


default search action
Journal of Information Science and Engineering, Volume 33
Volume 33, Number 1, January 2017
- Heyang Xu, Bo Yang:

Energy-aware Resource Management in Cloud Computing Considering Load Balance. 1-16 - Wen-Tin Lee, Shang-Pin Ma, Yao-Yu Tsai:

Retrieval of Web Service Components using UML Modeling and Term Expansion. 17-36 - Xiang-Wei Zheng, Xiaomei Yu, Yan Li, Hong Liu:

An Enhanced Multi-objective Group Search Optimizer Based on Multi-producer and Crossover Operator. 37-50 - Pei-Yin Chen, Yen-Chen Lai, Ping-Hsuan Lai:

Hardware Implementation of Local Mean Decomposition. 51-62 - Ke Gu, Yong Wang, Sheng Wen:

Traceable Threshold Proxy Signature. 63-79 - Ke-Kun Hu, Guosun Zeng, Wen-Juan Liu, Wei Wang:

A Reliability Analysis for Successful Execution of Parallel DAG Tasks. 81-99 - Amna Khan, Iram Noreen, Zulfiqar Habib:

On Complete Coverage Path Planning Algorithms for Non-holonomic Mobile Robots: Survey and Challenges. 101-121 - You-Chiun Wang, Hung-Yi Ko:

Energy-Efficient Downlink Resource Scheduling for LTE-A Networks with Carrier Aggregation. 123-141 - Mohammadhossein Barkhordari, Mahdi Niamanesh:

ScaDiGraph: A MapReduce-based Method for Solving Graph Problems. 143-158 - Mohammad Javani, Meghdad Mirabi:

An Efficient Index and Data Distribution Scheme for XML Data Broadcast in Mobile Wireless Networks. 159-182 - Po-Jen Chuang, Chung-Hsing Wang:

An Efficient Group-based Data Backup and Recovery Scheme in Cloud Computing Systems. 183-198 - Bay Vo:

An Efficient Method for Mining Frequent Weighted Closed Itemsets from Weighted Item Transaction Databases. 199-216 - Sun-Kyum Kim, Sung-Bong Yang:

Effective Forwarding Scheme for Opportunistic Networks Based on Refined Contact Probability and Betweenness Centrality. 217-232 - Yi-Ruei Chen, Shiuan-Tzuo Shen, Wen-Guey Tzeng:

Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over ℤp. 233-250 - Ya-Hui Chang, Chia-Zhen Lee, Si-Yen Zhuang:

A Tree-Based Approach to Support Query Translation for Schema Mappings with Weights. 251-270
Volume 33, Number 2, March 2017
- Tsung-Shian Huang, Jen-Hao Liao, Wen-Chieh Lin, Jung-Hong Chuang:

An Artist Friendly Material Design System. 273-288 - Ju-Yuan Hsiao, Zhi-Yang Lin, Po-Yueh Chen:

Reversible Data Hiding Based on Pairwise Prediction-Error Histogram. 289-304 - Der-Rong Din:

Heuristic and Genetic Algorithms for Solving the Virtual Topology Design Problem on Elastic Optical Networks. 305-327 - Wei-Sheng Wong, Shin-Chung Hsu, Chung-Lin Huang:

A Virtual TouchPad for Smartphone with Depth Camera. 329-345 - C. Eswaran, Ramakrishnan Kannan, A. Mohamed Uvaze Ahamed:

CBIR System Based On Prediction Errors. 347-365 - Der-Rong Din, Wei-Ting Chen:

Fragmentation-Aware Routing Algorithms for Multicast Problem on Elastic Optical Networks. 367-384 - Tien-Khoi Phan, HaRim Jung, Hee Yong Youn, Ung-Mo Kim:

QR*-Tree: An Adaptive Space-Partitioning Index for Monitoring Moving Objects. 385-411 - Hyun Jun Kim, Kwang Hee Lee, Myoung-Ho Kim:

Finding a Minimum Source Set in Directed Hypergraphs. 413-428 - Zakaria Mukhtar Gharsseldien, Syed Alwee Aljunid, Hassan Yousif Ahmed:

Performance Analysis of Diagonal Permutation Shifting (DPS) Codes for SAC-OCDMA Systems. 429-444 - Donghai Tian, Xiaoqi Jia, Junhua Chen, Changzhen Hu:

