callback( { "result":{ "query":":facetid:toc:\"db/journals/jise/jise27.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"211.78" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"119", "@dc":"119", "@oc":"119", "@id":"43473271", "text":":facetid:toc:db/journals/jise/jise27.bht" } }, "hits":{ "@total":"119", "@computed":"119", "@sent":"119", "@first":"0", "hit":[{ "@score":"1", "@id":"4586935", "info":{"authors":{"author":[{"@pid":"62/8456","text":"Reza Akbari"},{"@pid":"71/6809","text":"Koorush Ziarati"}]},"title":"A Cooperative Approach to Bee Swarm Optimization.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"3","pages":"799-818","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/AkbariZ11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201105_01.html","url":"https://dblp.org/rec/journals/jise/AkbariZ11"}, "url":"URL#4586935" }, { "@score":"1", "@id":"4586936", "info":{"authors":{"author":[{"@pid":"93/5030","text":"Ehsan Khosrowshahi Asl"},{"@pid":"09/7437","text":"Majid Noorhosseini"},{"@pid":"81/10398","text":"Atieh Saberi Pirouz"}]},"title":"A Dynamic Ant Colony Based Routing Algorithm for Mobile Ad-hoc Networks.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"5","pages":"1581-1596","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/AslNP11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201109_05.html","url":"https://dblp.org/rec/journals/jise/AslNP11"}, "url":"URL#4586936" }, { "@score":"1", "@id":"4586937", "info":{"authors":{"author":[{"@pid":"89/8174","text":"Maisam Mansub Bassiri"},{"@pid":"20/6614","text":"Hadi Shahriar Shahhoseini"}]},"title":"Future-based On-line Integrated HW/SW Partitioning and Co-scheduling for Reconfigurable Computing Systems.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"5","pages":"1687-1711","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/BassiriS11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201109_11.html","url":"https://dblp.org/rec/journals/jise/BassiriS11"}, "url":"URL#4586937" }, { "@score":"1", "@id":"4586938", "info":{"authors":{"author":[{"@pid":"14/9788","text":"Hoa-Yu Chan"},{"@pid":"79/2808","text":"Kuu-Young Young"},{"@pid":"84/2260","text":"Hsin-Chia Fu"}]},"title":"Intention Learning From Human Demonstration.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"3","pages":"1123-1136","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/ChanYF11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201105_20.html","url":"https://dblp.org/rec/journals/jise/ChanYF11"}, "url":"URL#4586938" }, { "@score":"1", "@id":"4586939", "info":{"authors":{"author":{"@pid":"51/1303","text":"Jyh-Huei Chang"}},"title":"An Efficient Relay Sensor Placing Algorithm for Connectivity in Wireless Sensor Networks.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"1","pages":"381-392","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/Chang11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201101_24.html","url":"https://dblp.org/rec/journals/jise/Chang11"}, "url":"URL#4586939" }, { "@score":"1", "@id":"4586940", "info":{"authors":{"author":[{"@pid":"33/3869","text":"Hsung-Pin Chang"},{"@pid":"71/3654","text":"Yu-Chieh Lin"},{"@pid":"91/3371","text":"Da-Wei Chang"}]},"title":"An Online Reprogrammable Operating System for Wireless Sensor Networks.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"1","pages":"261-286","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/ChangLC11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201101_17.html","url":"https://dblp.org/rec/journals/jise/ChangLC11"}, "url":"URL#4586940" }, { "@score":"1", "@id":"4586941", "info":{"authors":{"author":[{"@pid":"76/2184","text":"Chih-Tang Chang"},{"@pid":"29/1408","text":"Jim Z. C. Lai"},{"@pid":"08/1094","text":"Mu-Der Jeng"}]},"title":"A Fuzzy K-means Clustering Algorithm Using Cluster Center Displacement.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"3","pages":"995-1009","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/ChangLJ11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201105_12.html","url":"https://dblp.org/rec/journals/jise/ChangLJ11"}, "url":"URL#4586941" }, { "@score":"1", "@id":"4586942", "info":{"authors":{"author":[{"@pid":"89/2443","text":"Liang-Bi Chen"},{"@pid":"00/9788","text":"Yen-Ling Chen"},{"@pid":"67/2758","text":"Ing-Jer Huang"}]},"title":"A Real-Time Power Analysis Platform for Power-Aware Embedded System Development.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"3","pages":"1165-1182","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/ChenCH11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201105_24.html","url":"https://dblp.org/rec/journals/jise/ChenCH11"}, "url":"URL#4586942" }, { "@score":"1", "@id":"4586943", "info":{"authors":{"author":[{"@pid":"75/2054","text":"Lieu-Hen Chen"},{"@pid":"20/902","text":"Yu-Sheng Chen"},{"@pid":"80/7874","text":"Tsung-Chih Tsai"}]},"title":"Perceptual LOD under Low Resolution Conditions.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"3","pages":"1045-1057","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/ChenCT11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201105_15.html","url":"https://dblp.org/rec/journals/jise/ChenCT11"}, "url":"URL#4586943" }, { "@score":"1", "@id":"4586944", "info":{"authors":{"author":[{"@pid":"78/7440","text":"Sin-Yu Chen"},{"@pid":"83/5722","text":"Jun-Wei Hsieh"},{"@pid":"53/4769","text":"Duan-Yu Chen"}]},"title":"Jointing Edge Labeling and Geometrical Constraint for Lane Detection and its Application to Suspicious Driving Behavior Analysis.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"2","pages":"715-732","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/ChenHC11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201103_19.html","url":"https://dblp.org/rec/journals/jise/ChenHC11"}, "url":"URL#4586944" }, { "@score":"1", "@id":"4586945", "info":{"authors":{"author":[{"@pid":"31/8571","text":"Li-Han Chen"},{"@pid":"38/3634","text":"Fu-Hau Hsu"},{"@pid":"16/2881","text":"Cheng-Hsien Huang"},{"@pid":"05/8568","text":"Chih-Wen Ou"},{"@pid":"15/9788","text":"Chia-Jun Lin"},{"@pid":"08/9788","text":"Szu-Chi Liu"}]},"title":"A Robust Kernel-Based Solution to Control-Hijacking Buffer Overflow Attacks.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"3","pages":"869-890","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/ChenHHOLL11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201105_05.html","url":"https://dblp.org/rec/journals/jise/ChenHHOLL11"}, "url":"URL#4586945" }, { "@score":"1", "@id":"4586946", "info":{"authors":{"author":[{"@pid":"68/6984","text":"Ying-Nong Chen"},{"@pid":"98/263","text":"Chin-Chuan Han"},{"@pid":"65/2661","text":"Cheng-Tzu Wang"},{"@pid":"f/KuoChinFan","text":"Kuo-Chin Fan"}]},"title":"A Novel Scheme for Face Recognition and Authentication Against Pose, Illumination and Expression Changes.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"1","pages":"369-380","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/ChenHWF11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201101_23.html","url":"https://dblp.org/rec/journals/jise/ChenHWF11"}, "url":"URL#4586946" }, { "@score":"1", "@id":"4586947", "info":{"authors":{"author":[{"@pid":"88/612","text":"Tsong Yueh Chen"},{"@pid":"81/3205","text":"Dehao Huang"},{"@pid":"77/5181","text":"Zhiquan Zhou"}]},"title":"On Adaptive Random Testing Through Iterative Partitioning.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"4","pages":"1449-1472","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/ChenHZ11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201107_16.html","url":"https://dblp.org/rec/journals/jise/ChenHZ11"}, "url":"URL#4586947" }, { "@score":"1", "@id":"4586948", "info":{"authors":{"author":[{"@pid":"36/5842","text":"Wei-Chih Chen"},{"@pid":"34/2231","text":"Jyh-Horng Jeng"}]},"title":"Characterization of WOSF by Equivalent Classes through Support Vector Machine.