


default search action
Journal of Information Science and Engineering, Volume 28
Volume 28, Number 1, January 2012
- Cheng-Hsuan Li, Hsin-Hua Ho, Yu-Lung Liu, Chin-Teng Lin, Bor-Chen Kuo, Jin-Shiuh Taur:

An Automatic Method for Selecting the Parameter of the Normalized Kernel Function to Support Vector Machines. 1-15 - Yih-Lon Lin, Wen-Lin Chen:

Fast Search Strategies for Fractal Image Compression. 17-30 - Xue Gao, Lianwen Jin:

A Vision-Based Fast Chinese Postal Envelope Identification System. 31-49 - Yao Lu, Xiaojun Quan, Jingsheng Lei, Xingliang Ni, Wenyin Liu, Yinlong Xu:

Semantic Link Analysis for Finding Answer Experts. 51-65 - Peng Ding, Minghai Xu, Dongliang Sun:

Estimation of Unknown Inlet Temperature Profile Using an Improved Gbest-PSO. 67-82 - Meng-Lun Wu, Chia-Hui Chang, Rui-Zhe Liu, Teng-Kai Fan:

Aggregate Two-Way Co-Clustering of Ads and User Data for Online Advertisements. 83-97 - Yi-Chang Shan, I-Chen Wu, Hung-Hsuan Lin, Kuo-Yuan Kao:

Solving Nine Layer Triangular Nim in Mobile Ad Hoc Networks. 99-113 - Rei-Heng Cheng, Chiming Huang:

Efficient Prediction-Based Location Updating and Destination Searching Mechanisms for Geographic Routing. 115-129 - Kuen-Han Lin, Chun-Hua Chang, Andreas Dopfer, Chieh-Chih Wang:

Mapping and Localization in 3D Environments Using a 2D Laser Scanner and a Stereo Camera. 131-144 - Sai-Keung Wong, Shih-Wei Fang:

A Study on Genetic Algorithm and Neural Network for Mini-Games. 145-159 - Wei-Guang Teng, Wei-Hsun Wen, Yue-Cen Liu:

From Experience to Expertise: Digesting Cumulative Information for Informational Web Search. 161-176 - Show-Jane Yen, Chiu-Kuang Wang, Liang-Yuh Ouyang:

A Search Space Reduced Algorithm for Mining Frequent Patterns. 177-191 - Guo-Cheng Lan, Tzung-Pei Hong, Vincent S. Tseng:

A Projection-Based Approach for Discovering High Average-Utility Itemsets. 193-209
Volume 28, Number 2, March 2012
- Ya-Hui Chang, Cheng-Yi Wu, Cheng-Cheng Lo:

Processing XML Queries with Structural and Full-Text Constraints. 221-242 - Hsing-Kuo Pao, Ching-Hao Mao, Hahn-Ming Lee, Chi-Dong Chen, Christos Faloutsos:

An Intrinsic Graphical Signature Based on Alert Correlation Analysis for Intrusion Detection. 243-262 - Yangjun Chen, Yibin Chen:

Subtree Reconstruction, Query Node Intervals and Tree Pattern Query Evaluation. 263-293 - Naseer Sabri, Syed Alwee Aljunid, R. Badlishah Ahmad, M. F. Malek, Abid Yahya, R. Kamaruddin, M. S. Salim:

Smart Prolong Fuzzy Wireless Sensor-Actor Network for Agricultural Application. 295-316 - Kun Wang, Meng Wu:

Nash Equilibrium of Node Cooperation Based on Metamodel for MANETs. 317-333 - Po-Ruey Lei, Wen-Chih Peng, Ing-Jiunn Su, Chien-Ping Chang:

Dummy-Based Schemes for Protecting Movement Trajectories. 335-350 - Shyue-Kung Lu, Ya-Chen Huang:

Improving Reusability of Test Symbols for Test Data Compression. 351-364 - Hyeon Gyu Kim, Myoung-Ho Kim:

A Hybrid Method for Fast Predicate Matching in Data Stream Processing. 365-377 - Rui Chen, Zhengkun Mi, Liangbao Jiao:

Parameter-Aware Cross-Layer Scheme for Wireless Video. 379-391 - Zong Min Ma, Xing Wang:

Rule Interchange in the Semantic Web. 393-406 - Renbo Xia, Ji-Bin Zhao, Weijun Liu, Jianhuang Wu, Sheng-Peng Fu, Jun Jiang, Jia-Zhi Li:

A Robust Recognition Algorithm for Encoded Targets in Close-range Photogrammetry. 407-418 - Qiang Dong, Xiaofan Yang:

Fault-Tolerant Cycle Embedding in Restricted Hypercube-like Networks with More Faulty Nodes. 419-426
Volume 28, Number 3, May 2012
- Jianxiao Liu, Keqing He, Da Ning:

Web Service Aggregation Using Semantic Interoperability Oriented Method. 437-452 - Dong Yan, Yulong Wang, Sen Su, Fangchun Yang:

A Precise and Practical IP Traceback Technique Based on Packet Marking and Logging. 453-470 - Hsinyi Tseng, Tzonelih Hwang, Ching-Ying Lin:

On the "Deterministic Secure Quantum Communication using Four-Particle Entangled State and Entanglement Swapping". 471-478 - Jehn-Ruey Jiang, Yung-Liang Lai:

Wireless Broadcasting with Optimized Transmission Efficiency. 479-502 - Mu-Song Chen, Hao-Wei Yen:

An Online RBF Network Approach for Adaptive Message Scheduling on Controller Area Networks. 503-519 - Lieu-Hen Chen, Yi-Hsien Chen, Shuo-Yan Lin, Ting-Yu Liu, Wen-Chieh Hsieh:

Synthesizing Non Photo-Realistic Rendering Effects of Volumetric Strokes. 521-535 - Shiao-Li Tsao, Sung-Yuan Lee:

Performance Evaluation of Inter-Processor Communication for an Embedded Heterogeneous Multi-Core Processor. 537-554 - Ling-Ling Xu, Fang-Guo Zhang:

Oblivious Transfer with Threshold Access Control. 555-570 - Jia Yu, Fanyu Kong, Huawei Zhao, Xiangguo Cheng, Rong Hao, Xiang-Fa Guo:

Non-Interactive Forward-Secure Threshold Signature without Random Oracles. 571-586
- Jin-Seo Park, Se-Jong Oh:

A New Concave Hull Algorithm and Concaveness Measure for n-dimensional Datasets. 587-600 - Gu-Li Lin, Hong Peng, Qian-Li Ma, Jia Wei, Jiang-Wei Qin:

A Keyword Based Prototype for Web Search Result Diversification. 601-615 - Wei-long Chen, Xiaohai He, Haiying Song, Wei Wu:

An Improved Sequence-to-sequence Alignment Method Combined with Feature-based Image Registration Algorithm. 617-630
Volume 28, Number 4, July 2012
- Qing Zhang, Jianjun Lin:

Exemplar-Based Image Inpainting Using Color Distribution Analysis. 641-654 - Jyh-Huei Chang, Rong-Hong Jan:

Message Ferry Routing Algorithm for Data Collection in Partitioned and Buffer-Limited Wireless Sensor Networks. 655-669 - Saeed Reza Aghabozorgi, Mahmoud Reza Saybani, Ying Wah Teh:

Incremental Clustering of Time-Series by Fuzzy Clustering. 671-688 - Ying-Chie Chen, Yuh-Dauh Lyuu, Kuo-Wei Wen:

The Complexity of GARCH Option Pricing Models. 689-704 - Tan-Chi Ho, Jung-Hong Chuang:

Volume Based Mesh Segmentation. 705-722 - Kun-Chan Lan, Tsung-hsung Wu:

A Trace-based Feasibility Study of Infrastructure-less VoIP. 723-737
- Han-Yu Lin, Tzong-Sun Wu, Shih-Kun Huang:

Certificate-Based Secure Three-Party Signcryption Scheme with Low Costs. 739-753 - Jiunn-Lin Wu, Yi-Ying Chou:

An Effective Content-Aware Image Inpainting Method. 755-770 - Han-Yu Lin, Tzong-Sun Wu, Shih-Kun Huang:

An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce. 771-785
- Hsiang-An Wang, Yen-Chun Lin, Hua-Ting Lu, Shang-Te Lin:

Open Source for Web-Based Video Editing. 787-801
Volume 28, Number 5, September 2012
- Zhengwei Qi, Bingyu Li, Qian Lin, Miao Yu, Mingyuan Xia, Haibing Guan:

SPAD: Software Protection Through Anti-Debugging Using Hardware-Assisted Virtualization. 813-827 - Junghyun Nam, Minkyu Park, Sangchul Han, Juryon Paik, Dongho Won:

Scalable Group Key Exchange for Securing Distributed Operating Systems. 829-857 - Bongjae Kim, Yookun Cho, Jiman Hong:

An Efficient Function Inlining Scheme for Resource-Constrained Embedded Systems. 859-874 - Mei-Ling Chiang, Hsiang-Yu Hsu:

A Platform for Supporting Dynamic Update and Resource Protection in an Embedded Operating System. 875-893 - Kyunghee Cho, Seonggun Kim, Hwansoo Han:

Enhancing Visual Rendering on Multicore Accelerators with Explicitly Managed Memories. 895-909 - HongGeun Kim, Dongjin Kim, Seong-je Cho, Moonju Park, Minkyu Park:

Efficient Detection of Malicious Web Pages Using High-Interaction Client Honeypots. 911-924 - Sohyun Park, Jongmoo Choi, Haeyoung Yoo:

Integrated Model of Service-Oriented Architecture and Web-Oriented Architecture for Financial Software. 925-939 - Chin-Hsien Wu, Hau-Shan Wu:

A Data De-duplication Access Framework for Solid State Drives. 941-954 - Junghoon Lee, Hye-Jin Kim, Gyung-Leen Park, Mikyung Kang:

Energy Consumption Scheduler for Demand Response Systems in the Smart Grid. 955-969
- Shih-Hsu Huang, Wen-Pin Tu, Bing-Hung Li:

High-Level Synthesis for Minimum-Area Low-Power Clock Gating. 971-988
Volume 28, Number 6, November 2012
- Youngjae Lee, Jin-Soo Kim, Seungryoul Maeng:

ReSSD: A Software Layer for Improving the Small Random Write Performance of SSDs. 999-1018 - Chenglong Xu, Jeong Sik Mun, Sung-Ryul Kim:

An Efficient DRM Standard Protocol Implementation for Media Cards. 1019-1027 - Jinman Jung, Bongjae Kim, Jiman Hong:

Unified Simulation Framework for Protocol Stacks in Sensor Operating Systems. 1029-1043 - Jaesoo Lee, Jonghun Yoo, Yongseok Park, Seongsoo Hong:

Per-Client Network Performance Isolation in VDE-Based Cloud Computing Servers. 1045-1058 - Joonhyouk Jang, Jinman Jung, Yookun Cho, Sanghoon Choi, Sung Y. Shin:

Design of a Lightweight TCP/IP Protocol Stack with an Event-Driven Scheduler. 1059-1071 - Jian-Jia Chen, Kai Huang, Lothar Thiele:

Dynamic Frequency Scaling Schemes for Heterogeneous Clusters under Quality of Service Requirements. 1073-1090 - Chin-Hsien Wu:

A Bad-Block Test Design for Multiple Flash-Memory Chips. 1091-1104 - Hai Thanh Mai, Myoung-Ho Kim:

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks. 1105-1128 - Wan-Yu Lee, Iris Hui-Ru Jiang, Tsung-Wan Mei:

Generic Integer Linear Programming Formulation for 3D IC Partitioning. 1129-1144 - Haifeng Li, Minyan Lu, Min Zeng, Bai-Qiao Huang:

A Non-Parametric Software Reliability Modeling Approach by Using Gene Expression Programming. 1145-1160

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