An Online Approach for Kernel-level Keylogger Detection and Defense. 445-461 - Qian Li, Weiguo Wu, Zeyu Sun, Jianhang Huang:

An Efficient Two-Level Hierarchy Job Scheduling and Task Dispatching Strategy for Cluster Rendering System. 463-483 - Yang Yang, Shu-Lve Yang, Fenghe Wang, Jin Sun:

Post-Quantum Secure Public Key Broadcast Encryption with Keyword Search. 485-497 - Hongwei Zhao, Zhen Wang, Pingping Liu, Bin Wu:

The Normalized Distance Preserving Binary Codes and Distance Table. 499-515 - Sun-Hee Kim, Lei Li, Christos Faloutsos, Hyung-Jeong Yang, Seong-Whan Lee:

DAPs: Mining using Change-Point Detection of Epileptic Activity Time Series Data. 517-536 - Kyu-Seok Shim, Sung-Ho Yoon, Su-Kang Lee, Myung-Sup Kim:

SigBox: Automatic Signature Generation Method for Fine-grained Traffic Identification. 537-569
Volume 33, Number 3, May
- Suyel Namasudra, Pinki Roy:

A New Table Based Protocol for Data Accessing in Cloud Computing. 585-609 - Amna Riaz, Junaid Qadir, Usman Younis, Raihan Ur Rasool, Hafiz Farooq Ahmad, Adnan K. Kiani:

Intrusion Detection Systems in Cloud Computing: A Contemporary Review of Techniques and Solutions. 611-634 - Hong Rong, Huimei Wang, Jian Liu, Ming Xian:

Efficient Privacy-Preserving Building Blocks in Cloud Environments under Multiple Keys. 635-652 - Yong Li, Ge Yao, Huaqun Wang, Changlu Lin:

Large Branching Tree Based Dynamic Provable Data Possession Scheme. 653-673 - Soo-Fun Tan, Azman Samsudin:

Ciphertext Policy-Attribute Based Homomorphic Encryption (CP-ABHER-LWE) Scheme: A Fine-Grained Access Control on Outsourced Cloud Data Computation. 675-694 - Perumal Pandiaraja, Pandi Vijayakumar, Varadarajan Vijayakumar, Raman Seshadhri:

Computation Efficient Attribute Based Broadcast Group Key Management for Secure Document Access in Public Cloud. 695-712 - Mala T., Vijayanand K. S:

SiDS: Sudoku inspired Data Scrambling Method for Securing Data in Cloud using N -cloud Architecture. 713-725 - Sivaraman Audithan, Vijayaregunathan Vijayasaro, Pandi Vijayakumar, Varadarajan Vijayakumar:

An Efficient Authentication Scheme for Mobile Cloud Computing Services. 727-741 - Ao-di Liu, Na Wang, Mingcong Liu:

A PANH-based Access Control Mechanism for Cross-Cloud Service Composition. 743-758 - G. NaliniPriya, Kotteswari Karthikeyan, K. G. Maheswari:

An Enhanced Priority Scheduling Algorithm for Multi-Server Retrieval Cloud System. 759-772 - T. Subha, S. Jayashri:

Public Auditing Scheme for Data Storage Security in Cloud Computing. 773-787 - Jingxia Zhang, Leyou Zhang:

Anonymous CP-ABE against Side-channel Attacks in Cloud Computing. 789-805 - Jiangyong Shi, Jie He, Yuexiang Yang:

An SDN-based Sampling System for Cloud P2P Bots Detection. 807-821 - Vaidehi Vijayakumar, Sangeetha Dhamodaran:

Improved Searchable Attribute Based Encryption in Cloud. 823-836 - P. G. Shynu, John Singh K:

An Enhanced CP-ABE based Access Control Algorithm for Point to Multi-Point Communication in Cloud Computing. 837-858 - Suguna Marappan, Sharmila Dhandapani:

Efficient Virtualization Technique for Cloud to Achieve Optimal Resource Allocation. 859-869
Volume 33, Number 4, July
- Feng Wang, Li Xu:

Strongly Secure Certificateless Signature Scheme in the Standard Model with Resisting Malicious-But-Passive KGC Attack Ability. 873-889 - Ke Huang, Xiaosong Zhang, Xiao-Fen Wang:

Block-Level Message-Locked Encryption with Polynomial Commitment for IoT Data. 891-905 - Fushan Wei, Qi Jiang, Ruijie Zhang, Chuangui Ma:

A Privacy-Preserving Multi-Factor Authenticated Key Exchange Protocol with Provable Security for Cloud Computing. 907-921 - Jian Shen, Dengzhi Liu, Qi Liu, Debiao He, Xingming Sun:

An Enhanced Cloud Data Storage Auditing Protocol Providing Strong Security and Efficiency for Smart City. 923-938 - Wei-Tao Song, Bin Hu, Xiu-Feng Zhao:

Optimizing LWE-based FHE for Better Security and Privacy Protection of Smart City. 939-952 - Xingxin Li, Youwen Zhu, Jian Wang:

Efficient Encrypted Data Comparison Through a Hybrid Method. 953-964 - Jian Xu, Si-Jia Zhao, Fucai Zhou:

Privacy Protection Model Based on Digital Envelope and Dummies for Location-Based Services. 965-978 - Fan Zhang, Lin Kang, Xinyan Xu, Jian Shen, Lu Zhou:

Power Controlled and Stability-based Routing Protocol for Wireless Ad hoc Networks. 979-992 - Mingwu Zhang, Yudi Zhang, Hua Shen, Chunming Tang, Lein Harn:

Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security. 993-1006 - Jingjing Guo, Jianfeng Ma, Xinghua Li, Junwei Zhang, Tao Zhang:

An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy. 1007-1023 - Hao-Hao Nie, Yanping Li, Qian-Hong Wu:

A Privacy-Preserving V2I Authentication Scheme Without Certificates. 1025-1040 - Yao-Ling Ding, Jing-Yuan Zhao, Lei-Bo Li, Hong-Bo Yu:

Impossible Differential Analysis on Round-Reduced PRINCE. 1041-1053
- Qiao Liu, Yong Wang, Wenjing Zhang, Hui Li:

Secret Data Transmission in Wireless Sensor Network with Physical Layer Network Coding. 1055-1067 - Feifei Sun, Chao Wu, Dong Sheng:

Bayesian Networks for Intrusion Dependency Analysis in Water Controlling Systems. 1069-1083 - Yang Li, Menting Chen, Jian Wang:

Another Security Evaluation of SPA Countermeasures for AES Key Expansion in IoT Devices. 1085-1100
Volume 33, Number 5, September
- Yuhui Deng, Xinyu Huang, Liangshan Song, Yongtao Zhou, Frank Wang:

Memory Deduplication: An Effective Approach to Improve the Memory System. 1103-1120 - Wen-Yew Liang, Ming-Feng Chang, Yen-Lin Chen:

Optimal Energy Saving DVFS Approach of Embedded Processors. 1121-1140
- Xueqiao Wang, Jia-Zheng Yuan, Qing Li:

3D Face Recognition Using Spherical Vector Norms Map. 1141-1161 - Tsung-Shian Huang, Fu-Hsi Huang, Wen-Chieh Lin, Jung-Hong Chuang:

Lighting and Foggy Effect Transfer. 1163-1176 - Shih-Chung Hsu, I-Chieh Chen, Chung-Lin Huang:

Image Classification Using Naive Bayes Classifier With Pairwise Local Observations. 1177-1193 - Ming Liu, Vasile Rus, Qiang Liao, Li Liu:

Encoding and Ranking Similar Chinese Characters. 1195-1211 - Jianqing Mo, Hanwu He, Jin-Fang Li, Yu-Wei Wei:

Semantic Segmentation and Structure Representation of the Generalized Body Cavity. 1213-1235
- Chia-Wei Hsu, Chia-Huei Chang, Chi-Wei Wang, Shiuhpyng Shieh:

DROIT+: Taint Tracking for Storage Access on Android. 1237-1254
- Xiao Yu, Weimin Lei, Wei Zhang, Li Song:

A Routing Algorithm Based on SDN for On-Board Switching Networks. 1255-1266 - Muzammil Behzad, Muhammad Sharjeel Javaid, M. A. Parahca, S. Khan:

Distributed PCA and Consensus Based Energy Efficient Routing Protocol for WSNs. 1267-1283 - Ming-Jian Liu, Guozhen Tan, Nan Ding, Fuxin Zang:

Study on Self-adaptive Message Scheduler Used for the Vehicle Ad-hoc Network. 1285-1305 - L. Sherly Puspha Annabel, K. Murugan:

An Asynchronous and Adaptive Quorum Based MAC Protocol for Wireless Sensor Networks. 1307-1322
- Zhixiao Wang, Jingke Xi, Yan Xing, Zhiguo Hu:

Community Number Estimation for Community Detection in Complex Networks. 1323-1341 - Zhen Zhao, Zongmin Ma:

Semantic Similarity Measure of Fuzzy XML DTDs with Extreme Learning Machine. 1343-1358 - Elkhan Jabarov, Myong-Soon Park, Byung-Won On, Gyu Sang Choi:

PCR*-Tree: PCM-Aware R*-Tree. 1359-1374 - Xiaoyan Zhang, Xiangfu Meng, Yanhuan Tang, Chongchun Bi:

Adaptive Query Relaxation and Result Categorization based on Data distribution and Query Context. 1375-1396
Volume 33, Number 6, November
- Abdul Rehman Gilal, Jafreezal Jaafar, Ahsanullah Abro, Mazni Omar, Shuib Basri, Muhammad Qaiser Saleem:

Effective Personality Preferences of Software Programmer: A Systematic Review. 1399-1416 - Farrukh Aslam Khan, Umar Manzoor, Azhar Khan, Aftab Ali, Haider Abbas, Maruf Pasha:

Peer-to-Peer File Sharing Framework for Smartphones: Deployment and Evaluation on Android. 1417-1432 - Nazish Yaqoob, Seemab Latif, Rabia Latif, Haider Abbas, Asif Yaseen:

An Adaptive Rule-Based Approach to Resolving Real-Time VoIP Wholesale Billing Disputes. 1433-1446 - Abdul Rehman Gilal, Jafreezal Jaafar, Ahsanullah Abro, Waheed Ali Umrani, Shuib Basri, Mazni Omar:

Making Programmer Effective for Software Development Teams: An Extended Study. 1447-1463 - Basit Shehzad, Kinza Mehr Awan, Muhammad Ikram Ullah Lali, Waqar Aslam:

Identification of Patterns in Failure of Software Projects. 1465-1479 - Waqar Aslam, Farah Ijaz, Muhammad Ikram Ullah Lali, Waqar Mehmood:

Risk Aware and Quality Enriched Effort Estimation for Mobile Applications in Distributed Agile Software Development. 1481-1500 - Sehrish Ferdous, Naveed Ikram:

Communication and Coordination Using Facebook: A Case Study of Distributed Software Development. 1501-1517 - Javed Iqbal, Rodina Binti Ahmad, Mohd Hairul Nizam Md. Nasir, Muzafar Khan:

Significant Requirements Engineering Practices for Outsourced Mobile Application Development. 1519-1530 - Muhammad Awais, Samreen Nawaz, Muhammad Sheraz Arshad Malik, Fazal-e-Amin:

A Comparative Study on Context Assessment Approaches in Mobile Robots. 1531-1546 - Sheikh Tahir Bakhsh, Basit Shahzad, Sabeen Tahir:

Risk Management Approaches for Large Scale Software Development. 1547-1560 - Saad Shafiq, Irum Inayat:

Model-driven Development based Cross Platform Application Development: A Systematic Mapping Study. 1561-1573 - Jinho Ahn:

SBML Protocol for Conquering Simultaneous Failures with Group Dissemination Functionality. 1575-1593 - Xiu-Juan Pu, Liang Han, Qian Liu, An-Yan Jiang:

FECG Extraction Based on Least Square Support Vector Machine Combined with FastICA. 1595-1609 - Khan Bahadar Khan, Amir A. Khaliq, Muhammad Shahid:

A Novel Fast GLM Approach for Retinal Vascular Segmentation and Denoising. 1611-1627 - Logesh Ravi, V. Subramaniyaswamy:

Learning Recency and Inferring Associations in Location Based Social Network for Emotion Induced Point-of-Interest Recommendation. 1629-1647

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














