Journal: J. Inf. Sci. Eng.

Volume 22, Issue 6

1317 -- 1324Po-Hsueh Huang, Yin-Te Tsai, Chuan Yi Tang. A Near-Quadratic Algorithm for the Alpha-Connected Two-Center Problem
1325 -- 1338Ying-Hong Wang, Hung-Zu Lin. Multipath QoS Routing with Interference Provision in Ad Hoc Wireless Network
1339 -- 1353Tyne Liang, Jian-Shin Chen. Multi-class Named Entities Extraction from Biomedical Literature
1355 -- 1366Leena Lulu, Ashraf Elnagar. Efficient and Complete Coverage of 2D Environments by Connectivity Graphs for Motion Planning Algorithms
1367 -- 1387Cheng-Jian Lin. Wavelet Neural Networks with a Hybrid Learning Approach
1389 -- 1407Chih-Hung Wang. Practical Constructions to Multiple Designated Confirmer Signatures
1409 -- 1425Ming-I Hsieh, Eric Hsiao-Kuang Wu, Meng-Feng Tsai. FasterDSP: A Faster Approximation Algorithm for Directed Steiner Tree Problem
1427 -- 1445Yi-Chung Chen, Jang-Ping Sheu. Interest-Based Lookup Protocols for Mobile Ad Hoc Networks
1447 -- 1464Ill-Young Weon, Doo Heon Song, Chang-Hoon Lee. Effective Intrusion Detection Model through the Combination of a Signature-based Intrusion Detection System and a Machine Learning-based Intrusion Detection System
1465 -- 1483Sejong Oh, Changwoo Byun, Seog Park. An Organizational Structure-Based Administration Model for Decentralized Access Control
1485 -- 1504Hoijin Yoon, Byoungju Choi. The Context Driven Component Supporting the Context Adaptation and the Content Extension
1505 -- 1518Sang Uk Shin. An Efficient Sealed-Bid Auction Protocol with Two Servers
1519 -- 1527Pei-Yi Chen, Arbee L. P. Chen. Similarity-based Motion Track Management for Video Retrieval
1529 -- 1542Yalçin Isik, Necmi Taspinar. The Multi-User Detection in Code Division Multiple Access with Adpative Neuro-Fuzzy Inference System
1543 -- 1554Jong Wook Kwak, Chu Shik Jhon. Adaptive Multi-Grain Remote Access Cache in Ring Based NUMA System
1555 -- 1568Adem Kalinli, Seref Sagiroglu. Elman Network with Embedded Memory for System Identification
1569 -- 1583Said E. El-Khamy, M. M. Hadhoud, Moawad I. Dessouky, B. M. Salam, Fathi E. Abd El-Samie. Efficient Solutions for Image Interpolation Treated as an Inverse Problem
1585 -- 1599Chia-Chun Tsai, Hann-Cheng Huang, Trong-Yen Lee, Wen-Ta Lee, Jan-Ou Wu. Using Stack Reconstruction on RTL Orthogonal Scan Chain Design
1601 -- 1610Ching-Han Chen, Chia Te Chu, Jia-Hong Dai, Chih-Yung Chen. Multiple Facial Features Representation for Real-Time Face Recognition

