


default search action
The Computer Journal, Volume 58
Volume 58, Number 1, January 2015
Original Articles
- Nikolay Grozev, Rajkumar Buyya:
Performance Modelling and Simulation of Three-Tier Applications in Cloud and Multi-Cloud Environments. 1-22 - Marco Beccuti
, Chiara Fornari, Giuliana Franceschinis, Sami M. Halawani, Omar M. Ba-Rukab, Ab Rahman Ahmad, Gianfranco Balbo:
From Symmetric Nets to Differential Equations exploiting Model Symmetries. 23-39 - Shenlu Wang, Muhammad Aamir Cheema
, Xuemin Lin:
Efficiently Monitoring Reverse k-Nearest Neighbors in Spatial Networks. 40-56 - Gianfranco Balbo, Maria Grazia Vigliotti:
On the Analysis of a M/M/1 Queue with Bulk Services. 57-74 - Zhe Chen:
Control Systems on Automata and Grammars. 75-94 - James Pallister, Simon J. Hollis, Jeremy Bennett:
Identifying Compiler Options to Minimize Energy Consumption for Embedded Platforms. 95-109 - Yang Wang, Hua Li, Menglan Hu:
Reusing Garbage Data for Efficient Workflow Computation. 110-125 - James G. Dowty
:
SMML Estimators for 1-Dimensional Continuous Data. 126-133 - Michal Klempa, Michal Kozák, Mario Mikula, Robert Smetana, Jakub Stárka, Michal Svirec, Matej Vitásek, Martin Necaský
, Irena Holubová
:
jInfer: A Framework for XML Schema Inference. 134-156 - Albert Corominas, Alberto García-Villoria, Rafael Pastor
:
Technical Note: Relating to the Parameter Values Given by Nelder and Mead in their Algorithm. 157-159 - António Leslie Bajuelos, Santiago Canales, Gregorio Hernández-Peñalver
, Ana Mafalda Martins
, Inês Matos:
Some Results on Open-Edge and Open Mobile Guarding of Polygons and Triangulations. 160-171
Volume 58, Number 2, February 2015
Original Articles
- Omar Alsaleh, Bella Bose, Bechir Hamdaoui:
One-to-Many Node-Disjoint Paths Routing in Dense Gaussian Networks. 173-187 - Chung-Ming Huang, Yih-Chung Chen, Shih Yang Lin:
Packet Scheduling and Congestion Control Schemes for Multipath Datagram Congestion Control Protocol. 188-203 - Oguzhan Erdem, Aydin Carus, Hoang Le:
Value-Coded Trie Structure for High-Performance IPv6 Lookup. 204-214 - Paola Cappanera
, Alessandro Lori, Giovanni Stea
, Gigliola Vaglini:
On the Schedulability of Deadline-Constrained Traffic in TDMA Wireless Mesh Networks. 215-233 - Sami J. Habib, Paulvanna Nayaki Marimuthu, Naser Zaeri
:
Carbon-aware Enterprise Network through Redesign. 234-245 - Sen Su, Qingjia Huang, Jian Li, Xiang Cheng, Peng Xu, Kai Shuang:
Enhanced Energy-Efficient Scheduling for Parallel Tasks Using Partial Optimal Slacking. 246-257 - Shahbaz Akhtar Abid, Mazliza Othman
, Nadir Shah, Mazhar Ali, Atta ur Rehman Khan
:
3D-RP: A DHT-Based Routing Protocol for MANETs. 258-279 - Islam Elgedawy
:
CRESCENT: A Reliable Framework for Durable Composite Web Services Management. 280-299 - Mostafa Rezvani, Mohammad Kazem Akbari, Bahman Javadi:
Resource Allocation in Cloud Computing Environments Based on Integer Linear Programming. 300-314 - Chien-Fu Cheng
, Hsien-Chun Liao:
A Malicious-Resilient Protocol for Consistent Scheduling Problem in the Cloud Computing Environment. 315-330 - Mirka Miller, R. Sundara Rajan
, N. Parthiban
, Indra Rajasingh:
Minimum Linear Arrangement of Incomplete Hypercubes. 331-337 - Shih-Chang Huang, Hong-Yi Chang:
A Bidirectional Route Repair Method for Wireless Mobile Ad Hoc Networks. 338-353
Volume 58, Number 3, March 2015
Special Focus on Enabling Technologies and Infrastructures for Collaboration
- Slim Kallel
, Mohamed Jmaiel, Sumitra Reddy:
Enabling Technologies: Infrastructure for Collaborative Enterprises. 355 - Wassim Derguech, Sami Bhiri
, Souleiman Hasan
, Edward Curry
:
Using Formal Concept Analysis for Organizing and Discovering Sensor Capabilities. 356-367 - Zahra Movahedi, Walid Gaaloul
, Sami Bhiri
, Bruno Defude
:
Assisting Sensor-Based Application Design and Instantiation Using Activity Recommendation. 368-384 - Afef Jmal Maâlej, Moez Krichen:
Study on the Limitations of WS-BPEL Compositions Under Load Conditions. 385-402 - Ines Houidi, Wajdi Louati, Djamal Zeghlache
