JISE
Journal of Information Science and Engineering
Vol. 29 No. 3 (May 2013)
PAPERS
1. Triggered Moving Range Queries over RFID Monitored Objects
YU GU,GE YU,NA GUO........ pp. 401-416
2. Chinese Wall Security Model for Workflow Management Systems with Dynamic Security Policy
HSIAO YU-CHENG,GWAN-HWAN HWANG........ pp. 417-440
3. ID-Based Aggregate Proxy Signature Scheme Realizing Warrant-Based Delegation
YEN-CHING LIN,TZONG-CHEN WU,JIA-LUN TSAI........ pp. 441-457
4. An ID-Based Server-Aided Verification Short Signature Scheme Avoid Key Escrow
JIANHONG ZHANG,ZHIBIN SUN........ pp. 459-473
5. Jumpstarting Application Lifecycle Management: A New Approach with Tool Support
JUNG-SING JWO,TIEN-SONG HSU,YU CHIN CHENG........ pp. 475-492
6. A Self-Repair Technique for Content Addressable Memories with Address-Input-Free Writing Function
CHUN-KAI LAI,YU-JEN HUANG,JIN-FU LI........ pp. 493-507
7. A Simple Yet Effective User Controllable Mesh Simplification
TAN-CHI HO,JUNG-HONG CHUANG........ pp. 509-525
8. Linear Production Game Solution to a PTZ Camera Network
YU-CHUN LAI,YU-MING LIANG,SHENG-WEN SHIH,CHENG-CHUNG LIN,HONG-YUAN MARK LIAO........ pp. 527-543
9. Delay Test with Embedded Test Pattern Generator
NAN-CHENG LAI,SYING-JYAN WANG........ pp. 545-556
10. An Efficient Index for Continuous Range Queries in Mobile Environments
HARIM JUNG,YONG SUNG KIM,YON DOHN CHUNG........ pp. 557-578
11. Illumination Normalization Based on Homomorphic Wavelet Filtering for Face Recognition
XUE YUAN,YIFEI MENG,XUEYE WEI........ pp. 579-594
12. High-Performance VLSI Architecture of H.264/AVC CAVLD by Parallel Run_before Estimation Algorithm
JONGWOO BAE,JINSOO CHO........ pp. 595-605