Digital Library
Search: "[ author: S ]" (666)
-
Akihiro Satoh, Toshiaki Osada, Toru Abe, Gen Kitagata, Norio Shiratori, Tetsuo Kinoshita
Vol. 6, No. 3, pp. 307-322, Sep. 2010
10.3745/JIPS.2010.6.3.307
Keywords: Mobile IP Network, Traffic Classification, Network Management, Traffic Engineering, Machine Learning -
Mohamed Mostafa A. Azim
Vol. 6, No. 3, pp. 295-306, Sep. 2010
10.3745/JIPS.2010.6.3.295
Keywords: Wireless Sensor Network(WSN), Energy Efficient Routing -
Mohammad S. Obaidat, Sanjay K. Dhur, her, Deepank Gupta, Nidhi Gupta, Anupriya Asthana
Vol. 6, No. 3, pp. 269-294, Sep. 2010
10.3745/JIPS.2010.6.3.269
Keywords: Sensor network, Security, Energy Efficiency, Routing, Dynamic Trust Factor -
Gyeong-Sic Jo, Yong-Guk Kim
Vol. 6, No. 2, pp. 261-268, Jun. 2010
10.3745/JIPS.2010.6.2.261
Keywords: Active Appearance Model, Facial Expression Recognition, Image Alignment Method -
Ui Jin Jang, Hyung-Min Lim, Yong-Tae Shin
Vol. 6, No. 2, pp. 253-260, Jun. 2010
10.3745/JIPS.2010.6.2.253
Keywords: digital forensic, DRM, IP-Based Network -
Ruchika Malhotra, Arvinder Kaur, Yogesh Singh
Vol. 6, No. 2, pp. 235-252, Jun. 2010
10.3745/JIPS.2010.6.2.235
Keywords: Regression Testing, Maintenance, Prioritization -
Beatriz Neto, Lucia Fern, es, Claudia Werner, Jano Moreira de Souza
Vol. 6, No. 2, pp. 219-234, Jun. 2010
10.3745/JIPS.2010.6.2.219
Keywords: Games, Product Line, Software Reuse, Software Development -
Sang-Hyun Lee, Sung Eui Cho, Kyung-li Moon
Vol. 6, No. 2, pp. 209-218, Jun. 2010
10.3745/JIPS.2010.6.2.209
Keywords: Warranty Claims, Age, Usage, Fuzzy Logic -
Seong-Hee Bae, Jaejoon Kim
Vol. 6, No. 2, pp. 185-196, Jun. 2010
10.3745/JIPS.2010.6.2.185
Keywords: Information Protect Model, Mobile Agent, Personal Information Protection, Privacy Protection Policy -
Lukman Sharif, Munir Ahmed
Vol. 6, No. 2, pp. 177-184, Jun. 2010
10.3745/JIPS.2010.6.2.177
Keywords: Secure routing, Routing Attacks, Routing Protocols, Wireless Sensor Networks (WSN), Wormhole Attack