<Hardware<

Integrated Circuits

Improving Reusability of Test Symbols for Test Data Compression

SHYUE-KUNG LU AND YA-CHEN HUANG............................................................ Vol. 28, No. 2, pp. 351-364

 

<Computer Systems Organization<

Computer-Communication Networks

A Precise and Practical IP Traceback Technique Based on Packet Marking and Logging

DONG YAN, YULONG WANG, SEN SU AND FANGCHUN YANG................................... Vol. 28, No. 3, pp. 453-470

Fault-Tolerant Cycle Embedding in Restricted Hypercube-like Networks with More Faulty Nodes

QIANG DONG AND XIAO-FAN YANG................................................................... Vol. 28, No. 2, pp. 419-426

Message Ferry Routing Algorithm for Data Collection in Partitioned and Buffer-Limited Wireless Sensor Networks

JYH-HUEI CHANG AND RONG-HONG JAN........................................................... Vol. 28, No. 4, pp. 655-669

Wireless Broadcasting with Optimized Transmission Efficiency

JEHN-RUEY JIANG AND YUNG-LIANG LAI............................................................ Vol. 28, No. 3, pp. 479-502

 

<software<

software engineering

A Non-parametric Software Reliability Modeling Approach by Using Gene Expression Programming

HAI-FENG LI, MIN-YAN LU, MIN ZENG AND BAI-QIAO HUANG.................................... Vol. 28, No. 6, pp. 1145-1160

Web Service Aggregation Using Semantic Interoperability Oriented Methodies

JIANXIAO LIU, KEQING HE AND DA NING............................................................. Vol. 28, No. 3, pp. 437-452

 

operating system

A Bad-Block Test Design for Multiple Flash-Memory Chips

CHIN-HSIEN WU.......................................................................................... Vol. 28, No. 6, pp. 1091-1104

Performance Evaluation of Inter-Processor Communication for an Embedded Heterogeneous Multi-Core Processor

SHIAO-LI TSAO AND SUNG-YUAN LEE................................................................ Vol. 28, No. 3, pp. 537-554

 

<Data<

GENERAL

Incremental Clustering of Time-series by Fuzzy Clustering

Saeed Reza Aghabozorgi, Mahmoud Reza Saybani AND tEH Ying Wah.............. Vol. 28, No. 4, pp. 671-688

Data Encryption

An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce

Han-Yu Lin, Tzong-Sun Wu and Shih-Kun Huang........................................... Vol. 28, No. 4, pp. 771-785

Oblivious Transfer with Threshold Access Control

LING-LING XU AND FANG-GUO ZHANG.............................................................. Vol. 28, No. 3, pp. 555-570

Certificate-Based Secure Three-Party Signcryption Scheme with Low Costs

Han-Yu Lin, Tzong-Sun Wu and Shih-Kun Huang........................................... Vol. 28, No. 4, pp. 739-753

 

<tHEORY OF COMPUTATION<

Analysis of algorithms and problem complexity

The Complexity of GARCH Option Pricing Models

Ying-Chie Chen, Yuh-Dauh LyuU AND Kuo-Wei Wen......................................... Vol. 28, No. 4, pp. 689-704

 

<Information Systems<

Database Management

Dummy-Based Schemes for Protecting Movement Trajectories

PO-RUEY LEI, WEN-CHIH PENG, ING-JIUNN SU AND CHIEN-PING CHANG................... Vol. 28, No. 2, pp. 335-350

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks

HAI THANH MAI AND MYOUNG HO KIM.............................................................. Vol. 28, No. 6, pp. 1105-1128

Processing XML Queries with Structural and Full-Text Constraints

YA-HUI CHANG, CHENG-YI WU AND CHENG-CHENG LO......................................... Vol. 28, No. 2, pp. 221-242

Subtree Reconstruction, Query Node Intervals and Tree Pattern Query Evaluation

YANGJUN CHEN AND YIBIN CHEN.................................................................... Vol. 28, No. 2, pp. 263-293

 

Information Storage and Retrieval

A Keyword Based Prototype for Web Search Result Diversification

GU-LI LIN, HONG PENG, QIAN-LI MA, JIA WEI AND JIANG-WEI QIN............................... Vol. 28, No. 3, pp. 601-615

 

INFORMATION SYSTEMS APPLICATIONS

An Intrinsic Graphical Signature Based on Alert Correlation Analysis for Intrusion Detection

HSING-KUO PAO, CHING-HAO MAO, HAHN-MING LEE, CHI-DONG CHEN

AND CHRISTOS FALOUTSOS........................................................................... Vol. 28, No. 2, pp. 243-262

Non-Interactive Forward-Secure Threshold Signature without Random Oracles

JIA YU, FAN-YU KONG, HUA-WEI ZHAO, XIANG-GUO CHENG, RONG HAO

AND XIANG-FA GUO...................................................................................... Vol. 28, No. 3, pp. 571-586

Parameter-Aware Cross-Layer Scheme for Wireless Video

RUI CHEN, ZHENGKUN MI AND LIANGBAO JIAO.................................................... Vol. 28, No. 2, pp. 379-391

 

