JISE
Journal of Information Science and Engineering
Vol. 24 No. 4 (July 2008)
PAPERS
1. Design of QoS and Admission Control for VoIP Services Over IEEE 802.11e WLANs
Pei-Yeh Wu,Jen-Jee Chen,Yu-Chee Tseng,Hung-Wei Lee........ pp. 1003-1022
2. On Message Sequences for Incremental Network Computing
Cho-Chin Lin........ pp. 1023-1040
3. Efficient Discovery of Frequent Continuities by Projected Window List Technology
Kuo-Yu Huang,Chia-Hui Chang,Kuo-Zui Lin........ pp. 1041-1064
4. A Modified EDCA with Dynamic Contention Control for Real-Time Traffic in Multi-hop Ad Hoc Networks
Yang-Jing Wu,Jen-Hung Chiu,Tsang-Ling Sheu........ pp. 1065-1079
5. Ant Colony Optimization Approaches to the Degree-constrained Minimum Spanning Tree Problem
Yoon-Teck Bau,Chin-Kuan Ho,Hong-Tat Ewe........ pp. 1081-1094
6. New Prediction- and Affine Transformation-Based Three-Step Search Scheme for Motion Estimation With Application
Kuo-Liang Chung,Ta-Jen Yao,Yong-Huai Huang........ pp. 1095-1109
7. An Intelligent Data Mining Approach Using Neuro-Rough Hybridization to Discover Hidden Knowledge from Information Systems
Reza Sabzevari,Gh. A. Montazer........ pp. 1111-1126
8. Filtering of Unnecessary Branch Predictor Lookups for Low-power Processor Architecture
Wei-Hau Chiao,Chung-Ping Chung........ pp. 1127-1142
9. Identity-Based Parallel Key-Insulated Signature Without Random Oracles
Jian Weng,Xiang-Xue Li,Ke-Fei Chen,Sheng-Li Liu........ pp. 1143-1157
SHORT PAPERS
10. A Unified Min-Max Transition-Based Data Hiding Algorithm for Mixed Text/Halftone Images
Shih-Tung Wu,Kuo-Liang Chung,Yong-Huai Huang,Jung-Gen Wu ........ pp. 1159-1173
11. A Temporal Aggregation Method for Update-Intensive Applications
Sung Tak Kang,Yon Dohn Chung,Myoung Ho Kim........ pp. 1175-1186
12. A Quadtree-based Progressive Lossless Compression Technique for Volumetric Data Sets
Gregor Klajnsek,Borut Zalik,Franc Novak,Gregor Papa........ pp. 1187-1195
13. A Robust and Accurate Calibration Method by Computer Vision Techniques for Coordinate Transformation between Display Screens and Their Images
Sheng-Wen Jeng,Wen-Hsiang Tsai........ pp. 1197-1211
14. A Secure Hash-Based Strong-Password Authentication Protocol Using One-Time Public-Key Cryptography
Minho Kim,Cetin Kaya Koc........ pp. 1213-1227
15. Network Intrusion Detection Based on Shift-OR Circuit
Huang-Chun Roan,Wen-Jyi Hwang,Wei-Jhih Huang,Chia-Tien Dan Lo........ pp. 1229-1239
16. Multilayer Inpainting on Digitalized Artworks
Rong-Chi Chang,Timothy K. Shih........ pp. 1241-1255
17. The Application-Level Protocol for QoS Supporting in Synchronized Multimedia Sessions
Chun-Chuan Yang,Sze-Horng Lee,Li-Yuan Cheng........ pp. 1257-1271
18. The Segmented-Matrix Algorithm for Haar Discrete Wavelet Transform
Po-Yueh Chen,En-Chi Liao,Chung-Wei Liang........ pp. 1273-1282