Journal of Information Science and Engineering, Volume 33 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
⚠
Please note that none of the items listed on this page have a DOI stored with their dblp record. Therefore, DOI-based queries won't return any results.
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 33, Number 1, January 2017
Papers

Heyang Xu, Bo Yang:
Energy-aware Resource Management in Cloud Computing Considering Load Balance. 1-16
Wen-Tin Lee, Shang-Pin Ma, Yao-Yu Tsai:
Retrieval of Web Service Components using UML Modeling and Term Expansion. 17-36
Xiang-Wei Zheng, Xiaomei Yu, Yan Li, Hong Liu:
An Enhanced Multi-objective Group Search Optimizer Based on Multi-producer and Crossover Operator. 37-50
Pei-Yin Chen, Yen-Chen Lai, Ping-Hsuan Lai:
Hardware Implementation of Local Mean Decomposition. 51-62
Ke Gu, Yong Wang, Sheng Wen:
Traceable Threshold Proxy Signature. 63-79
Ke-Kun Hu, Guosun Zeng, Wen-Juan Liu, Wei Wang:
A Reliability Analysis for Successful Execution of Parallel DAG Tasks. 81-99
Amna Khan, Iram Noreen, Zulfiqar Habib:
On Complete Coverage Path Planning Algorithms for Non-holonomic Mobile Robots: Survey and Challenges. 101-121
You-Chiun Wang, Hung-Yi Ko:
Energy-Efficient Downlink Resource Scheduling for LTE-A Networks with Carrier Aggregation. 123-141
Mohammadhossein Barkhordari, Mahdi Niamanesh:
ScaDiGraph: A MapReduce-based Method for Solving Graph Problems. 143-158
Mohammad Javani, Meghdad Mirabi:
An Efficient Index and Data Distribution Scheme for XML Data Broadcast in Mobile Wireless Networks. 159-182
Po-Jen Chuang, Chung-Hsing Wang:
An Efficient Group-based Data Backup and Recovery Scheme in Cloud Computing Systems. 183-198
Bay Vo:
An Efficient Method for Mining Frequent Weighted Closed Itemsets from Weighted Item Transaction Databases. 199-216
Sun-Kyum Kim, Sung-Bong Yang:
Effective Forwarding Scheme for Opportunistic Networks Based on Refined Contact Probability and Betweenness Centrality. 217-232
Yi-Ruei Chen, Shiuan-Tzuo Shen, Wen-Guey Tzeng:
Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over ℤp. 233-250
Ya-Hui Chang, Chia-Zhen Lee, Si-Yen Zhuang:
A Tree-Based Approach to Support Query Translation for Schema Mappings with Weights. 251-270
Volume 33, Number 2, March 2017
Papers

Tsung-Shian Huang, Jen-Hao Liao, Wen-Chieh Lin, Jung-Hong Chuang:
An Artist Friendly Material Design System. 273-288
Ju-Yuan Hsiao, Zhi-Yang Lin, Po-Yueh Chen:
Reversible Data Hiding Based on Pairwise Prediction-Error Histogram. 289-304
Der-Rong Din:
Heuristic and Genetic Algorithms for Solving the Virtual Topology Design Problem on Elastic Optical Networks. 305-327
Wei-Sheng Wong, Shin-Chung Hsu, Chung-Lin Huang:
A Virtual TouchPad for Smartphone with Depth Camera. 329-345
C. Eswaran, Ramakrishnan Kannan, A. Mohamed Uvaze Ahamed:
CBIR System Based On Prediction Errors. 347-365
Der-Rong Din, Wei-Ting Chen:
Fragmentation-Aware Routing Algorithms for Multicast Problem on Elastic Optical Networks. 367-384
Tien-Khoi Phan, HaRim Jung, Hee Yong Youn, Ung-Mo Kim:
QR*-Tree: An Adaptive Space-Partitioning Index for Monitoring Moving Objects. 385-411
Hyun Jun Kim, Kwang Hee Lee, Myoung-Ho Kim:
Finding a Minimum Source Set in Directed Hypergraphs. 413-428
Zakaria Mukhtar Gharsseldien, Syed Alwee Aljunid, Hassan Yousif Ahmed:
Performance Analysis of Diagonal Permutation Shifting (DPS) Codes for SAC-OCDMA Systems. 429-444
Donghai Tian, Xiaoqi Jia, Junhua Chen, Changzhen Hu:
An Online Approach for Kernel-level Keylogger Detection and Defense. 445-461
Qian Li, Weiguo Wu, Zeyu Sun, Jianhang Huang:
An Efficient Two-Level Hierarchy Job Scheduling and Task Dispatching Strategy for Cluster Rendering System. 463-483
Yang Yang, Shu-Lve Yang, Fenghe Wang, Jin Sun:
Post-Quantum Secure Public Key Broadcast Encryption with Keyword Search. 485-497
Hongwei Zhao, Zhen Wang, Pingping Liu, Bin Wu:
The Normalized Distance Preserving Binary Codes and Distance Table. 499-515
Sun-Hee Kim, Lei Li, Christos Faloutsos, Hyung-Jeong Yang, Seong-Whan Lee:
DAPs: Mining using Change-Point Detection of Epileptic Activity Time Series Data. 517-536
Kyu-Seok Shim, Sung-Ho Yoon, Su-Kang Lee, Myung-Sup Kim:
SigBox: Automatic Signature Generation Method for Fine-grained Traffic Identification. 537-569
Short Paper
Volume 33, Number 3, May
Papers

