References
- A. J. Perez, S. Zeadally, and N. Jabeur, "Security and privacy in ubiquitous sensor networks," Journal of Information Processing Systems, vol. 14, no. 2, pp. 286-308, 2018. https://doi.org/10.3745/JIPS.03.0094
- H. Kim and E. Lee, "Verifying code toward trustworthy software," Journal of Information Processing Systems, vol. 14, no. 2, pp. 309-321, 2018. https://doi.org/10.3745/JIPS.01.0027
- A. Zubedi, Z. Jianqiu, Q. A. Arain, I. Memon, S. Khan, M. S. Khan, and Y. Zhang, "Sustaining low-carbon emission development: an energy efficient transportation plan for CPEC," Journal of Information Processing Systems, vol. 14, no. 2, pp. 322-345, 2018. https://doi.org/10.3745/JIPS.04.0067
- H. Arshad, A. B. Jantan, and O. I. Abiodun, "Digital forensics: review of issues in scientific validation of digital evidence," Journal of Information Processing Systems, vol. 14, no. 2, pp. 346-376, 2018. https://doi.org/10.3745/JIPS.03.0095
- J. H. Qiang, D. W. Ning, T. J. Feng, and L. W. Ping, "Dynamic cloud resource reservation model based on trust," Journal of Information Processing Systems, vol. 14, no. 2, pp. 377-395, 2018. https://doi.org/10.3745/JIPS.03.0091
- J. J. Kim, "Routing techniques for data aggregation in sensor networks," Journal of Information Processing Systems, vol. 14, no. 2, pp. 396-417, 2018. https://doi.org/10.3745/JIPS.04.0065
- F. Barigou, "Impact of instance selection on kNN-based text categorization," Journal of Information Processing Systems, vol. 14, no. 2, pp. 418-434, 2018. https://doi.org/10.3745/JIPS.02.0080
- M. Elmouhtadi, S. E. Fkihi, and D. Aboutajdine, "Fingerprint identification based on hierarchical triangulation," Journal of Information Processing Systems, vol. 14, no. 2, pp. 435-447, 2018. https://doi.org/10.3745/JIPS.02.0084
- Z. Ye, M. Zhu, and J. Wang, "On modification and application of the artificial bee colony algorithm," Journal of Information Processing Systems, vol. 14, no. 2, pp. 448-454, 2018. https://doi.org/10.3745/JIPS.01.0025
- S. Bagchi, "Formulating analytical solution of network ODE systems based on input excitations," Journal of Information Processing Systems, vol. 14, no. 2, pp. 455-468, 2018. https://doi.org/10.3745/JIPS.03.0092
- S. Bougueroua and B. Boucheham, "GLIBP: gradual locality integration of binary patterns for scene images retrieval," Journal of Information Processing Systems, vol. 14, no. 2, pp. 469-486, 2018. https://doi.org/10.3745/JIPS.02.0081
- X. Hai and C. Zhao, "Optimization of train working plan based on multiobjective bi-level programming model," Journal of Information Processing Systems, vol. 14, no. 2, pp. 487-498, 2018. https://doi.org/10.3745/JIPS.04.0066
- Y. W. Jang, M. H. Kang, and J. W. Chang, "Efficient hybrid transactional memory scheme using nearoptimal retry computation and sophisticated memory management in multi-core environment," Journal of Information Processing Systems, vol. 14, no. 2, pp. 499-509, 2018. https://doi.org/10.3745/JIPS.01.0026
- C. Wang, H. Zhang, and X. Zhou, "Review on self-embedding fragile watermarking for image authentication and self-recovery," Journal of Information Processing Systems, vol. 14, no. 2, pp. 510-522, 2018. https://doi.org/10.3745/JIPS.02.0082
- S. H. Lee, J. H. Roh, S. Kim, and S. H. Jin, "Feature subset for improving accuracy of keystroke dynamics on mobile environment," Journal of Information Processing Systems, vol. 14, no. 2, pp. 523-538, 2018. https://doi.org/10.3745/JIPS.03.0093
- L. Lin, "An effective denoising method for images contaminated with mixed noise based on adaptive median filtering and wavelet threshold denoising," Journal of Information Processing Systems, vol. 14, no. 2, pp. 539-551, 2018. https://doi.org/10.3745/JIPS.02.0083
- S. Wang, J. Xie, Y. Zheng, J. Wang, and T. Jiang, "A method of coupling expected patch log likelihood and guided filtering for image denoising," Journal of Information Processing Systems, vol. 14, no. 2, pp. 552-562, 2018. https://doi.org/10.3745/JIPS.02.0085