


default search action
Journal of Information Science and Engineering, Volume 31
Volume 31, Number 1, January 2015
- Bin-Tzong Chie, Shu-Heng Chen:

The Use of Knowledge in Prediction Markets: How Much of Them Need He Know? 1-22 - Jain-Shing Wu, Chih-Ta Lin, Yuh-Jye Lee, Song-Kong Chong:

Keystroke and Mouse Movement Profiling for Data Loss Prevention. 23-42
Papers
- Tao Guan, Dongxiang Zhou, Keju Peng, Yunhui Liu:

A Novel Contour Closure Method using Ending Point Restrained Gradient Vector Flow Field. 43-58 - Meghdad Mirabi, Hamidah Ibrahim, Leila Fathi, Nur Izura Udzir, Ali Mamat:

A Dynamic Compressed Accessibility Map for Secure XML Querying and Updating. 59-93 - Lieu-Hen Chen, Yu-Sheng Chen, Wei-Fan Chen, Hao-Ming Hung, Yasufumi Takama:

A Temporal and Multi-Resolution Visualization System for Large-Scale Data. 95-109 - Chi-Wei Wang, Shiuhpyng Winston Shieh:

DROIT: Dynamic Alternation of Dual-Level Tainting for Malware Analysis. 111-129 - Wen-Chao Chen, Zen Chen, Ping-Yi Sung:

Stochastic Optimization Based 3D Dense Reconstruction from Multiple Views with High Accuracy and Completeness. 131-146 - Mingqi Lv, Yinglong Li, Zhenming Yuan, Qihui Wang:

Route Pattern Mining From Personal Trajectory. 147-164 - Kwangjin Park:

An Efficient Scalable Spatial Data Search for Location-Aware Mobile Services. 165-178 - Dexi Liu:

Novel Semantics of the Top-k Queries on Uncertainly Fused Multi-Sensory Data. 179-205 - Saeed Reza Aghabozorgi, Ying Wah Teh:

Approximate Clustering of Time-Series Datasets using k-Modes Partitioning. 207-228 - Shih-Hsuan Yang, Chia-Ling Chu, Chi-Wen Chang:

Depth-Enhanced Error Concealment for H.264 Video. 229-246 - Sadikin Rifki, Youngho Park, Sangjae Moon:

A Fully Secure Ciphertext-Policy Attribute-Based Encryption With a Tree-Based Access Structure. 247-265 - Hongwei Hu, Bo Ma, Yuwei Wu, Weizhang Ma, Kai Xie:

Kernel Regression Based Online Boosting Tracking. 267-282 - Yinghong Xie, Chengdong Wu:

Visual Object Tracking using Particle Filtering with Dual Manifold Models. 283-296 - Yu-Chi Chen, Raylin Tso, Gwoboa Horng, Chun-I Fan, Ruei-Hau Hsu:

Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of two Schemes. 297-314
- Mohammad Zanjani, Ahmad Baraani-Dastjerdi, Ehsan Asgarian, Alireza Shahriyari, Amir Akhavan Kharazian:

A New Experience in Persian Text Clustering using FarsNet Ontology. 315-330 - Ya-Lin Lee, Wen-Hsiang Tsai:

Reversible Data Hiding by Image Encryptions and Spatial Correlation Comparisons. 331-342 - Iksu Kim, Yongyun Cho:

Hash-Based Password Authentication Protocol Against Phishing and Pharming Attacks. 343-355
Volume 31, Number 2, March 2015
Papers
- Hamid Reza Arkian, Reza Ebrahimi Atani, Atefe Pourkhalili, Saman Kamali:

A Stable Clustering Scheme Based on Adaptive Multiple Metric in Vehicular Ad-hoc Networks. 361-386 - Vikas Chaudhary, R. S. Bhatia, Anil K. Ahlawat:

A Constant Learning Rate Self-Organizing Map (CLRSOM) Learning Algorithm. 387-397 - Hoang-Anh Pham, Jong Myung Rhee:

RSAFE: A Robust Software-based Fault-Tolerant Scheme for Large-scale Ethernet Networks. 399-413 - Jeong Woo Son, Hee-Geun Yoon, Seong-Bae Park:

