1994 International Computer Symposium Conference Proceedings
|
|
- Claud Owens
- 6 years ago
- Views:
Transcription
1 1994 International Computer Symposium Conference Proceedings Volume 2 of 2 December 12-15,1994 National Chiao Tung University Hsinchu, Taiwan, Republic of China UB/TIB Hannover
2 viii Session 2-3-E: Software Engineering (II) 1. HISROOT: A Hierarchical Software Reusability Driven System for Object- Oriented Analysis. 664 Jinn-Moon Yang, Wei T. Huang and Jonathan Lee 2. An Overview of the PIVOT Environment for Program Restructuring 677 Chyi-Ren Dow, Shi-Kuo Chang and Mary Lou Soffa 3. Delay Analysis in the Bristol Godel System 677 Jiwei Wang 4. Iterations on Elements of Collection Objects 683 Pei-Chi Wu and Feng-Jian Wang
3 Volume 2 Session 3-1-A: Parallel Processing (I) 1. Scheduling Parallel Tasks with Setup Time on Hypercube Systems 689 Jiann-Fu Lin, Win-Bin See and Sao-Jie Chen 2. A New Model for Dynamic Processor Allocation on Hypercube Multiprocessors 694 Huey-Ling Chen, Chung-Ta King and Yunn-Yen Chen 3. Mapping Concurrently-Communicating Subcubes in a Hypercube Multicomputer 700 Bing-rung Tsai and Kang G. Shin Session 3-1-B: Computer Networks (I) \.LLR Routing in VP-based ATMNetworks 707 Ren-Hung Hwang 2. Bandwidth Allocation and Enforcement Mechanisms for A TM Networks 713 Jin-Long Wang and Liang-Teh Lee 3. Bandwidth Allocation of Virtual Paths with Steps and Lower Bounds for ATM Networks 719 Li-Der Chou, Jean-Lien C. Wu and Shian-Jeng Tzeng 4. A Congestion Control Approach through Token Assignment and Buffer Management in ATM Networks 725 S. S. Chen and Y. C. Chen 5. A New Switching Architecture for ATM Networks 732 Tai-Kuo Woo Session 3-1-C: Computer Graphics (I) 1. Linking Bezier and Generalized Ball Curves 738 Tang Van To and Huynh Ngoc Phi en 2. Constructing the Planar Convex Hulls by Quadrilateral Devour Algorithm 744 Louis R. Chao, Hoo-Chen Liu, Ying-Feng Kou,Wen-Chin Hsieh and Wei-Chuan Lin 3. A Study on Planar Offset Curves Based on Interval Curves 750 Ji-Cherng Lin, Jenn-Hua Lee and Chii-Shiou Luo 4. A Local Geometric Constructive Methodfor Generating Curvature Continuous Shape Preserving Curves 756 Jenn-Hua Lee, Ji-Cherng Lin and Ber-Shiou Lin IX
4 5. New Formulations for Blending Parametric Surfaces. 762 Jung-Hong Chuang, Feng-Liang Lien, Wei-Chung Hwang and Chan-Dar Lin Session 3-1-D: Artificial Intelligence (III) 1. A Knowledge Acquisition Framework for an Industrial Expert System 768 Maria Lee and Kai Foong 2. Genetic-Based Search on Structural Matching 774 Yuan-Kai Wang, Kuo-Chin Fan and Jorng-Tzong Horng 3. Object-Oriented Fuzzy System Framework with Partial Inheritance 780 Shiuh-Chu Lee, Jye-Yuan Lee, Yau-Hwang Kuo and Ren-Dar Yang 4. A Framework for Organizing Semantic Relations in Frame-Structured Knowledge Bases 786 Yufeng F. Chen, Nazir A. Warsi and Larry M. Stephens Session 3-1-E: Databases (I) 1. Average Storage Utilization of a Bucket Method: A Long Derivation 792 Chuan-Heng Ang and Hanan Samet 2. An Operational Model of a B-tree Algorithm for Nested Transactions 797 John Lee 3. Data Sharing - A Pre-Integration Perspective 803 Eberhard Stickel, Jens Hunstock, Anke Ortmann and Jan Ortmann, 4. Clustering of Partitioned Signature File 811 Man-Kwan Shan and Suh-Yin Lee Session 3-2-A: Parallel Processing (II) 1. Efficient Embedding Hypercube on Arrangement Graphs 817 Shun-Shan Tsai and Shi-Jinn Horng 2. Optimal Embedding of Fibonacci Cubes in Hyper cubes with Two Faulty Nodes 823 Feng-Shr Jiang, Shi-Jinn Horng and Tzong-Wann Kao 3. Compact Embedding of Binary Trees into Hypercubes 829 Chui-Cheng Chen and Rong-Jaye Chen 4. Improved Mapping Algorithms for Multiprocessor based Simulation Application 835 Raja Neogi and Meghanad Wagh Session 3-2-B: Computer Networks (II) 1. Protocol Test Sequence Generation for EFSM-Specified Protocols 842 Chung-Ming Huang and Meng-Shu Chiang 2. The Fuzzy Time Communicating State Machine (FTCSMJfor Communication x
5 Protocols 848 Chung-Ming Huang, Shiun-Wei Lee and Jenq-Muh Hsu 3. Enhancing Protocol Modularity in Network Protocol Infrastructure with Configurable Protection Firewalls 854 Anthony H.S. Loong and W.H. Cheung 4. Some Experiences with X.25 DTE Conformance Testing 861 Ching-Sung Lu, San-Wei Sun and Weun-Jier Hwang 5. S/DQFB: A Seamless MAC Protocol for Multiple DQFB Buses Interconnection 867 Tein-Yaw David Chung and Ching-Chih Shih Session 3-2-C: Computer Graphics (II) 1. A New Contour Fill Algorithm for Outlined Character Image Generation 873 Lejun Shao and Hao Zhou 2. Efficient Algorithms for Volume Rendering 879 Chyi-Cheng Lin and Yu-Tai Ching 3. The Wavelet Curve Descriptor and Its Application to Cartoon Animation and Morphing 885 Chun-Hsiung Chuang and C.-C. Jay Kuo 4. Direct Shape Recovery from Texture Information. 891 Kyoung Mu Lee and C.-C.Jay Kuo 5. Non-Manifold Boundary Representation for Solid Modelling 897 Stefka Gueorguieva and David Marcheix Session 3-2-D: Artificial Intelligence (IV) 1. A Shift-First Strategy for Generalized LR Parsing 905 Yong-Seok Lee, Jun-ichi Aoe and Masao Fukeda 2. Word Segmentation for Chinese Phonetic Symbols. 911 Amelia Fong Lochovsky and Kim-hang Chung 3. Automatic Conversion of Romanized Chinese Sentences into Chinese Character Sentences 917 Youran Lan and Ming-Fang Lee 4. Speeding Up Contextual Postprocessing By Using A Dictionary With Compressed Two-Character Indices 923 Cheng-Huang Tung and Hsi-Jian Lee Session 3-2-E: Databases (II) 1. Data Allocation in Distributed Databases 929 William Y.S. Cheung and Victor O.K. Li 2. An Eulerian-Path-Like-Based Algorithm for Semijoins 935 Ye-In Chang and Bor-Miin Liu 3. Coupling of an Information Management System in a Framework for XI