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"1","pages":"227-242","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/ChenJ11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201101_15.html","url":"https://dblp.org/rec/journals/jise/ChenJ11"}, "url":"URL#4586948" }, { "@score":"1", "@id":"4586949", "info":{"authors":{"author":[{"@pid":"66/3949","text":"Jia-Ming Chen"},{"@pid":"53/1886","text":"Jenq-Shiou Leu"},{"@pid":"08/3359","text":"Yen-Chiu Chen"},{"@pid":"25/1656","text":"Hsin-Wen Wei"},{"@pid":"16/5006","text":"Wei-Kuan Shih"}]},"title":"MegaDrop: A Cooperative Video-on-Demand System in a Peer-to-Peer Environment.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"4","pages":"1345-1361","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/ChenLCWS11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201107_10.html","url":"https://dblp.org/rec/journals/jise/ChenLCWS11"}, "url":"URL#4586949" }, { "@score":"1", "@id":"4586950", "info":{"authors":{"author":[{"@pid":"66/5488","text":"Jian-Hong Chen"},{"@pid":"88/9049","text":"Yong-Tao Wang"},{"@pid":"14/9050","text":"Ke-Fei Chen"}]},"title":"Attribute-Based Key-Insulated Encryption.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"2","pages":"437-449","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/ChenWC11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201103_03.html","url":"https://dblp.org/rec/journals/jise/ChenWC11"}, "url":"URL#4586950" }, { "@score":"1", "@id":"4586951", "info":{"authors":{"author":[{"@pid":"71/5527","text":"Min-Rong Chen"},{"@pid":"87/1222","text":"Xi Zhang"},{"@pid":"97/30-6","text":"Xia Li 0006"}]},"title":"Comments on Shao-Cao's Unidirectional Proxy Re-Encryption Scheme from PKC 2009.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"3","pages":"1153-1158","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/ChenZL11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201105_22.html","url":"https://dblp.org/rec/journals/jise/ChenZL11"}, "url":"URL#4586951" }, { "@score":"1", "@id":"4586952", "info":{"authors":{"author":{"@pid":"16/6905","text":"Hung-Yu Chien"}},"title":"Secure Verifier-Based Three-Party Key Exchange in the Random Oracle Model.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"4","pages":"1487-1501","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/Chien11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201107_18.html","url":"https://dblp.org/rec/journals/jise/Chien11"}, "url":"URL#4586952" }, { "@score":"1", "@id":"4586953", "info":{"authors":{"author":[{"@pid":"29/5022","text":"Shih-Chien Chou"},{"@pid":"86/10398","text":"Jin-Yuan Jhu"}]},"title":"Embedding Access Control Policy in Web Service Path Composition Algorithm.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"6","pages":"1839-1853","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/ChouJ11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201111_03.html","url":"https://dblp.org/rec/journals/jise/ChouJ11"}, "url":"URL#4586953" }, { "@score":"1", "@id":"4586954", "info":{"authors":{"author":[{"@pid":"78/6916","text":"Po-Jen Chuang"},{"@pid":"90/9411","text":"Jer-Sheng Deng"},{"@pid":"03/5302","text":"Chih-Shin Lin"}]},"title":"Location Privacy Protection Using Independent ID Update for WLANs.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"2","pages":"403-418","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/ChuangDL11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201103_01.html","url":"https://dblp.org/rec/journals/jise/ChuangDL11"}, "url":"URL#4586954" }, { "@score":"1", "@id":"4586955", "info":{"authors":{"author":[{"@pid":"78/6916","text":"Po-Jen Chuang"},{"@pid":"75/974","text":"Cheng-Pei Wu"}]},"title":"Employing PSO to Enhance RSS Range-Based Node Localization for Wireless Sensor Networks.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"5","pages":"1597-1611","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/ChuangW11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201109_06.html","url":"https://dblp.org/rec/journals/jise/ChuangW11"}, "url":"URL#4586955" }, { "@score":"1", "@id":"4586956", "info":{"authors":{"author":[{"@pid":"06/1511","text":"Dezun Dong"},{"@pid":"87/4982-1","text":"Mo Li 0001"},{"@pid":"27/2403","text":"Yunhao Liu 0001"},{"@pid":"22/562","text":"Xiangke Liao"}]},"title":"Connectivity-Based Wormhole Detection in Ubiquitous Sensor Networks.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"1","pages":"65-78","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/DongLLL11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201101_05.html","url":"https://dblp.org/rec/journals/jise/DongLLL11"}, "url":"URL#4586956" }, { "@score":"1", "@id":"4586957", "info":{"authors":{"author":[{"@pid":"10/8458","text":"Zafer Erenel"},{"@pid":"13/6635","text":"Hakan Altinçay"},{"@pid":"10/165","text":"Ekrem Varoglu"}]},"title":"Explicit Use of Term Occurrence Probabilities for Term Weighting in Text Categorization.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"3","pages":"819-834","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/ErenelAV11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201105_02.html","url":"https://dblp.org/rec/journals/jise/ErenelAV11"}, "url":"URL#4586957" }, { "@score":"1", "@id":"4586958", "info":{"authors":{"author":[{"@pid":"162/9263","text":"Seyed Mostafa Fakhrahmad"},{"@pid":"30/7731","text":"Gholamhosein Dastghaibyfard"}]},"title":"An Efficient Frequent Pattern Mining Method and its Parallelization in Transactional Databases.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"2","pages":"511-525","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/FakhrahmadD11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201103_08.html","url":"https://dblp.org/rec/journals/jise/FakhrahmadD11"}, "url":"URL#4586958" }, { "@score":"1", "@id":"4586959", "info":{"authors":{"author":[{"@pid":"40/697","text":"Chi-Hung Fan"},{"@pid":"42/2734","text":"Hui-Yu Huang"},{"@pid":"64/1764","text":"Wen-Hsing Hsu"}]},"title":"A Robust Watermarking Technique Resistant JPEG Compression.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"1","pages":"163-180","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/FanHH11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201101_11.html","url":"https://dblp.org/rec/journals/jise/FanHH11"}, "url":"URL#4586959" }, { "@score":"1", "@id":"4586960", "info":{"authors":{"author":[{"@pid":"34/1432","text":"Chun-I Fan"},{"@pid":"89/936","text":"Ruei-Hau Hsu"},{"@pid":"24/1021","text":"Pei-Hsiu Ho"}]},"title":"Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"3","pages":"969-982","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/FanHH11a","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201105_10.html","url":"https://dblp.org/rec/journals/jise/FanHH11a"}, "url":"URL#4586960" }, { "@score":"1", "@id":"4586961", "info":{"authors":{"author":[{"@pid":"98/902","text":"Shaojing Fu"},{"@pid":"30/5583-1","text":"Bing Sun 0001"},{"@pid":"66/190-2","text":"Chao Li 0002"},{"@pid":"60/5970","text":"Longjiang Qu"}]},"title":"Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"6","pages":"1931-1942","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/FuSLQ11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201111_09.html","url":"https://dblp.org/rec/journals/jise/FuSLQ11"}, "url":"URL#4586961" }, { "@score":"1", "@id":"4586962", "info":{"authors":{"author":[{"@pid":"12/32","text":"Hung-Yan Gu"},{"@pid":"56/9050","text":"Huang-Liang Liao"}]},"title":"Mandarin Singing-voice Synthesis Using an HNM Based Scheme.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"1","pages":"303-317","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/GuL11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201101_19.html","url":"https://dblp.org/rec/journals/jise/GuL11"}, "url":"URL#4586962" }, { "@score":"1", "@id":"4586963", "info":{"authors":{"author":[{"@pid":"12/32","text":"Hung-Yan Gu"},{"@pid":"76/10398","text":"Chung-Chieh Yang"}]},"title":"An HMM Based Pitch-Contour Generation Method for Mandarin Speech Synthesis.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"5","pages":"1561-1580","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/GuY11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201109_04.html","url":"https://dblp.org/rec/journals/jise/GuY11"}, "url":"URL#4586963" }, { "@score":"1", "@id":"4586964", "info":{"authors":{"author":[{"@pid":"50/7213","text":"Malik Tahir Hassan"},{"@pid":"63/6093","text":"Asim Karim"}]},"title":"Impact of Behavior Clustering on Web Surfer Behavior Prediction.