default search action
The Computer Journal, Volume 57
Volume 57, Number 1, January 2014
- Reinaldo A. Vallejos C., José M. Martínez V.:
A Fast Transformation of Markov Chains and Their Respective Steady-State Probability Distributions. 1-11 - Artem Polyvyanyy, Luciano García-Bañuelos, Dirk Fahland, Mathias Weske:
Maximal Structuring of Acyclic Process Models. 12-35 - Juan de Lara, Esther Guerra, Ruth Cobos, Jaime Moreno-Llorena:
Extending Deep Meta-Modelling for Practical Model-Driven Engineering. 36-58 - Arnold L. Rosenberg:
Region Management by Finite-State Robots. 59-72 - Michel A. Reniers, Rob Schoren, Tim A. C. Willemse:
Results on Embeddings Between State-Based and Event-Based Systems. 73-92 - Jinn-Shyong Yang, Jou-Ming Chang:
Optimal Independent Spanning Trees on Cartesian Product of Hybrid Graphs. 93-99 - Iván Cores, Gabriel Rodríguez, Patricia González, María J. Martín:
Failure Avoidance in MPI Applications Using an Application-Level Approach. 100-114 - Yongjian Li, Naiju Zeng, William N. N. Hung, Xiaoyu Song:
Combining Symmetry Reduction with Generalized Symbolic Trajectory Evaluation. 115-128 - K. Subramani, James Worthington:
On Certifying Instances of Zero-Clairvoyant Scheduling. 129-137 - Alev Mutlu, Pinar Senkul:
Improving Hit Ratio of ILP-based Concept Discovery System with Memoization. 138-153 - Kewen Liao, Hong Shen:
LP-Based Approximation Algorithms for Reliable Resource Allocation. 154-164 - Oana Agrigoroaiei, Gabriel Ciobanu:
Rewriting Systems Over Indexed Multisets. 165-179
Volume 57, Number 2, February 2014
- Jongsung Kim, Bo Hong, Naveen K. Chilamkurti:
Advanced Computer Technologies and Applications in Grid and Cloud Computing. 181-182 - Haibin Zhai, Albert K. Wong, Hai Jiang, Yi Sun, Jun Li, Zhongcheng Li:
A Node-Link-Based P2P Cache Deployment Algorithm in ISP Networks. 183-194 - Ahmed Sallam, Kenli Li:
A Multi-objective Virtual Machine Migration Policy in Cloud Systems. 195-204 - Aun Irtaza, M. Arfan Jaffar, Muhammad Tariq Mahmood:
Semantic Image Retrieval in a Grid Computing Environment Using Support Vector Machines. 205-216 - Hong-Chang Lee, Jong-Eun Park, Myung-Joon Lee:
C3ware: A Middleware Supporting Collaborative Services over Cloud Storage. 217-224 - Lin Yao, Guowei Wu, Jiankang Ren, Yanwei Zhu, Ying Li:
Guaranteeing Fault-Tolerant Requirement Load Balancing Scheme Based on VM Migration. 225-232 - Joon-Sang Park, Seung Jun Baek, Kyogu Lee:
A Highly Parallelized Decoder for Random Network Coding leveraging GPGPU. 233-240 - Ayad Ibrahim, Hai Jin, Ali A. Yassin, Deqing Zou, Peng Xu:
Towards Efficient Yet Privacy-Preserving Approximate Search in Cloud Computing. 241-254 - Hong-Yi Chang, Hsin-Che Lu, Yu-Huei Huang, Yuan-Wei Lin, Yih-Jou Tzang:
Novel Auction Mechanism with Factor Distribution Rule for Cloud Resource Allocation. 255-262 - Yong Tae Park, Pranesh Sthapit, Jae-Young Pyun:
Energy Efficient Data Fragmentation for Ubiquitous Computing. 263-272 - Juan Caubet, Carlos Gañán, Oscar Esparza, Jose L. Muñoz, Jorge Mata-Díaz, Juanjo Alins:
Certificate Revocation List Distribution System for the KAD Network. 273-280 - Neeraj Kumar, Naveen K. Chilamkurti, Sherali Zeadally, Young-Sik Jeong:
Achieving Quality of Service (QoS) Using Resource Allocation and Adaptive Scheduling in Cloud Computing with Grid Support. 281-290 - Zhipiao Liu, Shangguang Wang, Qibo Sun, Hua Zou, Fangchun Yang:
Cost-Aware Cloud Service Request Scheduling for SaaS Providers. 291-301 - Hwamin Lee, Doosoon Park:
A Grid Service-Based Virtual Screening System. 302-307 - Tien-Dung Nguyen, An Thuy Nguyen, Man Doan Nguyen, Nguyen Van Mui, Eui-Nam Huh:
An Improvement of Resource Allocation for Migration Process in Cloud Environment. 308-318
- Daniel Piso Fernandez, Javier D. Bruguera:
Obtaining Accurate Error Expressions and Bounds for Floating-Point Multiplicative Algorithms. 319-331 - Antoine Bossard, Keiichi Kaneko:
Set-to-Set Disjoint Paths Routing in Hierarchical Cubic Networks. 332-337
Volume 57, Number 3, March 2014
- Hyun-Chul Kim, Jaewook Lee, Daewon Lee:
Transductive Gaussian Processes with Applications to Object Pose Estimation. 339-346 - Fabrizio Riguzzi:
Speeding Up Inference for Probabilistic Logic Programs. 347-363 - Linjia Sun, Xiaohui Liang, Qinping Zhao:
Recursive Templates Segmentation and Exemplars Matching for Human Parsing. 364-377 - Beaux Sharifi, David I. Inouye, Jugal K. Kalita:
Summarization of Twitter Microblogs. 378-402 - Rachel Chasin, Daryl Woodward, Jeremy Witmer, Jugal Kalita:
Extracting and Displaying Temporal and Geospatial Entities from Articles on Historical Events. 403-426 - John Reeder, Michael Georgiopoulos:
Generative Neural Networks for Multi-task Life-Long Learning. 427-450 - Pitipong Chanloha, Jatuporn Chinrungrueng, Wipawee Usaha, Chaodit Aswakul:
Cell Transmission Model-Based Multiagent Q-Learning for Network-Scale Signal Control With Transit Priority. 451-468 - Ahmed Kheiri, Ender Özcan:
Constructing Constrained-Version of Magic Squares Using Selection Hyper-heuristics. 469-479
Volume 57, Number 4, April 2014
- Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan:
Server-Aided Signature Verification for Lightweight Devices. 481-493 - Salman Niksefat, Babak Sadeghiyan, Payman Mohassel, Seyed Saeed Sadeghian:
ZIDS: A Privacy-Preserving Intrusion Detection System Using Secure Two-Party Computation Protocols. 494-509 - Juan Manuel González Nieto, Mark Manulis, Dongdong Sun:
Forward-Secure Hierarchical Predicate Encryption. 510-536 - Monowar H. Bhuyan, Hirak Jyoti Kashyap, Dhruba Kumar Bhattacharyya, Jugal K. Kalita:
Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions. 537-556 - Tao Han, Weiming Zhang, Chao Wang, Nenghai Yu, Yue-Fei Zhu:
Adaptive ±1 Steganography in Extended Noisy Region. 557-566 - Shengke Zeng, Shaoquan Jiang:
A New Framework for Conditionally Anonymous Ring Signature. 567-578 - Jinguang Han, Willy Susilo, Yi Mu, Jun Yan:
Attribute-Based Data Transfer with Filtering Scheme in Cloud Computing. 579-591 - Limin Shen, Futai Zhang, Yinxia Sun:
Efficient Revocable Certificateless Encryption Secure in the Standard Model. 592-601 - Prasanta Gogoi, D. K. Bhattacharyya, Bhogeswar Borah, Jugal K. Kalita:
MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method. 602-623 - Faezeh Sadat Babamir, Ali Norouzi:
Achieving Key Privacy and Invisibility for Unattended Wireless Sensor Networks in Healthcare. 624-635 - Huaqun Wang:
Insecurity of 'Improved Anonymous Multi-Receiver Identity-Based Encryption'. 636-638
Volume 57, Number 5, May 2014
- Joshua Amavi, Béatrice Bouchou, Agata Savary:
On Correcting XML Documents with Respect to a Schema. 639-674 - Rekai González-Alberquilla, Fernando Emmanuel Frati, Luis Piñuel, Karin Strauss, Luis Ceze:
Data Race Detection with Minimal Hardware Support. 675-692 - Victor Khomenko, Andrey Mokhov:
Direct Construction of Complete Merged Processes. 693-707 - Chao Zhu, Qiang Zhu, Calisto Zuzarte:
Optimization of Monotonic Linear Progressive Queries Based on Dynamic Materialized Views. 708-730 - Kuei-Hao Chen, Guan-Shieng Huang, Richard Chia-Tung Lee:
Bit-Parallel Algorithms for Exact Circular String Matching. 731-743 - Lijun Lun, Xin Chi, Hui Xu:
The Relationship between Forward Slicing and Backward Slicing for Software Architecture. 744-758 - Patrick J. Graydon, Iain Bate:
Realistic Safety Cases for the Timing of Systems. 759-774 - Rada Chirkova:
Combined-Semantics Equivalence and Minimization of Conjunctive Queries. 775-795
Volume 57, Number 6, June 2014
- Juan A. Rodríguez-Aguilar:
Special Issue on Optimization in Multi-Agent Systems: Guest Editor's Introduction. 797-798 - Jesús Cerquides, Alessandro Farinelli, Pedro Meseguer, Sarvapali D. Ramchurn:
A Tutorial on Optimization for Multi-Agent Systems. 799-824 - Sejoon Lim, Daniela Rus:
Congestion-Aware Multi-Agent Path Planning: Distributed Algorithm and Applications. 825-839 - Hala Mostafa, Partha P. Pal, Patrick Hurley:
Message Passing for Distributed QoS-Security Tradeoffs. 840-855 - Meritxell Vinyals, Kathryn S. Macarthur, Alessandro Farinelli, Sarvapali D. Ramchurn, Nicholas R. Jennings:
A Message-Passing Approach to Decentralized Parallel Machine Scheduling. 856-874 - Archie C. Chapman, David S. Leslie, Alex Rogers, Nicholas R. Jennings:
Learning in Unknown Reward Games: Application to Sensor Networks. 875-892 - Jason Tsai, Thanh Hong Nguyen, Nicholas Weller, Milind Tambe:
Game-Theoretic Target Selection in Contagion-Based Domains. 893-905 - Christian Bessiere, Ismel Brito, Patricia Gutierrez, Pedro Meseguer:
Global Constraints in Distributed Constraint Satisfaction and Optimization. 906-923
- Faisal Iradat, Sergey D. Andreev, Sayeed Ghani, Syed Irfan Nabi, Waseem Arain:
Revisiting Assumptions in Backoff Process Modeling and Queueing Analysis of Wireless Local Area Networks (WLANs). 924-938 - Shih-Chang Huang:
D2PS: Direction and Distance Positioning System in Wireless Networks. 939-951
Volume 57, Number 7, July 2014
Original Articles
- Shan Ling, Weidong Chen:
Node-to-Set Disjoint Paths in Biswapped Networks. 953-967 - Gloria Ortega López, Francisco Vázquez, Inmaculada García, Ester M. Garzón:
FastSpMM: An Efficient Library for Sparse Matrix Matrix Product on GPUs. 968-979 - Sushanta Karmakar, A. Chandrakanth Reddy:
An Improved Algorithm for Distributed Trigger Counting in Ring. 980-986 - Haitao Dan, Robert M. Hierons:
The Oracle Problem When Testing from MSCs. 987-1001 - Anthony Danalis, Piotr Luszczek, Gabriel Marin, Jeffrey S. Vetter, Jack J. Dongarra:
BlackjackBench: Portable Hardware Characterization with Automated Results' Analysis. 1002-1016 - Pablo Llopis, Javier García Blas, Florin Isaila, Jesús Carretero:
Survey of Energy-Efficient and Power-Proportional Storage Systems. 1017-1032 - Hui Kong, Xiaoyu Song, Dong Han, Ming Gu, Jiaguang Sun:
A New Barrier Certificate for Safety Verification of Hybrid Systems. 1033-1045 - Frank Zeyda, Lalkhumsanga Lalkhumsanga, Ana Cavalcanti, Andy J. Wellings:
Circus Models for Safety-Critical Java Programs. 1046-1091 - Jiufeng Zhou, Lixin Han, Yuan Yao, Xiaoqin Zeng, Feng Xu:
A Parallel Approach to Link Sign Prediction in Large-Scale Online Social Networks. 1092-1104 - Janardan Misra:
A Calculus of Incomplete Fusions. 1105-1116
Volume 57, Number 8, August 2014
Original Articles
- Dilek Demirbas, Ismail Akturk, Özcan Özturk, Ugur Güdükbay:
Application-Specific Heterogeneous Network-on-Chip Design. 1117-1131 - Arta Babaee, Moez Draief:
Distributed Multivalued Consensus. 1132-1140 - Libo Huang, Zhiying Wang, Nong Xiao, Qiang Dou:
Efficient Utilization of SIMD Engines for General-Purpose Processors. 1141-1154 - David Poulain, Joanna Tomasik, Marc-Antoine Weisser, Dominique Barth:
A Packing Problem Approach to Lightpath Assignment in an Optical Ring. 1155-1166 - Waheed Yasin, Hamidah Ibrahim, Nur Izura Udzir, Nor Asilah Wati Abdul Hamid:
An Overview of Media Streams Caching in Peer-to-Peer Systems. 1167-1177 - Yan Cui, Yingxin Wang, Yu Chen, Yuanchun Shi:
Mitigating Resource Contention on Multicore Systems via Scheduling. 1178-1194 - Wassim Ramadan, Eugen Dedu, Julien Bourgeois:
Oscillation-Free Video Adaptation at Application Layer on Server Side and Experiments Using DCCP. 1195-1210 - Pingshan Liu, Shengzhong Feng, Guimin Huang, Jianping Fan:
Bandwidth-Availability-Based Replication Strategy for P2P VoD Systems. 1211-1229 - Ahmed Ouqour, Younes Jabrane, Brahim Ait Es Said, Abdellah Ait Ouahman:
PAPR Reduction in OFDM via Active Constellation Extension-Projection Onto Convex Sets Combined with Particle Swarm Optimization. 1230-1237 - Marjan Radi, Behnam Dezfouli, Kamalrulnizam Abu Bakar, Shukor Abd Razak, Malrey Lee:
Network Initialization in Low-Power Wireless Networks: A Comprehensive Study. 1238-1261 - Chathuranga Widanapathirana, Jonathan C. Li, Milosh V. Ivanovich, Paul G. Fitzpatrick, Y. Ahmet Sekercioglu:
Adaptive Statistical Signatures of Network Soft-Failures in User Devices. 1262-1278
Volume 57, Number 9, September 2014
Special Focus on Social Computing and its Applications
- Guandong Xu, Aoying Zhou, Nitin Agarwal:
Special Issue on Social Computing and its Applications. 1279-1280 - Ming Gao, Cheqing Jin, Weining Qian, Xueqing Gong:
Real-time and Personalized Search over a Microblogging System. 1281-1295 - Michal Szczerbak, François Toutain, Ahmed Bouabdallah, Jean-Marie Bonnin:
KRAMER: New Social Medium Based on Collaborative Recognition of Important Situations. 1296-1317 - Hongbo Chen, Jungang Xu, Ben He:
Automated Essay Scoring by Capturing Relative Writing Quality. 1318-1330 - Jianshan Sun, Jian Ma, Zhiying Liu, Yajun Miao:
Leveraging Content and Connections for Scientific Article Recommendation in Social Computing Contexts. 1331-1342 - Zhiang Wu, Jie Cao, Junjie Wu, Youquan Wang, Chunyang Liu:
Detecting Genuine Communities from Large-Scale Social Networks: A Pattern-Based Method. 1343-1357 - Longbing Cao:
Non-IIDness Learning in Behavioral and Social Data. 1358-1370
- Mostafa Haghir Chehreghani:
An Efficient Algorithm for Approximate Betweenness Centrality Computation. 1371-1382 - Abraham Varghese, Kannan Balakrishnan, Reji Rajan Varghese, Joseph S. Paul:
Content-Based Image Retrieval of Axial Brain Slices Using a Novel LBP with a Ternary Encoding. 1383-1394 - Huiyu Zhou, Kotaro Hirasawa:
Traffic Density Prediction with Time-Related Data Mining using Genetic Network Programming. 1395-1414 - Haoran Xie, Qing Li, Xudong Mao, Xiaodong Li, Yi Cai, Qianru Zheng:
Mining Latent User Community for Tag-Based and Content-Based Search in Social Media. 1415-1430 - Qibin Duan, Dirk P. Kroese, Tim J. Brereton, Aaron Spettl, Volker Schmidt:
Inverting Laguerre Tessellations. 1431-1440
Volume 57, Number 10, October 2014
Original Articles
- Chin-Chen Chang, Ting-Fang Cheng:
A Secure Diverse Ticket-Sale System in a Distributed Cloud Environment. 1441-1459 - Lourdes López-García, Luis J. Dominguez Perez, Francisco Rodríguez-Henríquez:
A Pairing-Based Blind Signature E-Voting Scheme. 1460-1471 - Hui Cui, Yi Mu, Man Ho Au:
Signcryption Secure Against Linear Related-Key Attacks. 1472-1483 - Duygu Karaoglan, Albert Levi:
A Survey on the Development of Security Mechanisms for Body Area Networks. 1484-1512 - Long Ngo, Colin Boyd, Juan Manuel González Nieto:
Automated Proofs for Computational Indistinguishability. 1513-1536 - Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof System. 1537-1556 - Ren-Junn Hwang, Yu-Kai Hsiao:
Anonymous Routing Protocol Based on Weil Pairing for Wireless Mesh Networks. 1557-1569 - Shaoquan Jiang:
On Unconditional ϵ-Security of Private Key Encryption. 1570-1579 - Chang Xu, Hua Guo, Zhoujun Li, Yi Mu:
Affiliation-Hiding Authenticated Asymmetric Group Key Agreement Based on Short Signature. 1580-1590
Volume 57, Number 11, November 2014
- Joaquim Gabarró, Maria J. Serna, Alan Stewart:
Analysing Web-Orchestrations Under Stress Using Uncertainty Profiles. 1591-1615 - Tiziana Calamoneri, Antonio Frangioni, Blerina Sinaimeri:
Pairwise Compatibility Graphs of Caterpillars. 1616-1623 - Daniel Lemire, Owen Kaser:
Strongly Universal String Hashing is Fast. 1624-1638 - Chia-Lin Lee, Tzong-Jye Liu:
A Self-Stabilizing Distance-2 Edge Coloring Algorithm. 1639-1648 - Billur Barshan, Murat Cihan Yüksek:
Recognizing Daily and Sports Activities in Two Open Source Machine Learning Environments Using Body-Worn Sensor Units. 1649-1667 - António Leslie Bajuelos, Sergey Bereg, Ana Mafalda Martins:
Guarding Orthogonal Galleries with Rectangular Rooms. 1668-1673 - Rui Zhou, Chengfei Liu, Jianxin Li, Junhu Wang, Jeffrey Xu Yu:
Evaluating Irredundant Maximal Contained Rewritings for XPath Queries on Views. 1674-1692 - Peter G. Harrison, Andrea Marin:
Product-Forms in Multi-Way Synchronizations. 1693-1710 - Sheau-Ru Tong, Yuan-Tse Yu:
Adaptation of Near-Perfect Packet-Level FEC Interleaving in Mobile Media Streaming. 1711-1722 - Qingting Wei, Jihong Guan, Shuigeng Zhou, Xin Wang:
A New and Effective Approach to GML Documents Compression. 1723-1740 - David Novak, Pavel Zezula:
Performance Study of Independent Anchor Spaces for Similarity Searching. 1741-1755 - Xu Yang, Deyuan Guo, Hu He, Haijing Tang, Yanjun Zhang:
An Implementation of Message-Passing Interface over VxWorks for Real-Time Embedded Multi-Core Systems. 1756-1764
Volume 57, Number 12, December 2014
Original Articles
- Raed T. Al-Zubi, Mohammed Hawa, Ghazi M. Al-Sukkar, Khalid A. Darabkh:
Markov-Based Distributed Approach for Mitigating Self-Coexistence Problem in IEEE 802.22 WRANs. 1765-1775 - Hong-Yi Chang, Chih-Chun Lai, Yuan-Wei Lin:
A Fast SVC-Based Channel-Recommendation System for an IPTV on a Cloud and P2P Hybrid Platform. 1776-1789 - Sain Saginbekov, Arshad Jhumka:
Towards Efficient Stabilizing Code Dissemination in Wireless Sensor Networks. 1790-1816 - Hwangnam Kim, Hwantae Kim, Wonkyun Park, Mungyu Bae:
Disabling Misbehavior with Traffic Constraints in WLANs. 1817-1833 - Heejung Yang, Chin-Wan Chung:
Efficient Iceberg Query Processing in Sensor Networks. 1834-1851 - Orhan Dagdeviren, Vahid Khalilpour Akram:
An Energy-Efficient Distributed Cut Vertex Detection Algorithm for Wireless Sensor Networks. 1852-1869 - Marco Beccuti, Giuliana Franceschinis, Daniele Codetta Raiteri, Serge Haddad:
Computing Optimal Repair Strategies by Means of NdRFT Modeling and Analysis. 1870-1892 - Prem Nath, Chiranjeev Kumar:
Mobility Management Scheme for Fixed Mobility Pattern Mobile Users in IPv4 Networks. 1893-1911 - V. S. Felix Enigo, V. Ramachandran:
Enhancing the Scalability of Non-Spatial Concurrent Queries in Wireless Sensor Networks. 1912-1924
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.