Previous

JOURNAL OF INFORMATION SCIENCE AND ENGINEERING

JISEVol. 27 No. 4 (July 2011)

JISE

 

regular section

PAPERS

  1. Backup Metadata As Data: DPC-Tolerance to Commodity File System
       YOUNG JIN YU, DONG IN SHIN, HYEONG SEOG KIM, HYEONSANG EOM AND HEON YOUNG YEOM.......... pp. 1193-1218

  2. Palmprint Recognition Based on Line and Slope Orientation Features 

             MIN-KI KIM.......... pp. 1219-1232

  3. Map-based Indoor People Localization using an Inertial Measurement Unit

             YUNYOUNG NAM.......... pp. 1233-1248

  4. Another Efficient Proxy Signature Scheme in the Standard Model

             JIAN-HONG ZHANG AND JIAN MAO.......... pp. 1249-1264

  5. A Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme

             CHE-WEI LEE AND WEN-HSIANG TSAI.......... pp. 1265-1282

  6. The SQL Function XMLNEST to Generate Recursive XML Values from Relational Data

             SUNG-CHUL PARK AND YOUNG-CHUL PARK.......... pp. 1283-1302

  7. Group Oriented Renewal of Secrets and Its Application to Secure Multicast

             J. A. M. NARANJO, L. G. CASADO AND J. A. LOPEZ-RAMOS.......... pp. 1303-1313

  8. Preimage Attack on Reduced DHA-256

             JINMIN ZHONG AND XUEJIA LAI.......... pp. 1315-1327

  9. Cryptanalysis and Enhancements of Three-Party Authenticated Key Exchange Protocol using ECC

             SHUHUA WU, YUEFEI ZHU AND QIONG PU.......... pp. 1329-1343

10. MegaDrop: A Cooperative Video-on-Demand System in a Peer-to-Peer Environment

      JIA-MING CHEN, JENQ-SHIOU LEU, YEN-CHIU CHEN, HSIN-WEN WEI AND WEI-KUAN SHIH.......... pp. 1345-1361

11. A Specific Effort Estimation Method Using Function Point

      BINGCHIANG JENG, DOWMING YEH, DERON WANG, SHU-LAN CHU AND CHIA-MEI CHEN.......... pp. 1363-1376

12. Improved Auto-Focus Search Algorithms for CMOS Image-Sensing Module

      CHUNG-FENG JEFFREY KUO AND CHIN-HSUN CHIU.......... pp. 1377-1393 

13. An Approach to Weaving Stateful Aspects using LTS

      CHUN-HUA YANG AND HAI-YANG WANG.......... pp. 1395-1411

14. Exploiting Taxonomic Knowledge for Personalized Search: A Bayesian Belief Network-based Approach

      JAE-WON LEE, HAN-JOON KIM AND SANG-GOO LEE.......... pp. 1413-1433

15. New Forward-Secure Signature Scheme with Untrusted Update

      JIA YU, FAN-YU KONG, XIANG-GUO CHENG, RONG HAO AND JIAN-XI FAN.......... pp. 1435-1448

16. On Adaptive Random Testing Through Iterative Partitioning

      TSONG YUEH CHEN, DE HAO HUANG AND ZHI QUAN ZHOU.......... pp. 1449-1472

SHORT PAPERS

17. Real-time Traffic Monitoring with Magnetic Sensor Networks

      LEI ZHANG, RUI WANG AND LI CUI.......... pp. 1473-1486

18. Secure Verifier-Based Three-Party Key Exchange in the Random Oracle Model

      HUNG-YU CHIEN.......... pp. 1487-1501