A Ontology Kernel - A Convolution Kernel for Ontology Alignment. 415-432 - Ya-Hui Chang, Wei-Hsi Lee:

Improving the Time and Space Performance for Processing Keyword Queries on XML Databases. 433-473 - Chi-Wei Wang, Chong Kuan Chen, Chia-Wei Wang, Shiuhpyng Winston Shieh:

MrKIP: Rootkit Recognition with Kernel Function Invocation Pattern. 455-473 - Kai-Lung Hua, Adhatus Solichah Ahmadiyah, Yeni Anistyasari:

A Novel Image Compression Algorithm Based on Multitree Dictionary and Perceptual-based Rate-Distortion Optimization. 475-489 - Jenq-Haur Wang, Meng-Han Shih:

Constructing Query Context Knowledge Bases for Relevant Term Suggestion. 491-508 - Wenbin Qian, Wenhao Shu, Yonghong Xie, Bingru Yang, Jun Yang:

Feature Selection using Compact Discernibility Matrix-based Approach in Dynamic Incomplete Decision System. 509-527 - Toktam Ramezanifarkhani, Mohammadreza Razzazi:

Principles of Data Flow Integrity: Specification and Enforcement. 529-546 - Lingfang Zeng, Chao Jin, Bharadwaj Veeravalli, Dan Feng:

HR6TAP: A Hybrid RAID6 Storage Architecture Tracking Data to Any Point-in-time for Enterprise Applications. 547-572 - Zhong-Yong Chen, Chien Chin Chen:

Identifying the Stances of Topic Persons Using a Model-based Expectation-Maximization Method. 573-595 - Yinglei Song, Albert Y. Chi:

A New Approach for Parameter Estimation in the Sequence-structure Alignment of Non-coding RNAs. 593-607 - Hung-Yan Gu, Sung-Fung Tsai:

A Voice Conversion Method Combining Segmental GMM Mapping with Target Frame Selection. 609-626 - Yitian Xu:

A novel twin support vector regression. 627-640 - Tsung-Ju Lee, Shian-Shyong Tseng, Chung-Chun Kung:

Factors Influencing the Performance of Human Computation: An Empirical Study in Web Application Testing. 641-658 - Yi-Chun Chen, Guanling Lee:

Mining Non-Redundant Substitution Rules between Sets of Items in Large Databases. 659-674 - Chia-Nan Ko, You-Min Jau, Jin-Tsong Jeng:

Parameter Estimation of Chaotic Dynamical Systems Using HEQPSO. 675-689 - Zhiliang Liu, Ming Jian Zuo, Xiaomin Zhao, Hongbing Xu:

An Analytical Approach to Fast Parameter Selection of Gaussian RBF Kernel for Support Vector Machine. 691-710 - S. Sathya Priya, Krishnan Murugan:

Improving TCP Performance in Wireless Networks by Detection and Avoidance of Spurious Retransmission Timeouts. 711-726 - Kuo-Yang Wu, Kuo-Yu Tsai, Tzong-Chen Wu, Kouichi Sakurai:

Provably Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks. 727-742
- Xiumei Li, Guoan Bi:

Parametric Methods Comparisons for Parameter Estimation of Polynomial Phase Signals. 743-757
Volume 31, Number 3, May 2015
Papers
- Peiguang Lin, Lei Chen, Mingxuan Yuan, Peiyao Nie:

Discover the Misinformation Broadcasting in On-Line Social Networks. 763-785 - Xiangui Wu, Anna Wang:

Harmonic Signal Processing Method Based on the Windowing Interpolated DFT Algorithm. 787-798 - Lee-Min Lee:

Duration High-Order Hidden Markov Models and Training Algorithms for Speech Recognition. 799-820 - Wei-Ho Tsai, Cin-Hao Ma, Yi-Po Hsu:

Automatic Singing Performance Evaluation Using Accompanied Vocals as Reference Bases. 821-838 - Arjumand Younus, Kyu-Young Whang, Hyuk-Yoon Kwon, Yeon-Mi Yeo:

A Full-Coverage Two-Level URL Duplication Checking Method for a High-Speed Parallel Web Crawler. 839-860 - Liangliang Duan, Lingfu Kong:

Salient Region Detection with Hierarchical Image Abstraction. 861-878 - Guaning Chen, Yan-Ling Chu, Min-Te Sun:

Neighbor-based Hop Size Estimation for Dense Sensor Networks. 879-896 - Chin-Yun Hsieh, Chien-Tsun Chen:

Patterns for Continuous Integration Builds in Cross-Platform Agile Software Development. 897-924 - Hyi-Cheng Tsai, Chin-Laung Lei, Jan-Ming Ho, Ming-Yang Kao, Szu-Lang Liao:

Outstanding Principal as Prepayment Value: A Closed-Form Formula for Mortgage Pricing. 925-942 - Tsung-Teng Chen, Chun-Ying Huang, Chen-Chi Wu, Kuan-Ta Chen:

Physical Presence Verification: A Test to Detect Whether A Computer Is Remotely Controlled. 943-963 - Chih-Ta Lin, Nai-Jian Wang, Han Xiao, Claudia Eckert:

Feature Selection and Extraction for Malware Classification. 965-992 - Esma Elghoul, Anne Verroust-Blondet, Mohamed Chaouch:

A Segmentation Transfer Approach for Rigid Models. 993-1009 - Pei-Yin Chen, Yeu-Horng Shiau, Hung-Yu Yang, Wan-Yu Jhuang:

A Weighted Edge-Preserving Smooth Filter for High Dynamic Range Image Display. 1011-1026 - Cheng-Hsiung Chiang, Liang-Hsuan Chen:

A Self-Adaptive Intelligent Control System with Hierarchical Architecture. 1027-1049 - Der-Hong Ting, Nien-Lin Hsueh, Chao-Tung Yang, Chih-Hung Chang:

A Cloud Service Implementation for Evaluating Design Pattern in Software Evolution. 1051-1070 - Yi-Jeng Wu, Der-Lor Way, Yu-Ting Tsai, Zen-Chung Shih:

Clip Space Sample Culling for Motion Blur and Defocus Blur. 1071-1084 - Yiyuan Luo, Xuejia Lai, Jing Hu:

The Pseudorandomness of Many-Round Lai-Massey Scheme. 1085-1096 - Fu-Hau Hsu, Chi-Hsien Hsu, Chuan-Sheng Wang, Pei-Hsun Lee, Ruei-Min Jiang, Jia-Sian Jhang:

Bypass Cell-phone-verification Through a Smartphone-based Botnet. 1097-1111 - Rize Jin, Hyung-Ju Cho, Tae-Sun Chung:

LS-LRU: A Lazy-Split LRU Buffer Replacement Policy for Flash-Based B+-tree Index. 1113-1132 - Fanghuai Hu, Zhiqing Shao, Tong Ruan:

Self-Supervised Synonym Extraction from the Web. 1133-1148 - Nasir Ahmed, Abdul Jalil, Asifullah Khan:

Clustering Using Local and Global Exponential Discriminant Regularization. 1149-1164
Volume 31, Number 4, July 2015
- Yuhui Deng, Zhen Zhang, Zhike Chen, Lijuan Lu:

Self-destructing Instant Messages by Employing KAD DHT Network. 1169-1184 - Shanqiing Zhang, Jianjun Li, Zhihui Wang, Kunlong Zhang, Mingyue Li:

Texture Segmentation Model Driven by the Simplified Cauchy-Schwarz Divergence. 1185-1197 - Zhi-Wei Wang, Aidong Xia:

ID-based Proxy Re-signature with Aggregate Property. 1199-1211
- Yan Xing, Fanrong Meng, Yong Zhou, Ranran Zhou:

Overlapping Community Detection by Local Community Expansion. 1213-1232 - Yong-Ju Lee:

Semantic-Based Web API Composition for Data Mashups. 1233-1248 - Yao-Hung Wu, Chin-Wei Fan, Wei-Mei Chen:

An Efficient Geometric Localization Approach for Distributed Sensor Networks. 1249-1248 - Asmaa M. el-Said, Ali I. Eldesoky, Hesham A. Arafat:

