Previous

JOURNAL OF INFORMATION SCIENCE AND ENGINEERING

JISEVol. 31 No. 3 (May 2015)

JISE 

regular section

 

PAPERS

1. Discover the Misinformation Broadcasting in On-Line Social Networks

          PEIGUANG LIN, LEI CHEN, MINGXUAN YUAN AND PEIYAO NIE......... pp. 763-785

2. Harmonic Signal Processing Method Based on the Windowing Interpolated DFT Algorithm

          XIANGUI WU AND ANNA WANG......... pp. 787-798

3. Duration High-Order Hidden Markov Models and Training Algorithms for Speech Recognition

          LEE-MIN LEE......... pp. 799-820

4. Automatic Singing Performance Evaluation Using Accompanied Vocals as Reference Bases

          WEI-HO TSAI, CIN-HAO MA AND YI-PO HSU......... pp. 821-838

5. A Full-Coverage Two-Level URL Duplication Checking Method for a High-Speed Parallel Web Crawler

          ARJUMAND YOUNUS, KYU-YOUNG WHANG, HYUK-YOON KWON AND YEON-MI YEO......... pp. 839-860

6. Salient Region Detection with Hierarchical Image Abstraction

          LIANGLIANG DUAN AND LINGFU KONG......... pp. 861-878

7. Neighbor-based Hop Size Estimation for Dense Sensor Networks

          GUANING CHEN, YAN-LING CHU AND MIN-TE SUN......... pp. 879-896

8. Patterns for Continuous Integration Builds in Cross-Platform Agile Software Development

          CHIN-YUN HSIEH AND CHIEN-TSUN CHEN......... pp. 897-924

9. Outstanding Principal as Prepayment Value: A Closed-Form Formula for Mortgage Pricing

          HYI-CHENG TSAI, CHIN-LAUNG LEI, JAN-MING HO, MING-YANG KAO AND SZU-LANG LIAO......... pp. 925-942

10.  Physical Presence Verification: A Test to Detect Whether A Computer Is Remotely Controlled

          TSUNG-TENG CHEN, CHUN-YING HUANG, CHEN-CHI WU AND KUAN-TA CHEN......... pp. 943-963

11.  Feature Selection and Extraction for Malware Classification

          CHIH-TA LIN, NAI-JIAN WANG, HAN XIAO AND CLAUDIA ECKERT......... pp. 965-992

12.  A Segmentation Transfer Approach for Rigid Models

          ESMA ELGHOUL, ANNE VERROUST-BLONDET AND MOHAMED CHAOUCH......... pp. 993-1009

13.  A Weighted Edge-Preserving Smooth Filter for High Dynamic Range Image Display

          PEI-YIN CHEN, YEU-HORNG SHIAU, HUNG-YU YANG AND WAN-YU JHUANG......... pp. 1011-1026

14.  A Self-Adaptive Intelligent Control System with Hierarchical Architecture

          CHENG-HSIUNG CHIANG AND LIANG-HSUAN CHEN......... pp. 1027-1049

15.  A Cloud Service Implementation for Evaluating Design Pattern in Software Evolution

          DER-HONG TING, NIEN-LIN HSUEH, CHAO-TUNG YANG AND CHIN-HUNG CHANG......... pp. 1051-1070

16.  Clip Space Sample Culling for Motion Blur and Defocus Blur

          YI-JENG WU, DER-LOR WAY, YU-TING TSAI AND ZEN-CHUNG SHIH......... pp. 1071-1084

17.  The Pseudorandomness of Many-Round Lai-Massey Scheme

          YIYUAN LUO, XUEJIA LAI AND JING HU......... pp. 1085-1096

18. Bypass Cell-phone-verification Through a Smartphone-based Botnet

          FU-HAU HSU, CHI-HSIEN HSU, CHUAN-SHENG WANG, PEI-HSUN LEE, RUEI-MIN JIANG AND JIA-SIAN JHANG......... pp. 1097-1111

19.  LS-LRU: A Lazy-Split LRU Buffer Replacement Policy for Flash-Based B+-tree Index

          RIZE JIN, HYUNG-JU CHO AND TAE-SUN CHUNG......... pp. 1113-1132

20.  Self-Supervised Synonym Extraction from the Web

          FANGHUAI HU, ZHIQING SHAO AND TONG RUAN......... pp. 1133-1148

21.  Clustering Using Local and Global Exponential Discriminant Regularization

          NASIR AHMED, ABDUL JALIL AND ASIFULLAH KHAN......... pp. 1149-1164