no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Adaptive Rough Entropy Clustering Algorithms in Image Segmentation
|
Małyszko, Dariusz |
|
2010 |
98 |
2-3 |
p. 199-231 |
article |
2 |
Capacity-Raising Steganography Using Multi-Pixel Differencing and Pixel-Value Shifting Operations
|
Yang, Cheng-Hsing |
|
2010 |
98 |
2-3 |
p. 321-336 |
article |
3 |
Design of a Hybrid Quantizer with Variable Length Code
|
Perić, Zoran H. |
|
2010 |
98 |
2-3 |
p. 233-256 |
article |
4 |
Deterministic and Unambiguous Families within Recognizable Two-dimensional Languages
|
Anselmo, Marcella |
|
2010 |
98 |
2-3 |
p. 143-166 |
article |
5 |
Feature Selection via Maximizing Fuzzy Dependency
|
Hu, Qinghua |
|
2010 |
98 |
2-3 |
p. 167-181 |
article |
6 |
Free-Choice Petri Nets without Frozen Tokens, and Bipolar Synchronization Systems
|
Wehler, Joachim |
|
2010 |
98 |
2-3 |
p. 283-320 |
article |
7 |
Learning Behaviors of Functions
|
Kalyanasundaram, Bala |
|
2010 |
98 |
2-3 |
p. 183-198 |
article |
8 |
On the Insecurity of an Identity Based Proxy Re-encryption Scheme
|
Wang, Xu An |
|
2010 |
98 |
2-3 |
p. 277-281 |
article |
9 |
Tree Structure Based Data Hiding for Progressive Transmission Images
|
Tsai, Piyu |
|
2010 |
98 |
2-3 |
p. 257-275 |
article |