JISE 

 

 

 

 

 


ALGORITHMS

Bottleneck Domination and Bottleneck Independent Domination on Graphs

William Chung-Kung Yen…………………………………....………Vol. 18, No. 2, pp. 311-331

Triangle Graphs and Simple Trapezoid Graphs

Yaw-Ling Lin………………………………………………………….Vol. 18, No. 3, pp. 467-473

 

CHINESE INFORMATION PROCESSING

A Study on Chinese Carbon-Signature Recognition

Sheng-Fuu Lin, Yu-Wei Chang and Chien-Kun Su...…….………...Vol. 18, No. 2, pp. 257-280

 

COMPILERS

A Release Combined Scheduling Scheme for Non-Uniform Dependence Loops

Der-Lin Pean, Huey-Ting Chua and Cheng Chen…….…………….Vol. 18, No. 2, pp. 223-255

Locating Free Positions in LR(k) Grammars

Shih-Ting Ouyang, Pei-Chi Wu and Feng-Jian Wang….….……….Vol. 18, No. 3, pp. 411-423

 

COMPUTER APPLICATIONS

A Portable Auto Attendant System With Sophisticated Dialog Structure

Jhing-Fa Wang and Hsien-Chang Wang……………………………Vol. 18, No. 4, pp. 627-636

An Anonymous Endorsement System

Wei-Chi Ku and Sheng-De Wang…………………………….……..Vol. 18, No. 1, pp. 107-114

 

COMPUTER ARCHITECTURES

Design of Instruction Address Queue for High Degree X86 Superscalar Architectures

Jih-Ching Chiu, Michael Jin-Yi Wang and Chung-Ping Chung………..Vol. 18, No. 3, pp. 393-409

 

COMPUTER GRAPHICS AND VIRTUAL REALITY

A Fuzzy-based Approach to Mesh Simplification

Chin-Chen Chang, Shu-Kai Yang, Ding-Zhou Duan and Ming-Fen Lin

…………..…………….……….Vol. 18, No. 3, pp. 459-466

 

COMPUTER-COMMUNICATION NETWORKS

An Evaluation of Deficit Round Robin Fair Queuing Applied in Router Congestion Control

Jung-Shian Li……………………………………………...….……...Vol. 18, No. 2, pp. 333-339

 

COMPUTER GRAPHICS AND VIRTUAL REALITY

An Efficient and Stable Ray Tracing Algorithm for Parametric surfaces

Shyue-Wu Wang, Zen-Chung Shih and Ruei-Chuan Chang……....Vol. 18, No. 4, pp. 541-561

Hierarchical Feature-Based Volume Morphing

Hao-Ren Ke, Yu-Pao Tsai and Zen-Chun Shih…….……………..…Vol. 18, No. 1, pp. 85-106

 

DATA ENCRYPTION AND CRYPTOGRAPHY

A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash

Chun-I Fan and Chin-Laung Lei……………………………………....Vol. 18, No. 1, pp. 47-58

An Efficient Authenticated Encryption Scheme With Message Linkages and Low

Communication Costs

Yuh-Min Tseng and Jinn-Ke Jan………………….…………………..Vol. 18, No. 1, pp. 41-46

On the Design of RSA With Short Secret Exponent

Hung-Min Sun, Wu-Chuan Yang and Chi Sung Laih………………...Vol. 18, No. 1, pp. 1-18

On the Security of a Variation of Cramer-Shoup’s Public Key Scheme

Hung-Min Sun...............…….......................................………….…Vol. 18, No. 1, pp. 19-22

Provably Secure Blind Threshold Signatures Based on Discrete Logarithm

Chin-Laung Lei, Wen-Shenq Juang and Pei-Ling Yu………..……….Vol. 18, No. 1, pp. 23-39

 

DATA MANAGEMENT

Adaptive Transaction Management Protocols for Mobile Client Caching DBMSs

IlYoung Chung, Le Gruenwald, Chong-Sun Hwang and Soon Young Jung

…………………………..…..…….Vol. 18, No. 3, pp. 445-457

An Approach to Querying Multiple Object Databases

Jia-Ling Koh and Arbee L. P. Chen…………………………..….….Vol. 18, No. 2, pp. 281-310

 

MATHEMATICS OF COMPUTING

Why is 1 + 1 = 2?

