JISE
Journal of Information Science and Engineering
Vol. 26 No. 5 (September 2010)
PAPERS
1. Two-phase Pattern Matching for Regular Expressions in Intrusion Detection Systems
CHANG-CHING YANG,CHEN-MOU CHENG,SHENG-DE WANG........ pp. 1563-1582
2. Active Adjustment: An Effective Method for Keeping the TPR*-tree Compact*
SANG-WOOK KIM,MIN-HEE JANG,SUNGCHAE LIM........ pp. 1583-1600
3. FSM-Based Formal Compliance Verification of Interface Protocols
CHE-HUA SHIH,YA-CHING YANG,CHIA-CHIH YEN,JUINN-DAR HUANG,JING-YANG JOU........ pp. 1601-1617
4. GPU-based Collision Detection and Response for Particles on 3D Models
HSIEN-HSI HSIEH,WEN-KAI TAI,CHIN-CHEN CHANG........ pp. 1619-1635
5. Low-Cost Smart Projector for Home Entertainment
WUN-YI LEE,TSORNG-LIN CHIA........ pp. 1637-1655
6. Visual Attention Region Detection Using Texture and Object Features
HSUAN-YING CHEN,JIN-JANG LEOU........ pp. 1657-1675
7. Semi-Probabilistic Routing in Intermittently Connected Mobile Ad Hoc Networks
KE SHI........ pp. 1677-1693
8. Particle Swarm Optimization for Semi-supervised Support Vector Machine
QING WU,SAN-YANG LIU,LE-YOU ZHANG........ pp. 1695-1706
9. An Orthogonal DLGE Algorithm With its Application to Face Recognition
JIANGFENG CHEN,BAOZONG YUAN........ pp. 1707-1718
10. A Schema Based Approach to Valid XML Access Control
CHANGWOO BYUN,SEOG PARK........ pp. 1719-1739
11. Spike Defect Detection and Removal on Aged Films
RONG-CHI CHANG,TIMOTHY K. SHIH........ pp. 1741-1753
12. A Compressed-Domain Image Watermarking Scheme with the SPIHT Coding
SHIH-HSUAN YANG,WU-JIE LIAO........ pp. 1755-1770
13. Optimization of IEEE 802.11 Multirate Wireless LAN
A. V. BABU,LILLYKUTTY JACOB,S. ABDUL SUBHAN........ pp. 1771-1785
14. Blind Steganalysis of Mp3stego
JULIO C. HERNANDEZ-CASTRO,JUAN E. TAPIADOR,ESTHER PALOMAR,ANGEL ROMERO-GONZALEZ........ pp. 1787-1799
PAPERS
15. CA-RBAC: Context Aware RBAC Scheme in Ubiquitous Computing Environments
JUNG HWAN CHOI,HYUNSU JANG,YOUNG IK EOM........ pp. 1801-1816
16. A Workflow Event Logging Mechanism and Its Implications on Quality of Workflows
MINJAE PAR,KWANGHOON KIM........ pp. 1817-1830
17. Efficient Decoding of Systematic (23, 12, 7) and (41, 21, 9) Quadratic Residue Codes
YAN-HAW CHEN,CHIH-HUA CHIEN,CHIEN-HSIANG HUANG,TRIEU-KIEN TRUONG,MING-HAW JING........ pp. 1831-1843
18. Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication Protocol
HANJAE JEONG,DONGHO WON,SEUNGJOO KIM........ pp. 1845-1858
19. A Node Revocation Scheme Using Public-Key Cryptography in Wireless Sensor Networks
PO-JEN CHUANG,CHANG SHAO-HSUAN,CHIH-SHIN LIN........ pp. 1859-1873
20. Mutual RFID Authentication Scheme for Resource-constrained Tags
NAI-WEI LO,KUO-HUI YEH........ pp. 1875-1889
21. Speaker Identification in Overlapping Speech
WEI-HO TSAI,SHIH-JIE LIAO........ pp. 1891-1903
22. Layered Approach to the Polysemy Problems in a Chinese to Taiwanese TTS System
YIH-JENG LIN,MING-SHING YU,CHIN-YU LIN,YUAN-CHUN LIN........ pp. 1905-1915
23. Linear Quadtree Construction in Real Time
CHI-YEN HUANG,YU-WEI CHEN........ pp. 1917-1930