:
Exact Multi-Objective Virtual Network Embedding in Cloud Environments. 403-415 - Ryszard Janicki, Mohammad Hadi Soudkhah:
On Classification with Pairwise Comparisons, Support Vector Machines and Feature Domain Overlapping. 416-431
- María Arsuaga-Ríos, Miguel A. Vega-Rodríguez
:
Multiobjective Small-World Optimization for Energy Saving in Grid Environments. 432-447 - Ajay Kumar
, Anil Kumar Verma
:
An Improved Algorithm for the Metamorphosis of Semi-Extended Regular Expressions to Deterministic Finite Automata. 448-456 - Lei Du
, Qinbao Song, Lei Zhu
, Xiaoyan Zhu:
A Selective Detector Ensemble for Concept Drift Detection. 457-471 - Omar Khadeer Hussain
, Zia-ur Rahman, Farookh Khadeer Hussain, Jaipal Singh, Naeem Khalid Janjua
, Elizabeth Chang
:
A User-Based Early Warning Service Management Framework in Cloud Computing. 472-496 - Jianxin Li
, Chengfei Liu
, Rui Zhou
, Jeffrey Xu Yu:
Query-Driven Frequent Co-Occurring Term Computation over Relational Data Using MapReduce. 497-513
Volume 58, Number 4, April 2015
Special Focus on Security, Trust and Risk in Multimedia Social Networks
- Zhiyong Zhang
:
Security, Trust and Risk in Multimedia Social Networks. 515-517 - Constantinos Patsakis
, Athanasios Zigomitros
, Achilleas Papageorgiou, Agusti Solanas
:
Privacy and Security for Multimedia Content shared on OSNs: Issues and Countermeasures. 518-535 - Hui Zhu, Cheng Huang, Hui Li:
Information Diffusion Model Based on Privacy Setting in Online Social Networking Services. 536-548 - Hong Zhu
, Shengli Tian, Kevin Lü:
Privacy-Preserving Data Publication with Features of Independent ℓ-Diversity. 549-571 - WeiTao Song, Bin Hu:
Approach to Detecting Type-Flaw Attacks Based on Extended Strand Spaces. 572-587 - Bin Yang, Xingming Sun, Xianyi Chen, Jianjun Zhang, Xu Li:
Exposing Photographic Splicing by Detecting the Inconsistencies in Shadows. 588-600 - Ayesha Kanwal, Rahat Masood
, Muhammad Awais Shibli, Rafia Mumtaz
:
Taxonomy for Trust Models in Cloud Computing. 601-626 - Qingqi Pei, Dingyu Yan, Lichuan Ma, Zi Li, Yang Liao:
A Strong and Weak Ties Feedback-Based Trust Model in Multimedia Social Networks. 627-643 - Zhen Yang, Kaiming Gao, Kefeng Fan, Yingxu Lai:
Sensational Headline Identification By Normalized Cross Entropy-Based Metric. 644-655 - Hui Lin, Jia Hu, Jianfeng Ma, Li Xu, Li Yang:
CRM: A New Dynamic Cross-Layer Reputation Computation Model in Wireless Networks. 656-667 - Zhiyong Zhang
, Kanliang Wang:
A Formal Analytic Approach to Credible Potential Path and Mining Algorithms for Multimedia Social Networks. 668-678 - V. Natarajan, Shina Sheen, R. Anitha:
Multilevel Analysis to Detect Covert Social Botnet in Multimedia Social Networks. 679-687 - Guowei Wu, Zuosong Liu, Lin Yao, Jing Deng, Jie Wang:
A Trust Routing for Multimedia Social Networks. 688-699 - Danmei Niu, Lanlan Rui, Cheng Zhong, Xuesong Qiu:
A Composition and Recovery Strategy for Mobile Social Network Service in Disaster. 700-708
- Volkmar Lotz, Francesco Di Cerbo, Michele Bezzi, Samuel Paul Kaluvuri, Antonino Sabetta, Slim Trabelsi:
Security Certification for Service-Based Business Ecosystems. 709-723 - Qiang Tang
, Hua Ma, Xiaofeng Chen:
Extend the Concept of Public Key Encryption with Delegated Search. 724-734 - Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi, Yi Mu:
Functional Encryption Resilient to Hard-to-Invert Leakage. 735-749 - Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang:
Leakage-Free ID-Based Signature. 750-757 - M. Francisca Hinarejos
, Andreu Pere Isern-Deyà
, Josep Lluís Ferrer-Gomila
, Magdalena Payeras-Capellà
:
MC-2D: An Efficient and Scalable Multicoupon Scheme. 758-778 - Ying-Kai Tang, Sherman S. M. Chow
, Joseph K. Liu
:
Comments on 'Efficient Revocable Certificateless Encryption Secure in the Standard Model'. 779-781 - Lanfranco Lopriore:
Password Capabilities Revisited. 782-791 - Ke Gu
, Weijia Jia
, Chunlin Jiang:
Efficient Identity-Based Proxy Signature in the Standard Model. 792-807 - Debasish Das, Utpal Sharma, D. K. Bhattacharyya
