default search action
Journal of Information Science and Engineering, Volume 31
Volume 31, Number 1, January 2015
- Bin-Tzong Chie, Shu-Heng Chen:
The Use of Knowledge in Prediction Markets: How Much of Them Need He Know? 1-22 - Jain-Shing Wu, Chih-Ta Lin, Yuh-Jye Lee, Song-Kong Chong:
Keystroke and Mouse Movement Profiling for Data Loss Prevention. 23-42
Papers
- Tao Guan, Dongxiang Zhou, Keju Peng, Yunhui Liu:
A Novel Contour Closure Method using Ending Point Restrained Gradient Vector Flow Field. 43-58 - Meghdad Mirabi, Hamidah Ibrahim, Leila Fathi, Nur Izura Udzir, Ali Mamat:
A Dynamic Compressed Accessibility Map for Secure XML Querying and Updating. 59-93 - Lieu-Hen Chen, Yu-Sheng Chen, Wei-Fan Chen, Hao-Ming Hung, Yasufumi Takama:
A Temporal and Multi-Resolution Visualization System for Large-Scale Data. 95-109 - Chi-Wei Wang, Shiuhpyng Winston Shieh:
DROIT: Dynamic Alternation of Dual-Level Tainting for Malware Analysis. 111-129 - Wen-Chao Chen, Zen Chen, Ping-Yi Sung:
Stochastic Optimization Based 3D Dense Reconstruction from Multiple Views with High Accuracy and Completeness. 131-146 - Mingqi Lv, Yinglong Li, Zhenming Yuan, Qihui Wang:
Route Pattern Mining From Personal Trajectory. 147-164 - Kwangjin Park:
An Efficient Scalable Spatial Data Search for Location-Aware Mobile Services. 165-178 - Dexi Liu:
Novel Semantics of the Top-k Queries on Uncertainly Fused Multi-Sensory Data. 179-205 - Saeed Reza Aghabozorgi, Ying Wah Teh:
Approximate Clustering of Time-Series Datasets using k-Modes Partitioning. 207-228 - Shih-Hsuan Yang, Chia-Ling Chu, Chi-Wen Chang:
Depth-Enhanced Error Concealment for H.264 Video. 229-246 - Sadikin Rifki, Youngho Park, Sangjae Moon:
A Fully Secure Ciphertext-Policy Attribute-Based Encryption With a Tree-Based Access Structure. 247-265 - Hongwei Hu, Bo Ma, Yuwei Wu, Weizhang Ma, Kai Xie:
Kernel Regression Based Online Boosting Tracking. 267-282 - Yinghong Xie, Chengdong Wu:
Visual Object Tracking using Particle Filtering with Dual Manifold Models. 283-296 - Yu-Chi Chen, Raylin Tso, Gwoboa Horng, Chun-I Fan, Ruei-Hau Hsu:
Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of two Schemes. 297-314
- Mohammad Zanjani, Ahmad Baraani-Dastjerdi, Ehsan Asgarian, Alireza Shahriyari, Amir Akhavan Kharazian:
A New Experience in Persian Text Clustering using FarsNet Ontology. 315-330 - Ya-Lin Lee, Wen-Hsiang Tsai:
Reversible Data Hiding by Image Encryptions and Spatial Correlation Comparisons. 331-342 - Iksu Kim, Yongyun Cho:
Hash-Based Password Authentication Protocol Against Phishing and Pharming Attacks. 343-355
Volume 31, Number 2, March 2015
Papers
- Hamid Reza Arkian, Reza Ebrahimi Atani, Atefe Pourkhalili, Saman Kamali:
A Stable Clustering Scheme Based on Adaptive Multiple Metric in Vehicular Ad-hoc Networks. 361-386 - Vikas Chaudhary, R. S. Bhatia, Anil K. Ahlawat:
A Constant Learning Rate Self-Organizing Map (CLRSOM) Learning Algorithm. 387-397 - Hoang-Anh Pham, Jong Myung Rhee:
RSAFE: A Robust Software-based Fault-Tolerant Scheme for Large-scale Ethernet Networks. 399-413 - Jeong Woo Son, Hee-Geun Yoon, Seong-Bae Park:
A Ontology Kernel - A Convolution Kernel for Ontology Alignment. 415-432 - Ya-Hui Chang, Wei-Hsi Lee:
Improving the Time and Space Performance for Processing Keyword Queries on XML Databases. 433-473 - Chi-Wei Wang, Chong Kuan Chen, Chia-Wei Wang, Shiuhpyng Winston Shieh:
MrKIP: Rootkit Recognition with Kernel Function Invocation Pattern. 455-473 - Kai-Lung Hua, Adhatus Solichah Ahmadiyah, Yeni Anistyasari:
A Novel Image Compression Algorithm Based on Multitree Dictionary and Perceptual-based Rate-Distortion Optimization. 475-489 - Jenq-Haur Wang, Meng-Han Shih:
Constructing Query Context Knowledge Bases for Relevant Term Suggestion. 491-508 - Wenbin Qian, Wenhao Shu, Yonghong Xie, Bingru Yang, Jun Yang:
Feature Selection using Compact Discernibility Matrix-based Approach in Dynamic Incomplete Decision System. 509-527 - Toktam Ramezanifarkhani, Mohammadreza Razzazi:
Principles of Data Flow Integrity: Specification and Enforcement. 529-546 - Lingfang Zeng, Chao Jin, Bharadwaj Veeravalli, Dan Feng:
HR6TAP: A Hybrid RAID6 Storage Architecture Tracking Data to Any Point-in-time for Enterprise Applications. 547-572 - Zhong-Yong Chen, Chien Chin Chen:
Identifying the Stances of Topic Persons Using a Model-based Expectation-Maximization Method. 573-595 - Yinglei Song, Albert Y. Chi:
A New Approach for Parameter Estimation in the Sequence-structure Alignment of Non-coding RNAs. 593-607 - Hung-Yan Gu, Sung-Fung Tsai:
A Voice Conversion Method Combining Segmental GMM Mapping with Target Frame Selection. 609-626 - Yitian Xu:
A novel twin support vector regression. 627-640 - Tsung-Ju Lee, Shian-Shyong Tseng, Chung-Chun Kung:
Factors Influencing the Performance of Human Computation: An Empirical Study in Web Application Testing. 641-658 - Yi-Chun Chen, Guanling Lee:
Mining Non-Redundant Substitution Rules between Sets of Items in Large Databases. 659-674 - Chia-Nan Ko, You-Min Jau, Jin-Tsong Jeng:
Parameter Estimation of Chaotic Dynamical Systems Using HEQPSO. 675-689 - Zhiliang Liu, Ming Jian Zuo, Xiaomin Zhao, Hongbing Xu:
An Analytical Approach to Fast Parameter Selection of Gaussian RBF Kernel for Support Vector Machine. 691-710 - S. Sathya Priya, Krishnan Murugan:
Improving TCP Performance in Wireless Networks by Detection and Avoidance of Spurious Retransmission Timeouts. 711-726 - Kuo-Yang Wu, Kuo-Yu Tsai, Tzong-Chen Wu, Kouichi Sakurai:
Provably Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks. 727-742
- Xiumei Li, Guoan Bi:
Parametric Methods Comparisons for Parameter Estimation of Polynomial Phase Signals. 743-757
Volume 31, Number 3, May 2015
Papers
- Peiguang Lin, Lei Chen, Mingxuan Yuan, Peiyao Nie:
Discover the Misinformation Broadcasting in On-Line Social Networks. 763-785 - Xiangui Wu, Anna Wang:
Harmonic Signal Processing Method Based on the Windowing Interpolated DFT Algorithm. 787-798 - Lee-Min Lee:
Duration High-Order Hidden Markov Models and Training Algorithms for Speech Recognition. 799-820 - Wei-Ho Tsai, Cin-Hao Ma, Yi-Po Hsu:
Automatic Singing Performance Evaluation Using Accompanied Vocals as Reference Bases. 821-838 - Arjumand Younus, Kyu-Young Whang, Hyuk-Yoon Kwon, Yeon-Mi Yeo:
A Full-Coverage Two-Level URL Duplication Checking Method for a High-Speed Parallel Web Crawler. 839-860 - Liangliang Duan, Lingfu Kong:
Salient Region Detection with Hierarchical Image Abstraction. 861-878 - Guaning Chen, Yan-Ling Chu, Min-Te Sun:
Neighbor-based Hop Size Estimation for Dense Sensor Networks. 879-896 - Chin-Yun Hsieh, Chien-Tsun Chen:
Patterns for Continuous Integration Builds in Cross-Platform Agile Software Development. 897-924 - Hyi-Cheng Tsai, Chin-Laung Lei, Jan-Ming Ho, Ming-Yang Kao, Szu-Lang Liao:
Outstanding Principal as Prepayment Value: A Closed-Form Formula for Mortgage Pricing. 925-942 - Tsung-Teng Chen, Chun-Ying Huang, Chen-Chi Wu, Kuan-Ta Chen:
Physical Presence Verification: A Test to Detect Whether A Computer Is Remotely Controlled. 943-963 - Chih-Ta Lin, Nai-Jian Wang, Han Xiao, Claudia Eckert:
Feature Selection and Extraction for Malware Classification. 965-992 - Esma Elghoul, Anne Verroust-Blondet, Mohamed Chaouch:
A Segmentation Transfer Approach for Rigid Models. 993-1009 - Pei-Yin Chen, Yeu-Horng Shiau, Hung-Yu Yang, Wan-Yu Jhuang:
A Weighted Edge-Preserving Smooth Filter for High Dynamic Range Image Display. 1011-1026 - Cheng-Hsiung Chiang, Liang-Hsuan Chen:
A Self-Adaptive Intelligent Control System with Hierarchical Architecture. 1027-1049 - Der-Hong Ting, Nien-Lin Hsueh, Chao-Tung Yang, Chih-Hung Chang:
A Cloud Service Implementation for Evaluating Design Pattern in Software Evolution. 1051-1070 - Yi-Jeng Wu, Der-Lor Way, Yu-Ting Tsai, Zen-Chung Shih:
Clip Space Sample Culling for Motion Blur and Defocus Blur. 1071-1084 - Yiyuan Luo, Xuejia Lai, Jing Hu:
The Pseudorandomness of Many-Round Lai-Massey Scheme. 1085-1096 - Fu-Hau Hsu, Chi-Hsien Hsu, Chuan-Sheng Wang, Pei-Hsun Lee, Ruei-Min Jiang, Jia-Sian Jhang:
Bypass Cell-phone-verification Through a Smartphone-based Botnet. 1097-1111 - Rize Jin, Hyung-Ju Cho, Tae-Sun Chung:
LS-LRU: A Lazy-Split LRU Buffer Replacement Policy for Flash-Based B+-tree Index. 1113-1132 - Fanghuai Hu, Zhiqing Shao, Tong Ruan:
Self-Supervised Synonym Extraction from the Web. 1133-1148 - Nasir Ahmed, Abdul Jalil, Asifullah Khan:
Clustering Using Local and Global Exponential Discriminant Regularization. 1149-1164
Volume 31, Number 4, July 2015
- Yuhui Deng, Zhen Zhang, Zhike Chen, Lijuan Lu:
Self-destructing Instant Messages by Employing KAD DHT Network. 1169-1184 - Shanqiing Zhang, Jianjun Li, Zhihui Wang, Kunlong Zhang, Mingyue Li:
Texture Segmentation Model Driven by the Simplified Cauchy-Schwarz Divergence. 1185-1197 - Zhi-Wei Wang, Aidong Xia:
ID-based Proxy Re-signature with Aggregate Property. 1199-1211
- Yan Xing, Fanrong Meng, Yong Zhou, Ranran Zhou:
Overlapping Community Detection by Local Community Expansion. 1213-1232 - Yong-Ju Lee:
Semantic-Based Web API Composition for Data Mashups. 1233-1248 - Yao-Hung Wu, Chin-Wei Fan, Wei-Mei Chen:
An Efficient Geometric Localization Approach for Distributed Sensor Networks. 1249-1248 - Asmaa M. el-Said, Ali I. Eldesoky, Hesham A. Arafat:
An Efficient Approach to Construct Object Model of Static Textual Structure with Dynamic Behavior Based on Q-learning. 1267-1289 - Jinghao Sun, Yakun Meng:
An Approximation Scheme for Heterogeneous Parallel Task Scheduling in a Two-Stage Hybrid Flow Shop. 1291-1308 - Yong Duan, Mingtao Pei, Yucheng Wang, Min Yang, Iameng Qin, Yunde Jia:
A Unified Probabilistic Framework for Real-Time Depth Map Fusion. 1309-1327 - Minghua Tang, Xiaola Lin:
A Novel NoC Routing Design Methodology Based on Divide-Conquer Approach. 1329-1346 - Chang-Hsiung Tsai, Chia-Jui Lai:
A Linear Algorithm for Embedding of Cycles in Crossed Cubes with Edge-Pncyclic. 1347-1355 - Li-Der Chou, Tzu-Chien Liu, David Chunhu Li, Chen-Ming Lin, Yi-Chun Lin:
Development of a Lilliput Multimedia System to Enhance Students' Learning Motivation. 1357-1372 - Pushpinder Singh:
A Novel Method for Ranking Generalized Fuzzy Numbers. 1373-1385 - Lidong Wang, Yin Zhang, Xiaodong Xu:
A Novel Group Detection Method for Finding Related Chinese Herbs. 1387-1411 - Chi-Wei Wang, Shiuhpyng Winston Shieh:
SWIFT: Decoupled System-Wide Information Flow Tracking and its Optimizations. 1413-1429 - I-Wei Wu, Jean Jyh-Jiun Shann, Chung-Ping Chung:
Reconfigurable Custom Functional Unit Generation and Exploitation for Multiple-Issue Processors. 1431-1453 - Hongsuk Kim, Min Young Chung, Tae-Jin Lee, Mihui Kim, Hyunseung Choo:
Scheduling Based on Maximum PF Selection with Contiguity Constraint for SC-FDMA in LTE Uplink. 1455-1473 - Ali Shanon Alsaidi, Tat Chee Wan, Alhamza Munther:
Application of Harmony Search Optimization Algorithm to Improve Connectivity in Wireless Sensor Network with Non-uniform Density. 1475-1489
Volume 31, Number 5, September 2015
Papers
- Zi-Shiung Tsai, Pau-Choo Chung, Kuan-Wei Chi:
Weight-Flooding Aggregation with Canny Edge Constraint for 3D Depth Estimation. 1495-1519 - Pei-Jun Lee, Hsu-Hsien Huang, Chun-Yuan Cheng:
Fast Motion Estimation Based on Perceptual-Aware for the Depth Map Coding in 3DVC. 1521-1536 - Pin-Chen Kuo, An-Jie Lin, Bin-Da Liu, Jar-Ferr Yang:
An Advanced Video and Depth Depacking Architecture for 3D Applications. 1537-1555 - Shih-Hsuan Yang, Bossun Wang:
Improved Adaptive-Support Stereo Matching Using Local Features. 1557-1575 - Hung-Ming Wang, His-Chun Tseng, Ke-Ying Liao:
Comfortable Disparity Modification for Existing DIBR Systems. 1577-1592 - Rui Song, Hyunsuk Ko, C.-C. Jay Kuo:
MCL-3D: A Database for Stereoscopic Image Quality Assessment using 2D-Image-Plus-Depth Source. 1593-1611 - Hwashin Moon, Sungwon Yi, Gyu Sang Choi, Yong-Sung Jeon, Joengnyeo Kim:
A Multi-resolution Port Scan Detection Technique for High-speed Networks. 1613-1632 - Tiefei Zhang, Jianguo Xing, Jixiang Zhu, Tianzhou Chen:
Exploiting Page Write Pattern for Power Management of Hybrid DRAM/PRAM Memory System. 1633-1646 - Jia-Lien Hsu, Tzu-Han Hsiao:
Finding Sequence Clusters: A Shared Near Neighbors Approach. 1647-1667 - Hyun-Min An, Su-Kang Lee, Jae-Hyun Ham, Myung-Sup Kim:
Traffic Identification Based on Applications using Statistical Signature Free from Abnormal TCP Behavior. 1669-1692 - Chih-Hung Lu, Han-Hsuan Lin, Chih-Wei Tang:
Fast Mode Decision for Depth Video Coding Using H.264/MVC. 1693-1710 - Xiaochao Zhao, Yaping Lin, Bo Ou, Junfeng Yang:
A Wavelet-Based Image Preprocessing Method or Illumination Insensitive Face Recognition. 1711-1731 - Xudong Lin, Xiaoning Zeng, Xiaowei Pu, Yanyan Sun:
A Cardinality Estimation Approach Based on Two Level Histograms. 1733-1756 - Djaafar Zouache, Abdelouahab Moussaoui:
Quantum-Inspired Differential Evolution with Particle Swarm Optimization for Knapsack Problem. 1757-1773 - Jia-Chun Lin, Fang-Yie Leu, Ying-Ping Chen:
PAReS: A Proactive and Adaptive Redundant System for MapReduce. 1775-1793 - Wei-Kai Cheng, Po-Han Wu, Yi-Hsuan Chiu:
A Skew-Window based Methodology for Timing Fixing in Multiple Power Modes. 1795-1812
- Qing Wu:
A New Class of e-Piecewise Smooth SupportVector Regressions. 1813-1828
Volume 31, Number 6, November 2015
Papers
- Chun-Sheng Wang:
Mining Non-Redundant Inter-Transaction Rules. 1521-1536 - Yanhong Li, Guohui Li, LihChyun Shu, Qun Huang, Hong Jiang:
Continuous Monitoring of Top- k Spatial Keyword Queries in Road Networks. 1831-1848 - Yindong Yang, Lin Zhu:
Refine Item-Based Collaborative Filtering Algorithms with Skew Amplification. 1867-1884 - Chih-Chyau Yang, Chien-Ming Wu, Chun-Ming Huang:
A Cost-Effective 3D SoC Silicon Prototyping Platform. 1885-1901 - David Chunhu Li, Li-Der Chou, Li-Ming Tseng, Yi-Ming Chen:
Energy Efficient Min Delay-based Geocast Routing Protocol for the Internet of Vehicles. 1903-1918 - W. G. C. W. Kumara, Timothy K. Shih, Shih-Ming Chang:
An Automatic Stranger Removal Photography System Using Panoramic Inpainting. 1919-1935 - Yizhuo Wang, Rosario Cammarota, Alexandru Nicolau:
Fault Tolerant Scheduling for Parallel Loops on Shared Memory Systems. 1937-1959 - Yihui Zhou, Xuening Liao, Zhenqiang Wu:
Effectiveness Analysis of ALNCode Scheme for Anonymous Communication with Network Coding. 1961-1974 - Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan:
A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture. 1975-1992 - Yenchi Wang, Ying-Nong Chen, Hsienyu Huang, Kuo-Chin Fan:
Local Block-Difference Pattern for Use in Gait-Based Gender Classification. 1993-2008 - Tongguang Ni, Xiaoqing Gu, Shitong Wang, Pengjiang Qian, Raymond F. Muzic Jr.:
Locality Preserving Semi-Supervised Support Vector Machine. 2009-2024 - Chin-Yun Hsieh, Chen-Hsin Tsai, Yu Chin Cheng:
Towards Automatic Generation and Continuous Improvement of Functional Test Cases: The Case of the Test-Duo Framework and Mutation Testing. 2025-2053 - Soojin Kim, Kyeongsoon Cho:
Design of High-Performance HOG Feature Calculation Circuit for Real-Time Pedestrian Detection. 2055-2073 - Yu-Cheng Chiu, Yu-Shuen Wang:
Content Aware Texture Compression. 2075-2088 - Jinan Xu, Jiangming Liu, Yujie Zhang:
Word Similarity Computing Based on Hybrid Hierarchical Structure by HowNet. 2089-2101 - Wuu Yang:
A Brouwerian Model of the Run-Time Memory. 2103-2124
- Xiumei Li, Guoqing Yang:
RfLPP-Hough Transform for Chirp Signal Detection. 2125-2135
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.