Previous

JOURNAL OF INFORMATION SCIENCE AND ENGINEERING

JISEVol. 24 No. 4  (July 2008)

JISE

 

REGULAR SECTION

PAPERS

1.       Design of QoS and Admission Control for VoIP Services Over IEEE 802.11e WLANs  
Pei-Yeh Wu, Jen-Jee Chen, Yu-Chee Tseng and Hung-Wei Lee................pp.1003-1022

2.       On Message Sequences for Incremental Network Computing  
Cho-Chin Lin................pp.1023-1040

3.       Efficient Discovery of Frequent Continuities by Projected Window List Technology  
Kuo-Yu Huang, Chia-Hui Chang and Kuo-Zui Lin................pp.1041-1064

4.       A Modified EDCA with Dynamic Contention Control for Real-Time Traffic in Multi-hop Ad Hoc Networks  
Yang-Jing Wu, Jen-Hung Chiu and Tsang-Ling Sheu................pp.1065-1079

5.       Ant Colony Optimization Approaches to the Degree-constrained Minimum Spanning Tree Problem  
Yoon-Teck Bau, Chin-Kuan Ho and  Hong-Tat Ewe................pp.1081-1094

6.       New Prediction- and Affine Transformation-Based Three-Step Search Scheme for Motion Estimation With Application  
Kuo-Liang Chung, Ta-Jen Yao and Yong-Huai Huang................pp.1095-1109

7.       An Intelligent Data Mining Approach Using Neuro-Rough Hybridization to Discover Hidden Knowledge from Information Systems  
Reza Sabzevari and Gh. A. Montazer................pp.1111-1126

8.       Filtering of Unnecessary Branch Predictor Lookups for Low-power Processor Architecture  
Wei-Hau Chiao and Chung-Ping Chung................pp.1127-1142

9.       Identity-Based Parallel Key-Insulated Signature Without Random Oracles  
Jian Weng, Xiang-Xue Li, Ke-Fei Chen and Sheng-Li Liu................pp.1143-1157

SHORT PAPERS

10.    A Unified Min-Max Transition-Based Data Hiding Algorithm for Mixed Text/Halftone Images   
Shih-Tung Wu, Kuo-Liang Chung, Yong-Huai Huang and Jung-Gen Wu................pp.1159-1173

11.    A Temporal Aggregation Method for Update-Intensive Applications   
Sung Tak Kang, Yon Dohn Chung and Myoung Ho Kim................pp.1175-1186

12.    A Quadtree-based Progressive Lossless Compression Technique for Volumetric Data Sets   
Gregor Klajnsek, Borut Zalik, Franc Novak and Gregor Papa................pp.1187-1195

13.    A Robust and Accurate Calibration Method by Computer Vision Techniques for Coordinate Transformation between Display Screens and Their Images   
Sheng-Wen Jeng and Wen-Hsiang Tsai................pp.1197-1211

14.    A Secure Hash-Based Strong-Password Authentication Protocol Using One-Time Public-Key Cryptography   
Minho Kim and Cetin Kaya Koc................pp.1213-1227

15.    Network Intrusion Detection Based on Shift-OR Circuit   
Huang-Chun Roan, Wen-Jyi Hwang, Wei-Jhih Huang and Chia-Tien Dan Lo................pp.1229-1239

16.    Multilayer Inpainting on Digitalized Artworks   
Rong-Chi Chang and Timothy K. Shih................pp.1241-1255

17.    The Application-Level Protocol for QoS Supporting in Synchronized Multimedia Sessions   
Chun-Chuan Yang, Sze-Horng Lee and Li-Yuan Cheng................pp.1257-1271

18.    The Segmented-Matrix Algorithm for Haar Discrete Wavelet Transform   
Po-Yueh Chen, En-Chi Liao and Chung-Wei Liang................pp.1273-1282