Volume 22, Issue 5

999 -- 1013Yung-Ji Sher, Yeou-Jiunn Chen, Yu-Hsien Chiu, Kao-Chi Chung, Chung-Hsien Wu. MAP-Based Perceptual Modeling for Noisy Speech Recognition
1015 -- 1031Frode Eika Sandnes, Yo-Ping Huang. Chording with Spatial Mnemonics: Automatic Error Correction for Eyes-Free Text Entry
1033 -- 1046Daw-Tung Lin. Facial Expression Classification Using PCA and Hierarchical Radial Basis Function Network
1047 -- 1057Chin-Chen Chang, Jiann-Jone Chen, Wen-Kai Tai, Chin-Chuan Han. New Approach for Static Gesture Recognition
1059 -- 1075Guang-Yi Wang, Mau-Tsuen Yang, Cheng-Chin Chiang, Wen-Kai Tai. A Talking Face Driven by Voice using Hidden Markov Model
1077 -- 1091Shih-Jung Peng, Jan Karel Ruzicka, Deng-Jyi Chen. A Generic and Visual Interfacing Framework for Bridging the Interface between Application Systems and Recognizers
1093 -- 1107Chung-Hsien Yang, Jia-Ching Wang, Jhing-Fa Wang, Hsiao Ping Lee, Chung-Hsien Wu, Kai-Hsing Chang. Multiband Subspace Tracking Speech Enhancement for In-Car Human Computer Speech Interaction
1109 -- 1123Honggang Wang, Ming C. Leu, Cemil Oz. American Sign Language Recognition Using Multi-dimensional Hidden Markov Models
1125 -- 1143Jia-Ning Luo, Shiuh-Pyng Shieh, Ji-Chiang Shen. Secure Authentication Protocols Resistant to Guessing Attacks
1145 -- 1162Duan-Yu Chen, Ming-Ho Hsiao, Suh-Yin Lee. Automatic Closed Caption Detection and Filtering in MPEG Videos for Video Structuring
1163 -- 1176Wan-De Weng, Chin-Tsu Yen, Rui-Chang Lin. A New ISF-FLANN Channel Equalizer for 4QAM Digital Communication Systems and Its FPGA Verification
1177 -- 1203Ching-Wei Huang, Wuu Yang. Efficiency and Reliability in Cluster Based Peer-to-Peer Systems
1205 -- 1227Hun-Woo Yoo. Visual-Based Emotional Descriptor and Feedback Mechanism for Image Retrieval
1229 -- 1247Tai-Yi Huang, Chih-Chieh Chou, Po-Yuan Chen. Bounding DMA Interference on Hard-Real-Time Embedded Systems
1249 -- 1264Hong-ya Wang, Guo-Qin Ning, Guohui Li, Kam-yiu Lam. Mobile Real-Time Read-Only Transaction Processing in Broadcast Disks
1265 -- 1277Chih-Ming Hsiao, Ge-Ming Chiu. A Fault-Tolerant Protocol for Generating Sequence Numbers for Total Ordering Group Communication in Distributed Systems
1279 -- 1293Hsuan-Hao Chen, Kuochen Wang, Hung-Cheng Shih. A WAP-based, Push-enabled Mobile Internet Application Platform
1295 -- 1308Chi-Chao Chang, Tzonelih Hwang. Modular Design for Round-Oriented Password Authentication Protocols

Volume 22, Issue 4

721 -- 734Chih-wen Hsueh, Hsin-hung Lin, Guo-Chiuan Huang. Boosting Ethernet using Regular Switching Hubs
735 -- 750Chow-Sing Lin, Chin-Ju Hsieh. SOTS-CE: A Sonography Ovarian Tumor System with Case Exchange
751 -- 769Hsu-Yang Kung, Jing-Shiuan Hua, Chaur-Tzuhn Chen. Drought Forecast Model and Framework Using Wireless Sensor Networks
771 -- 784Po-Cheng Huang, Kuan-Rong Lee, Wei-Tsung Su, Yau-Hwang Kuo, Mong-Fong Horng, Chien-Chou Lin, Yu-Chang Chen. Control Component Development of Information Appliances on Networks
785 -- 798Tyng-Yeu Liang, Shih-Hsien Wang, Ce-Kuen Shieh, Ching-Min Huang, Liang-I Chang. Design and Implementation of the OpenMP Programming Interface on Linux-based SMP Clusters
799 -- 818Hsien-Wen Cheng, Lan-Rong Dung. A Power-Aware Motion Estimation Architecture Using Content-based Subsampling
819 -- 841Frank S. C. Tseng, Wen-Ping Lin. D-Tree: A Multi-Dimensional Indexing Structure for Constructing Document Warehouses
843 -- 861Hung-Kuang Chen, Chin-Shyurng Fahn, Jeffrey J. P. Tsai, Ming-Bo Lin. A Novel Cache-based Approach to Large Polygonal Mesh Simplification
863 -- 887Fidel Cacheda, Victor Carneiro, Carmen Guerrero, Ángel Viña. Hybrid Architecture for Web Search Systems Based on Hierarchical Taxonomies
889 -- 907Keun-Hee Han, Il-Gon Kim, Kang-Won Lee, Jin-Young Choi, Sang-Hun Jeon. Threat Evaluation Method for Distributed Network Environment
909 -- 923Daniel Yuh Chao. Knitting Technique with TP-PT Generations for Petri Net Synthesis
925 -- 939Shih-Mao Lu, Sheng-Fu Liang, Chin-Teng Lin. A HVS-Directed Neural-Network-Based Approach for Salt-Pepper Impulse Noise Removal
941 -- 952Ying-Haw Shu, Shing Tenqchen, Ming-Chang Sun, Wu-Shiung Feng. A Brief Comparison of Two-phase and NOR-based Four-phase Pipelined Asynchronous Systems
953 -- 964Goutam Kumar Saha. A Software Tool for Fault Tolerance
965 -- 973I-Te Chen, Ming-Hsin Chang, Yi-Shiung Yeh. Design of Proxy Signature in the Digital Signature Algorithm (DSA)
975 -- 989Kuo-Hsing Cheng, Shun-Wen Cheng. Improved 32-bit Conditional Sum Adder for Low-Power High-Speed Applications

