


default search action
The Journal of Information Processing Systems, Volume 10
Volume 10, Number 1, 2014
- Cyrus Shahabi, Seon Ho Kim, Luciano Nocera, Giorgos Constantinou, Ying Lu, Yinghao Cai, Gérard G. Medioni, Ramakant Nevatia, Farnoush Banaei Kashani:
Janus - Multi Source Event Detection and Collection System for Effective Surveillance of Criminal Activity. 1-22 - Junho Kim
, Seung-Hyun Yoon, Yunjin Lee:
Trivariate B-spline Approximation of Spherical Solid Objects. 23-35 - Bharti Sharma, Ravinder Singh Bhatia, Awadhesh Kumar Singh:
A Token Based Protocol for Mutual Exclusion in Mobile Ad Hoc Networks. 36-54 - Le Thi Khue Van, Gueesang Lee:
Stroke Width-Based Contrast Feature for Document Image Binarization. 55-68 - Wanquan Peng, Chengchang Zhang:
The Construction and Viterbi Decoding of New (2k, k, l) Convolutional Codes. 69-80 - Kyungkoo Jun:
Push-N-Scheme with Timeout for Content Delivery of Social Networking Services. 81-91 - Oyuntungalag Chagnaadorj, Jiro Tanaka:
Gesture Input as an Out-of-band Channel. 92-102 - Rasheed Hussain, Heekuck Oh:
Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks. 103-118 - Ummy Habiba, Md. Imdadul Islam, M. Ruhul Amin:
Performance Evaluation of the VoIP Services of the Cognitive Radio System, Based on DTMC. 119-131 - Youjin Song, Yasheng Pang:
How to Manage Cloud Risks Based on the BMIS Model. 132-144 - Salim Khiat, Hafida Belbachir, Sidi Ahmed Rahal:
Probabilistic Models for Local Patterns Analysis. 145
Volume 10, Number 2, 2014
- John W. Manry, Santosh V. Nagaraj:
Non-iterative Bit Loading Algorithm for OFDM in Independent and Correlated fading. 163-175 - Syed Muhammad Asad Zaidi
, Jieun Jung, Byunghun Song:
Prioritized Multipath Video Forwarding in WSN. 176-192 - Rashmi Sharma
, Nitin
:
Duplication with Task Assignment in Mesh Distributed System. 193-214 - Myungjin Cho, In-Ho Lee:
Optical Image Encryption and Decryption Considering Wireless Communication Channels. 215-222 - Madhu Jain, Maneesha Gupta
, N. K. Jain:
The Design of the IIR Differintegrator and its Application in Edge Detection. 223-239 - Youjin Song, Yasheng Pang:
Leveraged BMIS Model for Cloud Risk Control. 240-255 - Anant M. Bagade, Sanjay N. Talbar
:
A High Quality Steganographic Method Using Morphing. 256-270 - Kyung-Rog Kim, Nam-Mee Moon:
Content Modeling Based on Social Network Community Activity. 271-282 - Zaher Hamid Al-Tairi, Rahmita Wirza O. K. Rahmat
, M. Iqbal Saripan
, Puteri Suhaiza Sulaiman
:
Skin Segmentation Using YUV and RGB Color Spaces. 283-299 - Shi-Kyu Bae:
Power Consumption Analysis of Prominent Time Synchronization Protocols for Wireless Sensor Networks. 300-313 - Yuan-Xiang Dong, Zhi Xiao, Xue Xiao
:
Default Prediction for Real Estate Companies with Imbalanced Dataset. 314
Volume 10, Number 3, 2014
- Eunju Kim, Sumi Helal:
Training-Free Fuzzy Logic Based Human Activity Recognition. 335-354 - Yong-Lak Choi, Woo-Seong Jeon, Seok-Hwan Yoon:
Improving Database System Performance by Applying NoSQL. 355-364 - Hayat Bendoukha, Yahya Slimani, Abdelkader Benyettou
:
A Novel Framework for Defining and Submitting Workflows to Service-Oriented Systems. 365-383 - Young Min Kwon, Hyunseung Choo, Tae-Jin Lee, Min Young Chung, Mihui Kim:
Femtocell Subband Selection Method for Managing Cross- and Co-tier Interference in a Femtocell Overlaid Cellular Network. 384-394 - Klaokanlaya Silachan, Panjai Tantatsanawong:
Imputation of Medical Data Using Subspace Condition Order Degree Polynomials. 395-411 - Kwang-il Hwang, In Jang:
Ultra Low Power Data Aggregation for Request Oriented Sensor Networks. 412-428 - Muhammad Zeeshan Arshad, Javeria Muhammad Nawaz, Sang Jeen Hong:
Fault Detection in the Semiconductor Etch Process Using the Seasonal Autoregressive Integrated Moving Average Modeling. 429-442 - Deepak Ghimire
, Joonwhoan Lee:
Extreme Learning Machine Ensemble Using Bagging for Facial Expression Recognition. 443-458 - Tasnina A. Tishita, Sumiya Akhter, Md. Imdadul Islam, M. Ruhul Amin:
Spectrum Sensing and Data Transmission in a Cognitive Relay Network Considering Spatial False Alarms. 459-470 - Jiaguo Lv, Jingfeng Guo, Huixiao Ren:
Efficient Greedy Algorithms for Influence Maximization in Social Networks. 471-482 - Jyoti Malik, Dhiraj Girdhar, Ratna Dahiya, G. Sainarayanan:
Multifactor Authentication Using a QR Code and a One-Time Password. 483
Volume 10, Number 4, 2014
- Vladi Kolici
, Albert Herrero, Fatos Xhafa:
On the Performance of Oracle Grid Engine Queuing System for Computing Intensive Applications. 491-502 - Houcine Boubaker, Najiba Tagougui
, Haikal El Abed, Monji Kherallah
, Adel M. Alimi
:
Graphemes Segmentation for Arabic Online Handwriting Modeling. 503-522 - Qing Zhang:
The Accuracy of the Non-continuous I Test for One- Dimensional Arrays with References Created by Induction Variables. 523-542 - Jin Gon Shon
, Byoung Wook Kim:
Design and Implementation of a Content Model for m-Learning. 543-554 - Youssef Elmir
, Zakaria Elberrichi, Reda Adjoudj
:
Multimodal Biometric Using a Hierarchical Fusion of a Person's Face, Voice, and Online Signature. 555-567 - Jesmin Akhter, Md. Imdadul Islam, M. Ruhul Amin:
Performance Evaluation of the WiMAX Network under a Complete Partitioned User Group with a Traffic Shaping Algorithm. 568-580 - Jang-Seop Jeong, Dae Wook Bang:
An Unified Representation of Context Knowledge Base for Mobile Context-Aware System. 581-588 - Kittiya Khongkraphan:
An Efficient Color Edge Detection Using the Mahalanobis Distance. 589-601 - Risala T. Khan, Md. Imdadul Islam, M. Ruhul Amin:
Traffic Analysis of a Cognitive Radio Network Based on the Concept of Medium Access Probability. 602-617 - Fizza Abbas, Heekuck Oh:
A Step towards User Privacy while Using Location-Based Services. 618-627 - Qi Cao, Satoshi Fujita:
Cost-Effective Replication Schemes for Query Load Balancing in DHT-Based Peer-to-Peer File Searches. 628

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.