default search action
Journal of Information Science and Engineering, Volume 27
Volume 27, Number 1, January 2011
- Shun-Chieh Lin, Min-Jian Liao, Yi-Lin Chiang:
Design and Analysis of Multi-Source Extraction and Localization for Sound-Activated Designation of Automata. 1-18 - Sunwook Kim, Seongwoon Kim, Kyoung Park, Yongwha Chung:
Offloading Socket Processing for Ubiquitous Services. 19-33 - Jianhua Ma, Runhe Huang, Tomomi Kawashima, Bernady O. Apduhan:
Spacelog Data Acquisition, Management and Applications in a Gateway-based Smart Space. 35-50 - Shen Li, Andong Zhan, Xiaobing Wu, Panlong Yang, Guihai Chen:
Efficient Emergency Rescue Navigation with Wireless Sensor Networks. 51-64 - Dezun Dong, Mo Li, Yunhao Liu, Xiangke Liao:
Connectivity-Based Wormhole Detection in Ubiquitous Sensor Networks. 65-78 - Gu Hsin Lai, Chen-Sen Ouyang, Chia-Mei Chen:
A Group-Based Deployment for Wormhole Prevention in Sensor Networks. 79-93
- Hwei-Jen Lin, Hung-Hsuan Wu, Chun-Wei Wang:
Music Matching Based on Rough Longest Common Subsequence. 95-110 - Gap-Joo Na, Bongki Moon, Sang-Won Lee:
IPLB+-tree for Flash Memory Database Systems. 111-127 - Su-Wan Park, Sang-Uk Shin:
Authentication and Copyright Protection Scheme for H.264/AVC and SVC. 129-142 - Ig-hoon Lee, Sang-goo Lee, Junho Shim:
Making T-Trees Cache Conscious on Commodity Microprocessors. 143-161 - Chi-Hung Fan, Hui-Yu Huang, Wen-Hsing Hsu:
A Robust Watermarking Technique Resistant JPEG Compression. 163-180 - Yong-Tao Wang, Ke-Fei Chen, Jian-Hong Chen:
Attribute-Based Traitor Tracing. 181-195 - Jinhua Wang, De Xu, Congyan Lang, Bing Li:
Exposure Fusino Based on Shift-Invariant Discrete Wavelet Transform. 197-211 - Jing-Chiou Liou:
On Improving CMMI in an Immature World of Software Development. 213-226 - Wei-Chih Chen, Jyh-Horng Jeng:
Characterization of WOSF by Equivalent Classes through Support Vector Machine. 227-242 - Zhong-Mei Wan, Jian Weng, Xuejia Lai, Shengli Liu, Jiguo Li:
On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption. 243-259 - Hsung-Pin Chang, Yu-Chieh Lin, Da-Wei Chang:
An Online Reprogrammable Operating System for Wireless Sensor Networks. 261-286 - Chao-Hung Lu, Hung-Ming Chen, Chien-Nan Jimmy Liu:
Design Planning with 3D-Via Optimization in Alternative Stacking Integrated Circuits. 287-302 - Hung-Yan Gu, Huang-Liang Liao:
Mandarin Singing-voice Synthesis Using an HNM Based Scheme. 303-317 - Kanchana Silawarawet, Natawut Nupairoj:
Locality-Aware Clustering Application Level Multicast for Live Streaming Services on the Internet. 319-336 - Jia-Ru Lin, I-Chen Lin:
Multi-layered Expression Synthesis. 337-351
- Li-min Liu, Tian-Shyr Dai:
A Reliable Fingerprint Orientation Estimation Algorithm. 353-368 - Ying-Nong Chen, Chin-Chuan Han, Cheng-Tzu Wang, Kuo-Chin Fan:
A Novel Scheme for Face Recognition and Authentication Against Pose, Illumination and Expression Changes. 369-380 - Jyh-Huei Chang:
An Efficient Relay Sensor Placing Algorithm for Connectivity in Wireless Sensor Networks. 381-392
Volume 27, Number 2, March 2011