Volume 22, Issue 3

483 -- 496Yen-Chung Chiu, Wen-Hsiang Tsai. Copyright Protection against Print-and-Scan Operations by Watermarking for Color Images Using Coding and Synchronization of Peak Locations in Frequency Domain
497 -- 509Varsha Chikane, Chiou-Shann Fuh. Automatic White Balance for Digital Still Cameras
511 -- 534Li-wei He, Tsorng-Lin Chia, Chen-Kuei Yang. A Geometric Invariant Approach to Human Face Verification
535 -- 543Shi-Cheng Liu, Shinfeng D. Lin. BCH Code-Based Robust Audio Watermarking in the Cepstrum Domain
545 -- 557Hsu-Yung Cheng, Quen-Zong Wu, Kuo-Chin Fan, Bor-Shenn Jeng. Binarization Method Based on Pixel-level Dynamic Thresholds for Change Detection in Image Sequences
559 -- 571Jong-Phil Yang, Kyung Hyune Rhee. A New Design for a Practical Secure Cookies System
573 -- 594Been-Chian Chien, Jung-Yi Lin, Wei-Pang Yang. A Classification Tree Based on Discriminant Functions
595 -- 609Hewijin Christine Jiau, Kuo-Feng Ssu. Building and Using Object-Oriented Frameworks for CAD Rapid Prototyping
611 -- 624Yongsu Park, Yookun Cho. Efficient One-time Signature Schemes for Stream Authentication
625 -- 640Hewijin Christine Jiau, Jinghong Cox Chen, Kuo-Feng Ssu, Jim-Min Lin. TeMeFr: Towards a Reuse-Based Development for Conference-Oriented Telemedicine Systems
641 -- 657Hong-Long Chou, Zen Chen. Fast Octree Construction Endowed with an Error Bound Controlled Subdivision Scheme
659 -- 674Sun Ok Yang, SungSuk Kim, Chong-Sun Hwang. Profile-Based Lifetime Determination Schemes for Mobility Management in HMIPv6
675 -- 689Ganapathi Padmavathi, Samukutty Annadurai. Storage Efficient Key Management Technique for Secure Multicasting
691 -- 699Wei-Chi Ku, Hui-Lung Lee. Authentication Protocols Using Hoover-Kausik s Software Token
701 -- 712Ching-Tang Hsieh, Yeh-Kuang Wu, Chyi-Jang Lee. Semi-fragile Image Authentication Using Real Symmetric Matrix