Suyel Namasudra, Pinki Roy:
A New Table Based Protocol for Data Accessing in Cloud Computing. 585-609
Amna Riaz, Junaid Qadir, Usman Younis, Raihan Ur Rasool, Hafiz Farooq Ahmad, Adnan K. Kiani:
Intrusion Detection Systems in Cloud Computing: A Contemporary Review of Techniques and Solutions. 611-634
Hong Rong, Huimei Wang, Jian Liu, Ming Xian:
Efficient Privacy-Preserving Building Blocks in Cloud Environments under Multiple Keys. 635-652
Yong Li, Ge Yao, Huaqun Wang, Changlu Lin:
Large Branching Tree Based Dynamic Provable Data Possession Scheme. 653-673
Soo-Fun Tan, Azman Samsudin:
Ciphertext Policy-Attribute Based Homomorphic Encryption (CP-ABHER-LWE) Scheme: A Fine-Grained Access Control on Outsourced Cloud Data Computation. 675-694
Perumal Pandiaraja, Pandi Vijayakumar, Varadarajan Vijayakumar, Raman Seshadhri:
Computation Efficient Attribute Based Broadcast Group Key Management for Secure Document Access in Public Cloud. 695-712
Mala T., Vijayanand K. S:
SiDS: Sudoku inspired Data Scrambling Method for Securing Data in Cloud using N -cloud Architecture. 713-725
Sivaraman Audithan, Vijayaregunathan Vijayasaro, Pandi Vijayakumar, Varadarajan Vijayakumar:
An Efficient Authentication Scheme for Mobile Cloud Computing Services. 727-741
Ao-di Liu, Na Wang, Mingcong Liu:
A PANH-based Access Control Mechanism for Cross-Cloud Service Composition. 743-758
G. NaliniPriya, Kotteswari Karthikeyan, K. G. Maheswari:
An Enhanced Priority Scheduling Algorithm for Multi-Server Retrieval Cloud System. 759-772
T. Subha, S. Jayashri:
Public Auditing Scheme for Data Storage Security in Cloud Computing. 773-787
Jingxia Zhang, Leyou Zhang:
Anonymous CP-ABE against Side-channel Attacks in Cloud Computing. 789-805
Jiangyong Shi, Jie He, Yuexiang Yang:
An SDN-based Sampling System for Cloud P2P Bots Detection. 807-821
Vaidehi Vijayakumar, Sangeetha Dhamodaran:
Improved Searchable Attribute Based Encryption in Cloud. 823-836
P. G. Shynu, John Singh K:
An Enhanced CP-ABE based Access Control Algorithm for Point to Multi-Point Communication in Cloud Computing. 837-858
Suguna Marappan, Sharmila Dhandapani:
Efficient Virtualization Technique for Cloud to Achieve Optimal Resource Allocation. 859-869
Volume 33, Number 4, July
Papers

