Forthcoming Issues
  • Vol.31 No. 1 (to be published in January 2015)
  • Vol.31 No. 2 (to be published in March 2015)



    Vol. 31 No. 1 (to be published in January 2015)

    SPECIAL ISSUE ON ARTIFICIAL INTELLIGENCE
    PAPERS
    1. The Use of Knowledge in Prediction Markets: How Much of Them Need He Know?
          BIN-TZONG CHIE AND SHU-HENG CHEN
    2. Keystroke and Mouse Movement Profiling for Data Loss Prevention
          JAIN-SHING WU, CHIH-TA LIN, YUH-JYE LEE AND SONG-KONG CHONG

    REGULAR SECTION
    3. A Novel Contour Closure Method using Ending Point Restrained Gradient Vector Flow Field
          TAO GUAN, DONGXIANG ZHOU, KEJU PENG AND YUNHUI LIU
    4. A Dynamic Compressed Accessibility Map for Secure XML Querying and Updating
          MEGHDAD MIRABI, HAMIDAH IBRAHIM, LEILA FATHI, NUR IZURA UDZIR AND ALI MAMAT
    5. A Temporal and Multi-Resolution Visualization System for Large-Scale Data
          LIEU-HEN CHEN, YU-SHENG CHEN, WEI-FAN CHEN, HAO-MING HUNG AND YASUFUMI TAKAMA
    6. DROIT: Dynamic Alternation of Dual-Level Tainting for Malware Analysis
          CHIWEI WANG AND SHIUHPYNG WINSTON SHIEH
    7. Stochastic Optimization Based 3D Dense Reconstruction from Multiple Views with High Accuracy and Completeness
          WEN-CHAO CHEN, ZEN CHEN AND PING-YI SUNG
    8. Route Pattern Mining From Personal Trajectory Data
          MINGQI LV, YINGLONG LI, ZHENMING YUAN AND QIHUI WANG
    9. An Efficient Scalable Spatial Data Search for Location-Aware Mobile Services
          KWANGJIN PARK
    10. Novel Semantics of the Top-k Queries on Uncertainly Fused Multi-Sensory Data
            DEXI LIU
    11. Approximate Clustering of Time-Series Datasets using k-Modes Partitioning
            SAEED AGHABOZORGI AND TEH YING WAH
    12. Depth-Enhanced Error Concealment for H.264 Video
            SHIH-HSUAN YANG, CHIA-LING CHU AND CHI-WEN CHANG
    13. A Fully Secure Ciphertext-Policy Attribute-Based Encryption With a Tree-Based Access Structure
            SADIKIN RIFKI, YOUNGHO PARK AND SANGJAE MOON
    14. Kernel Regression Based Online Boosting Tracking
            HONGWEI HU, BO MA, YUWEI WU, WEIZHANG MA AND KAI XIE
    15. Visual Object Tracking using Particle Filtering with Dual Manifold Models
            YINGHONG XIE AND CHENGDONG WU
    16. Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of two Schemes
            YU-CHI CHEN, RAYLIN TSO, GOWBOA HORNG, CHUN-I FAN AND RUEI-HAU HSU

    SHORT PAPERS
    17. A New Experience in Persian Text Clustering using FarsNet Ontology
            MOHAMMAD ZANJANI, AHMAD BARAANI DASTJERDI, EHSAN ASGARIAN,ALIREZA SHAHRIYARI AND AMIR AKHAVAN KHARAZIAN
    18. Reversible Data Hiding by Image Encryptions and Spatial Correlation Comparisons
            YA-LIN LEE AND WEN-HSIANG TSAI
    19. Hash-Based Password Authentication Protocol Against Phishing and Pharming Attacks
            IKSU KIM AND YONGYUN CHO
    @


    Vol. 31 No. 2 (to be published in March 2015)