Volume 22, Issue 2

237 -- 246Junyoung Heo, Sangho Yi, Yookun Cho, Jiman Hong. Space-Efficient Page-Level Incremental Checkpointing
247 -- 267Misook Choi, Eunsook Cho. Component Identification Methods Applying Method Call Types between Classes
269 -- 282Hisham M. Haddad, Ying Xie. Wrapper-Based Framework for Domain-Specific Software Reuse
283 -- 295Songsri Tangsripairoj, Mansur H. Samadzadeh. Organizing and Visualizing Software Repositories Using the Growing Hierarchical Self-Organizing Map
297 -- 313Sun-Jen Huang, Chieh-Yi Lin, Nan-Hsing Chiu. Fuzzy Decision Tree Approach for Embedding Risk Assessment Information into Software Cost Estimation Model
315 -- 335YoungJoon Byun, Beverly A. Sanders. A Pattern-based Development Methodology for Communication Protocols
337 -- 356Pradeep Varma. Process and Planning Support for Iterative Porting
357 -- 373Ninh-Thuan Truong, Jeanine Souquières. Verification of UML Model Elements Using B
375 -- 390Jingyue Li, Axel Anders Kvale, Reidar Conradi. A Case Stud on Improving Changeability of COTS-Based System Using Aspect-Oriented Programming
391 -- 399Jaime Muñoz Masqué, Alberto Peinado. Cryptanalysis of Improved Liaw s Broadcasting Cryptosystem
401 -- 423Bin Shyan Jong, Wen Hao Yang, Shawn Song. An Efficient Edge-Based Compression Algorithm for 3D Models with Holes and Handles
425 -- 446Bin Shyan Jong, Tsong Wuu Lin, Yu-Lung Wu, Te Yi Chan. Effective Two-Phase Cooperative Learning on the WWW
447 -- 459SooCheol Lee, Eenjun Hwang, Jung-Geun Han. Efficient Image Retrieval Based on Minimal Spatial Relationships
461 -- 473I-Shyan Hwang, San-Nan Lee, I-Cheng Chang. Performance Assessment of Fuzzy Logic Control Routing Algorithm with Different Wavelength Assignments in DWDM Networks

Volume 22, Issue 1

1 -- 17Yi-Hsuan Lin, Tung-Mei Ko, Tyng-Ruey Chuang, Kwei-Jay Lin. Open Source Licenses and the Creative Commons Framework: License Selection and Comparison
19 -- 29Wen-Dar Lin, Yun-Ching Chen, Jan-Ming Ho, Chung-Der Hsiao. GOBU: Toward an Integration Interface for Biological Objects
31 -- 47Nei-Chiung Perng, Chin-Shuang Liu, Tei-Wei Kuo. Real-Time Linux with Budget-Based Resource Reservation
49 -- 61Cungang Yang, Chang N. Zhang. An Approach to XML-Based Administration and Secure Information Flow Analysis on an Object Oriented Role-Based Access Control Model
63 -- 94Wei-Horng Yeh, Ye-In Chang. An Efficient Signature Extraction Method for Image Similarity Retrieval
95 -- 121Min-Hsuan Fan, Chua-Huang Huang, Yeh-Ching Chung, Jen-Shiuh Liu, Jei-Zhii Lee. A Programming Methodology for Designing Block Recursive Algorithms
123 -- 146Yin-Fu Huang, Chao-Nan Chen. Implementation for the Arrangement and Mining Analysis of Travel Schedules
147 -- 161Shih-Chien Chou. MRBAC/AR: an Information Flow Control Model to Prevent Both Intra- and Inter-Application Information Leakage
163 -- 174Chih-Yang Lin, Yu-Tai Ching. A Robust Image Hiding Method Using Wavelet Technique
175 -- 188Shyi-Ming Chen, Hao-Lin Lin. Generating Weighted Fuzzy Rules from Training Instances Using Genetic Algorithms to Handle the Iris Data Classification Problem
189 -- 198Tzu-Chao Lin, Pao-Ta Yu. Salt-Pepper Impulse Noise Detection and Removal Using Multiple Thresholds for Image Restoration
199 -- 213Ming-Hua Wang, Huan-Chao Keh, Nan-Chen Hsieh, Tsong-Sheng Wang. A Study of Disjunctive Information in Fuzzy Relational Databases
215 -- 227Jong Wook Kwak, Cheol Hong Kim, Sung-Hoon Shim, Chu Shik Jhon. Advanced High-Level Cache Management by Processor Access Information