MISCELLANEOUS

A Hybrid Method for Fast Predicate Matching in Data Stream Processing

HYEON GYU KIM AND MYOUNG HO KIM............................................................. Vol. 28, No. 2, pp. 365-377

 

 

<Computing Methodologies<

Artificial Intelligence

A New Concave Hull Algorithm and Concaveness Measure for n-dimensional Datasets

JIN-SEO PARK AND SE-JONG OH...................................................................... Vol. 28, No. 3, pp. 587-600

Rule Interchange in the Semantic Web

Z. M. MA AND XING WANG.............................................................................. Vol. 28, No. 2, pp. 393-406

 

Computer Graphics

Synthesizing Non Photo-Realistic Rendering Effects of Volumetric Strokes

LIEU-HEN CHEN, YI-HSIEN CHEN, SHUO-YAN LIN, TING-YU LIU AND WEN-CHIEN HSIEH. Vol. 28, No. 3, pp. 521-535

Volume Based Mesh Segmentation

Tan-Chi Ho and Jung-Hong Chuang............................................................ Vol. 28, No. 4, pp. 705-722

 

Image Processing and Computer Vision

A Robust Recognition Algorithm for Encoded Targets in Close-range Photogrammetry

REN-BO XIA, JI-BIN ZHAO, WEI-JUN LIU, JIAN-HUANG WU, SHENG-PENG FU, JUN JIANG

AND JIA-ZHI LI............................................................................................. Vol. 28, No. 2, pp. 407-418

An Effective Content-Aware Image Inpainting Method

JIUNN-LIN WU AND YI-YING CHOU.................................................................... Vol. 28, No. 4, pp. 755-770

Exemplar-based Image Inpainting Using Color Distribution Analysis

QING ZHANG AND JIAJUN LIN.......................................................................... Vol. 28, No. 4, pp. 641-654

 

SIMULATION AND MODELING

Nash Equilibrium of Node Cooperation Based on Metamodel for MANETs

KUN WANG AND MENG WU............................................................................. Vol. 28, No. 2, pp. 317-333

 

<Computer Applications<

General

A Trace-based Feasibility Study of Infrastructure-less VoIP

kun-chan lan and tsung-hsung wu........................................................... Vol. 28, No. 4, pp. 723-737

An Improved Sequence-to-sequence Alignment Method Combined with Feature-based Image Registration Algorithm

WEI-LONG CHEN, XIAO-HAI HE, HAI-YING SONG AND WEI WU................................... Vol. 28, No. 3, pp. 617-630

An Online RBF Network Approach for Adaptive Message Scheduling on Controller Area Networks

MU-SONG CHEN AND HAO-WEI YEN................................................................. Vol. 28, No. 3, pp. 503-519

Smart Prolong Fuzzy Wireless Sensor-Actor Network for Agricultural Application

NASEER SABRI, S. A. ALJUNID, R. B. AHMAD, M. F. MALEK, ABID YAHYA, R. KAMARUDDIN

AND M. S. SALIM.......................................................................................... Vol. 28, No. 2, pp. 295-316

 

Physical Sciences and Engineering

On the Deterministic Secure Quantum Communication using Four-Particle Entangled State and Entanglement Swapping

HSINYI TSENG, TZONELIH HWANG AND CHINGYING LIN......................................... Vol. 28, No. 3, pp. 471-478

 

Computer-aided engineering

Generic Integer Linear Programming Formulation for 3D IC Partitioning

WAN-YU LEE, IRIS HUI-RU JIANG AND TSUNG-WAN MEI......................................... Vol. 28, No. 6, pp. 1129-1144

 

< INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE <

A Projection-Based Approach for Discovering High Average-Utility Itemsets

Guo-Cheng Lan, Tzung-Pei Hong AND Vincent S. Tseng................................. Vol. 28, No. 1, pp. 193-209

A Search Space Reduced Algorithm for Mining Frequent Patterns

Show-Jane Yen, Chiu-Kuang Wang AND Liang-YuH Ouyang............................. Vol. 28, No. 1, pp. 177-191

A Study on Genetic Algorithm and Neural Network for Mini-Games

SAI-KEUNG WONG AND SHIH-WEI FANG............................................................. Vol. 28, No. 1, pp. 145-159

A Vision-based Fast Chinese Postal Envelope Identification System

xue gao and lianwen jin............................................................................ Vol. 28, No. 1, pp. 31-49

Aggregate Two-way Co-Clustering of Ads and User Data for Online Advertisements

Meng-Lun Wu, Chia-Hui ChanG, Rui-Zhe Liu AND TENG-KAi Fan.......................... Vol. 28, No. 1, pp. 83-97

An Automatic Method for Selecting the Parameter of the Normalized Kernel Function to Support Vector Machines

CHENG-HSUAN LI, HSIN-HUA HO, YU-LUNG LIU, CHIN-TENG LIN, BOR-CHEN KUO

AND JIN-SHIUH TAUR................................................................................... Vol. 28, No. 1, pp. 1-15

Efficient Prediction-Based Location Updating and Destination Searching Mechanisms for Geographic Routing in Mobile Ad Hoc Networks

