


default search action
Journal of Information Science and Engineering, Volume 22
Volume 22, Number 1, January 2006
- Yi-Hsuan Lin, Tung-Mei Ko, Tyng-Ruey Chuang, Kwei-Jay Lin:

Open Source Licenses and the Creative Commons Framework: License Selection and Comparison. 1-17 - Wen-Dar Lin, Yun-Ching Chen, Jan-Ming Ho, Chung-Der Hsiao:

GOBU: Toward an Integration Interface for Biological Objects. 19-29 - Nei-Chiung Perng, Chin-Shuang Liu, Tei-Wei Kuo:

Real-Time Linux with Budget-Based Resource Reservation. 31-47 - Cungang Yang, Chang N. Zhang:

An Approach to XML-Based Administration and Secure Information Flow Analysis on an Object Oriented Role-Based Access Control Model. 49-61 - Wei-Horng Yeh, Ye-In Chang:

An Efficient Signature Extraction Method for Image Similarity Retrieval. 63-94 - Min-Hsuan Fan, Chua-Huang Huang, Yeh-Ching Chung, Jen-Shiuh Liu, Jei-Zhii Lee:

A Programming Methodology for Designing Block Recursive Algorithms. 95-121 - Yin-Fu Huang, Chao-Nan Chen:

Implementation for the Arrangement and Mining Analysis of Travel Schedules. 123-146 - Shih-Chien Chou:

MRBAC/AR: an Information Flow Control Model to Prevent Both Intra- and Inter-Application Information Leakage. 147-161 - Chih-Yang Lin, Yu-Tai Ching:

A Robust Image Hiding Method Using Wavelet Technique. 163-174 - Shyi-Ming Chen, Hao-Lin Lin:

Generating Weighted Fuzzy Rules from Training Instances Using Genetic Algorithms to Handle the Iris Data Classification Problem. 175-188 - Tzu-Chao Lin, Pao-Ta Yu:

Salt-Pepper Impulse Noise Detection and Removal Using Multiple Thresholds for Image Restoration. 189-198 - Ming-Hua Wang, Huan-Chao Keh, Nan-Chen Hsieh, Tsong-Sheng Wang:

A Study of Disjunctive Information in Fuzzy Relational Databases. 199-213 - Jong Wook Kwak, Cheol Hong Kim, Sung-Hoon Shim, Chu Shik Jhon:

Advanced High-Level Cache Management by Processor Access Information. 215-227
Volume 22, Number 2, March 2006
- Junyoung Heo, Sangho Yi, Yookun Cho, Jiman Hong:

Space-Efficient Page-Level Incremental Checkpointing. 237-246 - Misook Choi, Eunsook Cho:

Component Identification Methods Applying Method Call Types between Classes. 247-267 - Hisham M. Haddad, Ying Xie:

Wrapper-Based Framework for Domain-Specific Software Reuse. 269-282 - Songsri Tangsripairoj, Mansur H. Samadzadeh:

Organizing and Visualizing Software Repositories Using the Growing Hierarchical Self-Organizing Map. 283-295 - Sun-Jen Huang, Chieh-Yi Lin, Nan-Hsing Chiu:

Fuzzy Decision Tree Approach for Embedding Risk Assessment Information into Software Cost Estimation Model. 297-313 - YoungJoon Byun, Beverly A. Sanders:

A Pattern-based Development Methodology for Communication Protocols. 315-335 - Pradeep Varma:

Process and Planning Support for Iterative Porting. 337-356 - Ninh-Thuan Truong, Jeanine Souquières:

Verification of UML Model Elements Using B. 357-373 - Jingyue Li, Axel Anders Kvale, Reidar Conradi:

A Case Stud on Improving Changeability of COTS-Based System Using Aspect-Oriented Programming. 375-390 - Jaime Muñoz Masqué, Alberto Peinado:

Cryptanalysis of Improved Liaw's Broadcasting Cryptosystem. 391-399 - Bin Shyan Jong, Wen Hao Yang, Shawn Song:

An Efficient Edge-Based Compression Algorithm for 3D Models with Holes and Handles. 401-423 - Bin Shyan Jong, Tsong Wuu Lin, Yu Lung Wu, Te Yi Chan:

Effective Two-Phase Cooperative Learning on the WWW. 425-446 - SooCheol Lee, Eenjun Hwang, Jung-Geun Han:

Efficient Image Retrieval Based on Minimal Spatial Relationships. 447-459 - I-Shyan Hwang, San-Nan Lee, I-Cheng Chang:

Performance Assessment of Fuzzy Logic Control Routing Algorithm with Different Wavelength Assignments in DWDM Networks. 461-473
Volume 22, Number 3, May 2006
- Yen-Chung Chiu, Wen-Hsiang Tsai:

Copyright Protection against Print-and-Scan Operations by Watermarking for Color Images Using Coding and Synchronization of Peak Locations in Frequency Domain. 483-496 - Varsha Chikane, Chiou-Shann Fuh:

Automatic White Balance for Digital Still Cameras. 497-509 - Li-Wei He, Tsorng-Lin Chia, Chen-Kuei Yang:

A Geometric Invariant Approach to Human Face Verification. 511-534 - Shi-Cheng Liu, Shinfeng D. Lin:

BCH Code-Based Robust Audio Watermarking in the Cepstrum Domain. 535-543 - Hsu-Yung Cheng, Quen-Zong Wu, Kuo-Chin Fan, Bor-Shenn Jeng:

Binarization Method Based on Pixel-level Dynamic Thresholds for Change Detection in Image Sequences. 545-557 - Jong-Phil Yang, Kyung Hyune Rhee:

A New Design for a Practical Secure Cookies System. 559-571 - Been-Chian Chien, Jung-Yi Lin, Wei-Pang Yang:

A Classification Tree Based on Discriminant Functions. 573-594 - Hewijin Christine Jiau, Kuo-Feng Ssu:

Building and Using Object-Oriented Frameworks for CAD Rapid Prototyping. 595-609 - Yongsu Park, Yookun Cho:

Efficient One-time Signature Schemes for Stream Authentication. 611-624 - Hewijin Christine Jiau, Jinghong Cox Chen, Kuo-Feng Ssu, Jim-Min Lin:

TeMeFr: Towards a Reuse-Based Development for Conference-Oriented Telemedicine Systems. 625-640 - Hong-Long Chou, Zen Chen:

Fast Octree Construction Endowed with an Error Bound Controlled Subdivision Scheme. 641-657 - Sun Ok Yang, SungSuk Kim, Chong-Sun Hwang:

Profile-Based Lifetime Determination Schemes for Mobility Management in HMIPv6. 659-674 - Ganapathi Padmavathi, Samukutty Annadurai:

Storage Efficient Key Management Technique for Secure Multicasting. 675-689 - Wei-Chi Ku, Hui-Lung Lee:

Authentication Protocols Using Hoover-Kausik's Software Token. 691-699 - Ching-Tang Hsieh, Yeh-Kuang Wu, Chyi-Jang Lee:

Semi-fragile Image Authentication Using Real Symmetric Matrix. 701-712
Volume 22, Number 4, July 2006
- Chih-wen Hsueh, Hsin-hung Lin, Guo-Chiuan Huang:

Boosting Ethernet using Regular Switching Hubs. 721-734 - Chow-Sing Lin, Chin-Ju Hsieh:

SOTS-CE: A Sonography Ovarian Tumor System with Case Exchange. 735-750 - Hsu-Yang Kung, Jing-Shiuan Hua, Chaur-Tzuhn Chen:

Drought Forecast Model and Framework Using Wireless Sensor Networks. 751-769 - Po-Cheng Huang, Kuan-Rong Lee, Wei-Tsung Su, Yau-Hwang Kuo, Mong-Fong Horng, Chien-Chou Lin, Yu-Chang Chen:

Control Component Development of Information Appliances on Networks. 771-784 - Tyng-Yeu Liang, Shih-Hsien Wang, Ce-Kuen Shieh, Ching-Min Huang, Liang-I Chang:

Design and Implementation of the OpenMP Programming Interface on Linux-based SMP Clusters. 785-798 - Hsien-Wen Cheng, Lan-Rong Dung:

A Power-Aware Motion Estimation Architecture Using Content-based Subsampling. 799-818 - Frank S. C. Tseng, Wen-Ping Lin:

D-Tree: A Multi-Dimensional Indexing Structure for Constructing Document Warehouses. 819-841 - Hung-Kuang Chen, Chin-Shyurng Fahn, Jeffrey J. P. Tsai, Ming-Bo Lin:

A Novel Cache-based Approach to Large Polygonal Mesh Simplification. 843-861 - Fidel Cacheda, Victor Carneiro, Carmen Guerrero, Ángel Viña:

Hybrid Architecture for Web Search Systems Based on Hierarchical Taxonomies. 863-887 - Keun-Hee Han, Il-Gon Kim, Kang-Won Lee, Jin-Young Choi, Sang-Hun Jeon:

Threat Evaluation Method for Distributed Network Environment. 889-907 - Daniel Yuh Chao:

Knitting Technique with TP-PT Generations for Petri Net Synthesis. 909-923 - Shih-Mao Lu, Sheng-Fu Liang, Chin-Teng Lin:

A HVS-Directed Neural-Network-Based Approach for Salt-Pepper Impulse Noise Removal. 925-939 - Ying-Haw Shu, Shing Tenqchen, Ming-Chang Sun, Wu-Shiung Feng:

A Brief Comparison of Two-phase and NOR-based Four-phase Pipelined Asynchronous Systems. 941-952 - Goutam Kumar Saha:

A Software Tool for Fault Tolerance. 953-964 - I-Te Chen, Ming-Hsin Chang, Yi-Shiung Yeh:

Design of Proxy Signature in the Digital Signature Algorithm (DSA). 965-973 - Kuo-Hsing Cheng, Shun-Wen Cheng:

Improved 32-bit Conditional Sum Adder for Low-Power High-Speed Applications. 975-989
Volume 22, Number 5, September 2006
- Yung-Ji Sher, Yeou-Jiunn Chen, Yu-Hsien Chiu, Kao-Chi Chung, Chung-Hsien Wu:

MAP-Based Perceptual Modeling for Noisy Speech Recognition. 999-1013 - Frode Eika Sandnes, Yo-Ping Huang:

Chording with Spatial Mnemonics: Automatic Error Correction for Eyes-Free Text Entry. 1015-1031 - Daw-Tung Lin:

Facial Expression Classification Using PCA and Hierarchical Radial Basis Function Network. 1033-1046 - Chin-Chen Chang, Jiann-Jone Chen, Wen-Kai Tai, Chin-Chuan Han:

New Approach for Static Gesture Recognition. 1047-1057 - Guang-Yi Wang, Mau-Tsuen Yang, Cheng-Chin Chiang, Wen-Kai Tai:

A Talking Face Driven by Voice using Hidden Markov Model. 1059-1075 - Shih-Jung Peng, Jan Karel Ruzicka, Deng-Jyi Chen:

A Generic and Visual Interfacing Framework for Bridging the Interface between Application Systems and Recognizers. 1077-1091 - Chung-Hsien Yang, Jia-Ching Wang, Jhing-Fa Wang, Hsiao Ping Lee, Chung-Hsien Wu, Kai-Hsing Chang:

Multiband Subspace Tracking Speech Enhancement for In-Car Human Computer Speech Interaction. 1093-1107 - Honggang Wang, Ming C. Leu, Cemil Öz:

American Sign Language Recognition Using Multi-dimensional Hidden Markov Models. 1109-1123 - Jia-Ning Luo, Shiuh-Pyng Shieh, Ji-Chiang Shen:

Secure Authentication Protocols Resistant to Guessing Attacks. 1125-1143 - Duan-Yu Chen, Ming-Ho Hsiao, Suh-Yin Lee:

Automatic Closed Caption Detection and Filtering in MPEG Videos for Video Structuring. 1145-1162 - Wan-De Weng, Chin-Tsu Yen, Rui-Chang Lin:

A New ISF-FLANN Channel Equalizer for 4QAM Digital Communication Systems and Its FPGA Verification. 1163-1176 - Ching-Wei Huang, Wuu Yang:

Efficiency and Reliability in Cluster Based Peer-to-Peer Systems. 1177-1203 - Hun-Woo Yoo:

Visual-Based Emotional Descriptor and Feedback Mechanism for Image Retrieval. 1205-1227 - Tai-Yi Huang, Chih-Chieh Chou, Po-Yuan Chen:

Bounding DMA Interference on Hard-Real-Time Embedded Systems. 1229-1247 - Hongya Wang, Guo-Qin Ning, Guohui Li, Kam-yiu Lam:

Mobile Real-Time Read-Only Transaction Processing in Broadcast Disks. 1249-1264 - Chih-Ming Hsiao, Ge-Ming Chiu:

A Fault-Tolerant Protocol for Generating Sequence Numbers for Total Ordering Group Communication in Distributed Systems. 1265-1277 - Hsuan-Hao Chen, Kuochen Wang, Hung-Cheng Shih:

A WAP-based, Push-enabled Mobile Internet Application Platform. 1279-1293 - Chi-Chao Chang, Tzonelih Hwang:

Modular Design for Round-Oriented Password Authentication Protocols. 1295-1308
Volume 22, Number 6, November 2006
- Po-Hsueh Huang, Yin-Te Tsai, Chuan Yi Tang:

A Near-Quadratic Algorithm for the Alpha-Connected Two-Center Problem. 1317-1324 - Ying-Hong Wang, Hung-Zu Lin:

Multipath QoS Routing with Interference Provision in Ad Hoc Wireless Network. 1325-1338 - Tyne Liang, Jian-Shin Chen:

Multi-class Named Entities Extraction from Biomedical Literature. 1339-1353 - Leena Lulu, Ashraf Elnagar:

Efficient and Complete Coverage of 2D Environments by Connectivity Graphs for Motion Planning Algorithms. 1355-1366 - Cheng-Jian Lin:

Wavelet Neural Networks with a Hybrid Learning Approach. 1367-1387 - Chih-Hung Wang:

Practical Constructions to Multiple Designated Confirmer Signatures. 1389-1407 - Ming-I Hsieh, Eric Hsiao-Kuang Wu, Meng-Feng Tsai:

FasterDSP: A Faster Approximation Algorithm for Directed Steiner Tree Problem. 1409-1425 - Yi-Chung Chen, Jang-Ping Sheu:

Interest-Based Lookup Protocols for Mobile Ad Hoc Networks. 1427-1445 - Ill-Young Weon, Doo Heon Song, Chang-Hoon Lee:

Effective Intrusion Detection Model through the Combination of a Signature-based Intrusion Detection System and a Machine Learning-based Intrusion Detection System. 1447-1464 - Sejong Oh, Changwoo Byun, Seog Park:

An Organizational Structure-Based Administration Model for Decentralized Access Control. 1465-1483 - Hoijin Yoon, Byoungju Choi:

The Context Driven Component Supporting the Context Adaptation and the Content Extension. 1485-1504 - Sang-Uk Shin:

An Efficient Sealed-Bid Auction Protocol with Two Servers. 1505-1518 - Pei-Yi Chen, Arbee L. P. Chen:

Similarity-based Motion Track Management for Video Retrieval. 1519-1527 - Yalçin Isik, Necmi Taspinar:

The Multi-User Detection in Code Division Multiple Access with Adpative Neuro-Fuzzy Inference System. 1529-1542 - Jong Wook Kwak, Chu Shik Jhon:

Adaptive Multi-Grain Remote Access Cache in Ring Based NUMA System. 1543-1554 - Adem Kalinli, Seref Sagiroglu:

Elman Network with Embedded Memory for System Identification. 1555-1568 - Said E. El-Khamy, Mohey M. Hadhoud, Moawad I. Dessouky, Bassiouny M. Salam, Fathi E. Abd El-Samie:

Efficient Solutions for Image Interpolation Treated as an Inverse Problem. 1569-1583 - Chia-Chun Tsai, Hann-Cheng Huang, Trong-Yen Lee, Wen-Ta Lee, Jan-Ou Wu:

Using Stack Reconstruction on RTL Orthogonal Scan Chain Design. 1585-1599 - Ching-Han Chen, Chia Te Chu, Jia-Hong Dai, Chih-Yung Chen:

Multiple Facial Features Representation for Real-Time Face Recognition. 1601-1610

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