:
Detection of Cross-Site Scripting Attack under Multiple Scenarios. 808-822 - Xinyu Fan, Guomin Yang
, Yi Mu, Yong Yu
:
On Indistinguishability in Remote Data Integrity Checking. 823-830 - Alptekin Küpçü
:
Official Arbitration with Secure Cloud Storage Application. 831-852 - Jiguo Li, Huiyun Teng, Xinyi Huang, Yichen Zhang, Jianying Zhou
:
A Forward-Secure Certificate-Based Signature Scheme. 853-866 - Yong Yu
, Man Ho Au
, Yi Mu, Willy Susilo
, Huai Wu:
Secure Delegation of Signing Power from Factorization. 867-877 - Hai Le Vu
, Kenneth K. Khaw, Tsong Yueh Chen
:
A New Approach for Network Vulnerability Analysis. 878-891 - Stavros N. Shiaeles
, Maria Papadaki
:
FHSD: An Improved IP Spoof Detection Method for Web DDoS Attacks. 892-903 - Huacui Liu, Chenhui Jin:
Lower Bounds of Differential and Linear Active S-boxes for 3D-like Structure. 904-921 - Yu-Chi Chen
:
SPEKS: Secure Server-Designation Public Key Encryption with Keyword Search against Keyword Guessing Attacks. 922-933 - Cheng-Chi Lee
, Yan-Ming Lai:
Toward A Secure Single Sign-On Mechanism for Distributed Computer Networks. 934-943 - Franco Frattolillo
:
Watermarking Protocols: Problems, Challenges and a Possible Solution. 944-960 - Abdulah Abdulah Zadeh, Howard M. Heys
:
Application of Simple Power Analysis to Stream Ciphers Constructed Using Feedback Shift Registers. 961-972 - Haider Salim Hmood, Zhitang Li, Hasan Khalaf Abdulwahid, Yang Zhang:
Adaptive Caching Approach to Prevent DNS Cache Poisoning Attack. 973-985 - Sha Ma, Mingwu Zhang, Qiong Huang, Bo Yang:
Public Key Encryption with Delegated Equality Test in a Multi-User Setting. 986-1002 - Qiang Tang
:
From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data. 1003-1020 - Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo
:
An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants. 1021-1039
Volume 58, Number 5, May 2015
Original Articles
- Gabriel Ciobanu
, Maciej Koutny:
PerTiMo: A Model of Spatial Migration with Safe Access Permissions. 1041-1060 - Jie Lin, Yue Jiang, Don Adjeroh:
Circular Pattern Discovery. 1061-1073 - Jia Jie Liu, Yue-Li Wang, Yu-shan Chiu:
Constrained Longest Common Subsequences with Run-Length-Encoded Strings. 1074-1084 - Emilio Di Giacomo, Walter Didimo, Luca Grilli
, Giuseppe Liotta
, Salvatore Agostino Romeo:
Heuristics for the Maximum 2-Layer RAC Subgraph Problem. 1085-1098 - Ahmad Sabri
, Vincent Vajnovszki:
Two Reflected Gray Code-Based Orders on Some Restricted Growth Sequences. 1099-1111 - Chia Shin Ou, Chin Lung Lu, Richard C. T. Lee:
A Systematical and Parallel Approach to Solve Problems Involving Special Properties of Bit-Vectors. 1112-1121 - Amy Affleck, Aneesh Krishna, Narasimaha Achuthan:
Non-Functional Requirements Framework: A Mathematical Programming Approach. 1122-1139 - Florentin Ipate, Alin Stefanescu
, Ionut Dinca:
Model Learning and Test Generation Using Cover Automata. 1140-1159 - Antonio Badia, Daniel Lemire:
Functional Dependencies with null Markers. 1160-1168 - Petr Procházka, Jan Holub
:
Compression of a Set of Files with Natural Language Content. 1169-1185 - Joel Fuentes
, Pablo Sáez, Gilberto Gutiérrez
, Isaac D. Scherson:
A Method to Find Functional Dependencies Through Refutations and Duality of Hypergraphs. 1186-1198 - Chang-Ai Sun, Yimeng Zai, Huai Liu
:
Evaluating and Comparing Fault-Based Testing Strategies for General Boolean Specifications: A Series of Experiments. 1199-1213 - Behrooz Parhami:
Digital Arithmetic in Nature: Continuous-Digit RNS. 1214-1223
Volume 58, Number 6, June 2015
Special Focus on Green Energy Management and Smart Grid
- Zhangbing Zhou, Huansheng Ning
, Meikang Qiu, Habib F. Rashvand:
Editorial: Green Energy Management and Smart Grid. 1225-1226 - Jianxin Li, Jieyu Zhao, Yi Li, Lei Cui, Bo Li, Lu Liu
, John Panneerselvam
:
iMIG: Toward an Adaptive Live Migration Method for KVM Virtual Machines. 1227-1242 - Kehua Guo, Biao Tian, Jianhua Ma:
AMPS: An Adaptive Message Push Strategy for the Energy Efficiency Optimization in Mobile Terminals. 1243-1253 - Liyun Zuo, Shoubin Dong
, Chunsheng Zhu, Lei Shu
, Guangjie Han:
A Cloud Resource Evaluation Model Based on Entropy Optimization and Ant Colony Clustering. 1254-1266 - Jianhui Zhang, Zhi Li, Feng Xia
, Shaojie Tang, Xingfa Shen, Bei Zhao:
Cooperative Scheduling for Adaptive Duty Cycling in Asynchronous Sensor Networks. 1267-1279 - Guangjie Han, Xun Li, Jinfang Jiang, Lei Shu
, Jaime Lloret:
Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks. 1280-1292 - Zhiyong Feng, Bo Lan, Zhen Zhang, Shizhan Chen:
A Study of Semantic Web Services Network. 1293-1305 - Xiang Wang, Ying Lu, Yi Zhang, Zexi Zhao, Tongsheng Xia, Limin Xiao:
Power Optimization in Logic Synthesis for Mixed Polarity Reed-Muller Logic Circuits. 1306-1313 - Domen Zupancic, Mitja Lustrek, Matjaz Gams:
Multi-Agent Architecture for Control of Heating and Cooling in a Residential Space. 1314-1329 - Linghe Kong, Xiao-Yang Liu, Meixia Tao, Min-You Wu, Yu Gu, Long Cheng, Jianwei Niu:
Resource-Efficient Data Gathering in Sensor Networks for Environment Reconstruction. 1330-1343 - Jin Liu, Juan Li, Xiaoguang Niu, Xiaohui Cui, Yunchuan Sun:
GreenOCR: An Energy-Efficient Optimal Clustering Routing Protocol. 1344-1359 - Yongzhao Zhan, Shan Dai, Qirong Mao, Lu Liu
, Wei Sheng:
A Video Semantic Analysis Method Based on Kernel Discriminative Sparse Representation and Weighted KNN. 1360-1372 - He Li
, Mianxiong Dong, Xiaofei Liao, Hai Jin:
Deduplication-Based Energy Efficient Storage System in Cloud Environment. 1373-1383 - Hamed Javidi
, Maziar Goudarzi
:
TABEMS: Tariff-Aware Building Energy Management System for Sustainability through Better Use of Electricity. 1384-1398
- Xiaolan Tang
, Juhua Pu, Yang Gao, Yu Xie, Zhang Xiong:
GPS-Based Replica Deletion Scheme with Anti-Packet Distribution for Vehicular Networks. 1399-1415 - Antonio Frangioni
, Laura Galli, Giovanni Stea
:
Optimal Joint Path Computation and Rate Allocation for Real-time Traffic. 1416-1430 - Andrew Larkin, David E. Williams, Molly L. Kile, William M. Baird:
Developing a Smartphone Software Package for Predicting Atmospheric Pollutant Concentrations at Mobile Locations. 1431-1442 - Nizam Ayyildiz, Ece Güran Schmidt
, Hasan Cengiz Güran:
S-DIRECT: Scalable and Dynamically Reconfigurable TCAM Architecture for High-Speed IP Lookup. 1443-1455 - Pavel Rajmic
, Jiri Hosek
, Michal Fusek
, Sergey D. Andreev
, Július Stecík:
Simplified Probabilistic Modelling and Analysis of Enhanced Distributed Coordination Access in IEEE 802.11. 1456-1468 - Sangyeon Kim, Dong-Wan Choi, Chin-Wan Chung:
Finding a Friendly Community in Social Networks Considering Bad Relationships. 1469-1481 - Hamid Saadatfar, Hossein Deldari, Mahmoud Naghibzadeh
:
Improving the Scheduler's Energy Saving Capability by Noting both Job and Resource Characteristics. 1482-1493
Volume 58, Number 7, July 2015
Original Articles
- Viliam Simko, David Hauzar, Petr Hnetynka
, Tomás Bures
, Frantisek Plásil
:
Formal Verification of Annotated Textual Use-Cases. 1495-1529 - Achal Kaushik
, Deo Prakash Vidyarthi:
A Green Energy Model for Resource Allocation in Computational Grid. 1530-1547 - HamidReza Ahmadifar
, Ghassem Jaberipur:
A New Residue Number System with 5-Moduli Set: {22q, 2q±3, 2q±1}. 1548-1565 - Edem Kwedzo Bankas, Kazeem Alagbe Gbolagade
:
New MRC Adder-Based Reverse Converter for the Moduli Set {2n, 22n+1 - 1, 22n+2 - 1}. 1566-1572 - Qian Mao, K. Bharanitharan, Chin-Chen Chang:
A Proxy User Authentication Protocol Using Source-Based Image Morphing. 1573-1584 - Yiwen Zhang, Rui-feng Guo:
Low-Power Scheduling Algorithms for Sporadic Task with Shared Resources in Hard Real-Time Systems. 1585-1597 - Chao-Liang Liu, Wang-Jui Tsai, Ting-Yi Chang, Chun-Cheng Peng, Peng-Shiang Wong:
Meaningful Share Generation for (2, 2)-Multiple Visual Secret Sharing Scheme Without Pixel Expansion. 1598-1606 - Abdelli Abdelkrim
:
Improving the State Space Computation of the Time Stream Petri Nets Model. 1607-1627 - Yang Wang, Wei Shi
:
Dataflow-Based Scheduling for Scientific Workflows in HPC with Storage Constraints. 1628-1644 - Murat Yesilyurt, Yildiray Yalman, Ahmet Turan Özcerit
:
A Robust Watermarking Method for Mpeg-4 Based on Kurtosis. 1645-1655 - Alexandre Petrenko
, Adenilso Simão
:
Generalizing the DS-Methods for Testing Non-Deterministic FSMs. 1656-1672 - Niko Beerenwinkel, Stefano Beretta
, Paola Bonizzoni
, Riccardo Dondi, Yuri Pirola
:
Covering Pairs in Directed Acyclic Graphs. 1673-1686
Volume 58, Number 8, August 2015
Special Focus on Ambient and Context-Aware Services for the Future Web
- Quan Z. Sheng
, Elhadi M. Shakshuki
, Jian Yu:
Ambient and Context-Aware Services for the Future Web. 1687-1688 - Khalid Elgazzar, Sharief M. A. Oteafy
, Walid M. Ibrahim, Hossam S. Hassanein:
A Resilient P2P Architecture for Mobile Resource Sharing. 1689-1700 - Zahoor Ali Khan
, Shyamala C. Sivakumar, William J. Phillips, Bill Robertson:
QPRR: QoS-Aware Peering Routing Protocol for Reliability Sensitive Data in Body Area Network Communication. 1701-1716 - Alireza Nafarieh, Shyamala C. Sivakumar, William Robertson, William J. Phillips:
SLA-Based Time-Aware Provisioning Mechanisms in Shared Mesh Protected Optical Networks. 1717-1731 - Heiko Desruelle, Frank Gielen:
Context-Driven Progressive Enhancement of Mobile Web Applications: A Multicriteria Decision-Making Approach. 1732-1746
- Yanling Hu, Anfeng Liu:
An Efficient Heuristic Subtraction Deployment Strategy to Guarantee Quality of Event Detection for WSNs. 1747-1762 - David Díez Hernández, Jaime García-Reinoso
, Iván Vidal
:
SFP: Statistical Filtering Policy for Caching in Content-Centric Networking. 1763-1775 - Xing Su, Minjie Zhang
, Quan Bai
:
Dynamic Task Allocation for Heterogeneous Agents in Disaster Environments Under Time, Space and Communication Constraints. 1776-1791 - Xiuchao Wu, Kenneth N. Brown, Cormac J. Sreenan:
Contact Probing Mechanisms for Opportunistic Sensor Data Collection. 1792-1810 - Ping Xie, Jianzhong Huang, Qiang Cao, Xiao Qin, Changsheng Xie:
A New Non-MDS RAID-6 Code to Support Fast Reconstruction and Balanced I/Os. 1811-1825 - Guangjun Qin, Mingfa Zhu, Limin Xiao, Li Ruan:
Lessen Interflow Interference Using Virtual Channels Partitioning. 1826-1841 - Jaime García-Reinoso
, Iván Vidal
, David Díez, Daniel Corujo
, Rui L. Aguiar
:
Analysis and Enhancements to Probabilistic Caching in Content-Centric Networking. 1842-1856
- Ahmed Kheiri
, Ender Özcan
:
Corrigendum: Constructing Constrained-Version of Magic Squares Using Selection Hyper-heuristics. 1857
Volume 58, Number 9, September 2015
Special Focus on Mining Social Media for Knowledge Discovery
- Neil Y. Yen, Uyen Trang Nguyen, Jong Hyuk Park:
Mining Social Media for Knowledge Discovery. 1859-1860 - Thomas Steiner
, Ruben Verborgh
, Joaquim Gabarró, Erik Mannens
, Rik Van de Walle:
Clustering Media Items Stemming from Multiple Social Networks. 1861-1875 - Weiwei Yuan, Donghai Guan, Sungyoung Lee, Jin Wang:
Skeleton Searching Strategy for Recommender Searching Mechanism of Trust-Aware Recommender Systems. 1876-1883 - Yongkoo Han, Kisung Park, Donghai Guan, Sajal Halder
, Young-Koo Lee:
Topological Similarity-Based Feature Selection for Graph Classification. 1884-1893 - Lihua Zhou, Kevin Lü
:
Detecting Communities with Different Sizes for Social Network Analysis. 1894-1908 - Wu He, Gongjun Yan:
Mining Blogs And Forums To Understand the Use of Social Media in Customer Co-creation. 1909-1920 - Chen Yang, Jian Ma
, Thushari P. Silva
, Xiaoyan Liu
, Zhongsheng Hua
:
A Multilevel Information Mining Approach for Expert Recommendation in Online Scientific Communities. 1921-1936 - Lida Ghahremanloo, Wanita Sherchan, James A. Thom
:
Geotagging Twitter Messages in Crisis Management. 1937-1954 - Seyed Mohammadhadi Daneshmand, Amin Javari, Seyed Ebrahim Abtahi, Mahdi Jalili
:
A Time-Aware Recommender System Based on Dependency Network of Items. 1955-1966
