Digital Library


Vol. 6, No. 4, Dec. 2010  



  1. Zhi-Hui Wang, Chin-Chen Chang, Pei-Yu Tsai
    Vol. 6, No. 4, pp. 435-452, Dec. 2010  
    10.3745/JIPS.2010.6.4.435

    Keywords: Data Hiding, Steganography, Vector Quantization
    Show / Hide Abstract

  2. Elena Andreeva, Bart Mennink, Bart Preneel
    Vol. 6, No. 4, pp. 453-480, Dec. 2010  
    10.3745/JIPS.2010.6.4.453

    Keywords: Hash Functions, Domain Extenders, Security Properties
    Show / Hide Abstract

  3. Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa
    Vol. 6, No. 4, pp. 481-500, Dec. 2010  
    10.3745/JIPS.2010.6.4.481

    Keywords: data-mining, Fuzzy Logic, IDS, Intelligent Techniques, network security, Software Agents
    Show / Hide Abstract

  4. Dae-Suk Yoo, Seung Sik Choi
    Vol. 6, No. 4, pp. 501-510, Dec. 2010  
    10.3745/JIPS.2010.6.4.501

    Keywords: sensor networks, Energy-Efficient MAC, S-MAC
    Show / Hide Abstract

  5. Md. Imdadul Islam, Nasima Begum, Mahbubul Alam, M. R. Amin
    Vol. 6, No. 4, pp. 511-520, Dec. 2010  
    10.3745/JIPS.2010.6.4.511

    Keywords: Canny Filter, Color Inversion, Skewness, Kurtosis and Convolution
    Show / Hide Abstract

  6. Juyoung Kang, Hwan-Seung Yong
    Vol. 6, No. 4, pp. 521-536, Dec. 2010  
    10.3745/JIPS.2010.6.4.521

    Keywords: Data Mining, Spatio-Temporal Data Mining, Trajectory Data, Frequent Spatio-Temporal Patterns
    Show / Hide Abstract

  7. Maneesha Srivasatav, Yogesh Singh, Durg Singh Chauhan
    Vol. 6, No. 4, pp. 537-552, Dec. 2010  
    10.3745/JIPS.2010.6.4.537

    Keywords: clustering, Debugging, Fault Localization, Optimization, Software Testing
    Show / Hide Abstract

  8. Sung-Jin Baek, Sun-Mi Park, Su-Hyun Yang, Eun-Ha Song, Young-Sik Jeong
    Vol. 6, No. 4, pp. 553-562, Dec. 2010  
    10.3745/JIPS.2010.6.4.553

    Keywords: Server Virtualization, Grid Service, Grid Infrastructure, Power Efficiency, Cloud Computing
    Show / Hide Abstract

  9. Ahmed Salem
    Vol. 6, No. 4, pp. 563-574, Dec. 2010  
    10.3745/JIPS.2010.6.4.563

    Keywords: Injection Flaws, SQL Injection, Intercepting Filter, Cross-site Scripting Vulnerability
    Show / Hide Abstract

  10. Hidayat Febiansyah, Jin Baek Kwon
    Vol. 6, No. 4, pp. 575-596, Dec. 2010  
    10.3745/JIPS.2010.6.4.575

    Keywords: Proxy-Assisted, Periodic Broadcasting, Video-on-demand
    Show / Hide Abstract

  11. Chetna Gupta, Yogesh Singh, Durg Singh Chauhan
    Vol. 6, No. 4, pp. 597-608, Dec. 2010  
    10.3745/JIPS.2010.6.4.597

    Keywords: Change Impact Analysis, Regression Testing, Software Maintenance, Software Testing
    Show / Hide Abstract

  12. Hyung-Min Lim, Kun-Won Jang, Byung-Gi Kim
    Vol. 6, No. 4, pp. 609-620, Dec. 2010  
    10.3745/JIPS.2010.6.4.609

    Keywords: u-learning, E-learning, Event Hooking, Content packing
    Show / Hide Abstract