![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
The Journal of Information Processing Systems, Volume 7
Volume 7, Number 1, March 2011
- Mohamed Kamal Jbira, Munir Ahmed:
Computer Simulation: A Hybrid Model for Traffic Signal Optimisation. 1-16 - Jiehui Chen, Mariam B. Salim, Mitsuji Matsumoto:
A Single Mobile Target Tracking in Voronoi-based Clustered Wireless Sensor Network. 17-28 - Aries Kusdaryono, Kyung-Oh Lee:
A Clustering Protocol with Mode Selection for Wireless Sensor Network. 29-42 - Mouhamed Abdulla
, Yousef R. Shayan:
Analytical Coexistence Benchmark for Assessing the Utmost Interference Tolerated by IEEE 802.20. 43-52 - Ivy Ong, Hyotaek Lim:
Dynamic Load Balancing and Network Adaptive Virtual Storage Service for Mobile Appliances. 53-62 - Chunye Gong
, Jie Liu, Haitao Chen, Jing Xie, Zhenghu Gong:
Accelerating the Sweep3D for a Graphic Processor Unit. 63-74 - Jung-Hwan Chang:
An Embedding of Multiple Edge-Disjoint Hamiltonian Cycles on Enhanced Pyramid Graphs. 75-84 - Susumu Matsumae:
Effective Partitioning of Static Global Buses for Small Processor Arrays. 85-92 - Haiqing Nan, Kyung Ki Kim, Wei Wang, Ken Choi:
Dynamic Voltage and Frequency Scaling for Power- Constrained Design using Process Voltage and Temperature Sensor Circuits. 93-102 - Jun Guo, Joohee Kim:
Adaptive Motion Vector Smoothing for Improving Side Information in Distributed Video Coding. 103-110 - Divyan M. Konidala, Daeyoung Kim, Chan Yeob Yeun, Byoungcheon Lee:
Security Framework for RFID-based Applications in Smart Home Environment. 111-120 - Mohammed Alzaabi, Chan Yeob Yeun, Thomas Anthony Martin
:
Ensuring Anonymity for LBSs in Smartphone Environment. 121-136 - HyoJin Kim, Ramachandra Bhargav Chitti, JooSeok Song:
Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks. 137-150 - Neda Rohani, Zainab Noferesti, Javad Mohajeri, Mohammad Reza Aref:
Guess and Determine Attack on Bivium. 151-158 - Dengguo Feng, Jing Xu, Weidong Chen:
Generic Constructions for Strong Designated Verifier Signature. 159-172 - Mengsong Zou, Lansheng Han, Ming Liu, Qiwen Liu:
Virus Detection Method based on Behavior Resource Tree. 173-186 - Jae-Jung Kim, Seng-Phil Hong:
A Method of Risk Assessment for Multi-Factor Authentication. 187-198 - Gaëtan Martens, Ruben Verborgh
, Chris Poppe, Rik Van de Walle:
Lifting a Metadata Model to the Semantic Multimedia World. 199-208 - Jung-Min Oh, Nammee Moon:
A Cultural Dimensions Model based on Smart Phone Applications. 209-220
Volume 7, Number 2, June 2011
- Ai Hua Ho, Yao Hua Ho, Kien A. Hua, Roy Villafane, Han-Chieh Chao:
An Efficient Broadcast Technique for Vehicular Networks . 221-240 - Mohammad S. Obaidat, Sanjay K. Dhurandher, Khushboo Diwakar:
CASPER: Congestion Aware Selection of Path with Efficient Routing in Multimedia Networks. 241-260 - Wei Nie, Houjun Wang, Jong Hyuk Park:
Packet Scheduling with QoS and Fairness for Downlink Traffic in WiMAX Networks. 261-270 - Yamin Li, Shietung Peng, Wanming Chu:
Parallel Prefix Computation and Sorting on a Recursive Dual-Net. 271-286 - Meeyeon Lee, Jung-Won Lee, Kyung-Ah Kim, Seung Soo Park:
Evaluating Service Description to Guarantee Quality of U-service Ontology. 287-298 - Nithiapidary Muthuvelu, Ian Chai, Eswaran Chikkannan, Rajkumar Buyya:
Batch Resizing Policies and Techniques for Fine- Grain Grid Tasks: The Nuts and Bolts. 299-320 - Vu Van Tan, Myeong-Jae Yi:
Development of an OPC Client-Server Framework for Monitoring and Control Systems. 321-340 - Ash Mohammad Abbas:
Analysis of Generalized Impact Factors and the Indices of Journals. 341-354 - Jaehee Byeon, Ju-Hong Song, Nammee Moon:
Design of Multi-dimensional Contents Retrieval UI for Mobile IPTV. 355-362 - Ruchika Malhotra, Mohit Garg:
An Adequacy Based Test Data Generation Technique Using Genetic Algorithms. 363-384 - Hong Joo Lee:
Analysis of Business Attributes in Information Technology Environments. 385-396
Volume 7, Number 3, September 2011
- Witold Pedrycz:
The Principle of Justifiable Granularity and an Optimization of Information Granularity Allocation as Fundamentals of Granular Computing. 397-412 - Mohammad H. Pandi, Omid Kashefi
, Behrouz Minaei:
A Novel Similarity Measure for Sequence Data. 413-424 - Ayra Panganiban, Noel B. Linsangan, Felicito Caluyo:
Wavelet-based Feature Extraction Algorithm for an Iris Recognition System. 425-434 - Joonhyuk Yoo
:
Probabilistic Soft Error Detection Based on Anomaly Speculation. 435-446 - Concepción Pérez de Célis Herrero, Jaime Lara Alvarez, Gustavo Cossio Aguilar, María Josefa Somodevilla García:
An Approach to Art Collections Management and Content-based Recovery. 447-458 - Kyung-Mi Park, Han-Cheol Cho, Hae-Chang Rim:
Utilizing Various Natural Language Processing Techniques for Biomedical Interaction Extraction. 459-472 - Jagat Sesh Challa, Arindam Paul, Yogesh Dada, Venkatesh Nerella, Praveen Ranjan Srivastava, Ajit Pratap Singh
:
Integrated Software Quality Evaluation: A Fuzzy Multi-Criteria Approach. 473-518 - Hua Fang, Jeongwoo Kim, Jong-Whan Jang:
A Fast Snake Algorithm for Tracking Multiple Objects. 519-530 - Hiroshi Kutsuna, Satoshi Fujita:
A Fair and Efficient Congestion Avoidance Scheme Based on the Minority Game. 531-542 - Hong Joo Lee:
A Study on the Business Strategy of Smart Devices for Multimedia Contents. 543-548 - Kun Peng:
Efficient Proof of Vote Validity Without Honest-Verifier Assumption in Homomorphic E-Voting. 549-560
Volume 7, Number 4, December 2011
- Amit Grover, Hal Berghel:
A Survey of RFID Deployment and Security Issues. 561-580 - Yuki Fujiwara, Susumu Date
, Kohei Ichikawa
, Haruo Takemura:
A Multi-Application Controller for SAGE-enabled Tiled Display Wall in Wide-area Distributed Computing Environments. 581-594 - Amartya Neogi, Abhoy Chand Mondal, Soumitra Kumar Mandal:
A Cascaded Fuzzy Inference System for University Non-Teaching Staff Performance Appraisal. 595-612 - Da-Ren Chen, You-Shyang Chen:
An Efficient DVS Algorithm for Pinwheel Task Schedules. 613-626 - Ji In Kim, Seok Joo Koh:
Partial Bicasting with Buffering for Proxy Mobile IPv6 Handover in Wireless Networks. 627-634 - Seo-Young Noh, Shashi K. Gadia:
A Model Comparison for Spatiotemporal Data in Ubiquitous Environments: A Case Study. 635-652 - Tonmoy Saha, Md. Abu Shufean, Mahbubul Alam, Md. Imdadul Islam:
Performance Evaluation of the WiMAX Network Based on Combining the 2D Markov Chain and MMPP Traffic Model. 653-678 - Md. Syeful Islam, Md. Rezaur Rahman, Anupam Roy, Md. Imdadul Islam, M. Ruhul Amin:
Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic. 679-690 - Daewan Han:
Grobner Basis Attacks on Lightweight RFID Authentication Protocols. 691-706 - Joon-Min Gil, Mihye Kim:
A Log Analysis System with REST Web Services for Desktop Grids and its Application to Resource Group-based Task Scheduling. 707-716 - Simon Fong, Yang Hang, Sabah Mohammed, Jinan Fiaidhi:
Stream-based Biomedical Classification Algorithms for Analyzing Biosignals. 717
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.