default search action
The Journal of Information Processing Systems, Volume 7
Volume 7, Number 1, March 2011
- Mohamed Kamal Jbira, Munir Ahmed:
Computer Simulation: A Hybrid Model for Traffic Signal Optimisation. 1-16 - Jiehui Chen, Mariam B. Salim, Mitsuji Matsumoto:
A Single Mobile Target Tracking in Voronoi-based Clustered Wireless Sensor Network. 17-28 - Aries Kusdaryono, Kyung-Oh Lee:
A Clustering Protocol with Mode Selection for Wireless Sensor Network. 29-42 - Mouhamed Abdulla, Yousef R. Shayan:
Analytical Coexistence Benchmark for Assessing the Utmost Interference Tolerated by IEEE 802.20. 43-52 - Ivy Ong, Hyotaek Lim:
Dynamic Load Balancing and Network Adaptive Virtual Storage Service for Mobile Appliances. 53-62 - Chunye Gong, Jie Liu, Haitao Chen, Jing Xie, Zhenghu Gong:
Accelerating the Sweep3D for a Graphic Processor Unit. 63-74 - Jung-Hwan Chang:
An Embedding of Multiple Edge-Disjoint Hamiltonian Cycles on Enhanced Pyramid Graphs. 75-84 - Susumu Matsumae:
Effective Partitioning of Static Global Buses for Small Processor Arrays. 85-92 - Haiqing Nan, Kyung Ki Kim, Wei Wang, Ken Choi:
Dynamic Voltage and Frequency Scaling for Power- Constrained Design using Process Voltage and Temperature Sensor Circuits. 93-102 - Jun Guo, Joohee Kim:
Adaptive Motion Vector Smoothing for Improving Side Information in Distributed Video Coding. 103-110 - Divyan M. Konidala, Daeyoung Kim, Chan Yeob Yeun, Byoungcheon Lee:
Security Framework for RFID-based Applications in Smart Home Environment. 111-120 - Mohammed Alzaabi, Chan Yeob Yeun, Thomas Anthony Martin:
Ensuring Anonymity for LBSs in Smartphone Environment. 121-136 - HyoJin Kim, Ramachandra Bhargav Chitti, JooSeok Song:
Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks. 137-150 - Neda Rohani, Zainab Noferesti, Javad Mohajeri, Mohammad Reza Aref:
Guess and Determine Attack on Bivium. 151-158 - Dengguo Feng, Jing Xu, Weidong Chen:
Generic Constructions for Strong Designated Verifier Signature. 159-172 - Mengsong Zou, Lansheng Han, Ming Liu, Qiwen Liu:
Virus Detection Method based on Behavior Resource Tree. 173-186 - Jae-Jung Kim, Seng-Phil Hong:
A Method of Risk Assessment for Multi-Factor Authentication. 187-198 - Gaëtan Martens, Ruben Verborgh, Chris Poppe, Rik Van de Walle:
Lifting a Metadata Model to the Semantic Multimedia World. 199-208 - Jung-Min Oh, Nammee Moon:
A Cultural Dimensions Model based on Smart Phone Applications. 209-220
Volume 7, Number 2, June 2011
- Ai Hua Ho, Yao Hua Ho, Kien A. Hua, Roy Villafane, Han-Chieh Chao:
An Efficient Broadcast Technique for Vehicular Networks . 221-240 - Mohammad S. Obaidat, Sanjay K. Dhurandher, Khushboo Diwakar:
CASPER: Congestion Aware Selection of Path with Efficient Routing in Multimedia Networks. 241-260 - Wei Nie, Houjun Wang, Jong Hyuk Park:
Packet Scheduling with QoS and Fairness for Downlink Traffic in WiMAX Networks. 261-270 - Yamin Li, Shietung Peng, Wanming Chu:
Parallel Prefix Computation and Sorting on a Recursive Dual-Net. 271-286 - Meeyeon Lee, Jung-Won Lee, Kyung-Ah Kim, Seung Soo Park:
Evaluating Service Description to Guarantee Quality of U-service Ontology. 287-298 - Nithiapidary Muthuvelu, Ian Chai, Eswaran Chikkannan, Rajkumar Buyya:
Batch Resizing Policies and Techniques for Fine- Grain Grid Tasks: The Nuts and Bolts. 299-320 - Vu Van Tan, Myeong-Jae Yi:
Development of an OPC Client-Server Framework for Monitoring and Control Systems. 321-340 - Ash Mohammad Abbas:
Analysis of Generalized Impact Factors and the Indices of Journals. 341-354 - Jaehee Byeon, Ju-Hong Song, Nammee Moon:
Design of Multi-dimensional Contents Retrieval UI for Mobile IPTV. 355-362 - Ruchika Malhotra, Mohit Garg:
An Adequacy Based Test Data Generation Technique Using Genetic Algorithms. 363-384 - Hong Joo Lee:
Analysis of Business Attributes in Information Technology Environments. 385-396
Volume 7, Number 3, September 2011
- Witold Pedrycz:
The Principle of Justifiable Granularity and an Optimization of Information Granularity Allocation as Fundamentals of Granular Computing. 397-412 - Mohammad H. Pandi, Omid Kashefi, Behrouz Minaei:
A Novel Similarity Measure for Sequence Data. 413-424 - Ayra Panganiban, Noel B. Linsangan, Felicito Caluyo:
Wavelet-based Feature Extraction Algorithm for an Iris Recognition System. 425-434 - Joonhyuk Yoo:
Probabilistic Soft Error Detection Based on Anomaly Speculation. 435-446 - Concepción Pérez de Célis Herrero, Jaime Lara Alvarez, Gustavo Cossio Aguilar, María Josefa Somodevilla García:
An Approach to Art Collections Management and Content-based Recovery. 447-458 - Kyung-Mi Park, Han-Cheol Cho, Hae-Chang Rim:
Utilizing Various Natural Language Processing Techniques for Biomedical Interaction Extraction. 459-472 - Jagat Sesh Challa, Arindam Paul, Yogesh Dada, Venkatesh Nerella, Praveen Ranjan Srivastava, Ajit Pratap Singh:
Integrated Software Quality Evaluation: A Fuzzy Multi-Criteria Approach. 473-518 - Hua Fang, Jeongwoo Kim, Jong-Whan Jang:
A Fast Snake Algorithm for Tracking Multiple Objects. 519-530 - Hiroshi Kutsuna, Satoshi Fujita:
A Fair and Efficient Congestion Avoidance Scheme Based on the Minority Game. 531-542 - Hong Joo Lee:
A Study on the Business Strategy of Smart Devices for Multimedia Contents. 543-548 - Kun Peng:
Efficient Proof of Vote Validity Without Honest-Verifier Assumption in Homomorphic E-Voting. 549-560
Volume 7, Number 4, December 2011
- Amit Grover, Hal Berghel:
A Survey of RFID Deployment and Security Issues. 561-580 - Yuki Fujiwara, Susumu Date, Kohei Ichikawa, Haruo Takemura:
A Multi-Application Controller for SAGE-enabled Tiled Display Wall in Wide-area Distributed Computing Environments. 581-594 - Amartya Neogi, Abhoy Chand Mondal, Soumitra Kumar Mandal:
A Cascaded Fuzzy Inference System for University Non-Teaching Staff Performance Appraisal. 595-612 - Da-Ren Chen, You-Shyang Chen:
An Efficient DVS Algorithm for Pinwheel Task Schedules. 613-626 - Ji In Kim, Seok Joo Koh:
Partial Bicasting with Buffering for Proxy Mobile IPv6 Handover in Wireless Networks. 627-634 - Seo-Young Noh, Shashi K. Gadia:
A Model Comparison for Spatiotemporal Data in Ubiquitous Environments: A Case Study. 635-652 - Tonmoy Saha, Md. Abu Shufean, Mahbubul Alam, Md. Imdadul Islam:
Performance Evaluation of the WiMAX Network Based on Combining the 2D Markov Chain and MMPP Traffic Model. 653-678 - Md. Syeful Islam, Md. Rezaur Rahman, Anupam Roy, Md. Imdadul Islam, M. Ruhul Amin:
Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic. 679-690 - Daewan Han:
Grobner Basis Attacks on Lightweight RFID Authentication Protocols. 691-706 - Joon-Min Gil, Mihye Kim:
A Log Analysis System with REST Web Services for Desktop Grids and its Application to Resource Group-based Task Scheduling. 707-716 - Simon Fong, Yang Hang, Sabah Mohammed, Jinan Fiaidhi:
Stream-based Biomedical Classification Algorithms for Analyzing Biosignals. 717
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.