- Naeem Khalid Janjua
, Omar Khadeer Hussain
, Farookh Khadeer Hussain, Elizabeth Chang
:
Philosophical and Logic-Based Argumentation-Driven Reasoning Approaches and their Realization on the WWW: A Survey. 1967-1999 - Roberto Rodríguez-Rodríguez
, Fernando Castro
, Daniel Chaver
, Rekai González-Alberquilla, Luis Piñuel, Francisco Tirado
:
Write-Aware Replacement Policies for PCM-Based Systems. 2000-2025 - Muhammad Ashad Kabir
, Jun Han, Jian Yu, Alan W. Colman
:
Inferring User Situations from Interaction Events in Social Media. 2026-2043 - Hiren K. Mewada
, Rahul Patel, Suprava Patnaik
:
A Novel Structure Tensor Modulated Chan-Vese Model for Texture Image Segmentation. 2044-2060 - Yi Liu, Xiongzi Ge, Xiaoxia Huang, David H. C. Du:
MOLAR: A Cost-Efficient, High-Performance SSD-Based Hybrid Storage Cache. 2061-2078 - Sadegh Aliakbary, Jafar Habibi, Ali Movaghar
:
Feature Extraction from Degree Distribution for Comparison and Analysis of Complex Networks. 2079-2091 - Mehmet Ali Abbasoglu, Bugra Gedik, Hakan Ferhatosmanoglu:
Aggregate Profile Clustering for Streaming Analytics. 2092-2108 - Yanmin Zhu, Yin Wang, George Forman, Hong Wei:
Mining Large-Scale GPS Streams for Connectivity Refinement of Road Maps. 2109-2119 - Lin Wu
, Xiaodi Huang
, John Shepherd
, Yang Wang:
Multi-Query Augmentation-Based Web Landmark Photo Retrieval. 2120-2134 - Minaz J. Parmar, Marios C. Angelides:
MAC-REALM: A Video Content Feature Extraction and Modelling Framework. 2135-2171 - Álvaro Rubio-Largo
, Miguel A. Vega-Rodríguez
, David L. González-Álvarez:
A Parallel Multiobjective Approach based on Honey Bees for Traffic Grooming in Optical Networks. 2171-2191
Volume 58, Number 10, October 2015
Special Focus on Secure Information Systems Engineering
- David Garcia Rosado
, Nadira Lammari, Jan Jürjens:
Special Issue on Secure Information Systems Engineering. 2193-2194 - Maryam Sepehri, Stelvio Cimato
, Ernesto Damiani
:
Privacy-Preserving Query Processing by Multi-Party Computation. 2195-2212 - Evangelia Kavakli, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis
:
Privacy as an Integral Part of the Implementation of Cloud Solutions. 2213-2224 - D. Marudhadevi, V. Neelaya Dhatchayani, V. S. Shankar Sriram
:
A Trust Evaluation Model for Cloud Computing Using Service Level Agreement. 2225-2232 - Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina
:
ISGcloud: a Security Governance Framework for Cloud Computing. 2233-2254 - Thomas Quirchmayr, Mark Strembeck:
A Discussion of Communication Schemes for Process Execution Histories to Enforce Entailment Constraints in Process-Driven SOAs. 2255-2279 - Katarzyna Mazur
, Bogdan Ksiezopolski
, Zbigniew Kotulski
:
The Robust Measurement Method for Security Metrics Generation. 2280-2296 - Takeshi Takahashi
, Youki Kadobayashi:
Reference Ontology for Cybersecurity Operational Information. 2297-2312 - Ricardo J. Rodríguez
, José Merseguer
, Simona Bernardi
:
Modelling Security of Critical Infrastructures: A Survivability Assessment. 2313-2327 - José Fran. Ruiz, Antonio Maña, Carsten Rudolph
:
An Integrated Security and Systems Engineering Process and Modelling Framework. 2328-2350 - Carlos Blanco
, Eduardo Fernández-Medina
, Juan Trujillo
:
Modernizing Secure OLAP Applications with a Model-Driven Approach. 2351-2367
- Kazim Yumbul, Erkay Savas:
Enhancing an Embedded Processor Core for Efficient and Isolated Execution of Cryptographic Algorithms . 2368-2387 - Udaya Kiran Tupakula
, Vijay Varadharajan
:
Trust Enhanced Security for Tenant Transactions in the Cloud Environment. 2388-2403 - Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Harry Bartlett
:
CHURNs: Freshness Assurance for Humans. 2404-2425 - Chunfeng Lian
, Liaojun Pang
, Jimin Liang
:
Generalized Random Grid-Based Visual Secret Sharing for General Access Structures. 2426-2442 - Xing Wang, Nga Lam Or, Ziyan Lu, Derek Chi-Wai Pao:
Hardware Accelerator to Detect Multi-Segment Virus Patterns. 2443-2460 - Chanying Huang, Hwaseong Lee, Hyoseung Kim, Dong Hoon Lee:
mvSERS: A Secure Emergency Response Solution for Mobile Healthcare in Vehicular Environments. 2461-2475 - Grazielle Vernize, André Luiz Pires Guedes
, Luiz Carlos Pessoa Albini:
Malicious Nodes Identification for Complex Network Based on Local Views. 2476-2491 - Jianghong Wei
, Wenfen Liu, Xuexian Hu:
Forward-Secure Threshold Attribute-Based Signature Scheme. 2492-2506 - Debiao He
, Mingwu Zhang, Baowen Xu
:
Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model. 2507-2508 - Chang Xu
, Liehuang Zhu, Zhoujun Li, Feng Wang:
One-Round Affiliation-Hiding Authenticated Asymmetric Group Key Agreement with Semi-trusted Group Authority. 2509-2519 - Shifeng Sun, Dawu Gu, Zhengan Huang:
Fully Secure Wicked Identity-Based Encryption Against Key Leakage Attacks. 2520-2536 - Zoran Djuric, Dragan Gasevic
:
FEIPS: A Secure Fair-Exchange Payment System for Internet Transactions. 2537-2556 - Lanfranco Lopriore:
Password Management: Distribution, Review and Revocation. 2557-2566 - Amir Jalaly Bidgoly
, Behrouz Tork Ladani
:
Modelling and Quantitative Verification of Reputation Systems Against Malicious Attackers. 2567-2582 - Wien Hong, Gwoboa Horng, Chih-Wei Shiu
, Tung-Shou Chen, Yu-Chi Chen
:
Reversible Steganographic Method Using Complexity Control and Human Visual System. 2583-2594 - Dong Lai Fu, Xinguang Peng, Yuli Yang:
Trusted Validation for Geolocation of Cloud Data. 2595-2607 - Shahid Alam
, Issa Traoré, Ibrahim Sogukpinar
:
Annotated Control Flow Graph for Metamorphic Malware Detection. 2608-2621 - Md. Saiful Islam
, Naif Alajlan
:
Model-based Alignment of Heartbeat Morphology for Enhancing Human Recognition Capability. 2622-2635 - SK Hafizul Islam
, Fagen Li
:
Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings. 2636-2648 - Pericle Perazzo
, Pavel Skvortsov, Gianluca Dini:
On Designing Resilient Location-Privacy Obfuscators. 2649-2664 - Yang Wang, Willy Susilo
, Man Ho Au
:
Revisiting Security Against the Arbitrator in Optimistic Fair Exchange. 2665-2676 - Lin Ding
, Chenhui Jin, Jie Guan, Shaowu Zhang, Ting Cui, Dong Han, Wei Zhao:
Cryptanalysis of WG Family of Stream Ciphers. 2677-2685 - Kaibin Huang, Raylin Tso
, Yu-Chi Chen
, Sk. Md. Mizanur Rahman
, Ahmad Almogren
, Atif Alamri:
PKE-AET: Public Key Encryption with Authorized Equality Test. 2686-2697 - Nuttapong Attrapadung
, Keita Emura
, Goichiro Hanaoka
, Yusuke Sakai
:
Revocable Group Signature with Constant-Size Revocation List. 2698-2715 - Erkay Savas, Cemal Yilmaz:
A Generic Method for the Analysis of a Class of Cache Attacks: A Case Study for AES. 2716-2737 - Mayana Pereira, Rafael Dowsley, Anderson C. A. Nascimento
, Goichiro Hanaoka
:
Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions. 2738-2746 - Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen:
Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited. 2747-2757 - André Ricardo Abed Grégio
, Vitor Monte Afonso, Dario Simões Fernandes Filho, Paulo Lício de Geus
, Mário Jino:
Toward a Taxonomy of Malware Behaviors. 2758-2777 - Kaitai Liang
, Willy Susilo
, Joseph K. Liu
, Duncan S. Wong:
Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption. 2778-2792
Volume 58, Number 11, November 2015
Original Articles
- Nina Yevtushenko, Khaled El-Fakih, Tiziano Villa, Jie-Hong R. Jiang:
Deriving Compositionally Deadlock-Free Components over Synchronous Automata Compositions. 2793-2803 - Ahmet Kara
, Halit Oguztüzün, Mahmut Nedim Alpdemir
:
A Methodology for Resolution Mapping for Cross-Resolution Simulation using Event-B. 2804-2823 - Weiqiang Kong, Leyuan Liu
, Takahiro Ando, Hirokazu Yatsu, Kenji Hisazumi
, Akira Fukuda:
Facilitating Multicore Bounded Model Checking with Stateless Explicit-State Exploration. 2824-2840 - Xiaowang Zhang
, Jan Van den Bussche
:
On the Power of SPARQL in Expressing Navigational Queries. 2841-2851 - Sung-In Jang, Su-Kyung Yoon, Kihyun Park, Gi-Ho Park, Shin-Dug Kim:
Data Classification Management with its Interfacing Structure for Hybrid SLC/MLC PRAM Main Memory. 2852-2863 - Shaowei Cai
