default search action
Journal of Information Science and Engineering, Volume 29
Volume 29, Number 1, January 2013
- Mohcine Madkour, Driss El Ghanami, Abdelilah Maach:
Context-Aware Service Adaptation: An Approach Based on Fuzzy Sets and Service Composition. 1-16 - Antonio González Torres, Francisco J. García-Peñalvo, Roberto Therón:
How Evolutionary Visual Software Analytics Supports Knowledge Discovery. 17-34 - Tae-Chang Jee, Hyunjin Lee, Yillbyung Lee:
Visualization of Document Retrieval using External Cluster Relationship. 35-48 - Najmeh Sadat Jaddi, Salwani Abdullah:
Nonlinear Great Deluge Algorithm for Rough Set Attribute Reduction. 49-62 - Yong Soo Kim:
Recommender System Based on Product Taxonomy in E-Commerce Sites. 63-78 - Kwanghoon Pio Kim:
Discovering Activity-Performer Affiliation Knowledge on ICN-based Workflow Models. 79-97 - Man Yuan, Yuanxin Ouyang, Zhang Xiong:
A Text Categorization Method using Extended Vector Space Model by Frequent Term Sets. 99-114 - Insoon Jo, Eunjin Jung, Heon Young Yeom:
Interactive Website Filter for Safe Web Browsing. 115-131 - Alberto Heredia, Javier García Guzmán, Antonio Amescua, María Isabel Sánchez Segura:
Interactive Knowledge Asset Management: Acquiring and Disseminating Tacit Knowledge. 133-147
- Tse-Hsien Wang, Bing-Yu Chen, Rung-Huei Liang:
Interactive Dynamic Background Scene Generator Based on Limited Input Motions. 149-163 - Jeng-Wei Lin, Tun Wei Wang, Ray-I Chang:
Optimal Schedule on Message Broadcast Tree in Structured Peer-to-Peer Networks. 165-182
Volume 29, Number 2, March 2013
- Jeng-Jung Wang, Tung-Yang Ho, Ting-Yi Sung, Ming-Yi Ju:
Changing the Diameter in a Diagonal Mesh Network. 193-208 - Deqing Wang, Hui Zhang:
Inverse-Category-Frequency based Supervised Term Weighting Schemes for Text Categorization. 209-225 - Huafeng Li, Yi Chai, Rui Ling, Hongpeng Yin:
Multifocus Image Fusion Scheme Using Feature Contrast of Orientation Information Measure in Lifting Stationary Wavelet Domain. 227-247 - Hung-Yu Chien, Tzong-Chen Wu, Ming-Kuei Yeh:
Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol Resistant to Password Guessing Attacks. 249-265 - Muhammad Hussain:
Volume and Normal Field Based Simplification of Polygonal Models. 267-279 - Donghyun Choi, Hanjae Jeong, Dongho Won, Seungjoo Kim:
Hybrid Key Management Architecture for Robust SCADA Systems. 281-298 - Congfeng Jiang, Jian Wan, Xianghua Xu, Jilin Zhang, Xindong You:
Resource Allocation in Contending Virtualized Environments through Stochastic Virtual Machine Performance Modeling and Feedback. 299-327 - Wei Li, Qiuqi Ruan, Jun Wan:
Fuzzy Nearest Feature Line-based Manifold Embedding for Facial Expression Recognition. 329-346 - Duan-Yu Chen, Jeng-Tsung Tsai:
Intelligent Face-Based Mobile Images Categorization. 347-360
- Yu-Chih Wang, Kai-Yuan Lin, Pau-Choo Chung:
3D Reconstruction of Piecewise Planar Models from Multiple Views Utilizing Coplanar and Region Constraints. 361-378 - Jin-Seo Park, Se-Jong Oh:
A New Concave Hull Algorithm and Concaveness Measure for n-dimensional Datasets. 379-392
Volume 29, Number 3, May 2013
- Yu Gu, Ge Yu, Na Guo:
Triggered Moving Range Queries over RFID Monitored Objects. 401-416 - Yu-Cheng Hsiao, Gwan-Hwan Hwang:
Chinese Wall Security Model for Workflow Management Systems with Dynamic Security Policy. 417-440 - Yen-Ching Lin, Tzong-Chen Wu, Jia-Lun Tsai:
ID-Based Aggregate Proxy Signature Scheme Realizing Warrant-Based Delegation. 441-457 - Jianhong Zhang, Zhibin Sun:
An ID-Based Server-Aided Verification Short Signature Scheme Avoid Key Escrow. 459-473 - Jung-Sing Jwo, Tien-Song Hsu, Yu Chin Cheng:
Jumpstarting Application Lifecycle Management: A New Approach with Tool Support. 475-492 - Chun-Kai Lai, Yu-Jen Huang, Jin-Fu Li:
A Self-Repair Technique for Content Addressable Memories with Address-Input-Free Writing Function. 493-507 - Tan-Chi Ho, Jung-Hong Chuang:
A Simple Yet Effective User Controllable Mesh Simplification. 509-525 - Yu-Chun Lai, Yu-Ming Liang, Sheng-Wen Shih, Cheng-Chung Lin, Hong-Yuan Mark Liao:
Linear Production Game Solution to a PTZ Camera Network. 527-543 - Nan-Cheng Lai, Sying-Jyan Wang:
Delay Test with Embedded Test Pattern Generator. 545-556 - HaRim Jung, Yong-Sung Kim, Yon Dohn Chung:
SPQI: An Efficient Index for Continuous Range Queries in Mobile Environments. 557-578 - Xue Yuan, Yifei Meng, Xue-Ye Wei:
Illumination Normalization Based on Homomorphic Wavelet Filtering for Face Recognition. 579-594 - Jongwoo Bae, Jinsoo Cho:
High-Performance VLSI Architecture of H.264/AVC CAVLD by Parallel Run_before Estimation Algorithm. 595-605
Volume 29, Number 4, July 2013
- Wen-Teng Yang, Hung-Yu Kao:
Measuring Semantic Relatedness using Wikipedia Signed Network. 615-630 - Tai-Yu Ma:
A Hybrid Cross Entropy Algorithm for Solving Dynamic Transit Network Design Problem. 631-645 - Hui-Hsin Wu, Angela Charng-Rurng Tsai, Richard Tzong-Han Tsai, Jane Yung-jen Hsu:
Building a Graded Chinese Sentiment Dictionary Based on Commonsense Knowledge for Sentiment Analysis of Song Lyrics. 647-662 - Yoshimasa Ohmoto, Divesh Lala, Hiroyasu Saiga, Hiroki Ohashi, Shingo Mori, Kae Sakamoto, Kazumi Kinoshita, Toyoaki Nishida:
Design of Immersive Environment for Social Interaction Based on Socio-Spatial Information and the Applications. 663-679 - Guo-Yuan Qiu, Shih-Hung Wu:
The Evolutionary Locomotion of Tripedal and Quadrupedal Biomorphic Robots. 681-693 - Tzai-Der Wang, Colin Fyfe:
Visualising Temporal Data Using Reservoir Computing. 695-709 - Anshika Pal:
Coordinated Multi-Robot Exporation under Connectivity Constraints. 711-727 - Wei-Tyng Hong:
Minimum Classification Error Training of Hidden Conditional Random Fields for Speech and Speaker Recognition. 729-742 - Chien-Liang Chen, Chao-Lin Liu, Yuan-Chen Chang, Hsiang-Ping Tsai:
Opinion Mining for Relating Subjective Expressions and Annual Earnings in US Financial Statements. 743-764
- Cunhe Li, Guoqiang Shi:
Improvement of Learning Algorithm for the Multi-instance Multi-label RBF Neural Networks Trained with Imbalanced Samples. 765-776 - Qiang Dong:
ILargest Connected Component of a k-ary n-cube with Faulty Vertices. 777-783
Volume 29, Number 5, September 2013
Papers
- Chee-Heng Tan, Ying Wah Teh:
Harnessing Cloud Computing for Dynamic Resource Requirement by Database Workloads. 793-810 - Datong Xie, Lixin Ding, Yurong Hu, Shenwen Wang, Chengwang Xie, Lei Jiang:
A Multi-Algorithm Balancing Convergence and Diversity for Multi-Objective Optimization. 811-834 - Beiji Zou, Xiaoyun Zhang, Shenghui Liao, Lei Wang:
Specularity Removal using Dark Channel Prior. 835-849 - Asad Masood Khattak, Rabia Batool, Zeeshan Pervez, Adil Mehmood Khan, Sungyoung Lee:
Ontology Evolution and Challenges. 851-871 - Sungwon Jung, Sooyong Park:
A Data Allocation Method over Multiple Wireless Broadcast Channels. 873-888 - Chu-Hsing Lin, Chen-Yu Lee, Krishna M. Kavi, Deng-Jyi Chen, Yi-Shiung Yeh:
Finding Near-Optimum Message Scheduling Settings for SHA-256 Variants Using Genetic Algorithms. 889-905 - Song Guo, Qiuqi Ruan, Zhan Wang, Shuai Liu:
Facial Expression Recognition using Spectral Supervised Canonical Correlation Analysis. 907-924 - Olga Fedotova, Leonor Teixeira, Helena Alvelos:
Software Effort Estimation with Multiple Linear Regression: Review and Practical Application. 925-945 - Sangwon Park:
Flash-Aware Cost Model for Embedded Database Query Optimizer. 947-967 - Parmeet Kaur Jaggi, Awadhesh Kumar Singh:
Log Based Recovery with Low Overhead for Large Mobile Computing Systems. 969-984 - Kun-Chan Lan, Chien-Ming Chou, Ching-Fang Yang:
Effects of Preferred Routes and Destinations on the Performance of Vehicular Network. 985-1000 - Mahmood Deypir, Mohammad Hadi Sadreddini, Mehran Tarahomi:
An Efficient Sliding Window Based Algorithm for Adaptive Frequent Itemset Mining over Data Streams. 1001-1020 - Ruhui Ma, Fanfu Zhou, Erzhou Zhu, Haibing Guan:
Performance Tuning Towards a KVM-based Embedded Real-Time Virtualization System. 1021-1035
- Chia-Hua Chang:
A Novel Self-Adaptive Bayesian Belief Network with Information Entropy for Leveraging Decision Consensus among Multi-Agents. 1037-1053 - Ching-Wen Chen, Chang-Jung Ku, Tzong-Jye Liu:
Efficient Trace File Compression Design with Locality and Address Difference. 1055-1070
Volume 29, Number 6, November 2013
Papers
- Kuang-Han Tai, Gwo-Long Li, Mei-Juan Chen, Hao-Wen Chi:
Computation-Scalable Multi-Path Motion Estimation Algorithm. 1079-1095 - Ying Liu, Jianqiang Tang, Meng Zhang, Hongke Zhang:
Impact of Identifier-Locator Split Mechanism on DDoS Attacks. 1097-1107 - Li-Hsuan Chen, Maw-Shang Chang, Chun-Chieh Wang, Bang Ye Wu:
On the Min-Max 2-Cluster Editing Problem. 1109-1120 - Yung-Cheng Lee:
Weakness and Improvement of the Smart Card Based Remote User Authentication Scheme with Anonymity. 1121-1134 - Chin-Chen Chang, Hsiao-Ling Wu, Zhi-Hui Wang, Qian Mao:
An Efficient Smart Card Based Authentication Scheme Using Image Encryption. 1135-1150 - Guanling Lee, Yi-Chun Chen, Kuo-Che Hung:
PTree: Mining Sequential Patterns Efficiently in Multiple Data Streams Environment. 1151-1169
Papers
- Jae Yoo Lee, Hyun Jung La, Soo Dong Kim:
A Practical Framework for Self-Stabilization in Service-based Mobile Ecosystem. 1171-1194 - Der-Lor Way, Yi-Shan Tsai, Zen-Chung Shih:
Origami Pop-up Card Generation from 3D Models Using a Directed Acyclic Graph. 1195-1210 - Jae-Ho Nah, Woo-Chan Park, Yoon-Sig Kang, Tack-Don Han:
Ray-Box Culling for Tree Structures. 1211-1225 - Yuan-Chih Yu, Shing-chern D. You, Dwen-Ren Tsai:
Smart Door: A Ubiquitous Collaboration System for Home Activities in the Smart Home. 1227-1248 - Kuo-Hua Kao, Jou-Ming Chang, Yue-Li Wang, Shuo-Hong Xu, Justie Su-tzu Juan:
Power Domination in Honeycomb Meshes. 1249-1263 - Cheng-Chin Chiang, Zhi-Wei Chen, Chen-Ning Yang:
Video-Driven Creation of Virtual Avatars by Component-based Transferring of Facial Expressions. 1265-1283
- Jianwei Liao:
A Transparent, Incremental, Concurrent Checkpoint Mechanism for Real-time and Interactive Applications. 1285-1298
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.