Wuu Yang………………………………………………………..…...Vol. 18, No. 3, pp. 425-443

 

NEURAL NETWORKS AND FUZZY SETS

A Faster Winner-Take-All Neural Networks With the Dynamic Ratio

Chi-Ming Chen, Ming-Hung Hsu and Tien-Yo Wang…….…………Vol. 18, No. 2, pp. 187-210

An Associative Architecture of CMAC for Mobile Robot Motion Control

Yuan-Pao Hsu, Kao-Shing Hwang and Jinn-Shyan Wang………...Vol. 18, No. 2, pp. 145-161

Applying Genetic Algorithms to Solve the Fuzzy Optimal Profit Problem

Feng-Tse Lin and Jing-Shing Yao…………………………………..Vol. 18, No. 4, pp. 563-580

Fuzzy Modeling Employing Fuzzy Polyploidy Genetic Algorithms

Ming-Da Wu and Chuen-Tsai Sun………...………………………..Vol. 18, No. 2, pp. 163-186

Inconsistency Resolution and Rule Insertion for Fuzzy Rule-Based Systems

Hahn-Ming Lee, Jyh-Ming Chen and Chun-Lin Liu……….………..Vol. 18, No. 2, pp. 187-210

 

PARALLEL AND DISTRIBUTED SYSTEM

A Distributed Instrusion Detection Model for the Domain Name System

Chang-Sheng Chen, Shian-Shyong Tseng and Chien-Liang Liu

………………………..………….Vol. 18, No. 6, pp. 999-1009

A Distributed Mobile Agent Framework for Maintaining Persistent Distance Education

Lawrence Y. Deng, Timothy K. Shih, The-Sheng Huang, Yi-Chung Liao,

Ying-Hong Wang and Hui-Huang Hsu………………….…………..Vol. 18, No. 4, pp. 489-506

A Forwarding Pointer-Based Cache Scheme for Reducing Location Management Cost in

PCS Networks

Ki-Sik Kong, Joon-Min Gil, Youn-Hee Han, Ui-Sung Song and Chong-Sun Hwang

…………………………….…….…….Vol. 18, No. 6, pp. 1011-1025

A Hybrid Approach to Query Sets Broadcasting Scheduling for Multiple Channel in Mobile

Information Systems

Ye-In Chang and Shih-Ying Chiu……………………………..……..Vol. 18, No. 5, pp. 641-666

A Scalable and Efficient Systolic Algorithm for the Longest Common Subsequence Problem

Yen-Chun Lin and Jih-Wei Yeh….………………………….……….Vol. 18, No. 4, pp. 519-532

A Second-Level Cache With the Distance-Aware Replacement Policy for NUMA Systems

Sung Woo Chung, Jeong-Heon Shin, Hyong-Shik Kim and Chu Shik Jhon

………………………………..……….Vol. 18, No. 5, pp. 803-813

A Portable Auto Attendant System With Sophisticated Dialog Structure

Jhing-Fa Wang and Hsien-Chang Wang……………………………Vol. 18, No. 4, pp. 627-636

A Note on Efficient Color Visual Encryption

Ching-Nung Yang…………………………………………….……..Vol. 18, No. 3, pp. 367-372

An Optimistic-Based Partition-Processing Approach for Distributed Shared Memory Systems

Jenn-Wei Lin and Sy-Yen Kuo……………………………….……...Vol. 18, No. 6, pp. 853-869

Bit-serial AB2 Multiplier Using Modified Inner Product

Jun-Cheol Jeon, Hyun-Sung Kim, Hyung-Mok Lee and Kee-Young Yoo

………………………………....Vol. 18, No. 4, pp. 507-518

Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines

Min-Shiang Hwang, Cheng-Chi Lee and Ting-Yi Chang.………..…Vol. 18, No. 3, pp. 373-379

Code Generation Methods for Tiling Transformations

Georgios Goumas, Maria Athanasaki and Nectarios Koziris………Vol. 18, No. 5, pp. 667-691

Concentrations, Load Balancing, Multicasting and Partial Permutation Routing on Hypercube

Parallel Computers

Gene Eu Jan, Frank Yeong-Sung Lin, Ming-Bo Lin and Deron Liang

………………………………….……..Vol. 18, No. 5, pp. 693-712

Designing a Complete Model of Role-based Access Control System for Distributed Networks

Chang N. Zhang and Cungang Yang……………………….……….Vol. 18, No. 6, pp. 871-889

Development and Evaluation of QoS Measurement System for Internet Applications by

Client Observation

Hiroki Saito………………….………………………………….…….Vol. 18, No. 6, pp. 891-904

Efficient Cellular Automata Based Versatile Multiplier for GF(2m)

Hua Li and Chang N. Zhang………………………………….……...Vol. 18, No. 4, pp. 479-488

Evaluating Influence of Compiler Optimizations on Data Speculation

Toshinori Sato, Kiichi Sugitani, Akihiko Hamano and Itsujiro Arita

…………………………………………Vol. 18, No. 6, pp. 1027-1036

Experience in Building a Real-Time Extension Library for Java

Hsin-Ta Chiao, Scott Hsu-Jing Kao, Yue-Shan Chang, Shen-Tzay Huang

and Shyan-Ming Yu………..…………………………………..…….Vol. 18, No. 6, pp. 905-927

Evaluating the Performance of a Distributed Database of Repetitive Elements in Complete

