default search action
Journal of Information Science and Engineering, Volume 22
Volume 22, Number 1, January 2006
- Yi-Hsuan Lin, Tung-Mei Ko, Tyng-Ruey Chuang, Kwei-Jay Lin:
Open Source Licenses and the Creative Commons Framework: License Selection and Comparison. 1-17 - Wen-Dar Lin, Yun-Ching Chen, Jan-Ming Ho, Chung-Der Hsiao:
GOBU: Toward an Integration Interface for Biological Objects. 19-29 - Nei-Chiung Perng, Chin-Shuang Liu, Tei-Wei Kuo:
Real-Time Linux with Budget-Based Resource Reservation. 31-47 - Cungang Yang, Chang N. Zhang:
An Approach to XML-Based Administration and Secure Information Flow Analysis on an Object Oriented Role-Based Access Control Model. 49-61 - Wei-Horng Yeh, Ye-In Chang:
An Efficient Signature Extraction Method for Image Similarity Retrieval. 63-94 - Min-Hsuan Fan, Chua-Huang Huang, Yeh-Ching Chung, Jen-Shiuh Liu, Jei-Zhii Lee:
A Programming Methodology for Designing Block Recursive Algorithms. 95-121 - Yin-Fu Huang, Chao-Nan Chen:
Implementation for the Arrangement and Mining Analysis of Travel Schedules. 123-146 - Shih-Chien Chou:
MRBAC/AR: an Information Flow Control Model to Prevent Both Intra- and Inter-Application Information Leakage. 147-161 - Chih-Yang Lin, Yu-Tai Ching:
A Robust Image Hiding Method Using Wavelet Technique. 163-174 - Shyi-Ming Chen, Hao-Lin Lin:
Generating Weighted Fuzzy Rules from Training Instances Using Genetic Algorithms to Handle the Iris Data Classification Problem. 175-188 - Tzu-Chao Lin, Pao-Ta Yu:
Salt-Pepper Impulse Noise Detection and Removal Using Multiple Thresholds for Image Restoration. 189-198 - Ming-Hua Wang, Huan-Chao Keh, Nan-Chen Hsieh, Tsong-Sheng Wang:
A Study of Disjunctive Information in Fuzzy Relational Databases. 199-213 - Jong Wook Kwak, Cheol Hong Kim, Sung-Hoon Shim, Chu Shik Jhon:
Advanced High-Level Cache Management by Processor Access Information. 215-227
Volume 22, Number 2, March 2006
- Junyoung Heo, Sangho Yi, Yookun Cho, Jiman Hong:
Space-Efficient Page-Level Incremental Checkpointing. 237-246 - Misook Choi, Eunsook Cho:
Component Identification Methods Applying Method Call Types between Classes. 247-267 - Hisham M. Haddad, Ying Xie:
Wrapper-Based Framework for Domain-Specific Software Reuse. 269-282 - Songsri Tangsripairoj, Mansur H. Samadzadeh:
Organizing and Visualizing Software Repositories Using the Growing Hierarchical Self-Organizing Map. 283-295 - Sun-Jen Huang, Chieh-Yi Lin, Nan-Hsing Chiu:
Fuzzy Decision Tree Approach for Embedding Risk Assessment Information into Software Cost Estimation Model. 297-313 - YoungJoon Byun, Beverly A. Sanders:
A Pattern-based Development Methodology for Communication Protocols. 315-335 - Pradeep Varma:
Process and Planning Support for Iterative Porting. 337-356 - Ninh-Thuan Truong, Jeanine Souquières:
Verification of UML Model Elements Using B. 357-373 - Jingyue Li, Axel Anders Kvale, Reidar Conradi:
A Case Stud on Improving Changeability of COTS-Based System Using Aspect-Oriented Programming. 375-390 - Jaime Muñoz Masqué, Alberto Peinado:
Cryptanalysis of Improved Liaw's Broadcasting Cryptosystem. 391-399 - Bin Shyan Jong, Wen Hao Yang, Shawn Song:
