Journal of Information Processing Systems, Vol. 9, No.2, 2013

The Confinement Problem: 40 Years Later
Alex Crowell, Beng Heng Ng, Earlence Fernandes and Atul Prakash
Page: 189~204, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.189
Keywords: Confinement Problem, Covert Channels, Virtualization, Isolation, Taint Tracking
Show / Hide Abstract

An Analysis of Replication Enhancement for a High Availability Cluster
Sehoon Park, Im Y. Jung, Heonsang Eom and Heon Y. Yeom
Page: 205~216, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.205
Keywords: High-Availability Cluster, Replication Enhancement, SRM, DRBD
Show / Hide Abstract

An Improved Approach to Ranking Web Documents
Pooja Gupta, Sandeep K. Singh, Divakar Yadav and A. K. Sharma
Page: 217~236, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.217
Keywords: Ranking, Ordering, WWW, Information Retrieval, Contextual Relevance, Contextual Sense, Web Documents
Show / Hide Abstract

A Study of Wireless Sensor Network Routing Protocols for Maintenance Access Hatch Condition Surveillance
Hoo-Rock Lee, Kyung-Yul Chung and Kyoung-Son Jhang
Page: 237~246, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.237
Keywords: Maintenance Hatch, Underground Facilities, WSN, Routing Protocol, ns-2
Show / Hide Abstract

A Secure Network for Mobile Wireless Service
Kun Peng
Page: 247~258, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.247
Keywords: Mobile Wireless Network, Security
Show / Hide Abstract

An Integrated Neural Network Model for Domain Action Determination in Goal-Oriented Dialogues
Hyunjung Lee, Harksoo Kim and Jungyun Seo
Page: 259~270, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.259
Keywords: Domain Action, Speech Act, Concept Sequence, Neural Network
Show / Hide Abstract

Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption
Om Prakash Verma, Munazza Nizam and Musheer Ahmad
Page: 271~286, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.271
Keywords: Chaotic Systems, Number of Pixel Change Rate, Unified Average Changed Intensity, Correlation Coefficient, Entropy
Show / Hide Abstract

A Secure Index Management Scheme for Providing Data Sharing in Cloud Storage
Sun-Ho Lee and Im-Yeong Lee
Page: 287~300, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.287
Keywords: Searchable Encryption, Proxy Re-Encryption, Index Management, Cloud Computing, Cloud Storage
Show / Hide Abstract

On the Minimization of Crosstalk Conflicts in a Destination Based Modified Omega Network
Ved Prakash Bhardwaj and Nitin
Page: 301~314, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.301
Keywords: Optical Multistage Interconnection Network, Crosstalk, Time Domain Approach, Omega Network, Destination Based Modified Omega Network, Crosstalk Free Modified Omega Network
Show / Hide Abstract

An Improvement Video Search Method for VP-Tree by using a Trigonometric Inequality
Samuel Sangkon Lee, Masami Shishibori and Chia Y. Han
Page: 315~332, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.315
Keywords: Vantage Point; VP-Tree; Trigonometric Inequality; Search Algorithm; Range Search; Nearest Neighbor Search; AESA algorithm; Multimedia Database
Show / Hide Abstract

Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer
Thang Hoang, Thuc Nguyen, Chuyen Luong, Son Do and Deokjai Choi
Page: 333~348, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.333
Keywords: Gait Recognition, Mobile Security, Accelerometer, Pattern Recognition, Authentication, Identification, Signal Processing
Show / Hide Abstract