


default search action
Journal of Information Science and Engineering, Volume 27
Volume 27, Number 1, January 2011
- Shun-Chieh Lin, Min-Jian Liao, Yi-Lin Chiang:

Design and Analysis of Multi-Source Extraction and Localization for Sound-Activated Designation of Automata. 1-18 - Sunwook Kim, Seongwoon Kim, Kyoung Park, Yongwha Chung:

Offloading Socket Processing for Ubiquitous Services. 19-33 - Jianhua Ma, Runhe Huang, Tomomi Kawashima, Bernady O. Apduhan:

Spacelog Data Acquisition, Management and Applications in a Gateway-based Smart Space. 35-50 - Shen Li, Andong Zhan, Xiaobing Wu, Panlong Yang, Guihai Chen:

Efficient Emergency Rescue Navigation with Wireless Sensor Networks. 51-64 - Dezun Dong, Mo Li, Yunhao Liu, Xiangke Liao:

Connectivity-Based Wormhole Detection in Ubiquitous Sensor Networks. 65-78 - Gu Hsin Lai, Chen-Sen Ouyang, Chia-Mei Chen:

A Group-Based Deployment for Wormhole Prevention in Sensor Networks. 79-93
- Hwei-Jen Lin, Hung-Hsuan Wu, Chun-Wei Wang:

Music Matching Based on Rough Longest Common Subsequence. 95-110 - Gap-Joo Na, Bongki Moon, Sang-Won Lee:

IPLB+-tree for Flash Memory Database Systems. 111-127 - Su-Wan Park, Sang-Uk Shin:

Authentication and Copyright Protection Scheme for H.264/AVC and SVC. 129-142 - Ig-hoon Lee, Sang-goo Lee, Junho Shim:

Making T-Trees Cache Conscious on Commodity Microprocessors. 143-161 - Chi-Hung Fan, Hui-Yu Huang, Wen-Hsing Hsu:

A Robust Watermarking Technique Resistant JPEG Compression. 163-180 - Yong-Tao Wang, Ke-Fei Chen, Jian-Hong Chen:

Attribute-Based Traitor Tracing. 181-195 - Jinhua Wang, De Xu, Congyan Lang, Bing Li:

Exposure Fusino Based on Shift-Invariant Discrete Wavelet Transform. 197-211 - Jing-Chiou Liou:

On Improving CMMI in an Immature World of Software Development. 213-226 - Wei-Chih Chen, Jyh-Horng Jeng:

Characterization of WOSF by Equivalent Classes through Support Vector Machine. 227-242 - Zhong-Mei Wan, Jian Weng, Xuejia Lai, Shengli Liu, Jiguo Li:

On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption. 243-259 - Hsung-Pin Chang, Yu-Chieh Lin, Da-Wei Chang:

An Online Reprogrammable Operating System for Wireless Sensor Networks. 261-286 - Chao-Hung Lu, Hung-Ming Chen, Chien-Nan Jimmy Liu:

Design Planning with 3D-Via Optimization in Alternative Stacking Integrated Circuits. 287-302 - Hung-Yan Gu, Huang-Liang Liao:

Mandarin Singing-voice Synthesis Using an HNM Based Scheme. 303-317 - Kanchana Silawarawet, Natawut Nupairoj:

Locality-Aware Clustering Application Level Multicast for Live Streaming Services on the Internet. 319-336 - Jia-Ru Lin, I-Chen Lin:

Multi-layered Expression Synthesis. 337-351
- Li-min Liu, Tian-Shyr Dai:

A Reliable Fingerprint Orientation Estimation Algorithm. 353-368 - Ying-Nong Chen, Chin-Chuan Han, Cheng-Tzu Wang, Kuo-Chin Fan:

A Novel Scheme for Face Recognition and Authentication Against Pose, Illumination and Expression Changes. 369-380 - Jyh-Huei Chang:

An Efficient Relay Sensor Placing Algorithm for Connectivity in Wireless Sensor Networks. 381-392
Volume 27, Number 2, March 2011
- Po-Jen Chuang, Jer-Sheng Deng, Chih-Shin Lin:

Location Privacy Protection Using Independent ID Update for WLANs. 403-418 - Cheng-Chen Lin, Yin-Tsung Hwang:

Lossless Compression of Hyperspectral Images Using Adaptive Prediction and Backward Search Schemes. 419-435 - Jian-Hong Chen, Yong-Tao Wang, Ke-Fei Chen:

Attribute-Based Key-Insulated Encryption. 437-449 - Han-Yu Lin, Tzong-Sun Wu, Yi-Shiung Yeh:

A DL Based Short Strong Designated Verifier Signature Scheme with Low Computation. 451-463 - Xiao Zeng, Zhenyong Chen, Ming Chen, Zhang Xiong:

Reversible Video Watermarking Using Motion Estimation and Prediction Error Expansion. 465-479 - Chao-Hui Ko, Ching-Tsorng Tsai, Chishyan Liaw:

The Linear Quantization Strategy of Quadratic Hebbian-Type Associative Memories and Their Performance Analysis. 481-492 - Hankook Jang, Sang-Hwa Chung, Dong Kyue Kim, Yun-Sung Lee:

An Efficient Architecture for a TCP Offload Engine Based on Hardware/Software Co-design. 493-509 - Seyed Mostafa Fakhrahmad, Gholamhosein Dastghaibyfard:

An Efficient Frequent Pattern Mining Method and its Parallelization in Transactional Databases. 511-525 - Minghua Tang, Xiaola Lin:

Injection Level Flow Control for Networks-on-Chip (NoC). 527-544 - Shu-Kuo Sun, Zen Chen:

Robust Logo Recognition for Mobile Phone Applications. 545-559 - Hung-Yi Lin:

High Index Compression without the Dependencies of Data Orders and Data Skewness for Spatial Databases. 561-576 - Hsien-Wei Yang, I-En Liao, Chaur-Chin Chen:

Reversible Data Hiding Based on Median Difference Histogram. 577-593 - Woo-Sung Jung, Eun-Joo Lee, Kap-Su Kim, Chi-Su Wu:

An Entropy-Based Complexity Measure for Web Applications Using Structural Information. 595-619 - Grzegorz Ulacha:

Method of Lossless and Near-Lossless Color Image Compression. 621-642 - Tsu-Wei Tseng, Jin-Fu Li:

SETBIST: An Soft-Error Tolerant Built-In Self-Test Scheme for Random Access Memories. 643-656 - Jehn-Ruey Jiang, Jang-Ping Sheu, Ching Tu, Jih-Wei Wu:

An Anonymous Path Routing (APR) Protocol for Wireless Sensor Networks. 657-680 - Xin Wang, Linpeng Huang, Xiaohui Xu, Yi Zhang, Jun-Qing Chen:

A Solution for Data Inconsistency in Data Integration. 681-695 - Stephen J. H. Yang, Jia Zhang, Stella T. C. Tsai, Jeff J. S. Huang:

Applying Semantic Segment Detection to Enhance Web Page Presentation on the Mobile Internet. 697-713 - Sin-Yu Chen, Jun-Wei Hsieh, Duan-Yu Chen:

Jointing Edge Labeling and Geometrical Constraint for Lane Detection and its Application to Suspicious Driving Behavior Analysis. 715-732 - Chin-Pan Huang, Ching-Chung Li:

Secret Image Sharing Using Multiwavelet Transform. 733-748 - Sheng-Fuu Lin, Hsien-Tse Chen, Yi-Hsien Lin:

Automatic Counting Cancer Cell Colonies using Fuzzy Inference System. 749-760 - Hyosook Jung, Seongbin Park:

Mashup Creation Using a Mashup Rule Language. 761-775 - Kuo-Hui Yeh, Nai-Wei Lo, Enrico Winata:

CE-TIP: A Code Expansion Based Tag Identification Protocol for RFID Systems. 777-788
Volume 27, Number 3, May 2011
- Reza Akbari, Koorush Ziarati:

A Cooperative Approach to Bee Swarm Optimization. 799-818 - Zafer Erenel, Hakan Altinçay, Ekrem Varoglu:

Explicit Use of Term Occurrence Probabilities for Term Weighting in Text Categorization. 819-834 - Jeng-Farn Lee, Yuan-Neng Hsu:

Fairness Provisioning in Multi-hop Wireless Backhaul Networks: A Dynamic Estimation Approach. 835-853 - Qian Liu, Sanyang Liu, Lifang Liu:

Similarity Analysis between Transcription Factor Binding Sites by Bayesian Hypothesis Test. 855-868 - Li-Han Chen, Fu-Hau Hsu, Cheng-Hsien Huang, Chih-Wen Ou, Chia-Jun Lin, Szu-Chi Liu:

A Robust Kernel-Based Solution to Control-Hijacking Buffer Overflow Attacks. 869-890 - Chung-Min Yu, Chung-Ming Wang:

An Effective Framework for Cloud Modeling, Rendering, and Morphing. 891-913 - Tsu-Yang Wu, Yuh-Min Tseng, Ching-Wen Yu:

A Secure ID-Based Authenticated Group Key Exchange Protocol Resistant to Insider Attacks. 915-932 - Byunghee Lee, Kyungho Son, Dongho Won, Seungjoo Kim:

Secure Data Deletion for USB Flash Memory. 933-952 - Ming-Der Shieh, Wen-Ching Lin, Chien-Ming Wu:

Design of High-Speed Iterative Dividers in GF(2m). 953-967 - Chun-I Fan, Ruei-Hau Hsu, Pei-Hsiu Ho:

Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings. 969-982 - Tsung-Yuan Liu, Wen-Hsiang Tsai:

Data Hiding in Graphic Drawings by Structures of Object Groupings. 983-994 - Chih-Tang Chang, Jim Z. C. Lai, Mu-Der Jeng:

A Fuzzy K-means Clustering Algorithm Using Cluster Center Displacement. 995-1009 - Hwai-Jung Hsu, Feng-Jian Wang:

A Delegation Framework for Task-Role Based Access Control in WFMS. 1011-1028 - Chia-Jung Lee, Shi-Chun Tsai:

Alternating Runs of Geometrically Distributed Random Variables. 1029-1044 - Lieu-Hen Chen, Yu-Sheng Chen, Tsung-Chih Tsai:

Perceptual LOD under Low Resolution Conditions. 1045-1057 - Shuhua Wu:

Security Analysis and Enhancements of Verifier-Based Password-Authenticated Key Exchange Protocols in the Three-Party Setting. 1059-1072 - Seok Kyoo Kim, Juno Chang, Sang-Yong Han:

Implementation of Business Logic Framework for Collaboration of Heterogeneous Service Systems in RFID/USN Environment. 1073-1089 - Kyunghwi Kim, Byunghyuk Jung, Wonjun Lee, Ding-Zhu Du:

Adaptive Path Planning for Randomly Deployed Wireless Sensor Networks. 1091-1106 - Chen-Chiung Hsieh, Yo-Ping Huang, Yu-Yi Chen, Chiou-Shann Fuh:

Video Super-Resolution by Motion Compensated Iterative Back-Projection Approach. 1107-1122 - Hoa-Yu Chan, Kuu-Young Young, Hsin-Chia Fu:

Intention Learning From Human Demonstration. 1123-1136 - Shin Gyu Kim, Hyuck Han, Hyungsoo Jung, Hyeonsang Eom, Heon Young Yeom:

Improving MapReduce Performance by Exploiting Input Redundancy. 1137-1152 - Min-Rong Chen, Xi Zhang, Xia Li:

Comments on Shao-Cao's Unidirectional Proxy Re-Encryption Scheme from PKC 2009. 1153-1158 - Min-Zheng Shieh, Shi-Chun Tsai:

Improved Bound on Approximating Jug Measuring Problem. 1159-1163 - Liang-Bi Chen, Yen-Ling Chen, Ing-Jer Huang:

A Real-Time Power Analysis Platform for Power-Aware Embedded System Development. 1165-1182
Volume 27, Number 4, July 2011
- Youngjin Yu, Dongin Shin, Hyeong Seog Kim, Hyeonsang Eom, Heon Young Yeom:

Backup Metadata As Data: DPC-Tolerance to Commodity File System. 1193-1218 - Min-Ki Kim:

Palmprint Recognition Based on Line and Slope Orientation Features. 1219-1232 - Yunyoung Nam:

Map-based Indoor People Localization using an Inertial Measurement Unit. 1233-1248 - Jianhong Zhang, Jian Mao:

Another Efficient Proxy Signature Scheme in the Standard Model. 1249-1264 - Che-Wei Lee, Wen-Hsiang Tsai:

A Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme. 1265-1282 - Sung Chul Park, Young Chul Park:

The SQL Function XMLNEST to Generate Recursive XML Values from Relational Data. 1283-1302 - J. A. M. Naranjo, Leocadio G. Casado, Juan Antonio López Ramos:

Group Oriented Renewal of Secrets and Its Application to Secure Multicast. 1303-1313 - Jinmin Zhong, Xuejia Lai:

Preimage Attack on Reduced DHA-256. 1315-1327 - Shuhua Wu, Yuefei Zhu, Qiong Pu:

Cryptanalysis and Enhancements of Three-Party Authenticated Key Exchange Protocol using ECC. 1329-1343 - Jia-Ming Chen, Jenq-Shiou Leu, Yen-Chiu Chen, Hsin-Wen Wei, Wei-Kuan Shih:

MegaDrop: A Cooperative Video-on-Demand System in a Peer-to-Peer Environment. 1345-1361 - Bingchiang Jeng, Dowming Yeh, Deron Wang, Shu-Lan Chu, Chia-Mei Chen:

A Specific Effort Estimation Method Using Function Point. 1363-1376 - Chung-Feng Jeffrey Kuo, Chin-Hsun Chiu:

Improved Auto-Focus Search Algorithms for CMOS Image-Sensing Module. 1377-1393 - Chunhua Yang, Hai-Yang Wang:

An Approach to Weaving Stateful Aspects using LTS. 1395-1411 - Jae-Won Lee, Han-Joon Kim, Sang-goo Lee:

Exploiting Taxonomic Knowledge for Personalized Search: A Bayesian Belief Network-based Approach. 1413-1433 - Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:

New Forward-Secure Signature Scheme with Untrusted Update. 1435-1448 - Tsong Yueh Chen, Dehao Huang, Zhi Quan Zhou:

On Adaptive Random Testing Through Iterative Partitioning. 1449-1472 - Lei Zhang, Rui Wang, Li Cui:

Real-time Traffic Monitoring with Magnetic Sensor Networks. 1473-1486 - Hung-Yu Chien:

Secure Verifier-Based Three-Party Key Exchange in the Random Oracle Model. 1487-1501
Volume 27, Number 5, September 2011
- Shih-Hsu Huang, Guan-Yu Jhuo, Wei-Lun Huang:

Minimum Inserted Buffers for Clock Period Minimization. 1513-1526 - Chih-Hung Lee, Shih-Hsu Huang, Chun-Hua Cheng:

Accurate TSV Number Minimization in High-Level Synthesis. 1527-1543 - Sai-Keung Wong:

Adaptive Continuous Collision Detection for Cloth Models Using a Skipping Frame Session. 1545-1559 - Hung-Yan Gu, Chung-Chieh Yang:

An HMM Based Pitch-Contour Generation Method for Mandarin Speech Synthesis. 1561-1580 - Ehsan Khosrowshahi Asl, Majid Noorhosseini, Atieh Saberi Pirouz:

A Dynamic Ant Colony Based Routing Algorithm for Mobile Ad-hoc Networks. 1581-1596 - Po-Jen Chuang, Cheng-Pei Wu:

Employing PSO to Enhance RSS Range-Based Node Localization for Wireless Sensor Networks. 1597-1611 - Abel Nyamapfene:

Towards Understanding Child Language Acquisition: An Unsupervised Multimodal Neural Network Approach. 1613-1639 - I-Wei Wu, Chung-Ping Chung, Jean Jyh-Jiun Shann:

Area-Efficient Instruction Set Extension Exploration with Hardware Design Space Exploration. 1641-1657 - Tung-Yang Ho, Cheng-Kuan Lin, Jimmy J. M. Tan, D. Frank Hsu, Lih-Hsing Hsu:

On the Extremal Number of Edges in Hamiltonian Graphs. 1659-1665 - Chulmin Yun, Byonghwa Oh, Jihoon Yang, Jongho Nang:

Feature Subset Selection Based on Bio-Inspired Algorithms. 1667-1686 - Maisam Mansub Bassiri, Hadi Shahriar Shahhoseini:

Future-based On-line Integrated HW/SW Partitioning and Co-scheduling for Reconfigurable Computing Systems. 1687-1711 - Chin-Hsien Wu, Chen-Kai Jan, Tei-Wei Kuo:

A Low-Memory Address Translation Mechanism for Flash-Memory Storage Systems. 1713-1727 - Hyun-Su Jang, Changhwan Song, Moon Jeong Kim, Young Ik Eom:

Agent-based Intelligent Middleware for User-Centric Services in Ubiquitous Computing Environments. 1729-1746 - Ghasem Mirjalily, Mohammad Hadi Karimi Tafti:

Load Balancing in Metro Ethernet Networks by Selecting the Best Spanning Tree. 1747-1759 - Mei-Sen Pan, Jing-Tian Tang, Xiao-Li Yang:

Medical Image Registration Based on SVD and Modified PSNR. 1761-1775
Volume 27, Number 6, November 2011
- Woosung Jung, Eunjoo Lee, Chisu Wu:

An Experimental Approach to Detect Similar Web Pages Based on 3-Levels of Similarity Clues. 1787-1822 - Yin-Tien Wang, Duan-Yan Hung, Chung-Hsun Sun:

Improving Data Association in Robot SLAM with Monocular Vision. 1823-1837 - Shih-Chien Chou, Jin-Yuan Jhu:

Embedding Access Control Policy in Web Service Path Composition Algorithm. 1839-1853 - Malik Tahir Hassan, Asim Karim:

Impact of Behavior Clustering on Web Surfer Behavior Prediction. 1855-1870 - In-Su Yoon, Sang-Hwa Chung, Yoon-Geun Kwon:

Implementation of a Software-Based TCP/IP Offload Engine Using Standalone TCP/IP without an Embedded OS. 1871-1883 - Yu-Shuen Wang, Min-Wen Chao, Chin-Chueng Yi, Chao-Hung Lin:

Cubist Style Rendering for 3D Polygonal Models. 1885-1899 - Dong-Wei Lin, Jin-Long Hsieh, Shih-Hsuan Yang, Chia-Chi Yang:

Fast Inter-Mode Selection for H.264 Encoders Based on Coded Block Patterns and Interblock Correlation. 1901-1917 - Lee-Min Lee:

High-Order Hidden Markov Model and Application to Continuous Mandarin Digit Recognition. 1919-1930 - Shaojing Fu, Bing Sun, Chao Li, Longjiang Qu:

Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree. 1931-1942 - Chia-Yi Lin, Hung-Ming Chen:

A Generic Multi-Dimensional Scan-Control Scheme for Test-Cost Reduction. 1943-1957 - Chih-Lin Hu:

Adaptive Scheduling for On-Demand Time-Critical Information Dissemination over Data Broadcast Channel. 1959-1983 - Lih-Chyau Wuu, Chi-Hsiang Hung, Jyun-Yan Yang:

IP Traceback Based on Chinese Remainder Theorem. 1985-1999 - Congxin Liu, Jie Yang, Hai Huang:

P-SURF: A Robust Local Image Descriptor. 2001-2015 - Yan-Jing Wu, Wei-Cheng Sung, Tsang-Ling Sheu:

A Dynamic Navigation Approach with Rebroadcasting Flood Avoidance in VANETs. 2017-2029 - Yan-Jun Li, Wen-Ling Wu:

Improved Integral Attacks on Rijndael. 2031-2045

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














