Previous

JOURNAL OF INFORMATION SCIENCE AND ENGINEERING

JISEVol. 26 No. 5 (September 2010)

JISE

 

REGULAR SECTION

PAPERS

1.       Two-phase Pattern Matching for Regular Expressions in Intrusion Detection Systems 
Chang-Ching Yang, Chen-Mou Cheng and Sheng-De Wang................pp.1563-1582

2.       Active Adjustment: An Effective Method for Keeping the TPR*-tree Compact 
Sang-Wook Kim, Min-Hee Jang and SungChae Lim................pp.1583-1600

3.       FSM-Based Formal Compliance Verification of Interface Protocols 
Che-Hua Shih, Ya-Ching Yang, Chia-Chih Yen, Juinn-Dar Huang and Jing-Yang Jou................pp.1601-1617

4.       GPU-based Collision Detection and Response for Particles on 3D Models 
Hsien-Hsi Hsieh, Wen-Kai Tai and Chin-Chen Chang................pp.1619-1635

5.       Low-Cost Smart Projector for Home Entertainment 
Wun-Yi Lee and Tsorng-Lin Chia................pp.1637-1655

6.       Visual Attention Region Detection Using Texture and Object Features 
Hsuan-Ying Chen and Jin-Jang Leou................pp.1657-1675

7.       Semi-Probabilistic Routing in Intermittently Connected Mobile Ad Hoc Networks 
Ke Shi................pp.1677-1693

8.       Particle Swarm Optimization for Semi-supervised Support Vector Machine 
Qing Wu, San-Yang Liu and Le-You Zhang................pp.1695-1706

9.       An Orthogonal DLGE Algorithm With its Application to Face Recognition 
Jiangfeng Chen and Baozong Yuan................pp.1707-1718

10.    A Schema Based Approach to Valid XML Access Control 
Changwoo Byun and Seog Park................pp.1719-1739

11.    Spike Defect Detection and Removal on Aged Films 
Rong-Chi Chang and Timothy K. Shih................pp.1741-1753

12.    A Compressed-Domain Image Watermarking Scheme with the SPIHT Coding 
Shih-Hsuan Yang and Wu-Jie Liao................pp.1755-1770

13.    Optimizatin of IEEE 802.11 Multirate Wireless LAN 
A. V. Babu, Lillykutty Jacob and S. Abdul Subhan................pp.1771-1785

14.    Blind Steganalysis of Mp3stego 
Julio C. Hernandez-Castro, Juan E. Tapiador, Esther Palomar and Angel Romero-Gonzalex................pp.1787-1799

 

SHORT PAPERS

 

15.    CA-RBAC: Context Aware RBAC Scheme in Ubiquitous Computing Environments 
Jung Hwan Choi, Hyunsu Jang and Young Ik Eom................pp.1801-1816

16.    A Workflow Event Logging Mechanism and Its Implications on Quality of Workflows 
Minjae Park and Kwanghoon Kim................pp.1817-1830

17.    Efficient Decoding of Systematic (23, 12, 7) and (41, 21, 9) Quadratic Residue Codes 
Yan-Haw Chen, Chih-Hua Chen, Chien-Hsiang Huang, Trieu-Kien Truong and Ming-Haw Jing................pp.1831-1843

18.    Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication Protocol 
Hanjae Jeong, Dongho Won and Seungjoo Kim................pp.1845-1858

19.    A Node Revocation Scheme Using Public-Key Cryptography in Wireless Sensor Networks 
Po-Jen Chuang, Shao-Hsuan Chang and Chih-Shin Lin................pp.1859-1873

20.    Mutual RFID Authentication Scheme for Resource-constrained Tags 
Nai-Wei Lo and Kuo-Hui Yeh................pp.1875-1889

21.    Speaker Identification in Overlapping Speech 
Wei-Ho Tsai and Shih-Jie Liao................pp.1891-1903

22.    A Layered Approach to the Polysemy Problems in a Chinese to Taiwanese TTS Systems 
Yih-Jeng Lin, Ming-Shing Yu, Chin-Yu Lin and Yuan-Chun Lin................pp.1905-1915

23.    Linear Quadtree Construction in Real Time 
Chi-Yen Huang and Yu-Wei Chen................pp.1917-1930