default search action
The Journal of Information Processing Systems, Volume 6
Volume 6, Number 1, March 2010
- Yuan-Kai Chen, Chang-Ping Hsu, Chung-Hua Hu, Rong-Syh Lin, Yi-Bing Lin, Jian-Zhi Lyu, Wudy Wu, Hey-Chyi Young, Yao Shen:
TOSS: Telecom Operations Support Systems for Broadband Services. 1-20 - Yogesh Singh, Arvinder Kaur, Bharti Suri:
A Hybrid Approach for Regression Testing in Interprocedural Program. 21-32 - Eun-Ha Song, Young-Sik Jeong:
GML Map Visualization on Mobile Devices. 33-42 - Shirisha Tallapally, R. Padmavathy:
Cryptanalysis on a Three Party Key Exchange Protocol-STPKE'. 43-52 - Sungun Kim, Hyunsoo Cheon, Sangbo Seo, Seungmi Song, Seonyeong Park:
A Hexagon Tessellation Approach for the Transmission Energy Efficiency in Underwater Wireless Sensor Networks. 53-66 - Feng Yu, Damalie Oyana, Wen-Chi Hou, Michael S. Wainer:
Approximate Clustering on Data Streams Using Discrete Cosine Transform. 67-78 - Younghee Kim, Wonyoung Kim, Ungmo Kim:
Mining Frequent Itemsets with Normalized Weight in Continuous Data Streams. 79-90 - Abdulaziz Alkussayer, William H. Allen:
The ISDF Framework: Towards Secure Software Development. 91-106 - Cheol-Soon Park, Jae-Cheol Ryou, Yong-Tae Park:
The ISDF Framework: Towards Secure Software Development. 107-120 - Abdisalam Issa-Salwe, Munir Ahmed, Khalid S. Aloufi, Muhammad Kabir:
Strategic Information Systems Alignment: Alignment of IS/IT with Business Strategy. 121-128
Volume 6, Number 2, June 2010
- Kai-Di Chang, Chi-Yuan Chen, Jiann-Liang Chen, Han-Chieh Chao:
Challenges to Next Generation Services in IP Multimedia Subsystem. 129-146 - Kezhong Liu, Ji Xiong:
A Fine-grained Localization Scheme Using A Mobile Beacon Node for Wireless Sensor Networks. 147-162 - Anour F. A. Dafa-Alla, Ho-Sun Shon, Khalid E. K. Saeed, Minghao Piao, Unil Yun, Kyung-Joo Cheoi, Keun Ho Ryu:
IMTAR: Incremental Mining of General Temporal Association Rules. 163-176 - Lukman Sharif, Munir Ahmed:
The Wormhole Routing Attack in Wireless Sensor Networks (WSN). 177-184 - Seong-Hee Bae, Jaejoon Kim:
Development of Personal Information Protection Model using a Mobile Agent. 185-196 - Pin Ng, Richard Y. K. Fung, Ray W. M. Kong:
Incremental Model-based Test Suite Reduction with Formal Concept Analysis. 197-208 - Sang Hyun Lee, Sung-Eui Cho, Kyung-Il Moon:
Fast Fuzzy Control of Warranty Claims System. 209-218 - Beatriz Neto, Lúcia Abrunhosa Fernandes, Cláudia M. L. Werner, Jano Moreira de Souza:
Developing Digital Games through Software Reuse. 219-234 - Ruchika Malhotra, Arvinder Kaur, Yogesh Singh:
A Regression Test Selection and Prioritization Technique. 235-252 - Ui-Jin Jang, Hyung-Min Lim, Yong-Tae Shin:
A License Audit Model for Secure DRM Systems in IP-based Environments. 253-260 - Gyeong-Sic Jo, Yong-Guk Kim:
Recognition of Human Facial Expression in a Video Image using the Active Appearance Model. 261-268
Volume 6, Number 3, September 2010
- Mohammad S. Obaidat, Sanjay K. Dhurandher, Deepank Gupta, Nidhi Gupta, Anupriya Asthana:
DEESR: Dynamic Energy Efficient and Secure Routing Protocol for Wireless Sensor Networks in Urban Environments. 269-294 - Mohamed Mostafa A. Azim:
MAP: A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks. 295-306 - Akihiro Satoh, Toshiaki Osada, Toru Abe, Gen Kitagata, Norio Shiratori, Tetsuo Kinoshita:
A Classifiable Sub-Flow Selection Method for Traffic Classification in Mobile IP Networks. 307-322 - Eun-Young Lee:
Plans and Strategies for UBcN Networks and Services. 323-334 - R. Padmavathy, Chakravarthy Bhagvati:
Solving the Discrete Logarithm Problem for Ephemeral Keys in Chang and Chang Password Key Exchange Protocol. 335-346 - Seong-Young Ko, Won-Chul Bang, Sang-Youn Kim:
A Measurement System for 3D Hand-Drawn Gesture with a PHANToMTM Device. 347-358 - Eric Renault, Ahmad Ahmad, Mohamed Abid:
Access Control to Objects and their Description in the Future Network of Information. 359-374 - Yong-Kyun Kim, Yun-Hyun Jo, Jin-Won Yun, Taeck-Keun Oh, Hee-Chang Roh, Sang-Bang Choi, Hyo-Dal Park:
En-Route Trajectory calculation using Flight Plan Information for Effective Air Traffic Management. 375-384 - Manoj Kumar, Anjana Gosain, Yogesh Singh:
Stakeholders Driven Requirements Engineering Approach for Data Warehouse Development. 385-402 - Dong-Ho Kim, Soon-Seok Kim, Yong-Hee Lee:
Speed-Sensitive Handover Scheme over IEEE 802.16 Multi-Relay Networks. 403-412 - Hamid Karimi, Mehdi Kargahi, Nasser Yazdani:
On the Handling of Node Failures: Energy-Efficient Job Allocation Algorithm for Real-time Sensor Networks. 413-434
Volume 6, Number 4, December 2010
- Zhi-Hui Wang, Chin-Chen Chang, Pei-Yu Tsai:
Hiding Secret Data in an Image Using Codeword Imitation. 435-452 - Elena Andreeva, Bart Mennink, Bart Preneel:
Security Properties of Domain Extenders for Cryptographic Hash Functions. 453-480 - Aly Mohamed El-Semary, Mostafa Gadal-Haqq M. Mostafa:
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques. 481-500 - Dae-Suk Yoo, Seung Sik Choi:
Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks. 501-510 - Md. Imdadul Islam, Nasima Begum, Mahbubul Alam, M. Ruhul Amin:
Fingerprint Detection Using Canny Filter and DWT, a New Approach. 511-520 - Juyoung Kang, Hwan-Seung Yong:
Mining Spatio-Temporal Patterns in Trajectory Data. 521-536 - Maneesha Srivasatav, Yogesh Singh, Durg Singh Chauhan:
An Optimized Approach of Fault Distribution for Debugging in Parallel. 537-552 - Sung-Jin Baek, Sun-Mi Park, Su-Hyun Yang, Eun-Ha Song, Young-Sik Jeong:
Efficient Server Virtualization using Grid Service Infrastructure. 553-562 - Ahmed Salem:
Intercepting Filter Approach to Injection Flaws. 563-574 - Hidayat Febiansyah, Jin Baek Kwon:
Generalized Proxy-Assisted Periodic Broadcasting (G-ProB) for Heterogeneous Clients in Video-on- Demand Service. 575-596 - Chetna Gupta, Yogesh Singh, Durg Singh Chauhan:
A Dynamic Approach to Estimate Change Impact using Type of Change Propagation. 597-608 - Hyung-Min Lim, Kun-Won Jang, Byung-Gi Kim:
A Study on Design and Implementation of the Ubiquitous Computing Environment-based Dynamic Smart On/Off-line Learner Tracking System. 609-620
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.