default search action
Journal of Information Science and Engineering, Volume 33
Volume 33, Number 1, January 2017
- Heyang Xu, Bo Yang:
Energy-aware Resource Management in Cloud Computing Considering Load Balance. 1-16 - Wen-Tin Lee, Shang-Pin Ma, Yao-Yu Tsai:
Retrieval of Web Service Components using UML Modeling and Term Expansion. 17-36 - Xiang-Wei Zheng, Xiaomei Yu, Yan Li, Hong Liu:
An Enhanced Multi-objective Group Search Optimizer Based on Multi-producer and Crossover Operator. 37-50 - Pei-Yin Chen, Yen-Chen Lai, Ping-Hsuan Lai:
Hardware Implementation of Local Mean Decomposition. 51-62 - Ke Gu, Yong Wang, Sheng Wen:
Traceable Threshold Proxy Signature. 63-79 - Ke-Kun Hu, Guosun Zeng, Wen-Juan Liu, Wei Wang:
A Reliability Analysis for Successful Execution of Parallel DAG Tasks. 81-99 - Amna Khan, Iram Noreen, Zulfiqar Habib:
On Complete Coverage Path Planning Algorithms for Non-holonomic Mobile Robots: Survey and Challenges. 101-121 - You-Chiun Wang, Hung-Yi Ko:
Energy-Efficient Downlink Resource Scheduling for LTE-A Networks with Carrier Aggregation. 123-141 - Mohammadhossein Barkhordari, Mahdi Niamanesh:
ScaDiGraph: A MapReduce-based Method for Solving Graph Problems. 143-158 - Mohammad Javani, Meghdad Mirabi:
An Efficient Index and Data Distribution Scheme for XML Data Broadcast in Mobile Wireless Networks. 159-182 - Po-Jen Chuang, Chung-Hsing Wang:
An Efficient Group-based Data Backup and Recovery Scheme in Cloud Computing Systems. 183-198 - Bay Vo:
An Efficient Method for Mining Frequent Weighted Closed Itemsets from Weighted Item Transaction Databases. 199-216 - Sun-Kyum Kim, Sung-Bong Yang:
Effective Forwarding Scheme for Opportunistic Networks Based on Refined Contact Probability and Betweenness Centrality. 217-232 - Yi-Ruei Chen, Shiuan-Tzuo Shen, Wen-Guey Tzeng:
Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over ℤp. 233-250 - Ya-Hui Chang, Chia-Zhen Lee, Si-Yen Zhuang:
A Tree-Based Approach to Support Query Translation for Schema Mappings with Weights. 251-270
Volume 33, Number 2, March 2017
- Tsung-Shian Huang, Jen-Hao Liao, Wen-Chieh Lin, Jung-Hong Chuang:
An Artist Friendly Material Design System. 273-288 - Ju-Yuan Hsiao, Zhi-Yang Lin, Po-Yueh Chen:
Reversible Data Hiding Based on Pairwise Prediction-Error Histogram. 289-304 - Der-Rong Din:
Heuristic and Genetic Algorithms for Solving the Virtual Topology Design Problem on Elastic Optical Networks. 305-327 - Wei-Sheng Wong, Shin-Chung Hsu, Chung-Lin Huang:
A Virtual TouchPad for Smartphone with Depth Camera. 329-345 - C. Eswaran, Ramakrishnan Kannan, A. Mohamed Uvaze Ahamed:
CBIR System Based On Prediction Errors. 347-365 - Der-Rong Din, Wei-Ting Chen:
Fragmentation-Aware Routing Algorithms for Multicast Problem on Elastic Optical Networks. 367-384 - Tien-Khoi Phan, HaRim Jung, Hee Yong Youn, Ung-Mo Kim:
QR*-Tree: An Adaptive Space-Partitioning Index for Monitoring Moving Objects. 385-411 - Hyun Jun Kim, Kwang Hee Lee, Myoung-Ho Kim:
Finding a Minimum Source Set in Directed Hypergraphs. 413-428 - Zakaria Mukhtar Gharsseldien, Syed Alwee Aljunid, Hassan Yousif Ahmed:
Performance Analysis of Diagonal Permutation Shifting (DPS) Codes for SAC-OCDMA Systems. 429-444 - Donghai Tian, Xiaoqi Jia, Junhua Chen, Changzhen Hu:
An Online Approach for Kernel-level Keylogger Detection and Defense. 445-461 - Qian Li, Weiguo Wu, Zeyu Sun, Jianhang Huang:
An Efficient Two-Level Hierarchy Job Scheduling and Task Dispatching Strategy for Cluster Rendering System. 463-483 - Yang Yang, Shu-Lve Yang, Fenghe Wang, Jin Sun:
Post-Quantum Secure Public Key Broadcast Encryption with Keyword Search. 485-497 - Hongwei Zhao, Zhen Wang, Pingping Liu, Bin Wu:
The Normalized Distance Preserving Binary Codes and Distance Table. 499-515 - Sun-Hee Kim, Lei Li, Christos Faloutsos, Hyung-Jeong Yang, Seong-Whan Lee:
DAPs: Mining using Change-Point Detection of Epileptic Activity Time Series Data. 517-536 - Kyu-Seok Shim, Sung-Ho Yoon, Su-Kang Lee, Myung-Sup Kim:
SigBox: Automatic Signature Generation Method for Fine-grained Traffic Identification. 537-569
Volume 33, Number 3, May
- Suyel Namasudra, Pinki Roy:
A New Table Based Protocol for Data Accessing in Cloud Computing. 585-609 - Amna Riaz, Junaid Qadir, Usman Younis, Raihan Ur Rasool, Hafiz Farooq Ahmad, Adnan K. Kiani:
Intrusion Detection Systems in Cloud Computing: A Contemporary Review of Techniques and Solutions. 611-634 - Hong Rong, Huimei Wang, Jian Liu, Ming Xian:
Efficient Privacy-Preserving Building Blocks in Cloud Environments under Multiple Keys. 635-652 - Yong Li, Ge Yao, Huaqun Wang, Changlu Lin:
Large Branching Tree Based Dynamic Provable Data Possession Scheme. 653-673 - Soo-Fun Tan, Azman Samsudin:
Ciphertext Policy-Attribute Based Homomorphic Encryption (CP-ABHER-LWE) Scheme: A Fine-Grained Access Control on Outsourced Cloud Data Computation. 675-694 - Perumal Pandiaraja, Pandi Vijayakumar, Varadarajan Vijayakumar, Raman Seshadhri:
Computation Efficient Attribute Based Broadcast Group Key Management for Secure Document Access in Public Cloud. 695-712 - Mala T., Vijayanand K. S:
SiDS: Sudoku inspired Data Scrambling Method for Securing Data in Cloud using N -cloud Architecture. 713-725 - Sivaraman Audithan, Vijayaregunathan Vijayasaro, Pandi Vijayakumar, Varadarajan Vijayakumar:
An Efficient Authentication Scheme for Mobile Cloud Computing Services. 727-741 - Ao-di Liu, Na Wang, Mingcong Liu:
A PANH-based Access Control Mechanism for Cross-Cloud Service Composition. 743-758 - G. NaliniPriya, Kotteswari Karthikeyan, K. G. Maheswari:
An Enhanced Priority Scheduling Algorithm for Multi-Server Retrieval Cloud System. 759-772 - T. Subha, S. Jayashri:
Public Auditing Scheme for Data Storage Security in Cloud Computing. 773-787 - Jingxia Zhang, Leyou Zhang:
Anonymous CP-ABE against Side-channel Attacks in Cloud Computing. 789-805 - Jiangyong Shi, Jie He, Yuexiang Yang:
An SDN-based Sampling System for Cloud P2P Bots Detection. 807-821 - Vaidehi Vijayakumar, Sangeetha Dhamodaran:
Improved Searchable Attribute Based Encryption in Cloud. 823-836 - P. G. Shynu, John Singh K:
An Enhanced CP-ABE based Access Control Algorithm for Point to Multi-Point Communication in Cloud Computing. 837-858 - Suguna Marappan, Sharmila Dhandapani:
Efficient Virtualization Technique for Cloud to Achieve Optimal Resource Allocation. 859-869
Volume 33, Number 4, July
- Feng Wang, Li Xu:
Strongly Secure Certificateless Signature Scheme in the Standard Model with Resisting Malicious-But-Passive KGC Attack Ability. 873-889 - Ke Huang, Xiaosong Zhang, Xiao-Fen Wang:
Block-Level Message-Locked Encryption with Polynomial Commitment for IoT Data. 891-905 - Fushan Wei, Qi Jiang, Ruijie Zhang, Chuangui Ma:
A Privacy-Preserving Multi-Factor Authenticated Key Exchange Protocol with Provable Security for Cloud Computing. 907-921 - Jian Shen, Dengzhi Liu, Qi Liu, Debiao He, Xingming Sun:
An Enhanced Cloud Data Storage Auditing Protocol Providing Strong Security and Efficiency for Smart City. 923-938 - Wei-Tao Song, Bin Hu, Xiu-Feng Zhao:
Optimizing LWE-based FHE for Better Security and Privacy Protection of Smart City. 939-952 - Xingxin Li, Youwen Zhu, Jian Wang:
Efficient Encrypted Data Comparison Through a Hybrid Method. 953-964 - Jian Xu, Si-Jia Zhao, Fucai Zhou:
Privacy Protection Model Based on Digital Envelope and Dummies for Location-Based Services. 965-978 - Fan Zhang, Lin Kang, Xinyan Xu, Jian Shen, Lu Zhou:
Power Controlled and Stability-based Routing Protocol for Wireless Ad hoc Networks. 979-992 - Mingwu Zhang, Yudi Zhang, Hua Shen, Chunming Tang, Lein Harn:
Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security. 993-1006 - Jingjing Guo, Jianfeng Ma, Xinghua Li, Junwei Zhang, Tao Zhang:
An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy. 1007-1023 - Hao-Hao Nie, Yanping Li, Qian-Hong Wu:
A Privacy-Preserving V2I Authentication Scheme Without Certificates. 1025-1040 - Yao-Ling Ding, Jing-Yuan Zhao, Lei-Bo Li, Hong-Bo Yu:
Impossible Differential Analysis on Round-Reduced PRINCE. 1041-1053
- Qiao Liu, Yong Wang, Wenjing Zhang, Hui Li:
Secret Data Transmission in Wireless Sensor Network with Physical Layer Network Coding. 1055-1067 - Feifei Sun, Chao Wu, Dong Sheng:
Bayesian Networks for Intrusion Dependency Analysis in Water Controlling Systems. 1069-1083 - Yang Li, Menting Chen, Jian Wang:
Another Security Evaluation of SPA Countermeasures for AES Key Expansion in IoT Devices. 1085-1100
Volume 33, Number 5, September
- Yuhui Deng, Xinyu Huang, Liangshan Song, Yongtao Zhou, Frank Wang:
Memory Deduplication: An Effective Approach to Improve the Memory System. 1103-1120 - Wen-Yew Liang, Ming-Feng Chang, Yen-Lin Chen:
Optimal Energy Saving DVFS Approach of Embedded Processors. 1121-1140
- Xueqiao Wang, Jia-Zheng Yuan, Qing Li:
3D Face Recognition Using Spherical Vector Norms Map. 1141-1161 - Tsung-Shian Huang, Fu-Hsi Huang, Wen-Chieh Lin, Jung-Hong Chuang:
Lighting and Foggy Effect Transfer. 1163-1176 - Shih-Chung Hsu, I-Chieh Chen, Chung-Lin Huang:
Image Classification Using Naive Bayes Classifier With Pairwise Local Observations. 1177-1193 - Ming Liu, Vasile Rus, Qiang Liao, Li Liu:
Encoding and Ranking Similar Chinese Characters. 1195-1211 - Jianqing Mo, Hanwu He, Jin-Fang Li, Yu-Wei Wei:
Semantic Segmentation and Structure Representation of the Generalized Body Cavity. 1213-1235
- Chia-Wei Hsu, Chia-Huei Chang, Chi-Wei Wang, Shiuhpyng Shieh:
DROIT+: Taint Tracking for Storage Access on Android. 1237-1254
- Xiao Yu, Weimin Lei, Wei Zhang, Li Song:
A Routing Algorithm Based on SDN for On-Board Switching Networks. 1255-1266 - Muzammil Behzad, Muhammad Sharjeel Javaid, M. A. Parahca, S. Khan:
Distributed PCA and Consensus Based Energy Efficient Routing Protocol for WSNs. 1267-1283 - Ming-Jian Liu, Guozhen Tan, Nan Ding, Fuxin Zang:
Study on Self-adaptive Message Scheduler Used for the Vehicle Ad-hoc Network. 1285-1305 - L. Sherly Puspha Annabel, K. Murugan:
An Asynchronous and Adaptive Quorum Based MAC Protocol for Wireless Sensor Networks. 1307-1322
- Zhixiao Wang, Jingke Xi, Yan Xing, Zhiguo Hu:
Community Number Estimation for Community Detection in Complex Networks. 1323-1341 - Zhen Zhao, Zongmin Ma:
Semantic Similarity Measure of Fuzzy XML DTDs with Extreme Learning Machine. 1343-1358 - Elkhan Jabarov, Myong-Soon Park, Byung-Won On, Gyu Sang Choi:
PCR*-Tree: PCM-Aware R*-Tree. 1359-1374 - Xiaoyan Zhang, Xiangfu Meng, Yanhuan Tang, Chongchun Bi:
Adaptive Query Relaxation and Result Categorization based on Data distribution and Query Context. 1375-1396
Volume 33, Number 6, November
- Abdul Rehman Gilal, Jafreezal Jaafar, Ahsanullah Abro, Mazni Omar, Shuib Basri, Muhammad Qaiser Saleem:
Effective Personality Preferences of Software Programmer: A Systematic Review. 1399-1416 - Farrukh Aslam Khan, Umar Manzoor, Azhar Khan, Aftab Ali, Haider Abbas, Maruf Pasha:
Peer-to-Peer File Sharing Framework for Smartphones: Deployment and Evaluation on Android. 1417-1432 - Nazish Yaqoob, Seemab Latif, Rabia Latif, Haider Abbas, Asif Yaseen:
An Adaptive Rule-Based Approach to Resolving Real-Time VoIP Wholesale Billing Disputes. 1433-1446 - Abdul Rehman Gilal, Jafreezal Jaafar, Ahsanullah Abro, Waheed Ali Umrani, Shuib Basri, Mazni Omar:
Making Programmer Effective for Software Development Teams: An Extended Study. 1447-1463 - Basit Shehzad, Kinza Mehr Awan, Muhammad Ikram Ullah Lali, Waqar Aslam:
Identification of Patterns in Failure of Software Projects. 1465-1479 - Waqar Aslam, Farah Ijaz, Muhammad Ikram Ullah Lali, Waqar Mehmood:
Risk Aware and Quality Enriched Effort Estimation for Mobile Applications in Distributed Agile Software Development. 1481-1500 - Sehrish Ferdous, Naveed Ikram:
Communication and Coordination Using Facebook: A Case Study of Distributed Software Development. 1501-1517 - Javed Iqbal, Rodina Binti Ahmad, Mohd Hairul Nizam Md. Nasir, Muzafar Khan:
Significant Requirements Engineering Practices for Outsourced Mobile Application Development. 1519-1530 - Muhammad Awais, Samreen Nawaz, Muhammad Sheraz Arshad Malik, Fazal-e-Amin:
A Comparative Study on Context Assessment Approaches in Mobile Robots. 1531-1546 - Sheikh Tahir Bakhsh, Basit Shahzad, Sabeen Tahir:
Risk Management Approaches for Large Scale Software Development. 1547-1560 - Saad Shafiq, Irum Inayat:
Model-driven Development based Cross Platform Application Development: A Systematic Mapping Study. 1561-1573 - Jinho Ahn:
SBML Protocol for Conquering Simultaneous Failures with Group Dissemination Functionality. 1575-1593 - Xiu-Juan Pu, Liang Han, Qian Liu, An-Yan Jiang:
FECG Extraction Based on Least Square Support Vector Machine Combined with FastICA. 1595-1609 - Khan Bahadar Khan, Amir A. Khaliq, Muhammad Shahid:
A Novel Fast GLM Approach for Retinal Vascular Segmentation and Denoising. 1611-1627 - Logesh Ravi, V. Subramaniyaswamy:
Learning Recency and Inferring Associations in Location Based Social Network for Emotion Induced Point-of-Interest Recommendation. 1629-1647
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.