default search action
Journal of Information Science and Engineering, Volume 28
Volume 28, Number 1, January 2012
- Cheng-Hsuan Li, Hsin-Hua Ho, Yu-Lung Liu, Chin-Teng Lin, Bor-Chen Kuo, Jin-Shiuh Taur:
An Automatic Method for Selecting the Parameter of the Normalized Kernel Function to Support Vector Machines. 1-15 - Yih-Lon Lin, Wen-Lin Chen:
Fast Search Strategies for Fractal Image Compression. 17-30 - Xue Gao, Lianwen Jin:
A Vision-Based Fast Chinese Postal Envelope Identification System. 31-49 - Yao Lu, Xiaojun Quan, Jingsheng Lei, Xingliang Ni, Wenyin Liu, Yinlong Xu:
Semantic Link Analysis for Finding Answer Experts. 51-65 - Peng Ding, Minghai Xu, Dongliang Sun:
Estimation of Unknown Inlet Temperature Profile Using an Improved Gbest-PSO. 67-82 - Meng-Lun Wu, Chia-Hui Chang, Rui-Zhe Liu, Teng-Kai Fan:
Aggregate Two-Way Co-Clustering of Ads and User Data for Online Advertisements. 83-97 - Yi-Chang Shan, I-Chen Wu, Hung-Hsuan Lin, Kuo-Yuan Kao:
Solving Nine Layer Triangular Nim in Mobile Ad Hoc Networks. 99-113 - Rei-Heng Cheng, Chiming Huang:
Efficient Prediction-Based Location Updating and Destination Searching Mechanisms for Geographic Routing. 115-129 - Kuen-Han Lin, Chun-Hua Chang, Andreas Dopfer, Chieh-Chih Wang:
Mapping and Localization in 3D Environments Using a 2D Laser Scanner and a Stereo Camera. 131-144 - Sai-Keung Wong, Shih-Wei Fang:
A Study on Genetic Algorithm and Neural Network for Mini-Games. 145-159 - Wei-Guang Teng, Wei-Hsun Wen, Yue-Cen Liu:
From Experience to Expertise: Digesting Cumulative Information for Informational Web Search. 161-176 - Show-Jane Yen, Chiu-Kuang Wang, Liang-Yuh Ouyang:
A Search Space Reduced Algorithm for Mining Frequent Patterns. 177-191 - Guo-Cheng Lan, Tzung-Pei Hong, Vincent S. Tseng:
A Projection-Based Approach for Discovering High Average-Utility Itemsets. 193-209
Volume 28, Number 2, March 2012
- Ya-Hui Chang, Cheng-Yi Wu, Cheng-Cheng Lo:
Processing XML Queries with Structural and Full-Text Constraints. 221-242 - Hsing-Kuo Pao, Ching-Hao Mao, Hahn-Ming Lee, Chi-Dong Chen, Christos Faloutsos:
An Intrinsic Graphical Signature Based on Alert Correlation Analysis for Intrusion Detection. 243-262 - Yangjun Chen, Yibin Chen:
Subtree Reconstruction, Query Node Intervals and Tree Pattern Query Evaluation. 263-293 - Naseer Sabri, Syed Alwee Aljunid, R. Badlishah Ahmad, M. F. Malek, Abid Yahya, R. Kamaruddin, M. S. Salim:
Smart Prolong Fuzzy Wireless Sensor-Actor Network for Agricultural Application. 295-316 - Kun Wang, Meng Wu:
Nash Equilibrium of Node Cooperation Based on Metamodel for MANETs. 317-333 - Po-Ruey Lei, Wen-Chih Peng, Ing-Jiunn Su, Chien-Ping Chang:
Dummy-Based Schemes for Protecting Movement Trajectories. 335-350 - Shyue-Kung Lu, Ya-Chen Huang:
Improving Reusability of Test Symbols for Test Data Compression. 351-364 - Hyeon Gyu Kim, Myoung-Ho Kim:
A Hybrid Method for Fast Predicate Matching in Data Stream Processing. 365-377 - Rui Chen, Zhengkun Mi, Liangbao Jiao:
Parameter-Aware Cross-Layer Scheme for Wireless Video. 379-391 - Zong Min Ma, Xing Wang:
Rule Interchange in the Semantic Web. 393-406 - Renbo Xia, Ji-Bin Zhao, Weijun Liu, Jianhuang Wu, Sheng-Peng Fu, Jun Jiang, Jia-Zhi Li:
A Robust Recognition Algorithm for Encoded Targets in Close-range Photogrammetry. 407-418 - Qiang Dong, Xiaofan Yang:
Fault-Tolerant Cycle Embedding in Restricted Hypercube-like Networks with More Faulty Nodes. 419-426
Volume 28, Number 3, May 2012
- Jianxiao Liu, Keqing He, Da Ning:
Web Service Aggregation Using Semantic Interoperability Oriented Method. 437-452 - Dong Yan, Yulong Wang, Sen Su, Fangchun Yang:
A Precise and Practical IP Traceback Technique Based on Packet Marking and Logging. 453-470 - Hsinyi Tseng, Tzonelih Hwang, Ching-Ying Lin:
On the "Deterministic Secure Quantum Communication using Four-Particle Entangled State and Entanglement Swapping". 471-478 - Jehn-Ruey Jiang, Yung-Liang Lai:
Wireless Broadcasting with Optimized Transmission Efficiency. 479-502 - Mu-Song Chen, Hao-Wei Yen:
An Online RBF Network Approach for Adaptive Message Scheduling on Controller Area Networks. 503-519 - Lieu-Hen Chen, Yi-Hsien Chen, Shuo-Yan Lin, Ting-Yu Liu, Wen-Chieh Hsieh:
Synthesizing Non Photo-Realistic Rendering Effects of Volumetric Strokes. 521-535 - Shiao-Li Tsao, Sung-Yuan Lee:
Performance Evaluation of Inter-Processor Communication for an Embedded Heterogeneous Multi-Core Processor. 537-554 - Ling-Ling Xu, Fang-Guo Zhang:
Oblivious Transfer with Threshold Access Control. 555-570 - Jia Yu, Fanyu Kong, Huawei Zhao, Xiangguo Cheng, Rong Hao, Xiang-Fa Guo:
Non-Interactive Forward-Secure Threshold Signature without Random Oracles. 571-586
- Jin-Seo Park, Se-Jong Oh:
A New Concave Hull Algorithm and Concaveness Measure for n-dimensional Datasets. 587-600 - Gu-Li Lin, Hong Peng, Qian-Li Ma, Jia Wei, Jiang-Wei Qin:
A Keyword Based Prototype for Web Search Result Diversification. 601-615 - Wei-long Chen, Xiaohai He, Haiying Song, Wei Wu:
An Improved Sequence-to-sequence Alignment Method Combined with Feature-based Image Registration Algorithm. 617-630
Volume 28, Number 4, July 2012
- Qing Zhang, Jianjun Lin:
Exemplar-Based Image Inpainting Using Color Distribution Analysis. 641-654 - Jyh-Huei Chang, Rong-Hong Jan:
Message Ferry Routing Algorithm for Data Collection in Partitioned and Buffer-Limited Wireless Sensor Networks. 655-669 - Saeed Reza Aghabozorgi, Mahmoud Reza Saybani, Ying Wah Teh:
Incremental Clustering of Time-Series by Fuzzy Clustering. 671-688 - Ying-Chie Chen, Yuh-Dauh Lyuu, Kuo-Wei Wen:
The Complexity of GARCH Option Pricing Models. 689-704 - Tan-Chi Ho, Jung-Hong Chuang:
Volume Based Mesh Segmentation. 705-722 - Kun-Chan Lan, Tsung-hsung Wu:
A Trace-based Feasibility Study of Infrastructure-less VoIP. 723-737
- Han-Yu Lin, Tzong-Sun Wu, Shih-Kun Huang:
Certificate-Based Secure Three-Party Signcryption Scheme with Low Costs. 739-753 - Jiunn-Lin Wu, Yi-Ying Chou:
An Effective Content-Aware Image Inpainting Method. 755-770 - Han-Yu Lin, Tzong-Sun Wu, Shih-Kun Huang:
An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce. 771-785
- Hsiang-An Wang, Yen-Chun Lin, Hua-Ting Lu, Shang-Te Lin:
Open Source for Web-Based Video Editing. 787-801
Volume 28, Number 5, September 2012
- Zhengwei Qi, Bingyu Li, Qian Lin, Miao Yu, Mingyuan Xia, Haibing Guan:
SPAD: Software Protection Through Anti-Debugging Using Hardware-Assisted Virtualization. 813-827 - Junghyun Nam, Minkyu Park, Sangchul Han, Juryon Paik, Dongho Won:
Scalable Group Key Exchange for Securing Distributed Operating Systems. 829-857 - Bongjae Kim, Yookun Cho, Jiman Hong:
An Efficient Function Inlining Scheme for Resource-Constrained Embedded Systems. 859-874 - Mei-Ling Chiang, Hsiang-Yu Hsu:
A Platform for Supporting Dynamic Update and Resource Protection in an Embedded Operating System. 875-893 - Kyunghee Cho, Seonggun Kim, Hwansoo Han:
Enhancing Visual Rendering on Multicore Accelerators with Explicitly Managed Memories. 895-909 - HongGeun Kim, Dongjin Kim, Seong-je Cho, Moonju Park, Minkyu Park:
Efficient Detection of Malicious Web Pages Using High-Interaction Client Honeypots. 911-924 - Sohyun Park, Jongmoo Choi, Haeyoung Yoo:
Integrated Model of Service-Oriented Architecture and Web-Oriented Architecture for Financial Software. 925-939 - Chin-Hsien Wu, Hau-Shan Wu:
A Data De-duplication Access Framework for Solid State Drives. 941-954 - Junghoon Lee, Hye-Jin Kim, Gyung-Leen Park, Mikyung Kang:
Energy Consumption Scheduler for Demand Response Systems in the Smart Grid. 955-969
- Shih-Hsu Huang, Wen-Pin Tu, Bing-Hung Li:
High-Level Synthesis for Minimum-Area Low-Power Clock Gating. 971-988
Volume 28, Number 6, November 2012
- Youngjae Lee, Jin-Soo Kim, Seungryoul Maeng:
ReSSD: A Software Layer for Improving the Small Random Write Performance of SSDs. 999-1018 - Chenglong Xu, Jeong Sik Mun, Sung-Ryul Kim:
An Efficient DRM Standard Protocol Implementation for Media Cards. 1019-1027 - Jinman Jung, Bongjae Kim, Jiman Hong:
Unified Simulation Framework for Protocol Stacks in Sensor Operating Systems. 1029-1043 - Jaesoo Lee, Jonghun Yoo, Yongseok Park, Seongsoo Hong:
Per-Client Network Performance Isolation in VDE-Based Cloud Computing Servers. 1045-1058 - Joonhyouk Jang, Jinman Jung, Yookun Cho, Sanghoon Choi, Sung Y. Shin:
Design of a Lightweight TCP/IP Protocol Stack with an Event-Driven Scheduler. 1059-1071 - Jian-Jia Chen, Kai Huang, Lothar Thiele:
Dynamic Frequency Scaling Schemes for Heterogeneous Clusters under Quality of Service Requirements. 1073-1090 - Chin-Hsien Wu:
A Bad-Block Test Design for Multiple Flash-Memory Chips. 1091-1104 - Hai Thanh Mai, Myoung-Ho Kim:
Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks. 1105-1128 - Wan-Yu Lee, Iris Hui-Ru Jiang, Tsung-Wan Mei:
Generic Integer Linear Programming Formulation for 3D IC Partitioning. 1129-1144 - Haifeng Li, Minyan Lu, Min Zeng, Bai-Qiao Huang:
A Non-Parametric Software Reliability Modeling Approach by Using Gene Expression Programming. 1145-1160
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.