| − | Enhancing security for face recognition systems
YiCheng Feng |
| − | Writer identification using Hidden Markov Tree
Model ZhenYu He |
| − | On The Solution to Singular Integral Equations
with Logarithmic Kernel Based on Wavelet LiMin Cui |
| − | Data Hiding on Polygonal Meshes for Authentication
and Content Annotation HaoTian Wu |
| − | Solving Large-Scale POMDP Problems Via Belief
State Analysis Xin Li |
| − | Privay Measure and Active Learning
Xiaofeng Zhang |
| − | A New Approach to Mobile Location Estimation
within a Radio Cellular Network JunYang Zhou |
| − | Processing Precision-Constrained Approximate
Queries in Wireless Sensor Networks MinJi Wu |
| − | Algorithm to support Temporal Consistency of
Sensor Data for Transaction Processing Applications in
Broadcast Environments ChuiYing Hui |
| − | Learning Regularized Optimal Ensembles of Classifiers
ZhiLi Wu |
| − | Dissimilarity learning for nominal data ChiWa Cheng |
| − | Intelligent Agents in Resources Allocation KaFung Ng |
| − | Lightweight Piggybacking for Packet Loss Recovery
in Internet Telephony WingYan Chow |
| − | The Client-Based Framework For Privacy-Preserving
Location-Based Data Access Jing Du |
| − | An Adaptive Controller to Guarantee Proportional
Delay Differentiation on Clustered Web Servers KaHo Chan |
| − | Studies on Location Estimation in Environments ManChung Yeung |