An Efficient Approach to Construct Object Model of Static Textual Structure with Dynamic Behavior Based on Q-learning. 1267-1289 - Jinghao Sun, Yakun Meng:

An Approximation Scheme for Heterogeneous Parallel Task Scheduling in a Two-Stage Hybrid Flow Shop. 1291-1308 - Yong Duan, Mingtao Pei, Yucheng Wang, Min Yang, Iameng Qin, Yunde Jia:

A Unified Probabilistic Framework for Real-Time Depth Map Fusion. 1309-1327 - Minghua Tang, Xiaola Lin:

A Novel NoC Routing Design Methodology Based on Divide-Conquer Approach. 1329-1346 - Chang-Hsiung Tsai, Chia-Jui Lai:

A Linear Algorithm for Embedding of Cycles in Crossed Cubes with Edge-Pncyclic. 1347-1355 - Li-Der Chou, Tzu-Chien Liu, David Chunhu Li, Chen-Ming Lin, Yi-Chun Lin:

Development of a Lilliput Multimedia System to Enhance Students' Learning Motivation. 1357-1372 - Pushpinder Singh:

A Novel Method for Ranking Generalized Fuzzy Numbers. 1373-1385 - Lidong Wang, Yin Zhang, Xiaodong Xu:

A Novel Group Detection Method for Finding Related Chinese Herbs. 1387-1411 - Chi-Wei Wang, Shiuhpyng Winston Shieh:

SWIFT: Decoupled System-Wide Information Flow Tracking and its Optimizations. 1413-1429 - I-Wei Wu, Jean Jyh-Jiun Shann, Chung-Ping Chung:

Reconfigurable Custom Functional Unit Generation and Exploitation for Multiple-Issue Processors. 1431-1453 - Hongsuk Kim, Min Young Chung, Tae-Jin Lee, Mihui Kim, Hyunseung Choo:

Scheduling Based on Maximum PF Selection with Contiguity Constraint for SC-FDMA in LTE Uplink. 1455-1473 - Ali Shanon Alsaidi, Tat Chee Wan, Alhamza Munther:

Application of Harmony Search Optimization Algorithm to Improve Connectivity in Wireless Sensor Network with Non-uniform Density. 1475-1489
Volume 31, Number 5, September 2015
Papers
- Zi-Shiung Tsai, Pau-Choo Chung, Kuan-Wei Chi:

Weight-Flooding Aggregation with Canny Edge Constraint for 3D Depth Estimation. 1495-1519 - Pei-Jun Lee, Hsu-Hsien Huang, Chun-Yuan Cheng:

Fast Motion Estimation Based on Perceptual-Aware for the Depth Map Coding in 3DVC. 1521-1536 - Pin-Chen Kuo, An-Jie Lin, Bin-Da Liu, Jar-Ferr Yang:

An Advanced Video and Depth Depacking Architecture for 3D Applications. 1537-1555 - Shih-Hsuan Yang, Bossun Wang:

Improved Adaptive-Support Stereo Matching Using Local Features. 1557-1575 - Hung-Ming Wang, His-Chun Tseng, Ke-Ying Liao:

Comfortable Disparity Modification for Existing DIBR Systems. 1577-1592 - Rui Song, Hyunsuk Ko, C.-C. Jay Kuo:

MCL-3D: A Database for Stereoscopic Image Quality Assessment using 2D-Image-Plus-Depth Source. 1593-1611 - Hwashin Moon, Sungwon Yi, Gyu Sang Choi, Yong-Sung Jeon, Joengnyeo Kim:

A Multi-resolution Port Scan Detection Technique for High-speed Networks. 1613-1632 - Tiefei Zhang, Jianguo Xing, Jixiang Zhu, Tianzhou Chen:

Exploiting Page Write Pattern for Power Management of Hybrid DRAM/PRAM Memory System. 1633-1646 - Jia-Lien Hsu, Tzu-Han Hsiao:

Finding Sequence Clusters: A Shared Near Neighbors Approach. 1647-1667 - Hyun-Min An, Su-Kang Lee, Jae-Hyun Ham, Myung-Sup Kim:

Traffic Identification Based on Applications using Statistical Signature Free from Abnormal TCP Behavior. 1669-1692 - Chih-Hung Lu, Han-Hsuan Lin, Chih-Wei Tang:

Fast Mode Decision for Depth Video Coding Using H.264/MVC. 1693-1710 - Xiaochao Zhao, Yaping Lin, Bo Ou, Junfeng Yang:

A Wavelet-Based Image Preprocessing Method or Illumination Insensitive Face Recognition. 1711-1731 - Xudong Lin, Xiaoning Zeng, Xiaowei Pu, Yanyan Sun:

A Cardinality Estimation Approach Based on Two Level Histograms. 1733-1756 - Djaafar Zouache, Abdelouahab Moussaoui:

Quantum-Inspired Differential Evolution with Particle Swarm Optimization for Knapsack Problem. 1757-1773 - Jia-Chun Lin, Fang-Yie Leu, Ying-Ping Chen:

PAReS: A Proactive and Adaptive Redundant System for MapReduce. 1775-1793 - Wei-Kai Cheng, Po-Han Wu, Yi-Hsuan Chiu:

A Skew-Window based Methodology for Timing Fixing in Multiple Power Modes. 1795-1812
- Qing Wu:

A New Class of e-Piecewise Smooth SupportVector Regressions. 1813-1828
Volume 31, Number 6, November 2015
Papers
- Chun-Sheng Wang:

Mining Non-Redundant Inter-Transaction Rules. 1521-1536 - Yanhong Li, Guohui Li, LihChyun Shu, Qun Huang, Hong Jiang:

Continuous Monitoring of Top- k Spatial Keyword Queries in Road Networks. 1831-1848 - Yindong Yang, Lin Zhu:

Refine Item-Based Collaborative Filtering Algorithms with Skew Amplification. 1867-1884 - Chih-Chyau Yang, Chien-Ming Wu, Chun-Ming Huang:

A Cost-Effective 3D SoC Silicon Prototyping Platform. 1885-1901 - David Chunhu Li, Li-Der Chou, Li-Ming Tseng, Yi-Ming Chen:

Energy Efficient Min Delay-based Geocast Routing Protocol for the Internet of Vehicles. 1903-1918 - W. G. C. W. Kumara, Timothy K. Shih, Shih-Ming Chang:

An Automatic Stranger Removal Photography System Using Panoramic Inpainting. 1919-1935 - Yizhuo Wang, Rosario Cammarota, Alexandru Nicolau:

Fault Tolerant Scheduling for Parallel Loops on Shared Memory Systems. 1937-1959 - Yihui Zhou, Xuening Liao, Zhenqiang Wu:

Effectiveness Analysis of ALNCode Scheme for Anonymous Communication with Network Coding. 1961-1974 - Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan:

A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture. 1975-1992 - Yenchi Wang, Ying-Nong Chen, Hsienyu Huang, Kuo-Chin Fan:

Local Block-Difference Pattern for Use in Gait-Based Gender Classification. 1993-2008 - Tongguang Ni, Xiaoqing Gu, Shitong Wang, Pengjiang Qian, Raymond F. Muzic Jr.:

Locality Preserving Semi-Supervised Support Vector Machine. 2009-2024 - Chin-Yun Hsieh, Chen-Hsin Tsai, Yu Chin Cheng:

Towards Automatic Generation and Continuous Improvement of Functional Test Cases: The Case of the Test-Duo Framework and Mutation Testing. 2025-2053 - Soojin Kim, Kyeongsoon Cho:

Design of High-Performance HOG Feature Calculation Circuit for Real-Time Pedestrian Detection. 2055-2073 - Yu-Cheng Chiu, Yu-Shuen Wang:

Content Aware Texture Compression. 2075-2088 - Jinan Xu, Jiangming Liu, Yujie Zhang:

Word Similarity Computing Based on Hybrid Hierarchical Structure by HowNet. 2089-2101 - Wuu Yang:

A Brouwerian Model of the Run-Time Memory. 2103-2124
- Xiumei Li, Guoqing Yang:

RfLPP-Hough Transform for Chirp Signal Detection. 2125-2135

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