6 Concurrent Product Data Handling 941 Stephen Sum and Anil Kumar Singh 4. Using Logic Programming in Developing Parallel Deductive Database 948 Vincenza Carchiolo, Michele Malgeri-Maurizio Papale 5. Load Balancing for Distributed Database Systems 955 Chengwen Liu and I-Ping Chu Session 3-3-A: Parallel Processing (III) 1. Knowledge-Based Data Dependence Testing on Loops 961 Wen-Chung Shih, Chao-Tung Yang and Shian-Shyong Tseng, 2. A Parallel Dynamic Load Balancing Algorithm for Solution-Adaptive Finite Element Meshes on 2D-Tori 967 Yeh-Ching Chung, Yaa-Jyun Yeh and J.-S Liu 3. An Approach to Mapping Blocks of Iterations in Nested Loops into VLSI Array Processors 973 Yeong-Sheng Chen and Sheng-De Wang 4. A Parametric Simulator for a Parallel Computer Using Address-Trace 9 79 Youichi Omori, Kazuki Joe, Akira Fukuda and Keijirou Araki Session 3-3-B: Computer Networks (III) 1. Optimal Design of a Polling System with General and Mixed Service 986 Lain-Chyr Hwang and Chung-Ju Chang 2. Routing of Calls in North American Intelligent Telephony Networks for Personalized Communications, and Multimedia 992 Hazem El-Gendy, Robert Probert and Linsheng Wei 3. An Efficient Algorithm for Reducing Channel Density by Over-the-Cell Routing 998 Shih-Chuan Hung 4. A Study of Real-Time Distributed Computation And Its Quality-of-Service Metrics For Future High-Speed Network 1004 I-Shyan Hwang Session 3-3-C: CAD 1. Effective Implementation of Self-Timed Systems with Feedback Paths Y.W. Pang, C.S. Choy and C.F. Chan 2. Modeling and Optimizing Design Variables in Computer Aided Switching Noise Simulation 1018 Howard H. Chen, Stanley E. Schuster, Gerard V. Kopcsay and Shen Lin 3. Formal Verification of VerilogDescriptions 1024 Claudionor N. Coelho, K.C. Chen and M. Fujita 4. Estimating Transition Densities for PLA Combinational Logic Circuits 1030 Tzong-Dar Her, Wei Kang Tsai, Fadi Kurdahi and Yulin Chen XII
7 5. Expressing Spatial Relationships in Geometric Modelling by Constraints 1036 Borut Zalik and Nikola Guid Session 4-1-A: Distributed System (I) 1. An Ordered and Reliabile Multicast Protocol for Distributed Systems 1042 Ye-In Chang and Ming-Hon Hwang 2. Fast Optimistic Rollback Recovery in Distributed Systems 1048 Tong-Ying Juang, Kun-Ming Yu and Chang-Shyh Peng 3. Atomic Multicast Mechanisms and Applications in Distributed Systems 1054 Xiaohua Jia 4. The Formalization and Hierarchy of Memory Consistency Models 1060 Alexander I-Chi Lai and Chin-Laung Lei 5. SRPC: A Simple and Fault-Tolerant Remote Procedure Call System 1067 Wanlei Zhou Session 4-1-B: Computer Networks (IV) 1. A New Packet Scheduling Algorithm For High-Speed Wide-Area Networks 1073 Jae-Chang Kwak 2. A Generic Communication Subsystem (GCS)for Client/Server Environments 1080 Chung-You P. Liu, Yuan-Yuan Liu, Thomas W. Christopher and C. Robert Carlson 3. A Common Message Distribution Interface Service (CMDIS) in Heterogeneous Environments 1086 Chung-You P. Liu and Thomas W. Christopher 4. Encoding and Decoding of Address Information in Multicast Messages 1092 Chi-Ming Chiang and Lionel M. Ni Session 4-1-C: Neural Networks (I) 1. Split Fault-Tolerant Training Algorithms 1098 Yen-Tseng Hsu, Chyun-Shin Cheng, and Chwan-Chia Wu 2. The Asymptotical Stability of Multi-Level Discrete Exponential Bidirectional Associative Memory 1104 Chua-Chin Wang, Shiou-Ming Hwang and Jyu-Ping Lee 3. Threshold Logic Based Neural Filters with Nonnegative Weights and Threshold Values - Their Classification and Retrieval Behaviors 1110 Pao-Ta Yu 4. Global Optimization in Neural Network Training 1116 Lucas Chi, Kwong Hui, Kwok-Yan Lam and Rudy Setiono Session 4-1-D: Signal Processing (I) 1. Extended Self-Similar Processes for Stochastic Signal Modeling 1122 Lance M.Kaplan and C.-C. Jay Kuo
8 2. Wavelet-Based Signal Extrapolation: Theory and Algorithms 1128 Li-Chien Lin and C.-C. Jay Kuo 3. Projection-Based Group Delay Scheme for Speech Recognition 1134 Shin-Lun Tung, I-Shine Lei and Yau-Tarag Juang 4. An Initial Study on Large-Vocabulary Continuous Mandarin Speech Recognition with Limited Training Data Based on Sub-syllabic Models 1140 Hsin-Min Wang, Renyuan Lyu, Jia-Lin Shen and Lin-Shan Lee Session 4-1-E: Databases (Ml) 1. Query Processing in Object-Oriented Databases 1146 Vilas Wuwongse, Suttawat Triwittayapoom and Natthawit Dejdumronge 2. Incorporating Behavioral Modeling into Object Oriented Database Design Model 1152 Gwo-Dong Chen, Baw-Jiung Liu, Yu-Min Yan and Ping-Kuen Chen 3. The Design and Implementation of An Easy to Use and Efficient Object-OrientedDatabase (EODB) 1158 Wen-Wei Pan and Wei-Pang Yang 4. Buffer Management for Object-Oriented Database Management Systems 1164 Kuen-Fang J. Jea, Shi-Ying Chen, and Yuan-Te Lee 5. Short Cuts for Trover sals in Object-Oriented Database Systems 1172 Wang-Chien Lee and Dik Lun Lee Session 4-2-A: Distributed System (II) 1. The Reliability Analysis of a General Consecutive-k-out-of-n:G System 1178 Min-Sheng Lin, Deng-Jyi Chen, Kuo-Lung Ku and Kuang-Chao Chang 