Previous

JOURNAL OF INFORMATION SCIENCE AND ENGINEERING

JISEVol. 27 No. 1 (January 2011)

JISE

 

SPECIAL ISSUE ON Ubiquitous Computing Systems and Applications

PAPERS

1. Design and Analysis of Multi-Source Extraction and Localization for Sound-Activated Designation of Automata

          SHUN-CHIEH LIN, MIN-JIAN LIAO AND YI-LIN CHIANG.......... pp. 1-18

2. Offloading Socket Processing for Ubiquitous Services

          SUNWOOK KIM, SEONGWOON KIM, KYOUNG PARK AND YONGWHA CHUNG.......... pp. 19-33

3. Spacelog Data Acquisition, Management and Applications in a Gateway-based Smart Space

    JIANHUA MA, RUNHE HUANG, TOMOMI KAWASHIMA AND BERNADY O. APDUHAN.......... pp. 35-50

4. Efficient Emergency Rescue Navigation with Wireless Sensor Networks

    SHEN LI, ANDONG ZHAN, XIAOBING WU, PANLONG YANG AND GUIHAI CHEN.......... pp. 51-64

5. Connectivity-Based Wormhole Detection in Ubiquitous Sensor Networks

    DEZUN DONG, MO LI, YUNHAO LIU AND XIANGKE LIAO.......... pp. 65-78

6. A Group-Based Deployment for Wormhole Prevention in Sensor Networks

    GU-HSIN LAI, CHEN-SEN OUYANG AND CHIA-MEI CHEN.......... pp. 79-93

 

regular section

PAPERS

7. Music Matching Based on Rough Longest Common Subsequence

    HWEI-JEN LIN, HUNG-HSUAN WU AND CHUN-WEI WANG.......... pp. 95-110

8. IPL B+-tree for Flash Memory Database Systems

    GAP-JOO NA, BONGKI MOON AND SANG-WON LEE.......... pp. 111-127

9. Authentication and Copyright Protection Scheme for H.264/AVC and SVC

    SU-WAN PARK AND SANG UK SHIN.......... pp.129-142

10.Making T-Trees Cache Conscious on Commodity Microprocessors

    IG-HOON LEE, SANG-GOO LEE AND JUNHO SHIM.......... pp. 143-161

11.A Robust Watermarking Technique Resistant JPEG Compression

    CHI-HUNG FAN, HUI-YU HUANG AND WEN-HSING HSU.......... pp. 163-180

12.Attribute-Based Traitor Tracing

    YONG-TAO WANG, KE-FEI CHEN AND JIAN-HONG CHEN.......... pp. 181-195

13.Exposure Fusion Based on Shift-Invariant Discrete Wavelet Transform

    JINHUA WANG, DE XU, CONGYAN LANG AND BING LI.......... pp. 197-211

14.On Improving CMMI in an Immature World of Software Development

    JING-CHIOU LIOU.......... pp. 213-226

15.Characterization of WOSF by Equivalent Classes through Support Vector Machine

    WEI-CHIH CHEN AND JYH-HORNG JENG.......... pp. 227-242

16.On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption

    ZHONG-MEI WAN, JIAN WENG, XUE-JIA LAI, SHENG-LI LIU AND JI-GUO LI.......... pp. 243-259

17.An Online Reprogrammable Operating System for Wireless Sensor Networks

    HSUNG-PIN CHANG, YU-CHIEH LIN AND DA-WEI CHANG.......... pp. 261-286

18.Design Planning with 3D-Via Optimization in Alternative Stacking Integrated Circuits

    CHAO-HUNG LU, HUNG-MING CHEN AND CHIEN-NAN JIMMY LIU.......... pp. 287-302

19.Mandarin Singing-voice Synthesis Using an HNM Based Scheme

    HUNG-YAN GU AND HUANG-LIANG LIAO.......... pp. 303-317

20.Locality-Aware Clustering Application Level Multicast for Live Streaming Services on the Internet

    KANCHANA SILAWARAWET AND NATAWUT NUPAIROJ.......... pp. 319-336

21.Multi-layered Expression Synthesis

    JIA-RU LIN AND I-CHEN LIN.......... pp. 337-351

SHROT PAPERS

22.A Reliable Fingerprint Orientation Estimation Algorithm

    LIMIN LIU AND TIAN-SHYR DAI.......... pp. 353-368

23.A Novel Scheme for Face Recognition and Authentication against Pose, Illumination and Expression Changes

    YING-NONG CHEN, CHIN-CHUAN HAN, CHENG-TZU WANG AND KUO-CHIN FAN.......... pp. 369-380

24.An Efficient Relay Sensor Placing Algorithm for Connectivity in Wireless Sensor Networks

    JYH-HUEI CHANG.......... pp. 381-392