default search action
The Computer Journal, Volume 58
Volume 58, Number 1, January 2015
Original Articles
- Nikolay Grozev, Rajkumar Buyya:
Performance Modelling and Simulation of Three-Tier Applications in Cloud and Multi-Cloud Environments. 1-22 - Marco Beccuti, Chiara Fornari, Giuliana Franceschinis, Sami M. Halawani, Omar M. Ba-Rukab, Ab Rahman Ahmad, Gianfranco Balbo:
From Symmetric Nets to Differential Equations exploiting Model Symmetries. 23-39 - Shenlu Wang, Muhammad Aamir Cheema, Xuemin Lin:
Efficiently Monitoring Reverse k-Nearest Neighbors in Spatial Networks. 40-56 - Gianfranco Balbo, Maria Grazia Vigliotti:
On the Analysis of a M/M/1 Queue with Bulk Services. 57-74 - Zhe Chen:
Control Systems on Automata and Grammars. 75-94 - James Pallister, Simon J. Hollis, Jeremy Bennett:
Identifying Compiler Options to Minimize Energy Consumption for Embedded Platforms. 95-109 - Yang Wang, Hua Li, Menglan Hu:
Reusing Garbage Data for Efficient Workflow Computation. 110-125 - James G. Dowty:
SMML Estimators for 1-Dimensional Continuous Data. 126-133 - Michal Klempa, Michal Kozák, Mario Mikula, Robert Smetana, Jakub Stárka, Michal Svirec, Matej Vitásek, Martin Necaský, Irena Holubová:
jInfer: A Framework for XML Schema Inference. 134-156 - Albert Corominas, Alberto García-Villoria, Rafael Pastor:
Technical Note: Relating to the Parameter Values Given by Nelder and Mead in their Algorithm. 157-159 - António Leslie Bajuelos, Santiago Canales, Gregorio Hernández-Peñalver, Ana Mafalda Martins, Inês Matos:
Some Results on Open-Edge and Open Mobile Guarding of Polygons and Triangulations. 160-171
Volume 58, Number 2, February 2015
Original Articles
- Omar Alsaleh, Bella Bose, Bechir Hamdaoui:
One-to-Many Node-Disjoint Paths Routing in Dense Gaussian Networks. 173-187 - Chung-Ming Huang, Yih-Chung Chen, Shih Yang Lin:
Packet Scheduling and Congestion Control Schemes for Multipath Datagram Congestion Control Protocol. 188-203 - Oguzhan Erdem, Aydin Carus, Hoang Le:
Value-Coded Trie Structure for High-Performance IPv6 Lookup. 204-214 - Paola Cappanera, Alessandro Lori, Giovanni Stea, Gigliola Vaglini:
On the Schedulability of Deadline-Constrained Traffic in TDMA Wireless Mesh Networks. 215-233 - Sami J. Habib, Paulvanna Nayaki Marimuthu, Naser Zaeri:
Carbon-aware Enterprise Network through Redesign. 234-245 - Sen Su, Qingjia Huang, Jian Li, Xiang Cheng, Peng Xu, Kai Shuang:
Enhanced Energy-Efficient Scheduling for Parallel Tasks Using Partial Optimal Slacking. 246-257 - Shahbaz Akhtar Abid, Mazliza Othman, Nadir Shah, Mazhar Ali, Atta ur Rehman Khan:
3D-RP: A DHT-Based Routing Protocol for MANETs. 258-279 - Islam Elgedawy:
CRESCENT: A Reliable Framework for Durable Composite Web Services Management. 280-299 - Mostafa Rezvani, Mohammad Kazem Akbari, Bahman Javadi:
Resource Allocation in Cloud Computing Environments Based on Integer Linear Programming. 300-314 - Chien-Fu Cheng, Hsien-Chun Liao:
A Malicious-Resilient Protocol for Consistent Scheduling Problem in the Cloud Computing Environment. 315-330 - Mirka Miller, R. Sundara Rajan, N. Parthiban, Indra Rajasingh:
Minimum Linear Arrangement of Incomplete Hypercubes. 331-337 - Shih-Chang Huang, Hong-Yi Chang:
A Bidirectional Route Repair Method for Wireless Mobile Ad Hoc Networks. 338-353
Volume 58, Number 3, March 2015
Special Focus on Enabling Technologies and Infrastructures for Collaboration
- Slim Kallel, Mohamed Jmaiel, Sumitra Reddy:
Enabling Technologies: Infrastructure for Collaborative Enterprises. 355 - Wassim Derguech, Sami Bhiri, Souleiman Hasan, Edward Curry:
Using Formal Concept Analysis for Organizing and Discovering Sensor Capabilities. 356-367 - Zahra Movahedi, Walid Gaaloul, Sami Bhiri, Bruno Defude:
Assisting Sensor-Based Application Design and Instantiation Using Activity Recommendation. 368-384 - Afef Jmal Maâlej, Moez Krichen:
Study on the Limitations of WS-BPEL Compositions Under Load Conditions. 385-402 - Ines Houidi, Wajdi Louati, Djamal Zeghlache:
Exact Multi-Objective Virtual Network Embedding in Cloud Environments. 403-415 - Ryszard Janicki, Mohammad Hadi Soudkhah:
On Classification with Pairwise Comparisons, Support Vector Machines and Feature Domain Overlapping. 416-431
- María Arsuaga-Ríos, Miguel A. Vega-Rodríguez:
Multiobjective Small-World Optimization for Energy Saving in Grid Environments. 432-447 - Ajay Kumar, Anil Kumar Verma:
An Improved Algorithm for the Metamorphosis of Semi-Extended Regular Expressions to Deterministic Finite Automata. 448-456 - Lei Du, Qinbao Song, Lei Zhu, Xiaoyan Zhu:
A Selective Detector Ensemble for Concept Drift Detection. 457-471 - Omar Khadeer Hussain, Zia-ur Rahman, Farookh Khadeer Hussain, Jaipal Singh, Naeem Khalid Janjua, Elizabeth Chang:
A User-Based Early Warning Service Management Framework in Cloud Computing. 472-496 - Jianxin Li, Chengfei Liu, Rui Zhou, Jeffrey Xu Yu:
Query-Driven Frequent Co-Occurring Term Computation over Relational Data Using MapReduce. 497-513
Volume 58, Number 4, April 2015
Special Focus on Security, Trust and Risk in Multimedia Social Networks
- Zhiyong Zhang:
Security, Trust and Risk in Multimedia Social Networks. 515-517 - Constantinos Patsakis, Athanasios Zigomitros, Achilleas Papageorgiou, Agusti Solanas:
Privacy and Security for Multimedia Content shared on OSNs: Issues and Countermeasures. 518-535 - Hui Zhu, Cheng Huang, Hui Li:
Information Diffusion Model Based on Privacy Setting in Online Social Networking Services. 536-548 - Hong Zhu, Shengli Tian, Kevin Lü:
Privacy-Preserving Data Publication with Features of Independent ℓ-Diversity. 549-571 - WeiTao Song, Bin Hu:
Approach to Detecting Type-Flaw Attacks Based on Extended Strand Spaces. 572-587 - Bin Yang, Xingming Sun, Xianyi Chen, Jianjun Zhang, Xu Li:
Exposing Photographic Splicing by Detecting the Inconsistencies in Shadows. 588-600 - Ayesha Kanwal, Rahat Masood, Muhammad Awais Shibli, Rafia Mumtaz:
Taxonomy for Trust Models in Cloud Computing. 601-626 - Qingqi Pei, Dingyu Yan, Lichuan Ma, Zi Li, Yang Liao:
A Strong and Weak Ties Feedback-Based Trust Model in Multimedia Social Networks. 627-643 - Zhen Yang, Kaiming Gao, Kefeng Fan, Yingxu Lai:
Sensational Headline Identification By Normalized Cross Entropy-Based Metric. 644-655 - Hui Lin, Jia Hu, Jianfeng Ma, Li Xu, Li Yang:
CRM: A New Dynamic Cross-Layer Reputation Computation Model in Wireless Networks. 656-667 - Zhiyong Zhang, Kanliang Wang:
A Formal Analytic Approach to Credible Potential Path and Mining Algorithms for Multimedia Social Networks. 668-678 - V. Natarajan, Shina Sheen, R. Anitha:
Multilevel Analysis to Detect Covert Social Botnet in Multimedia Social Networks. 679-687 - Guowei Wu, Zuosong Liu, Lin Yao, Jing Deng, Jie Wang:
A Trust Routing for Multimedia Social Networks. 688-699 - Danmei Niu, Lanlan Rui, Cheng Zhong, Xuesong Qiu:
A Composition and Recovery Strategy for Mobile Social Network Service in Disaster. 700-708
- Volkmar Lotz, Francesco Di Cerbo, Michele Bezzi, Samuel Paul Kaluvuri, Antonino Sabetta, Slim Trabelsi:
Security Certification for Service-Based Business Ecosystems. 709-723 - Qiang Tang, Hua Ma, Xiaofeng Chen:
Extend the Concept of Public Key Encryption with Delegated Search. 724-734 - Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi, Yi Mu:
Functional Encryption Resilient to Hard-to-Invert Leakage. 735-749 - Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang:
Leakage-Free ID-Based Signature. 750-757 - M. Francisca Hinarejos, Andreu Pere Isern-Deyà, Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà:
MC-2D: An Efficient and Scalable Multicoupon Scheme. 758-778 - Ying-Kai Tang, Sherman S. M. Chow, Joseph K. Liu:
Comments on 'Efficient Revocable Certificateless Encryption Secure in the Standard Model'. 779-781 - Lanfranco Lopriore:
Password Capabilities Revisited. 782-791 - Ke Gu, Weijia Jia, Chunlin Jiang:
