default search action
The Computer Journal, Volume 56
Volume 56, Number 1, January 2013
- Fairouz Kamareddine:
Capsule Reviews. 1
- Jan A. Bergstra, Jens Blanck, Faron Moller, Stanley S. Wainer:
Guest Editorial. 2 - Jan A. Bergstra, Inge Bethke, Alban Ponse:
Cancellation Meadows: A Generic Basis Theorem and Some Applications. 3-14 - Nick D. James, Jeffery I. Zucker:
A Class of Contracting Stream Operators. 15-33 - Maciej Gazda, Wan J. Fokkink:
Turning GSOS Rules into Equations for Linear Time-Branching Time Semantics. 34-44 - Jens Blanck:
Interval Domains and Computable Sequences: A Case Study of Domain Reductions. 45-52 - Bernhard Möller:
Modal Knowledge and Game Semirings. 53-69
- Zoran Duric, Dragan Gasevic:
A Source Code Similarity System for Plagiarism Detection. 70-86 - Estefanía Serral, Pedro Valderas, Vicente Pelechano:
Context-Adaptive Coordination of Pervasive Services by Interpreting Models during Runtime. 87-114 - Thi Nguyen, Zhen He, Yi-Ping Phoebe Chen:
SeTPR*-tree: Efficient Buffering for Spatiotemporal Indexes Via Shared Execution. 115-137
Volume 56, Number 2, February 2013
- Irfan Awan:
Editorial Performance Engineering of Communication Systems and Applications. 139-140 - Steven A. Wright, Simon D. Hammond, Simon J. Pennycook, Robert F. Bird, J. A. Herdman, I. Miller, A. Vadgama, Abhir H. Bhalerao, Stephen A. Jarvis:
Parallel File System Analysis Through Application I/O Tracing. 141-155 - O. F. J. Perks, D. A. Beckingsale, Simon D. Hammond, I. Miller, J. A. Herdman, A. Vadgama, Abhir H. Bhalerao, Ligang He, Stephen A. Jarvis:
Towards Automated Memory Model Generation Via Event Tracing. 156-174 - Malik Jahan Khan, Mian Muhammad Awais, Shafay Shamail:
A Randomized Partitioning Approach for CBR-Based Autonomic Systems to Improve Retrieval Performance. 175-183 - Constandinos X. Mavromoustakis, Helen D. Karatza:
Performance Evaluation of Opportunistic Resource-Sharing Scheme Using Socially Oriented Outsourcing in Wireless Devices. 184-197
- Ramon Bertran, Marc González, Xavier Martorell, Nacho Navarro, Eduard Ayguadé:
Counter-Based Power Modeling Methods: Top-Down vs. Bottom-Up. 198-213 - Sabela Ramos, Guillermo L. Taboada, Roberto R. Expósito, Juan Touriño, Ramon Doallo:
Design of Scalable Java Communication Middleware for Multi-Core Systems. 214-228 - Yi Xie, Jiankun Hu, S. Tang, X. Huang:
A Forward-Backward Algorithm for Nested Hidden semi-Markov Model and Application to Network Traffic. 229-238 - Pingshan Liu, Guimin Huang, Shengzhong Feng, Jianping Fan:
Event-Driven High-Priority First Data Scheduling Scheme for P2P VoD Streaming. 239-257 - Hongbing Fan, Yu-Liang Wu, Ray C. C. Cheung:
Design Automation Framework for Reconfigurable Interconnection Networks. 258-269
Volume 56, Number 3, March 2013
- Einoshin Suzuki:
Special Issue on Discovery Science: Guest Editor's Introduction. 271-273 - Tobias Girschick, Ulrich Rückert, Stefan Kramer:
Adapted Transfer of Distance Measures for Quantitative Structure-Activity Relationships and Data-Driven Selection of Source Datasets. 274-288 - Laura Langohr, Vid Podpecan, Marko Petek, Igor Mozetic, Kristina Gruden, Nada Lavrac, Hannu Toivonen:
Contrasting Subgroup Discovery. 289-303 - Anze Vavpetic, Nada Lavrac:
Semantic Subgroup Discovery Systems and Workflows in the SDM-Toolkit. 304-320 - Miha Grcar, Nejc Trdin, Nada Lavrac:
A Methodology for Mining Document-Enriched Heterogeneous Information Networks. 321-335 - Dongsheng Duan, Yuhua Li, Ruixuan Li, Zhengding Lu, Aiming Wen:
MEI: Mutual Enhanced Infinite Community-Topic Model for Analyzing Text-Augmented Social Networks. 336-354 - Hiromichi Nagao, Tomoyuki Higuchi, Satoshi Miura, Daisuke Inazu:
Time-Series Modeling of Tide Gauge Records for Monitoring of the Crustal Activities Related to Oceanic Trench Earthquakes Around Japan. 355-364 - Nina Gierasimczuk, Dick de Jongh:
On the Complexity of Conclusive Update. 365-377
- Jiuyong Li, Jixue Liu, Hannu Toivonen, Jianming Yong:
Effective Pruning for the Discovery of Conditional Functional Dependencies. 378-392 - S. R. Kannan, S. Ramathilagam, R. Devi, Yueh-Min Huang:
Novel Quadratic Fuzzy c-Means Algorithms for Effective Data Clustering Problems. 393-406
Volume 56, Number 4, April 2013
- Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou:
Efficient Linkable and/or Threshold Ring Signature Without Random Oracles. 407-421 - Géraldine Vache Marconato, Mohamed Kaâniche, Vincent Nicomette:
A Vulnerability Life Cycle-Based Security Modeling and Evaluation Approach. 422-439 - Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan:
Dynamic Access Control Policies: Specification and Verification. 440-463 - Mingwu Zhang, Bo Yang, Tsuyoshi Takagi:
Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate. 464-477 - Lanfranco Lopriore:
Protection Structures in Multithreaded Systems. 478-496 - Joonsang Baek, Quang Hieu Vu, Abdulhadi Shoufan, Andrew Jones, Duncan S. Wong:
Stateful Public-Key Encryption Schemes Forward-Secure Against State Exposure. 497-507 - Gianluca Dini, Marco Tiloca:
HISS: A HIghly Scalable Scheme for Group Rekeying. 508-525
Volume 56, Number 5, May 2013
- Marios C. Angelides:
Editorial: MPEG Applications and Services. 527-528 - Luis Herranz, José María Martínez Sanchez:
Combining MPEG Tools to Generate Video Summaries Adapted to the Terminal and Network. 529-553 - Razib Iqbal, Shervin Shirmohammadi, Behnoosh Hariri:
Modeling and Evaluation of a Metadata-Based Adaptive P2P Video-Streaming System. 554-572 - Martín López Nores, Yolanda Blanco-Fernández, José Juan Pazos-Arias:
Cloud-Based Personalization of New Advertising and e-Commerce Models for Video Consumption. 573-592 - Harry W. Agius, Marios C. Angelides, Damon Daylamani Zad:
MC2: A Framework and Service for MPEG-7 Content-Modelling Communities. 593-616 - Anish Mittal, Anush K. Moorthy, Alan C. Bovik:
Visually Lossless H.264 Compression of Natural Videos. 617-627 - David C. Gibbon, Zhu Liu, Andrea Basso, Behzad Shahraray:
Automated Content Metadata Extraction Services Based on MPEG Standards. 628-645
- Benjamin J. Ford, Haiping Xu, Iren Valova:
A Real-Time Self-Adaptive Classifier for Identifying Suspicious Bidders in Online Auctions. 646-663 - Martin Richards:
How BCPL Evolved from CPL. 664-670
Volume 56, Number 6, June 2013
- John Lloyd:
Special Issue on Dependable Software Systems: Associate Editor's Introduction. 671-673 - Matthew Leeke, Arshad Jhumka, Sarabjot Singh Anand:
Towards the Design of Efficient Error Detection Mechanisms for Transient Data Errors. 674-692 - Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo:
BFT-TO: Intrusion Tolerance with Less Replicas. 693-715 - Wenbing Zhao, P. M. Melliar-Smith, Louise E. Moser:
Low Latency Fault Tolerance System. 716-740 - Ian J. Hayes, Alan Burns, Brijesh Dongol, Cliff B. Jones:
Comparing Degrees of Non-Determinism in Expression Evaluation. 741-755
- Ra'ed Al-Dujaily, Terrence S. T. Mak, Kai-Pui Lam, Fei Xia, Alex Yakovlev, Chi-Sang Poon:
Dynamic On-Chip Thermal Optimization for Three-Dimensional Networks-On-Chip. 756-770 - Jinpyo Hong, Hwangnam Kim:
A Dual Mobility Model with User Profiling: Decoupling User Mobile Patterns from Association Patterns. 771-784 - Xiaoling Zhang, Jianguo Qian:
L(p, q)-Labeling and Integer Flow on Planar Graphs. 785-792
Volume 56, Number 7, July 2013
- José Raúl Romero, Juan Ignacio Jaen, Antonio Vallecillo:
A Tool for the Model-Based Specification of Open Distributed Systems. 793-818 - Manuel Abellanas, José Miguel Díaz-Báñez, Pablo Pérez-Lantero, Inmaculada Ventura:
Locating a Communication Path in a Competitive Scenario. 819-826 - Sinisa Ilic, Petar C. Spalevic:
Using Wavelet Packets for Selectivity Estimation. 827-842 - Montserrat Bóo, Margarita Amor, Raquel Concheiro, Michael C. Doggett:
Efficient Adaptive and Dynamic Mesh Refinement Based on a Non-recursive Strategy. 843-851 - Oguzcan Dobrucali, Billur Barshan:
Novel Compression Algorithm Based on Sparse Sampling of 3-D Laser Range Scans. 852-870 - Eddie Cheng, Ke Qiu, Zhizhang Shen:
A Generating Function Approach to the Edge Surface Area of the Arrangement Graphs. 871-881 - Tiziana Calamoneri, Dario Frascaria, Blerina Sinaimeri:
All Graphs with at Most Seven Vertices are Pairwise Compatibility Graphs. 882-886 - Evmorfia N. Argyriou, Michael A. Bekos, Antonios Symvonis:
Maximizing the Total Resolution of Graphs. 887-900 - Sajjad Mahmood, Richard Lai:
RE-UML: A Component-Based System Requirements Analysis Language. 901-922
Volume 56, Number 8, August 2013
- Min Chen, Victor C. M. Leung:
Green Mobile Networking and Communications. 923-925
- Wei Gong, Kebin Liu, Xiaoxu Li, Xin Miao, Tong Zhu:
Quality of Interaction for Sensor Network Energy-Efficient Management. 926-937 - Daqiang Zhang, Zhijun Yang, Vaskar Raychoudhury, Zhe Chen, Jaime Lloret:
An Energy-Efficient Routing Protocol Using Movement Trends in Vehicular Ad hoc Networks. 938-946 - Jiafu Wan, Hehua Yan, Di Li, Keliang Zhou, Lu Zeng:
Cyber-Physical Systems for Optimal Energy Management Scheme of Autonomous Electric Vehicle. 947-956 - Kai Lin, Xiaofei Wang, Limei Peng, Xuan Zhu:
Energy-Efficient K-Cover Problem in Hybrid Sensor Networks. 957-967 - Jiaojiao Liu, Yige Wang, Gang Wei:
Distributed Topology Control Based on Coalition Formation Game in Wireless Networks. 968-976 - Yichao Jin, Yonggang Wen, Qinghua Chen, Zuqing Zhu:
An Empirical Investigation of the Impact of Server Virtualization on Energy Efficiency for Green Data Center. 977-990 - Xiaofei Liao, Hai Jin, Jia Yu, Dingding Li:
A Performance Optimization Mechanism for SSD in Virtualized Environment. 991-1000 - Lei Lei, Jing Zhao, Zhangdui Zhong, Kan Zheng:
Flow-Level Analysis of Energy Efficiency Performance for Device-to-Device Communications in OFDM Cellular Networks. 1001-1009 - Jing Zhang, Xi Yang, Qi Yao, Xiaohu Ge, Minho Jo, Guoqiang Mao:
Cooperative Energy Efficiency Modeling and Performance Analysis in Co-Channel Interference Cellular Networks. 1010-1019 - Wei-Ting Cho, Ying-Xun Lai, Chin-Feng Lai, Yueh-Min Huang:
Appliance-Aware Activity Recognition Mechanism for IoT Energy Management System. 1020-1033 - Yi Sun, Yang Guo, Yuming Ge, Shan Lu, Jihua Zhou, Eryk Dutkiewicz:
Improving the Transmission Efficiency by Considering Non-Cooperation in Ad Hoc Networks. 1034-1042
Volume 56, Number 9, September 2013
- Douglas Mota Dias, Marco Aurélio Cavalcanti Pacheco:
Quantum-Inspired Linear Genetic Programming as a Knowledge Management System. 1043-1062 - Jianping Gou, Zhang Yi:
Locality-Based Discriminant Neighborhood Embedding. 1063-1082 - Jamshaid Ashraf, Omar Khadeer Hussain, Farookh Khadeer Hussain:
A Framework for Measuring Ontology Usage on the Web. 1083-1101 - Fasheng Wang, Mingyu Lu:
Efficient Visual Tracking via Hamiltonian Monte Carlo Markov Chain. 1102-1112 - Eakasit Pacharawongsakda, Thanaruk Theeramunkong:
Multi-Label Classification Using Dependent and Independent Dual Space Reduction. 1113-1135 - Erwan Le Martelot, Chris Hankin:
Fast Multi-Scale Detection of Relevant Communities in Large-Scale Networks. 1136-1150
Volume 56, Number 10, October 2013
- Young-Sik Jeong, Damien Sauveron, Jong Hyuk Park:
Advanced Security Technologies and Services for Future Computing Environments. 1151-1153
- Guangjie Han, Jinfang Jiang, Lei Shu, Mohsen Guizani, Shojiro Nishio:
A Two-Step Secure Localization for Wireless Sensor Networks. 1154-1166 - Yao-Hsin Chou, Shuo-Mao Chen, Yu-Ting Lin, Chi-Yuan Chen, Han-Chieh Chao:
Using GHZ-State for Multiparty Quantum Secret Sharing Without Code Table. 1167-1175 - Bin Zhang, Jiahai Yang, Jianping Wu, Ziyu Wang:
MBST: Detecting Packet-Level Traffic Anomalies by Feature Stability. 1176-1188 - Jong-Hyouk Lee, Thierry Ernst:
IPv6 Security Issues in Cooperative Intelligent Transportation Systems. 1189-1197 - Andreu Pere Isern-Deyà, Arnau Vives-Guasch, Macià Mut Puigserver, Magdalena Payeras-Capellà, Jordi Castellà-Roca:
A Secure Automatic Fare Collection System for Time-Based or Distance-Based Services with Revocable Anonymity for Users. 1198-1215 - Aikaterini Mitrokotsa, Pedro Peris-Lopez, Christos Dimitrakakis, Serge Vaudenay:
On Selecting the Nonce Length in Distance-Bounding Protocols. 1216-1227
- Yinghui Zhang, Xiaofeng Chen, Hui Li:
Key-Evolving Hierarchical ID-Based Signcryption. 1228-1248 - Yuanju Gan, Lihua Wang, Licheng Wang, Ping Pan, Yixian Yang:
Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie-Hellman Assumption. 1249-1257 - Gerard Draper-Gil, Josep Lluís Ferrer-Gomila, M. Francisca Hinarejos, Jianying Zhou:
An Asynchronous Optimistic Protocol for Atomic Multi-Two-Party Contract Signing. 1258-1267
Volume 56, Number 11, November 2013
- Wei Sun, Tao Wen, Quan Guo:
Improving the Start-up Performance of the TFRC Protocol. 1269-1278 - Massimo Melucci:
Deriving a Quantum Information Retrieval Basis. 1279-1291 - Chwan-Yi Shiah, Yun-Sheng Yen:
Compression of Chinese Document Images by Complex Shape Matching. 1292-1304 - Robert M. Hierons:
Implementation Relations for Testing Through Asynchronous Channels. 1305-1319 - Mircea Merca:
Binary Diagrams for Storing Ascending Compositions. 1320-1327 - Bingyue Peng, Junjie Wu, Hua Yuan, Qingwei Guo, Dacheng Tao:
ANEEC: A Quasi-Automatic System for Massive Named Entity Extraction and Categorization. 1328-1346 - Baolei Cheng, Jianxi Fan, Xiaohua Jia, Shukui Zhang, Bangrui Chen:
Constructive Algorithm of Independent Spanning Trees on Möbius Cubes. 1347-1362 - Ioannis Dimitriou:
Analysis of a Priority Retrial Queue with Dependent Vacation Scheme and Application to Power Saving in Wireless Communication Systems. 1363-1380 - Stephen T. Hedetniemi, David Pokrass Jacobs, K. E. Kennedy:
Linear-Time Self-Stabilizing Algorithms for Disjoint Independent Sets. 1381-1387 - Ro-Yu Wu, Jou-Ming Chang, An-Hang Chen, Chun-Liang Liu:
Ranking and Unranking t-ary Trees in a Gray-Code Order. 1388-1395
Volume 56, Number 12, December 2013
- Jacob Beal, Stefan Dulman, Olivier Michel, Antoine Spicher:
Editorial. 1397-1398 - Avgoustinos Filippoupolitis, Gökçe Görbil, Erol Gelenbe:
Spatial Computers for Emergency Support. 1399-1416 - Muhammad Jafar Sadeq, Matt Duckham, Michael F. Worboys:
Decentralized Detection of Topological Events in Evolving Spatial Regions. 1417-1431 - Alan Both, Matt Duckham, Patrick Laube, Tim Wark, Jeremy Yeoman:
Decentralized Monitoring of Moving Objects in a Transportation Network Augmented with Checkpoints. 1432-1449 - David H. Ackley, Daniel C. Cannon, Lance R. Williams:
A Movable Architecture for Robust Spatial Computing. 1450-1468 - Qingzhi Liu, Andrei Pruteanu, Stefan Dulman:
Gradient-Based Distance Estimation for Spatial Computers. 1469-1499 - Jacob Beal, Kyle Usbeck, Brett Benyo:
On the Evaluation of Space-Time Functions. 1500-1517
- David Rincón, Anna Agusti-Torra, Juan Felipe Botero, Frederic Raspall, David Remondo, Xavier Hesselbach, Michael Till Beck, Hermann de Meer, Florian Niedermeier, Giovanni Giuliani:
A Novel Collaboration Paradigm for Reducing Energy Consumption and Carbon Dioxide Emissions in Data Centres. 1518-1536
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.