default search action
Journal of Information Science and Engineering, Volume 32
Volume 32, Number 1, January 2016
Papers
- Zongwei Zhu, Yanjun Hu, Xi Li, Xuehai Zhou:
Memory Power Optimization on Different Memory Address Mapping Schemas. 1-25 - Subramaniam Malliga, C. S. Kanimozhiselvi, Shanmuga Vadivel Kogilavani:
Low Storage and Traceback Overhead IP Traceback System. 27-45 - Zhao Liu, Yi Xie, Mingtao Pei, Yunde Jia:
Tracking Pedestrian with Multi-Component Online Deformable Part-Based Model. 47-61 - Pawan R. Bhaladhare, Devesh C. Jinwala:
Novel Approaches for Privacy Preserving Data Mining in k-Anonymity Model. 63-78 - Suthasinee Kuptabut, Ponrudee Netisopakul:
Event Extraction using Ontology Directed Semantic Grammar. 79-96 - Weidong Qiu, Zheng Gong, Yidong Guo, Bozhong Liu, Xiaoming Tang, Yuheng Yuan:
GPU-Based High Performance Password Recovery Technique for Hash Functions. 97-112 - Zhiming Gui, Haipeng Yu, Yunlong Tang:
Locating Traffic Hot Routes from Massive Taxi Tracks in Clusters. 113-131 - T. Sivakumar, R. Venkatesan:
A New Image Encryption Method Based on Knight's Travel Path and True Random Number. 133-152 - Shirin Akther Khanam, Hee Yong Youn:
A Web Service Discovery Scheme Based on Structural and Semantic Similarity. 153-176 - Jeongho Kim, Jonghee Park, Eunseok Lee:
A New Spectrum-based Fault Localization With the Technique of Test Case Optimization. 177-196 - T. R. Reshmi, Krishnan Murugan:
Selective Address Allocator Configuration Protocol (SAACP) for Resource Constrained MANETs. 197-211 - Qiang Guo, Chengdong Wu:
Fast Visual Tracking using Memory Gradient Pursuit Algorithm. 213-228
- Wei-Ho Tsai, Wen-Bin Jheng:
Command Recognition Based on Single-Channel Electroencephalography. 229-241
Volume 32, Number 2, March 2016
Papers
- Rehan Ashraf, Khalid Bashir Bajwa, Toqeer Mahmood:
Content-based Image Retrieval by Exploring Bandletized Regions through Support Vector Machines. 245-269 - Show-Jane Yen, Chiu-Kuang Wang, Yue-Shi Lee:
Mining Consumption Association Rules. 271-285 - Fuxin Zhang, Guozhen Tan, Chao Yu, Nan Ding, Caixia Song:
Model Reference Adaptive Power Control for Cooperative Vehicle Safety Systems. 287-308 - Ali Borjian Boroujeni, Meghdad Mirabi:
A Novel Replication Strategy for Efficient XML Data Broadcast in Wireless Mobile Networks. 309-327 - Vo Phuong Binh, Shih-Hsuan Yang:
Complexity-Aware Frame-Level Bit Allocation and Rate Control for H.264 Scalable Video Coding. 329-347 - Atif Elahi, Ijaz Mansoor Qureshi, Fawad Zaman, Fahad Munir:
Reduction of out of Band Radiation in Non-Contiguous OFDM Based Cognitive Radio System using Heuristic Techniques. 349-364 - Chi-Kuang Chang, Nai-Wei Lin:
A Constraint-Based Framework for Test Case Generation in Method-Level Black-Box Unit Testing. 365-387 - Min Zhang, Jiashu Zhang, Wen-Rong Tan:
A Secure Sketch-based Authentication Scheme for Telecare Medicine Information Systems. 389-402 - Bilal Lounnas, Bouderah Brahim, Abdelouahab Moussaoui:
A Novel Algorithm for Pattern Matching Based on Modified Push-Down Automata. 403-424 - Yang Yang, Maode Ma:
Semantic Searchable Encryption Scheme Based on Lattice in Quantum-Era. 425-438 - Kejiang Xiao, Xiaofeng Wang, Rui Wang, Li Cui:
Power-Aware Classifier Selection in Wireless Sensor Networks. 439-454 - Shuo Zhang, Qi Zhu:
The Birth and Death Process Enhanced Optimization Algorithm for Multi-Access Selection in Heterogeneous Wireless Networks. 455-475 - Shih-Chung Hsu, Chi-Ting Hsu, Chung-Lin Huang:
Video-Based Facial Expression Recognition Using Hough Forest. 477-494 - Degan Zhang, Yanan Zhu, Si Liu, Xiaodan Zhang, Jin-Jie Song:
Multi-Radio Multi-Channel (MRMC) Resource Optimization Method for Wireless Mesh Network. 495-514
Volume 32, Number 3, May 2016
Papers
- Hung-Fu Li, Tyng-Yeu Liang, Yu-Jie Lin:
An OpenMP Programming Toolkit for Hybrid CPU/GPU Clusters Based on Software Unified Memory. 517-539 - Ki-Hoon Lee, Yun-Gu Lee, Jangyoung Kim:
A Self-Tuning Buffer-Flushing Algorithm for OLTP Workloads. 541-557 - Yaser Taheri, Hossein Gharaee Garakani, Naser MohammadZadeh:
A Game Theory Approach for Malicious Node Detection in MANETs. 559-573 - Yu-Lung Hsieh, Don-Lin Yang, Jungpin Wu, Yi-Chung Chen:
Efficient Mining of Profit Rules from Closed Inter-Transaction Itemsets. 575-595 - Jiang Weng, Yunqi Dou, Chuangui Ma:
The Attack of the RSA Subgroup Assumption. 597-610 - Shafqat Ullah Khan, Ijaz Mansoor Qureshi, Bilal Shoaib, Aqdas Naveed Malik:
Recovery of Failed Element Signal with a Digitally Beamforming Using Linear Symmetrical Array Antenna. 611-624 - Ming-Te Chi, Shi-Hao Wang, Chen-Chi Hu:
Real-time Multiple Refraction by Using Image-Space Technology. 625-641 - Weng-Kong Tam, Hsi-Jian Lee:
Improving Tooth Outline Detection by Active Appearance Model with Intensity-Diversification in Intraoral Radiographs. 643-659 - Babak Nasiri, Mohammad Reza Meybodi:
Improved Speciation-Based Firefly Algorithm in Dynamic and Uncertain Environments. 661-676 - Fan Guo, Hiu Peng, Jin Tang:
Fast Defogging and Restoration Assessment Approach to Road Scene Images. 677-702 - Wen-Lung Shiau, Chang-Ming Yan, Chen-Chao Kuo:
The Intellectual Structure of Human Computer Interaction Research. 703-730 - Tzu-Hsin Ho, Shiuphyng Winston Shieh, Chien-Chao Tseng:
RAKA: Revocable Authenticated Key Agreement System for Mobile Social Networks. 731-746 - Dab Tian, Yingkui Du, Dali Chen:
An Adaptive Fractional-Order Variation Method for Multiplicative Noise Removal. 747-762 - Radha Natraj, Kannan Kathiravan:
Mitigating Intra Flow Interference Over Multi Hop Wireless Ad Hoc Networks. 763-781 - Wenhao Shu, Wenbin Qian, Changsheng Zhang:
Feature Selection from the Perspective of Knowledge Granulation in Dynamic Set-valued Information System. 783-798
- Mustafa Bulent Mutluoglu, Sebnem Baydere:
Modeling Reliable Broadcast of Data Buffer over Wireless Networks. 799-810
Volume 32, Number 4, July 2016
Papers
- Jiguo Li, Xuexia Zhao, Yichen Zhang, Wei Yao:
Provably Secure Certificate-based Conditional Proxy Re-encryption. 813-830 - Gin-Der Wu, Zhen-Wei Zhu:
Dual-Discriminability-Analysis Type-2 Fuzzy-Neural-Network Based Speech Classification for Human-Machine Interaction. 831-847 - Erl-Huei Lu, Kuo-Tsang Huang, Jung-Hui Chiu:
Word-Based AES Encryption Without Data Expansion. 849-861 - Jenn-Long Liu, Chung-Chih Li:
An Improved Artificial Bee Colony Algorithm Applied to Engineering Optimization Problems. 863-886 - Jen-Chun Chang, Hsin-Lung Wu:
On Constant-Time-Identification and Privacy-Preserving RFID Protocols: Trade-Off Between Time and Memory. 887-901 - Peng Lv, Qingjie Zhao, Dongbing Gu:
Tracking Non-Rigid Target via Dynamic Discriminative Geodesic Active Contours. 903-930 - Yu-Che Wey, Mei-Juan Chen, Chia-Hung Yeh, Chia-Yen Chen:
Fast Mode Decision Algorithm for Scalable Video Coding Based on Probabilistic Models. 931-945 - Kejiang Xiao, Rui Wang, Cai Cai, Shaohua Zeng, Zahid Mahmood:
Collaborative Sensing for Heterogeneous Sensor Networks. 947-968 - Hyung-Ju Cho, Jinseok Chae:
A Safe Exit Algorithm for Moving k Nearest Neighbor Queries in Directed and Dynamic Spatial Networks. 969-993 - Hsia-Hsiang Chen, Shih-Kun Huang:
LDDoS Attack Detection by Using Ant Colony Optimization Algorithms. 995-1020 - Yifeng Zhou, Fei Chao, Wanyuan Wang:
Task Similarity-Based Task Allocation Approach in Multi-Agent Engineering Software Systems. 1021-1039 - Kao-Shing Hwang, Jin-Ling Lin, Jhe-Syun Li:
Biped Balance Control by Reinforcement Learning. 1041-1060 - Muhammad Usman, M. Usman:
Multi-Level Mining and Visualization of Informative Association Rules. 1061-1078 - Sheng-Peng Fu, Ji-Bin Zhao, Renbo Xia, Weijun Liu:
Automatic Display-Camera Extrinsic Calibration Method Using an Annular Mirror. 1079-1095
- Jianhong Zhang, Jian Mao:
Efficient Multi-Proxy Signature Scheme with Short Length in the Standard Model. 1097-1112 - Nguyen Thi Thuy, Huynh Thi Thanh Binh, Dinh Viet Sang:
A New Approach for Learning Discriminative Dictionary for Pattern Classification. 1113-1127
Volume 32, Number 5, September 2016
Papers
- Donghai Tian, Junhua Chen, Changzhen Hu, Jingfeng Xue:
A Secure and Efficient Kernel Log Transfer Mechanism for Virtualization Environments. 1131-1143 - Junkai Yi, Guang Yang, Jing Wan:
Category Discrimination Based Feature Selection Algorithm in Chinese Text Classification. 1145-1159 - Deng Yi, Yin Zhang, Baogang Wei:
Query Subtopic Mining via Subtractive Initialization of Non-negative Sparse Latent Semantic Analysis. 1161-1181 - Hossein Mirabi, Meghdad Mirabi, Ali Borjian Boroujeni:
An Efficient XML Data Placement Scheme over Multiple Wireless Broadcast Channels. 1183-1203 - Yu-Feng Ma, Haibo Tian, Baodian Wei:
Secure Modular Exponentiation Outsource With Two Untrusted Programs and Improved Checkability. 1205-1218 - Fuxin Zhang, Guozhen Tan, Chao Yu, Nan Ding, Ming-Jian Liu:
Fair Channel Access in Cooperative Vehicle Safety Systems. 1219-1240 - Jun-Sang Park, Sung-Ho Yoon, Su-Kang Lee, Youngjoon Won, Myung-Sup Kim:
Performance Improvement of Traffic Classification Based on Application Traffic Locality. 1241-1259 - Jung-Tsung Tsai, Yunghsiang S. Han:
Geographic Routing with Enhanced Local Information for Wireless Networks. 1261-1288 - Zong-Yi Chen, Jiunn-Tsair Fang, Yen-Chun Liu, Pao-Chi Chang:
Machine Learning-based Fast Intra Coding Unit Depth Decision for High Efficiency Video Coding. 1289-1299 - Nazri Mohd Nawi, Mohammad Zubair Rehman, Abdullah Khan, Arslan Kiyani, Haruna Chiroma, Tutut Herawan:
Hybrid Bat and Levenberg-Marquardt Algorithms for Artificial Neural Networks Learning. 1301-1324 - S. M. Mizanoor Rahman, Ryojun Ikeura:
Cognition-Based Control and Optimization Algorithms for Optimizing Human-Robot Interactions in Power-Assisted Object Manipulation. 1325-1344 - Hsiang-Fu Yu:
Efficient Seamless Channel Transition for Near Video-on-Demand with Small Receiving Bandwidth. 1345-1371 - Dhalia Sweetlin J, Harichandran Khanna Nehemiah, Arputharaj Kannan:
Patient-Specific Model Based Segmentation of Lung Computed Tomographic Images. 1373-1394
Volume 32, Number 6, November 2016
Papers
- Hsia-Hsiang Chen, Chien-Hua Lee, Shih-Kun Huang:
A Unified Ant Agent Framework for Solving DoS and QoS Problems. 1397-1434 - Qing Zhang, Jiajun Lin, Xiaodan Li:
Salient Object Detection via Structure Extraction and Region Contrast. 1435-1454 - Nurmamat Helil, Kaysar Rahman:
Secret Sharing Scheme Based Approach for Access Control Constraint Against Similar Users' Collusive Attack. 1455-1470 - Yining Liu, Wei Guo, Chi Cheng, Ching-Fang Hsu, Junyan Qian, Changlu Lin:
A Robust Electronic Voting Scheme Against Side Channel Attack. 1471-1486 - Yilin Zhang, Wei-Ming Lin:
Improving Resource Utilization by Curbing Speculative Trace Progression in Simultaneous Multi-Threading CPUs. 1487-1502 - Yi-Huai Hsu, Kuochen Wang:
Self-Organizing Network-based Cell Size Adaption and Traffic Adaptive eICIC in LTE-A HetNets. 1503-1523 - Fucai Luo, Changlu Lin, Yan Zhu:
Role-Based Signature and Its Security Proof. 1525-1539 - Morteza Mollajafari, Hadi Shahriar Shahhoseini:
Cost-Optimized GA-Based Heuristic for Scheduling Time-Constrained Workflow Applications in Infrastructure Clouds Using an Innovative Feasibility-Assured Decoding Mechanism. 1541-1560 - Yu-Qi Pan, Ming-Yan Jiang, Fei Li:
Kernel Locality Preserving Low-Rank Representation. 1561-1574 - Ehsan Arianyan, Hassan Taheri, Saeed Sharifian:
Multi Target Dynamic VM Consolidation in Cloud Data Centers Using Genetic Algorithm. 1575-1593 - Zhan-Jun Wang, Hai-Ying Ma, Jin-Hua Wang:
Attribute-Based Online/Offline Encryption with Outsourcing Decryption. 1595-1611 - Cheng-Zen Yang, Jhih-Shang Fan, Yu-Fan Liu:
Multi-document Summarization using Probabilistic Topic-based Network Models. 1613-1634 - Der-Rong Din, I-Ru Lai:
Multicast Protection Problem on Elastic Optical Networks Using Segment-Based Protection. 1635-1656 - Chun-Hao Chen, Ching-Yu Hsieh:
Actionable Stock Portfolio Mining by Using Genetic Algorithms. 1657-1678 - Minsu Kim, Yoon-Ho Choi, Byoung-Dai Lee, Namgi Kim:
An Efficient Terminal Selection Method for Multi-Hop Synchronization in Direct Communication Networks. 1679-1695 - Junguo Zhu, Muyun Yang, Tiejun Zhao, Sheng Li:
Global Source-Aware Statistical Post-Editing for General MT: Sentence Specification via Pseudo-Feedback. 1697-1710
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.