


default search action
Journal of Information Science and Engineering, Volume 25
Volume 25, Number 1, January 2009
- Ching-Nung Yang, Bing-Ling Lu:

Improved Tracing Algorithm for Random-Error-Resilient Collusion-Secure Fingerprinting Codes. 1-10 - Changwoo Byun, Ilkook Yun, Seog Park:

A New Optimistic Concurrency Control in Valid XML. 11-31 - Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:

An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification. 33-57 - Wen-Chung Shih, Chao-Tung Yang, Shian-Shyong Tseng:

Using a Performance-based Skeleton to Implement Divisible Load Applications on Grid Computing Environments. 58-81 - Der-Rong Gin:

Heuristic Algorithms for Finding Light-Forest of Multicast Routing on WDM Network. 83-103 - Ozgur Kaymakci, Salman Kurtulan:

A Novel Performance Evaluation Method for DES. 105-120 - GuanJun Liu, Changjun Jiang:

Incidence Matrix Based Methods for Computing Repetitive Vectors and Siphons of Petri Net. 121-136 - Jinhyung Kim, Dongwon Jeong, Doo-Kwon Baik:

A Translation Algorithm for Effective RDB-to-XML Schema Conversion Considering Referential Integrity Information. 137-166 - Mingming Yan, Zhiwu Li, Na Wei, Mi Zhao:

A Deadlock Prevention Policy for a Class of Petri Nets S3PMR. 167-183 - Jia-Ming Chen, Wan-Chen Lu, Wei-Kuan Shih, Ming-Chung Tang:

Imprecise Computations with Deferred Optional Tasks. 185-200 - Jiun-Long Huang, Shih-Chuan Chiu, Xin-Mao Huang:

GPE: A Grid-based Population Estimation Algorithm for Resource Inventory Applications over Sensor Networks. 201-218 - Chin-Fu Ku, Yu-Fang Zheng, Sao-Jie Chen, Jan-Ming Ho:

USVoD: A Large Scale Video-on-Demand System Based on Uniform Sampling Cache Mechanism. 219-233 - Ming-Chun Hsia, Chunhung Richard Lin:

Low-Latency Mobile HP Handover Based on Active-Scan Link Layer Assisted FMIPv6. 235-250 - Chien-Chung Yang, Kuochen Wang, Ming-Ham Lin, Pochun Lin:

Energy Efficient Intra-Task Dynamic Voltage Scaling for Realistic CPUs of Mobile Devices. 251-272 - Jungeun Choi, Joosun Hahn, Rhan Ha:

A Fault-tolerant Adaptive Node Scheduling Scheme for Wireless Sensor Networks. 273-287 - Jwu-Sheng Hu, Tzung-Min Su:

Shape Memorization and Recognition of 3D Objects Using a Similarity-Based Aspect-Graph Approach. 289-301 - Jing-Wein Wang, Wen-Yuan Chen:

Genetic Optimization Fingerprint Recognition Based on Core Sub-Region. 303-317 - Mi Wen, Ling Dong, Yanfei Zheng, Kefei Chen:

Towards Provable Security for Data Transmission Protocols in Sensor Network. 319-333
Volume 25, Number 2, March 2009
- Lei Yang, Yu Dai, Bin Zhang:

Performance Prediction Based EX-QoS Driven Approach for Adaptive Service Composition. 345-362 - Obeten O. Ekabua, Matthew O. Adigun:

Experienced Report on Assessing and Evaluating Change Impact Analysis Through a Framework and Associated Models. 363-373 - Hae-Sun Jung, Chang-Sung Jeong, Yongwoo Lee, Phil Doo Hong:

An Intelligent Ubiquitous Middleware for U-City: SmartUM. 375-388 - Chung-Ren Yan, Tong-Yee Lee:

Texture Synthesis with Prioritized Pixel Re-synthesis. 389-402 - Seunghwa Lee, Eunseok Lee:

Distributed Adaption System for Quality Assurance of Web Service in Mobile Environment. 403-417 - Yi Jin, Qiuqi Ruan:

