


default search action
Journal of Information Science and Engineering, Volume 24
Volume 24, Number 1, January 2008
- Chieh-Feng Chiang, Jimmy J. M. Tan:

A Novel Approach to Comparison-Based Diagnosis. 1-9 - Chien-Hung Liu, Chuan-Wen Chang:

A State-Based Testing Approach for Aspect-Oriented Programming. 11-31 - Ming-Yen Lin, Sue-Chen Hsueh, Chia-Wen Chang:

Mining Closed Sequential Patterns with Time Constraints. 33-46 - Shiao-Li Tsao, Chih-Chien Hsu:

A Dynamic Load Balancing Scheme for VoIP over WLANs. 47-60 - Chien Chen, Chia-Jen Hsu, Chi-Chia Huang:

Fast Packet Classification Using Bit Compression with Fast Boolean Expansion. 61-81 - Ying-Chieh Chen, Sin-Jhen Chiu, Hsiang-Ting Chen, Chun-Fa Chang:

Physically-Based Analysis and Rendering of Bidirectional Texture Functions Data. 83-98 - Guan-Yu Chen, Ying-Cheng Chen, Chu-Fang Lin, An-Chi Hu, Cheng-Chi Wu, Yung-Chang Chen:

Template-Based Automatic Segmentation of /Drosophila/ Mushroom Bodies. 99-113 - Chao-Hung Lu, Hung-Ming Chen, Chien-Nan Jimmy Liu:

An Effective Decap Insertion Method Considering Power Supply Noise during Floorplanning. 115-127 - Ye-In Chang, Jun-Hong Shen, Tsu-I Chen:

A Data Mining-Based Method for the Incremental Update of Supporting Personalized Information Filtering. 129-142 - Hua-Tsung Chen, Hsuan-Sheng Chen, Ming-Ho Hsiao, Wen-Jiin Tsai, Suh-Yin Lee:

A Trajectory-Based Ball Tracking Framework with Visual Enrichment for Broadcast Baseball Videos. 143-157 - Sathya Peri, Neeraj Mittal:

Improving the Efficacy of a Termination Detection Algorithm. 159-174 - Tetz C. Huang, Chih-Yuan Chen, Cheng-Pin Wang:

A Linear-Time Self-Stabilizing Algorithm for the Minimal 2-Dominating Set Problem in General Networks. 175-187 - Zong Min Ma, Li Yan:

A Literature Overview of Fuzzy Database Models. 189-202 - Yu-Liang Kuo, Eric Hsiao-Kuang Wu, Gen-Huey Chen:

Performance Evaluation for Next Generation Differentiated Services in Wireless Local Area Networks. 203-220 - Kyung-Taeg Rho, Soo-Mok Jung, Jung Hun Kang, Wonil Choi, Myong-Soon Park:

AHS: Advanced Handoff Scheme for Nested Mobile Networks. 221-236 - Jeng-Jong Lin:

A GA-based Multi-Objective Decision Making for Optimal Vehicle Transportation. 237-260 - Shen-Yi Lin, Chih-Shen Chen, Li Liu, Chua-Huang Huang:

Tensor Product Formulation for Hilbert Space-Filling Curves. 261-275 - Ying-Hong Wang, Chih-Hsiao Tsai, Hung-Jen Mao:

A Hierarchical Multiple-Choice Routing Protocol for Wireless Sensor Networks. 277-291 - Yong Zhou, Rong Xu, Xiaofeng Hu, Qingtai Ye:

A Lane Departure Warning System Based on Virtual Lane Boundary. 293-305 - Tzu-Chi Huang, Ce-Kuen Shieh, Bo-Yang Lai, Yu-Ben Miao:

Tapster: Transparent Proxy Redirector for Mobile Computing. 307-316
Volume 24, Number 2, March 2008
- Farhan Siddiqui, Sherali Zeadally:

Ubiquitous Wireless Connectivity across Cellular and Wireless Local Area Networks. 327-342 - Minjae Park, Kwanghoon Pio Kim:

Control-path Oriented Workflow Intelligence Analyses. 343-359 - Arthur M. D. Shr, Alan Liu, Peter P. Chen:

Load Balancing Among Photolithography Machines in the Semiconductor Manufacturing System. 379-391 - Jang-Ping Sheu, Kun-Ying Hsieh, Po-Wen Cheng:

Design and Implementation of Mobile Robot for Nodes Replacement in Wireless Sensor Networks. 393-410 - Kai-Tai Song, Jen-Chao Tai:

Real-Time Background Estimation of Traffic Imagery Using Group-Based Histogram. 411-423 - Chih-Heng Ke, Ce-Kuen Shieh, Wen-Shyang Hwang, Artur Ziviani:

An Evaluation Framework for More Realistic Simulations of MPEG Video Transmission. 425-440 - Licheng Wang, Zhenfu Cao, Feng Cao, Haifeng Qian, Haiyong Bao:

Biased Bit Commitment and Applications. 441-452 - Chung-Feng Jeffrey Kuo, Chung-Yang Shih, Jiunn-Yih Lee:

Separating Color and Identifying Repeat Pattern Through the Automatic Computerized Analysis System for Printed Fabrics. 453-467 - Chun-Chuan Yang, Yu-Chong Chang:

A Stability-Based Clustering Technique and Routing Protocol for Mobile Ad Hoc Networks. 469-481 - Der-Rong Din:

Heuristic and Simulated Annealing Algorithms for Wireless ATM Backbone Network Design Problem. 483-501 - Kuo-Liang Chung, Yong-Huai Huang:

A Pruning-and-Voting Strategy to Speed up the Detection for Lines, Circles, and Ellipses. 503-520 - Kuo-Liang Chung, Shih-Wei Yu, Hsueh-Ju Yeh, Yong-Huai Huang, Ta-Jen Yao:

New Fuzzy Object Segmentation Algorithm for Video Sequences. 521-537 - Yanxia Wang, Qiuqi Ruan:

Palmprint Images Enhancement Using Steerable Filters based Fuzzy Unsharp Masking. 539-551 - Tian-Luu Wu, Shyi-Chyi Cheng:

Utilization of Principle Axis Analysis for Fast Nearest Neighbor Searches in High-Dimensional Image Databases. 553-571 - Vinay Madenur, Neeraj Mittal:

A Delay-Optimal Group Mutual Exclusion Algorithm for a Tree Network. 573-583 - Dowming Yeh, Ray J. Tsai, Pei-Chen Sun, Jia-Wen Lee:

Linear Regression Models for Assessing the Ranking of Web Sites Based on Average Numbers of Visits. 585-599 - Lu Zhen, Zuhua Jiang:

Innovation-Oriented Knowledge Query in Knowledge Grid. 601-613 - Shin-Shin Kao, Jui-Chia Wu, Yuan-Kang Shih:

Hamiltonian Connectivity, Pancyclicity and 3^*-Connectivity of Matching Composition Networks. 615-625 - Nan-Chen Hsieh:

Handling Redundancies for Disjunctive Information with Exclusive-or Semantics. 627-638
Volume 24, Number 3, May 2008
- Namgyu Kim, Sangwon Lee, Songchun Moon:

Formalized Entity Extraction Methodology for Changeable Business Requirements. 649-671 - Ming-Yang Cheng, Mi-Ching Tsai, Chun-Jen Chen:

Dynamic Visual Tracking Using SDG-Like Matching. 673-690 - Rong-Chi Chang, Timothy K. Shih, Hui-Huang Hsu:

A Strategic Decomposition for Adaptive Image Transmission. 691-707 - Sang-Bum Han, Keun-Ho Lee, Chong-Sun Hwang:

Region-based Shadow Registration Scheme for Efficient Mobility Management in the SIP. 709-725 - Pao-Ta Yu, Chih-Chia Yao:

Dichotomous Learning Algorithm for the Optimal Design of Weighted Order Statistic Filters. 727-742 - Hamid Reza Shahriari, Yasser Ganjisaffar, Rasool Jalili, Jafar Habibi:

Topological Analysis of Multi-phase Attacks using Expert Systems. 743-767 - Chin-Jung Huang, Min-Yuan Cheng:

Similarity Measurement of Rule-based Knowledge using Conditional Probability. 769-784 - Cheng-Yuan Tang, Yi-Leh Wu, Yueh-Hung Lai:

Fundamental Matrix Estimation using Evolutionary Algorithms with Multi-Objective Functions. 785-800 - Feng-Tse Lin:

A Genetic Algorithm for Linear Programming With Fuzzy Constraints. 801-817 - Jiun-Long Huang, Jui-Nan Lin:

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network. 819-840 - Yu-Te Liaw, Bing-Chuan Bai, James Chien-Mo Li:

A Two-level Simultaneous Test Data and Time Reduction Technique for SOC. 841-857 - Jia-Hong Dai, Ching-Han Chen:

A Low Complexity Fingerprint Verification Algorithm with Reduced Hardware Resources. 859-873 - Yi-Sheng Huang, Ta-Hsiang Chung:

Modeling and Analysis of Urban Traffic Lights Control Systems Using Timed CP-nets. 875-890 - Jeen-Shing Wang, Yu-Liang Hsu:

Dynamic Nonlinear System Identification Using a Wiener-Type Recurrent Network with OKID Algorithm. 891-905 - Lahouaria Benasla, Abderrahim Belmadani, Mostefa Rahli:

Hooke-Jeeves' Method Applied to a New Economic Dispatch Problem Formulation. 907-917 - Hans Vandierendonck, Veerle Desmet, Koen De Bosschere:

Behavior-Based Branch Prediction by Dynamically Clustering Branch Instructions. 919-931 - Gwan-Hwan Hwang, Chih-Hao Yu, Chun-Chin Sy, Chiu-Yang Chang:

WSNFS: A Web-Services-Based Network File System. 933-947 - Jeng-Jong Lin:

A GA-Based Search Approach to Creative Weave Structure Design. 949-963 - Jih-Ching Chiu, Yu-Liang Chou, Ren-Bang Lin:

The Multi-context Reconfigurable Processing Unit for Fine-grain Computing. 965-979 - Gin-Der Wu, Ying Lei:

A Register Array Based Low Power FFT Processor for Speech Recognition. 981-991
Volume 24, Number 4, May 2008
- Pei-Yeh Wu, Jen-Jee Chen, Yu-Chee Tseng, Hung-Wei Lee:

Design of QoS and Admission Control for VoIP Services Over IEEE 802.11e WLANs. 1003-1022 - Cho-Chin Lin:

On Message Sequences for Incremental Network Computing. 1023-1040 - Kuo-Yu Huang, Chia-Hui Chang, Kuo-Zui Lin:

Efficient Discovery of Frequent Continuities by Projected Window List Technology. 1041-1064 - Yang-Jing Wu, Jen-Hung Chiu, Tsang-Ling Sheu:

A Modified EDCA with Dynamic Contention Control for Real-Time Traffic in Multi-hop Ad Hoc Networks. 1065-1079 - Yoon-Teck Bau, Chin Kuan Ho, Hong Tat Ewe:

Ant Colony Optimization Approaches to the Degree-constrained Minimum Spanning Tree Problem. 1081-1094 - Kuo-Liang Chung, Ta-Jen Yao, Yong-Huai Huang:

New Prediction- and Affine Transformation-Based Three-Step Search Scheme for Motion Estimation With Application. 1095-1109 - Reza Sabzevari, Gholam Ali Montazer:

An Intelligent Data Mining Approach Using Neuro-Rough Hybridization to Discover Hidden Knowledge from Information Systems. 1111-1126 - Wei-Hau Chiao, Chung-Ping Chung:

Filtering of Unnecessary Branch Predictor Lookups for Low-power Processor Architecture. 1127-1142 - Jian Weng, Xiangxue Li, Kefei Chen, Shengli Liu:

Identity-Based Parallel Key-Insulated Signature Without Random Oracles. 1143-1157 - Shih-Tung Wu, Kuo-Liang Chung, Yong-Huai Huang, Jung-Gen Wu:

A Unified Min-Max Transition-Based Data Hiding Algorithm for Mixed Text/Halftone Images. 1159-1173 - Sung Tak Kang, Yon Dohn Chung, Myoung-Ho Kim:

A Temporal Aggregation Method for Update-Intensive Applications. 1175-1186 - Gregor Klajnsek, Borut Zalik, Franc Novak, Gregor Papa:

A Quadtree-based Progressive Lossless Compression Technique for Volumetric Data Sets. 1187-1195 - Sheng-Wen Jeng, Wen-Hsiang Tsai:

A Robust and Accurate Calibration Method by Computer Vision Techniques for Coordinate Transformation between Display Screens and Their Images. 1197-1211 - Minho Kim, Çetin Kaya Koç:

A Secure Hash-Based Strong-Password Authentication Protocol Using One-Time Public-Key Cryptography. 1213-1227 - Huang-Chun Roan, Wen-Jyi Hwang, Wei-Jhih Huang, Chia-Tien Dan Lo:

Network Intrusion Detection Based on Shift-OR Circuit. 1229-1239 - Rong-Chi Chang, Timothy K. Shih:

Multilayer Inpainting on Digitalized Artworks. 1241-1255 - Chun-Chuan Yang, Sze-Horng Lee, Li-Yuan Cheng:

The Application-Level Protocol for QoS Supporting in Synchronized Multimedia Sessions. 1257-1271 - Po-Yueh Chen, En-Chi Liao, Chung-Wei Liang:

The Segmented-Matrix Algorithm for Haar Discrete Wavelet Transform. 1273-1282
Volume 24, Number 5, September 2008
- Woei-Kae Chen, Zheng-Wen Shen, Tung-Hung Tsai:

Integration of Specification-based and CR-based Approaches for GUI Testing. 1293-1307 - Zhijun Ding, Junli Wang, Changjun Jiang:

An Approach for Synthesis Petri Nets for Modeling and Verifying Composite Web Service. 1309-1328 - Jeong-Beom Kim, MoonBae Song, Chong-Sun Hwang, SangKeun Lee:

FASiRec: A Fast Session Recovery Scheme for Large-scale VPNs Using IPSec. 1329-1346 - Zheng Gong, Xiangxue Li, Dong Zheng, Kefei Chen:

A Generic Construction for Instrusion-Resilient Signatures from Linear Feedback Shift Register. 1347-1360 - Han C. W. Hsiao, Shih-Hao Chen, Judson Pei-Chun Chang, Jeffrey J. P. Tsai:

Predicting Subcellular Locations of Eukaryotic Proteins Using Bayesian and /k/-Nearest Neighbor Classifiers. 1361-1375 - Chun-Chuan Yang, Chen-Kuei Chu, Yung-Chi Wang:

Extension of Timeline-based Editing for Non-deterministic Temporal Behavior in SMIL2.0 Authoring. 1377-1395 - Zhen Luo, Qixin Cao, Yanzheng Zhao:

A Self-adaptive Predictive Policy for Pursuit-evasion Game. 1397-1407 - Yi-Yu Su, Shiow-Fen Hwang, Chyi-Ren Dow:

An Efficient Cluster-Based Routing Algorithm in Ad Hoc Networks with Unidirectional Links. 1409-1428 - Wann-Yun Shieh, Chien-Chen Chen:

Saving Register-File Leakage Energy by Register-usage Exploiting. 1429-1444 - Sheng-Chai Chi, Chih Chieh Yang:

A Two-stage Clustering Method Combining Ant Colony SOM and K-means. 1445-1460 - Jain-Shing Liu, Chun-Hung Richard Lin:

Dynamic Transmission Control Method for WLANs. 1461-1472 - Pin Lin, Wenling Wu, Chuankun Wu, Tian Qiu:

Analysis of All-or-Nothing Hash Functions. 1473-1484 - Juan M. Estévez-Tapiador, Julio César Hernández Castro, Pedro Peris-Lopez, Arturo Ribagorda:

Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions. 1485-1504 - Cheng-Jian Lin, Cheng-Hung Chen, Chi-Yung Lee:

Efficient Immune-Based Particle Swarm Optimization Learning for Neuro-Fuzzy Networks Design. 1505-1520 - Jing-Shing Yao, Jin-Shieh Su, Teng-San Shih:

Fuzzy System Reliability Analysis Using Triangular Fuzzy Numbers Based on Statistical Data. 1521-1535 - Lakshmanan Senthilkumar, Venkadachalam Sankaranarayanan:

Provisioning Erlang-B Model Based Flow Admission Control for Packet Networks. 1537-1550 - Pang-Hung Huang, Yu-Pao Tsai, Wan-Yen Lo, Sheng-Wen Shih, Yi-Ping Hung:

Calibration of Motorized Object Rig and Its Applications. 1551-1565 - Chien-Chang Chen, Wen-Yin Fu:

A Geometry-Based Secret Image Sharing Approach. 1567-1577 - Feng-Yang Hsieh, Chia-Ming Wang, Chun-Chieh Lee, Kuo-Chin Fan:

A Lossless Image Coder Integrating Predictors and Block-Adaptive Prediction. 1579-1591
Volume 24, Number 6, November 2008
- Chong-Won Lee, Byungjeong Lee, Jaewoo Oh, Chisu Wu:

Identifying Metrics for Commercial-Off-the-Shelf Software with Inductive Inference Based on Characteristic Vectors. 1603-1628 - Juan Hernández-Serrano, Josep Pegueroles, Miguel Soriano:

Shared Self-Organized GKM Protocol for MANETs. 1629-1646 - Shih-Hsu Huang, Chun-Hua Cheng:

Power-Management Scheduling for Peak Power Minimization. 1647-1668 - Wei-Ho Tsai, Hung-Ming Yu, Hsin-Min Wang:

Using the Similarity of Main Melodies to Identify Cover Versions of Popular Songs for Music Document Retrieval. 1669-1687 - Sanjay Misra, Ibrahim Akman:

Weighted Class Complexity: A Measure of Complexity for Object Oriented Systems. 1689-1708 - Ji-Cherng Lin, Tetz C. Huang, Cheng-Pin Wang, Chih-Yuan Chen:

A Self-Stabilizing Algorithm for Finding a Minimal Distance-2 Dominating Set in Distributed Systems. 1709-1718 - Chia-Ming Wang, Kuo-Chin Fan, Cheng-Tzu Wang:

Estimating Optical Flow by Integrating Multi-Frame Information. 1719-1731 - Choonhwa Lee, Sumi Helal, David Nordstedt:

Impromptu Service Discovery and Delivery in Mobile Environments. 1733-1751 - Chih-Lin Hu, Wei-Shun Liao, Yen-Ju Huang:

Mobile Media Content Sharing in UPnP-Based Home Network Environment. 1753-1769 - Chuan-Kai Yang, Chiang-Han Hung:

A New Seed-Set Finding Approach for Iso-Surface Extraction. 1771-1785 - Shuangquan Wang, Xin Chen, Ningjiang Chen, Jie Yang:

Mobile-Agent-Based Distributed Decision Tree Classification in Wireless Sensor Networks. 1787-1798 - Sang-Won Kang, Joon-Min Gil, Jongwan Kim, SeokJin Im, SangKeun Lee:

Description-Based Semantic Prefetching Scheme for Data Management in Location-Based Services. 1799-1820 - Feilong Tang, Minyi Guo, Minglu Li, Cho-Li Wang:

Implementation of an Intelligent Urban Traffic Management System Based on a City Grid Infrastructure. 1821-1836 - Kwang-Jin Paek, Ui-Sung Song, Hye-Young Kim, Jongwan Kim:

Energy-Efficient Key-Management (EEKM) Protocol for Large-Scale Distributed Sensor Networks. 1837-1858 - Su-Shen Hung, Shing-Tsaan Huang:

The Self-Stabilizing Edge-Token and Its Applications. 1859-1872 - Wei-Ho Tsai:

Speaker Clustering Based on Bayesian Information Criterion. 1873-1886 - Chang-Jiu Chen, Wei-Min Cheng:

Reducing the TLB Context Switching Miss Ratio With Banked and Prefetching Mechanism. 1887-1900 - Tao-Ku Chang, Gwan-Hwan Hwang:

A Secure Query Language for XML Documents. 1901-1916

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














