JISE
Journal of Information Science and Engineering
Vol. 28 No. 2 (March 2012)
PAPERS
1. Processing XML Queries with Structural and Full-Text Constraints
YA-HUI CHANG,CHENG-YI WU,CHENG-CHENG LO........ pp. 221-242
2. An Intrinsic Graphical Signature Based on Alert Correlation Analysis for Intrusion Detection
HSING-KUO PAO,CHING-HAO MAO,HAHN-MING LEE,CHI-DONG CHEN,CHRISTOS FALOUTSOS........ pp. 243-262
3. Subtree Reconstruction, Query Node Intervals and Tree Pattern Query Evaluation
YANGJUN CHEN,YIBIN CHEN........ pp. 263-297
4. Smart Prolong Fuzzy Wireless Sensor-Actor Network for Agricultural Application
NASEER SABRI,S. A. ALJUNID,R. B. AHMAD,M. F. MALEK,ABID YAHYA,R. KAMARUDDIN,M. S. SALIM........ pp. 295-316
5. Nash Equilibrium of Node Cooperation Based on Metamodel for MANETs
KUN WANG,MENG WU........ pp. 317-333
6. Dummy-Based Schemes for Protecting Movement Trajectories
PO-RUEY LEI,WEN-CHIH PENG,ING-JIUNN SU,CHIEN-PING CHANG........ pp. 335-350
7. Improving Reusability of Test Symbols for Test Data Compression
SHYUE-KUNG LU,YA-CHEN HUANG........ pp. 351-364
8. A Hybrid Method for Fast Predicate Matching in Data Stream Processing
HYEON GYU KIM,MYOUNG HO KIM........ pp. 365-377
PAPERS
9. Parameter-Aware Cross-Layer Scheme for Wireless Video
RUI CHEN,ZHENGKUN MI,LIANGBAO JIAO........ pp. 379-391
10. Rule Interchange in the Semantic Web
Z. M. MA,XING WANG........ pp. 393-406
11. A Robust Recognition Algorithm for Encoded Targets in Close-range Photogrammetry
REN-BO XIA,JI-BIN ZHAO,WEI-JUN LIU,JIAN-HUANG WU,SHENG-PENG FU,JUN JIANG,JIA-ZHI LI........ pp. 407-418
12. Fault-Tolerant Cycle Embedding in Restricted Hypercube-like Networks with More Faulty Nodes
QIANG DONG,XIAO-FAN YANG........ pp. 419-426