Previous

JOURNAL OF INFORMATION SCIENCE AND ENGINEERING

JISEVol. 27 No. 3 (May 2011)

JISE

regular section

PAPERS

  1. A Cooperative Approach to Bee Swarm Optimization

             REZA AKBARI AND KOORUSH ZIARATI.......... pp. 799-818

  2. Explicit Use of Term Occurrence Probabilities for Term Weighting in Text Categorization 

             ZAFER ERENEL, HAKAN ALTINCAY AND EKREM VAROGLU.......... pp. 819-834

  3. Fairness Provisioning in Multi-hop Wireless Backhaul Networks: A Dynamic Estimation Approach 

             JENG-FARN LEE AND YUAN-NENG HSU.......... pp. 835-853

  4. Similarity Analysis between Transcription Factor Binding Sites by Bayesian Hypothesis Test  

             QIAN LIU, SAN-YANG LIU AND LI-FANG LIU.......... pp. 855-868

  5. A Robust Kernel-Based Solution to Control-Hijacking Buffer Overflow Attacks 

             LI-HAN CHEN, FU-HAU HSU, CHENG-HSIEN HUANG, CHIH-WEN OU, CHIA-JUN LIN AND SZU-CHI LIU.......... pp. 869-890

  6. An Effective Framework for Cloud Modeling, Rendering, and Morphing  

             CHUNG-MIN YU AND CHUNG-MING WANG.......... pp. 891-913

  7. A Secure ID-Based Authenticated Group Key Exchange Protocol Resistant to Insider Attacks 

             TSU-YANG WU, YUH-MIN TSENG AND CHING-WEN YU.......... pp. 915-932

  8. Secure Data Deletion for USB Flash Memory 

             BYUNGHEE LEE, KYUNGHO SON, DONGHO WON AND SEUNGJOO KIM.......... pp. 933-952

  9. Design of High-Speed Iterative Dividers in GF(2m) 

             MING-DER SHIEH, WEN-CHING LIN AND CHIEN-MING WU.......... pp. 953-967

10. Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings 

      CHUN-I FAN, RUEI-HAU HSU AND PEI-HSIU HO.......... pp. 969-982

11. Data Hiding in Graphic Drawings by Structures of Object Groupings 

      TSUNG-YUAN LIU1 AND WEN-HSIANG TSAI.......... pp. 983-994

12. A Fuzzy K-means Clustering Algorithm Using Cluster Center Displacement

      CHIH-TANG CHANG, JIM Z. C. LAI AND MU-DER JENG.......... pp. 995-1009 

13. A Delegation Framework for Task-Role Based Access Control in WFMS 

      HWAI-JUNG HSU AND FENG-JIAN WANG.......... pp. 1011-1028

14. Alternating Runs of Geometrically Distributed Random Variables 

      CHIA-JUNG LEE AND SHI-CHUN TSAI.......... pp. 1029-1044

15. Perceptual LOD under Low Resolution Conditions 

      LIEU-HEN CHEN, YU-SHENG CHEN AND TSUNG-CHIH TSAI.......... pp. 1045-1057

16. Security Analysis and Enhancements of Verifier-Based Password-Authenticated Key Exchange Protocols in the Three-Party Setting 

      SHUHUA WU.......... pp. 1059-1072

17. Implementation of Business Logic Framework for Collaboration of Heterogeneous Service Systems in RFID/USN Environment 

      SEOK-KYOO KIM, JUNO CHANG AND SANG-YONG HAN.......... pp. 1073-1089

18. Adaptive Path Planning for Randomly Deployed Wireless Sensor Networks  

      KYUNGHWI KIM, BYUNGHYUK JUNG, WONJUN LEE AND DING-ZHU DU.......... pp. 1091-1106

19. Video Super-Resolution by Motion Compensated Iterative Back-Projection Approach 

      CHEN-CHIUNG HSIEH, YO-PING HUANG, YU-YI CHEN AND CHIOU-SHANN FUH.......... pp. 1107-1122

20. Intention Learning From Human Demonstration 

      HOA-YU CHAN, KUU-YOUNG YOUNG AND HSIN-CHIA FU.......... pp. 1123-1136

21. Improving MapReduce Performance by Exploiting Input Redundancy 

      SHIN-GYU KIM, HYUCK HAN, HYUNGSOO JUNG, HYEONSANG EOM AND HEON Y. YEOM.......... pp. 1137-1152

 

SHORT PAPERS

22. Comments on Shao-Cao’s Unidirectional Proxy Re-Encryption Scheme from PKC 2009 

      MIN-RONG CHEN, XI ZHANG AND XIA LI.......... pp. 1153-1158

23. Improved Bound on Approximating Jug Measuring Problem 

      MIN-ZHENG SHIEH AND SHI-CHUN TSAI.......... pp. 1159-1163

 

software publication track

PAPER

24. A Real-Time Power Analysis Platform for Power-Aware Embedded System Development  

      LIANG-BI CHEN, YEN-LING CHEN AND ING-JER HUANG.......... pp. 1165-1182