Feng Wang, Li Xu:
Strongly Secure Certificateless Signature Scheme in the Standard Model with Resisting Malicious-But-Passive KGC Attack Ability. 873-889
Ke Huang, Xiaosong Zhang, Xiao-Fen Wang:
Block-Level Message-Locked Encryption with Polynomial Commitment for IoT Data. 891-905
Fushan Wei, Qi Jiang, Ruijie Zhang, Chuangui Ma:
A Privacy-Preserving Multi-Factor Authenticated Key Exchange Protocol with Provable Security for Cloud Computing. 907-921
Jian Shen, Dengzhi Liu, Qi Liu, Debiao He, Xingming Sun:
An Enhanced Cloud Data Storage Auditing Protocol Providing Strong Security and Efficiency for Smart City. 923-938
Wei-Tao Song, Bin Hu, Xiu-Feng Zhao:
Optimizing LWE-based FHE for Better Security and Privacy Protection of Smart City. 939-952
Xingxin Li, Youwen Zhu, Jian Wang:
Efficient Encrypted Data Comparison Through a Hybrid Method. 953-964
Jian Xu, Si-Jia Zhao, Fucai Zhou:
Privacy Protection Model Based on Digital Envelope and Dummies for Location-Based Services. 965-978
Fan Zhang, Lin Kang, Xinyan Xu, Jian Shen, Lu Zhou:
Power Controlled and Stability-based Routing Protocol for Wireless Ad hoc Networks. 979-992
Mingwu Zhang, Yudi Zhang, Hua Shen, Chunming Tang, Lein Harn:
Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security. 993-1006
Jingjing Guo, Jianfeng Ma, Xinghua Li, Junwei Zhang, Tao Zhang:
An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy. 1007-1023
Hao-Hao Nie, Yanping Li, Qian-Hong Wu:
A Privacy-Preserving V2I Authentication Scheme Without Certificates. 1025-1040
Yao-Ling Ding, Jing-Yuan Zhao, Lei-Bo Li, Hong-Bo Yu:
Impossible Differential Analysis on Round-Reduced PRINCE. 1041-1053
Short Papers

Qiao Liu, Yong Wang, Wenjing Zhang, Hui Li:
Secret Data Transmission in Wireless Sensor Network with Physical Layer Network Coding. 1055-1067
Feifei Sun, Chao Wu, Dong Sheng:
Bayesian Networks for Intrusion Dependency Analysis in Water Controlling Systems. 1069-1083
Yang Li, Menting Chen, Jian Wang:
Another Security Evaluation of SPA Countermeasures for AES Key Expansion in IoT Devices. 1085-1100
Volume 33, Number 5, September
Computer System

Yuhui Deng, Xinyu Huang, Liangshan Song, Yongtao Zhou, Frank Wang:
Memory Deduplication: An Effective Approach to Improve the Memory System. 1103-1120
Wen-Yew Liang, Ming-Feng Chang, Yen-Lin Chen:
Optimal Energy Saving DVFS Approach of Embedded Processors. 1121-1140
AI, Machine Learning, and Pattern Recognition

Xueqiao Wang, Jia-Zheng Yuan, Qing Li:
3D Face Recognition Using Spherical Vector Norms Map. 1141-1161
Tsung-Shian Huang, Fu-Hsi Huang, Wen-Chieh Lin, Jung-Hong Chuang:
Lighting and Foggy Effect Transfer. 1163-1176
Shih-Chung Hsu, I-Chieh Chen, Chung-Lin Huang:
Image Classification Using Naive Bayes Classifier With Pairwise Local Observations. 1177-1193
Ming Liu, Vasile Rus, Qiang Liao, Li Liu:
Encoding and Ranking Similar Chinese Characters. 1195-1211
Jianqing Mo, Hanwu He, Jin-Fang Li, Yu-Wei Wei:
Semantic Segmentation and Structure Representation of the Generalized Body Cavity. 1213-1235
Theoretical Computer Science and Information Theory

Chia-Wei Hsu, Chia-Huei Chang, Chi-Wei Wang, Shiuhpyng Shieh:
DROIT+: Taint Tracking for Storage Access on Android. 1237-1254
Network and Communication