2. An Algorithm for Load Balancing in Generally Configured Distributed Systems 1184 Jie Li and Hisao Kameda 3. The Design of a Distributed File Server Based on Distributed Shared Memory 1190 Shian-Hua Lin, Yueh-Min Huang and Chi-Nan Chen 4. A Cooperation Protocol for an Object-Sorting Task in a Multi-agent Robotic System 1197 Fang-Chang Lin and Jane Yung-Jen Hsu 5. Analytical Modeling on Object Invocations and Assignment Strategies in Message-Passing Systems 1203 Wen-Tsung Chang and Chien-Chao Tseng Session 4-2-B: Computer Networks (V) 1. Deregistration Strategies for PCS Networks 1209 Yi-Bing Lin and Shu-Yuen Hwang 2. Performance of Integrated Services Fiber Optic PLAYTHROUGH Rings 1215 LongBit Chai and Charles B. Silio, Jr. 3. A Knowledge-Based Approach that Supports Dependency Analysis of Network xiv
9 Management 1221 Deh-Min Wu 4. Multiple Fault Diagnostics for Communication Protocols Shiou-Jiun Chiou, Chuan-Yi Tang and Wen-Huei Chen Session 4-2-C: Neural Networks (II) 1. Neuro-Expert System by a Supervised-Learning Self-Organising Network 1234 Yuen-Tai So and Kwork-Ping Chan 2. Invariant Handwritten Chinese Character Recognition Using Fuzzy Neural Networks 1240 Hung-Pin Chiu and Din-Chang Tseng 3. Neural Network-Based Fuzzy Systems 1246 Mu-Chun Su, Chien-Jen Kao, Kai-Ming Liu, Chi-Yeh Liu and Chih-Ming Wu 4. A Unipolar Hamming Net Neural Network 1251 Chii-Maw Uang, Wei-Feng Lin and Guowen Lu Session 4-2-D: Signal Processing (II) 1. Parameters Estimation of a Fractal Signal Model and Its Distributed Parallel Algorithm Implementation 1256 Xiaokun Zhu, D M Titterington and Bing Cheng 2. The Post-Processing Stages of a Mandarin Waveform Synthesizer 1262 Pei-yih Ting, Chun-Yu Tsai, and Chi-Shi Liu 3. Suppression of Moire Patterns in Scanned Halftone Images by Double Scans with Moving Grids 1267 Ching-Yu Yang and Wen-Hsiang Tsai 4. On Using Fractals Features in Image Analysis 1273 Siu-Hang Or Session 4-2-E: Databases (IV) 1. Query-By-Class (QBC): An Expressive and User-Friendly Graphical User Interface for OODB 1279 Ming-Jer Tsai and Wei-Pang Yang 2. Multi-Priority Tree: An Index Structure for Spatial Data 1285 Ching-Der Tung, Wen-Chi Hou and Jiang-Hsing Chu 3. Logging Real-Time Main Memory Databases 1291 Jing Huang and Le Gruenwald 4. Managing Overlapping Features in Spatial Databse Applications 1297 Enrico Nardelli and Guido Proietti xv
10 Author Index 1304 Reviewer List 1309 xvi
Accepted List. Result Paper Id Paper Title Authors. Agile Project Management in MIS: A Case Study in A Research Institute
Oral 011 Oral 016 Oral 017 Agile Project Management in MIS: A Case Study in A Research Institute Exploring Developing Countries Immigrants Intention to Use Information Communication Technology Partial
More informationProceedings of International Conference on Distributed Systems, Software Engineering, and Database Systems
PROCEEDINGS Proceedings of International Conference on Distributed Systems, Software Engineering, and Database Systems Copyright 1996 by National Sun Yat-Sen University All rights reserved. Abstracting
More informationRoom B1. 53 Proximity Comparison Modes for Logo Design. 138 Detection of Bus Route Number via Motion and YCbCr Features
Room B1 Title June 10 08:30-10:00 53 Proximity Comparison Modes for Logo Design 75 Flood Tracking in Severe Weather 138 Detection of Bus Route Number via Motion and YCbCr Features Chen-I Huang, Shing-Sheng
More informationKuan-Wen Chen SUMMARY RESEARCH INTERESTS EDUCATION #31648
Kuan-Wen Chen Assistant Professor Department of Computer Science National Chiao Tung University Hsinchu, Taiwan +886-3-5712121#31648 kuanwen@cs.nctu.edu.tw SUMMARY Expertise in computer vision, pattern
More information104 年 03 月通過學術審查. 著作列表 Journal Papers. Conference Papers 級 :96 學年度入學, 博七
104 年 03 月通過學術審查 年 級 :96 學年度入學, 博七 著作列表 Journal Papers 1. Cheng-Yen Lin, Chung-Wen Huang, Chi-Bang Kuan, Shi-Yu Huang, and Jenq-Kuen Lee, The Design and Experiments of A SID-Based Power-Aware Simulator
More informationAuthenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem
Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Li-Chin Huang and Min-Shiang Hwang 1 Department of Computer Science and Engineering,
More information(Proceedings of the 2002 International Computer Symposium
(Proceedings of the 2002 International Computer Symposium Edited by Arbee L.P. Chen and Ruay-Shiung Chang Sponsored by Ministry of Education, R.O.C. National Science Council, R.O.C. National Dong Hwa University,
More informationCurriculum Vitae. Biography of Kuang-Hui Chi (February 2018)
Curriculum Vitae Biography of Kuang-Hui Chi (February 2018) Kuang-Hui Chi was Assistant Professor (2003 2009), Associate Professor (2009 2018), and is Professor (elevation effective since August 2017)
More information2002 International Conference on Machine Learning and Cybernetics. Proceedings Volume 3 of 4
2002 International Conference on Machine Learning and Cybernetics Proceedings Volume 3 of 4 TECHNISCHE INFORMATIO.NSBIBLIOTHEK UNIVERS1TATSBIBLIOTHEK HANNOVER November 4-5, 2002 Prime Hotel Beijing, CHINA
More informationClock Skew Based Client Device Identification in Cloud Environments
Clock Skew Based Client Device Identification in Cloud Environments Wei-Chung Teng Dept. of Computer Science & Info. Eng. National Taiwan University of Sci. & Tech. 1 Wei-Chung Teng on behalf of Assoc.
More informationOpening Speech First Lecture Room Prof. Jenq-Neng Hwang
Time Dec. 16 (Thur.) 08:30 Registration 09:00 Opening Ceremony 09:30 Opening Speech Prof. Jenq-Neng Hwang 10:20 Coffee Break Parallel Session 1 Digital Content, Digital Life, Information Security (I) E-learning,
More information2012 Conference on Technologies and Applications of Artificial Intelligence (TAAI 2012) Tainan, Taiwan November IEEE Catalog Number: ISBN:
2012 Conference on Technologies and Applications of Artificial Intelligence (TAAI 2012) Tainan, Taiwan 16 18 November 2012 IEEE Catalog Number: ISBN: CFP1224L-PRT 978-1-4673-4976-5 2012 Conference on Technologies
More informationSymposium (ICS 2010) 2010 International Computer. Pages Tainan, Taiwan December IE EC IEEE Catalog Number: CFP1029K-PRT
2010 International Computer Symposium (ICS 2010) Tainan, Taiwan - 16 18 December 2010 Pages 524-1054 IE EC IEEE Catalog Number: CFP1029K-PRT IEEE ISBN: 978-1-4244-7639-8 2/2 Parallel Session 7 Friday,
More informationProgram at a glance. Wednesday, 23 August Session 1. Session 3 (Room:Y208) ID 14 ID 17 ID 39 13:30 ID 15 ID 72 ID 53 ~ ID 26 ID 20 ID 28 15:00
Program at a glance Wednesday, 23 August Session 1 (Room:Y201) Session 2 (Room:Y202) Session 3 (Room:Y208) ID 14 ID 17 ID 39 13:30 ID 15 ID 72 ID 53 ID 26 ID 20 ID 28 15:00 ID 36 ID 38 ID 9 ID 48 ID 51
More information2002 International Conference on Machine Learning and Cybernetics. Proceedings Volume 1 of 4
2002 International Conference on Machine Learning and Cybernetics Proceedings Volume 1 of 4 TECHNISCHE INFORMATIONSBIBLiOTHEK UNIVERSITATSBiBLIOTHEK HANNOVCR November 4-5, 2002 Prime Hotel Beijing, CHINA
More informationSymposium (ICS 2010) IEEE International Computer. Pages Tainan, Taiwan December 2010 CFP1029K-PRT /2
2010 International Computer Symposium (ICS 2010) Tainan, Taiwan 16-18 December 2010 Pages 1-523 IEEE IEEE Catalog Number: ISBN: CFP1029K-PRT 978-1-4244-7639-8 1/2 Parallel Session 1 Thursday, Dec. 16,
More informationxiv Contents An Ontology-Based Herb Therapy Recommendation for Respiration System Hung-Yu Chien, Jian-Fan Chen, Yu-Yu Chen, Pei-Syuan Lin, Yi-Ti
Contents Multimedia Security and Its Applications A Survey of Reversible Data Hiding Schemes Based on Two-Dimensional Histogram Modification... 3 Chin-Feng Lee, Jau-Ji Shen, and Yu-Hua Lai Steganographic
More informationComparative Analysis of Smart Card Authentication Schemes
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. IV (Jan. 2014), PP 91-97 Comparative Analysis of Smart Card Authentication Schemes Toshi jain
More information2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China December 2008
2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China 13-15 December 2008 IEEE Catalog Number: ISBN: CFP0881F-PRT 978-1-4244-3427-5 TABLE OF CONTENTS
More informationCurriculum Vitae Rong-Hao Liang
Curriculum Vitae Rong-Hao Liang Address: 3F., No.10, Aly. 3, Ln. 423, Zhuangjing Rd., Xinyi Dist., Taipei City 110, Taiwan Mobile: +31-6-27264425 (NL)/ +886-911-451827 (TW) Website: http://ronghaoliang.me
More informationQingdao, , China. China. Keywords: Deep sea Ultrahigh pressure, Water sound acquisition, LabVIEW, NI PXle hardware.