An Efficient Edge-Based Compression Algorithm for 3D Models with Holes and Handles. 401-423 - Bin Shyan Jong, Tsong Wuu Lin, Yu Lung Wu, Te Yi Chan:
Effective Two-Phase Cooperative Learning on the WWW. 425-446 - SooCheol Lee, Eenjun Hwang, Jung-Geun Han:
Efficient Image Retrieval Based on Minimal Spatial Relationships. 447-459 - I-Shyan Hwang, San-Nan Lee, I-Cheng Chang:
Performance Assessment of Fuzzy Logic Control Routing Algorithm with Different Wavelength Assignments in DWDM Networks. 461-473
Volume 22, Number 3, May 2006
- Yen-Chung Chiu, Wen-Hsiang Tsai:
Copyright Protection against Print-and-Scan Operations by Watermarking for Color Images Using Coding and Synchronization of Peak Locations in Frequency Domain. 483-496 - Varsha Chikane, Chiou-Shann Fuh:
Automatic White Balance for Digital Still Cameras. 497-509 - Li-Wei He, Tsorng-Lin Chia, Chen-Kuei Yang:
A Geometric Invariant Approach to Human Face Verification. 511-534 - Shi-Cheng Liu, Shinfeng D. Lin:
BCH Code-Based Robust Audio Watermarking in the Cepstrum Domain. 535-543 - Hsu-Yung Cheng, Quen-Zong Wu, Kuo-Chin Fan, Bor-Shenn Jeng:
Binarization Method Based on Pixel-level Dynamic Thresholds for Change Detection in Image Sequences. 545-557 - Jong-Phil Yang, Kyung Hyune Rhee:
A New Design for a Practical Secure Cookies System. 559-571 - Been-Chian Chien, Jung-Yi Lin, Wei-Pang Yang:
A Classification Tree Based on Discriminant Functions. 573-594 - Hewijin Christine Jiau, Kuo-Feng Ssu:
Building and Using Object-Oriented Frameworks for CAD Rapid Prototyping. 595-609 - Yongsu Park, Yookun Cho:
Efficient One-time Signature Schemes for Stream Authentication. 611-624 - Hewijin Christine Jiau, Jinghong Cox Chen, Kuo-Feng Ssu, Jim-Min Lin:
TeMeFr: Towards a Reuse-Based Development for Conference-Oriented Telemedicine Systems. 625-640 - Hong-Long Chou, Zen Chen:
Fast Octree Construction Endowed with an Error Bound Controlled Subdivision Scheme. 641-657 - Sun Ok Yang, SungSuk Kim, Chong-Sun Hwang:
Profile-Based Lifetime Determination Schemes for Mobility Management in HMIPv6. 659-674 - Ganapathi Padmavathi, Samukutty Annadurai:
Storage Efficient Key Management Technique for Secure Multicasting. 675-689 - Wei-Chi Ku, Hui-Lung Lee:
Authentication Protocols Using Hoover-Kausik's Software Token. 691-699 - Ching-Tang Hsieh, Yeh-Kuang Wu, Chyi-Jang Lee:
Semi-fragile Image Authentication Using Real Symmetric Matrix. 701-712
Volume 22, Number 4, July 2006
- Chih-wen Hsueh, Hsin-hung Lin, Guo-Chiuan Huang:
Boosting Ethernet using Regular Switching Hubs. 721-734 - Chow-Sing Lin, Chin-Ju Hsieh:
SOTS-CE: A Sonography Ovarian Tumor System with Case Exchange. 735-750 - Hsu-Yang Kung, Jing-Shiuan Hua, Chaur-Tzuhn Chen:
Drought Forecast Model and Framework Using Wireless Sensor Networks. 751-769 - Po-Cheng Huang, Kuan-Rong Lee, Wei-Tsung Su, Yau-Hwang Kuo, Mong-Fong Horng, Chien-Chou Lin, Yu-Chang Chen:
Control Component Development of Information Appliances on Networks. 771-784 - Tyng-Yeu Liang, Shih-Hsien Wang, Ce-Kuen Shieh, Ching-Min Huang, Liang-I Chang:
Design and Implementation of the OpenMP Programming Interface on Linux-based SMP Clusters. 785-798 - Hsien-Wen Cheng, Lan-Rong Dung:
A Power-Aware Motion Estimation Architecture Using Content-based Subsampling. 799-818 - Frank S. C. Tseng, Wen-Ping Lin:
D-Tree: A Multi-Dimensional Indexing Structure for Constructing Document Warehouses. 819-841 - Hung-Kuang Chen, Chin-Shyurng Fahn, Jeffrey J. P. Tsai, Ming-Bo Lin:
A Novel Cache-based Approach to Large Polygonal Mesh Simplification. 843-861 - Fidel Cacheda, Victor Carneiro, Carmen Guerrero, Ángel Viña:
Hybrid Architecture for Web Search Systems Based on Hierarchical Taxonomies. 863-887 - Keun-Hee Han, Il-Gon Kim, Kang-Won Lee, Jin-Young Choi, Sang-Hun Jeon:
Threat Evaluation Method for Distributed Network Environment. 889-907 - Daniel Yuh Chao:
Knitting Technique with TP-PT Generations for Petri Net Synthesis. 909-923 - Shih-Mao Lu, Sheng-Fu Liang, Chin-Teng Lin:
A HVS-Directed Neural-Network-Based Approach for Salt-Pepper Impulse Noise Removal. 925-939 - Ying-Haw Shu, Shing Tenqchen, Ming-Chang Sun, Wu-Shiung Feng:
A Brief Comparison of Two-phase and NOR-based Four-phase Pipelined Asynchronous Systems. 941-952 - Goutam Kumar Saha:
A Software Tool for Fault Tolerance. 953-964 - I-Te Chen, Ming-Hsin Chang, Yi-Shiung Yeh:
Design of Proxy Signature in the Digital Signature Algorithm (DSA). 965-973 - Kuo-Hsing Cheng, Shun-Wen Cheng:
Improved 32-bit Conditional Sum Adder for Low-Power High-Speed Applications. 975-989
Volume 22, Number 5, September 2006
- Yung-Ji Sher, Yeou-Jiunn Chen, Yu-Hsien Chiu, Kao-Chi Chung, Chung-Hsien Wu:
MAP-Based Perceptual Modeling for Noisy Speech Recognition. 999-1013 - Frode Eika Sandnes, Yo-Ping Huang:
Chording with Spatial Mnemonics: Automatic Error Correction for Eyes-Free Text Entry. 1015-1031 - Daw-Tung Lin:
Facial Expression Classification Using PCA and Hierarchical Radial Basis Function Network. 1033-1046 - Chin-Chen Chang, Jiann-Jone Chen, Wen-Kai Tai, Chin-Chuan Han:
New Approach for Static Gesture Recognition. 1047-1057 - Guang-Yi Wang, Mau-Tsuen Yang, Cheng-Chin Chiang, Wen-Kai Tai:
A Talking Face Driven by Voice using Hidden Markov Model. 1059-1075 - Shih-Jung Peng, Jan Karel Ruzicka, Deng-Jyi Chen:
A Generic and Visual Interfacing Framework for Bridging the Interface between Application Systems and Recognizers. 1077-1091 - Chung-Hsien Yang, Jia-Ching Wang, Jhing-Fa Wang, Hsiao Ping Lee, Chung-Hsien Wu, Kai-Hsing Chang:
Multiband Subspace Tracking Speech Enhancement for In-Car Human Computer Speech Interaction. 1093-1107 - Honggang Wang, Ming C. Leu, Cemil Öz:
American Sign Language Recognition Using Multi-dimensional Hidden Markov Models. 1109-1123 - Jia-Ning Luo, Shiuh-Pyng Shieh, Ji-Chiang Shen:
Secure Authentication Protocols Resistant to Guessing Attacks. 1125-1143 - Duan-Yu Chen, Ming-Ho Hsiao, Suh-Yin Lee:
Automatic Closed Caption Detection and Filtering in MPEG Videos for Video Structuring. 1145-1162 - Wan-De Weng, Chin-Tsu Yen, Rui-Chang Lin:
A New ISF-FLANN Channel Equalizer for 4QAM Digital Communication Systems and Its FPGA Verification. 1163-1176 - Ching-Wei Huang, Wuu Yang:
Efficiency and Reliability in Cluster Based Peer-to-Peer Systems. 1177-1203 - Hun-Woo Yoo:
Visual-Based Emotional Descriptor and Feedback Mechanism for Image Retrieval. 1205-1227 - Tai-Yi Huang, Chih-Chieh Chou, Po-Yuan Chen:
Bounding DMA Interference on Hard-Real-Time Embedded Systems. 1229-1247 - Hongya Wang, Guo-Qin Ning, Guohui Li, Kam-yiu Lam:
Mobile Real-Time Read-Only Transaction Processing in Broadcast Disks. 1249-1264 - Chih-Ming Hsiao, Ge-Ming Chiu:
A Fault-Tolerant Protocol for Generating Sequence Numbers for Total Ordering Group Communication in Distributed Systems. 1265-1277 - Hsuan-Hao Chen, Kuochen Wang, Hung-Cheng Shih:
A WAP-based, Push-enabled Mobile Internet Application Platform. 1279-1293 - Chi-Chao Chang, Tzonelih Hwang:
Modular Design for Round-Oriented Password Authentication Protocols. 1295-1308
Volume 22, Number 6, November 2006
- Po-Hsueh Huang, Yin-Te Tsai, Chuan Yi Tang:
A Near-Quadratic Algorithm for the Alpha-Connected Two-Center Problem. 1317-1324 - Ying-Hong Wang, Hung-Zu Lin:
Multipath QoS Routing with Interference Provision in Ad Hoc Wireless Network. 1325-1338 - Tyne Liang, Jian-Shin Chen:
Multi-class Named Entities Extraction from Biomedical Literature. 1339-1353 - Leena Lulu, Ashraf Elnagar:
Efficient and Complete Coverage of 2D Environments by Connectivity Graphs for Motion Planning Algorithms. 1355-1366 - Cheng-Jian Lin:
Wavelet Neural Networks with a Hybrid Learning Approach. 1367-1387 - Chih-Hung Wang:
Practical Constructions to Multiple Designated Confirmer Signatures. 1389-1407 - Ming-I Hsieh, Eric Hsiao-Kuang Wu, Meng-Feng Tsai:
FasterDSP: A Faster Approximation Algorithm for Directed Steiner Tree Problem. 1409-1425 - Yi-Chung Chen, Jang-Ping Sheu:
Interest-Based Lookup Protocols for Mobile Ad Hoc Networks. 1427-1445 - Ill-Young Weon, Doo Heon Song, Chang-Hoon Lee:
Effective Intrusion Detection Model through the Combination of a Signature-based Intrusion Detection System and a Machine Learning-based Intrusion Detection System. 1447-1464 - Sejong Oh, Changwoo Byun, Seog Park:
An Organizational Structure-Based Administration Model for Decentralized Access Control. 1465-1483 - Hoijin Yoon, Byoungju Choi:
The Context Driven Component Supporting the Context Adaptation and the Content Extension. 1485-1504 - Sang-Uk Shin:
An Efficient Sealed-Bid Auction Protocol with Two Servers. 1505-1518 - Pei-Yi Chen, Arbee L. P. Chen:
Similarity-based Motion Track Management for Video Retrieval. 1519-1527 - Yalçin Isik, Necmi Taspinar:
The Multi-User Detection in Code Division Multiple Access with Adpative Neuro-Fuzzy Inference System. 1529-1542 - Jong Wook Kwak, Chu Shik Jhon:
Adaptive Multi-Grain Remote Access Cache in Ring Based NUMA System. 1543-1554 - Adem Kalinli, Seref Sagiroglu:
Elman Network with Embedded Memory for System Identification. 1555-1568 - Said E. El-Khamy, Mohey M. Hadhoud, Moawad I. Dessouky, Bassiouny M. Salam, Fathi E. Abd El-Samie:
Efficient Solutions for Image Interpolation Treated as an Inverse Problem. 1569-1583 - Chia-Chun Tsai, Hann-Cheng Huang, Trong-Yen Lee, Wen-Ta Lee, Jan-Ou Wu:
Using Stack Reconstruction on RTL Orthogonal Scan Chain Design. 1585-1599 - Ching-Han Chen, Chia Te Chu, Jia-Hong Dai, Chih-Yung Chen:
Multiple Facial Features Representation for Real-Time Face Recognition. 1601-1610
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.