default search action
Journal of Computer and System Sciences, Volume 79
Volume 79, Number 1, February 2013
- Fedor V. Fomin, Serge Gaspers, Saket Saurabh, Stéphan Thomassé:
A linear vertex kernel for maximum internal spanning tree. 1-6 - Florin Manea, Catalin Tiseanu:
The hardness of counting full words compatible with partial words. 7-22 - Stéphane Demri, Marcin Jurdzinski, Oded Lachish, Ranko Lazic:
The covering and boundedness problems for branching vector addition systems. 23-38 - Klaus Jansen, Stefan Kratsch, Dániel Marx, Ildikó Schlotter:
Bin packing with fixed number of bins revisited. 39-49 - Bhaskar DasGupta, Devendra Desai:
On the complexity of Newman's community finding approach for biological and social networks. 50-67 - Leslie Ann Goldberg, Mark Jerrum:
Approximating the Tutte polynomial of a binary matroid and other related combinatorial polynomials. 68-78 - Manuel Bodirsky, Víctor Dalmau:
Datalog and constraint satisfaction with infinite templates. 79-100 - Juha Honkala:
The sequence equivalence problem for primitive D0L systems. 101-110 - Alexander Kesselman, Kirill Kogan, Sergey Nemzer, Michael Segal:
Space and speed tradeoffs in TCAM hierarchical packet classification. 111-121 - Longyan Gong, Jingxin Pan, Beibei Liu, Shengmei Zhao:
A novel one-time password mutual authentication scheme on sharing renewed finite random sub-passwords. 122-130 - Peide Liu:
Some generalized dependent aggregation operators with intuitionistic linguistic numbers and their application to group decision making. 131-143 - Dániel Marx:
Completely inapproximable monotone and antimonotone parameterized problems. 144-151 - Yongzhi Cao, Lirong Xia, Mingsheng Ying:
Probabilistic automata for computing with words. 152-172
Volume 79, Number 2, March 2013
- Xiaolong Jin, Ahmed Yassin Al-Dubai, Laurence Tianruo Yang:
Special issue: Frontiers and advance topics of computer and information technology. 173-174 - John M. Ye, Man Cao, Zening Qu, Tianzhou Chen:
Regional cache organization for NoC based many-core processors. 175-186 - Dingding Li, Hai Jin, Xiaofei Liao, Yu Zhang, Bing Bing Zhou:
Improving disk I/O performance in a virtualized system. 187-200 - Gang Chen, Yongwei Wu, Jie Wu, Weimin Zheng:
TopCluster: A hybrid cluster model to support dynamic deployment in Grid. 201-215 - You Li, Kaiyong Zhao, Xiaowen Chu, Jiming Liu:
Speeding up k-Means algorithm by GPUs. 216-229 - Ranieri Baraglia, Gabriele Capannini, Patrizio Dazzi, Giancarlo Pagano:
A multi-criteria job scheduling framework for large computing farms. 230-244 - Lihong Zheng, Xiangjian He, Bijan Samali, Laurence Tianruo Yang:
An algorithm for accuracy enhancement of license plate recognition. 245-255 - Jun Ma, Long Zheng, Mianxiong Dong, Xiangjian He, Minyi Guo, Yuichi Yaguchi, Ryuichi Oka:
A segmentation-free method for image classification based on pixel-wise matching. 256-268 - Junfeng Xu, Keqiu Li, Geyong Min:
Asymmetric multi-path division communications in underwater acoustic networks with fading channels. 269-278 - Guojun Wang, Fengshun Yue, Qin Liu:
A secure self-destructing scheme for electronic data. 279-290 - Ranieri Baraglia, Patrizio Dazzi, Matteo Mordacchini, Laura Ricci:
A peer-to-peer recommender system for self-emerging user communities based on gossip overlays. 291-308
Volume 79, Number 3, May 2013
- Alfredo Cuzzocrea:
Theoretical and practical aspects of warehousing, querying and mining sensor and streaming data. 309-311
- Rimma V. Nehme, Karen Works, Chuan Lei, Elke A. Rundensteiner, Elisa Bertino:
Multi-route query processing and optimization. 312-329 - Karen Works, Elke A. Rundensteiner, Emmanuel Agu:
Optimizing adaptive multi-route query processing via time-partitioned indices. 330-348 - Georgios Chatzimilioudis, Alfredo Cuzzocrea, Dimitrios Gunopulos, Nikos Mamoulis:
A novel distributed framework for optimizing query routing trees in wireless sensor networks via optimal operator placement. 349-368 - Mohamed Medhat Gaber, Shonali Krishnaswamy, Brett Gillick, Hasnain AlTaiar, Nicholas Nicoloudis, Jonathan Liono, Arkady B. Zaslavsky:
Interactive self-adaptive clutter-aware visualisation for mobile data mining. 369-382 - Lu-An Tang, Xiao Yu, Sangkyum Kim, Quanquan Gu, Jiawei Han, Alice Leung, Thomas La Porta:
Trustworthiness analysis of sensor data in cyber-physical systems. 383-401
Volume 79, Number 4, June 2013
- Hamid Sarbazi-Azad, Nader Bagherzadeh:
Multicore computing systems: Architecture, programming tools, and applications. 403-405
- Morteza Mohaqeqi, Mehdi Kargahi:
Utility accrual object distribution in MPSoC real-time embedded systems. 406-420 - Chifeng Wang, Wen-Hsiang Hu, Nader Bagherzadeh:
Scalable load balancing congestion-aware Network-on-Chip router architecture. 421-439 - Amir-Mohammad Rahmani, Pasi Liljeberg, Juha Plosila, Hannu Tenhunen:
Developing a power-efficient and low-cost 3D NoC using smart GALS-based vertical channels. 440-456 - Aminollah Mahabadi, S. M. Zahedi, Ahmad Khonsari:
Reliable energy-aware application mapping and voltage-frequency island partitioning for GALS-based NoC. 457-474 - Masoumeh Ebrahimi, Masoud Daneshtalab, Pasi Liljeberg, Juha Plosila, Hannu Tenhunen:
Cluster-based topologies for 3D Networks-on-Chip using advanced inter-layer bus architecture. 475-491 - Mohammad Arjomand, S. Hamid Amiri, Hamid Sarbazi-Azad:
Efficient genetic based topological mapping using analytical models for on-chip networks. 492-513
Volume 79, Number 5, August 2013
- Guojun Wang, Jianhua Ma, Xiaolin Andy Li, Athanasios V. Vasilakos:
Special issue of JCSS on UbiSafe computing and communications. 515-517 - Meikang Qiu, Lei Zhang, Zhong Ming, Zhi Chen, Xiao Qin, Laurence T. Yang:
Security-aware optimization for ubiquitous computing systems with SEAT graph approach. 518-529 - Chaitanya Belwal, Albert M. K. Cheng, Bo Liu:
Feasibility interval for the transactional event handlers of P-FRP. 530-541 - Xuyun Zhang, Chang Liu, Surya Nepal, Jinjun Chen:
An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud. 542-555 - Zheng Yan, Yu Chen, Yue Shen:
A practical reputation system for pervasive social chatting. 556-572 - Jun Zhang, Yang Xiang, Wanlei Zhou, Yu Wang:
Unsupervised traffic classification using flow statistical properties and IP packet payload. 573-585 - Sancheng Peng, Guojun Wang, Shui Yu:
Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones. 586-595 - Xing Su, Minjie Zhang, Yi Mu, Quan Bai:
A robust trust model for service-oriented systems. 596-608
- Jianxin Wang, Yongjie Yang, Jiong Guo, Jianer Chen:
Planar graph vertex partition for linear problem kernels. 609-621 - Dominik D. Freydenberger, Daniel Reidenbach:
Inferring descriptive generalisations of formal languages. 622-639 - Krishnendu Chatterjee, Luca de Alfaro, Thomas A. Henzinger:
Strategy improvement for concurrent reachability and turn-based stochastic safety games. 640-657 - Hamed M. K. Alazemi, Anton Cerný:
Several extensions of the Parikh matrix L-morphism. 658-668 - Nai-Wen Chang, Sun-Yuan Hsieh:
{2,3}-Extraconnectivities of hypercube-like networks. 669-688 - Stéphane Demri:
On selective unboundedness of VASS. 689-713 - Olivier Bournez, Daniel Silva Graça, Emmanuel Hainry:
Computation with perturbed dynamical systems. 714-724 - Rohit Khandekar, Guy Kortsarz, Zeev Nutov:
On some network design problems with degree constraints. 725-736
Volume 79, Number 6, September 2013
- Pablo Barceló:
Editor's foreword. 737-738
- Serge Abiteboul, Balder ten Cate, Yannis Katsis:
On the equivalence of distributed systems with queries and communication. 739-762 - Marcelo Arenas, Jorge Pérez, Juan L. Reutter, Cristian Riveros:
The language of plain SO-tgds: Composition, inversion and structural properties. 763-784 - Mikolaj Bojanczyk, Leszek Aleksander Kolodziejczyk, Filip Murlak:
Solutions in XML data exchange. 785-815 - Diego Calvanese, Giuseppe De Giacomo, Maurizio Lenzerini, Moshe Y. Vardi:
On simplification of schema mappings. 816-834 - Evgeny Kharlamov, Dmitriy Zheleznyakov, Diego Calvanese:
Capturing model-based ontology evolution at the instance level: The case of DL-Lite. 835-872 - Ting Deng, Wenfei Fan, Leonid Libkin, Yinghui Wu:
On the aggregation problem for synthesized Web services. 873-891 - Dominik D. Freydenberger, Nicole Schweikardt:
Expressiveness and static analysis of extended conjunctive regular path queries. 892-909 - Wouter Gelade, Tomasz Idziaszek, Wim Martens, Frank Neven, Jan Paredaens:
Simplifying XML Schema: Single-type approximations of regular tree languages. 910-936 - Michael Meier, Michael Schmidt, Fang Wei, Georg Lausen:
Semantic query optimization in the presence of types. 937-957 - Dany Maslowski, Jef Wijsen:
A dichotomy in the complexity of counting database repairs. 958-983 - Reinhard Pichler, Sebastian Skritek:
Tractable counting of the answers to conjunctive queries. 984-1001
Volume 79, Number 7, November 2013
- Tomoya Enokido, Leonard Barolli, Makoto Takizawa:
Special issue on intelligent and innovative information systems. 1003-1004 - Joseph Kee-Yin Ng, Kam-yiu Lam, Quan Jia Cheng, Kevin Chin Yiu Shum:
An effective signal strength-based wireless location estimation system for tracking indoor mobile users. 1005-1016 - David Taniar, J. Wenny Rahayu:
A taxonomy for nearest neighbour queries in spatial databases. 1017-1039 - Anhar Fazal, Farookh Khadeer Hussain, Tharam S. Dillon:
An innovative approach for automatically grading spelling in essays using rubric-based scoring. 1040-1056 - Rubén Casado, Muhammad Younas, Javier Tuya:
Multi-dimensional criteria for testing web services transactions. 1057-1076 - Minoru Uehara:
Advanced orthogonal RAID based on virtual disks. 1077-1085 - Fatos Xhafa, Xavier Herrero, Admir Barolli, Leonard Barolli, Makoto Takizawa:
Evaluation of struggle strategy in Genetic Algorithms for ground stations scheduling problem. 1086-1100 - Akio Koyama, Hiroyuki Suzuki:
Real object-oriented communication method for ad hoc networks. 1101-1112 - Nils Müllner, Oliver E. Theel, Martin Fränzle:
Combining decomposition and reduction for state space analysis of a self-stabilizing system. 1113-1125
- Mark McCann, Nicholas Pippenger:
Fault tolerance in cellular automata at low fault rates. 1126-1143 - Lavinia Egidi, Giovanni Manzini:
Better spaced seeds using Quadratic Residues. 1144-1155 - Uéverton dos Santos Souza, Fábio Protti, Maise Dantas da Silva:
Revisiting the complexity of and/or graph solution. 1156-1163 - Dariusz R. Kowalski, Andrzej Pelc:
Leader election in ad hoc radio networks: A keen ear helps. 1164-1180 - Yuan Feng, Nengkun Yu, Mingsheng Ying:
Model checking quantum Markov chains. 1181-1198
Volume 79, Number 8, December 2013
- Yanming Shen, Keqiu Li, Weisong Shi:
Advanced topics on cloud computing. 1199 - Wei Wu, Jianying Zhou, Yang Xiang, Li Xu:
How to achieve non-repudiation of origin with privacy protection in cloud computing. 1200-1213 - Xuanhua Shi, Hongbo Jiang, Ligang He, Hai Jin, Chonggang Wang, Bo Yu, Xueguang Chen:
Developing an optimized application hosting framework in Clouds. 1214-1229 - Yongqiang Gao, Haibing Guan, Zhengwei Qi, Yang Hou, Liang Liu:
A multi-objective ant colony system algorithm for virtual machine placement in cloud computing. 1230-1242 - Waseem Ahmed, Yongwei Wu:
A survey on reliability in distributed systems. 1243-1255 - Xingfu Wu, Valerie E. Taylor:
Performance modeling of hybrid MPI/OpenMP scientific applications on large-scale multicore supercomputers. 1256-1268
- Iain A. Stewart:
Multiswapped networks and their topological and algorithmic properties. 1269-1286 - Zoltán Ádám Mann, Aniko Szajko:
Average-case complexity of backtrack search for coloring sparse random graphs. 1287-1301 - Michael Benedikt, Gabriele Puppis, Cristian Riveros:
Bounded repairability of word languages. 1302-1321 - Krishnaram Kenthapadi, Nina Mishra, Kobbi Nissim:
Denials leak information: Simulatable auditing. 1322-1340 - Miguel Caballer, Carlos de Alfonso, Fernando Alvarruiz, Germán Moltó:
EC3: Elastic Cloud Computing Cluster. 1341-1351
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.