2016 International Conference on Control and Automation (ICCA 2016) ISBN: 978-1-60595-329-8 Research and Design on Water Sound Acquisition System of Deep Sea Ultrahigh Pressure Environment Gang TONG 1,
More information2016 International Computer Symposium (ICS 2016)
2016 International Computer Symposium (ICS 2016) Chiayi, Taiwan 15-17 December 2016 IEEE Catalog Number: ISBN: CFP1629K-POD 978-1-5090-3439-0 Copyright 2016 by the Institute of Electrical and Electronics
More informationThe University of Hong Kong Department of Electrical and Electronic Engineering CE/EComE/EE/InfoE Technical Project Presentation Time-table 2010/11
To: All EEE & CS Teaching Staff From Dr. W. H. Lam (EEE) The University of Hong Kong Department of Electrical and Electronic Engineering CE/EComE/EE/InfoE Technical Project Presentation Time-table 2010/11
More informationZhi-Quan Luo Electrical and Computer Engineering
Sun, Ruoyu, and Zhi-Quan Luo. 2015. Interference alignment using finite and dependent channel extensions: The single beam case. IEEE Transactions on Information Theory 61 (1) (JAN 01): 239-55. Baligh,
More information4>IEEE. Computer, Consumer and Control (IS3C 2012) 2012 International Symposium on. Taichung, Taiwan. 4-6 June 2012
2012 International Symposium on Computer, Consumer and Control (IS3C 2012) Taichung, Taiwan 4-6 June 2012 4>IEEE IEEE Catalog Number: CFP1222S-PRT ISBN: 978-1-4673-0767-3 2012 International Symposium on
More informationContents Part I: Mathematics and Fuzziness Bipolar Fuzzy BRK-ideals in BRK-algebras... 3 Khizar Hayat, Xiao-Chu Liu, and Bing-Yuan Cao A New Approach for Solving Fuzzy Supplier Selection Problems Under
More information[30] Dong J., Lou j. and Yu L. (2003), Improved entropy coding method, Doc. AVS Working Group (M1214), Beijing, Chaina. CHAPTER 4
[30] Dong J., Lou j. and Yu L. (3), Improved entropy coding method, Doc. AVS Working Group (M1214), Beijing, Chaina. CHAPTER 4 Algorithm for Implementation of nine Intra Prediction Modes in MATLAB and
More informationMetamorphic Animation of Plant-like Fractal Images Based on a Family of Transitional IFS Code Sets Approach
Metamorphic Animation of Plant-like Fractal Images Based on a Family of Transitional IFS Code Sets Approach Tedjo Darmanto STMIK AMIK Bandung tedjodarmanto@gmail.com Iping Supriana Suwardi STEI ITB iping@informatika.org
More informationA Test Sequence Generation Method Based on Dependencies and Slices Jin-peng MO *, Jun-yi LI and Jian-wen HUANG
2017 2nd International Conference on Advances in Management Engineering and Information Technology (AMEIT 2017) ISBN: 978-1-60595-457-8 A Test Sequence Generation Method Based on Dependencies and Slices
More informationResearch on Heterogeneous Communication Network for Power Distribution Automation
3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG
More informationArbee L.P. Chen ( 陳良弼 )
Arbee L.P. Chen ( 陳良弼 ) Asia University Taichung, Taiwan EDUCATION Phone: (04)23323456x1011 Email: arbee@asia.edu.tw - Ph.D. in Computer Engineering, Department of Electrical Engineering, University of
More informationCurriculum Vitae Rong-Hao Liang
Curriculum Vitae Rong-Hao Liang Address: Hartelstein 37, 5655AJ, Eindhoven, North Brabant, The Netherlands Mobile: +31-6-27264425 (NL) Website: http://ronghaoliang.me Email: r.liang@tue.nl Dr. Rong-Hao
More information2009 International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR 2009) Baoding, China July IEEE Catalog Number: ISBN:
2009 International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR 2009) Baoding, China 12-15 July 2009 IEEE Catalog Number: ISBN: CFP0919C-PRT 978-1-4244-3728-3 Copyright 2009 by the Institute
More informationProceedings of 2005 International Conference On Machine Learning and Cybernetics. Volume 9 of 9
t»f JT A If I Otemational Viz I iversify in Girminy Proceedings of 2005 International Conference On Machine Learning and Cybernetics Volume 9 of 9 August 18-21, 2005 Ramada Hotel Guangzhou, China IEEE
More information2015 International Conference on Fuzzy Theory and Its Applications (ifuzzy 2015)
International Conference on Fuzzy Theory and Its Applications ( ) Yilan, Taiwan 18-20 November IEEE Catalog Number: ISBN: CFP1522T-POD 978-1-4673-6571-0 Copyright by the Institute of Electrical and Electronic
More information資訊科學研究所. 王大為 (Wang, Da-Wei)
資訊科學研究所 王大為 (Wang, Da-Wei) Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, Jeremy K.-P Chen "Value versus damage of information release: A data privacy perspective," in International Journal of Approximate
More informationIn the City Part 6 MANDARIN. ENGLISH Ni hao wo jiao zhou zhou. Hello. My name is Jojo Ni hao lu lu. Hello Lulu. Ni hao zhou zhou. Ni hao ma?
Ni hao wo jiao zhou zhou. _ Hello. My name is Jojo Ni hao lu lu. _ Hello Lulu. Ni hao zhou zhou. Ni hao ma? _ Hello Jojo. How are you? Wo lei le. _ I'm tired. Wo men xiao shui yi xia ba. _ Let's take a
More informationifuzzy 2016 Program Schedule
ifuzzy 2016 Program Schedule Session Name: Best Student Paper Competition (I) Time:08:45-10:15 Nov.9, 2016 WEA01 #1007 A Research on Improved PDFF Controller for the Permanent Magnet Synchronous Motor
More informationAn Efficient Biometrics-based Remote User Authentication Scheme Using Smart Cards
An Efficient Biometrics-based Remote User Authentication Scheme Using Smart Cards Chun-Ta Li 1 and Min-Shiang Hwang 2 1 Department of Information Management, Tainan University of Technology, 529 Jhong
More informationJAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).
JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An
More informationFish4Knowledge Deliverable D4.1. Video and RDF Store, plus access
Fish4Knowledge Video and RDF Store, plus access Principal Author: H.M Chou Contributors: NARL Dissemination: PU Abstract: WP4.1 has two key objectives: to maintain a sustainable data capturing system which
More informationInternational Symposium on Parallel and Distributed Processing with Applications ISPA Table of Contents
International Symposium on Parallel and Distributed Processing with Applications ISPA 2010 Table of Contents Message from General Chair...xiii Organizing Committee...xv Program Committee...xvi Cluster,
More informationDevelopment of a Rapid Design System for Aerial Work Truck Subframe with UG Secondary Development Framework
Available online at www.sciencedirect.com Procedia Engineering 15 (2011) 2961 2965 Advanced in Control Engineering and Information Science Development of a Rapid Design System for Aerial Work Truck Subframe
More information林嘉文著作目錄. Journal Special Issues Edited: Refereed Journal Papers: Published/Accepted:
Journal Special Issues Edited: 林嘉文著作目錄 [S1] Luming Zhang *, Zhigang Ma, Yahong Han, Luca Marchesotti, and Chia-Wen Lin, Special Issue on Aesthetically-Aware Image and Video Analysis, EURASIP Signal processing:
More informationIntuitionistic Fuzzy Petri Nets for Knowledge Representation and Reasoning
Intuitionistic Fuzzy Petri Nets for Knowledge Representation and Reasoning Meng Fei-xiang 1 Lei Ying-jie 1 Zhang Bo 1 Shen Xiao-yong 1 Zhao Jing-yu 2 1 Air and Missile Defense College Air Force Engineering
More informationresult, it is very important to design a simulation system for dynamic laser scanning
3rd International Conference on Multimedia Technology(ICMT 2013) Accurate and Fast Simulation of Laser Scanning Imaging Luyao Zhou 1 and Huimin Ma Abstract. In order to design a more accurate simulation
More informationHao-Hua (Hao) Chu. Computer Science, National Taiwan University, Taipei, Taiwan Associate Professor
Hao-Hua (Hao) Chu Room 518 Dept of Computer Science & Information Engineering National Taiwan University #1 Roosevelt Road, Section 4, Taipei, Taiwan, 106 EDUCATION University of Illinois at Urbana Champaign,
More informationA NEW CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME BASED ON THE ELGAMAL CRYPTOSYSTEM
International Journal of Foundations of Computer Science Vol. 20, No. 2 (2009) 351 359 c World Scientific Publishing Company NEW CONVERTIBLE UTHENTICTED ENCRYPTION SCHEME BSED ON THE ELGML CRYPTOSYSTEM
More informationReclaim wafer defect classification using Large-scale BPNs with. TensorFlow
Reclaim wafer defect classification using Large-scale BPNs with TensorFlow Fang-Chih Tien Department of Industrial Engineering & Management National Taipei University of Technology (Taipei Tech), Taipei,
More informationStudy on Digitized Measuring Technique of Thrust Line for Rocket Nozzle
Study on Digitized Measuring Technique of Thrust Line for Rocket Nozzle Lijuan Li *, Jiaojiao Ren, Xin Yang, Yundong Zhu College of Opto-Electronic Engineering, Changchun University of Science and Technology,
More informationRoutability-Driven Bump Assignment for Chip-Package Co-Design
1 Routability-Driven Bump Assignment for Chip-Package Co-Design Presenter: Hung-Ming Chen Outline 2 Introduction Motivation Previous works Our contributions Preliminary Problem formulation Bump assignment
More informationISSCC 2006 / SESSION 22 / LOW POWER MULTIMEDIA / 22.1
ISSCC 26 / SESSION 22 / LOW POWER MULTIMEDIA / 22.1 22.1 A 125µW, Fully Scalable MPEG-2 and H.264/AVC Video Decoder for Mobile Applications Tsu-Ming Liu 1, Ting-An Lin 2, Sheng-Zen Wang 2, Wen-Ping Lee
More informationAn improved energy Minimum Connected Dominating Sets Construction Algorithm in MANET Zifen YANG 1, a, Guoqiang LI 1, b Li LIU 1, c
International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) An improved energy Minimum Connected Dominating Sets Construction Algorithm in MANET Zifen YANG 1,
More information2002 International Conference on Machine Learning and Cybernetics. Proceedings Volume 4 of 4
2002 International Conference on Machine Learning and Cybernetics Proceedings Volume 4 of 4 TECHNISCHE INFORMAT1ONSBIDLIGTHEK UNIVERSITATSBIBLIOTHEK HANNOVER November 4-5, 2002 Prime Hotel Beijing, CHINA
More informationA Method of Identifying the P2P File Sharing
IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications
More informationBlind Signature Scheme Based on Elliptic Curve Cryptography
Blind Signature Scheme Based on Elliptic Curve Cryptography Chwei-Shyong Tsai Min-Shiang Hwang Pei-Chen Sung Department of Management Information System, National Chung Hsing University 250 Kuo Kuang Road.,
More informationThe Design of Electronic Color Screen Based on Proteus Visual Designer Ting-Yu HOU 1,a, Hao LIU 2,b,*
2016 Joint International Conference on Service Science, Management and Engineering (SSME 2016) and International Conference on Information Science and Technology (IST 2016) ISBN: 978-1-60595-379-3 The
More informationResearch Issues and Challenges for Multiple Digital Signatures
INTERNATION JOURNAL OF NETWORK SECURITY, VOL.1, NO.1,PP. 1-6, 2005 1 Research Issues and Challenges for Multiple Digital Signatures Min-Shiang Hwang, and Cheng-Chi Lee, Abstract In this paper, we survey
More information資訊科學研究所 王大為 (WANG, DA-WEI) 王柏堯 (WANG, BOW-YAW) 王新民 (WANG, HSIN-MIN) 學術會議 ( 研討會 ) 論文
資訊科學研究所 王大為 (WANG, DA-WEI) K. Chen, T.-s. Hsu, W.K. Huang, C.J. Liau and D.W. Wang, 2012, Towards a scripting language for automating secure multiparty computation, paper presented at 2012 Asia-Pacific
More informationA Feasible Power Saving Scheduling Approach in WiMAX e Networks
A Feasible Power Saving Scheduling Approach in WiMAX 802.16e Networks WEN-CHUAN HUANG Department of Computer Science and Information Engineering Tamkang University No.151, Yingzhuan Rd., Tamsui District,
More informationThe University of Hong Kong Department of Electrical and Electronic Engineering EComE/EE/InfoE Technical Project Presentation Time-table 2009/10
The University of Hong Kong Department of Electrical and Electronic Engineering /EE/InfoE Technical Project Presentation Time-table 2009/10 To: All EEE & CS Teaching Staff From Dr. W. H. Lam (EEE) (N.
