IJCSIS Volumes by Kifayat Ullah Khan
Journal of Computer Science and Information Security (IJCSIS ISSN 1947-5500) is an open access, i... more Journal of Computer Science and Information Security (IJCSIS ISSN 1947-5500) is an open access, international, peer-reviewed, scholarly journal with a focused aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of Computing and Information Security. The journal is published monthly, and articles are accepted for review on a continual basis. Papers that can provide both theoretical analysis, along with carefully designed computational experiments, are particularly welcome.
IJCSIS editorial board consists of several internationally recognized experts and guest editors. Wide circulation is assured because libraries and individuals, worldwide, subscribe and reference to IJCSIS. The Journal has grown rapidly to its currently level of over 1,100 articles published and indexed; with distribution to librarians, universities, research centers, researchers in computing, and computer scientists.
Other field coverage includes: security infrastructures, network security: Internet security, content protection, cryptography, steganography and formal methods in information security; multimedia systems, software, information systems, intelligent systems, web services, data mining, wireless communication, networking and technologies, innovation technology and management.
https://sites.google.com/site/ijcsis/
Bookmarks Related papers MentionsView impact
Papers by Kifayat Ullah Khan
Computing, 2015
ABSTRACT
Bookmarks Related papers MentionsView impact
The shortest path traversal queries require to scan the entire graph. The repetitive scans make i... more The shortest path traversal queries require to scan the entire graph. The repetitive scans make it hard to answer the traversal queries in a reasonable time. Many traversal algorithms imply precomputed information to speed up the run-time query process. However, computing effective auxiliary data at pre-processing stage is still an active problem. It is useful but non-trivial to determine the occurrence of vertices or edges during shortest path computations. In this paper, we empirically analyze the continuous overlapped regions (COREs) to articulate the behavior of shortest path traversals on different real life social graphs. First, we compute the shortest paths between a set of vertices. Each shortest path is considered as one transaction. Second, we utilize the pattern mining approach to identify the frequency of occurrence of the vertices appear together. Further, we evaluate the results in terms of network properties, i.e. degree distribution, average shortest path, and cluste...
Bookmarks Related papers MentionsView impact
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication - IMCOM '15, 2015
Bookmarks Related papers MentionsView impact
2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014
Bookmarks Related papers MentionsView impact
2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014
Bookmarks Related papers MentionsView impact
International Journal of Multimedia and Ubiquitous Engineering, 2014
Bookmarks Related papers MentionsView impact
Applied Intelligence, 2015
Bookmarks Related papers MentionsView impact
Distributed and Parallel Databases, 2015
Bookmarks Related papers MentionsView impact
Uploads
IJCSIS Volumes by Kifayat Ullah Khan
IJCSIS editorial board consists of several internationally recognized experts and guest editors. Wide circulation is assured because libraries and individuals, worldwide, subscribe and reference to IJCSIS. The Journal has grown rapidly to its currently level of over 1,100 articles published and indexed; with distribution to librarians, universities, research centers, researchers in computing, and computer scientists.
Other field coverage includes: security infrastructures, network security: Internet security, content protection, cryptography, steganography and formal methods in information security; multimedia systems, software, information systems, intelligent systems, web services, data mining, wireless communication, networking and technologies, innovation technology and management.
https://sites.google.com/site/ijcsis/
Papers by Kifayat Ullah Khan
IJCSIS editorial board consists of several internationally recognized experts and guest editors. Wide circulation is assured because libraries and individuals, worldwide, subscribe and reference to IJCSIS. The Journal has grown rapidly to its currently level of over 1,100 articles published and indexed; with distribution to librarians, universities, research centers, researchers in computing, and computer scientists.
Other field coverage includes: security infrastructures, network security: Internet security, content protection, cryptography, steganography and formal methods in information security; multimedia systems, software, information systems, intelligent systems, web services, data mining, wireless communication, networking and technologies, innovation technology and management.
https://sites.google.com/site/ijcsis/