Previous

JOURNAL OF INFORMATION SCIENCE AND ENGINEERING

JISEVol. 27 No. 2 (March 2011)

JISE

regular section

PAPERS

  1. Location Privacy Protection Using Independent ID Update for WLANs

             PO-JEN CHUANG, JER-SHENG DENG AND CHIH-SHIN LIN.......... pp. 403-418

  2. Lossless Compression of Hyperspectral Images Using Adaptive Prediction and Backward Search Schemes

             CHENG-CHEN LIN AND YIN-TSUNG HWANG.......... pp. 419-435

  3. Attribute-Based Key-Insulated Encryption

            JIAN-HONG CHEN, YONG-TAO WANG AND KE-FEI CHEN.......... pp. 437-449

  4. A DL Based Short Strong Designated Verifier Signature Scheme with Low Computation

            HAN-YU LIN, TZONG-SUN WU AND YI-SHIUNG YEH.......... pp. 451-463

  5. Reversible Video Watermarking Using Motion Estimation and Prediction Error Expansion

             XIAO ZENG, ZHEN-YONG CHEN, MING CHEN AND ZHANG XIONG.......... pp. 465-479

  6. The Linear Quantization Strategy of Quadratic Hebbian-Type Associative Memories and Their Performance Analysis

             CHAO-HUI KO, CHING-TSORNG TSAI AND CHISHYAN LIAW.......... pp. 481-492

  7. An Efficient Architecture for a TCP Offload Engine Based on Hardware/Software Co-design

             HANKOOK JANG, SANG-HWA CHUNG, DONG KYUE KIM AND YUN-SUNG LEE.......... pp. 493-509

  8. An Efficient Frequent Pattern Mining Method and its Parallelization in Transactional Databases

             S. M. FAKHRAHMAD AND GH. DASTGHAIBYFARD.......... pp. 511-525

  9. Injection Level Flow Control for Network-on-Chip (NoC)

             MINGHUA TANG AND XIAOLA LIN.......... pp. 527-544

10. Robust Logo Recognition for Mobile Phone Applications

      SHU-KUO SUN AND ZEN CHEN.......... pp. 545-559

11. High Index Compression without the Dependencies of Data Orders and Data Skewness for Spatial Databases

      HUNG-YI LIN.......... pp. 561-576

12. Reversible Data Hiding Based on Median Difference Histogram

      HSIEN-WEI YANG, I-EN LIAO AND CHAUR-CHIN CHEN.......... pp. 577-593

13. An Entropy-Based Complexity Measure for Web Applications Using Structural Information

      WOO-SUNG JUNG, EUN-JOO LEE, KAP-SU KIM AND CHI-SU WU.......... pp. 595-619

14. Method of Lossless and Near-Lossless Color Image Compression

      GRZEGORZ ULACHA.......... pp. 621-642

15. SETBIST: An Soft-Error Tolerant Built-In Self-Test Scheme for Random Access Memories

      TSU-WEI TSENG AND JIN-FU LI.......... pp. 643-656

16. An Anonymous Path Routing (APR) Protocol for Wireless Sensor Networks

      JEHN-RUEY JIANG, JANG-PING SHEU, CHING TU1 AND JIH-WEI WU.......... pp. 657-680

17. A Solution for Data Inconsistency in Data Integration

      XIN WANG, LIN-PENG HUANG, XIAO-HUI XU, YI ZHANG AND JUN-QING CHEN.......... pp. 681-695

18. Applying Semantic Segment Detection to Enhance Web Page Presentation on the Mobile Internet

      STEPHEN J. H. YANG, JIA ZHANG, STELLA T. C. TSAI AND JEFF J. S. HUANG .......... pp. 697-713

19. Jointing Edge Labeling and Geometrical Constraint for Lane Detection and its Application to Suspicious Driving Behavior Analysis

      SIN-YU CHEN, JUN-WEI HSIEH AND DUAN-YU CHEN.......... pp. 715-732

SHORT PAPERS

20. Secret Image Sharing Using Multiwavelet Transform

      CHIN-PAN HUANG AND CHING-CHUNG LI .......... pp. 733-748

21. Automatic Counting Cancer Cell Colonies using Fuzzy Inference System

      SHENG-FUU LIN, HSIEN-TSE CHEN AND YI-HSIEN LIN.......... pp. 749-760

22. Mashup Creation Using a Mashup Rule Language

      HYOSOOK JUNG AND SEONGBIN PARK.......... pp. 761-775

23. CE-TIP: A Code Expansion Based Tag Identification Protocol for RFID Systems

      KUO-HUI YEH, NAI-WEI LO AND ENRICO WINATA.......... pp. 777-788

24. Improving MapReduce Performance by Exploiting Input Redundancy

      SHIN-GYU KIM, HYUCK HAN, HYUNGSOO JUNG, HYEONSANG EOM AND HEON Y. YEOM.......... pp. 789-804

25. Backup Metadata As Data: DPC-tolerance to Commodity File System

      YOUNG JIN YU, DONG IN SHIN, HYEONG SEOG KIM, HYEONSANG EOM AND HEON YOUNG YEOM.......... pp. 805-832