Journal of Information Processing Systems, Vol. 6, No.4, 2010

Hiding Secret Data in an Image Using Codeword Imitation
Zhi-Hui Wang, Chin-Chen Chang and Pei-Yu Tsai
Page: 435~452, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.435
Keywords: Data Hiding, Steganography, Vector Quantization
Show / Hide Abstract

Security Properties of Domain Extenders for Cryptographic Hash Functions
Elena Andreeva, Bart Mennink and Bart Preneel
Page: 453~480, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.453
Keywords: Hash Functions, Domain Extenders, Security Properties
Show / Hide Abstract

Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Aly M. El-Semary and Mostafa Gadal-Haqq M. Mostafa
Page: 481~500, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.481
Keywords: Data-Mining, Fuzzy Logic, IDS, Intelligent Techniques, Network Security, Software Agents
Show / Hide Abstract

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks
Dae-Suk Yoo and Seung Sik Choi
Page: 501~510, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.501
Keywords: Sensor Networks, Energy-Efficient MAC, S-MAC
Show / Hide Abstract

Fingerprint Detection Using Canny Filter and DWT, a New Approach
Md. Imdadul Islam, Nasima Begum, Mahbubul Alam and M. R. Amin
Page: 511~520, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.511
Keywords: Canny Filter, Color Inversion, Skewness, Kurtosis and Convolution
Show / Hide Abstract

Mining Spatio-Temporal Patterns in Trajectory Data
Juyoung Kang and Hwan-Seung Yong
Page: 521~536, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.521
Keywords: Data Mining, Spatio-Temporal Data Mining, Trajectory Data, Frequent Spatio-Temporal Patterns
Show / Hide Abstract

An Optimized Approach of Fault Distribution for Debugging in Parallel
Maneesha Srivasatav, Yogesh Singh and Durg Singh Chauhan
Page: 537~552, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.537
Keywords: Clustering, Debugging, Fault Localization, Optimization, Software Testing
Show / Hide Abstract

Efficient Server Virtualization using Grid Service Infrastructure
Sung-Jin Baek, Sun-Mi Park, Su-Hyun Yang, Eun-Ha Song and Young-Sik Jeong
Page: 553~562, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.553
Keywords: Server Virtualization, Grid Service, Grid Infrastructure, Power Efficiency, Cloud Computing
Show / Hide Abstract

Intercepting Filter Approach to Injection Flaws
Ahmed Salem
Page: 563~574, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.563
Keywords: Injection Flaws, SQL Injection, Intercepting Filter, Cross-site Scripting Vulnerability
Show / Hide Abstract

Generalized Proxy-Assisted Periodic Broadcasting (G-ProB) for Heterogeneous Clients in Video-on- Demand Service
Hidayat Febiansyah and Jin Baek Kwon
Page: 575~596, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.575
Keywords: Proxy-Assisted, Periodic Broadcasting, Video-on-Demand
Show / Hide Abstract

A Dynamic Approach to Estimate Change Impact using Type of Change Propagation
Chetna Gupta, Yogesh Singh and Durg Singh Chauhan
Page: 597~608, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.597
Keywords: Change Impact Analysis, Regression Testing, Software Maintenance, Software Testing
Show / Hide Abstract

A Study on Design and Implementation of the Ubiquitous Computing Environment-based Dynamic Smart On/Off-line Learner Tracking System
Hyung-Min Lim, Kun-Won Jang and Byung-Gi Kim
Page: 609~620, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.609
Keywords: u-Learning, e-Learning, Event Hooking, Content packing
Show / Hide Abstract