default search action
Journal of Computer and System Sciences, Volume 80
Volume 80, Number 1, February 2014
- Sebastián Ventura, Cristóbal Romero, Ajith Abraham:
Foreword: Intelligent data analysis. 1-2
- Manuel Baena-García, José M. Carmona-Cejudo, Rafael Morales Bueno:
String analysis by sliding positioning strategy. 3-15 - Prakash Shelokar, Arnaud Quirin, Oscar Cordón:
Three-objective subgraph mining using multiobjective evolutionary programming. 16-26 - Abir Smiti, Zied Elouedi:
WCOID-DG: An approach for case base maintenance based on Weighting, Clustering, Outliers, Internal Detection and Dbsan-Gmeans. 27-38 - Ricardo Cerri, Rodrigo C. Barros, André Carlos Ponce de Leon Ferreira de Carvalho:
Hierarchical multi-label classification using local neural networks. 39-56 - Alvaro Ortigosa, Rosa M. Carro, José Ignacio Quiroga:
Predicting user personality by mining social interactions in Facebook. 57-71 - Pasquale De Meo, Emilio Ferrara, Giacomo Fiumara, Alessandro Provetti:
Mixing local and global information for community detection in large networks. 72-87 - José Otero, Luciano Sánchez, Inés Couso, Ana M. Palacios:
Bootstrap analysis of multiple repetitions of experiments using an interval-valued multiple comparison procedure. 88-100 - David García, Antonio González Muñoz, Raúl Pérez:
A feature construction approach for genetic iterative rule learning algorithm. 101-117 - María Martínez-Ballesteros, Isabel A. Nepomuceno-Chamorro, José C. Riquelme:
Discovering gene association networks by multi-objective evolutionary quantitative association rules. 118-136
- Tomás Brázdil, Václav Brozek, Vojtech Forejt, Antonín Kucera:
Branching-time model-checking of probabilistic pushdown automata. 139-156 - Fedor V. Fomin, Petr A. Golovach:
Parameterized complexity of connected even/odd subgraph problems. 157-179 - Robert Ganian, Petr Hlinený, Alexander Langer, Jan Obdrzálek, Peter Rossmanith, Somnath Sikdar:
Lower bounds on the complexity of MSO1 model-checking. 180-194 - Kaiping Xue, Peilin Hong, Changsha Ma:
A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. 195-206 - Archontia C. Giannopoulou, Iosif Salem, Dimitris Zoros:
Effective computation of immersion obstructions for unions of graph classes. 207-216 - Jin-Yi Cai, Pinyan Lu, Mingji Xia:
The complexity of complex weighted Boolean #CSP. 217-236 - Shuping Wan, Jiuying Dong:
A possibility degree method for interval-valued intuitionistic fuzzy multi-attribute group decision making. 237-256 - Paolo Romano, Roberto Palmieri, Francesco Quaglia, Nuno Carvalho, Luís E. T. Rodrigues:
On speculative replication of transactional systems. 257-276 - Arnaud Durand, Stefan Mengel:
The complexity of weighted counting for acyclic conjunctive queries. 277-296 - Mika Göös, Tuomo Lempiäinen, Eugen Czeizler, Pekka Orponen:
Search methods for tile sets in patterned DNA self-assembly. 297-319
Volume 80, Number 2, March 2014
- Anuj Dawar, Ruy J. G. B. de Queiroz:
Editor's foreword: WoLLIC 2010. 321-322 - Naeem Abbasi, Osman Hasan, Sofiène Tahar:
An approach for lifetime reliability analysis using theorem proving. 323-345 - Aditi Barthwal, Michael Norrish:
A mechanisation of some context-free language theory in HOL4. 346-362 - Tomer Kotek, Johann A. Makowsky:
A representation theorem for (q-)holonomic sequences. 363-374 - Markus Latte, Martin Lange:
Branching-time logics with path relativisation. 375-389 - Glyn Morrill, Oriol Valentín:
Displacement logic for anaphora. 390-409 - Renata Hax Sander Reiser, Benjamín R. C. Bedregal, G. A. A. dos Reis:
Interval-valued fuzzy coimplications and related dual interval-valued conjugate functions. 410-425
- Nadia Creignou, Odile Papini, Reinhard Pichler, Stefan Woltran:
Belief revision within fragments of propositional logic. 427-449 - Aryeh Kontorovich, Ari Trachtenberg:
Deciding unique decodability of bigram counts via finite automata. 450-456 - Adrian Ionescu, Ernst L. Leiss:
On the role of complementation in implicit language equations and relations. 457-467 - Fedor V. Fomin, Bart M. P. Jansen, Michal Pilipczuk:
Preprocessing subgraph and minor problems: When does a small vertex cover help? 468-495
- William Hesse, Eric Allender, David A. Mix Barrington:
Corrigendum to "Uniform constant-depth threshold circuits for division and iterated multiplication" [J. Comput. System Sci. 65(4) (2002) 695-716]. 496-497
Volume 80, Number 3, May 2014
- Al-Sakib Khan Pathan, Zubair Md. Fadlullah, Mostafa Fouda, Hae Young Lee:
Defending against wireless network intrusion. 499-501
- Alif Wahid, Christopher Leckie, Chenfeng Vincent Zhou:
Estimating the number of hosts corresponding to an intrusion alert while preserving privacy. 502-519 - Yifan Zhao, Swee-Won Lo, Robert H. Deng, Xuhua Ding:
Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks. 520-532 - Yang Yang:
Broadcast encryption based non-interactive key distribution in MANETs. 533-545 - Zhiwei Wang, Guozi Sun, Danwei Chen:
A new definition of homomorphic signature for identity management in mobile cloud computing. 546-553 - Paulo Manoel Mafra, Joni da Silva Fraga, Altair Olivo Santin:
Algorithms for a distributed IDS in MANETs. 554-570 - Manuel Gil Pérez, Félix Gómez Mármol, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta:
Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems. 571-590 - Saeed Ur Rehman, Kevin W. Sowerby, Colin Coghill:
Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers. 591-601 - Guangjie Han, Jinfang Jiang, Lei Shu, Jianwei Niu, Han-Chieh Chao:
Management and applications of trust in Wireless Sensor Networks: A survey. 602-617 - Thanassis Giannetsos, Tassos Dimitriou:
LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks. 618-643 - Hosein Shafiei, Ahmad Khonsari, H. Derakhshi, Payam Mousavi:
Detection and mitigation of sinkhole attacks in wireless sensor networks. 644-653 - Mauro Conti, Roberto Di Pietro, Angelo Spognardi:
Clone wars: Distributed detection of clone attacks in mobile WSNs. 654-669 - Leonardo Maccari, Renato Lo Cigno:
Betweenness estimation in OLSR-based multi-hop networks for distributed filtering. 670-685
Volume 80, Number 4, June 2014
- Robert Crowston, Michael R. Fellows, Gregory Z. Gutin, Mark Jones, Eun Jung Kim, Fran Rosamond, Imre Z. Ruzsa, Stéphan Thomassé, Anders Yeo:
Satisfying more than half of a system of linear equations over GF(2): A multivariate approach. 687-696 - Edith Hemaspaandra, Lane A. Hemaspaandra, Jörg Rothe:
The complexity of online manipulation of sequential elections. 697-710 - Gabriele Fici:
On the structure of bispecial Sturmian words. 711-719 - Stanislav Böhm, Stefan Göller, Petr Jancar:
Bisimulation equivalence and regularity for real-time one-counter automata. 720-743 - Richard Královic:
Infinite vs. finite size-bounded randomized computations. 744-765 - Sam Buss, Michael Soltys:
Unshuffling a square is NP-hard. 766-776 - Sanjay Jain, Eric Martin, Frank Stephan:
Robust learning of automatic classes of languages. 777-795 - Carlos Gómez-Rodríguez:
Finding the smallest binarization of a CFG is NP-hard. 796-805 - John Case, Sanjay Jain, Yuh Shin Ong, Pavel Semukhin, Frank Stephan:
Automatic learners with feedback queries. 806-820 - Stefania Tosi, Sara Casolari, Michele Colajanni:
Detecting correlation between server resources for system management. 821-836 - Qi Duan, Jinhui Xu:
On the connectivity preserving minimum cut problem. 837-848 - Ali Çivril:
Column Subset Selection Problem is UG-hard. 849-859 - Danny Dolev, Matthias Függer, Markus Posch, Ulrich Schmid, Andreas Steininger, Christoph Lenzen:
Rigorously modeling self-stabilizing fault-tolerant circuits: An ultra-robust clocking scheme for systems-on-chip. 860-900
Volume 80, Number 5, August 2014
- Rebecca Capone:
Publisher's note. 901
- Jinjun Chen, Jianxun Liu:
Special Issue: Dependable and Secure Computing. 902
- Yongming Xie, Guojun Wang:
Message matching-based greedy behavior detection in delay tolerant networks. 903-915 - Aarthi Nagarajan, Vijay Varadharajan, Nathan Tarr:
Trust enhanced distributed authorisation for web services. 916-934 - Christopher Bailey, David W. Chadwick, Rogério de Lemos:
Self-adaptive federated authorization infrastructures. 935-952 - Atef Shalan, Mohammad Zulkernine:
Software control flow error detection and correlation with system performance deviation. 953-972 - Julian Jang-Jaccard, Surya Nepal:
A survey of emerging threats in cybersecurity. 973-993 - Jiaqi Zhao, Lizhe Wang, Jie Tao, Jinjun Chen, Weiye Sun, Rajiv Ranjan, Joanna Kolodziej, Achim Streit, Dimitrios Georgakopoulos:
A security framework in G-Hadoop for big data computing across distributed Cloud data centres. 994-1007 - Xuyun Zhang, Chang Liu, Surya Nepal, Chi Yang, Wanchun Dou, Jinjun Chen:
A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud. 1008-1020 - Yu Wang, Yang Xiang, Jun Zhang, Wanlei Zhou, Bailin Xie:
Internet traffic clustering with side information. 1021-1036
Volume 80, Number 6, September 2014
- Lev D. Beklemishev, Ruy J. G. B. de Queiroz, Andre Scedrov:
Editors' foreword. 1037 - Antonis Achilleos:
A complexity question in justification logic. 1038-1045 - Samuel Bucheli, Roman Kuznets, Thomas Studer:
Realizing public announcements by justifications. 1046-1066 - Ranald Clouston:
Nominal Lawvere Theories: A category theoretic account of equational theories with names. 1067-1086 - Francicleber Martins Ferreira, Cibele Matos Freire, Mario R. F. Benevides, Luis Menasché Schechter, Ana Teresa C. Martins:
Polynomial hierarchy graph properties in hybrid logic. 1087-1101 - Santiago Figueira, Daniel Gorín, Rafael Grimson:
Independence friendly logic with classical negation via flattening is a second-order logic with weak dependencies. 1102-1118 - Julian Gutierrez, Glynn Winskel:
On the determinacy of concurrent games on event structures with infinite winning sets. 1119-1137 - Max I. Kanovich:
Multiset rewriting over Fibonacci and Tribonacci numbers. 1138-1151 - Juha Kontinen, Jakub Szymanik:
A characterization of definability of second-order generalized quantifiers with applications to non-definability. 1152-1162 - Rick Statman:
On polymorphic types of untyped terms. 1163-1173
Volume 80, Number 7, November 2014
- Julio Aracena, Adrien Richard, Lilian Salinas:
Maximum number of fixed points in AND-OR-NOT networks. 1175-1190 - Tom J. Ameloot, Jan Van den Bussche:
Positive Dedalus programs tolerate non-causality. 1191-1213 - Edith Cohen, Nick G. Duffield, Haim Kaplan, Carsten Lund, Mikkel Thorup:
Algorithms and estimators for summarization of unaggregated data streams. 1214-1244 - Amihood Amir, Alberto Apostolico, Gad M. Landau, Avivit Levy, Moshe Lewenstein, Ely Porat:
Range LCP. 1245-1253 - Jesús García-López, Florin Manea, Victor Mitrana:
Prefix-suffix duplication. 1254-1265 - Nikolaos Laoutaris, Laura J. Poplawski, Rajmohan Rajaraman, Ravi Sundaram, Shang-Hua Teng:
Bounded Budget Connection (BBC) games or how to make friends and influence people, on a budget. 1266-1284 - Cristina Bazgan, Morgan Chopin, Marek Cygan, Michael R. Fellows, Fedor V. Fomin, Erik Jan van Leeuwen:
Parameterized complexity of firefighting. 1285-1297 - Manfred Broy:
Verifying of interface assertions for infinite state Mealy machines. 1298-1322 - Amir Talaei-Khoei, Suchada Vichitvanichphong, Terje Solvoll, Pradeep Ray, Amir Hossein Ghapanchi:
A methodology to develop awareness in computer supported collaborative work using policies. 1323-1338 - Chunguang Li, Shouzhen Zeng, Tiejun Pan, Leina Zheng:
A method based on induced aggregation operators and distance measures to multiple attribute decision making under 2-tuple linguistic environment. 1339-1349 - Haitao Jiang, Binhai Zhu:
A linear kernel for the complementary maximal strip recovery problem. 1350-1358 - Christian Glaßer, Stephen D. Travers, Klaus W. Wagner:
Perfect correspondences between dot-depth and polynomial-time hierarchies. 1359-1373 - Fedor V. Fomin, Yngve Villanger:
Searching for better fill-in. 1374-1383 - Matthias Mnich, Geevarghese Philip, Saket Saurabh, Ondrej Suchý:
Beyond Max-Cut: λ-extendible properties parameterized above the Poljak-Turzík bound. 1384-1403 - Moein Kianpour, Reza Sabbaghi-Nadooshan, Keivan Navi:
A novel design of 8-bit adder/subtractor by quantum-dot cellular automata. 1404-1414 - Albert Atserias, Sergi Oliva:
Bounded-width QBF is PSPACE-complete. 1415-1429 - Fedor V. Fomin, Stefan Kratsch, Marcin Pilipczuk, Michal Pilipczuk, Yngve Villanger:
Tight bounds for parameterized complexity of Cluster Editing with a small number of clusters. 1430-1447 - Sergio Flesca, Filippo Furfaro, Francesco Parisi:
Consistency checking and querying in probabilistic databases under integrity constraints. 1448-1489
Volume 80, Number 8, December 2014
- Yang Xiang, Ivan Stojmenovic, Peter Mueller:
Editorial: Special Issue on Theory and Applications in Parallel and Distributed Computing Systems. 1491-1492 - Hua Wang, Lili Sun, Elisa Bertino:
Building access control policy model for privacy preserving and testing policy conflicting problems. 1493-1503 - Ahmed Sallam, Kenli Li, Aijia Ouyang, Zhiyong Li:
Proactive workload management in dynamic virtualized environments. 1504-1517 - Lan Zhou, Vijay Varadharajan, Michael Hitchens:
Secure administration of cryptographic role-based access control for large-scale cloud storage systems. 1518-1533 - Zhide Chen, Cheng Qiao, Yihui Qiu, Li Xu, Wei Wu:
Dynamics stability in wireless sensor networks active defense model. 1534-1548 - Guiyi Wei, Rongxing Lu, Jun Shao:
EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption. 1549-1562 - Chi Yang, Xuyun Zhang, Changmin Zhong, Chang Liu, Jian Pei, Kotagiri Ramamohanarao, Jinjun Chen:
A spatiotemporal compression based approach for efficient big data processing on Cloud. 1563-1583 - Younchan Jung, Enrique Festijo:
One-time packet key exchange scheme for secure real-time multimedia applications. 1584-1596 - Sébastien Gambs, Marc-Olivier Killijian, Miguel Núñez del Prado Cortez:
De-anonymization attack on geolocated data. 1597-1614
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.