


default search action
The Journal of Information Processing Systems, Volume 6
Volume 6, Number 1, March 2010
- Yuan-Kai Chen, Chang-Ping Hsu, Chung-Hua Hu, Rong-Syh Lin, Yi-Bing Lin, Jian-Zhi Lyu, Wudy Wu, Hey-Chyi Young, Yao Shen: 
 TOSS: Telecom Operations Support Systems for Broadband Services. 1-20
- Yogesh Singh, Arvinder Kaur, Bharti Suri: 
 A Hybrid Approach for Regression Testing in Interprocedural Program. 21-32
- Eun-Ha Song, Young-Sik Jeong: 
 GML Map Visualization on Mobile Devices. 33-42
- Shirisha Tallapally, R. Padmavathy: 
 Cryptanalysis on a Three Party Key Exchange Protocol-STPKE'. 43-52
- Sungun Kim, Hyunsoo Cheon, Sangbo Seo, Seungmi Song, Seonyeong Park: 
 A Hexagon Tessellation Approach for the Transmission Energy Efficiency in Underwater Wireless Sensor Networks. 53-66
- Feng Yu, Damalie Oyana, Wen-Chi Hou, Michael S. Wainer: 
 Approximate Clustering on Data Streams Using Discrete Cosine Transform. 67-78
- Younghee Kim, Wonyoung Kim, Ungmo Kim: 
 Mining Frequent Itemsets with Normalized Weight in Continuous Data Streams. 79-90
- Abdulaziz Alkussayer, William H. Allen: 
 The ISDF Framework: Towards Secure Software Development. 91-106
- Cheol-Soon Park, Jae-Cheol Ryou, Yong-Tae Park: 
 The ISDF Framework: Towards Secure Software Development. 107-120
- Abdisalam Issa-Salwe, Munir Ahmed, Khalid S. Aloufi, Muhammad Kabir: 
 Strategic Information Systems Alignment: Alignment of IS/IT with Business Strategy. 121-128
Volume 6, Number 2, June 2010
- Kai-Di Chang, Chi-Yuan Chen, Jiann-Liang Chen, Han-Chieh Chao: 
 Challenges to Next Generation Services in IP Multimedia Subsystem. 129-146
- Kezhong Liu, Ji Xiong: 
 A Fine-grained Localization Scheme Using A Mobile Beacon Node for Wireless Sensor Networks. 147-162
- Anour F. A. Dafa-Alla  , Ho-Sun Shon, Khalid E. K. Saeed, Minghao Piao, Unil Yun, Kyung-Joo Cheoi, Keun Ho Ryu: , Ho-Sun Shon, Khalid E. K. Saeed, Minghao Piao, Unil Yun, Kyung-Joo Cheoi, Keun Ho Ryu:
 IMTAR: Incremental Mining of General Temporal Association Rules. 163-176
- Lukman Sharif, Munir Ahmed: 
 The Wormhole Routing Attack in Wireless Sensor Networks (WSN). 177-184
- Seong-Hee Bae, Jaejoon Kim: 
 Development of Personal Information Protection Model using a Mobile Agent. 185-196
- Pin Ng, Richard Y. K. Fung  , Ray W. M. Kong: , Ray W. M. Kong:
 Incremental Model-based Test Suite Reduction with Formal Concept Analysis. 197-208
- Sang Hyun Lee, Sung-Eui Cho, Kyung-Il Moon: 
 Fast Fuzzy Control of Warranty Claims System. 209-218
- Beatriz Neto  , Lúcia Abrunhosa Fernandes, Cláudia M. L. Werner, Jano Moreira de Souza: , Lúcia Abrunhosa Fernandes, Cláudia M. L. Werner, Jano Moreira de Souza:
 Developing Digital Games through Software Reuse. 219-234
- Ruchika Malhotra, Arvinder Kaur, Yogesh Singh: 
 A Regression Test Selection and Prioritization Technique. 235-252
- Ui-Jin Jang, Hyung-Min Lim, Yong-Tae Shin: 
 A License Audit Model for Secure DRM Systems in IP-based Environments. 253-260
- Gyeong-Sic Jo, Yong-Guk Kim: 
 Recognition of Human Facial Expression in a Video Image using the Active Appearance Model. 261-268
Volume 6, Number 3, September 2010
- Mohammad S. Obaidat, Sanjay K. Dhurandher, Deepank Gupta, Nidhi Gupta, Anupriya Asthana: 