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"6","pages":"1855-1870","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/HassanK11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201111_04.html","url":"https://dblp.org/rec/journals/jise/HassanK11"}, "url":"URL#4586964" }, { "@score":"1", "@id":"4586965", "info":{"authors":{"author":[{"@pid":"88/48","text":"Tung-Yang Ho"},{"@pid":"16/5439","text":"Cheng-Kuan Lin"},{"@pid":"09/5903","text":"Jimmy J. M. Tan"},{"@pid":"h/DFrankHsu","text":"D. Frank Hsu"},{"@pid":"22/1324","text":"Lih-Hsing Hsu"}]},"title":"On the Extremal Number of Edges in Hamiltonian Graphs.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"5","pages":"1659-1665","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/HoLTHH11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201109_09.html","url":"https://dblp.org/rec/journals/jise/HoLTHH11"}, "url":"URL#4586965" }, { "@score":"1", "@id":"4586966", "info":{"authors":{"author":[{"@pid":"54/4093","text":"Chen-Chiung Hsieh"},{"@pid":"08/1317","text":"Yo-Ping Huang"},{"@pid":"07/6716","text":"Yu-Yi Chen"},{"@pid":"95/2319","text":"Chiou-Shann Fuh"}]},"title":"Video Super-Resolution by Motion Compensated Iterative Back-Projection Approach.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"3","pages":"1107-1122","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/HsiehHCF11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201105_19.html","url":"https://dblp.org/rec/journals/jise/HsiehHCF11"}, "url":"URL#4586966" }, { "@score":"1", "@id":"4586967", "info":{"authors":{"author":[{"@pid":"70/7567","text":"Hwai-Jung Hsu"},{"@pid":"65/6289","text":"Feng-Jian Wang"}]},"title":"A Delegation Framework for Task-Role Based Access Control in WFMS.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"3","pages":"1011-1028","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/HsuW11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201105_13.html","url":"https://dblp.org/rec/journals/jise/HsuW11"}, "url":"URL#4586967" }, { "@score":"1", "@id":"4586968", "info":{"authors":{"author":{"@pid":"61/6175","text":"Chih-Lin Hu"}},"title":"Adaptive Scheduling for On-Demand Time-Critical Information Dissemination over Data Broadcast Channel.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"6","pages":"1959-1983","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/Hu11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201111_11.html","url":"https://dblp.org/rec/journals/jise/Hu11"}, "url":"URL#4586968" }, { "@score":"1", "@id":"4586969", "info":{"authors":{"author":[{"@pid":"33/4837","text":"Shih-Hsu Huang"},{"@pid":"71/10398","text":"Guan-Yu Jhuo"},{"@pid":"22/9355","text":"Wei-Lun Huang"}]},"title":"Minimum Inserted Buffers for Clock Period Minimization.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"5","pages":"1513-1526","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/HuangJH11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201109_01.html","url":"https://dblp.org/rec/journals/jise/HuangJH11"}, "url":"URL#4586969" }, { "@score":"1", "@id":"4586970", "info":{"authors":{"author":[{"@pid":"50/873","text":"Chin-Pan Huang"},{"@pid":"72/6002","text":"Ching-Chung Li"}]},"title":"Secret Image Sharing Using Multiwavelet Transform.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"2","pages":"733-748","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/HuangL11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201103_20.html","url":"https://dblp.org/rec/journals/jise/HuangL11"}, "url":"URL#4586970" }, { "@score":"1", "@id":"4586971", "info":{"authors":{"author":[{"@pid":"18/3017","text":"Hankook Jang"},{"@pid":"46/10274","text":"Sang-Hwa Chung"},{"@pid":"67/1620","text":"Dong Kyue Kim"},{"@pid":"62/1053","text":"Yun-Sung Lee"}]},"title":"An Efficient Architecture for a TCP Offload Engine Based on Hardware/Software Co-design.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"2","pages":"493-509","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/JangCKL11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201103_07.html","url":"https://dblp.org/rec/journals/jise/JangCKL11"}, "url":"URL#4586971" }, { "@score":"1", "@id":"4586972", "info":{"authors":{"author":[{"@pid":"77/5892","text":"Hyun-Su Jang"},{"@pid":"29/7676","text":"Changhwan Song"},{"@pid":"98/2094","text":"Moon Jeong Kim"},{"@pid":"52/3479","text":"Young Ik Eom"}]},"title":"Agent-based Intelligent Middleware for User-Centric Services in Ubiquitous Computing Environments.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"5","pages":"1729-1746","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/JangSKE11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201109_13.html","url":"https://dblp.org/rec/journals/jise/JangSKE11"}, "url":"URL#4586972" }, { "@score":"1", "@id":"4586973", "info":{"authors":{"author":[{"@pid":"94/5277","text":"Bingchiang Jeng"},{"@pid":"42/4717","text":"Dowming Yeh"},{"@pid":"01/9788","text":"Deron Wang"},{"@pid":"02/9788","text":"Shu-Lan Chu"},{"@pid":"00/415","text":"Chia-Mei Chen"}]},"title":"A Specific Effort Estimation Method Using Function Point.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"4","pages":"1363-1376","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/JengYWCC11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201107_11.html","url":"https://dblp.org/rec/journals/jise/JengYWCC11"}, "url":"URL#4586973" }, { "@score":"1", "@id":"4586974", "info":{"authors":{"author":[{"@pid":"70/6907","text":"Jehn-Ruey Jiang"},{"@pid":"63/6304","text":"Jang-Ping Sheu"},{"@pid":"05/4798","text":"Ching Tu"},{"@pid":"68/7827","text":"Jih-Wei Wu"}]},"title":"An Anonymous Path Routing (APR) Protocol for Wireless Sensor Networks.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"2","pages":"657-680","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/JiangSTW11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201103_16.html","url":"https://dblp.org/rec/journals/jise/JiangSTW11"}, "url":"URL#4586974" }, { "@score":"1", "@id":"4586975", "info":{"authors":{"author":[{"@pid":"23/3869","text":"Woo-Sung Jung"},{"@pid":"53/3079","text":"Eun-Joo Lee"},{"@pid":"29/9414","text":"Kap-Su Kim"},{"@pid":"02/9414","text":"Chi-Su Wu"}]},"title":"An Entropy-Based Complexity Measure for Web Applications Using Structural Information.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"2","pages":"595-619","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/JungLKW11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201103_13.html","url":"https://dblp.org/rec/journals/jise/JungLKW11"}, "url":"URL#4586975" }, { "@score":"1", "@id":"4586976", "info":{"authors":{"author":[{"@pid":"59/2013","text":"Woosung Jung"},{"@pid":"16/381","text":"Eunjoo Lee"},{"@pid":"85/5268","text":"Chisu Wu"}]},"title":"An Experimental Approach to Detect Similar Web Pages Based on 3-Levels of Similarity Clues.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"6","pages":"1787-1822","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/JungLW11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201111_01.html","url":"https://dblp.org/rec/journals/jise/JungLW11"}, "url":"URL#4586976" }, { "@score":"1", "@id":"4586977", "info":{"authors":{"author":[{"@pid":"72/902","text":"Hyosook Jung"},{"@pid":"38/6480","text":"Seongbin Park"}]},"title":"Mashup Creation Using a Mashup Rule Language.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"2","pages":"761-775","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/JungP11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201103_22.html","url":"https://dblp.org/rec/journals/jise/JungP11"}, "url":"URL#4586977" }, { "@score":"1", "@id":"4586978", "info":{"authors":{"author":{"@pid":"54/333","text":"Min-Ki Kim"}},"title":"Palmprint Recognition Based on Line and Slope Orientation Features.