm Optimization Based on Simulated Annealing for Multi-specification One-Dimensional Cutting Stock Problem. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:67-76 [Conf ] Quanju Zhang , Fuye Feng , Zhenghong Wei Neurodynamic Analysis for the Schur Decomposition of the Box Problems. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:77-86 [Conf ] Jingxuan Wei , Yuping Wang A New Model Based Multi-objective PSO Algorithm. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:87-94 [Conf ] Kata Praditwong , Xin Yao A New Multi-objective Evolutionary Optimisation Algorithm: The Two-Archive Algorithm. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:95-104 [Conf ] Fu Yuan Hu , Hau-San Wong , Zhi Qiang Liu , Hui-yang Qu Labeling of Human Motion by Constraint-Based Genetic Algorithm. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:105-114 [Conf ] Xingwei Wang , Pengcheng Liu , Min Huang Genetic Algorithm and Pareto Optimum Based QoS Multicast Routing Scheme in NGI. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:115-122 [Conf ] Gengui Zhou , Zhenyu Cao , Jian Cao , Zhiqing Meng A Centralized Network Design Problem with Genetic Algorithm Approach. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:123-132 [Conf ] Dan Liu , Yuanda Cao CGA: Chaotic Genetic Algorithm for Fuzzy Job Scheduling in Grid Environment. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:133-143 [Conf ] Min-Rong Chen , Yong-zai Lu , GenKe Yang Population-Based Extremal Optimization with Adaptive Lévy Mutation for Constrained Optimization. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:144-155 [Conf ] Lixin Ding , Jinghu Yu An Analysis About the Asymptotic Convergence of Evolutionary Algorithms. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:156-166 [Conf ] Chaohua Dai , Yunfang Zhu , Weirong Chen Seeker Optimization Algorithm. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:167-176 [Conf ] Gaoping Wang , Liyuan Bai Game Model Based Co-evolutionary Algorithm and Its Application for Multiobjective Nutrition Decision Making Optimization Problems. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:177-183 [Conf ] Xin Tan , Huaqian Yang A Novel Optimization Strategy for the Nonlinear Systems Identification. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:184-190 [Conf ] Liang Ming , Yuping Wang A New Schema Survival and Construction Theory for One-Point Crossover. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:191-201 [Conf ] Cheng Bo , Zhenyu Guo , Binggang Cao , Junping Wang Adaptive Parallel Immune Evolutionary Strategy. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:202-208 [Conf ] Lixin Ding , Yingzhou Bi About the Time Complexity of Evolutionary Algorithms Based on Finite Search Space. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:209-219 [Conf ] Seng Kah Phooi , Ang L. M New Radial Basis Function Neural Network Training for Nonlinear and Nonstationary Signals. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:220-230 [Conf ] Rangsipan Marukatat Structure-Based Rule Selection Framework for Association Rule Mining of Traffic Accident Data. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:231-239 [Conf ] Zhiqing Meng , Lifang Peng , Gengui Zhou , Yihua Zhu A Multi-classification Method of Temporal Data Based on Support Vector Machine. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:240-249 [Conf ] Frank Chiang , Robin Braun Towards a Management Paradigm with a Constrained Benchmark for Autonomic Communications. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:250-258 [Conf ] Fuyan Liu , Shaoyi Lu A Feature Selection Algorithm Based on Discernibility Matrix. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:259-269 [Conf ] Shilei Huang , Xiang Xie , Jingming Kuang Using Hybrid Hadamard Error Correcting Output Codes for Multi-class Problem Based on Support Vector Machines. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:270-276 [Conf ] Seyed Eghbal Ghobadi , Klaus Hartmann , Otmar Loffeld , Wolfgang Weihs Range Image Based Classification System Using Support Vector Machines. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:277-287 [Conf ] Alain Delaplace , Thierry Brouard , Hubert Cardot Two Evolutionary Methods for Learning Bayesian Network Structures. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:288-297 [Conf ] YoungAh Lee , SeokMi Hong Fuzzy Q-Map Algorithm for Reinforcement Learning. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:298-307 [Conf ] Binbin He , Cuihua Chen Spatial Data Mining with Uncertainty. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:308-316 [Conf ] Dug Hun Hong , Changha Hwang , Joo Yong Shim , Kyung Ha Seok Locally Weighted LS-SVM for Fuzzy Nonlinear Regression with Fuzzy Input-Output. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:317-325 [Conf ] Chan-Yun Yang , Che-Chang Hsu , Jr-Syu Yang Learning SVM with Varied Example Cost: A k NN Evaluating Approach. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:326-335 [Conf ] Chuen-Tsai Sun , Ji-Lung Hsieh , Chung-Yuan Huang Using Evolving Agents to Critique Subjective Music Compositions. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:336-346 [Conf ] Gang Li , Yongqiang Li , Linyan Sun , Ping Ji Multi-agent Coordination Schemas in Decentralized Production Systems. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:347-356 [Conf ] Dongwon Jeong , Keunhwan Jeon , Jang-won Kim , Jinhyung Kim , Doo-Kwon Baik Ontology-Based RFID System Model for Supporting Semantic Consistency in Ubiquitous Environment. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:357-366 [Conf ] SeokMi Hong , SeungGwan Lee Multiagent Search Strategy for Combinatorial Optimization Problems in Ant Model. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:367-373 [Conf ] Fuchun Guo , Zhide Chen , Yi Mu , Li Xu , Shengyuan Zhang Secure and Efficient Trust Negotiation. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:374-384 [Conf ] Masa-Aki Fukase , Hiroki Takeda , Tomoaki Sato Hardware/Software Co-design of a Secure Ubiquitous System. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:385-395 [Conf ] Yuto Kawahara , Tsuyoshi Takagi , Eiji Okamoto Efficient Implementation of Tate Pairing on a Mobile Phone Using Java. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:396-405 [Conf ] Fagen Li , Yupu Hu , Shuanggen Liu ID-Based ( t , n ) Threshold Proxy Signcryption for Multi-agent Systems. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:406-416 [Conf ] JeaHoon Park , Hoon Jae Lee , JaeCheol Ha , Yongje Choi , Howon Kim , Sang-Jae Moon A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:417-426 [Conf ] Mun-Kyu Lee , Dowon Hong , Dong Kyue Kim Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:427-434 [Conf ] Ying Cai , Zhen Han Binary Sequences with Three and Four Level Autocorrelation. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:435-442 [Conf ] Niansheng Liu , Donghui Guo Security Analysis of Public-Key Encryption Scheme Based on Neural Networks and Its Implementing. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:443-450 [Conf ] Jiho Kim , Duhyun Bae , Sehyun Park , Ohyoung Song Enhanced Security Scheme for Managing Heterogeneous Server Platforms. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:451-459 [Conf ] Chang Han Kim , Yongtae Kim , Sung Yeon Ji , IlWhan Park A New Parallel Multiplier for Type II Optimal Normal Basis. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:460-469 [Conf ] Jian Weng , Shengli Liu , Kefei Chen , Changshe Ma Identity-Based Key-Insulated Signature Without Random Oracles. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:470-480 [Conf ] Yong Zhang , Xiamu Niu , Juncao Li , Chun-ming Li Research on a Novel Hashing Stream Cipher. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:481-490 [Conf ] Seung Wook Jung , Souhwan Jung Secure Password Authentication for Distributed Computing. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:491-501 [Conf ] Yu-Fang Chung , Zhen Yu Wu , Feipei Lai , Tzer-Shyong Chen A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:502-512 [Conf ] Wei Wang , Jianfeng Ma , Sang-Jae Moon Ternary Tree Based Group Key Management in Dynamic Peer Networks. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:513-522 [Conf ] Shuhua Wu , Yuefei Zhu Practical Password-Based Authenticated Key Exchange Protocol. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:523-533 [Conf ] Zehui Wang , Zhiguo Zhang XTR + : A Provable Security Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:534-544 [Conf ] Jin Li , Xiaofeng Chen , Tsz Hon Yuen , Yanming Wang Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:545-555 [Conf ] Jianhong Zhang , Jian Mao Linkability Analysis of Some Blind Signature Schemes. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:556-566 [Conf ] Yoon-Su Jeong , Bong-Keun Lee , Sang Ho Lee An Efficient Device Authentication Protocol Using Bioinformatic. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:567-575 [Conf ] Vidyasagar Potdar , Song Han , Elizabeth Chang , Chen Wu Subjective and Objective Watermark Detection Using a Novel Approach - Barcode Watermarking. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:576-586 [Conf ] Jia Yu , Fanyu Kong , Rong Hao Forward Secure Threshold Signature Scheme from Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:587-597 [Conf ] Yong-Zhen Li , Yoon-Su Jeong , Ning Sun , Sang Ho Lee Low-Cost Authentication Protocol of the RFID System Using Partial ID. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:598-604 [Conf ] Sung Bum Pan , Daesung Moon , Kichul Kim , Yongwha Chung A VLSI Implementation of Minutiae Extraction for Secure Fingerprint Authentication. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:605-615 [Conf ] Xinshan Zhu Image-Adaptive Watermarking Using the Improved Signal to Noise Ratio. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:616-625 [Conf ] Boyun Zhang , Jianping Yin , Jingbo Hao , Shulin Wang , Dingxing Zhang New Malicious Code Detection Based on N-Gram Analysis and Rough Set Theory. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:626-633 [Conf ] Goo-Rak Kwon , Seung-Won Jung , Sung-Jea Ko An Efficient Watermarking Technique Using ADEW and CBWT for Copyright Protection. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:634-641 [Conf ] Jin Wook Shin , Ju Cheng Yang , Sook Yoon , Dong-Sun Park An Image Protection Scheme Using the Wavelet Coefficients Based on Fingerprinting Technique. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:642-651 [Conf ] Huang Jianzhong , Xie Changsheng , Li Xu iOBS3: An iSCSI-Based Object Storage Security System. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:652-660 [Conf ] Hui Zhang , Bin Pang , Ke Xie , Hui Wu An Efficient Algorithm for Clustering Search Engine Results. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:661-671 [Conf ] Hongyu Yang , Feng Xie , Yi Lu Network Anomalous Attack Detection Based on Clustering and Classifier. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:672-682 [Conf ] Zhu Lei , DaeHun Nyang , Kyunghee Lee , Hyotaek Lim Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:683-693 [Conf ] Kjetil Haslum , André Årnes Multisensor Real-Time Risk Assessment Using Continuous-Time Hidden Markov Models. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:694-703 [Conf ] Alex K. S. Ng , Janet Efstathiou , Henry Y. K. Lau A Load Scattering Algorithm for Dynamic Routing of Automated Material Handling Systems. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:704-713 [Conf ] Vojislav Stojkovic , Hongwei Huo Software Agents Action Securities. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:714-724 [Conf ] Xiaolong Li , Yaping Lin , Siqing Yang , Yeqing Yi , Jianping Yu , Xinguo Lu A Key Distribution Scheme Based on Public Key Cryptography for Sensor Networks. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:725-732 [Conf ] Jae-Min Seol , Seong-Whan Kim Collision-Resilient Multi-state Query Tree Protocol for Fast RFID Tag Identification. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:733-742 [Conf ] Misun Moon , Dong Seong Kim , Jong Sou Park Toward Modeling Sensor Node Security Using Task-Role Based Access Control with TinySec. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:743-749 [Conf ] Qingqi Pei , Kefeng Fan , Jinxiu Dai , Jianfeng Ma An Intelligent Digital Content Protection Framework Between Home Network Receiver Devices. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:750-757 [Conf ] Xuefei Cao , Weidong Kou , Huaping Li , Jie Xu An Efficient Anonymous Registration Scheme for Mobile IPv4. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:758-766 [Conf ] SeongHan Shin , Kazukuni Kobara , Hideki Imai An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:767-777 [Conf ] Kyosuke Osaka , Tsuyoshi Takagi , Kenichi Yamazaki , Osamu Takahashi An Efficient and Secure RFID Security Method with Ownership Transfer. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:778-787 [Conf ] Yong-Zhen Li , Young-Bok Cho , Nam-Kyoung Um , Sang Ho Lee Security and Privacy on Authentication Protocol for Low-Cost RFID. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:788-794 [Conf ] Jun-Cheol Park , Geonu Yu Securing Overlay Activities of Peers in Unstructured P2P Networks. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:795-805 [Conf ] Kaiyu Wan , Vasu S. Alagar Security Contexts in Autonomic Systems. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:806-816 [Conf ] Madihah Saudi , Nazean Jomhari Knowledge Structure on Virus for User Education. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:817-823 [Conf ] Yang Bo , Lin Piyuan , Zhang Wenzheng An Efficient Anonymous Fingerprinting Protocol. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:824-832 [Conf ] Jorma Kajava , Juhani Anttila , Rauno Varonen , Reijo Savola , Juha Röning Senior Executives Commitment to Information Security - from Motivation to Responsibility. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:833-838 [Conf ] Mengyao Zhu , Ming Zhang , Xiaoling Chen , Ding Zhang , Zhijie Huang A Hierarchical Key Distribution Scheme for Conditional Access System in DTV Broadcasting. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:839-846 [Conf ] Jin Wang , Jia Yu , Daxing Li , Xi Bai , Zhongtian Jia Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:847-857 [Conf ] Young-Gab Kim , Dongwon Jeong , Soo-Hyun Park , Jongin Lim , Doo-Kwon Baik Modeling and Simulation for Security Risk Propagation in Critical Information Systems. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:858-868 [Conf ] Xin Lü , Zhi Ma Information Assurance Evaluation for Network Information Systems. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:869-877 [Conf ] Zhongwen Li , Yang Xiang , Dongsheng He Simulation and Analysis of DDoS in Active Defense Environment. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:878-886 [Conf ] Dong Seong Kim , Taek-Hyun Shin , Byungil Lee , Jong Sou Park Access Control and Authorization for Security of RFID Multi-domain Using SAML and XACML. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:887-893 [Conf ] Jin Li , Xiaofeng Chen , Fangguo Zhang , Yanming Wang Generalization of the Selective-ID Security Model for HIBS Protocols. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:894-902 [Conf ] Qing Wang , Chuan-hua Zhou , Bao-Hua Zhao Discriminatively Learning Selective Averaged One-Dependence Estimators Based on Cross-Entropy Method. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:903-912 [Conf ] Xinshan Zhu Image-Adaptive Spread Transform Dither Modulation Using Human Visual Model. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:913-923 [Conf ] Ki-Hong Ko , Seong-Whan Kim Improvement of Film Scratch Inpainting Algorithm Using Sobel Based Isophote Computation over Hilbert Scan Line. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:924-934 [Conf ] Lingyu Wang , Graham Leedham A Watershed Algorithmic Approach for Gray-Scale Skeletonization in Thermal Vein Pattern Biometrics. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:935-942 [Conf ] Ronghua Li , Beihai Tan Estimation of Source Signals Number and Underdetermined Blind Separation Based on Sparse Representation. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:943-952 [Conf ] Xiangzhi Bai , Fugen Zhou Edge Detection Based on Mathematical Morphology and Iterative Thresholding. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:953-962 [Conf ] Shaoming Zhang , Ying Chen Image Denoising Based on Wavelet Support Vector Machine. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:963-971 [Conf ] Min Li , Xiangchu Feng Variational Decomposition Model in Besov Spaces and Negative Hilbert-Sobolev Spaces. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:972-982 [Conf ] Wenhui Zhou , Zhiyu Xiang , WeiKang Gu Performance Analysis of Cooperative Hopfield Networks for Stereo Matching. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:983-990 [Conf ] Cheng Ma , Chengshun Jiang An Improved Entropy Function and Chaos Optimization Based Scheme for Two-Dimensional Entropic Image Segmentation. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:991-1000 [Conf ] Li Yingchun , Su Guangda Face Pose Estimation and Synthesis by 2D Morphable Model. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:1001-1008 [Conf ] Hua Cui , Guoxiang Song Study of the Wavelet Basis Selections. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:1009-1017 [Conf ] Yiu-ming Cheung , Hong Zeng Feature Weighted Rival Penalized EM for Gaussian Mixture Clustering: Automatic Feature and Model Selections in a Single Paradigm. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:1018-1028 [Conf ] Ju Cheng Yang , Jin Wook Shin , Dong-Sun Park Fingerprint Matching Using Invariant Moment Features. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:1029-1038 [Conf ] Yun Xue , Chong Sze Tong , Weipeng Zhang Survey of Distance Measures for NMF-Based Face Recognition. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:1039-1049 [Conf ] Rui-jun Gu , Wen-bo Xu Weighted Kernel Isomap for Data Visualization and Pattern Classification. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:1050-1057 [Conf ] Yuehui Sun , Minghui Du DT-CWT Feature Combined with ONPP for Face Recognition. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:1058-1067 [Conf ] Wencong Zhang , Hong Chen , Peng Yao , Bin Li , Zhenquan Zhuang Precise Eye Localization with AdaBoost and Fast Radial Symmetry. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:1068-1077 [Conf ] Kyoung-Sic Cho , Yong-Guk Kim , Yang-Bok Lee Real-Time Expression Recognition System Using Active Appearance Model and EFM. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:1078-1084 [Conf ] Ming Bao , Luyang Guan , Xiaodong Li , Jing Tian , Jun Yang Feature Extraction Using Histogram Entropies of Euclidean Distances for Vehicle Classification. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:1085-1096 [Conf ] Xin Li , Bin Li , Hong Chen , Xianji Wang , Zhengquan Zhuang Full-Space LDA With Evolutionary Selection for Face Recognition. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:1097-1105 [Conf ] Wen-Sheng Chen , Pong Chi Yuen , Jian-Huang Lai Subspace KDA Algorithm for Non-linear Feature Extraction in Face Identification. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:1106-1114 [Conf ]