[Previous ]

JOURNAL OF INFORMATION SCIENCE AND ENGINEERING

JISEVol. 23 No.1  (January 2007)

JISE

 

REGULAR SECTION

PAPERS

1.        [Video Algebra for Spatio-Temporal Reasoning of Iconic Videos Represented in 3D C-string         ] 
Anthony J. T. Lee, Ping Yu, Han-Pang Chiu and Hsiu-Hui Lin ................pp.1 -19 

2.        [Tolerating VLR and HLR Failures in Two-Tier PCS Networks ]
Yao-Ming Yeh and Ming-Jeng Yang................pp.21-47

3.        [Fuzzy Flexibility and Product Variety in Lot-Sizing ]
Jing-Shing Yao, Wen-Tao Huang and Tien-Tsai Huang................pp.49-70

4.        [A Tableless Approach for High-Level Power Modeling Using Neural Networks]
Chih-Yang Hsu, Wen-Tsan Hsieh, Chien-Nan Jimmy Liu and Jing-Yang Jou................pp.71-90

5.        [An IP-Decoupling Approach to Host Mobility ]
Chun-Chieh Wang, Kuang-Hui Chi and Chien-Chao Tseng................pp.91-112

6.        [Modeling of a Hybrid Ad Hoc Cellular Network System][  ]
Sachiko Yamanaka and Katsunori Shimohara................pp.113-126

7.        [Algebraic Decoding of Quadratic Residue Codes Using Berlekamp-Massey Algorithm][  ]
Y. H. Chen, T. K. Truong, Y. Chang, C. D. Lee and S. H. Chen................pp.127-145

8.        [A New Dispatching Mechanism – Using Value Classification and Indexing – for Value Predictors][  ]
Po-Jen Chuang and Yu-Shian Chiu................pp.147-166

9.        [Applications of Property-Preserving Algebras to Component-Based Manufacturing System Design ]
He-Jiao Huang, To-Yat Cheung and Xiao-Long Wang................pp.167-181

10.     [Radar Pulse Compression for Point Target and Distributed Target Using Neural Network][  ]
Fun-Bin Duh and Chia-Feng Juang................pp.183-201

11.     [An Incremental Approach to Extracting Minimal Bad Siphons][  ]
Daniel Yuh Chao................pp.203-214

12.     [Deadlock Prevention for Sequence Resource Allocation Systems][  ]
Yi-Sheng Huang................pp.215-231

 

SHORT PAPERS

 

13.     [Online Generation of Association Rules under Multi-dimensional Consideration Based on Negative-Border][  ]
Ching-Yao Wang, Shian-Shyong Tseng, Tzung-Pei Hong and Yian-Shu Chu................pp.233-242

14.     [Incorporating Memory Resource Considerations into the Workload Distribution of Software DSM Systems][  ]
Yen-Tso Liu, Tyng-Yeu Liang, Jyh-Biau Chang and Ce-Kuen Shieh................pp.243-257

15.     [Modeling IP Packets over WDM Ring Network with One Tunable Transmitter and Multiple Fixed Receivers (TT-FRs) ][  ]
Wen-Shyang Hwang, Jih-Hsin Ho and Ce-Kuen Shieh................pp.259-270

16.     [Shape-based Pedestrian Detection in Infrared Images][  ]
Shu Liu, Yupin Luo and Shiyuan Yang................pp.271-283

17.     [Improved Shao’s Signature Scheme ]
H. F. Lin, Jenshiuh Liu and C. Y. Chen ................pp.285-298

18.     [Recognize Aircraft in ISAR Images ]
Tsorng-Lin Chia, Shen-Chi Tien and Yibin Lu................pp.299-313

19.     [Efficient Data Distribution Scheme for Multi-Dimensional Sparse Arrays][  ]
Chun-Yuan Lin and Yeh-Ching Chung................pp.315-327

20.     [Client’s Cache Updating Using Idle Time of Clients in Relational Database Management Systems ][  ]
Yasar-Guneri Sahin and Halil-Ibrahim Bulbul................pp.329-341