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"4","pages":"1219-1232","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/Kim11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201107_02.html","url":"https://dblp.org/rec/journals/jise/Kim11"}, "url":"URL#4586978" }, { "@score":"1", "@id":"4586979", "info":{"authors":{"author":[{"@pid":"60/7190","text":"Seok Kyoo Kim"},{"@pid":"39/5246","text":"Juno Chang"},{"@pid":"h/SangyongHan","text":"Sang-Yong Han"}]},"title":"Implementation of Business Logic Framework for Collaboration of Heterogeneous Service Systems in RFID/USN Environment.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"3","pages":"1073-1089","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/KimCH11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201105_17.html","url":"https://dblp.org/rec/journals/jise/KimCH11"}, "url":"URL#4586979" }, { "@score":"1", "@id":"4586980", "info":{"authors":{"author":[{"@pid":"37/1376","text":"Shin Gyu Kim"},{"@pid":"17/5450","text":"Hyuck Han"},{"@pid":"45/1270","text":"Hyungsoo Jung 0001"},{"@pid":"54/1476","text":"Hyeonsang Eom"},{"@pid":"58/4211","text":"Heon Young Yeom"}]},"title":"Improving MapReduce Performance by Exploiting Input Redundancy.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"3","pages":"1137-1152","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/KimHJEY11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201105_21.html","url":"https://dblp.org/rec/journals/jise/KimHJEY11"}, "url":"URL#4586980" }, { "@score":"1", "@id":"4586981", "info":{"authors":{"author":[{"@pid":"77/4631","text":"Kyunghwi Kim"},{"@pid":"19/9197","text":"Byunghyuk Jung"},{"@pid":"l/WonjunLee","text":"Wonjun Lee 0001"},{"@pid":"d/DingZhuDu","text":"Ding-Zhu Du"}]},"title":"Adaptive Path Planning for Randomly Deployed Wireless Sensor Networks.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"3","pages":"1091-1106","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/KimJLD11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201105_18.html","url":"https://dblp.org/rec/journals/jise/KimJLD11"}, "url":"URL#4586981" }, { "@score":"1", "@id":"4586982", "info":{"authors":{"author":[{"@pid":"45/8376","text":"Sunwook Kim"},{"@pid":"70/263","text":"Seongwoon Kim"},{"@pid":"01/2102","text":"Kyoung Park"},{"@pid":"31/2496","text":"Yongwha Chung"}]},"title":"Offloading Socket Processing for Ubiquitous Services.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"1","pages":"19-33","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/KimKPC11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201101_02.html","url":"https://dblp.org/rec/journals/jise/KimKPC11"}, "url":"URL#4586982" }, { "@score":"1", "@id":"4586983", "info":{"authors":{"author":[{"@pid":"05/9414","text":"Chao-Hui Ko"},{"@pid":"67/5215","text":"Ching-Tsorng Tsai"},{"@pid":"56/3383","text":"Chishyan Liaw"}]},"title":"The Linear Quantization Strategy of Quadratic Hebbian-Type Associative Memories and Their Performance Analysis.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"2","pages":"481-492","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/KoTL11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201103_06.html","url":"https://dblp.org/rec/journals/jise/KoTL11"}, "url":"URL#4586983" }, { "@score":"1", "@id":"4586984", "info":{"authors":{"author":[{"@pid":"77/3498","text":"Chung-Feng Jeffrey Kuo"},{"@pid":"81/5131","text":"Chin-Hsun Chiu"}]},"title":"Improved Auto-Focus Search Algorithms for CMOS Image-Sensing Module.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"4","pages":"1377-1393","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/KuoC11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201107_12.html","url":"https://dblp.org/rec/journals/jise/KuoC11"}, "url":"URL#4586984" }, { "@score":"1", "@id":"4586985", "info":{"authors":{"author":[{"@pid":"59/234","text":"Gu Hsin Lai"},{"@pid":"90/5287","text":"Chen-Sen Ouyang"},{"@pid":"00/415","text":"Chia-Mei Chen"}]},"title":"A Group-Based Deployment for Wormhole Prevention in Sensor Networks.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"1","pages":"79-93","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/LaiOC11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201101_06.html","url":"https://dblp.org/rec/journals/jise/LaiOC11"}, "url":"URL#4586985" }, { "@score":"1", "@id":"4586986", "info":{"authors":{"author":{"@pid":"05/122","text":"Lee-Min Lee"}},"title":"High-Order Hidden Markov Model and Application to Continuous Mandarin Digit Recognition.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"6","pages":"1919-1930","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/Lee11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201111_08.html","url":"https://dblp.org/rec/journals/jise/Lee11"}, "url":"URL#4586986" }, { "@score":"1", "@id":"4586987", "info":{"authors":{"author":[{"@pid":"18/6000","text":"Jeng-Farn Lee"},{"@pid":"10/9788","text":"Yuan-Neng Hsu"}]},"title":"Fairness Provisioning in Multi-hop Wireless Backhaul Networks: A Dynamic Estimation Approach.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"3","pages":"835-853","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/LeeH11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201105_03.html","url":"https://dblp.org/rec/journals/jise/LeeH11"}, "url":"URL#4586987" }, { "@score":"1", "@id":"4586988", "info":{"authors":{"author":[{"@pid":"38/412","text":"Chih-Hung Lee"},{"@pid":"33/4837","text":"Shih-Hsu Huang"},{"@pid":"44/5907","text":"Chun-Hua Cheng"}]},"title":"Accurate TSV Number Minimization in High-Level Synthesis.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"5","pages":"1527-1543","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/LeeHC11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201109_02.html","url":"https://dblp.org/rec/journals/jise/LeeHC11"}, "url":"URL#4586988" }, { "@score":"1", "@id":"4586989", "info":{"authors":{"author":[{"@pid":"28/4292","text":"Jae-Won Lee"},{"@pid":"75/6990","text":"Han-Joon Kim"},{"@pid":"67/5511","text":"Sang-goo Lee"}]},"title":"Exploiting Taxonomic Knowledge for Personalized Search: A Bayesian Belief Network-based Approach.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"4","pages":"1413-1433","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/LeeKL11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201107_14.html","url":"https://dblp.org/rec/journals/jise/LeeKL11"}, "url":"URL#4586989" }, { "@score":"1", "@id":"4586990", "info":{"authors":{"author":[{"@pid":"31/6018","text":"Ig-hoon Lee"},{"@pid":"67/5511","text":"Sang-goo Lee"},{"@pid":"s/JHShim","text":"Junho Shim"}]},"title":"Making T-Trees Cache Conscious on Commodity Microprocessors.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"1","pages":"143-161","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/LeeLS11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201101_10.html","url":"https://dblp.org/rec/journals/jise/LeeLS11"}, "url":"URL#4586990" }, { "@score":"1", "@id":"4586991", "info":{"authors":{"author":[{"@pid":"62/8455","text":"Byunghee Lee"},{"@pid":"62/1901","text":"Kyungho Son"},{"@pid":"38/3038","text":"Dongho Won"},{"@pid":"81/812","text":"Seungjoo Kim"}]},"title":"Secure Data Deletion for USB Flash Memory.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"3","pages":"933-952","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/LeeSWK11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201105_08.html","url":"https://dblp.org/rec/journals/jise/LeeSWK11"}, "url":"URL#4586991" }, { "@score":"1", "@id":"4586992", "info":{"authors":{"author":[{"@pid":"15/4946","text":"Chia-Jung Lee"},{"@pid":"29/847","text":"Shi-Chun Tsai"}]},"title":"Alternating Runs of Geometrically Distributed Random Variables.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"3","pages":"1029-1044","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/LeeT11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201105_14.html","url":"https://dblp.org/rec/journals/jise/LeeT11"}, "url":"URL#4586992" }, { "@score":"1", "@id":"4586993", "info":{"authors":{"author":[{"@pid":"98/9787","text":"Che-Wei Lee"},{"@pid":"12/2512","text":"Wen-Hsiang Tsai"}]},"title":"A Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"4","pages":"1265-1282","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/LeeT11a","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201107_05.html","url":"https://dblp.org/rec/journals/jise/LeeT11a"}, "url":"URL#4586993" }, { "@score":"1", "@id":"4586994", "info":{"authors":{"author":[{"@pid":"74/2853","text":"Yan-Jun Li"},{"@pid":"95/9087","text":"Wen-Ling Wu"}]},"title":"Improved Integral Attacks on Rijndael.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"6","pages":"2031-2045","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/LiW11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201111_15.html","url":"https://dblp.org/rec/journals/jise/LiW11"}, "url":"URL#4586994" }, { "@score":"1", "@id":"4586995", "info":{"authors":{"author":[{"@pid":"22/1835-2","text":"Shen Li 0002"},{"@pid":"42/9050","text":"Andong Zhan"},{"@pid":"68/2855","text":"Xiaobing Wu"},{"@pid":"79/1482","text":"Panlong Yang"},{"@pid":"51/1742","text":"Guihai Chen"}]},"title":"Efficient Emergency Rescue Navigation with Wireless Sensor Networks.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"1","pages":"51-64","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/LiZWYC11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201101_04.html","url":"https://dblp.org/rec/journals/jise/LiZWYC11"}, "url":"URL#4586995" }, { "@score":"1", "@id":"4586996", "info":{"authors":{"author":{"@pid":"33/1218","text":"Hung-Yi Lin"}},"title":"High Index Compression without the Dependencies of Data Orders and Data Skewness for Spatial Databases.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"2","pages":"561-576","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/Lin11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201103_11.html","url":"https://dblp.org/rec/journals/jise/Lin11"}, "url":"URL#4586996" }, { "@score":"1", "@id":"4586997", "info":{"authors":{"author":[{"@pid":"85/86","text":"Chia-Yi Lin"},{"@pid":"70/3994","text":"Hung-Ming Chen"}]},"title":"A Generic Multi-Dimensional Scan-Control Scheme for Test-Cost Reduction.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"6","pages":"1943-1957","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/LinC11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201111_10.html","url":"https://dblp.org/rec/journals/jise/LinC11"}, "url":"URL#4586997" }, { "@score":"1", "@id":"4586998", "info":{"authors":{"author":[{"@pid":"32/5086","text":"Sheng-Fuu Lin"},{"@pid":"51/9412","text":"Hsien-Tse Chen"},{"@pid":"17/3248","text":"Yi-Hsien Lin"}]},"title":"Automatic Counting Cancer Cell Colonies using Fuzzy Inference System.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"2","pages":"749-760","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/LinCL11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201103_21.html","url":"https://dblp.org/rec/journals/jise/LinCL11"}, "url":"URL#4586998" }, { "@score":"1", "@id":"4586999", "info":{"authors":{"author":[{"@pid":"31/5439","text":"Cheng-Chen Lin"},{"@pid":"45/4892","text":"Yin-Tsung Hwang"}]},"title":"Lossless Compression of Hyperspectral Images Using Adaptive Prediction and Backward Search Schemes.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"2","pages":"419-435","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/LinH11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201103_02.html","url":"https://dblp.org/rec/journals/jise/LinH11"}, "url":"URL#4586999" }, { "@score":"1", "@id":"4587000", "info":{"authors":{"author":[{"@pid":"82/10397","text":"Dong-Wei Lin"},{"@pid":"49/10398","text":"Jin-Long Hsieh"},{"@pid":"65/5446","text":"Shih-Hsuan Yang"},{"@pid":"30/10398","text":"Chia-Chi Yang"}]},"title":"Fast Inter-Mode Selection for H.264 Encoders Based on Coded Block Patterns and Interblock Correlation.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"6","pages":"1901-1917","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/LinHYY11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201111_07.html","url":"https://dblp.org/rec/journals/jise/LinHYY11"}, "url":"URL#4587000" }, { "@score":"1", "@id":"4587001", "info":{"authors":{"author":[{"@pid":"75/9049","text":"Jia-Ru Lin"},{"@pid":"11/3246","text":"I-Chen Lin"}]},"title":"Multi-layered Expression Synthesis.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"1","pages":"337-351","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/LinL11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201101_21.html","url":"https://dblp.org/rec/journals/jise/LinL11"}, "url":"URL#4587001" }, { "@score":"1", "@id":"4587002", "info":{"authors":{"author":[{"@pid":"63/1099","text":"Shun-Chieh Lin"},{"@pid":"10/8414","text":"Min-Jian Liao"},{"@pid":"64/9050","text":"Yi-Lin Chiang"}]},"title":"Design and Analysis of Multi-Source Extraction and Localization for Sound-Activated Designation of Automata.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"1","pages":"1-18","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/LinLC11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201101_01.html","url":"https://dblp.org/rec/journals/jise/LinLC11"}, "url":"URL#4587002" }, { "@score":"1", "@id":"4587003", "info":{"authors":{"author":[{"@pid":"57/58","text":"Hwei-Jen Lin"},{"@pid":"61/444","text":"Hung-Hsuan Wu"},{"@pid":"47/7868","text":"Chun-Wei Wang"}]},"title":"Music Matching Based on Rough Longest Common Subsequence.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"1","pages":"95-110","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/LinWW11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201101_07.html","url":"https://dblp.org/rec/journals/jise/LinWW11"}, "url":"URL#4587003" }, { "@score":"1", "@id":"4587004", "info":{"authors":{"author":[{"@pid":"82/2264","text":"Han-Yu Lin"},{"@pid":"05/2856","text":"Tzong-Sun Wu"},{"@pid":"54/1540","text":"Yi-Shiung Yeh"}]},"title":"A DL Based Short Strong Designated Verifier Signature Scheme with Low Computation.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"2","pages":"451-463","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/LinWY11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201103_04.html","url":"https://dblp.org/rec/journals/jise/LinWY11"}, "url":"URL#4587004" }, { "@score":"1", "@id":"4587005", "info":{"authors":{"author":{"@pid":"22/1685","text":"Jing-Chiou Liou"}},"title":"On Improving CMMI in an Immature World of Software Development.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"1","pages":"213-226","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/Liou11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201101_14.html","url":"https://dblp.org/rec/journals/jise/Liou11"}, "url":"URL#4587005" }, { "@score":"1", "@id":"4587006", "info":{"authors":{"author":[{"@pid":"27/2991","text":"Li-min Liu"},{"@pid":"80/778","text":"Tian-Shyr Dai"}]},"title":"A Reliable Fingerprint Orientation Estimation Algorithm.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"1","pages":"353-368","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/LiuD11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201101_22.html","url":"https://dblp.org/rec/journals/jise/LiuD11"}, "url":"URL#4587006" }, { "@score":"1", "@id":"4587007", "info":{"authors":{"author":[{"@pid":"33/85","text":"Qian Liu"},{"@pid":"52/4629","text":"Sanyang Liu"},{"@pid":"66/6699-1","text":"Lifang Liu 0001"}]},"title":"Similarity Analysis between Transcription Factor Binding Sites by Bayesian Hypothesis Test.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"3","pages":"855-868","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/LiuLL11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201105_04.html","url":"https://dblp.org/rec/journals/jise/LiuLL11"}, "url":"URL#4587007" }, { "@score":"1", "@id":"4587008", "info":{"authors":{"author":[{"@pid":"80/6117","text":"Tsung-Yuan Liu"},{"@pid":"12/2512","text":"Wen-Hsiang Tsai"}]},"title":"Data Hiding in Graphic Drawings by Structures of Object Groupings.