- Po-Jen Chuang, Jer-Sheng Deng, Chih-Shin Lin:
Location Privacy Protection Using Independent ID Update for WLANs. 403-418 - Cheng-Chen Lin, Yin-Tsung Hwang:
Lossless Compression of Hyperspectral Images Using Adaptive Prediction and Backward Search Schemes. 419-435 - Jian-Hong Chen, Yong-Tao Wang, Ke-Fei Chen:
Attribute-Based Key-Insulated Encryption. 437-449 - Han-Yu Lin, Tzong-Sun Wu, Yi-Shiung Yeh:
A DL Based Short Strong Designated Verifier Signature Scheme with Low Computation. 451-463 - Xiao Zeng, Zhenyong Chen, Ming Chen, Zhang Xiong:
Reversible Video Watermarking Using Motion Estimation and Prediction Error Expansion. 465-479 - Chao-Hui Ko, Ching-Tsorng Tsai, Chishyan Liaw:
The Linear Quantization Strategy of Quadratic Hebbian-Type Associative Memories and Their Performance Analysis. 481-492 - Hankook Jang, Sang-Hwa Chung, Dong Kyue Kim, Yun-Sung Lee:
An Efficient Architecture for a TCP Offload Engine Based on Hardware/Software Co-design. 493-509 - Seyed Mostafa Fakhrahmad, Gholamhosein Dastghaibyfard:
An Efficient Frequent Pattern Mining Method and its Parallelization in Transactional Databases. 511-525 - Minghua Tang, Xiaola Lin:
Injection Level Flow Control for Networks-on-Chip (NoC). 527-544 - Shu-Kuo Sun, Zen Chen:
Robust Logo Recognition for Mobile Phone Applications. 545-559 - Hung-Yi Lin:
High Index Compression without the Dependencies of Data Orders and Data Skewness for Spatial Databases. 561-576 - Hsien-Wei Yang, I-En Liao, Chaur-Chin Chen:
Reversible Data Hiding Based on Median Difference Histogram. 577-593 - Woo-Sung Jung, Eun-Joo Lee, Kap-Su Kim, Chi-Su Wu:
An Entropy-Based Complexity Measure for Web Applications Using Structural Information. 595-619 - Grzegorz Ulacha:
Method of Lossless and Near-Lossless Color Image Compression. 621-642 - Tsu-Wei Tseng, Jin-Fu Li:
SETBIST: An Soft-Error Tolerant Built-In Self-Test Scheme for Random Access Memories. 643-656 - Jehn-Ruey Jiang, Jang-Ping Sheu, Ching Tu, Jih-Wei Wu:
An Anonymous Path Routing (APR) Protocol for Wireless Sensor Networks. 657-680 - Xin Wang, Linpeng Huang, Xiaohui Xu, Yi Zhang, Jun-Qing Chen:
A Solution for Data Inconsistency in Data Integration. 681-695 - Stephen J. H. Yang, Jia Zhang, Stella T. C. Tsai, Jeff J. S. Huang:
Applying Semantic Segment Detection to Enhance Web Page Presentation on the Mobile Internet. 697-713 - Sin-Yu Chen, Jun-Wei Hsieh, Duan-Yu Chen:
Jointing Edge Labeling and Geometrical Constraint for Lane Detection and its Application to Suspicious Driving Behavior Analysis. 715-732 - Chin-Pan Huang, Ching-Chung Li:
Secret Image Sharing Using Multiwavelet Transform. 733-748 - Sheng-Fuu Lin, Hsien-Tse Chen, Yi-Hsien Lin:
Automatic Counting Cancer Cell Colonies using Fuzzy Inference System. 749-760 - Hyosook Jung, Seongbin Park:
Mashup Creation Using a Mashup Rule Language. 761-775 - Kuo-Hui Yeh, Nai-Wei Lo, Enrico Winata:
CE-TIP: A Code Expansion Based Tag Identification Protocol for RFID Systems. 777-788
Volume 27, Number 3, May 2011
- Reza Akbari, Koorush Ziarati:
A Cooperative Approach to Bee Swarm Optimization. 799-818 - Zafer Erenel, Hakan Altinçay, Ekrem Varoglu:
Explicit Use of Term Occurrence Probabilities for Term Weighting in Text Categorization. 819-834 - Jeng-Farn Lee, Yuan-Neng Hsu:
Fairness Provisioning in Multi-hop Wireless Backhaul Networks: A Dynamic Estimation Approach. 835-853 - Qian Liu, Sanyang Liu, Lifang Liu:
Similarity Analysis between Transcription Factor Binding Sites by Bayesian Hypothesis Test. 855-868 - Li-Han Chen, Fu-Hau Hsu, Cheng-Hsien Huang, Chih-Wen Ou, Chia-Jun Lin, Szu-Chi Liu:
A Robust Kernel-Based Solution to Control-Hijacking Buffer Overflow Attacks. 869-890 - Chung-Min Yu, Chung-Ming Wang:
An Effective Framework for Cloud Modeling, Rendering, and Morphing. 891-913 - Tsu-Yang Wu, Yuh-Min Tseng, Ching-Wen Yu:
A Secure ID-Based Authenticated Group Key Exchange Protocol Resistant to Insider Attacks. 915-932 - Byunghee Lee, Kyungho Son, Dongho Won, Seungjoo Kim:
Secure Data Deletion for USB Flash Memory. 933-952 - Ming-Der Shieh, Wen-Ching Lin, Chien-Ming Wu:
Design of High-Speed Iterative Dividers in GF(2m). 953-967 - Chun-I Fan, Ruei-Hau Hsu, Pei-Hsiu Ho:
Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings. 969-982 - Tsung-Yuan Liu, Wen-Hsiang Tsai:
Data Hiding in Graphic Drawings by Structures of Object Groupings. 983-994 - Chih-Tang Chang, Jim Z. C. Lai, Mu-Der Jeng:
A Fuzzy K-means Clustering Algorithm Using Cluster Center Displacement. 995-1009 - Hwai-Jung Hsu, Feng-Jian Wang:
A Delegation Framework for Task-Role Based Access Control in WFMS. 1011-1028 - Chia-Jung Lee, Shi-Chun Tsai:
Alternating Runs of Geometrically Distributed Random Variables. 1029-1044 - Lieu-Hen Chen, Yu-Sheng Chen, Tsung-Chih Tsai:
Perceptual LOD under Low Resolution Conditions. 1045-1057 - Shuhua Wu:
Security Analysis and Enhancements of Verifier-Based Password-Authenticated Key Exchange Protocols in the Three-Party Setting. 1059-1072 - Seok Kyoo Kim, Juno Chang, Sang-Yong Han:
Implementation of Business Logic Framework for Collaboration of Heterogeneous Service Systems in RFID/USN Environment. 1073-1089 - Kyunghwi Kim, Byunghyuk Jung, Wonjun Lee, Ding-Zhu Du:
Adaptive Path Planning for Randomly Deployed Wireless Sensor Networks. 1091-1106 - Chen-Chiung Hsieh, Yo-Ping Huang, Yu-Yi Chen, Chiou-Shann Fuh:
Video Super-Resolution by Motion Compensated Iterative Back-Projection Approach. 1107-1122 - Hoa-Yu Chan, Kuu-Young Young, Hsin-Chia Fu:
Intention Learning From Human Demonstration. 1123-1136 - Shin Gyu Kim, Hyuck Han, Hyungsoo Jung, Hyeonsang Eom, Heon Young Yeom:
Improving MapReduce Performance by Exploiting Input Redundancy. 1137-1152 - Min-Rong Chen, Xi Zhang, Xia Li:
Comments on Shao-Cao's Unidirectional Proxy Re-Encryption Scheme from PKC 2009. 1153-1158 - Min-Zheng Shieh, Shi-Chun Tsai:
Improved Bound on Approximating Jug Measuring Problem. 1159-1163 - Liang-Bi Chen, Yen-Ling Chen, Ing-Jer Huang:
A Real-Time Power Analysis Platform for Power-Aware Embedded System Development. 1165-1182
Volume 27, Number 4, July 2011