 DEESR: Dynamic Energy Efficient and Secure Routing Protocol for Wireless Sensor Networks in Urban Environments. 269-294
- Mohamed Mostafa A. Azim: 
 MAP: A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks. 295-306
- Akihiro Satoh, Toshiaki Osada, Toru Abe, Gen Kitagata, Norio Shiratori, Tetsuo Kinoshita: 
 A Classifiable Sub-Flow Selection Method for Traffic Classification in Mobile IP Networks. 307-322
- Eun-Young Lee: 
 Plans and Strategies for UBcN Networks and Services. 323-334
- R. Padmavathy, Chakravarthy Bhagvati: 
 Solving the Discrete Logarithm Problem for Ephemeral Keys in Chang and Chang Password Key Exchange Protocol. 335-346
- Seong-Young Ko, Won-Chul Bang, Sang-Youn Kim: 
 A Measurement System for 3D Hand-Drawn Gesture with a PHANToMTM Device. 347-358
- Eric Renault, Ahmad Ahmad, Mohamed Abid: 
 Access Control to Objects and their Description in the Future Network of Information. 359-374
- Yong-Kyun Kim, Yun-Hyun Jo, Jin-Won Yun, Taeck-Keun Oh, Hee-Chang Roh, Sang-Bang Choi, Hyo-Dal Park: 
 En-Route Trajectory calculation using Flight Plan Information for Effective Air Traffic Management. 375-384
- Manoj Kumar  , Anjana Gosain, Yogesh Singh: , Anjana Gosain, Yogesh Singh:
 Stakeholders Driven Requirements Engineering Approach for Data Warehouse Development. 385-402
- Dong-Ho Kim, Soon-Seok Kim, Yong-Hee Lee: 
 Speed-Sensitive Handover Scheme over IEEE 802.16 Multi-Relay Networks. 403-412
- Hamid Karimi  , Mehdi Kargahi, Nasser Yazdani: , Mehdi Kargahi, Nasser Yazdani:
 On the Handling of Node Failures: Energy-Efficient Job Allocation Algorithm for Real-time Sensor Networks. 413-434
Volume 6, Number 4, December 2010
- Zhi-Hui Wang, Chin-Chen Chang, Pei-Yu Tsai: 
 Hiding Secret Data in an Image Using Codeword Imitation. 435-452
- Elena Andreeva, Bart Mennink, Bart Preneel: 
 Security Properties of Domain Extenders for Cryptographic Hash Functions. 453-480
- Aly Mohamed El-Semary, Mostafa Gadal-Haqq M. Mostafa  : :
 Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques. 481-500
- Dae-Suk Yoo, Seung Sik Choi: 
 Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks. 501-510
- Md. Imdadul Islam, Nasima Begum  , Mahbubul Alam, M. Ruhul Amin: , Mahbubul Alam, M. Ruhul Amin:
 Fingerprint Detection Using Canny Filter and DWT, a New Approach. 511-520
- Juyoung Kang, Hwan-Seung Yong: 
 Mining Spatio-Temporal Patterns in Trajectory Data. 521-536
- Maneesha Srivasatav, Yogesh Singh, Durg Singh Chauhan: 
 An Optimized Approach of Fault Distribution for Debugging in Parallel. 537-552
- Sung-Jin Baek, Sun-Mi Park, Su-Hyun Yang, Eun-Ha Song, Young-Sik Jeong: 
 Efficient Server Virtualization using Grid Service Infrastructure. 553-562
- Ahmed Salem: 
 Intercepting Filter Approach to Injection Flaws. 563-574
- Hidayat Febiansyah, Jin Baek Kwon: 
 Generalized Proxy-Assisted Periodic Broadcasting (G-ProB) for Heterogeneous Clients in Video-on- Demand Service. 575-596
- Chetna Gupta, Yogesh Singh, Durg Singh Chauhan: 
 A Dynamic Approach to Estimate Change Impact using Type of Change Propagation. 597-608
- Hyung-Min Lim, Kun-Won Jang, Byung-Gi Kim: 
 A Study on Design and Implementation of the Ubiquitous Computing Environment-based Dynamic Smart On/Off-line Learner Tracking System. 609-620

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