Efficient Identity-Based Proxy Signature in the Standard Model. 792-807 - Debasish Das, Utpal Sharma, D. K. Bhattacharyya:
Detection of Cross-Site Scripting Attack under Multiple Scenarios. 808-822 - Xinyu Fan, Guomin Yang, Yi Mu, Yong Yu:
On Indistinguishability in Remote Data Integrity Checking. 823-830 - Alptekin Küpçü:
Official Arbitration with Secure Cloud Storage Application. 831-852 - Jiguo Li, Huiyun Teng, Xinyi Huang, Yichen Zhang, Jianying Zhou:
A Forward-Secure Certificate-Based Signature Scheme. 853-866 - Yong Yu, Man Ho Au, Yi Mu, Willy Susilo, Huai Wu:
Secure Delegation of Signing Power from Factorization. 867-877 - Hai Le Vu, Kenneth K. Khaw, Tsong Yueh Chen:
A New Approach for Network Vulnerability Analysis. 878-891 - Stavros N. Shiaeles, Maria Papadaki:
FHSD: An Improved IP Spoof Detection Method for Web DDoS Attacks. 892-903 - Huacui Liu, Chenhui Jin:
Lower Bounds of Differential and Linear Active S-boxes for 3D-like Structure. 904-921 - Yu-Chi Chen:
SPEKS: Secure Server-Designation Public Key Encryption with Keyword Search against Keyword Guessing Attacks. 922-933 - Cheng-Chi Lee, Yan-Ming Lai:
Toward A Secure Single Sign-On Mechanism for Distributed Computer Networks. 934-943 - Franco Frattolillo:
Watermarking Protocols: Problems, Challenges and a Possible Solution. 944-960 - Abdulah Abdulah Zadeh, Howard M. Heys:
Application of Simple Power Analysis to Stream Ciphers Constructed Using Feedback Shift Registers. 961-972 - Haider Salim Hmood, Zhitang Li, Hasan Khalaf Abdulwahid, Yang Zhang:
Adaptive Caching Approach to Prevent DNS Cache Poisoning Attack. 973-985 - Sha Ma, Mingwu Zhang, Qiong Huang, Bo Yang:
Public Key Encryption with Delegated Equality Test in a Multi-User Setting. 986-1002 - Qiang Tang:
From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data. 1003-1020 - Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo:
An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants. 1021-1039
Volume 58, Number 5, May 2015
Original Articles
- Gabriel Ciobanu, Maciej Koutny:
PerTiMo: A Model of Spatial Migration with Safe Access Permissions. 1041-1060 - Jie Lin, Yue Jiang, Don Adjeroh:
Circular Pattern Discovery. 1061-1073 - Jia Jie Liu, Yue-Li Wang, Yu-shan Chiu:
Constrained Longest Common Subsequences with Run-Length-Encoded Strings. 1074-1084 - Emilio Di Giacomo, Walter Didimo, Luca Grilli, Giuseppe Liotta, Salvatore Agostino Romeo:
Heuristics for the Maximum 2-Layer RAC Subgraph Problem. 1085-1098 - Ahmad Sabri, Vincent Vajnovszki:
Two Reflected Gray Code-Based Orders on Some Restricted Growth Sequences. 1099-1111 - Chia Shin Ou, Chin Lung Lu, Richard C. T. Lee:
A Systematical and Parallel Approach to Solve Problems Involving Special Properties of Bit-Vectors. 1112-1121 - Amy Affleck, Aneesh Krishna, Narasimaha Achuthan:
Non-Functional Requirements Framework: A Mathematical Programming Approach. 1122-1139 - Florentin Ipate, Alin Stefanescu, Ionut Dinca:
Model Learning and Test Generation Using Cover Automata. 1140-1159 - Antonio Badia, Daniel Lemire:
Functional Dependencies with null Markers. 1160-1168 - Petr Procházka, Jan Holub:
Compression of a Set of Files with Natural Language Content. 1169-1185 - Joel Fuentes, Pablo Sáez, Gilberto Gutiérrez, Isaac D. Scherson:
A Method to Find Functional Dependencies Through Refutations and Duality of Hypergraphs. 1186-1198 - Chang-Ai Sun, Yimeng Zai, Huai Liu:
Evaluating and Comparing Fault-Based Testing Strategies for General Boolean Specifications: A Series of Experiments. 1199-1213 - Behrooz Parhami:
Digital Arithmetic in Nature: Continuous-Digit RNS. 1214-1223
Volume 58, Number 6, June 2015
Special Focus on Green Energy Management and Smart Grid
- Zhangbing Zhou, Huansheng Ning, Meikang Qiu, Habib F. Rashvand:
Editorial: Green Energy Management and Smart Grid. 1225-1226 - Jianxin Li, Jieyu Zhao, Yi Li, Lei Cui, Bo Li, Lu Liu, John Panneerselvam:
iMIG: Toward an Adaptive Live Migration Method for KVM Virtual Machines. 1227-1242 - Kehua Guo, Biao Tian, Jianhua Ma:
AMPS: An Adaptive Message Push Strategy for the Energy Efficiency Optimization in Mobile Terminals. 1243-1253 - Liyun Zuo, Shoubin Dong, Chunsheng Zhu, Lei Shu, Guangjie Han:
A Cloud Resource Evaluation Model Based on Entropy Optimization and Ant Colony Clustering. 1254-1266 - Jianhui Zhang, Zhi Li, Feng Xia, Shaojie Tang, Xingfa Shen, Bei Zhao:
Cooperative Scheduling for Adaptive Duty Cycling in Asynchronous Sensor Networks. 1267-1279 - Guangjie Han, Xun Li, Jinfang Jiang, Lei Shu, Jaime Lloret:
Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks. 1280-1292 - Zhiyong Feng, Bo Lan, Zhen Zhang, Shizhan Chen:
A Study of Semantic Web Services Network. 1293-1305 - Xiang Wang, Ying Lu, Yi Zhang, Zexi Zhao, Tongsheng Xia, Limin Xiao:
Power Optimization in Logic Synthesis for Mixed Polarity Reed-Muller Logic Circuits. 1306-1313 - Domen Zupancic, Mitja Lustrek, Matjaz Gams:
Multi-Agent Architecture for Control of Heating and Cooling in a Residential Space. 1314-1329 - Linghe Kong, Xiao-Yang Liu, Meixia Tao, Min-You Wu, Yu Gu, Long Cheng, Jianwei Niu:
Resource-Efficient Data Gathering in Sensor Networks for Environment Reconstruction. 1330-1343 - Jin Liu, Juan Li, Xiaoguang Niu, Xiaohui Cui, Yunchuan Sun:
GreenOCR: An Energy-Efficient Optimal Clustering Routing Protocol. 1344-1359 - Yongzhao Zhan, Shan Dai, Qirong Mao, Lu Liu, Wei Sheng:
A Video Semantic Analysis Method Based on Kernel Discriminative Sparse Representation and Weighted KNN. 1360-1372 - He Li, Mianxiong Dong, Xiaofei Liao, Hai Jin:
Deduplication-Based Energy Efficient Storage System in Cloud Environment. 1373-1383 - Hamed Javidi, Maziar Goudarzi:
TABEMS: Tariff-Aware Building Energy Management System for Sustainability through Better Use of Electricity. 1384-1398
- Xiaolan Tang, Juhua Pu, Yang Gao, Yu Xie, Zhang Xiong:
GPS-Based Replica Deletion Scheme with Anti-Packet Distribution for Vehicular Networks. 1399-1415 - Antonio Frangioni, Laura Galli, Giovanni Stea:
Optimal Joint Path Computation and Rate Allocation for Real-time Traffic. 1416-1430 - Andrew Larkin, David E. Williams, Molly L. Kile, William M. Baird:
Developing a Smartphone Software Package for Predicting Atmospheric Pollutant Concentrations at Mobile Locations. 1431-1442 - Nizam Ayyildiz, Ece Güran Schmidt, Hasan Cengiz Güran:
S-DIRECT: Scalable and Dynamically Reconfigurable TCAM Architecture for High-Speed IP Lookup. 1443-1455 - Pavel Rajmic, Jiri Hosek, Michal Fusek, Sergey D. Andreev, Július Stecík:
Simplified Probabilistic Modelling and Analysis of Enhanced Distributed Coordination Access in IEEE 802.11. 1456-1468 - Sangyeon Kim, Dong-Wan Choi, Chin-Wan Chung:
Finding a Friendly Community in Social Networks Considering Bad Relationships. 1469-1481 - Hamid Saadatfar, Hossein Deldari, Mahmoud Naghibzadeh:
Improving the Scheduler's Energy Saving Capability by Noting both Job and Resource Characteristics. 1482-1493
Volume 58, Number 7, July 2015
Original Articles
- Viliam Simko, David Hauzar, Petr Hnetynka, Tomás Bures, Frantisek Plásil:
Formal Verification of Annotated Textual Use-Cases. 1495-1529 - Achal Kaushik, Deo Prakash Vidyarthi:
A Green Energy Model for Resource Allocation in Computational Grid. 1530-1547 - HamidReza Ahmadifar, Ghassem Jaberipur:
A New Residue Number System with 5-Moduli Set: {22q, 2q±3, 2q±1}. 1548-1565 - Edem Kwedzo Bankas, Kazeem Alagbe Gbolagade:
New MRC Adder-Based Reverse Converter for the Moduli Set {2n, 22n+1 - 1, 22n+2 - 1}. 1566-1572 - Qian Mao, K. Bharanitharan, Chin-Chen Chang:
A Proxy User Authentication Protocol Using Source-Based Image Morphing. 1573-1584 - Yiwen Zhang, Rui-feng Guo:
Low-Power Scheduling Algorithms for Sporadic Task with Shared Resources in Hard Real-Time Systems. 1585-1597 - Chao-Liang Liu, Wang-Jui Tsai, Ting-Yi Chang, Chun-Cheng Peng, Peng-Shiang Wong:
Meaningful Share Generation for (2, 2)-Multiple Visual Secret Sharing Scheme Without Pixel Expansion. 1598-1606 - Abdelli Abdelkrim:
Improving the State Space Computation of the Time Stream Petri Nets Model. 1607-1627 - Yang Wang, Wei Shi:
Dataflow-Based Scheduling for Scientific Workflows in HPC with Storage Constraints. 1628-1644 - Murat Yesilyurt, Yildiray Yalman, Ahmet Turan Özcerit:
A Robust Watermarking Method for Mpeg-4 Based on Kurtosis. 1645-1655 - Alexandre Petrenko, Adenilso Simão:
Generalizing the DS-Methods for Testing Non-Deterministic FSMs. 1656-1672 - Niko Beerenwinkel, Stefano Beretta, Paola Bonizzoni, Riccardo Dondi, Yuri Pirola:
Covering Pairs in Directed Acyclic Graphs. 1673-1686
Volume 58, Number 8, August 2015
Special Focus on Ambient and Context-Aware Services for the Future Web
- Quan Z. Sheng, Elhadi M. Shakshuki, Jian Yu:
Ambient and Context-Aware Services for the Future Web. 1687-1688 - Khalid Elgazzar, Sharief M. A. Oteafy, Walid M. Ibrahim, Hossam S. Hassanein:
A Resilient P2P Architecture for Mobile Resource Sharing. 1689-1700 - Zahoor Ali Khan, Shyamala C. Sivakumar, William J. Phillips, Bill Robertson:
QPRR: QoS-Aware Peering Routing Protocol for Reliability Sensitive Data in Body Area Network Communication. 1701-1716 - Alireza Nafarieh, Shyamala C. Sivakumar, William Robertson, William J. Phillips:
SLA-Based Time-Aware Provisioning Mechanisms in Shared Mesh Protected Optical Networks. 1717-1731 - Heiko Desruelle, Frank Gielen:
Context-Driven Progressive Enhancement of Mobile Web Applications: A Multicriteria Decision-Making Approach. 1732-1746
- Yanling Hu, Anfeng Liu:
An Efficient Heuristic Subtraction Deployment Strategy to Guarantee Quality of Event Detection for WSNs. 1747-1762 - David Díez Hernández, Jaime García-Reinoso, Iván Vidal:
SFP: Statistical Filtering Policy for Caching in Content-Centric Networking. 1763-1775 - Xing Su, Minjie Zhang, Quan Bai:
Dynamic Task Allocation for Heterogeneous Agents in Disaster Environments Under Time, Space and Communication Constraints. 1776-1791 - Xiuchao Wu, Kenneth N. Brown, Cormac J. Sreenan:
Contact Probing Mechanisms for Opportunistic Sensor Data Collection. 1792-1810 - Ping Xie, Jianzhong Huang, Qiang Cao, Xiao Qin, Changsheng Xie:
A New Non-MDS RAID-6 Code to Support Fast Reconstruction and Balanced I/Os. 1811-1825 - Guangjun Qin, Mingfa Zhu, Limin Xiao, Li Ruan:
Lessen Interflow Interference Using Virtual Channels Partitioning. 1826-1841 - Jaime García-Reinoso, Iván Vidal, David Díez, Daniel Corujo, Rui L. Aguiar:
Analysis and Enhancements to Probabilistic Caching in Content-Centric Networking. 1842-1856
- Ahmed Kheiri, Ender Özcan:
Corrigendum: Constructing Constrained-Version of Magic Squares Using Selection Hyper-heuristics. 1857
Volume 58, Number 9, September 2015
Special Focus on Mining Social Media for Knowledge Discovery
- Neil Y. Yen, Uyen Trang Nguyen, Jong Hyuk Park:
Mining Social Media for Knowledge Discovery. 1859-1860 - Thomas Steiner, Ruben Verborgh, Joaquim Gabarró, Erik Mannens, Rik Van de Walle:
Clustering Media Items Stemming from Multiple Social Networks. 1861-1875 - Weiwei Yuan, Donghai Guan, Sungyoung Lee, Jin Wang:
Skeleton Searching Strategy for Recommender Searching Mechanism of Trust-Aware Recommender Systems. 1876-1883 - Yongkoo Han, Kisung Park, Donghai Guan, Sajal Halder, Young-Koo Lee:
Topological Similarity-Based Feature Selection for Graph Classification. 1884-1893 - Lihua Zhou, Kevin Lü:
Detecting Communities with Different Sizes for Social Network Analysis. 1894-1908 - Wu He, Gongjun Yan:
Mining Blogs And Forums To Understand the Use of Social Media in Customer Co-creation. 1909-1920 - Chen Yang, Jian Ma, Thushari P. Silva, Xiaoyan Liu, Zhongsheng Hua:
A Multilevel Information Mining Approach for Expert Recommendation in Online Scientific Communities. 1921-1936 - Lida Ghahremanloo, Wanita Sherchan, James A. Thom:
Geotagging Twitter Messages in Crisis Management. 1937-1954 - Seyed Mohammadhadi Daneshmand, Amin Javari, Seyed Ebrahim Abtahi, Mahdi Jalili:
A Time-Aware Recommender System Based on Dependency Network of Items. 1955-1966