, Chuan Luo, Kaile Su
:
Improving WalkSAT By Effective Tie-Breaking and Efficient Implementation. 2864-2875 - Pablo Muñoz
, David F. Barrero
, María D. R.-Moreno
:
A Statistically Rigorous Analysis of 2D Path-Planning Algorithms. 2876-2891 - Gauthier van den Hove:
On the Origin of Recursive Procedures. 2892-2899 - Paolo Arcaini
, Angelo Gargantini, Elvinia Riccobene
:
How to Optimize the Use of SAT and SMT Solvers for Test Generation of Boolean Expressions. 2900-2920 - Frank Gurski
:
Linear Programming Formulations for Computing Graph Layout Parameters. 2921-2927 - Shiyu Yang, Muhammad Aamir Cheema, Xuemin Lin:
Impact Set: Computing Influence Using Query Logs. 2928-2943 - Xi Wang, Alejandro Erickson, Jianxi Fan, Xiaohua Jia
:
Hamiltonian Properties of DCell Networks. 2944-2955 - Giorgos Stoilos, Tassos Venetis, Giorgos Stamou:
A Fuzzy Extension to the OWL 2 RL Ontology Language. 2956-2971 - Jinn-Shyong Yang, Sih-Syuan Luo, Jou-Ming Chang
:
Pruning Longer Branches of Independent Spanning Trees on Folded Hyper-Stars. 2972-2981 - Thomas Roelleke, Andreas Kaltenbrunner
, Ricardo Baeza-Yates
:
Harmony Assumptions in Information Retrieval and Social Networks. 2982-2999 - A. S. M. Kayes
, Jun Han, Alan Colman
:
OntCAAC: An Ontology-Based Approach to Context-Aware Access Control for Software Services. 3000-3034 - Hao Zheng, Xiaoshe Dong
, Zhengdong Zhu, Baoke Chen, Yizhi Zhang, Xingjun Zhang:
Research on Algorithms to Capture Drivers' Write Operations. 3035-3056 - Jorge F. Fabeiro
, Diego Andrade, Basilio B. Fraguela
, Ramón Doallo:
Automatic Generation of Optimized OpenCL Codes Using OCLoptimizer. 3057-3073 - Shenwei Huang, Matthew Johnson
, Daniël Paulusma
:
Narrowing the Complexity Gap for Colouring (Cs, Pt)-Free Graphs. 3074-3088 - Robert M. Hierons
, Uraz Cengiz Türker:
Incomplete Distinguishing Sequences for Finite State Machines. 3089-3113 - Yinglei Song, Chunmei Liu, Yongzhong Li:
A New Parameterized Algorithm for Predicting the Secondary Structure of RNA Sequences Including Pseudoknots. 3114-3125 - Emilio Di Giacomo, Walter Didimo, Giuseppe Liotta, Henk Meijer, Stephen K. Wismath:
Planar and Quasi-Planar Simultaneous Geometric Embedding. 3126-3140 - Outi Sievi-Korte
, Kai Koskimies, Erkki Mäkinen
:
Techniques for Genetic Software Architecture Design. 3141-3170 - László Lengyel, Tamás Mészáros, Márk Asztalos, Péter Boros, Attila Máté, Gábor Madács, Péter Hudák, Kristóf Kovács, András Tresch, Hassan Charaf:
Quality Assured Model-Driven Requirements Engineering and Software Development. 3171-3186 - Kun Ma
, Fusen Dong, Bo Yang:
Large-Scale Schema-Free Data Deduplication Approach with Adaptive Sliding Window Using MapReduce. 3187-3201 - Amir Vahid Dastjerdi, Rajkumar Buyya:
An Autonomous Time-Dependent SLA Negotiation Strategy for Cloud Computing. 3202-3216
Volume 58, Number 12, December 2015
Original Articles
- Sérgio Esteves, Paulo Ferreira
, Luís Veiga
:
C3 P: A Re-Configurable Framework to Design Cycle-sharing Computing Cloud Platforms. 3217-3241 - Yuhao Yi, Zhongzhi Zhang
, Yuan Lin, Guanrong Chen:
Small-World Topology Can Significantly Improve the Performance of Noisy Consensus in a Complex Network. 3242-3254 - Huajun He, Yang Zhao, Jinfu Wu, Ye Tian
:
Cost-Aware Capacity Provisioning for Internet Video Streaming CDNs. 3255-3270 - R. Sundara Rajan
, Paul D. Manuel
, Indra Rajasingh, N. Parthiban
, Mirka Miller:
A Lower Bound for Dilation of an Embedding. 3271-3278 - Yonggang Che, Chuanfu Xu, Jianbin Fang
, Yongxian Wang
, Zhenghua Wang:
Realistic Performance Characterization of CFD Applications on Intel Many Integrated Core Architecture. 3279-3294 - Wei Zhou, Tao Jing, Yan Huo, Jin Qian, Zhen Li:
Double Auction for Joint Channel and Power Allocation in Cognitive Radio Networks. 3295-3305 - Chun-Chieh Huang, Ren-Song Ko:
A Study on Maximizing the Parallelism of Macroscopically Derived Routing Algorithms for WSNs. 3306-3324

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.