Journal: JIPS

Volume 6, Issue 4

435 -- 452Zhi-Hui Wang, Chin-Chen Chang, Pei-Yu Tsai. Hiding Secret Data in an Image Using Codeword Imitation
453 -- 480Elena Andreeva, Bart Mennink, Bart Preneel. Security Properties of Domain Extenders for Cryptographic Hash Functions
481 -- 500Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa. Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
501 -- 510Dae-Suk Yoo, Seung Sik Choi. Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks
511 -- 520Md. Imdadul Islam, Nasima Begum, Mahbubul Alam, M. R. Amin. Fingerprint Detection Using Canny Filter and DWT, a New Approach
521 -- 536Juyoung Kang 0002, Hwan-Seung Yong. Mining Spatio-Temporal Patterns in Trajectory Data
537 -- 552Maneesha Srivasatav, Yogesh Singh, Durg Singh Chauhan. An Optimized Approach of Fault Distribution for Debugging in Parallel
553 -- 562Sung-Jin Baek, Sun-Mi Park, Su-Hyun Yang, Eun-Ha Song, Young-Sik Jeong. Efficient Server Virtualization using Grid Service Infrastructure
563 -- 574Ahmed Salem. Intercepting Filter Approach to Injection Flaws
575 -- 596Hidayat Febiansyah, Jin Baek Kwon. Generalized Proxy-Assisted Periodic Broadcasting (G-ProB) for Heterogeneous Clients in Video-on- Demand Service
597 -- 608Chetna Gupta, Yogesh Singh, Durg Singh Chauhan. A Dynamic Approach to Estimate Change Impact using Type of Change Propagation
609 -- 620Hyung-Min Lim, Kun-Won Jang, Byung-gi Kim. A Study on Design and Implementation of the Ubiquitous Computing Environment-based Dynamic Smart On/Off-line Learner Tracking System

Volume 6, Issue 3

269 -- 294Mohammad S. Obaidat, Sanjay Kumar Dhurandher, Deepank Gupta, Nidhi Gupta, Anupriya Asthana. DEESR: Dynamic Energy Efficient and Secure Routing Protocol for Wireless Sensor Networks in Urban Environments
295 -- 306Mohamed Mostafa A. Azim. MAP: A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks
307 -- 322Akihiro Satoh, Toshiaki Osada, Toru Abe, Gen Kitagata, Norio Shiratori, Tetsuo Kinoshita. A Classifiable Sub-Flow Selection Method for Traffic Classification in Mobile IP Networks
323 -- 334Eun-Young Lee. Plans and Strategies for UBcN Networks and Services
335 -- 346R. Padmavathy, Chakravarthy Bhagvati. Solving the Discrete Logarithm Problem for Ephemeral Keys in Chang and Chang Password Key Exchange Protocol
347 -- 358Seong-Young Ko, Won-Chul Bang, Sang-Youn Kim. A Measurement System for 3D Hand-Drawn Gesture with a PHANToM:::TM::: Device
359 -- 374Eric Renault, Ahmad Ahmad, Mohamed Abid. Access Control to Objects and their Description in the Future Network of Information
375 -- 384Yong-Kyun Kim, Yun-Hyun Jo, Jin-Won Yun, Taeck-Keun Oh, Hee-Chang Roh, Sang-Bang Choi, Hyo-Dal Park. En-Route Trajectory calculation using Flight Plan Information for Effective Air Traffic Management
385 -- 402Manoj Kumar 0002, Anjana Gosain, Yogesh Singh. Stakeholders Driven Requirements Engineering Approach for Data Warehouse Development
403 -- 412Dong-Ho Kim, Soon Seok Kim, Yong-Hee Lee. Speed-Sensitive Handover Scheme over IEEE 802.16 Multi-Relay Networks
413 -- 434Hamid Karimi, Mehdi Kargahi, Nasser Yazdani. On the Handling of Node Failures: Energy-Efficient Job Allocation Algorithm for Real-time Sensor Networks

Volume 6, Issue 2

129 -- 146Kai-Di Chang, Chi-Yuan Chen, Jiann-Liang Chen, Han-Chieh Chao. Challenges to Next Generation Services in IP Multimedia Subsystem
147 -- 162Kezhong Liu, Ji Xiong. A Fine-grained Localization Scheme Using A Mobile Beacon Node for Wireless Sensor Networks
163 -- 176Anour F. A. Dafa-Alla, Ho-Sun Shon, Khalid E. K. Saeed, Minghao Piao, Unil Yun, Kyung Joo Cheoi, Keun Ho Ryu. IMTAR: Incremental Mining of General Temporal Association Rules
177 -- 184Lukman Sharif, Munir Ahmed. The Wormhole Routing Attack in Wireless Sensor Networks (WSN)
185 -- 196Seong-Hee Bae, Jaejoon Kim. Development of Personal Information Protection Model using a Mobile Agent
197 -- 208Pin Ng, Richard Y. K. Fung, Ray W. M. Kong. Incremental Model-based Test Suite Reduction with Formal Concept Analysis
209 -- 218Sang Hyun Lee, Sung-Eui Cho, Kyung-li Moon. Fast Fuzzy Control of Warranty Claims System
219 -- 234Beatriz Neto, Lúcia Abrunhosa Fernandes, Claudia Werner, Jano Moreira de Souza. Developing Digital Games through Software Reuse
235 -- 252Ruchika Malhotra, Arvinder Kaur, Yogesh Singh. A Regression Test Selection and Prioritization Technique
253 -- 260Ui-Jin Jang, Hyung-Min Lim, Yong-Tae Shin. A License Audit Model for Secure DRM Systems in IP-based Environments
261 -- 268Gyeong-Sic Jo, Yong-Guk Kim. Recognition of Human Facial Expression in a Video Image using the Active Appearance Model

Volume 6, Issue 1

1 -- 20Yuan-Kai Chen, Chang-Ping Hsu, Chung-Hua Hu, Rong-Syh Lin, Yi-Bing Lin, Jian-Zhi Lyu, Wudy Wu, Heychyi Young, Yao Shen. TOSS: Telecom Operations Support Systems for Broadband Services
21 -- 32Yogesh Singh, Arvinder Kaur, Bharti Suri. A Hybrid Approach for Regression Testing in Interprocedural Program
33 -- 42Eun-Ha Song, Young-Sik Jeong. GML Map Visualization on Mobile Devices
43 -- 52Shirisha Tallapally, R. Padmavathy. Cryptanalysis on a Three Party Key Exchange Protocol-STPKE
53 -- 66Sungun Kim, Hyunsoo Cheon, Sangbo Seo, Seungmi Song, Seonyeong Park. A Hexagon Tessellation Approach for the Transmission Energy Efficiency in Underwater Wireless Sensor Networks
67 -- 78Feng Yu, Damalie Oyana, Wen-Chi Hou, Michael Wainer. Approximate Clustering on Data Streams Using Discrete Cosine Transform
79 -- 90Younghee Kim, Wonyoung Kim, Ungmo Kim. Mining Frequent Itemsets with Normalized Weight in Continuous Data Streams
91 -- 106Abdulaziz Alkussayer, William H. Allen. The ISDF Framework: Towards Secure Software Development
107 -- 120Cheol-Soon Park, Jae-Cheol Ryou, Yong-Tae Park. The ISDF Framework: Towards Secure Software Development
121 -- 128Abdisalam Issa-Salwe, Munir Ahmed, Khalid Aloufi, Muhammad Kabir. Strategic Information Systems Alignment: Alignment of IS/IT with Business Strategy