References
- A. Khatamian, R. Jafri, and H. R. Arabnia, "Survey on 3D surface reconstruction," Journal of Information Processing Systems, vol. 12, no. 3, pp. 338-357, 2016. https://doi.org/10.3745/JIPS.01.0010
- B. Mederos, N. Amenta, L. Velho, and L. H. de Figueiredo, "Surface reconstruction for noisy point clouds," in Proceedings of 3rd Eurographics Symposium on Geometry Processing, Vienna, Austria, 2005, pp. 53-62.
- K. Z. Bousmaha, M. K. Rahmouni, B. Kouninef, and L. H. Belguith, "A hybrid approach of morpho-lexical disambiguation of Arabic," Journal of Information Processing Systems, vol. 12, no. 3, pp. 358-380, 2016. https://doi.org/10.3745/JIPS.02.0041
- R. Nelken and S. M. Shieber, "Arabic diacritization using weighted finite-state transducers," in Proceedings of the ACL Workshop on Computational Approaches to Semitic Languages, Ann Arbor, MI, 2005, pp. 79-86.
- A. M. Azmi and R. S. Almajed, "A survey of automatic Arabic diacritization techniques," Natural Language Engineering, vol. 21, no. 3, pp. 477-495, 2015. https://doi.org/10.1017/S1351324913000284
- S. Han, I. Y. Lee, and J. H. Ahn, "Two-dimensional joint Bayesian method for face verification," Journal of Information Processing Systems, vol. 12, no. 3, pp. 381-391, 2016. https://doi.org/10.3745/JIPS.02.0036
- G. B. Huang, M. Ramesh, T. Berg, and E. Learned-Miller, "Labeled faces in the wild: a database for studying face recognition in unconstrained environments," University of Massachusetts, Amherst, Technical Report 07-49, 2007.
- L. Boussaad, M. Benmohammed, and R. Benzid, "Age invariant face recognition based on DCT feature extraction and kernel Fisher analysis," Journal of Information Processing Systems, vol. 12, no. 3, pp. 392-409, 2016. https://doi.org/10.3745/JIPS.02.0043
- T. F. Cootes, G. J. Edwards, and C. J. Taylor, "Active appearance models," IEEE Transactions on pattern Analysis and Machine Intelligence, vol. 23, no. 6, pp. 681-685, 2001. https://doi.org/10.1109/34.927467
- H. Chao and C. Song, "Landmark-guided segmental speech decoding for continuous mandarin speech recognition," Journal of Information Processing Systems, vol. 12, no. 3, pp. 410-421, 2016. https://doi.org/10.3745/JIPS.03.0052
- S. A. Liu, "Landmark detection for distinctive feature-based speech recognition," Journal of the Acoustical Society of America, vol. 100, no. 5, pp. 3417-3430, 1996. https://doi.org/10.1121/1.416983
- S. Y. Choi, D. Kim, and Y. M. Kim, "ELPA: emulation-based linked page map analysis for the detection of driveby download attacks," Journal of Information Processing Systems, vol. 12, no. 3, pp. 422-435, 2016. https://doi.org/10.3745/JIPS.03.0045
- C. Chantrapornchai and P. Nusawat, "Two machine learning models for mobile phone battery discharge rate prediction based on usage patterns," Journal of Information Processing Systems, vol. 12, no. 3, pp. 436-454, 2016. https://doi.org/10.3745/JIPS.03.0048
- N. Vallina-Rodriguez and J. Crowcroft, "Energy management techniques in modern mobile handsets," IEEE Communications Surveys & Tutorials, vol. 15, no. 1, pp. 179-198, 2013. https://doi.org/10.1109/SURV.2012.021312.00045
- H. W. Seo, H. Kwon, M. A. Cheon, and J. H. Kim, "Bilingual multiword expression alignment by constituentbased similarity score," Journal of Information Processing Systems, vol. 12, no. 3, pp. 455-467, 2016. https://doi.org/10.3745/JIPS.02.0044
- F. Smadja, K. McKeown, and V. Hatzivassiloglou, "Translating collocations for bilingual lexicons: a statistical approach," Computational Linguistics, vol. 22, no. 1, pp. 1-38, 1996.
- C. Ammar, B. Mebarka, O. Abdelmalik, and B. Salah, "Evaluation of Histograms Local Features and Dimensionality Reduction for 3D Face Verification," Journal of Information Processing Systems, vol. 12, no. 3, pp. 468-488, 2016. https://doi.org/10.3745/JIPS.02.0037
- Y. Ming, "Rigid-area orthogonal spectral regression for efficient 3D face recognition," Neurocomputing, vol. 129, pp. 445-457, 2014. https://doi.org/10.1016/j.neucom.2013.09.014
- J. K. Lee, S. Y. Moon, and J. H. Park, "HB-DIPM: human behavior analysis-based malware detection and intrusion prevention model in the future internet," Journal of Information Processing Systems, vol. 12, no. 3, pp. 489-501, 2016. https://doi.org/10.3745/JIPS.01.0009
- Y. Hou, X. Wang, and S. Liu, "A multiple features video copy detection algorithm based on a SURF descriptor," Journal of Information Processing Systems, vol. 12, no. 3, pp. 502-510, 2016. https://doi.org/10.3745/JIPS.02.0042
- M. Yu, J. Rexford, X. Sun, S. Rao, and N. Feamster, "A survey of virtual LAN usage in campus networks," IEEE Communications Magazine, vol. 49, no. 7, pp. 98-103, 2011.
- V. G. Nguyen and Y. H. Kim, "SDN-based enterprise and campus networks: a case of VLAN management," Journal of Information Processing Systems, vol. 12, no. 3, pp. 511-524, 2016. https://doi.org/10.3745/JIPS.03.0039
- M. H. A. Al-Hooti, S. Djanali, and T. Ahmad, "Audio data hiding based on sample value modification using modulus function," Journal of Information Processing Systems, vol. 12, no. 3, pp. 525-537, 2016. https://doi.org/10.3745/JIPS.03.0054
- W. Zhu and C. Lee, "A security protection framework for cloud computing," Journal of Information Processing Systems, vol. 12, no. 3, pp. 538-547, 2016. https://doi.org/10.3745/JIPS.03.0053
- S. N. Srirama, P. Jakovits, and E. Vainikko, "Adapting scientific computing problems to clouds using MapReduce," Future Generation Computer Systems, vol. 28, no. 1, pp. 184-192, 2012. https://doi.org/10.1016/j.future.2011.05.025