Orthogonal Locality Sensitive Discriminant Analysis for Face Recognition. 419-433 - Juryon Paik, Junghyun Nam, Dongho Won, Ung-Mo Kim:

Fast Extraction of Maximal Frequent Subtrees Using Bits Representation. 435-464 - Soojung Lee:

Deadlock Detection and Recovery for True Fully Adaptive Routing in Regular Wormhole Networks. 465-479 - Jiying Wu, Qiuqi Ruan:

A Novel Exemplar-Based Image Completion Model. 481-497 - Lei-Da Li, Bao-Long Guo, Lei Guo:

Combining Interest Point and Invariant Moment for Geometrically Robust Image Watermarking. 499-515 - Wei Han, Kefei Chen, Dong Zheng:

Receipt-Freeness for Groth e-Voting Schemes. 517-530 - Ruei-Yu Wu, Dyi-Rong Duh:

Hamiltonicity of the Pyramid Network with or without Fault. 531-542 - Chang-Jiu Chen, Wei-Min Cheng, Hung-Yue Tsai, Jen-Chieh Wu:

A Quasi-Delay-Insensitive Microprocessor Core Implementation for Microcontrollers. 543-557 - I-Hsuan Peng, Yen-Wen Chen, Hsiang-Ru Peng:

A Systematic Wavelength Assign Algorithm for Multicast in WDM Networks with Sparse Conversion Nodes. 559-574 - Cheng-Jian Lin, Chi-Yung Lee:

FPGA Implementation of a Recurrent Neural Fuzzy Network wiht On-Chip Learning for Prediction and Identification Applications. 575-589 - Jiaming Zhan, Han Tong Loh:

Using Redundancy Reduction in Summarization to Improve Text Classification by SVMs. 591-601 - Su-Cheng Haw, Chien-Sing Lee:

TwigX-Guide: An Efficient Twig Pattern Matching System Extending DataGuide Indexing and Region Encoding Labeling. 603-617 - Zuowen Tan, Zhuojun Liu:

Cryptanalysis and Improvement on a Threshold Proxy Signature Scheme. 619-631 - Chung-Chih Tsai, Jin-Shiuh Taur, Chin-Wang Tao:

Iris Recognition Using Gabor Filters and the Fractal Dimension. 633-648 - Min-Yuan Cheng, Chin-Jung Huang:

A Novel Approach for Treating Uncertain Rule-based Knowledge Conflicts. 649-663
Volume 25, Number 3, May 2009
- Taysheng Jeng:

Toward a Ubiquitous Smart Space Design Framework. 675-686 - Jen-Wen Ding, Shi-Yuan Lan:

Quality-Adaptive Proxy Caching for Peer-to-Peer Video Streaming Using Multiple Description Coding. 687-701 - Luís Filipe Teixeira, Luís Corte-Real:

Statistical Multiplexing of H.264 Video Streams using Structural Similarity Information. 703-715 - Sheng-Tzong Cheng, Ming-Tzung Hsieh:

Modeling and Analysis of Code-based Call Admission Control for QoS Management in W-CDMA Systems. 717-731 - Wen-Ping Chen, Fu-Hung Shih, Wen-Shyang Hwang:

The Multiple Path Protection of DWDM Backbone Optimal Networks. 733-745 - Kuan-Ching Li, Hsiao-Hsi Wang, Kuo-Yang Cheng, Tsung-Ying Wu:

Strategies Toward Optimal Access to File Replicas. 747-762 - Chien-Cheng Lee, Chun-Li Tsai, Yu-Chun Chiang:

Federal Funds Rate Prediction: A Comparison Between the Robust RBF Neural Network and Economic Models. 763-778 - Federico Prat, Andrés Marzal, Sergio Martín, Rafael Ramos-Garijo, María José Castro Bleda:

A Template-based Recognition System for On-line Handwritten Characters. 779-791 - Kou-Yuan Huang, Kai-Ju Chen:

Simulated Annealing for Pattern Detection and Seismic Applications. 793-805 - Chin-Ling Chen, Yeong-Lin Lai, Chih-Cheng Chen, Kun-Chih Chen:

Construction of a Real-Time and Secure Mobile Ticket System. 807-825 - Mahdi Niamanesh, Rasool Jalili:

DRAPS: A Framework for Dynamic Reconfigurable Protocol Stacks. 827-841 - Han-Pang Huang, Feng-Cheng Yang, Ming-Tzong Wang, Chia-Ming Chang:

Instruction Detection Based on Active Networks. 843-859 - Tein-Yaw Chung, Yang-Hui Chang, Kun-Hung Chen, Yung-Mu Chen:

High Performance Overlay File Distribution by Integrating Resource Discovery and Service Scheduling. 861-875 - Hung-Yu Chien, Ru-Yu Lin:

The Study of Secure E-Will System on the Internet. 877-893 - Mahdi Asadpour, Rasool Jalili:

Double Voting Problem of Some Anonymous E-Voting Schemes. 895-906 - Hsiao-Ying Lin, Wen-Guey Tzeng:

Anonymous Password Based Authenticated Key Exchange with Sub-Linear Communication. 907-920 - Jaekwan Park, Bonghee Hong, ChaeHoon Ban:

An Efficient Query Index on RFID Streaming Data. 921-935 - Yi-Shiung Yeh, Ting-Yu Huang, Han-Yu Lin:

Structural Binary CBC Encryption Mode. 937-944 - Kuo-Yang Tu:

Analysis and Comparison of Various Shape Mirrors Used in Omnidirectional Cameras with Parameter Variation. 945-959
Volume 25, Number 4, May 2009
- Jung-Shiong Chang, Arthur Chun-Chieh Shih, Hsiao-Rong Tyan, Wen-Hsien Fang:

Principal Component Analysis-based Mesh Decomposition. 971-987 - Kun-Che Lu, Don-Lin Yang:

Image Processing and Image Mining using Decision Trees. 989-1003 - Chung-Shih Tang, Wen-Tsuen Chen:

An Integrated Failure and QoS Recoverable Transmission Scheme Based on Multi-path Network Coding. 1005-1020 - Heung Seok Chae, Jian Feng Cui, Jinwook Park, Jaegeol Park, Woo Jin Lee:

An Object-Oriented Framework Approach to Flexible Availability Management for Developing Distributed Applications. 1021-1039 - Huang-Chi Chen, Yu-Wen Chang, Rey-Chue Hwang:

VLSI Architecture of Euclideanized BM Algorithm for Reed-Solomon Code. 1041-1054 - Cheng-Hsiung Wang, Chien-Cheng Lee, Hewijin Christine Jiau, Tsung-Lung Yang, Kuo-Feng Ssu, Pau-Choo Chung:

Tele-consultation Enhanced via Session Retrieval and Session Scheduling Capabilities. 1055-1066 - Gregor Polancic, Romana Vajde Horvat, Ivan Rozman:

Improving Object-Oriented Frameworks by Considering the Characteristics of Constituent Elements. 1067-1085 - Ching-Hwang Wang, Chih-Han Kao:

Multi-Clustering Centers Approach to Enhancing the Performance of SOM Clustering Ability. 1087-1102 - Jang-Ping Sheu, Li-Jen Chang, Wei-Kai Hu:

Hybrid Congestion Control Protocol in Wireless Sensor Networks. 1103-1119 - Hua-Fu Li, Suh-Yin Lee:

Mining Top-K Path Traversal Patterns over Streaming Web Click-Sequences. 1121-1133 - Hongxing Qin, Jie Yang, Yue-Min Zhu:

A Feature-Preserving Filtering Algorithm for Point Set Surface and Surface Attributes Based on Robust Statistics. 1135-1146 - Shou-Chih Lo:

Design of Spatial Data Broadcast for Mobile Navigation Applications. 1147-1161 - Chung Il Sun, Hae Young Lee, Tae Ho Cho:

A Path Selection Method for Improving the Detection Power of Statistical Filtering in Sensor Networks. 1163-1175 - Sungju Lee, Daesung Moon, Yongwha Chung:

Inserting Chaff Minutiae for the Geometric Hashing-based Fuzzy Fingerprint Vault. 1177-1190 - Sung-Kwan Kim, Hunki Kwon, Donghee Lee, Sam H. Noh, Sang Lyul Min:

A Flash-Aware Cluster Allocation Scheme for Legacy File Systems. 1191-1220 - Po-Chuan Lin, Jhing-Fa Wang, Jia-Ching Wang, Jun-Jin Huang:

Personal Spoken Sentence Retrieval Using Two-Level Feature Matching and MPEG-7 Audio LLDs. 1221-1238 - Yi-Song Siao, Wei-Chen Chang, Alvin Wen-Yu Su:

Pitch Detection/Tracking Strategy for Musical Recordings of Solo Bowed-String and Wind Instruments. 1239-1253 - John Y. Chiang, Yau-Ren Jenq:

Content-Based Image Retrieval using Fractal Orthonormal Basis. 1255-1266 - Chien-Fu Cheng, Shu-Ching Wang, Tyne Liang:

Investigation of Consensus Problem over Combined Wired/Wireless Network. 1267-1281 - Pei-Yu Shih, Wen-Ku Su, Trieu-Kien Truong, Yaotsu Chang:

Decoding Binary Quadratic Residue codes Using the Euclidean Algorithm. 1283-1294
Volume 25, Number 5, September 2009
- Chiung-Hon Leon Lee, Alan Liu, Jeng-Shin Hung:

Service Quality Evaluation by Personal Ontology. 1305-1319 - Claus Pahl, Wilhelm Hasselbring, Markus Voss:

Service-Centric Integration Architecture for Enterprise Software Systems. 1321-1336 - Cheng-Liang Lin, Pang-Chieh Wang, Ting-Wei Hou:

Classification and Evaluation of Middleware Collaboration Architectures for Converging MHP and OSGi in a Smart Home. 1337-1356 - Li-Der Chou, Chien-Chi Chen, Po-Chia Tseng:

Design and Implementation of a Policy-Based Monitoring System for Web Services. 1357-1372 - Chien-Tsun Chen, Yu Chin Cheng, Chin-Yun Hsieh, Tien-Song Hsu:

Delivering Specification-Based Learning Processes with Service-Oriented Architecture: A Process Translation Approach. 1373-1389 - Dilek Basci, Sanjay Misra:

Measuring and Evaluating a Design Complexity Metric for XML Schema Documents. 1405-1425 - Jonathan Lee, Ying-Yan Lin, Shang-Pin Ma, Shin-Jie Lee:

BPEL Extensions to User-Interactive Service Delivery. 1427-1445 - Jang-Ping Sheu, Kun-Ying Hsieh, Yao-Kun Cheng:

Distributed Transmission Power Control Algorithm for Wireless Sensor Networks. 1447-1463 - Cheng-Kang Chu, Wen-Guey Tzeng:

Efficient Identity-Committable Signature and Group-Oriented Ring Signature Schemes. 1465-1483 - Ying-Sung Lee, Hsien-Te Chien, Wen-Nung Tsai:

Using Random Bit Authentication to Defend IEEE 802.11 DoS Attacks. 1485-1500 - Chao-Jung Chen, Hsin-Yuan Peng, Bing-Fei Wu, Ying-Han Chen:

A Real-Time Driving Assistance and Surveillance System. 1501-1523 - Wen-Hwa Liao, Kuei-Ping Shih, Wan-Chi Wu:

A Cover-Up Scheme for Data-Centric Storage in Wireless Sensor Networks. 1525-1537 - Tsung-Yuan Liu, Yuh-Jzer Joung:

A Distributed Multi-Dimensional Publications Management System. 1539-1553 - Ming-Der Shieh, Jun-Hong Chen, Wen-Ching Lin, Chien-Ming Wu:

An Efficient Multiplier/Divider Design for Elliptic Curve Cryptosystem over GF(2m). 1555-1573 - Jau-Ling Shih, Ying-Nong Chen, Kai-Chiun Yan, Chin-Chuan Han:

Illegal Entrant Detection at a Restricted Area in Open Spaces using Color Features. 1575-1592 - Lien-Wu Chen, Weikuo Chu, Yu-Chee Tseng, Jan-Jan Wu:

Route Throughput Analysis with Spectral Reuse for Multi-Rate Mobile Ad Hoc Networks. 1593-1604 - Jaesoo Kim, Heejune Ahn:

A New Perspective for Neural Networks: Application to a Marketing Management Problem. 1605-1616 - Kuen-Fang Jea, Tsui-Ping Chang, Shih-Ying Chen:

A Semantic-Based Protocol for Concurrency Control in DOM Database Systems. 1617-1639
Volume 25, Number 6, November 2009
- Shih-Hsu Huang, Chun-Hua Cheng, Song-Bin Pan:

Synthesis of Anti-Aging Gated Clock Designs. 1651-1670 - Sungwoo Ahn, Bonghee Hong:

Reordering for Indexing in an RFID Tag Database. 1671-1690 - Suat Ozdemir:

Secure Load Balancing via Hierarchical Data Aggregation in Heterogeneous Sensor Networks. 1691-1705 - Shih-Hsu Huang, Chun-Hua Cheng, Da-Chen Tzeng:

Simultaneous Clock Skew Scheduling and Power-Gated Module Selection for Standby Leakage Minimization. 1707-1722 - Chin-Pan Huang, Chi-Jen Liao, Chaur-Heh Hsieh:

A Blind Image Watermarking Based on Dual Detector. 1723-1736 - Adnan Khashman:

Blood Cell Identification using Emotional Neural Networks. 1737-1751 - Jeongmin Park, Hyunsang Youn, Eunseok Lee:

An Automatic Code Generation for Self-Healing. 1753-1781 - Dashdorj Yamkhin, Youjip Won:

Modeling and Analysis of Wireless LAN Traffic. 1783-1801 - Xu Li, Hongyu Huang, Minglu Li, Wei Shu, Min-You Wu:

Packet-Oriented Routing in Delay-Tolerant Vehicular Sensor Networks. 1803-1817 - San-Lung Zhao, Hsi-Jian Lee:

A Spatial-Extended Background Model for Moving Blobs Extraction in Indoor Environments. 1819-1837 - Wen-Jyi Hwang, Chien-Min Ou:

Efficient Header Classification Architecture for Network Intrusion Detection. 1839-1853 - Tung-Yang Ho, Cheng-Kuan Lin:

Fault-Tolerant Hamiltonian Connectivity and Fault-Tolerant Hamiltonicity of the Fully Connected Cubic Networks. 1855-1862 - Hesuan Hu, Zhiwu Li:

Liveness Enforcing Supervision in Video Streaming Systems using Siphons. 1863-1884 - Kuo-Yang Tu:

Analysis of Camera's Images Influenced by Varying Light Illumination for Design of Color Segmentation. 1885-1899 - Wann-Yun Shieh, Shu-Yi Hsu:

Power-Aware Register Assignment for Multi-Banked Register Files. 1901-1920 - Shiow-Yang Wu, Shih-Chien Chou:

Preventing Information Leakage in Mobile Applications with Object-Oriented Access Control Lists and Security Monitor Encapsulation. 1921-1937 - Yun-Chung Chung, Shen Cherng, Robert R. Bailey, Sei-Wang Chen:

Intrinsic Image Extraction from a Single Image. 1939-1953 - Cong Jin, Ping Jin:

Fingerprint Classification in DCT Domain using RBF Neural Networks. 1955-1962 - Daniel Yuh Chao:

Deadlock Control for Weighted Systems of Simple Sequential Processes with Resources Requirement (WS3PR). 1963-1978

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