- Youngjin Yu, Dongin Shin, Hyeong Seog Kim, Hyeonsang Eom, Heon Young Yeom:
Backup Metadata As Data: DPC-Tolerance to Commodity File System. 1193-1218 - Min-Ki Kim:
Palmprint Recognition Based on Line and Slope Orientation Features. 1219-1232 - Yunyoung Nam:
Map-based Indoor People Localization using an Inertial Measurement Unit. 1233-1248 - Jianhong Zhang, Jian Mao:
Another Efficient Proxy Signature Scheme in the Standard Model. 1249-1264 - Che-Wei Lee, Wen-Hsiang Tsai:
A Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme. 1265-1282 - Sung Chul Park, Young Chul Park:
The SQL Function XMLNEST to Generate Recursive XML Values from Relational Data. 1283-1302 - J. A. M. Naranjo, Leocadio G. Casado, Juan Antonio López Ramos:
Group Oriented Renewal of Secrets and Its Application to Secure Multicast. 1303-1313 - Jinmin Zhong, Xuejia Lai:
Preimage Attack on Reduced DHA-256. 1315-1327 - Shuhua Wu, Yuefei Zhu, Qiong Pu:
Cryptanalysis and Enhancements of Three-Party Authenticated Key Exchange Protocol using ECC. 1329-1343 - Jia-Ming Chen, Jenq-Shiou Leu, Yen-Chiu Chen, Hsin-Wen Wei, Wei-Kuan Shih:
MegaDrop: A Cooperative Video-on-Demand System in a Peer-to-Peer Environment. 1345-1361 - Bingchiang Jeng, Dowming Yeh, Deron Wang, Shu-Lan Chu, Chia-Mei Chen:
A Specific Effort Estimation Method Using Function Point. 1363-1376 - Chung-Feng Jeffrey Kuo, Chin-Hsun Chiu:
Improved Auto-Focus Search Algorithms for CMOS Image-Sensing Module. 1377-1393 - Chunhua Yang, Hai-Yang Wang:
An Approach to Weaving Stateful Aspects using LTS. 1395-1411 - Jae-Won Lee, Han-Joon Kim, Sang-goo Lee:
Exploiting Taxonomic Knowledge for Personalized Search: A Bayesian Belief Network-based Approach. 1413-1433 - Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:
New Forward-Secure Signature Scheme with Untrusted Update. 1435-1448 - Tsong Yueh Chen, Dehao Huang, Zhiquan Zhou:
On Adaptive Random Testing Through Iterative Partitioning. 1449-1472 - Lei Zhang, Rui Wang, Li Cui:
Real-time Traffic Monitoring with Magnetic Sensor Networks. 1473-1486 - Hung-Yu Chien:
Secure Verifier-Based Three-Party Key Exchange in the Random Oracle Model. 1487-1501
Volume 27, Number 5, September 2011
- Shih-Hsu Huang, Guan-Yu Jhuo, Wei-Lun Huang:
Minimum Inserted Buffers for Clock Period Minimization. 1513-1526 - Chih-Hung Lee, Shih-Hsu Huang, Chun-Hua Cheng:
Accurate TSV Number Minimization in High-Level Synthesis. 1527-1543 - Sai-Keung Wong:
Adaptive Continuous Collision Detection for Cloth Models Using a Skipping Frame Session. 1545-1559 - Hung-Yan Gu, Chung-Chieh Yang:
An HMM Based Pitch-Contour Generation Method for Mandarin Speech Synthesis. 1561-1580 - Ehsan Khosrowshahi Asl, Majid Noorhosseini, Atieh Saberi Pirouz:
A Dynamic Ant Colony Based Routing Algorithm for Mobile Ad-hoc Networks. 1581-1596 - Po-Jen Chuang, Cheng-Pei Wu:
Employing PSO to Enhance RSS Range-Based Node Localization for Wireless Sensor Networks. 1597-1611 - Abel Nyamapfene:
Towards Understanding Child Language Acquisition: An Unsupervised Multimodal Neural Network Approach. 1613-1639 - I-Wei Wu, Chung-Ping Chung, Jean Jyh-Jiun Shann:
Area-Efficient Instruction Set Extension Exploration with Hardware Design Space Exploration. 1641-1657 - Tung-Yang Ho, Cheng-Kuan Lin, Jimmy J. M. Tan, D. Frank Hsu, Lih-Hsing Hsu:
On the Extremal Number of Edges in Hamiltonian Graphs. 1659-1665 - Chulmin Yun, Byonghwa Oh, Jihoon Yang, Jongho Nang:
Feature Subset Selection Based on Bio-Inspired Algorithms. 1667-1686 - Maisam Mansub Bassiri, Hadi Shahriar Shahhoseini:
Future-based On-line Integrated HW/SW Partitioning and Co-scheduling for Reconfigurable Computing Systems. 1687-1711 - Chin-Hsien Wu, Chen-Kai Jan, Tei-Wei Kuo:
A Low-Memory Address Translation Mechanism for Flash-Memory Storage Systems. 1713-1727 - Hyun-Su Jang, Changhwan Song, Moon Jeong Kim, Young Ik Eom:
Agent-based Intelligent Middleware for User-Centric Services in Ubiquitous Computing Environments. 1729-1746 - Ghasem Mirjalily, Mohammad Hadi Karimi Tafti:
Load Balancing in Metro Ethernet Networks by Selecting the Best Spanning Tree. 1747-1759 - Mei-Sen Pan, Jing-Tian Tang, Xiao-Li Yang:
Medical Image Registration Based on SVD and Modified PSNR. 1761-1775
Volume 27, Number 6, November 2011
- Woosung Jung, Eunjoo Lee, Chisu Wu:
An Experimental Approach to Detect Similar Web Pages Based on 3-Levels of Similarity Clues. 1787-1822 - Yin-Tien Wang, Duan-Yan Hung, Chung-Hsun Sun:
Improving Data Association in Robot SLAM with Monocular Vision. 1823-1837 - Shih-Chien Chou, Jin-Yuan Jhu:
Embedding Access Control Policy in Web Service Path Composition Algorithm. 1839-1853 - Malik Tahir Hassan, Asim Karim:
Impact of Behavior Clustering on Web Surfer Behavior Prediction. 1855-1870 - In-Su Yoon, Sang-Hwa Chung, Yoon-Geun Kwon:
Implementation of a Software-Based TCP/IP Offload Engine Using Standalone TCP/IP without an Embedded OS. 1871-1883 - Yu-Shuen Wang, Min-Wen Chao, Chin-Chueng Yi, Chao-Hung Lin:
Cubist Style Rendering for 3D Polygonal Models. 1885-1899 - Dong-Wei Lin, Jin-Long Hsieh, Shih-Hsuan Yang, Chia-Chi Yang:
Fast Inter-Mode Selection for H.264 Encoders Based on Coded Block Patterns and Interblock Correlation. 1901-1917 - Lee-Min Lee:
High-Order Hidden Markov Model and Application to Continuous Mandarin Digit Recognition. 1919-1930 - Shaojing Fu, Bing Sun, Chao Li, Longjiang Qu:
Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree. 1931-1942 - Chia-Yi Lin, Hung-Ming Chen:
A Generic Multi-Dimensional Scan-Control Scheme for Test-Cost Reduction. 1943-1957 - Chih-Lin Hu:
Adaptive Scheduling for On-Demand Time-Critical Information Dissemination over Data Broadcast Channel. 1959-1983 - Lih-Chyau Wuu, Chi-Hsiang Hung, Jyun-Yan Yang:
IP Traceback Based on Chinese Remainder Theorem. 1985-1999 - Congxin Liu, Jie Yang, Hai Huang:
P-SURF: A Robust Local Image Descriptor. 2001-2015 - Yan-Jing Wu, Wei-Cheng Sung, Tsang-Ling Sheu:
A Dynamic Navigation Approach with Rebroadcasting Flood Avoidance in VANETs. 2017-2029 - Yan-Jun Li, Wen-Ling Wu:
Improved Integral Attacks on Rijndael. 2031-2045
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.