JISE
Journal of Information Science and Engineering
Vol. 25 No. 6 (November 2009)
PAPERS
1. Synthesis of Anti-Aging Gated Clock Designs
SHIH-HSU HUANG,CHUN-HUA CHENG,SONG-BIN PAN........ pp. 1651-1670
2. Reordering for Indexing in an RFID Tag Database
SUNGWOO AHN,BONGHEE HONG........ pp. 1671-1690
3. Secure Load Balancing via Hierarchical Data Aggregation in Heterogeneous Sensor Networks
SUAT OZDEMIR........ pp. 1691-1705
4. Simultaneous Clock Skew Scheduling and Power-Gated Module Selection for Standby Leakage Minimization
SHIH-HSU HUANG,CHUN-HUA CHENG,DA-CHEN TZENG........ pp. 1702-1722
5. A Blind Image Watermarking Based on Dual Detector
CHIN-PAN HUANG,CHI-JEN LIAO,CHAUR-HEH HSIEH........ pp. 1723-1736
6. Blood Cell Identification Using Emotional Neural Networks
ADNAN KHASHMAN........ pp. 1737-1751
7. An Automatic Code Generation for Self-Healing
JEONGMIN PARK,HYUNSANG YOUN,EUNSEOK LEE........ pp. 1753-1781
8. Modeling and Analysis of Wireless LAN Traffic
DASHDORJ YAMKHIN,YOUJIP WON........ pp. 1783-1801
9. Packet-Oriented Routing in Delay-Tolerant Vehicular Sensor Networks
XU LI,HONG-YU HUANG,MING-LU LI,WEI SHU,MIN-YOU WU........ pp. 1803-1817
10. A Spatial-Extended Background Model for Moving Blobs Extraction in Indoor Environments
SAN-LUNG ZHAO,HSI-JIAN LEE........ pp. 1819-1837
11. Efficient Header Classification Architecture for Network Intrusion Detection
WEN-JYI HWANG,CHIEN-MIN OU........ pp. 1839-1853
12. Fault-Tolerant Hamiltonian Connectivity and Fault-Tolerant Hamiltonicity of the Fully Connected Cubic Networks
TUNG-YANG HO,CHENG-KUAN LIN........ pp. 1855-1862
13. Liveness Enforcing Supervision in Video Streaming Systems Using Siphons
HESUAN HU,ZHIWU LI........ pp. 1863-1884
14. Analysis of Camera's Images Influenced by Varying Light Illumination for Design of Color Segmentation
KUO-YANG TU........ pp. 1885-1899
15. Power-Aware Register Assignment for Multi-Banked Register Files
HWANN-YUN SHIEH,SHU-YI HSU........ pp. 1901-1920
16. Preventing Information Leakage in Mobile Applications with Object-Oriented Access Control Lists and Security Monitor Encapsulation
SHIOW-YANG WU,SHIH-CHIEN CHOU........ pp. 1921-1937
SHORT PAPERS SHORT PAPERS
17. Intrinsic Image Extraction from a Single Image
YUN-CHUNG CHUNG,SHEN CHERNG,ROBERT R. BAILEY,SEI-WANG CHEN........ pp. 1939-1953
18. Fingerprint Classification in DCT Domain using RBF Neural Networks
CONG JIN,PING JIN........ pp. 1955-1962
19. Deadlock Control for Weighted Systems of Simple Sequential Processes with Resources Requirement (WS3PR)
DANIEL YUH CHAO........ pp. 1963-1978