Xiao Yu, Weimin Lei, Wei Zhang, Li Song:
A Routing Algorithm Based on SDN for On-Board Switching Networks. 1255-1266
Muzammil Behzad, Muhammad Sharjeel Javaid, M. A. Parahca, S. Khan:
Distributed PCA and Consensus Based Energy Efficient Routing Protocol for WSNs. 1267-1283
Ming-Jian Liu, Guozhen Tan, Nan Ding, Fuxin Zang:
Study on Self-adaptive Message Scheduler Used for the Vehicle Ad-hoc Network. 1285-1305
L. Sherly Puspha Annabel, K. Murugan:
An Asynchronous and Adaptive Quorum Based MAC Protocol for Wireless Sensor Networks. 1307-1322
Database and Engineering

Zhixiao Wang, Jingke Xi, Yan Xing, Zhiguo Hu:
Community Number Estimation for Community Detection in Complex Networks. 1323-1341
Zhen Zhao, Zongmin Ma:
Semantic Similarity Measure of Fuzzy XML DTDs with Extreme Learning Machine. 1343-1358
Elkhan Jabarov, Myong-Soon Park, Byung-Won On, Gyu Sang Choi:
PCR*-Tree: PCM-Aware R*-Tree. 1359-1374
Xiaoyan Zhang, Xiangfu Meng, Yanhuan Tang, Chongchun Bi:
Adaptive Query Relaxation and Result Categorization based on Data distribution and Query Context. 1375-1396
Volume 33, Number 6, November
Papers

Abdul Rehman Gilal, Jafreezal Jaafar, Ahsanullah Abro, Mazni Omar, Shuib Basri, Muhammad Qaiser Saleem:
Effective Personality Preferences of Software Programmer: A Systematic Review. 1399-1416
Farrukh Aslam Khan, Umar Manzoor, Azhar Khan, Aftab Ali, Haider Abbas, Maruf Pasha:
Peer-to-Peer File Sharing Framework for Smartphones: Deployment and Evaluation on Android. 1417-1432
Nazish Yaqoob, Seemab Latif, Rabia Latif, Haider Abbas, Asif Yaseen:
An Adaptive Rule-Based Approach to Resolving Real-Time VoIP Wholesale Billing Disputes. 1433-1446
Abdul Rehman Gilal, Jafreezal Jaafar, Ahsanullah Abro, Waheed Ali Umrani, Shuib Basri, Mazni Omar:
Making Programmer Effective for Software Development Teams: An Extended Study. 1447-1463
Basit Shehzad, Kinza Mehr Awan, Muhammad Ikram Ullah Lali, Waqar Aslam:
Identification of Patterns in Failure of Software Projects. 1465-1479
Waqar Aslam, Farah Ijaz, Muhammad Ikram Ullah Lali, Waqar Mehmood:
Risk Aware and Quality Enriched Effort Estimation for Mobile Applications in Distributed Agile Software Development. 1481-1500
Sehrish Ferdous, Naveed Ikram:
Communication and Coordination Using Facebook: A Case Study of Distributed Software Development. 1501-1517
Javed Iqbal, Rodina Binti Ahmad, Mohd Hairul Nizam Md. Nasir, Muzafar Khan:
Significant Requirements Engineering Practices for Outsourced Mobile Application Development. 1519-1530
Muhammad Awais, Samreen Nawaz, Muhammad Sheraz Arshad Malik, Fazal-e-Amin:
A Comparative Study on Context Assessment Approaches in Mobile Robots. 1531-1546
Sheikh Tahir Bakhsh, Basit Shahzad, Sabeen Tahir:
Risk Management Approaches for Large Scale Software Development. 1547-1560
Saad Shafiq, Irum Inayat:
Model-driven Development based Cross Platform Application Development: A Systematic Mapping Study. 1561-1573
Jinho Ahn:
SBML Protocol for Conquering Simultaneous Failures with Group Dissemination Functionality. 1575-1593
Xiu-Juan Pu, Liang Han, Qian Liu, An-Yan Jiang:
FECG Extraction Based on Least Square Support Vector Machine Combined with FastICA. 1595-1609
Khan Bahadar Khan, Amir A. Khaliq, Muhammad Shahid:
A Novel Fast GLM Approach for Retinal Vascular Segmentation and Denoising. 1611-1627
Logesh Ravi, V. Subramaniyaswamy:
Learning Recency and Inferring Associations in Location Based Social Network for Emotion Induced Point-of-Interest Recommendation. 1629-1647

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:








