JISE
Journal of Information Science and Engineering
Vol. 31 No. 3 (May 2015)
PAPERS
1. Discover the Misinformation Broadcasting in On-Line Social Networks
PEIGUANG LIN,LEI CHEN,MINGXUAN YUAN,PEIYAO NIE........ pp. 763-785
2. Harmonic Signal Processing Method Based on the Windowing Interpolated DFT Algorithm
XIANGUI WU,ANNA WANG........ pp. 787-798
3. Duration High-Order Hidden Markov Models and Training Algorithms for Speech Recognition
LEE-MIN LEE........ pp. 799-820
4. Automatic Singing Performance Evaluation Using Accompanied Vocals as Reference Bases
WEI-HO TSAI,CIN-HAO MA,YI-PO HSU ........ pp. 821-838
5. A Full-Coverage Two-Level URL Duplication Checking Method for a High-Speed Parallel Web Crawler
ARJUMAND YOUNUS,KYU-YOUNG WHANG,HYUK-YOON KWON,YEON-MI YEO ........ pp. 839-859
6. Salient Region Detection with Hierarchical Image Abstraction
LIANGLIANG DUAN,LINGFU KONG ........ pp. 861-878
7. Neighbor-based Hop Size Estimation for Dense Sensor Networks
GUANING CHEN,YAN-LING CHU,MIN-TE SUN........ pp. 879-896
8. Patterns for Continuous Integration Builds in Cross-Platform Agile Software Development
CHIN-YUN HSIEH,CHIEN-TSUN CHEN........ pp. 897-924
9. Outstanding Principal as Prepayment Value: A Closed-Form Formula for Mortgage Pricing
YI-CHENG TSAI,CHIN-LAUNG LEI,JAN-MING HO,MING-YANG KAO,SZU-LANG LIAO........ pp. 925-942
10. Physical Presence Verification: A Test to Detect Whether A Computer Is Remotely Controlled
TSUNG-TENG CHEN,CHUN-YING HUANG,CHEN-CHI WU,KUAN-TA CHEN........ pp. 943-963
11. Feature Selection and Extraction for Malware Classification
CHIH-TA LIN,NAI-JIAN WANG,HAN XIAO,CLAUDIA ECKERT........ pp. 965-992
12. A Segmentation Transfer Approach for Rigid Models
ESMA ELGHOUL,ANNE VERROUST-BLONDET,MOHAMED CHAOUCH........ pp. 993-1009
13. A Weighted Edge-Preserving Smooth Filter for High Dynamic Range Image Display
PEI-YIN CHEN,YEU-HORNG SHIAU,HUNG-YU YANG,WAN-YU JHUANG........ pp. 1011-1026
14. A Self-Adaptive Intelligent Control System with Hierarchical Architecture
CHENG-HSIUNG CHIANG,LIANG-HSUAN CHEN........ pp. 1027-1049
15. A Cloud Service Implementation for Evaluating Design Pattern in Software Evolution
DER-HONG TING,NIEN-LIN HSUEH,CHAO-TUNG YANG,CHIN-HUNG CHANG........ pp. 1051-1070
16. Clip Space Sample Culling for Motion Blur and Defocus Blur
YI-JENG WU,DER-LOR WAY,YU-TING TSAI,ZEN-CHUNG SHIH........ pp. 1071-1084
17. The Pseudorandomness of Many-Round Lai-Massey Scheme
YIYUAN LUO,XUEJIA LAI,JING HU........ pp. 1085-1096
18. Bypass Cell-phone-verification Through a Smartphone-based Botnet
FU-HAU HSU,CHI-HSIEN HSU,CHUAN-SHENG WANG,PEI-HSUN LEE,RUEI-MIN JIANG,JIA-SIAN JHANG........ pp. 1097-1111
19.
LS-LRU: A Lazy-Split LRU Buffer Replacement Policy for Flash-Based B+-tree Index
RIZE JIN,HYUNG-JU CHO,TAE-SUN CHUNG........ pp. 1113-1132
20. Self-Supervised Synonym Extraction from the Web
FANGHUAI HU,ZHIQING SHAO,TONG RUAN ........ pp. 1133-1148
21. Clustering Using Local and Global Exponential Discriminant Regularization
NASIR AHMED,ABDUL JALIL,ASIFULLAH KHAN ........ pp. 1149-1164