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"3","pages":"983-994","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/LiuT11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201105_11.html","url":"https://dblp.org/rec/journals/jise/LiuT11"}, "url":"URL#4587008" }, { "@score":"1", "@id":"4587009", "info":{"authors":{"author":[{"@pid":"91/8265","text":"Congxin Liu"},{"@pid":"12/1198-2","text":"Jie Yang 0002"},{"@pid":"51/944","text":"Hai Huang"}]},"title":"P-SURF: A Robust Local Image Descriptor.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"6","pages":"2001-2015","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/LiuYH11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201111_13.html","url":"https://dblp.org/rec/journals/jise/LiuYH11"}, "url":"URL#4587009" }, { "@score":"1", "@id":"4587010", "info":{"authors":{"author":[{"@pid":"64/3307","text":"Chao-Hung Lu"},{"@pid":"70/3994","text":"Hung-Ming Chen"},{"@pid":"74/3882","text":"Chien-Nan Jimmy Liu"}]},"title":"Design Planning with 3D-Via Optimization in Alternative Stacking Integrated Circuits.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"1","pages":"287-302","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/LuCL11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201101_18.html","url":"https://dblp.org/rec/journals/jise/LuCL11"}, "url":"URL#4587010" }, { "@score":"1", "@id":"4587011", "info":{"authors":{"author":[{"@pid":"49/1832-2","text":"Jianhua Ma 0002"},{"@pid":"14/5444","text":"Runhe Huang"},{"@pid":"12/1536","text":"Tomomi Kawashima"},{"@pid":"98/2609","text":"Bernady O. Apduhan"}]},"title":"Spacelog Data Acquisition, Management and Applications in a Gateway-based Smart Space.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"1","pages":"35-50","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/MaHKA11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201101_03.html","url":"https://dblp.org/rec/journals/jise/MaHKA11"}, "url":"URL#4587011" }, { "@score":"1", "@id":"4587012", "info":{"authors":{"author":[{"@pid":"43/2685","text":"Ghasem Mirjalily"},{"@pid":"34/10398","text":"Mohammad Hadi Karimi Tafti"}]},"title":"Load Balancing in Metro Ethernet Networks by Selecting the Best Spanning Tree.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"5","pages":"1747-1759","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/MirjalilyT11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201109_14.html","url":"https://dblp.org/rec/journals/jise/MirjalilyT11"}, "url":"URL#4587012" }, { "@score":"1", "@id":"4587013", "info":{"authors":{"author":[{"@pid":"32/5224","text":"Gap-Joo Na"},{"@pid":"20/6358","text":"Bongki Moon"},{"@pid":"l/SangWonLee","text":"Sang-Won Lee 0001"}]},"title":"IPLB+-tree for Flash Memory Database Systems.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"1","pages":"111-127","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/NaML11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201101_08.html","url":"https://dblp.org/rec/journals/jise/NaML11"}, "url":"URL#4587013" }, { "@score":"1", "@id":"4587014", "info":{"authors":{"author":{"@pid":"49/2177","text":"Yunyoung Nam"}},"title":"Map-based Indoor People Localization using an Inertial Measurement Unit.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"4","pages":"1233-1248","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/Nam11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201107_03.html","url":"https://dblp.org/rec/journals/jise/Nam11"}, "url":"URL#4587014" }, { "@score":"1", "@id":"4587015", "info":{"authors":{"author":[{"@pid":"32/9728","text":"J. A. M. Naranjo"},{"@pid":"90/9728","text":"Leocadio G. Casado"},{"@pid":"161/8533","text":"Juan Antonio López Ramos"}]},"title":"Group Oriented Renewal of Secrets and Its Application to Secure Multicast.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"4","pages":"1303-1313","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/NaranjoCR11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201107_07.html","url":"https://dblp.org/rec/journals/jise/NaranjoCR11"}, "url":"URL#4587015" }, { "@score":"1", "@id":"4587016", "info":{"authors":{"author":{"@pid":"47/4855","text":"Abel Nyamapfene"}},"title":"Towards Understanding Child Language Acquisition: An Unsupervised Multimodal Neural Network Approach.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"5","pages":"1613-1639","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/Nyamapfene11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201109_07.html","url":"https://dblp.org/rec/journals/jise/Nyamapfene11"}, "url":"URL#4587016" }, { "@score":"1", "@id":"4587017", "info":{"authors":{"author":[{"@pid":"57/10398","text":"Mei-Sen Pan"},{"@pid":"62/8549","text":"Jing-Tian Tang"},{"@pid":"92/10398","text":"Xiao-Li Yang"}]},"title":"Medical Image Registration Based on SVD and Modified PSNR.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"5","pages":"1761-1775","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/PanTY11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201109_15.html","url":"https://dblp.org/rec/journals/jise/PanTY11"}, "url":"URL#4587017" }, { "@score":"1", "@id":"4587018", "info":{"authors":{"author":[{"@pid":"93/3025","text":"Su-Wan Park"},{"@pid":"00/2938","text":"Sang-Uk Shin"}]},"title":"Authentication and Copyright Protection Scheme for H.264/AVC and SVC.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"1","pages":"129-142","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/ParkS11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201101_09.html","url":"https://dblp.org/rec/journals/jise/ParkS11"}, "url":"URL#4587018" }, { "@score":"1", "@id":"4587019", "info":{"authors":{"author":[{"@pid":"21/4938","text":"Ming-Der Shieh"},{"@pid":"36/2715","text":"Wen-Ching Lin"},{"@pid":"84/2339","text":"Chien-Ming Wu"}]},"title":"Design of High-Speed Iterative Dividers in GF(2m).","venue":"J. Inf. Sci. Eng.","volume":"27","number":"3","pages":"953-967","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/ShiehLW11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201105_09.html","url":"https://dblp.org/rec/journals/jise/ShiehLW11"}, "url":"URL#4587019" }, { "@score":"1", "@id":"4587020", "info":{"authors":{"author":[{"@pid":"12/5492","text":"Min-Zheng Shieh"},{"@pid":"29/847","text":"Shi-Chun Tsai"}]},"title":"Improved Bound on Approximating Jug Measuring Problem.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"3","pages":"1159-1163","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/ShiehT11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201105_23.html","url":"https://dblp.org/rec/journals/jise/ShiehT11"}, "url":"URL#4587020" }, { "@score":"1", "@id":"4587021", "info":{"authors":{"author":[{"@pid":"29/4445","text":"Kanchana Silawarawet"},{"@pid":"38/5282","text":"Natawut Nupairoj"}]},"title":"Locality-Aware Clustering Application Level Multicast for Live Streaming Services on the Internet.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"1","pages":"319-336","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/SilawarawetN11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201101_20.html","url":"https://dblp.org/rec/journals/jise/SilawarawetN11"}, "url":"URL#4587021" }, { "@score":"1", "@id":"4587022", "info":{"authors":{"author":[{"@pid":"90/5347","text":"Shu-Kuo Sun"},{"@pid":"22/4749","text":"Zen Chen"}]},"title":"Robust Logo Recognition for Mobile Phone Applications.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"2","pages":"545-559","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/SunC11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201103_10.html","url":"https://dblp.org/rec/journals/jise/SunC11"}, "url":"URL#4587022" }, { "@score":"1", "@id":"4587023", "info":{"authors":{"author":[{"@pid":"84/1765","text":"Sung Chul Park"},{"@pid":"16/6966","text":"Young Chul Park"}]},"title":"The SQL Function XMLNEST to Generate Recursive XML Values from Relational Data.