Previous

JOURNAL OF INFORMATION SCIENCE AND ENGINEERING

JISEVol. 24 No. 5  (September 2008)

H

JISE

 

REGULAR SECTION

PAPERS

1.       Integration of Specification-based and CR-based Approaches for GUI Testing  
Woei-Kae Chen, Zheng-Wen Shen and Tung-Hung Tsai................pp.1293-1307

2.       An Approach for Synthesis Petri Nets for Modeling and Verifying Composite Web Service  
Zhi-Jun Ding, Jun-Li Wang and Chang-Jun Jiang................pp.1309-1328

3.       FASiRec: A Fast Session Recovery Scheme for Large-scale VPNs Using IPSec  
Jeong-Beom Kim, MoonBae Song, Chong-Sun Hwang and SangKeun Lee................pp.1329-1346

4.       A Generic Construction for Intrusion-Resilient Signatures from Linear Feedback Shift Register  
Zheng Gong, Xiangxue Li, Dong Zheng and Kefei Chen................pp.1347-1360

5.       Predicting Subcellular Locations of Eukaryotic Proteins Using Bayesian and k-Nearest Neighbor Classifiers  
Han C. W.  Hsiao, Shih-Hao Chen, Judson Pei-Chun Chang and Jeffrey J. P. Tsai................pp.1361-1375

6.       Extension of Timeline-based Editing for Non-deterministic Temporal Behavior in SMIL2.0 Authoring  
Chun-Chuan Yang, Chen-Kuei Chu and Yung-Chi Wang................pp.1 377-1395

7.       A Self-adaptive Predictive Policy for Pursuit-evasion Game  
Zhen Luo, Qi-Xin Cao and Yan-Zheng Zhao................pp.1397-1407

8.       An Efficient Cluster-Based Routing Algorithm in Ad Hoc Networks with Unidirectional Links  
Yi-Yu Su, Shiow-Fen Hwang and Chyi-Ren Dow................pp.1409-1428

9.       Saving Register-File Leakage Energy by Register-usage Exploiting  
Wann-Yun Shieh and Chien-Chen Chen................pp.1429-1444

10.    A Two-stage Clustering Method Combining Ant Colony SOM and K-means   
Sheng-Chai Chi and Chih-Chieh Yang................pp.1445-1460

11.    Dynamic Transmission Control Method for WLANs   
Jain-Shing Liu and Chun-Hung Richard Lin................pp.1461-1472

12.    Analysis of All-or-Nothing Hash Functions   
Pin Lin, Wenling Wu, Chuankun Wu and Tian Qiu................pp.1473-1484

13.    Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions   
Juan M. Estevez-Tapiador, Julio C. Hernandez-Castro, Pedro Peris-Lopez and Arturo Ribagorda................pp.1485-1504

14.    Efficient Immune-Based Particle Swarm Optimization Learning for Neuro-Fuzzy Networks Design   
Cheng-Jian Lin, Cheng-Hung Chen and Chi-Yung Lee................pp.1505-1520

SHORT PAPERS

15.    Fuzzy System Reliability Analysis Using Triangular Fuzzy Numbers Based on Statistical Data   
Jing-Shing Yao, Jin-Shieh Su and Teng-San Shih................pp.1521-1535

16.    Provisioning Erlang-B Model Based Flow Admission Control for Packet Networks   
L. Senthilkumar and V. Sankaranarayanan................pp.1537-1550

17.    Calibration of Motorized Object Rig and Its Applications   
Pang-Hung Huang, Yu-Pao Tsai, Wan-Yen Lo, Sheng-Wen Shih and Yi-Ping Hung................pp.1551-1565

18.    A Geometry-Based Secret Image Sharing Approach   
Chien-Chang Chen and Wen-Yin Fu................pp.1567-1577

19.    A Lossless Image Coder Integrating Predictors and Block-Adaptive Prediction   
Feng-Yang Hsieh, Chia-Ming Wang, Chun-Chieh Lee and Kuo-Chin Fan................pp.1579-1591