default search action
The Computer Journal, Volume 59
Volume 59, Number 1, January 2016
Original Articles
- Rodrigo Andrade, Márcio Ribeiro, Henrique Rebêlo, Paulo Borba, Vaidas Gasiunas, Lucas Satabin:
Assessing Idioms for a Flexible Feature Binding Time. 1-32 - Robert M. Hierons:
A More Precise Implementation Relation for Distributed Testing. 33-46 - Chunlin Li, Layuan Li:
Context-Aware Integrated Scheme for Mobile Cloud Service Allocation. 47-63 - K. Hemant Kumar Reddy, Diptendu Sinha Roy:
DPPACS: A Novel Data Partitioning and Placement Aware Computation Scheduling Scheme for Data-Intensive Cloud Applications. 64-82 - Shay Gueron, Vlad Krasnov:
Fast Quicksort Implementation Using AVX Instructions. 83-90 - Sulin Song, Shuming Zhou, Xiaoyan Li:
Conditional Diagnosability of Burnt Pancake Networks Under the PMC Model. 91-105 - Zaharije Radivojevic, Milos Cvetanovic, Sasa Stojanovic:
Comparison of Binary Procedures: A Set of Techniques for Evading Compiler Transformations. 106-118 - Jie Zhao, Rongcai Zhao, Jinchen Xu:
Code Generation for Distributed-Memory Architectures. 119-132 - Carla Binucci, Walter Didimo:
Computing Quasi-Upward Planar Drawings of Mixed Graphs. 133-150 - Zhendong Shao, Igor Averbakh, Sandi Klavzar:
Labeling Dot-Cartesian and Dot-Lexicographic Product Graphs with a Condition at Distance Two. 151-158
Volume 59, Number 2, February 2016
Original Articles
- You Wang, Jun Bi:
Software-Defined Mobility Support in IP Networks. 159-177 - Abdul Hameed, Adnan Noor Mian:
Towards Better Traffic Localization of Virtual LANs Using Genetic Algorithm. 178-191 - Júlio Araújo, Frédéric Giroire, Joanna Moulierac, Yaning Liu, Remigiusz Modrzejewski:
Energy Efficient Content Distribution. 192-207 - Sareh Fotuhi Piraghaj, Rodrigo N. Calheiros, Jeffrey Chan, Amir Vahid Dastjerdi, Rajkumar Buyya:
Virtual Machine Customization and Task Mapping Architecture for Efficient Allocation of Cloud Data Center Resources. 208-224 - Lélia Blin, Maria Potop-Butucaru, Stephane Rovedakis, Sébastien Tixeuil:
A New Self-Stabilizing Minimum Spanning Tree Construction with Loop-Free Property. 225-243 - Mahmood Naderan-Tahan, Hamid Sarbazi-Azad:
Why Does Data Prefetching Not Work for Modern Workloads? 244-259 - Md. Abu Layek, TaeChoong Chung, Eui-Nam Huh:
Adaptive Desktop Delivery Scheme for Provisioning Quality of Experience in Cloud Desktop as a Service. 260-274 - Jacques M. Bahi, Wiem Elghazel, Christophe Guyeux, Mohammed Haddad, Mourad Hakem, Kamal Medjaher, Noureddine Zerhouni:
Resiliency in Distributed Sensor Networks for Prognostics and Health Management of the Monitoring Targets. 275-284
Volume 59, Number 3, March 2016
Special Focus on Cloud Computing and its Scientific Applications
- Surya Nepal, Suraj Pandey:
Guest Editorial: Cloud Computing and Scientific Applications (CCSA) - Big Data Analysis in the Cloud. 285-286 - Roberto R. Expósito, Guillermo L. Taboada, Sabela Ramos, Juan Touriño, Ramón Doallo:
Performance Evaluation of Data-Intensive Computing Applications on a Public IaaS Cloud. 287-307 - Sami Yangui, Samir Tata:
An OCCI Compliant Model for PaaS Resources Description and Provisioning. 308-324 - Liang Li, Endong Wang, Xiaoshe Dong, Zhengdong Zhu:
The Optimization of Memory Access Congestion for MapReduce Applications on Manycore Systems. 325-337 - Christian Napoli, Giuseppe Pappalardo, Emiliano Tramontana, Gaetano Zappalà:
A Cloud-Distributed GPU Architecture for Pattern Identification in Segmented Detectors Big-Data Surveys. 338-352 - Veni Thangaraj, S. Mary Saira Bhanu:
MDedup++: Exploiting Temporal and Spatial Page-Sharing Behaviors for Memory Deduplication Enhancement. 353-370 - Sérgio Esteves, Luís Veiga:
WaaS: Workflow-as-a-Service for the Cloud with Scheduling of Continuous and Data-Intensive Workflows. 371-383
- David L. González-Álvarez, Miguel A. Vega-Rodríguez, Álvaro Rubio-Largo:
A Comparative Study of Different Motif Occurrence Models Applied to a Hybrid Multiobjective Shuffle Frog Leaping Algorithm. 384-402 - Yan Kong, Minjie Zhang, Dayong Ye:
An Auction-Based Approach for Group Task Allocation in an Open Network Environment. 403-422 - Iyad F. Jafar, Khalid A. Darabkh, Raed T. Al-Zubi, Rami A. Al Namneh:
Efficient Reversible Data Hiding Using Multiple Predictors. 423-438
Volume 59, Number 4, April 2016
Original Articles
- Wuqiang Shen, Shaohua Tang:
RGB, a Mixed Multivariate Signature Scheme. 439-451 - Leyou Zhang, Yi Mu, Qing Wu:
Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys. 452-461 - Simeon Veloudis, Nimal Nissanke:
A Novel Permission Hierarchy for RBAC for Dealing with SoD in MAC Models. 462-492 - Mingwu Zhang, Yi Mu:
Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations. 493-507 - Joonsang Baek, Duncan S. Wong, Jin Li, Man Ho Au:
Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction. 508-521 - Peng Zhou, Xiaojing Gu, Rocky K. C. Chang:
Harvesting File Download Exploits in the Web: A Hacker's View. 522-540 - Xinran Li, Chen-Hui Jin, Fang-Wei Fu:
Improved Results of Impossible Differential Cryptanalysis on Reduced FOX. 541-548 - Guo-qiang Liu, Chen-Hui Jin:
Linear Cryptanalysis of PRESENT-like Ciphers with Secret Permutation. 549-558 - Jiannan Wei, Guomin Yang, Yi Mu, Kaitai Liang:
Anonymous Proxy Signature with Hierarchical Traceability. 559-569 - Emma Osborn, Andrew C. Simpson:
On Safety and Security Requirements in Emerging Ubiquitous Computing Models. 570-591 - Hung-Yu Chien:
A Generic Approach to Improving Diffie-Hellman Key Agreement Efficiency for Thin Clients. 592-601
Volume 59, Number 5, May 2016
- Josh Chopin, Hamid Laga, Stanley J. Miklavcic:
The Influence of Object Shape on the Convergence of Active Contour Models for Image Segmentation. 603-615 - Jia Jie Liu, Cheng-Ju Hsu, Chien-Hung Lin:
Computing Global Secure Set on Trees. 616-629 - Riku Saikkonen, Eljas Soisalon-Soininen:
Cache-Sensitive Memory Layout for Dynamic Binary Trees. 630-649 - Konrad K. Dabrowski, Daniël Paulusma:
Clique-Width of Graph Classes Defined by Two Forbidden Induced Subgraphs. 650-666 - Natarajan Meghanathan:
Maximal Assortative Matching and Maximal Dissortative Matching for Complex Network Graphs. 667-684 - Ju Hee Choi, Gi-Ho Park:
Demand-Aware NVM Capacity Management Policy for Hybrid Cache Architecture. 685-700 - Jia-Chun Lin, Fang-Yie Leu, Ying-Ping Chen:
Impacts of Task Re-Execution Policy on MapReduce Jobs. 701-714 - Hao Zheng, Xiaoshe Dong, Zhengdong Zhu, Baoke Chen, Xiuxiu Bai, Xingjun Zhang, Endong Wang:
Improving the Reliability of the Operating System Inside a VM. 715-740 - Tao Zhang, He Jiang, Xiapu Luo, Alvin T. S. Chan:
A Literature Review of Research in Bug Resolution: Tasks, Challenges and Future Directions. 741-773
Volume 59, Number 6, June 2016
- Bernabé Dorronsoro, Sergio Nesmachnow:
Parallel Soft Computing Techniques in High-Performance Computing Systems. 775-776 - Francisco Luna, Gustavo R. Zavala, Antonio J. Nebro, Juan José Durillo, Carlos A. Coello Coello:
Distributed Multi-Objective Metaheuristics for Real-World Structural Optimization Problems. 777-792 - Misun Yu, Doo-Hwan Bae:
SimpleLock+: Fast and Accurate Hybrid Data Race Detection. 793-809 - Nadia Nedjah, Rogério De Moraes Calazan, Luiza de Macedo Mourelle:
Particle, Dimension and Cooperation-Oriented PSO Parallelization Strategies for Efficient High-Dimension Problem Optimizations on Graphics Processing Units. 810-835 - Guillermo Vigueras, Juan M. Orduña:
On the Use of GPU for Accelerating Communication-Aware Mapping Techniques. 836-847
- Jianliang Gao, Ping Liu, Xuedan Kang, Lixia Zhang, Jianxin Wang:
PRS: Parallel Relaxation Simulation for Massive Graphs. 848-860 - Zhuo Wang, Tingting Hou, Dawei Song, Zhun Li, Tianqi Kong:
Detecting Review Spammer Groups via Bipartite Graph Projection. 861-874 - Chris Gorman, Iren Valova:
GORMANN: Gravitationally Organized Related Mapping Artificial Neural Network. 875-888 - D. Thenmozhi, Chandrabose Aravindan:
An Automatic and Clause-Based Approach to Learn Relations for Ontologies. 889-907 - Mert Ozer, Ilkcan Keles, Ismail Hakki Toroslu, Pinar Karagoz, Hasan Davulcu:
Predicting the Location and Time of Mobile Phone Users by Using Sequential Pattern Mining Techniques. 908-922 - Sangeeta Bhattacharya, Subramanian Selvakumar:
Multi-Measure Multi-Weight Ranking Approach for the Identification of the Network Features for the Detection of DoS and Probe Attacks. 923-943
Volume 59, Number 7, July 2016
Original Articles
- Joseph K. Liu, Sze Ling Yeo, Wun-She Yap, Sherman S. M. Chow, Duncan S. Wong, Willy Susilo:
Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol. 945-954 - Peng Jiang, Yi Mu, Fuchun Guo, Xiaofen Wang, Qiaoyan Wen:
Online/Offline Ciphertext Retrieval on Resource Constrained Devices. 955-969 - Chunpeng Ge, Willy Susilo, Jiandong Wang, Zhiqiu Huang, Liming Fang, Yongjun Ren:
A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles. 970-982 - Zhen Liu, Duncan S. Wong:
Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe. 983-1004 - Amir Jalaly Bidgoly, Behrouz Tork Ladani:
Modeling and Quantitative Verification of Trust Systems Against Malicious Attackers. 1005-1027 - Jiguo Li, Haiting Du, Yichen Zhang:
Certificate-Based Key-Insulated Signature in the Standard Model. 1028-1039 - Joseph K. Liu, Willy Susilo, Tsz Hon Yuen, Man Ho Au, Jun-bin Fang, Zoe Lin Jiang, Jianying Zhou:
Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles. 1040-1053 - Kunpeng Bai, Chuankun Wu:
An AES-Like Cipher and Its White-Box Implementation. 1054-1065 - Jiguo Li, Meilin Teng, Yichen Zhang, Qihong Yu:
A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme. 1066-1075 - Mario Diego Munoz-Hernandez, Miguel Morales-Sandoval, Jose Juan Garcia-Hernandez:
An End-to-End Security Approach for Digital Document Management. 1076-1090 - Haibo Yi, Shaohua Tang:
Very Small FPGA Processor for Multivariate Signatures. 1091-1101 - Haibo Yi, Shaohua Tang, Ranga Vemuri:
Fast Inversions in Small Finite Fields by Using Binary Trees. 1102-1112
Volume 59, Number 8, August 2016
Original Articles
- Xiang Zhao, Yifan Chen, Chuan Xiao, Yoshiharu Ishikawa, Jiuyang Tang:
Frequent Subgraph Mining Based on Pregel. 1113-1128 - Jorge Francisco Cutigi, Adenilso da Silva Simão, Simone R. S. Souza:
Reducing FSM-Based Test Suites with Guaranteed Fault Coverage. 1129-1143 - Pablo Pérez-Lantero:
Area and Perimeter of the Convex Hull of Stochastic Points. 1144-1154 - Hairong Yu, Guohui Li, Jianjun Li, LihChyun Shu:
DOcyclical: A Latency-Resistant Cyclic Multi-Threading Approach for Automatic Program Parallelization. 1155-1173 - Indra Rajasingh, Paul D. Manuel, N. Parthiban, D. Azubha Jemilet, R. Sundara Rajan:
Transmission in Butterfly Networks. 1174-1179 - Zbynek Krivka, Alexander Meduna, Petr Zemek:
Phrase-Structure Grammars: Normal Forms and Reduction. 1180-1185 - Robert M. Hierons, Uraz Cengiz Türker:
Distinguishing Sequences for Distributed Testing: Adaptive Distinguishing Sequences. 1186-1206 - Huilin Liu, Chen Chen, Junchang Xin, Liyuan Zhang:
Searching the Informative Subgraph Based on the PeakGraph Model. 1207-1219 - Hui Cui, Robert H. Deng:
Revocable and Decentralized Attribute-Based Encryption. 1220-1235 - Weifeng Wang, Li Jiao:
Trace Abstraction Refinement for Solving Horn Clauses. 1236-1251 - Fabrizio Luccio, Bernard Mans, Luke Mathieson, Linda Pagli:
Complete Balancing via Rotation. 1252-1263 - Rolando Trujillo-Rasua, Ismael González Yero:
Characterizing 1-Metric Antidimensional Trees and Unicyclic Graphs. 1264-1273
Volume 59, Number 9, September 2016
Original Articles
- Arambam Neelima, Kh. Manglem Singh:
Perceptual Hash Function based on Scale-Invariant Feature Transform and Singular Value Decomposition. 1275-1281 - Wei Ni:
Minimized Error Propagation Location Method Based on Error Estimation. 1282-1288 - D. Thenmozhi, Chandrabose Aravindan:
Paraphrase Identification by Using Clause-Based Similarity Features and Machine Translation Metrics. 1289-1302 - Alok Kumar Singh Kushwaha, Rajeev Srivastava:
Maritime Object Segmentation Using Dynamic Background Modeling and Shadow Suppression. 1303-1329 - Willian Valmorbida, Jorge Luis Victória Barbosa, Débora Nice Ferrari Barbosa, Sandro José Rigo:
U-Library: An Intelligent Model for Ubiquitous Library Support. 1330-1344 - Billur Barshan, Aras Yurtman:
Investigating Inter-Subject and Inter-Activity Variations in Activity Recognition Using Wearable Motion Sensors. 1345-1362 - Konstantinos Tsakalozos, Spiros Evangelatos, Fotis Psallidas, Marcos R. Vieira, Vassilis J. Tsotras, Alex Delis:
DiVA: Using Application-Specific Policies to 'Dive' into Vector Approximations. 1363-1382 - Sunita Garhwal, Ram Jiwari:
Parallel Fuzzy Regular Expression and its Conversion to Epsilon-Free Fuzzy Automaton. 1383-1391 - Ohoud Nafea, Sanaa Ghouzali, Wadood Abdul, Qazi Emad-ul-Haq:
Hybrid Multi-Biometric Template Protection Using Watermarking. 1392-1407 - Yair Neuman, Yochai Cohen:
A Novel Methodology for Automatically Measuring Psychological Dimensions in Textual Data. 1408-1414 - Nilson Donizete Guerin Júnior, Flavio de Barros Vidal, Bruno Macchiavello:
Text-dependent User Verification of Handwritten Words and Signatures on Mobile Devices. 1415-1425 - Ümit Ekmekçi, Zehra Çataltepe, Güvenç Güngör, Demir Can Kahya:
EigenBots for the Okey Social Board Game. 1426-1432
Volume 59, Number 10, October 2016
Original Articles
- Pilar González-Férez, Juan Piernas, Toni Cortes:
Improving I/O Performance Through an In-Kernel Disk Simulator. 1433-1452 - Lois Orosa, Javier D. Bruguera, Elisardo Antelo:
Asymmetric Allocation in a Shared Flexible Signature Module for Multicore Processors. 1453-1469 - Rui Hou, Jigang Wu, Yawen Chen, Haibo Zhang:
Note on Edge-Colored Graphs for Networks with Homogeneous Faults. 1470-1478 - Ankur Singh Kang, Renu Vig:
Comparatative Performance Evaluation of Modified Prototype Filter Bank Multicarrier Cognitive Radio Under Constraints of Lp, K, N and D. 1479-1491 - Yung-Ting Chuang, P. M. Melliar-Smith, Louise E. Moser, Isai Michel Lombera:
Statistical Estimation and Dynamic Adaptation Algorithms for the iTrust Publication, Search and Retrieval System. 1492-1510 - Hongzhi Zhao, Yuan Xue:
RSD Fault Block Model for Highly Efficient Fault-Tolerant Manhattan Routing Algorithms in 2D Mesh. 1511-1526 - L. Sivagami, J. Martin Leo Manickam:
Cluster-Based MAC Protocol for Collision Avoidance and TDMA Scheduling in Underwater Wireless Sensor Networks. 1527-1535
- Yili Gong, Chuang Hu, Yanyan Xu, Wenjie Wang:
A Distributed File System with Variable Sized Objects for Enhanced Random Writes. 1536-1550 - I. S. Akila, R. Venkatesan:
A Fuzzy Based Energy-aware Clustering Architecture for Cooperative Communication in WSN. 1551-1562 - Xiang Hu, Li Jiao, Zhijia Li:
Modelling and Performance Analysis of IEEE 802.11 DCF Using Coloured Petri Nets. 1563-1580
Volume 59, Number 11, November 2016
Original Articles
- Magdy M. Fadel, Ali I. Eldesoky, Amira Y. Haikel, Labib M. Labib:
A Low-Storage Precise IP Traceback Technique Based on Packet Marking and Logging. 1581-1592 - Lan Zhou, Vijay Varadharajan, K. Gopinath:
A Secure Role-Based Cloud Storage System For Encrypted Patient-Centric Health Records. 1593-1611 - Mohannad J. Alhanahnah, Arshad Jhumka, Sahel Alouneh:
A Multidimension Taxonomy of Insider Threats in Cloud Computing. 1612-1622 - Fatemeh Imani-Mehr, Mehran S. Fallah:
How Powerful Are Run-Time Monitors with Static Information? 1623-1636 - Shifeng Sun, Joseph K. Liu, Yu Yu, Baodong Qin, Dawu Gu:
RKA-Secure Public Key Encryptions Against Efficiently Invertible Functions. 1637-1658 - Yanli Ren, Ning Ding, Xinpeng Zhang, Haining Lu, Dawu Gu:
Identity-Based Encryption with Verifiable Outsourced Revocation. 1659-1668 - Junqing Gong, Xiaolei Dong, Zhenfu Cao, Jie Chen:
Almost-Tight Identity Based Encryption Against Selective Opening Attack. 1669-1688 - Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang:
CCA2 Attack and Modification of Huang et al.'s Public Key Encryption with Authorized Equality Test. 1689-1694 - Jiangshan Yu, Vincent Cheval, Mark Ryan:
DTKI: A New Formalized PKI with Verifiable Trusted Parties. 1695-1713 - Jianghong Wei, Xinyi Huang, Wenfen Liu, Xuexian Hu:
Practical Attribute-based Signature: Traceability and Revocability. 1714-1734 - Byungho Min, Vijay Varadharajan:
Rethinking Software Component Security: Software Component Level Integrity and Cross Verification. 1735-1748
Volume 59, Number 12, December 2016
Original Articles
- Minhaj Ahmad Khan:
A Transformation For Optimizing String-Matching Algorithms For Long Patterns. 1749-1759 - Walayat Hussain, Farookh Khadeer Hussain, Omar Khadeer Hussain, Elizabeth Chang:
Provider-Based Optimized Personalized Viable SLA (OPV-SLA) Framework to Prevent SLA Violation. 1760-1783 - Mariem Mefteh, Nadia Bouassida, Hanêne Ben-Abdallah:
Mining Feature Models from Functional Requirements. 1784-1804 - Khaled El-Fakih, Nina Yevtushenko:
Test Translation for Embedded Finite State Machine Components. 1805-1816 - Farah Aït-Salaht, Hind Castel-Taleb, Jean-Michel Fourneau, Nihal Pekergin:
Performance Analysis of a Queue by Combining Stochastic Bounds, Real Traffic Traces and Histograms. 1817-1830 - Patrizio Angelini, Giordano Da Lozzo:
SEFE = C-Planarity? 1831-1838 - Shiying Wang, Zhenhua Wang, Mujiangshan Wang:
The 2-Extra Connectivity and 2-Extra Diagnosability of Bubble-Sort Star Graph Networks. 1839-1856 - Liang Bao, Fen Zhao, Mengqing Shen, Yutao Qi, Ping Chen:
An Orthogonal Genetic Algorithm for QoS-Aware Service Composition. 1857-1871 - Simone Brognoli, Gianfranco Lamperti, Michele Scandale:
Incremental Determinization of Expanding Automata. 1872-1899 - Sandi Klavzar, Paul D. Manuel, Mohammad J. Nadjafi-Arani, R. Sundara Rajan, Cyriac Grigorious, Sudeep Stephen:
Average Distance in Interconnection Networks via Reduction Theorems for Vertex-Weighted Graphs. 1900-1910
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.