default search action
Journal of Information Science and Engineering, Volume 25
Volume 25, Number 1, January 2009
- Ching-Nung Yang, Bing-Ling Lu:
Improved Tracing Algorithm for Random-Error-Resilient Collusion-Secure Fingerprinting Codes. 1-10 - Changwoo Byun, Ilkook Yun, Seog Park:
A New Optimistic Concurrency Control in Valid XML. 11-31 - Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification. 33-57 - Wen-Chung Shih, Chao-Tung Yang, Shian-Shyong Tseng:
Using a Performance-based Skeleton to Implement Divisible Load Applications on Grid Computing Environments. 58-81 - Der-Rong Gin:
Heuristic Algorithms for Finding Light-Forest of Multicast Routing on WDM Network. 83-103 - Ozgur Kaymakci, Salman Kurtulan:
A Novel Performance Evaluation Method for DES. 105-120 - GuanJun Liu, Changjun Jiang:
Incidence Matrix Based Methods for Computing Repetitive Vectors and Siphons of Petri Net. 121-136 - Jinhyung Kim, Dongwon Jeong, Doo-Kwon Baik:
A Translation Algorithm for Effective RDB-to-XML Schema Conversion Considering Referential Integrity Information. 137-166 - Mingming Yan, Zhiwu Li, Na Wei, Mi Zhao:
A Deadlock Prevention Policy for a Class of Petri Nets S3PMR. 167-183 - Jia-Ming Chen, Wan-Chen Lu, Wei-Kuan Shih, Ming-Chung Tang:
Imprecise Computations with Deferred Optional Tasks. 185-200 - Jiun-Long Huang, Shih-Chuan Chiu, Xin-Mao Huang:
GPE: A Grid-based Population Estimation Algorithm for Resource Inventory Applications over Sensor Networks. 201-218 - Chin-Fu Ku, Yu-Fang Zheng, Sao-Jie Chen, Jan-Ming Ho:
USVoD: A Large Scale Video-on-Demand System Based on Uniform Sampling Cache Mechanism. 219-233 - Ming-Chun Hsia, Chunhung Richard Lin:
Low-Latency Mobile HP Handover Based on Active-Scan Link Layer Assisted FMIPv6. 235-250 - Chien-Chung Yang, Kuochen Wang, Ming-Ham Lin, Pochun Lin:
Energy Efficient Intra-Task Dynamic Voltage Scaling for Realistic CPUs of Mobile Devices. 251-272 - Jungeun Choi, Joosun Hahn, Rhan Ha:
A Fault-tolerant Adaptive Node Scheduling Scheme for Wireless Sensor Networks. 273-287 - Jwu-Sheng Hu, Tzung-Min Su:
Shape Memorization and Recognition of 3D Objects Using a Similarity-Based Aspect-Graph Approach. 289-301 - Jing-Wein Wang, Wen-Yuan Chen:
Genetic Optimization Fingerprint Recognition Based on Core Sub-Region. 303-317 - Mi Wen, Ling Dong, Yanfei Zheng, Kefei Chen:
Towards Provable Security for Data Transmission Protocols in Sensor Network. 319-333
Volume 25, Number 2, March 2009
- Lei Yang, Yu Dai, Bin Zhang:
Performance Prediction Based EX-QoS Driven Approach for Adaptive Service Composition. 345-362 - Obeten O. Ekabua, Matthew O. Adigun:
Experienced Report on Assessing and Evaluating Change Impact Analysis Through a Framework and Associated Models. 363-373 - Hae-Sun Jung, Chang-Sung Jeong, Yongwoo Lee, Phil Doo Hong:
An Intelligent Ubiquitous Middleware for U-City: SmartUM. 375-388 - Chung-Ren Yan, Tong-Yee Lee:
Texture Synthesis with Prioritized Pixel Re-synthesis. 389-402 - Seunghwa Lee, Eunseok Lee:
Distributed Adaption System for Quality Assurance of Web Service in Mobile Environment. 403-417 - Yi Jin, Qiuqi Ruan:
Orthogonal Locality Sensitive Discriminant Analysis for Face Recognition. 419-433 - Juryon Paik, Junghyun Nam, Dongho Won, Ung-Mo Kim:
Fast Extraction of Maximal Frequent Subtrees Using Bits Representation. 435-464 - Soojung Lee:
Deadlock Detection and Recovery for True Fully Adaptive Routing in Regular Wormhole Networks. 465-479 - Jiying Wu, Qiuqi Ruan:
A Novel Exemplar-Based Image Completion Model. 481-497 - Lei-Da Li, Bao-Long Guo, Lei Guo:
Combining Interest Point and Invariant Moment for Geometrically Robust Image Watermarking. 499-515 - Wei Han, Kefei Chen, Dong Zheng:
Receipt-Freeness for Groth e-Voting Schemes. 517-530 - Ruei-Yu Wu, Dyi-Rong Duh:
Hamiltonicity of the Pyramid Network with or without Fault. 531-542 - Chang-Jiu Chen, Wei-Min Cheng, Hung-Yue Tsai, Jen-Chieh Wu:
A Quasi-Delay-Insensitive Microprocessor Core Implementation for Microcontrollers. 543-557 - I-Hsuan Peng, Yen-Wen Chen, Hsiang-Ru Peng:
A Systematic Wavelength Assign Algorithm for Multicast in WDM Networks with Sparse Conversion Nodes. 559-574 - Cheng-Jian Lin, Chi-Yung Lee:
FPGA Implementation of a Recurrent Neural Fuzzy Network wiht On-Chip Learning for Prediction and Identification Applications. 575-589 - Jiaming Zhan, Han Tong Loh:
Using Redundancy Reduction in Summarization to Improve Text Classification by SVMs. 591-601 - Su-Cheng Haw, Chien-Sing Lee:
TwigX-Guide: An Efficient Twig Pattern Matching System Extending DataGuide Indexing and Region Encoding Labeling. 603-617 - Zuowen Tan, Zhuojun Liu:
Cryptanalysis and Improvement on a Threshold Proxy Signature Scheme. 619-631 - Chung-Chih Tsai, Jin-Shiuh Taur, Chin-Wang Tao:
Iris Recognition Using Gabor Filters and the Fractal Dimension. 633-648 - Min-Yuan Cheng, Chin-Jung Huang:
A Novel Approach for Treating Uncertain Rule-based Knowledge Conflicts. 649-663
Volume 25, Number 3, May 2009
- Taysheng Jeng:
Toward a Ubiquitous Smart Space Design Framework. 675-686 - Jen-Wen Ding, Shi-Yuan Lan:
Quality-Adaptive Proxy Caching for Peer-to-Peer Video Streaming Using Multiple Description Coding. 687-701 - Luís Filipe Teixeira, Luís Corte-Real:
Statistical Multiplexing of H.264 Video Streams using Structural Similarity Information. 703-715 - Sheng-Tzong Cheng, Ming-Tzung Hsieh:
Modeling and Analysis of Code-based Call Admission Control for QoS Management in W-CDMA Systems. 717-731 - Wen-Ping Chen, Fu-Hung Shih, Wen-Shyang Hwang:
The Multiple Path Protection of DWDM Backbone Optimal Networks. 733-745 - Kuan-Ching Li, Hsiao-Hsi Wang, Kuo-Yang Cheng, Tsung-Ying Wu:
Strategies Toward Optimal Access to File Replicas. 747-762 - Chien-Cheng Lee, Chun-Li Tsai, Yu-Chun Chiang:
Federal Funds Rate Prediction: A Comparison Between the Robust RBF Neural Network and Economic Models. 763-778 - Federico Prat, Andrés Marzal, Sergio Martín, Rafael Ramos-Garijo, María José Castro Bleda:
A Template-based Recognition System for On-line Handwritten Characters. 779-791 - Kou-Yuan Huang, Kai-Ju Chen:
Simulated Annealing for Pattern Detection and Seismic Applications. 793-805 - Chin-Ling Chen, Yeong-Lin Lai, Chih-Cheng Chen, Kun-Chih Chen:
Construction of a Real-Time and Secure Mobile Ticket System. 807-825 - Mahdi Niamanesh, Rasool Jalili:
DRAPS: A Framework for Dynamic Reconfigurable Protocol Stacks. 827-841 - Han-Pang Huang, Feng-Cheng Yang, Ming-Tzong Wang, Chia-Ming Chang:
Instruction Detection Based on Active Networks. 843-859 - Tein-Yaw Chung, Yang-Hui Chang, Kun-Hung Chen, Yung-Mu Chen:
High Performance Overlay File Distribution by Integrating Resource Discovery and Service Scheduling. 861-875 - Hung-Yu Chien, Ru-Yu Lin:
The Study of Secure E-Will System on the Internet. 877-893 - Mahdi Asadpour, Rasool Jalili:
Double Voting Problem of Some Anonymous E-Voting Schemes. 895-906 - Hsiao-Ying Lin, Wen-Guey Tzeng:
Anonymous Password Based Authenticated Key Exchange with Sub-Linear Communication. 907-920 - Jaekwan Park, Bonghee Hong, ChaeHoon Ban:
An Efficient Query Index on RFID Streaming Data. 921-935 - Yi-Shiung Yeh, Ting-Yu Huang, Han-Yu Lin:
Structural Binary CBC Encryption Mode. 937-944 - Kuo-Yang Tu:
Analysis and Comparison of Various Shape Mirrors Used in Omnidirectional Cameras with Parameter Variation. 945-959
Volume 25, Number 4, May 2009
- Jung-Shiong Chang, Arthur Chun-Chieh Shih, Hsiao-Rong Tyan, Wen-Hsien Fang:
Principal Component Analysis-based Mesh Decomposition. 971-987 - Kun-Che Lu, Don-Lin Yang:
Image Processing and Image Mining using Decision Trees. 989-1003 - Chung-Shih Tang, Wen-Tsuen Chen:
An Integrated Failure and QoS Recoverable Transmission Scheme Based on Multi-path Network Coding. 1005-1020 - Heung Seok Chae, Jian Feng Cui, Jinwook Park, Jaegeol Park, Woo Jin Lee:
An Object-Oriented Framework Approach to Flexible Availability Management for Developing Distributed Applications. 1021-1039 - Huang-Chi Chen, Yu-Wen Chang, Rey-Chue Hwang:
VLSI Architecture of Euclideanized BM Algorithm for Reed-Solomon Code. 1041-1054 - Cheng-Hsiung Wang, Chien-Cheng Lee, Hewijin Christine Jiau, Tsung-Lung Yang, Kuo-Feng Ssu, Pau-Choo Chung:
Tele-consultation Enhanced via Session Retrieval and Session Scheduling Capabilities. 1055-1066 - Gregor Polancic, Romana Vajde Horvat, Ivan Rozman:
Improving Object-Oriented Frameworks by Considering the Characteristics of Constituent Elements. 1067-1085 - Ching-Hwang Wang, Chih-Han Kao:
Multi-Clustering Centers Approach to Enhancing the Performance of SOM Clustering Ability. 1087-1102 - Jang-Ping Sheu, Li-Jen Chang, Wei-Kai Hu:
Hybrid Congestion Control Protocol in Wireless Sensor Networks. 1103-1119 - Hua-Fu Li, Suh-Yin Lee:
Mining Top-K Path Traversal Patterns over Streaming Web Click-Sequences. 1121-1133 - Hongxing Qin, Jie Yang, Yue-Min Zhu:
A Feature-Preserving Filtering Algorithm for Point Set Surface and Surface Attributes Based on Robust Statistics. 1135-1146 - Shou-Chih Lo:
Design of Spatial Data Broadcast for Mobile Navigation Applications. 1147-1161 - Chung Il Sun, Hae Young Lee, Tae Ho Cho:
A Path Selection Method for Improving the Detection Power of Statistical Filtering in Sensor Networks. 1163-1175 - Sungju Lee, Daesung Moon, Yongwha Chung:
Inserting Chaff Minutiae for the Geometric Hashing-based Fuzzy Fingerprint Vault. 1177-1190 - Sung-Kwan Kim, Hunki Kwon, Donghee Lee, Sam H. Noh, Sang Lyul Min:
A Flash-Aware Cluster Allocation Scheme for Legacy File Systems. 1191-1220 - Po-Chuan Lin, Jhing-Fa Wang, Jia-Ching Wang, Jun-Jin Huang:
Personal Spoken Sentence Retrieval Using Two-Level Feature Matching and MPEG-7 Audio LLDs. 1221-1238 - Yi-Song Siao, Wei-Chen Chang, Alvin Wen-Yu Su:
Pitch Detection/Tracking Strategy for Musical Recordings of Solo Bowed-String and Wind Instruments. 1239-1253 - John Y. Chiang, Yau-Ren Jenq:
Content-Based Image Retrieval using Fractal Orthonormal Basis. 1255-1266 - Chien-Fu Cheng, Shu-Ching Wang, Tyne Liang:
Investigation of Consensus Problem over Combined Wired/Wireless Network. 1267-1281 - Pei-Yu Shih, Wen-Ku Su, Trieu-Kien Truong, Yaotsu Chang:
Decoding Binary Quadratic Residue codes Using the Euclidean Algorithm. 1283-1294
Volume 25, Number 5, September 2009
- Chiung-Hon Leon Lee, Alan Liu, Jeng-Shin Hung:
Service Quality Evaluation by Personal Ontology. 1305-1319 - Claus Pahl, Wilhelm Hasselbring, Markus Voss:
Service-Centric Integration Architecture for Enterprise Software Systems. 1321-1336 - Cheng-Liang Lin, Pang-Chieh Wang, Ting-Wei Hou:
Classification and Evaluation of Middleware Collaboration Architectures for Converging MHP and OSGi in a Smart Home. 1337-1356 - Li-Der Chou, Chien-Chi Chen, Po-Chia Tseng:
Design and Implementation of a Policy-Based Monitoring System for Web Services. 1357-1372 - Chien-Tsun Chen, Yu Chin Cheng, Chin-Yun Hsieh, Tien-Song Hsu:
Delivering Specification-Based Learning Processes with Service-Oriented Architecture: A Process Translation Approach. 1373-1389 - Dilek Basci, Sanjay Misra:
Measuring and Evaluating a Design Complexity Metric for XML Schema Documents. 1405-1425 - Jonathan Lee, Ying-Yan Lin, Shang-Pin Ma, Shin-Jie Lee:
BPEL Extensions to User-Interactive Service Delivery. 1427-1445 - Jang-Ping Sheu, Kun-Ying Hsieh, Yao-Kun Cheng:
Distributed Transmission Power Control Algorithm for Wireless Sensor Networks. 1447-1463 - Cheng-Kang Chu, Wen-Guey Tzeng:
Efficient Identity-Committable Signature and Group-Oriented Ring Signature Schemes. 1465-1483 - Ying-Sung Lee, Hsien-Te Chien, Wen-Nung Tsai:
Using Random Bit Authentication to Defend IEEE 802.11 DoS Attacks. 1485-1500 - Chao-Jung Chen, Hsin-Yuan Peng, Bing-Fei Wu, Ying-Han Chen:
A Real-Time Driving Assistance and Surveillance System. 1501-1523 - Wen-Hwa Liao, Kuei-Ping Shih, Wan-Chi Wu:
A Cover-Up Scheme for Data-Centric Storage in Wireless Sensor Networks. 1525-1537 - Tsung-Yuan Liu, Yuh-Jzer Joung:
A Distributed Multi-Dimensional Publications Management System. 1539-1553 - Ming-Der Shieh, Jun-Hong Chen, Wen-Ching Lin, Chien-Ming Wu:
An Efficient Multiplier/Divider Design for Elliptic Curve Cryptosystem over GF(2m). 1555-1573 - Jau-Ling Shih, Ying-Nong Chen, Kai-Chiun Yan, Chin-Chuan Han:
Illegal Entrant Detection at a Restricted Area in Open Spaces using Color Features. 1575-1592 - Lien-Wu Chen, Weikuo Chu, Yu-Chee Tseng, Jan-Jan Wu:
Route Throughput Analysis with Spectral Reuse for Multi-Rate Mobile Ad Hoc Networks. 1593-1604 - Jaesoo Kim, Heejune Ahn:
A New Perspective for Neural Networks: Application to a Marketing Management Problem. 1605-1616 - Kuen-Fang Jea, Tsui-Ping Chang, Shih-Ying Chen:
A Semantic-Based Protocol for Concurrency Control in DOM Database Systems. 1617-1639
Volume 25, Number 6, November 2009
- Shih-Hsu Huang, Chun-Hua Cheng, Song-Bin Pan:
Synthesis of Anti-Aging Gated Clock Designs. 1651-1670 - Sungwoo Ahn, Bonghee Hong:
Reordering for Indexing in an RFID Tag Database. 1671-1690 - Suat Ozdemir:
Secure Load Balancing via Hierarchical Data Aggregation in Heterogeneous Sensor Networks. 1691-1705 - Shih-Hsu Huang, Chun-Hua Cheng, Da-Chen Tzeng:
Simultaneous Clock Skew Scheduling and Power-Gated Module Selection for Standby Leakage Minimization. 1707-1722 - Chin-Pan Huang, Chi-Jen Liao, Chaur-Heh Hsieh:
A Blind Image Watermarking Based on Dual Detector. 1723-1736 - Adnan Khashman:
Blood Cell Identification using Emotional Neural Networks. 1737-1751 - Jeongmin Park, Hyunsang Youn, Eunseok Lee:
An Automatic Code Generation for Self-Healing. 1753-1781 - Dashdorj Yamkhin, Youjip Won:
Modeling and Analysis of Wireless LAN Traffic. 1783-1801 - Xu Li, Hongyu Huang, Minglu Li, Wei Shu, Min-You Wu:
Packet-Oriented Routing in Delay-Tolerant Vehicular Sensor Networks. 1803-1817 - San-Lung Zhao, Hsi-Jian Lee:
A Spatial-Extended Background Model for Moving Blobs Extraction in Indoor Environments. 1819-1837 - Wen-Jyi Hwang, Chien-Min Ou:
Efficient Header Classification Architecture for Network Intrusion Detection. 1839-1853 - Tung-Yang Ho, Cheng-Kuan Lin:
Fault-Tolerant Hamiltonian Connectivity and Fault-Tolerant Hamiltonicity of the Fully Connected Cubic Networks. 1855-1862 - Hesuan Hu, Zhiwu Li:
Liveness Enforcing Supervision in Video Streaming Systems using Siphons. 1863-1884 - Kuo-Yang Tu:
Analysis of Camera's Images Influenced by Varying Light Illumination for Design of Color Segmentation. 1885-1899 - Wann-Yun Shieh, Shu-Yi Hsu:
Power-Aware Register Assignment for Multi-Banked Register Files. 1901-1920 - Shiow-Yang Wu, Shih-Chien Chou:
Preventing Information Leakage in Mobile Applications with Object-Oriented Access Control Lists and Security Monitor Encapsulation. 1921-1937 - Yun-Chung Chung, Shen Cherng, Robert R. Bailey, Sei-Wang Chen:
Intrinsic Image Extraction from a Single Image. 1939-1953 - Cong Jin, Ping Jin:
Fingerprint Classification in DCT Domain using RBF Neural Networks. 1955-1962 - Daniel Yuh Chao:
Deadlock Control for Weighted Systems of Simple Sequential Processes with Resources Requirement (WS3PR). 1963-1978
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.