Genomes

Jorng-Tzong Horng…………………………………………….…….Vol. 18, No. 4, pp. 533-539

Fast and Scalable Parallel Algorithms for Matrix Chain Product and Matrix Powers on

 Reconfigurable Pipelined Optical Buses

Keqin Li……………………...…………………………………..……Vol. 18, No. 5, pp. 713-727

Group Protocol for Distributed Object-based Systems

Youhei Timura, Katsuya Tanaka and Makoto Takizawa…..……….Vol. 18, No. 5, pp. 729-743

Hash Join Algorithms on SMPs Clusters: Effects of Netcaches on Its Scalability and Performance

Edward David Moreno Ordonez……………………………..………Vol. 18, No. 5, pp. 815-824

Improvements on Audio and Optical Cryptography

Ching-Nung Yang…………………………………………….………Vol. 18, No. 3, pp. 381-391

Locality-Preserving Dynamic Load Balancing for Data-Parallel Applications on Distributed-

Memory Multiprocessors

Pangfeng Liu, Jan-Jan Wu and Chih-Hsuae Yang………………Vol. 18, No. 6, pp. 1037-1048

Migrating-Home Protocol for Software Distributed Shared Memory

Benny Wang-Leung Cheung, Cho-Li Wang and Francis Chi-Moon Lau

…………………………………..………Vol. 18, No. 6, pp. 929-957

Multi-Node Multicast in Multi-Dimensional Wormhole Tori and Meshes With Load Balance

Ming-Hour Yang, Yu-Chee Tseng and Ming-Shian Jian.………......Vol. 18, No. 6, pp. 959-980

Multicasts on WDM All-Optical Butterfly Networks

Xinchen Liu and Qian-Ping Gu…………………………………...Vol. 18, No. 6, pp. 1049-1058

Neko: A Single Environment to Simulate and Prototype Distributed Algorithms

Peter Urban, Xavier Defago and Andre Schiper…………..………..Vol. 18, No. 6, pp. 981-997

Performance Analysis of General Cut-Through Switching on Buffered MIN Switches

Chan L. Liao and Woei Lin..………………………………….……...Vol. 18, No. 5, pp. 745-762

Performance Modeling and Evaluation of MPI-I/O on a Cluster

Jacobo Barro, Juan Tourino, Ramon Doallo and Victor M. Gulias

……………………………….………..Vol. 18, No. 5, pp. 825-836

Performance of Parallel Iterative Solvers: a Library, a Prediction Model, and a Visualization Tool

V. Blanco, P. Gonzalez, J. C. Cabaleiro, D. B. Heras, T. F. Pena, J. J. Pombo

and F. F. Rivera……………..…………………………………..…...Vol. 18, No. 5, pp. 763-785

Reaching Strong Consensus in a General Network

Hsien-Sheng Hsiao, Yeh-Hao Chin and Wei-Pang Yang…….…….Vol. 18, No. 4, pp. 601-625

Specializing Java Programs in a Distributed Environment

Jung Gyu Park and Myong-Soon Park…………………….………..Vol. 18, No. 5, pp. 787-801

Toward Ensuring Fair Service Among ECN and non ECN TCP

Salahuddin Muhammad Salim Zabir, Ahmed Ashir, Gen Kitagata, Takuo Suganuma

and Norio Shiratori…………………………………………….…..…Vol. 18, No. 5, pp. 837-847

 

PERSONAL COMPUTING

Modeling Frequently Accessed Wireless Data With Weak Consistency

Yi-Bing Lin and Yung-Chang Chang………………………………...Vol. 18, No. 4, pp. 581-600

 

SECURITY AND PROTECTION

Two-Pass Hybrid Key Distribution Protocol Based on ECC

Sung-Min Lee and Tai-Yun Kim……………………………...……...Vol. 18, No. 1, pp. 125-139

Remarks on Using RSA With Low Exponent in a Public Network

Wei-Hua He, Tzong-Chen Wu and Chih-Yin Lin………….………..Vol. 18, No. 2, pp. 341-344

 

SIGNAL AND SPEECH PROCESSING

Single Switch Chinese Phonetic Communication System

Cheng-Hong Yang, Cheng-Huei Yang, Li-Yeh Chuang and Ching-Hsing Luo

…………………………….…Vol. 18, No. 1, pp. 115-124

SOFTWARE ENGINEERING

Constructing and Object-Oriented Architecture for Web Application Testing

Ji-Tzay Yang, Jiun-Ling Huang, Feng-Jian Wang and William C. Chu

…….…………………………Vol. 18, No. 1, pp. 50-84