More informationA Hierarchical Bin-Based Legalizer for Standard-Cell Designs with Minimal Disturbance
A Hierarchical Bin-Based Legalizer for Standard- Designs with Minimal Disturbance Yu-Min Lee, Tsung-You Wu, and Po-Yi Chiang Department of Electrical Engineering National Chiao Tung University ASPDAC,
More informationDesign of a Lattice-based Access Control Scheme
Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Design of a Lattice-based Access Control Scheme Chia-Chu Chiang 1, Coskun Bayrak
More informationComputer, Consumer and Control
2014 International Symposium on Computer, Consumer and Control (IS3C 2014) Taichung, Taiwan - 10 12 June 2014 Pages 1-649 IEEE Catalog Number: CFP1422S-POD ISBN: 978-1-4799-5278-6 1/2 2014 International
More informationLegal Entity: AMET Education Street Address: 6F - 5, No 17, Sec 1, Chengde Road., Datong District Taipei 103. Agents in Taiwan 1
TAIWAN Academic Asia Taiwan - Taipei Office Website: www.aat96.com.tw Email: aat96@ms6.hinet.net Principal Agent: Carol Hung Contact Name: Carol Hung/Sandy Tung Phone Number: + 886 2 2777 4188 Legal Entity:
More informationVirtualization Techniques for ARM Processors (NSC)
Yeh-Ching Chung, Professor School of Science and Engineering, Chinese University of Hong Kong in Shenzhen Shenzhen, Guangdong, China +86-185-7673-9791 ychung@cuhk.edu.cn Research Interests Cloud-Fog Computing:
More informationThe Research of Delay Characteristics in CAN Bus Networked Control System
Journal of Computational Information Systems 9: 18 (2013) 7517 7523 Available at http://www.jofcis.com The Research of Delay Characteristics in CAN Bus Networked Control System Yi WANG 1, Liren HE 2, Ming
More informationNon-Rectangular Shaping and Sizing of Soft Modules for Floorplan Design Improvement
Non-Rectangular Shaping and Sizing of Soft Modules for Floorplan Design Improvement Chris C.N. Chu and Evangeline F.Y. Young Abstract Many previous works on floorplanning with non-rectangular modules [,,,,,,,,,,,
More informationA parallel algorithm for generating chain code of objects in binary images
Information Sciences 149 (2003) 219 234 www.elsevier.com/locate/ins A parallel algorithm for generating chain code of objects in binary images Tsorng-Lin Chia a, *, Kuang-Bor Wang a, Lay-Rong Chen b, Zen
More informationAdopting Data Mining Techniques on the Recommendations of Library Collections
Adopting Data Mining Techniques on the Recommendations of Library Collections Shu-Meng Huang a, Lu Wang b and Wan-Chih Wang c a Department of Information Management, Hsing Wu College, Taiwan (simon@mail.hwc.edu.tw)
More information2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2014) Kitakyushu, Japan 27-29 August 2014 IEEE Catalog Number: ISBN: CFP14IIH-POD 978-1-4799-5391-2
More informationDefect Inspection of Liquid-Crystal-Display (LCD) Panels in Repetitive Pattern Images Using 2D Fourier Image Reconstruction
Defect Inspection of Liquid-Crystal-Display (LCD) Panels in Repetitive Pattern Images Using D Fourier Image Reconstruction Du-Ming Tsai, and Yan-Hsin Tseng Department of Industrial Engineering and Management
More informationA Compatible Public Service Platform for Multi-Electronic Certification Authority
Applied Mechanics and Materials Submitted: 2014-04-26 ISSN: 1662-7482, Vol. 610, pp 579-583 Accepted: 2014-05-26 doi:10.4028/www.scientific.net/amm.610.579 Online: 2014-08-11 2014 Trans Tech Publications,
More informationResearch on the Knowledge Representation Method of Instance Based on Functional Surface
5th International Conference on Advanced Engineering Materials and Technology (AEMT 2015) Research on the Knowledge Representation Method of Instance Based on Functional Surface Pengjie Zhai a, Changqing
More informationPerformance-Preserved Analog Routing Methodology via Wire Load Reduction
Electronic Design Automation Laboratory (EDA LAB) Performance-Preserved Analog Routing Methodology via Wire Load Reduction Hao-Yu Chi, Hwa-Yi Tseng, Chien-Nan Jimmy Liu, Hung-Ming Chen 2 Dept. of Electrical
More informationJyun-Yu Jiang. Room 3551, Boelter Hall, Department of Computer Science. University of California, Los Angeles, California, United States
Jyun-Yu Jiang 姜俊宇 Room 3551, Boelter Hall, Department of Computer Science University of California Los Angeles, CA 90095, United States jyunyu@cs.ucla.edu http://jyunyu.csie.org/ +1-213-378-3894 (mobile)
More informationOn The Method and Performance Evaluation of A Hybrid Mesh-Tree Topology
Appl. Math. Inf. Sci. 6. 2S pp. 547S-551S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. On The Method and Performance Evaluation
More informationEEE LAB SAFETY REPRESENTATIVE (LSR)
Cluster C2 LIM Siew Peng Tel: 6790-5476 Email: esplim@ntu.edu.sg SEOW Yong Hing, William Tel: 6790-6511 Email: eyhseow@ntu.edu.sg TAY Boo Thong Tel: 6790-5464 Email: ebttay@ntu.edu.sg QUEK-GAN Siew Kim
More informationLARGE-VOCABULARY CHINESE TEXT/SPEECH INFORMATION RETRIEVAL USING MANDARIN SPEECH QUERIES
LARGE-VOCABULARY CHINESE TEXT/SPEECH INFORMATION RETRIEVAL USING MANDARIN SPEECH QUERIES Bo-ren Bai 1, Berlin Chen 2, Hsin-min Wang 2, Lee-feng Chien 2, and Lin-shan Lee 1,2 1 Department of Electrical
More informationOptimization of HMM by the Tabu Search Algorithm
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 20, 949-957 (2004) Optimization of HMM by the Tabu Search Algorithm TSONG-YI CHEN, XIAO-DAN MEI *, JENG-SHYANG PAN AND SHENG-HE SUN * Department of Electronic
More informationThe Improved WCMRP Protocol for Mobile Wireless Sensor Networks
152 JOURNAL OF COMMUNICATIONS, VOL. 6, NO. 2, APRIL 2011 The Improved WCMRP Protocol for Mobile Wireless Sensor Networks Ming Huang Guo Department of Information Management, Shih-Hsin University, Taipei,
