Member login


Member  :

Password:



 Links

 Magazine

TOP 10 (Ten 10 most downloaded papers starting counting from November, 2010.)
close
Designing Integrated High Performance Web Portals for GIScience Research
     Volume 11, No 6, 2010
     Tong Zhang1, Ming-Hsiang Tsou2, Qinghua Qiao3, Bin Hu4
A Robust Dynamic Access Control Scheme in a User Hierarchy Based on One-Way Hash Functions
     Volume 15, No 2, 2014
     Yu-Hao Chuang1, Chien-Lung Hsu1,2
Fuzzy Set Theory-Based Trust Models in Multi-Agent Environment
     Volume 13, No 1, 2012
     Zhiyuan Su1, Mingchu Li1, Cheng Guo1, Jianhua Ma2, Jong Hyuk Park3, Young-Sik Jeong4
Research on Data Reconstruction Method Based on Identifier/Locator Separation Architecture
     Volume 12, No 4, 2011
     Ying Liu1, Ming Wan1, Hong-Ke Zhang1, Si-Dong Zhang1, Han-Chieh Chao2,3
Improvement on a Smart Card Based Password Authentication Scheme
     Volume 13, No 3, 2012
     Debiao He, Jianhua Chen, Jin Hu
Adaptive Zone-Based Bandwidth Management in IEEE 802.16j Multi-Hop Relay Network
     Volume 15, No 2, 2014
     Chun-Chuan Yang1, Yi-Ting Mai2, Jeng-Yueng Chen3, I-Wei Lin1
A Study on Using the Kano Two-Dimensional Quality Model to Evaluate the Service Quality of Government Websites
     Volume 15, No 2, 2014
     Shih-Wu Liang1, Hsi-Peng Lu1, Ting-Kuei Kuo2
Visual Trustworthy Monitoring System (v-TMS) for Behavior of Trusted Computing
     Volume 11, No 6, 2010
     Young-Sik Jeong1, Jong Hyuk Park2
Arrival Process Modelling in Internet Auction
     Volume 13, No 5, 2012
     Chu-Fen Li
Designs of Enhanced CAC with QoS Scheme for Efficient Resource Allocations on the IEEE 802.16 Network
     Volume 15, No 2, 2014
     Shin-Jer Yang, Chun-Hsiu Cheng

On-line Journal   [TOP 10 downloaded papers]

     The newest IF for JIT has been released and is 0.481(2012).
Touchless Fingerprint Biometrics: A Survey on 2D and 3D Technologies
   Ruggero Donida Labati, Angelo Genovese, Vincenzo Piuri, Fabio Scotti
   Department of Computer Science, Universita degli Studi di Milano, Italy

Threat and Vulnerability Penetration Testing: Linux
   Deris Stiawan1, Abdul Hanan Abdullah2, Mohd. Yazid Idris3
   1Faculty of Computer Science, University of Sriwijaya, Indonesia 2Faculty of Co ...

Improved Multi-Dimensional Top-K Query Processing Based on Data Prediction in Wireless Sensor Networks
   Zhen-Jiang Zhang, Jun-Ren Jie, Zi-Qi Hao, Yun Liu
   School of Electronic and Information Engineering, Key Laboratory of Communicatio ...

Study on the Theoretical Framework of Not So Cooperative Caching
   Xiaoyan Hu, Jian Gong
   School of Computer Science & Engineering, Southeast University, China

An Efficient Networked HVAC Controlling System by Using Multi-Mode Concentrator P-Cycle
   Bin Li1, Bing Qi1, Yi Sun1, Liangrui Tang1, Huaguang Yan2
   1School of Electric and Electronic Engineering, North China Electric Power Unive ...

Cloud Manufacturing Service System for Industrial-Cluster-Oriented Application
   Qiang Liu1, Jiafu Wan2, Keliang Zhou3
   1Key Laboratory of Computer Integrated Manufacturing System, School of Electrome ...

Power-Saving Management for Energy-Efficient Green Clouds
   Jia-Liang Yen1, Ming-Jeng Yang2, Chao-Tung Yang3
   1Department of Information Technology, Takming University of Science and Technol ...

A Novel Resource Reservation Based on Cross Layer Design over Mobile Internet Protocol Version 6
   Reza Malekian1, Abdul Hanan Abdullah2, Ning Ye3
   1Department of Electrical, Electronic and Computer Engineering, University of Pr ...

An Automatic Extraction Approach of Worm Signatures Based on Behavioral Footprint Analysis
   Hanxun Zhou1, Wei Guo2, Yong Feng1
   1Department of Information Science, Liao Ning University, China 2Department of ...

Timed-Release Predicate Encryption and Its Extensions in Cloud Computing
   Chun-I Fan, Shi-Yuan Huang
   Department of Computer Science and Engineering, National Sun Yat-sen University, ...

A General Domain Name Appraisal Model
   Jih-Hsin Tang1, Min-Chu Hsu2, Ting-Yuan Hu1, Hsing-Hua Huang3
   1Department of Information Management, National Taipei College of Business, Taiw ...

A User-Friendly and Authenticatable Secret Image Sharing Scheme
   Jung-San Lee1, Chin-Chen Chang1,2, Hsin-Yi Tsai3
   1Department of Information Engineering and Computer Science, Feng Chia Universit ...

Performance Analysis of a Multichannel Dynamically Aggregative MAC Protocol for WSNs
   Gaofeng Pan1, Quanyuan Feng2
   1School of Electronic & Information Engineering, Southwest University, China 2S ...

Guest Editorial: Special Issue on Frontiers of Trust, Security and Privacy for Computer and Communication Networks
   Yulei Wu, Bhavani Thuraisingham, Yang Xiang
   

ARES: Aggressive Replication Enabled Scheduler for Hadoop Systems
   Yizhi Ren1,2, Laiping Zhao3, Haiyang Hu4
   1School of Software Engineering, Hangzhou Dianzi University, China 2State key L ...

The Design and Evaluation of a Terminal-Matching Adaptive Sampling Algorithm
   Haina Tang1,2, Liehuang Zhu3, Xiaola Lin1
   1School of Information Science and Technology, Sun Yat-sen University, China 2B ...

An Efficient Construction of Convertible Undeniable Proxy Signatures
   Wei Wu1,2, Yi Mu1,3, Willy Susilo3, Xinyi Huang1,2, Li Xu1
   1Fujian Provincial Key Laboratory of Network Security and Cryptology, School of ...

Improving QoS in Cooperative Communication Networks: An Evolutionary Game Approach
   Ping Zhu1, Guiyi Wei1, Mohammad Mehedi Hassan2, Atif Alamri2
   1Networking and Distributed Computing Laboratory, Zhejiang Gongshang University, ...