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"4","pages":"1283-1302","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/Sung-ChulParkP11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201107_06.html","url":"https://dblp.org/rec/journals/jise/Sung-ChulParkP11"}, "url":"URL#4587023" }, { "@score":"1", "@id":"4587024", "info":{"authors":{"author":[{"@pid":"35/1725","text":"Minghua Tang"},{"@pid":"00/6250","text":"Xiaola Lin"}]},"title":"Injection Level Flow Control for Networks-on-Chip (NoC).","venue":"J. Inf. Sci. Eng.","volume":"27","number":"2","pages":"527-544","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/TangL11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201103_09.html","url":"https://dblp.org/rec/journals/jise/TangL11"}, "url":"URL#4587024" }, { "@score":"1", "@id":"4587025", "info":{"authors":{"author":[{"@pid":"61/6167","text":"Tsu-Wei Tseng"},{"@pid":"158/8925","text":"Jin-Fu Li 0001"}]},"title":"SETBIST: An Soft-Error Tolerant Built-In Self-Test Scheme for Random Access Memories.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"2","pages":"643-656","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/TsengL11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201103_15.html","url":"https://dblp.org/rec/journals/jise/TsengL11"}, "url":"URL#4587025" }, { "@score":"1", "@id":"4587026", "info":{"authors":{"author":{"@pid":"61/7053","text":"Grzegorz Ulacha"}},"title":"Method of Lossless and Near-Lossless Color Image Compression.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"2","pages":"621-642","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/Ulacha11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201103_14.html","url":"https://dblp.org/rec/journals/jise/Ulacha11"}, "url":"URL#4587026" }, { "@score":"1", "@id":"4587027", "info":{"authors":{"author":[{"@pid":"23/9050","text":"Zhong-Mei Wan"},{"@pid":"81/1232-1","text":"Jian Weng 0001"},{"@pid":"05/4632","text":"Xuejia Lai"},{"@pid":"22/2080-1","text":"Shengli Liu 0001"},{"@pid":"33/31-1","text":"Jiguo Li 0001"}]},"title":"On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"1","pages":"243-259","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/WanWLLL11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201101_16.html","url":"https://dblp.org/rec/journals/jise/WanWLLL11"}, "url":"URL#4587027" }, { "@score":"1", "@id":"4587028", "info":{"authors":{"author":[{"@pid":"88/9049","text":"Yong-Tao Wang"},{"@pid":"14/9050","text":"Ke-Fei Chen"},{"@pid":"66/5488","text":"Jian-Hong Chen"}]},"title":"Attribute-Based Traitor Tracing.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"1","pages":"181-195","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/WangCC11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201101_12.html","url":"https://dblp.org/rec/journals/jise/WangCC11"}, "url":"URL#4587028" }, { "@score":"1", "@id":"4587029", "info":{"authors":{"author":[{"@pid":"08/742","text":"Yu-Shuen Wang"},{"@pid":"68/7527","text":"Min-Wen Chao"},{"@pid":"33/10398","text":"Chin-Chueng Yi"},{"@pid":"36/6003","text":"Chao-Hung Lin"}]},"title":"Cubist Style Rendering for 3D Polygonal Models.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"6","pages":"1885-1899","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/WangCYL11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201111_06.html","url":"https://dblp.org/rec/journals/jise/WangCYL11"}, "url":"URL#4587029" }, { "@score":"1", "@id":"4587030", "info":{"authors":{"author":[{"@pid":"88/1798","text":"Yin-Tien Wang"},{"@pid":"93/10397","text":"Duan-Yan Hung"},{"@pid":"55/4331","text":"Chung-Hsun Sun"}]},"title":"Improving Data Association in Robot SLAM with Monocular Vision.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"6","pages":"1823-1837","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/WangHS11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201111_02.html","url":"https://dblp.org/rec/journals/jise/WangHS11"}, "url":"URL#4587030" }, { "@score":"1", "@id":"4587031", "info":{"authors":{"author":[{"@pid":"10/5630-111","text":"Xin Wang 0111"},{"@pid":"93/4039","text":"Linpeng Huang"},{"@pid":"91/95","text":"Xiaohui Xu"},{"@pid":"64/6544-97","text":"Yi Zhang 0097"},{"@pid":"25/8700","text":"Jun-Qing Chen"}]},"title":"A Solution for Data Inconsistency in Data Integration.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"2","pages":"681-695","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/WangHXZC11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201103_17.html","url":"https://dblp.org/rec/journals/jise/WangHXZC11"}, "url":"URL#4587031" }, { "@score":"1", "@id":"4587032", "info":{"authors":{"author":[{"@pid":"37/1279","text":"Jinhua Wang"},{"@pid":"44/5561","text":"De Xu"},{"@pid":"89/4275","text":"Congyan Lang"},{"@pid":"13/2692-1","text":"Bing Li 0001"}]},"title":"Exposure Fusino Based on Shift-Invariant Discrete Wavelet Transform.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"1","pages":"197-211","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/WangXLL11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201101_13.html","url":"https://dblp.org/rec/journals/jise/WangXLL11"}, "url":"URL#4587032" }, { "@score":"1", "@id":"4587033", "info":{"authors":{"author":{"@pid":"70/10398","text":"Sai-Keung Wong"}},"title":"Adaptive Continuous Collision Detection for Cloth Models Using a Skipping Frame Session.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"5","pages":"1545-1559","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/Wong11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201109_03.html","url":"https://dblp.org/rec/journals/jise/Wong11"}, "url":"URL#4587033" }, { "@score":"1", "@id":"4587034", "info":{"authors":{"author":{"@pid":"24/2927","text":"Shuhua Wu"}},"title":"Security Analysis and Enhancements of Verifier-Based Password-Authenticated Key Exchange Protocols in the Three-Party Setting.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"3","pages":"1059-1072","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/Wu11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201105_16.html","url":"https://dblp.org/rec/journals/jise/Wu11"}, "url":"URL#4587034" }, { "@score":"1", "@id":"4587035", "info":{"authors":{"author":[{"@pid":"08/6303","text":"I-Wei Wu"},{"@pid":"70/4576","text":"Chung-Ping Chung"},{"@pid":"79/277","text":"Jean Jyh-Jiun Shann"}]},"title":"Area-Efficient Instruction Set Extension Exploration with Hardware Design Space Exploration.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"5","pages":"1641-1657","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/WuCS11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201109_08.html","url":"https://dblp.org/rec/journals/jise/WuCS11"}, "url":"URL#4587035" }, { "@score":"1", "@id":"4587036", "info":{"authors":{"author":[{"@pid":"56/3359","text":"Chin-Hsien Wu"},{"@pid":"04/10398","text":"Chen-Kai Jan"},{"@pid":"07/3181","text":"Tei-Wei Kuo"}]},"title":"A Low-Memory Address Translation Mechanism for Flash-Memory Storage Systems.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"5","pages":"1713-1727","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/WuJK11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201109_12.html","url":"https://dblp.org/rec/journals/jise/WuJK11"}, "url":"URL#4587036" }, { "@score":"1", "@id":"4587037", "info":{"authors":{"author":[{"@pid":"57/8473","text":"Yan-Jing Wu"},{"@pid":"84/8474","text":"Wei-Cheng Sung"},{"@pid":"07/5109","text":"Tsang-Ling Sheu"}]},"title":"A Dynamic Navigation Approach with Rebroadcasting Flood Avoidance in VANETs.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"6","pages":"2017-2029","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/WuSS11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201111_14.html","url":"https://dblp.org/rec/journals/jise/WuSS11"}, "url":"URL#4587037" }, { "@score":"1", "@id":"4587038", "info":{"authors":{"author":[{"@pid":"08/1168","text":"Tsu-Yang Wu"},{"@pid":"87/1521","text":"Yuh-Min Tseng"},{"@pid":"76/5437","text":"Ching-Wen Yu"}]},"title":"A Secure ID-Based Authenticated Group Key Exchange Protocol Resistant to Insider Attacks.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"3","pages":"915-932","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/WuTY11","url":"https://dblp.org/rec/journals/jise/WuTY11"}, "url":"URL#4587038" }, { "@score":"1", "@id":"4587039", "info":{"authors":{"author":[{"@pid":"24/2927","text":"Shuhua Wu"},{"@pid":"81/5261","text":"Yuefei Zhu"},{"@pid":"18/3188","text":"Qiong Pu"}]},"title":"Cryptanalysis and Enhancements of Three-Party Authenticated Key Exchange Protocol using ECC.