- Naeem Khalid Janjua, Omar Khadeer Hussain, Farookh Khadeer Hussain, Elizabeth Chang:
Philosophical and Logic-Based Argumentation-Driven Reasoning Approaches and their Realization on the WWW: A Survey. 1967-1999 - Roberto Rodríguez-Rodríguez, Fernando Castro, Daniel Chaver, Rekai González-Alberquilla, Luis Piñuel, Francisco Tirado:
Write-Aware Replacement Policies for PCM-Based Systems. 2000-2025 - Muhammad Ashad Kabir, Jun Han, Jian Yu, Alan W. Colman:
Inferring User Situations from Interaction Events in Social Media. 2026-2043 - Hiren K. Mewada, Rahul Patel, Suprava Patnaik:
A Novel Structure Tensor Modulated Chan-Vese Model for Texture Image Segmentation. 2044-2060 - Yi Liu, Xiongzi Ge, Xiaoxia Huang, David H. C. Du:
MOLAR: A Cost-Efficient, High-Performance SSD-Based Hybrid Storage Cache. 2061-2078 - Sadegh Aliakbary, Jafar Habibi, Ali Movaghar:
Feature Extraction from Degree Distribution for Comparison and Analysis of Complex Networks. 2079-2091 - Mehmet Ali Abbasoglu, Bugra Gedik, Hakan Ferhatosmanoglu:
Aggregate Profile Clustering for Streaming Analytics. 2092-2108 - Yanmin Zhu, Yin Wang, George Forman, Hong Wei:
Mining Large-Scale GPS Streams for Connectivity Refinement of Road Maps. 2109-2119 - Lin Wu, Xiaodi Huang, John Shepherd, Yang Wang:
Multi-Query Augmentation-Based Web Landmark Photo Retrieval. 2120-2134 - Minaz J. Parmar, Marios C. Angelides:
MAC-REALM: A Video Content Feature Extraction and Modelling Framework. 2135-2171 - Álvaro Rubio-Largo, Miguel A. Vega-Rodríguez, David L. González-Álvarez:
A Parallel Multiobjective Approach based on Honey Bees for Traffic Grooming in Optical Networks. 2171-2191
Volume 58, Number 10, October 2015
Special Focus on Secure Information Systems Engineering
- David Garcia Rosado, Nadira Lammari, Jan Jürjens:
Special Issue on Secure Information Systems Engineering. 2193-2194 - Maryam Sepehri, Stelvio Cimato, Ernesto Damiani:
Privacy-Preserving Query Processing by Multi-Party Computation. 2195-2212 - Evangelia Kavakli, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis:
Privacy as an Integral Part of the Implementation of Cloud Solutions. 2213-2224 - D. Marudhadevi, V. Neelaya Dhatchayani, V. S. Shankar Sriram:
A Trust Evaluation Model for Cloud Computing Using Service Level Agreement. 2225-2232 - Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina:
ISGcloud: a Security Governance Framework for Cloud Computing. 2233-2254 - Thomas Quirchmayr, Mark Strembeck:
A Discussion of Communication Schemes for Process Execution Histories to Enforce Entailment Constraints in Process-Driven SOAs. 2255-2279 - Katarzyna Mazur, Bogdan Ksiezopolski, Zbigniew Kotulski:
The Robust Measurement Method for Security Metrics Generation. 2280-2296 - Takeshi Takahashi, Youki Kadobayashi:
Reference Ontology for Cybersecurity Operational Information. 2297-2312 - Ricardo J. Rodríguez, José Merseguer, Simona Bernardi:
Modelling Security of Critical Infrastructures: A Survivability Assessment. 2313-2327 - José Fran. Ruiz, Antonio Maña, Carsten Rudolph:
An Integrated Security and Systems Engineering Process and Modelling Framework. 2328-2350 - Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo:
Modernizing Secure OLAP Applications with a Model-Driven Approach. 2351-2367
- Kazim Yumbul, Erkay Savas:
Enhancing an Embedded Processor Core for Efficient and Isolated Execution of Cryptographic Algorithms . 2368-2387 - Udaya Kiran Tupakula, Vijay Varadharajan:
Trust Enhanced Security for Tenant Transactions in the Cloud Environment. 2388-2403 - Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Harry Bartlett:
CHURNs: Freshness Assurance for Humans. 2404-2425 - Chunfeng Lian, Liaojun Pang, Jimin Liang:
Generalized Random Grid-Based Visual Secret Sharing for General Access Structures. 2426-2442 - Xing Wang, Nga Lam Or, Ziyan Lu, Derek Chi-Wai Pao:
Hardware Accelerator to Detect Multi-Segment Virus Patterns. 2443-2460 - Chanying Huang, Hwaseong Lee, Hyoseung Kim, Dong Hoon Lee:
mvSERS: A Secure Emergency Response Solution for Mobile Healthcare in Vehicular Environments. 2461-2475 - Grazielle Vernize, André Luiz Pires Guedes, Luiz Carlos Pessoa Albini:
Malicious Nodes Identification for Complex Network Based on Local Views. 2476-2491 - Jianghong Wei, Wenfen Liu, Xuexian Hu:
Forward-Secure Threshold Attribute-Based Signature Scheme. 2492-2506 - Debiao He, Mingwu Zhang, Baowen Xu:
Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model. 2507-2508 - Chang Xu, Liehuang Zhu, Zhoujun Li, Feng Wang:
One-Round Affiliation-Hiding Authenticated Asymmetric Group Key Agreement with Semi-trusted Group Authority. 2509-2519 - Shifeng Sun, Dawu Gu, Zhengan Huang:
Fully Secure Wicked Identity-Based Encryption Against Key Leakage Attacks. 2520-2536 - Zoran Djuric, Dragan Gasevic:
FEIPS: A Secure Fair-Exchange Payment System for Internet Transactions. 2537-2556 - Lanfranco Lopriore:
Password Management: Distribution, Review and Revocation. 2557-2566 - Amir Jalaly Bidgoly, Behrouz Tork Ladani:
Modelling and Quantitative Verification of Reputation Systems Against Malicious Attackers. 2567-2582 - Wien Hong, Gwoboa Horng, Chih-Wei Shiu, Tung-Shou Chen, Yu-Chi Chen:
Reversible Steganographic Method Using Complexity Control and Human Visual System. 2583-2594 - Dong Lai Fu, Xinguang Peng, Yuli Yang:
Trusted Validation for Geolocation of Cloud Data. 2595-2607 - Shahid Alam, Issa Traoré, Ibrahim Sogukpinar:
Annotated Control Flow Graph for Metamorphic Malware Detection. 2608-2621 - Md. Saiful Islam, Naif Alajlan:
Model-based Alignment of Heartbeat Morphology for Enhancing Human Recognition Capability. 2622-2635 - SK Hafizul Islam, Fagen Li:
Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings. 2636-2648 - Pericle Perazzo, Pavel Skvortsov, Gianluca Dini:
On Designing Resilient Location-Privacy Obfuscators. 2649-2664 - Yang Wang, Willy Susilo, Man Ho Au:
Revisiting Security Against the Arbitrator in Optimistic Fair Exchange. 2665-2676 - Lin Ding, Chenhui Jin, Jie Guan, Shaowu Zhang, Ting Cui, Dong Han, Wei Zhao:
Cryptanalysis of WG Family of Stream Ciphers. 2677-2685 - Kaibin Huang, Raylin Tso, Yu-Chi Chen, Sk. Md. Mizanur Rahman, Ahmad Almogren, Atif Alamri:
PKE-AET: Public Key Encryption with Authorized Equality Test. 2686-2697 - Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Yusuke Sakai:
Revocable Group Signature with Constant-Size Revocation List. 2698-2715 - Erkay Savas, Cemal Yilmaz:
A Generic Method for the Analysis of a Class of Cache Attacks: A Case Study for AES. 2716-2737 - Mayana Pereira, Rafael Dowsley, Anderson C. A. Nascimento, Goichiro Hanaoka:
Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions. 2738-2746 - Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen:
Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited. 2747-2757 - André Ricardo Abed Grégio, Vitor Monte Afonso, Dario Simões Fernandes Filho, Paulo Lício de Geus, Mário Jino:
Toward a Taxonomy of Malware Behaviors. 2758-2777 - Kaitai Liang, Willy Susilo, Joseph K. Liu, Duncan S. Wong:
Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption. 2778-2792
Volume 58, Number 11, November 2015
Original Articles
- Nina Yevtushenko, Khaled El-Fakih, Tiziano Villa, Jie-Hong R. Jiang:
Deriving Compositionally Deadlock-Free Components over Synchronous Automata Compositions. 2793-2803 - Ahmet Kara, Halit Oguztüzün, Mahmut Nedim Alpdemir:
A Methodology for Resolution Mapping for Cross-Resolution Simulation using Event-B. 2804-2823 - Weiqiang Kong, Leyuan Liu, Takahiro Ando, Hirokazu Yatsu, Kenji Hisazumi, Akira Fukuda:
Facilitating Multicore Bounded Model Checking with Stateless Explicit-State Exploration. 2824-2840 - Xiaowang Zhang, Jan Van den Bussche:
On the Power of SPARQL in Expressing Navigational Queries. 2841-2851 - Sung-In Jang, Su-Kyung Yoon, Kihyun Park, Gi-Ho Park, Shin-Dug Kim:
Data Classification Management with its Interfacing Structure for Hybrid SLC/MLC PRAM Main Memory. 2852-2863 - Shaowei Cai, Chuan Luo, Kaile Su:
Improving WalkSAT By Effective Tie-Breaking and Efficient Implementation. 2864-2875 - Pablo Muñoz, David F. Barrero, María D. R.-Moreno:
A Statistically Rigorous Analysis of 2D Path-Planning Algorithms. 2876-2891 - Gauthier van den Hove:
On the Origin of Recursive Procedures. 2892-2899 - Paolo Arcaini, Angelo Gargantini, Elvinia Riccobene:
How to Optimize the Use of SAT and SMT Solvers for Test Generation of Boolean Expressions. 2900-2920 - Frank Gurski:
Linear Programming Formulations for Computing Graph Layout Parameters. 2921-2927 - Shiyu Yang, Muhammad Aamir Cheema, Xuemin Lin:
Impact Set: Computing Influence Using Query Logs. 2928-2943 - Xi Wang, Alejandro Erickson, Jianxi Fan, Xiaohua Jia:
Hamiltonian Properties of DCell Networks. 2944-2955 - Giorgos Stoilos, Tassos Venetis, Giorgos Stamou:
A Fuzzy Extension to the OWL 2 RL Ontology Language. 2956-2971 - Jinn-Shyong Yang, Sih-Syuan Luo, Jou-Ming Chang:
Pruning Longer Branches of Independent Spanning Trees on Folded Hyper-Stars. 2972-2981 - Thomas Roelleke, Andreas Kaltenbrunner, Ricardo Baeza-Yates:
Harmony Assumptions in Information Retrieval and Social Networks. 2982-2999 - A. S. M. Kayes, Jun Han, Alan Colman:
OntCAAC: An Ontology-Based Approach to Context-Aware Access Control for Software Services. 3000-3034 - Hao Zheng, Xiaoshe Dong, Zhengdong Zhu, Baoke Chen, Yizhi Zhang, Xingjun Zhang:
Research on Algorithms to Capture Drivers' Write Operations. 3035-3056 - Jorge F. Fabeiro, Diego Andrade, Basilio B. Fraguela, Ramón Doallo:
Automatic Generation of Optimized OpenCL Codes Using OCLoptimizer. 3057-3073 - Shenwei Huang, Matthew Johnson, Daniël Paulusma:
Narrowing the Complexity Gap for Colouring (Cs, Pt)-Free Graphs. 3074-3088 - Robert M. Hierons, Uraz Cengiz Türker:
Incomplete Distinguishing Sequences for Finite State Machines. 3089-3113 - Yinglei Song, Chunmei Liu, Yongzhong Li:
A New Parameterized Algorithm for Predicting the Secondary Structure of RNA Sequences Including Pseudoknots. 3114-3125 - Emilio Di Giacomo, Walter Didimo, Giuseppe Liotta, Henk Meijer, Stephen K. Wismath:
Planar and Quasi-Planar Simultaneous Geometric Embedding. 3126-3140 - Outi Sievi-Korte, Kai Koskimies, Erkki Mäkinen:
Techniques for Genetic Software Architecture Design. 3141-3170 - László Lengyel, Tamás Mészáros, Márk Asztalos, Péter Boros, Attila Máté, Gábor Madács, Péter Hudák, Kristóf Kovács, András Tresch, Hassan Charaf:
Quality Assured Model-Driven Requirements Engineering and Software Development. 3171-3186 - Kun Ma, Fusen Dong, Bo Yang:
Large-Scale Schema-Free Data Deduplication Approach with Adaptive Sliding Window Using MapReduce. 3187-3201 - Amir Vahid Dastjerdi, Rajkumar Buyya:
An Autonomous Time-Dependent SLA Negotiation Strategy for Cloud Computing. 3202-3216
Volume 58, Number 12, December 2015
Original Articles
- Sérgio Esteves, Paulo Ferreira, Luís Veiga:
C3 P: A Re-Configurable Framework to Design Cycle-sharing Computing Cloud Platforms. 3217-3241 - Yuhao Yi, Zhongzhi Zhang, Yuan Lin, Guanrong Chen:
Small-World Topology Can Significantly Improve the Performance of Noisy Consensus in a Complex Network. 3242-3254 - Huajun He, Yang Zhao, Jinfu Wu, Ye Tian:
Cost-Aware Capacity Provisioning for Internet Video Streaming CDNs. 3255-3270 - R. Sundara Rajan, Paul D. Manuel, Indra Rajasingh, N. Parthiban, Mirka Miller:
A Lower Bound for Dilation of an Embedding. 3271-3278 - Yonggang Che, Chuanfu Xu, Jianbin Fang, Yongxian Wang, Zhenghua Wang:
Realistic Performance Characterization of CFD Applications on Intel Many Integrated Core Architecture. 3279-3294 - Wei Zhou, Tao Jing, Yan Huo, Jin Qian, Zhen Li:
Double Auction for Joint Channel and Power Allocation in Cognitive Radio Networks. 3295-3305 - Chun-Chieh Huang, Ren-Song Ko:
A Study on Maximizing the Parallelism of Macroscopically Derived Routing Algorithms for WSNs. 3306-3324
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.