Time complexity analysis of an evolutionary algorithm for finding nearly maximum cardinality matching Jun HeXin Yao Artificial Intelligence Pages: 450 - 458
Model checking real-time value-passing systems Jing ChenZi-Ning Cao Artificial Intelligence Pages: 459 - 471
Binary-coding-based ant colony optimization and its convergence Tian-Ming BuSong-Nian YuHui-Wei Guan Artificial Intelligence Pages: 472 - 478
Chinese question-answering system Gai-Tai HuangHsiu-Hsen Yao Artificial Intelligence Pages: 479 - 488
Learning-based tracking of complex non-rigid motion Qiang WangHai-Zhou AiGuang-You Xu Pattern Recognition and Image Processing Pages: 489 - 500
New algorithm for 3D facial model reconstruction and its application in virtual reality Rong-Hua LiangZhi-Geng PanChun Chen Pattern Recognition and Image Processing Pages: 501 - 509
Efficient fingerprint matching algorithm for Integrated Circuit Cards Jian-Wei YangLi-Feng LiuTian-Zi Jiang Pattern Recognition and Image Processing Pages: 510 - 520
Robust mesh smoothing Guo-Fei HuQun-Sheng PengA. R. Forrest Pattern Recognition and Image Processing Pages: 521 - 528
Realistic modeling and animation of human body based on scanned data Yong-You MaHui ZhangShou-Wei Jiang Pattern Recognition and Image Processing Pages: 529 - 537
Printed Arabic character recognition using HMM Abbas H. HassinXiang-Long TangWei Zhao Pattern Recognition and Image Processing Pages: 538 - 543
New multipole method for 3-D capacitance extraction Zhao-Zhi YangZe-Yi Wang Pattern Recognition and Image Processing Pages: 544 - 549
New semantic model for authentication protocols in ASMs Rui XueDeng-Guo Feng Information Security Pages: 555 - 563
Practical secret sharing scheme realizing generalized adversary structure Yuan-Bo GuoJian-Feng Ma Information Security Pages: 564 - 569
Digital multi-signature scheme based on the Elliptic Curve cryptosystem Tzer-Shyong ChenKuo-Hsuan HuangYu-Fang Chung Information Security Pages: 570 - 573