Digital Library


Vol. 12, No. 2, Jun. 2016  



  1. Kenan Mu, Fei Hui, Xiangmo Zhao
    Vol. 12, No. 2, pp. 183-195, Jun. 2016  
    https://doi.org/10.3745/JIPS.02.0040

    Keywords: computer vision, Highway Traffic Surveillance, SIFT Feature Matching, Vehicle Detection, Vehicle Tracking
    Show / Hide Abstract

  2. Moneeb Gohar, Seok-Joo Koh
    Vol. 12, No. 2, pp. 196-213, Jun. 2016  
    https://doi.org/10.3745/JIPS.03.0037

    Keywords: Comparison, HIP, LTE, LISP, MIP, Mobility Management, PMIP, SAE
    Show / Hide Abstract

  3. Nabizath Saleena, Vineeth Paleri
    Vol. 12, No. 2, pp. 214-225, Jun. 2016  
    https://doi.org/10.3745/JIPS.02.0014

    Keywords: Equivalent Expression, Global Value Numbering, Herbrand Equivalence, Strong Equivalence Dag
    Show / Hide Abstract

  4. Jayaprakash Kar, Manoj Ranjan Mishra
    Vol. 12, No. 2, pp. 226-233, Jun. 2016  
    https://doi.org/10.3745/JIPS.03.0049

    Keywords: Dynamic Access Control, Risk Assessment, Security Intelligence
    Show / Hide Abstract

  5. Kuldeep Gurjar, Yang-Sae Moon
    Vol. 12, No. 2, pp. 234-248, Jun. 2016  
    https://doi.org/10.3745/JIPS.04.0024

    Keywords: Data Provenance, Trustworthiness of Data, Data Quality, Trustworthiness Evaluation, Trust Score
    Show / Hide Abstract

  6. Samaneh Mashhadi
    Vol. 12, No. 2, pp. 249-262, Jun. 2016  
    https://doi.org/10.3745/JIPS.03.0050

    Keywords: Non-Repudiation, Proxy Signature Scheme, Signature Scheme, Threshold Proxy Signature, Unforgeability
    Show / Hide Abstract

  7. Yan Li, Dongho Kim, Byeong-Seok Shin
    Vol. 12, No. 2, pp. 263-274, Jun. 2016  
    https://doi.org/10.3745/JIPS.04.0025

    Keywords: Location-aware, NoSQL Database System, WBAN Monitoring System
    Show / Hide Abstract

  8. Yasmine-Derdour, Bouabdellah-Kechar, Mohammed Fayc?al-Khelfi
    Vol. 12, No. 2, pp. 275-294, Jun. 2016  
    https://doi.org/10.3745/JIPS.03.0032

    Keywords: Data Collection, MDCs, Mobility Model, Mobile Relay, Mobile Sink, Simulation, WSNs
    Show / Hide Abstract

  9. Muhammad Sajjad Khan, Insoo Koo
    Vol. 12, No. 2, pp. 295-309, Jun. 2016  
    https://doi.org/10.3745/JIPS.03.0040

    Keywords: cognitive radio, Contention-Aware Reporting, Cooperative Spectrum Sensing, Evidence Theory (D-S Theory), Multiple Energy Detector, Sequential Data Fusion
    Show / Hide Abstract

  10. Gautham Sekar, Soumyadeep Bhattacharya
    Vol. 12, No. 2, pp. 310-312, Jun. 2016  
    https://doi.org/10.3745/JIPS.03.0021

    Keywords: cryptanalysis, Hash Function, (Second) Preimage Attack
    Show / Hide Abstract

  11. Ayman Al-Dmour, Mohammed Abuhelaleh, Ahmed Musa, Hasan Al-Shalabi
    Vol. 12, No. 2, pp. 322-331, Jun. 2016  
    https://doi.org/10.3745/JIPS.03.0051

    Keywords: Bit-Level, Lempel-Ziv Coding, Lossless Image Compression, Source Encoding
    Show / Hide Abstract