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"4","pages":"1329-1343","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/WuZP11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201107_09.html","url":"https://dblp.org/rec/journals/jise/WuZP11"}, "url":"URL#4587039" }, { "@score":"1", "@id":"4587040", "info":{"authors":{"author":[{"@pid":"72/195","text":"Lih-Chyau Wuu"},{"@pid":"85/1101","text":"Chi-Hsiang Hung"},{"@pid":"19/7474","text":"Jyun-Yan Yang"}]},"title":"IP Traceback Based on Chinese Remainder Theorem.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"6","pages":"1985-1999","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/WuuHY11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201111_12.html","url":"https://dblp.org/rec/journals/jise/WuuHY11"}, "url":"URL#4587040" }, { "@score":"1", "@id":"4587041", "info":{"authors":{"author":[{"@pid":"38/9413","text":"Hsien-Wei Yang"},{"@pid":"78/3379","text":"I-En Liao"},{"@pid":"61/5055","text":"Chaur-Chin Chen"}]},"title":"Reversible Data Hiding Based on Median Difference Histogram.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"2","pages":"577-593","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/YangLC11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201103_12.html","url":"https://dblp.org/rec/journals/jise/YangLC11"}, "url":"URL#4587041" }, { "@score":"1", "@id":"4587042", "info":{"authors":{"author":[{"@pid":"63/1094","text":"Chunhua Yang 0002"},{"@pid":"12/9788","text":"Hai-Yang Wang"}]},"title":"An Approach to Weaving Stateful Aspects using LTS.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"4","pages":"1395-1411","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/YangW11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201107_13.html","url":"https://dblp.org/rec/journals/jise/YangW11"}, "url":"URL#4587042" }, { "@score":"1", "@id":"4587043", "info":{"authors":{"author":[{"@pid":"23/85","text":"Stephen J. H. Yang"},{"@pid":"80/2266-1","text":"Jia Zhang 0001"},{"@pid":"93/3560","text":"Stella T. C. Tsai"},{"@pid":"54/2226","text":"Jeff J. S. Huang"}]},"title":"Applying Semantic Segment Detection to Enhance Web Page Presentation on the Mobile Internet.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"2","pages":"697-713","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/YangZTH11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201103_18.html","url":"https://dblp.org/rec/journals/jise/YangZTH11"}, "url":"URL#4587043" }, { "@score":"1", "@id":"4587044", "info":{"authors":{"author":[{"@pid":"63/204","text":"Kuo-Hui Yeh"},{"@pid":"76/1704","text":"Nai-Wei Lo"},{"@pid":"75/940","text":"Enrico Winata"}]},"title":"CE-TIP: A Code Expansion Based Tag Identification Protocol for RFID Systems.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"2","pages":"777-788","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/YehLW11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201103_23.html","url":"https://dblp.org/rec/journals/jise/YehLW11"}, "url":"URL#4587044" }, { "@score":"1", "@id":"4587045", "info":{"authors":{"author":[{"@pid":"78/2633","text":"In-Su Yoon"},{"@pid":"46/10274","text":"Sang-Hwa Chung"},{"@pid":"24/8862","text":"Yoon-Geun Kwon"}]},"title":"Implementation of a Software-Based TCP/IP Offload Engine Using Standalone TCP/IP without an Embedded OS.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"6","pages":"1871-1883","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/YoonCK11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201111_05.html","url":"https://dblp.org/rec/journals/jise/YoonCK11"}, "url":"URL#4587045" }, { "@score":"1", "@id":"4587046", "info":{"authors":{"author":[{"@pid":"86/3457-3","text":"Jia Yu 0003"},{"@pid":"05/3013","text":"Fanyu Kong"},{"@pid":"00/2503","text":"Xiangguo Cheng"},{"@pid":"95/69","text":"Rong Hao"},{"@pid":"93/2399","text":"Jianxi Fan"}]},"title":"New Forward-Secure Signature Scheme with Untrusted Update.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"4","pages":"1435-1448","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/YuKCHF11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201107_15.html","url":"https://dblp.org/rec/journals/jise/YuKCHF11"}, "url":"URL#4587046" }, { "@score":"1", "@id":"4587047", "info":{"authors":{"author":[{"@pid":"67/3578","text":"Youngjin Yu"},{"@pid":"58/4165","text":"Dongin Shin"},{"@pid":"33/3565","text":"Hyeong Seog Kim"},{"@pid":"54/1476","text":"Hyeonsang Eom"},{"@pid":"58/4211","text":"Heon Young Yeom"}]},"title":"Backup Metadata As Data: DPC-Tolerance to Commodity File System.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"4","pages":"1193-1218","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/YuSKEY11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201107_01.html","url":"https://dblp.org/rec/journals/jise/YuSKEY11"}, "url":"URL#4587047" }, { "@score":"1", "@id":"4587048", "info":{"authors":{"author":[{"@pid":"03/9788","text":"Chung-Min Yu"},{"@pid":"33/589","text":"Chung-Ming Wang"}]},"title":"An Effective Framework for Cloud Modeling, Rendering, and Morphing.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"3","pages":"891-913","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/YuW11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201105_06.html","url":"https://dblp.org/rec/journals/jise/YuW11"}, "url":"URL#4587048" }, { "@score":"1", "@id":"4587049", "info":{"authors":{"author":[{"@pid":"42/6529","text":"Chulmin Yun"},{"@pid":"03/5704","text":"Byonghwa Oh"},{"@pid":"38/305","text":"Jihoon Yang"},{"@pid":"09/4907","text":"Jongho Nang"}]},"title":"Feature Subset Selection Based on Bio-Inspired Algorithms.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"5","pages":"1667-1686","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/YunOYN11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201109_10.html","url":"https://dblp.org/rec/journals/jise/YunOYN11"}, "url":"URL#4587049" }, { "@score":"1", "@id":"4587050", "info":{"authors":{"author":[{"@pid":"83/2795","text":"Xiao Zeng"},{"@pid":"38/3295","text":"Zhenyong Chen"},{"@pid":"99/311-8","text":"Ming Chen 0008"},{"@pid":"77/6921-1","text":"Zhang Xiong 0001"}]},"title":"Reversible Video Watermarking Using Motion Estimation and Prediction Error Expansion.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"2","pages":"465-479","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/ZengCCX11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201103_05.html","url":"https://dblp.org/rec/journals/jise/ZengCCX11"}, "url":"URL#4587050" }, { "@score":"1", "@id":"4587051", "info":{"authors":{"author":[{"@pid":"72/1748","text":"Jianhong Zhang"},{"@pid":"09/193","text":"Jian Mao"}]},"title":"Another Efficient Proxy Signature Scheme in the Standard Model.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"4","pages":"1249-1264","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/ZhangM11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201107_04.html","url":"https://dblp.org/rec/journals/jise/ZhangM11"}, "url":"URL#4587051" }, { "@score":"1", "@id":"4587052", "info":{"authors":{"author":[{"@pid":"64/5666-23","text":"Lei Zhang 0023"},{"@pid":"w/RuiWang13","text":"Rui Wang 0013"},{"@pid":"51/5556","text":"Li Cui"}]},"title":"Real-time Traffic Monitoring with Magnetic Sensor Networks.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"4","pages":"1473-1486","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/ZhangWC11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201107_17.html","url":"https://dblp.org/rec/journals/jise/ZhangWC11"}, "url":"URL#4587052" }, { "@score":"1", "@id":"4587053", "info":{"authors":{"author":[{"@pid":"07/9788","text":"Jinmin Zhong"},{"@pid":"05/4632","text":"Xuejia Lai"}]},"title":"Preimage Attack on Reduced DHA-256.","venue":"J. Inf. Sci. Eng.","volume":"27","number":"4","pages":"1315-1327","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jise/ZhongL11","ee":"http://www.iis.sinica.edu.tw/page/jise/2011/201107_08.html","url":"https://dblp.org/rec/journals/jise/ZhongL11"}, "url":"URL#4587053" } ] } } } )