    REGULAR SECTION
    PAPERS

    @

    1. A Stable Clustering Scheme Based on Adaptive Multiple Metric in Vehicular Ad-hoc Networks
          HAMID REZA ARKIAN, REZA EBRAHIMI ATANI, ATEFE POURKHALILI, SAMAN KAMALI
    2. RSAFE: A Robust Software-based Fault-Tolerant Scheme for Large-scale Ethernet Networks
          HOANG-ANH PHAM AND JONG MYUNG RHEE
    3. A Ontology Kernel V A Convolution Kernel for Ontology Alignment
          JEONG-WOO SON, HEE-GUEN YOON and SEONG-BAE PARK
    4. Improving the Time and Space Performance for Processing Keyword Queries on XML Databases
          YA-HUI CHANG AND WEI-HSI LEE
    5. MrKIP: Rootkit Recognition with Kernel Function Invocation Pattern
          CHI-WEI WANG, CHONG-KUAN CHEN, CHIA-WEI WANG, SHIUHPYNG WINSTON SHIEH
    6. A A Novel Image Compression Algorithm Based on Multitree Dictionary and Perceptual-based Rate-Distortion Optimization
          KAI-LUNG HUA, ADHATUS SOLICHAH AHMADIYAH, AND YENI ANISTYASARI
    7. Constructing Query Context Knowledge Bases for Relevant Term Suggestion
          JENQ-HAUR WANG AND MENG-HAN SHIH
    8. Feature Selection using Compact Discernibility Matrix-based Approach in Dynamic Incomplete Decision System
          WENBIN QIAN, WENHAO SHU, YONGHONG XIE3, BINGRU YANG and JUN YANG
    9. Principles of Data Flow Integrity: Specification and Enforcement
          TOKTAM RAMEZANIFARKHANI AND MOHAMMADREZA RAZZAZI
    10. PAReS: A Proactive and Adaptive Redundant System for MapReduce
            JIA-CHUN LIN, FANG-YIE LEU AND YING-PING CHEN
    11. Comparisons of Parametric Methods for Parameter Estimation of Polynomial Phase Signals
            XIUMEI LI AND GUOAN BI
    12. HR6TAP: A Hybrid RAID6 Storage Architecture Tracking Data to Any Point-in-time for Enterprise Applications
            LINGFANG ZENG, CHAO JIN, BHARADWAJ VEERAVALLI AND DAN FENG
    13. Identifying the Stances of Topic Persons Using a Model-based Expectation-Maximization Method
            ZHONG-YONG CHEN AND CHIEN CHIN CHEN
    14. A New Approach for Parameter Estimation in the Sequence-structure Alignment of Non-coding RNAs
            YINGLEI SONG AND ALBERT Y. CHI
    15. A Voice Conversion Method Combining Segmental GMM Mapping with Target Frame Selection
            HUNG-YAN GU AND SUNG-FUNG TSAI
    16. A novel twin support vector regression
            YITIAN XU
    17. Factors Influencing the Performance of Human Computation: An Empirical Study in Web Application Testing
            TSUNG-JU LEE, SHIAN-SHYONG TSENG AND CHIH-CHUN KUNG
    18. Mining Non-Redundant Substitution Rules between Sets of Items in Large Databases
            YI-CHUN CHEN AND GUANLING LEE
    19. Parameter Estimation of Chaotic Dynamical Systems Using HEQPSO
            CHIA-NAN KO, YOU-MIN JAU AND JIN-TSONG JENG
    20. An Analytical Approach to Fast Parameter Selection of Gaussian RBF Kernel for Support Vector Machine
            ZHILIANG LIU, MING J. ZUO, XIAOMIN ZHAO AND HONGBING XU
    21. Improving TCP Performance in Wireless Networks by Detection and Avoidance of Spurious Retransmission Timeouts
            SATHYA PRIYA S AND MURUGAN K
    22. Provably Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks
            KUO-YANG WU, KUO-YU TSAI, TZONG-CHEN WU AND KOUICHI SAKURAI
    @