More informationAn Efficient and Secure Multi-server Smart Card based Authentication Scheme
An Efficient Secure Multi-server Smart Card based Authentication Scheme Toshi Jain Department of r Science Engineering Oriental Institute of Science & Technology Bhopal, India Seep Pratap Singh Department
More informationCase3:09-cr SI Document948-1 Filed09/11/12 Page29 of 199. Exhibit B
Case3:09-cr-00110-SI Document948-1 Filed09/11/12 Page29 of 199 Exhibit B Case3:09-cr-00110-SI Document948-1 Filed09/11/12 Page30 of 199 Case3:09-cr-00110-SI Document948-1 Filed09/11/12 Page31 of 199 Case3:09-cr-00110-SI
More informationDesign of Miniaturized Optical Image Stabilization and Autofocusing Camera Module for Cellphones
Sensors and Materials, Vol. 29, No. 7 (2017) 989 995 MYU Tokyo 989 S & M 1390 Design of Miniaturized Optical Image Stabilization and Autofocusing Camera Module for Cellphones Yu-Hao Chang, Chieh-Jung Lu,
More informationAdaptive Steganography Method Based on Two Tiers Pixel Value Differencing
Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing Chi-Yao Weng 1, Yen-Chia Huang 1, Chin-Feng Lee 2(&), and Dong-Peng Lin 2 1 Department of Computer Science, National Pingtung University,
More informationA Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks
Appl. Math. Inf. Sci. 6 No. 2S pp. 713S-719S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. A Reduce Identical Composite Event Transmission
More informationBaseball Game Highlight & Event Detection
Baseball Game Highlight & Event Detection Student: Harry Chao Course Adviser: Winston Hu 1 Outline 1. Goal 2. Previous methods 3. My flowchart 4. My methods 5. Experimental result 6. Conclusion & Future
More informationThu-I-R1 (Auditorium II) Session: Intelligent Systems I Session Chair(s) Chih-Min Lin / Hung-Ching Lu Paper ID Paper Title Authors
Wed-I-R1 (Auditorium II) Session: Systems Modeling, Tools and Simulation Session Chair(s) Bor-Tsuen Wang / Vai Kuong Sin 4 Enhanced Converged IP Client System Design by Using Theory of Inventive Problem
More informationGenerating Tool Paths for Free-Form Pocket Machining Using z-buffer-based Voronoi Diagrams
Int J Adv Manuf Technol (1999) 15:182 187 1999 Springer-Verlag London Limited Generating Tool Paths for Free-Form Pocket Machining Using z-buffer-based Voronoi Diagrams Jaehun Jeong and Kwangsoo Kim Department
More informationResearch Proposal: Computational Geometry with Applications on Medical Images
Research Proposal: Computational Geometry with Applications on Medical Images MEI-HENG YUEH yueh@nctu.edu.tw National Chiao Tung University 1 Introduction My research mainly focuses on the issues of computational
More informationAn efficient face recognition algorithm based on multi-kernel regularization learning
Acta Technica 61, No. 4A/2016, 75 84 c 2017 Institute of Thermomechanics CAS, v.v.i. An efficient face recognition algorithm based on multi-kernel regularization learning Bi Rongrong 1 Abstract. A novel
More informationSearching and Card Production in CJK350 and CJK Plus Systems
Journal of East Asian Libraries Volume 1993 Number 98 Article 6 2-1-1993 Searching and Card Production in CJK350 and CJK Plus Systems Hsi-chu Bolick Follow this and additional works at: https://scholarsarchive.byu.edu/jeal
More informationPartial. Name of Bankrupt(s) & Firms. Identity Number
NOTICE TO CREDITORS BY TRUSTEE UNDER SECTION 30A(5) OF THE BANKRUPTCY ORDINANCE (CHAPTER 6) IN THE HIGH COURT OF THE HONG KONG SPECIAL ADMINISTRATIVE REGION COURT OF FIRST INSTANCE IN BANKRUPTCY PROCEEDINGS
More informationAn Introduction to Pattern Recognition
An Introduction to Pattern Recognition Speaker : Wei lun Chao Advisor : Prof. Jian-jiun Ding DISP Lab Graduate Institute of Communication Engineering 1 Abstract Not a new research field Wide range included
More informationSPATIAL BIAS CORRECTION BASED ON GAUSSIAN KERNEL FUZZY C MEANS IN CLUSTERING
SPATIAL BIAS CORRECTION BASED ON GAUSSIAN KERNEL FUZZY C MEANS IN CLUSTERING D.Vanisri Department of Computer Technology Kongu Engineering College, Perundurai, Tamilnadu, India vanisridd@gmail.com Abstract
More informationQuality Enhancement of Compressed Video via CNNs
Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN 2073-4212 Ubiquitous International Volume 8, Number 1, January 2017 Quality Enhancement of Compressed Video via CNNs Jingxuan
More informationEfficient and Load-Balance Overlay Multicast Scheme with Path Diversity for Video Streaming
Efficient and Load-Balance Overlay Multicast Scheme with Path Diversity for Video Streaming Chao-Lieh Chen 1, Jeng-Wei Lee 2, Jia-Ming Yang 2, and Yau-Hwang Kuo 2 1 Department of Electronic Engineering,
More informationUSING AN IR SENSOR MODULE TO REDUCE THE STANDBY POWER CONSUMPTION OF A PC MONITOR
6th IEEE Canadian Conference Of Electrical And Computer Engineering (CCECE) USING AN IR SENSOR MODULE TO REDE THE STANDBY POWER CONSUMPTION OF A PC MONITOR Cheng-Hung Tsai*, Ying-Wen Bai**, Yen-Wen Lin**,
More informationB. System Model A (homogeneous multiprocessor system is composed
A Module Scheduling for Multiprocessor System Based on Memetic Algorithms Surinder Kumar Department of Mathematics, S.G.G.S College, Sec-26, Chandigarh, India Abstract: - In multiprocessor systems, an
More informationAn Efficient Tree-based Fuzzy Data Mining Approach
150 International Journal of Fuzzy Systems, Vol. 12, No. 2, June 2010 An Efficient Tree-based Fuzzy Data Mining Approach Chun-Wei Lin, Tzung-Pei Hong, and Wen-Hsiang Lu Abstract 1 In the past, many algorithms
More information