Rei-Heng Cheng and Chiming HUang........................................................... Vol. 28, No. 1, pp. 115-129

Estimation of Unknown Inlet Temperature Profile Using an Improved Gbest-PSO

Peng DING, MingHai Xu, DONGLIANG SUN........................................................ Vol. 28, No. 1, pp. 67-82

Fast Search Strategies for Fractal Image Compression

yIH-lON lIN and wEn-lIN Chen..................................................................... Vol. 28, No. 1, pp. 17-30

From Experience to Expertise: Digesting Cumulative Information for Informational Web Search

WEI-Guang Teng, WEI-Hsun Wen AND Yue-Cen Liu........................................... Vol. 28, No. 1, pp. 161-176

Mapping and Localization in 3D Environments using a 2D Laser Scanner and a Stereo Camera

Kuen-Han Lin, Chun-Hua Chang, Andreas Dopfer and Chieh-Chih Wang......... Vol. 28, No. 1, pp. 131-144

Semantic Link Analysis for Finding Answer Experts

Yao Lu, Xiaojun Quan, Jingsheng Lei, Xingliang Ni, Wenyin Liu and Yinlong Xu.. Vol. 28, No. 1, pp. 51-65

Solving Nine Layer Triangular Nim

Yi-Chang Shan, I-CHEN WU, HUNG-HSUAN LIN AND KUO-YUAN KAO....................... Vol. 28, No. 1, pp. 99-113

 

< Advance operating systems and their adaptive applications <

A Data De-duplication Access Framework for Solid State Drives

chin-hsien wu and hau-shan wu................................................................ Vol. 28, No. 5, pp. 941-954

A Platform for Supporting Dynamic Update and Resource Protection in an Embedded Operating System

mei-ling Chiang and hsiang-yu hsu............................................................ Vol. 28, No. 5, pp. 875-893

An Efficient DRM Standard Protocol Implementation for Media Cards

CHENLONG XU, JEONG SIK MUN AND SUNG-RYUL KIM.......................................... Vol. 28, No. 6, pp. 1019-1027

An Efficient Function Inlining Scheme for Resource-Constrained Embedded Systems

bongjae kim, yookun cho and jiman hong.................................................. Vol. 28, No. 5, pp. 859-874

Design of a Lightweight TCP/IP Protocol Stack with an Event-driven Scheduler

JOONHYOUK JANG, JINMAN JUNG, YOOKUN CHO, SANGHOON CHOI

AND SUNG Y. SHIN....................................................................................... Vol. 28, No. 6, pp. 1059-1071

Dynamic Frequency Scaling Schemes for Heterogeneous Clusters under Quality of Service Requirements

Jian-Jia Chen, Kai Huang and Lothar Thiele................................................. Vol. 28, No. 6, pp. 1073-1090

Efficient Detection of Malicious Web Pages Using High-Interaction Client Honeypots

hong-geun kim, dongjin kim, seong-je cho and moonju park....................... Vol. 28, No. 5, pp. 911-924

Energy Consumption Scheduler for Demand Response Systems in the Smart Grid

junghoon lee, hye-jin kim, gyung-leen park and mikyung kang.................... Vol. 28, No. 5, pp. 955-969

Enhancing Visual Rendering on Multicore Accelerators with Explicitly Managed Memories

kyunghee cho, seonggun kim and hwansoo han......................................... Vol. 28, No. 5, pp. 895-909

High-Level Synthesis for Minimum-Area Low-Power Clock Gating

Shih-hsu huang, wen-pin tu and bing-hung li.............................................. Vol. 28, No. 5, pp. 971-988

Integrated Model of Service-Oriented Architecture and Web-Oriented Architecture for Financial Software

sohyun park, jongmoo choi and haeyoung yoo......................................... Vol. 28, No. 5, pp. 925-939

Per-Client Network Performance Isolation in VDE-based Cloud Computing Servers

JAESOO LEE, JONGHUN YOO, YONGSEOK PARK AND SEONGSOO HONG.................... Vol. 28, No. 6, pp. 1045-1058

ReSSD: A Software Layer for Improving the Small Random Write Performance of SSDs

YOUNGJAE LEE, JIN-SOO KIM AND SEUNGRYOUL MAENG...................................... Vol. 28, No. 6, pp. 999-1018

Scalable Group Key Exchange for Securing Distributed Operating Systems

junghyun nam, minkyu park and sangchul han.......................................... Vol. 28, No. 5, pp. 829-857

SPAD: Software Protection Through Anti-Debugging Using Hardware-Assisted Virtualization

Zhengwei qi, bingyu li, qian lin and miao yu................................................. Vol. 28, No. 5, pp. 813-827

Unified Simulation Framework for Protocol Stacks in Sensor Operating Systems

JINMAN JUNG, BONGJAE KIM AND JIMAN HONG.................................................. Vol. 28, No. 6, pp. 1029-1043

 

< software publication track<

Open Source for Web-Based Video Editing

Hsiang-An Wang, Yen-Chun Lin, Hua-Ting LU and Shang-Te Lin....................... Vol. 28, No. 4, pp. 787-801