JISE
Journal of Information Science and Engineering
Vol. 27 No. 2 (March 2011)
PAPERS
1. Location Privacy Protection Using Independent ID Update for WLANs
PO-JEN CHUANG,JER-SHENG DENG,CHIH-SHIN LIN........ pp. 403-418
2. Lossless Compression of Hyperspectral Images Using Adaptive Prediction and Backward Search Schemes
CHENG-CHEN LIN,YIN-TSUNG HWANG........ pp. 419-435
3. Attribute-Based Key-Insulated Encryption
JIAN-HONG CHEN,YONG-TAO WANG,KE-FEI CHEN........ pp. 437-449
4. A DL Based Short Strong Designated Verifier Signature Scheme with Low Computation
HAN-YU LIN,TZONG-SUN WU,YI-SHIUNG YEH........ pp. 451-463
5. Reversible Video Watermarking Using Motion Estimation and Prediction Error Expansion
XIAO ZENG,ZHEN-YONG CHEN,MING CHEN,ZHANG XIONG........ pp. 465-479
6. The Linear Quantization Strategy of Quadratic Hebbian-Type Associative Memories and Their Performance Analysis
CHAO-HUI KO,CHING-TSORNG TSAI,CHISHYAN LIAW........ pp. 481-492
7. An Efficient Architecture for a TCP Offload Engine Based on Hardware/Software Co-design
HANKOOK JANG,SANG-HWA CHUNG,DONG KYUE KIM,YUN-SUNG LEE........ pp. 493-509
8. An Efficient Frequent Pattern Mining Method and its Parallelization in Transactional Databases
S. M. FAKHRAHMAD,GH. DASTGHAIBYFARD........ pp. 511-525
9. Injection Level Flow Control for Network-on-Chip (NoC)
MINGHUA TANG,XIAOLA LIN........ pp. 527-544
10. Robust Logo Recognition for Mobile Phone Applications
SHU-KUO SUN,ZEN CHEN........ pp. 545-559
11. High Index Compression without the Dependencies of Data Orders and Data Skewness for Spatial Databases
HUNG-YI LIN........ pp. 561-576
12. Reversible Data Hiding Based on Median Difference Histogram
HSIEN-WEI YANG,I-EN LIAO,CHAUR-CHIN CHEN........ pp. 577-593
13. An Entropy-Based Complexity Measure for Web Applications Using Structural Information
WOO-SUNG JUNG,EUN-JOO LEE,KAP-SU KIM,CHI-SU WU........ pp. 595-619
14. Method of Lossless and Near-Lossless Color Image Compression
GRZEGORZ ULACHA........ pp. 621-642
15. SETBIST: An Soft-Error Tolerant Built-In Self-Test Scheme for Random Access Memories
TSU-WEI TSENG,JIN-FU LI........ pp. 643-656
16. An Anonymous Path Routing (APR) Protocol for Wireless Sensor Networks
JEHN-RUEY JIANG,JANG-PING SHEU,CHING TU,JIH-WEI WU........ pp. 657-680
17. A Solution for Data Inconsistency in Data Integration
XIN WANG,LIN-PENG HUANG,XIAO-HUI XU,YI ZHANG,JUN-QING CHEN........ pp. 681-695
18. Applying Semantic Segment Detection to Enhance Web Page Presentation on the Mobile Internet
STEPHEN J. H. YANG,JIA ZHANG,STELLA T. C. TSAI,JEFF J. S. HUANG........ pp. 697-713
19. Jointing Edge Labeling and Geometrical Constraint for Lane Detection and its Application to Suspicious Driving Behavior Analysis
SIN-YU CHEN,JUN-WEI HSIEH,DUAN-YU CHEN........ pp. 715-732
SHORT PAPERS
20. Secret Image Sharing Using Multiwavelet Transform
CHIN-PAN HUANG,CHING-CHUNG LI........ pp. 733-748
21. Automatic Counting Cancer Cell Colonies using Fuzzy Inference System
SHENG-FUU LIN,HSIEN-TSE CHEN,YI-HSIEN LIN........ pp. 749-760
22. Mashup Creation Using a Mashup Rule Language
HYOSOOK JUNG,SEONGBIN PARK........ pp. 761-775
23. CE-TIP: A Code Expansion Based Tag Identification Protocol for RFID Systems
KUO-HUI YEH,NAI-WEI LO,ENRICO WINATA........ pp. 777-788
24. Improving MapReduce Performance by Exploiting Input Redundancy
SHIN-GYU KIM,HYUCK HAN,HYUNGSOO JUNG,HYEONSANG EOM,HEON Y. YEOM........ pp. 789-804
25. Backup Metadata As Data: DPC-tolerance to Commodity File System
YOUNG JIN YU,DONG IN SHIN,HYEONG SEOG KIM,HYEONSANG EOM,HEON YOUNG YEOM ........ pp. 805-832