


default search action
Journal of Computer and System Sciences, Volume 80
Volume 80, Number 1, February 2014
- Sebastián Ventura
, Cristóbal Romero
, Ajith Abraham:
Foreword: Intelligent data analysis. 1-2
- Manuel Baena-García, José M. Carmona-Cejudo, Rafael Morales Bueno:
String analysis by sliding positioning strategy. 3-15 - Prakash Shelokar
, Arnaud Quirin
, Oscar Cordón
:
Three-objective subgraph mining using multiobjective evolutionary programming. 16-26 - Abir Smiti, Zied Elouedi:
WCOID-DG: An approach for case base maintenance based on Weighting, Clustering, Outliers, Internal Detection and Dbsan-Gmeans. 27-38 - Ricardo Cerri
, Rodrigo C. Barros
, André Carlos Ponce de Leon Ferreira de Carvalho
:
Hierarchical multi-label classification using local neural networks. 39-56 - Alvaro Ortigosa, Rosa M. Carro
, José Ignacio Quiroga:
Predicting user personality by mining social interactions in Facebook. 57-71 - Pasquale De Meo, Emilio Ferrara
, Giacomo Fiumara, Alessandro Provetti:
Mixing local and global information for community detection in large networks. 72-87 - José Otero
, Luciano Sánchez
, Inés Couso
, Ana M. Palacios:
Bootstrap analysis of multiple repetitions of experiments using an interval-valued multiple comparison procedure. 88-100 - David García, Antonio González Muñoz
, Raúl Pérez
:
A feature construction approach for genetic iterative rule learning algorithm. 101-117 - María Martínez-Ballesteros
, Isabel A. Nepomuceno-Chamorro
, José C. Riquelme:
Discovering gene association networks by multi-objective evolutionary quantitative association rules. 118-136
- Tomás Brázdil, Václav Brozek, Vojtech Forejt, Antonín Kucera
:
Branching-time model-checking of probabilistic pushdown automata. 139-156 - Fedor V. Fomin
, Petr A. Golovach
:
Parameterized complexity of connected even/odd subgraph problems. 157-179 - Robert Ganian
, Petr Hlinený
, Alexander Langer, Jan Obdrzálek, Peter Rossmanith, Somnath Sikdar:
Lower bounds on the complexity of MSO1 model-checking. 180-194 - Kaiping Xue, Peilin Hong, Changsha Ma:
A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. 195-206 - Archontia C. Giannopoulou, Iosif Salem
, Dimitris Zoros:
Effective computation of immersion obstructions for unions of graph classes. 207-216 - Jin-Yi Cai, Pinyan Lu
, Mingji Xia:
The complexity of complex weighted Boolean #CSP. 217-236 - Shuping Wan
, Jiuying Dong:
A possibility degree method for interval-valued intuitionistic fuzzy multi-attribute group decision making. 237-256 - Paolo Romano
, Roberto Palmieri
, Francesco Quaglia, Nuno Carvalho, Luís E. T. Rodrigues:
On speculative replication of transactional systems. 257-276 - Arnaud Durand, Stefan Mengel:
The complexity of weighted counting for acyclic conjunctive queries. 277-296 - Mika Göös, Tuomo Lempiäinen
, Eugen Czeizler
, Pekka Orponen
:
Search methods for tile sets in patterned DNA self-assembly. 297-319
Volume 80, Number 2, March 2014
- Anuj Dawar
, Ruy J. G. B. de Queiroz:
Editor's foreword: WoLLIC 2010. 321-322 - Naeem Abbasi, Osman Hasan
, Sofiène Tahar:
An approach for lifetime reliability analysis using theorem proving. 323-345 - Aditi Barthwal, Michael Norrish
:
A mechanisation of some context-free language theory in HOL4. 346-362 - Tomer Kotek, Johann A. Makowsky:
A representation theorem for (q-)holonomic sequences. 363-374 - Markus Latte, Martin Lange:
Branching-time logics with path relativisation. 375-389 - Glyn Morrill, Oriol Valentín
:
Displacement logic for anaphora. 390-409 - Renata Hax Sander Reiser
, Benjamín R. C. Bedregal, G. A. A. dos Reis:
Interval-valued fuzzy coimplications and related dual interval-valued conjugate functions. 410-425
- Nadia Creignou, Odile Papini, Reinhard Pichler, Stefan Woltran:
Belief revision within fragments of propositional logic. 427-449 - Aryeh Kontorovich, Ari Trachtenberg:
Deciding unique decodability of bigram counts via finite automata. 450-456 - Adrian Ionescu, Ernst L. Leiss:
On the role of complementation in implicit language equations and relations. 457-467 - Fedor V. Fomin
, Bart M. P. Jansen, Michal Pilipczuk
:
Preprocessing subgraph and minor problems: When does a small vertex cover help? 468-495
- William Hesse, Eric Allender
, David A. Mix Barrington:
Corrigendum to "Uniform constant-depth threshold circuits for division and iterated multiplication" [J. Comput. System Sci. 65(4) (2002) 695-716]. 496-497
Volume 80, Number 3, May 2014
- Al-Sakib Khan Pathan
, Zubair Md. Fadlullah
, Mostafa Fouda
, Hae Young Lee
:
Defending against wireless network intrusion. 499-501
- Alif Wahid, Christopher Leckie
, Chenfeng Vincent Zhou:
Estimating the number of hosts corresponding to an intrusion alert while preserving privacy. 502-519 - Yifan Zhao, Swee-Won Lo, Robert H. Deng
, Xuhua Ding
:
Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks. 520-532 - Yang Yang:
Broadcast encryption based non-interactive key distribution in MANETs. 533-545 - Zhiwei Wang, Guozi Sun, Danwei Chen:
A new definition of homomorphic signature for identity management in mobile cloud computing. 546-553 - Paulo Manoel Mafra, Joni da Silva Fraga, Altair Olivo Santin
:
Algorithms for a distributed IDS in MANETs. 554-570 - Manuel Gil Pérez
, Félix Gómez Mármol
, Gregorio Martínez Pérez
, Antonio Fernandez Gómez-Skarmeta
:
Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems. 571-590 - Saeed Ur Rehman
, Kevin W. Sowerby, Colin Coghill:
Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers. 591-601 - Guangjie Han, Jinfang Jiang, Lei Shu
, Jianwei Niu, Han-Chieh Chao:
Management and applications of trust in Wireless Sensor Networks: A survey. 602-617 - Thanassis Giannetsos, Tassos Dimitriou:
LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks. 618-643 - Hosein Shafiei
, Ahmad Khonsari
, H. Derakhshi, Payam Mousavi:
Detection and mitigation of sinkhole attacks in wireless sensor networks. 644-653 - Mauro Conti
, Roberto Di Pietro
, Angelo Spognardi
:
Clone wars: Distributed detection of clone attacks in mobile WSNs. 654-669 - Leonardo Maccari
, Renato Lo Cigno
:
Betweenness estimation in OLSR-based multi-hop networks for distributed filtering. 670-685
Volume 80, Number 4, June 2014
- Robert Crowston, Michael R. Fellows
, Gregory Z. Gutin, Mark Jones, Eun Jung Kim, Fran Rosamond
, Imre Z. Ruzsa, Stéphan Thomassé
, Anders Yeo
:
Satisfying more than half of a system of linear equations over GF(2): A multivariate approach. 687-696 - Edith Hemaspaandra, Lane A. Hemaspaandra
, Jörg Rothe:
The complexity of online manipulation of sequential elections. 697-710 - Gabriele Fici
:
On the structure of bispecial Sturmian words. 711-719 - Stanislav Böhm, Stefan Göller, Petr Jancar
:
Bisimulation equivalence and regularity for real-time one-counter automata. 720-743 - Richard Královic:
Infinite vs. finite size-bounded randomized computations. 744-765 - Sam Buss, Michael Soltys
:
Unshuffling a square is NP-hard. 766-776 - Sanjay Jain, Eric Martin, Frank Stephan
:
Robust learning of automatic classes of languages. 777-795 - Carlos Gómez-Rodríguez
:
Finding the smallest binarization of a CFG is NP-hard. 796-805 - John Case, Sanjay Jain, Yuh Shin Ong, Pavel Semukhin
, Frank Stephan
:
Automatic learners with feedback queries. 806-820 - Stefania Tosi, Sara Casolari, Michele Colajanni
:
Detecting correlation between server resources for system management. 821-836 - Qi Duan, Jinhui Xu:
On the connectivity preserving minimum cut problem. 837-848 - Ali Çivril
:
Column Subset Selection Problem is UG-hard. 849-859 - Danny Dolev, Matthias Függer, Markus Posch, Ulrich Schmid, Andreas Steininger
, Christoph Lenzen:
Rigorously modeling self-stabilizing fault-tolerant circuits: An ultra-robust clocking scheme for systems-on-chip. 860-900
Volume 80, Number 5, August 2014
- Rebecca Capone:
Publisher's note. 901
- Jinjun Chen, Jianxun Liu:
Special Issue: Dependable and Secure Computing. 902
- Yongming Xie, Guojun Wang:
Message matching-based greedy behavior detection in delay tolerant networks. 903-915 - Aarthi Nagarajan, Vijay Varadharajan
, Nathan Tarr:
Trust enhanced distributed authorisation for web services. 916-934 - Christopher Bailey, David W. Chadwick
, Rogério de Lemos:
Self-adaptive federated authorization infrastructures. 935-952 - Atef Shalan, Mohammad Zulkernine:
Software control flow error detection and correlation with system performance deviation. 953-972 - Julian Jang-Jaccard
, Surya Nepal
:
A survey of emerging threats in cybersecurity. 973-993 - Jiaqi Zhao, Lizhe Wang
, Jie Tao, Jinjun Chen, Weiye Sun, Rajiv Ranjan
, Joanna Kolodziej
, Achim Streit
, Dimitrios Georgakopoulos
:
A security framework in G-Hadoop for big data computing across distributed Cloud data centres. 994-1007 - Xuyun Zhang
, Chang Liu, Surya Nepal
, Chi Yang, Wanchun Dou, Jinjun Chen:
A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud. 1008-1020 - Yu Wang
, Yang Xiang
, Jun Zhang
, Wanlei Zhou
, Bailin Xie:
Internet traffic clustering with side information. 1021-1036
Volume 80, Number 6, September 2014
- Lev D. Beklemishev
, Ruy J. G. B. de Queiroz, Andre Scedrov
:
Editors' foreword. 1037 - Antonis Achilleos
:
A complexity question in justification logic. 1038-1045 - Samuel Bucheli, Roman Kuznets
, Thomas Studer
:
Realizing public announcements by justifications. 1046-1066 - Ranald Clouston:
Nominal Lawvere Theories: A category theoretic account of equational theories with names. 1067-1086 - Francicleber Martins Ferreira, Cibele Matos Freire, Mario R. F. Benevides
, Luis Menasché Schechter, Ana Teresa C. Martins:
Polynomial hierarchy graph properties in hybrid logic. 1087-1101 - Santiago Figueira, Daniel Gorín, Rafael Grimson:
Independence friendly logic with classical negation via flattening is a second-order logic with weak dependencies. 1102-1118 - Julian Gutierrez, Glynn Winskel:
On the determinacy of concurrent games on event structures with infinite winning sets. 1119-1137 - Max I. Kanovich:
Multiset rewriting over Fibonacci and Tribonacci numbers. 1138-1151 - Juha Kontinen
, Jakub Szymanik:
A characterization of definability of second-order generalized quantifiers with applications to non-definability. 1152-1162 - Rick Statman:
On polymorphic types of untyped terms. 1163-1173
Volume 80, Number 7, November 2014
- Julio Aracena, Adrien Richard, Lilian Salinas
:
Maximum number of fixed points in AND-OR-NOT networks. 1175-1190 - Tom J. Ameloot, Jan Van den Bussche
:
Positive Dedalus programs tolerate non-causality. 1191-1213 - Edith Cohen, Nick G. Duffield
, Haim Kaplan, Carsten Lund, Mikkel Thorup
:
Algorithms and estimators for summarization of unaggregated data streams. 1214-1244 - Amihood Amir, Alberto Apostolico, Gad M. Landau, Avivit Levy, Moshe Lewenstein, Ely Porat:
Range LCP. 1245-1253 - Jesús García-López, Florin Manea, Victor Mitrana
:
Prefix-suffix duplication. 1254-1265 - Nikolaos Laoutaris
, Laura J. Poplawski, Rajmohan Rajaraman, Ravi Sundaram, Shang-Hua Teng:
Bounded Budget Connection (BBC) games or how to make friends and influence people, on a budget. 1266-1284 - Cristina Bazgan, Morgan Chopin
, Marek Cygan
, Michael R. Fellows
, Fedor V. Fomin
, Erik Jan van Leeuwen:
Parameterized complexity of firefighting. 1285-1297 - Manfred Broy:
Verifying of interface assertions for infinite state Mealy machines. 1298-1322 - Amir Talaei-Khoei, Suchada Vichitvanichphong, Terje Solvoll, Pradeep Ray
, Amir Hossein Ghapanchi
:
A methodology to develop awareness in computer supported collaborative work using policies. 1323-1338 - Chunguang Li, Shouzhen Zeng
, Tiejun Pan, Leina Zheng:
A method based on induced aggregation operators and distance measures to multiple attribute decision making under 2-tuple linguistic environment. 1339-1349 - Haitao Jiang, Binhai Zhu:
A linear kernel for the complementary maximal strip recovery problem. 1350-1358 - Christian Glaßer, Stephen D. Travers, Klaus W. Wagner:
Perfect correspondences between dot-depth and polynomial-time hierarchies. 1359-1373 - Fedor V. Fomin
, Yngve Villanger:
Searching for better fill-in. 1374-1383 - Matthias Mnich
, Geevarghese Philip, Saket Saurabh, Ondrej Suchý
:
Beyond Max-Cut: λ-extendible properties parameterized above the Poljak-Turzík bound. 1384-1403 - Moein Kianpour
, Reza Sabbaghi-Nadooshan, Keivan Navi:
A novel design of 8-bit adder/subtractor by quantum-dot cellular automata. 1404-1414 - Albert Atserias, Sergi Oliva:
Bounded-width QBF is PSPACE-complete. 1415-1429 - Fedor V. Fomin
, Stefan Kratsch, Marcin Pilipczuk, Michal Pilipczuk, Yngve Villanger:
Tight bounds for parameterized complexity of Cluster Editing with a small number of clusters. 1430-1447 - Sergio Flesca
, Filippo Furfaro
, Francesco Parisi
:
Consistency checking and querying in probabilistic databases under integrity constraints. 1448-1489
Volume 80, Number 8, December 2014
- Yang Xiang
, Ivan Stojmenovic, Peter Mueller
:
Editorial: Special Issue on Theory and Applications in Parallel and Distributed Computing Systems. 1491-1492 - Hua Wang
, Lili Sun, Elisa Bertino:
Building access control policy model for privacy preserving and testing policy conflicting problems. 1493-1503 - Ahmed Sallam, Kenli Li, Aijia Ouyang, Zhiyong Li:
Proactive workload management in dynamic virtualized environments. 1504-1517 - Lan Zhou, Vijay Varadharajan
, Michael Hitchens
:
Secure administration of cryptographic role-based access control for large-scale cloud storage systems. 1518-1533 - Zhide Chen, Cheng Qiao, Yihui Qiu, Li Xu, Wei Wu:
Dynamics stability in wireless sensor networks active defense model. 1534-1548 - Guiyi Wei, Rongxing Lu, Jun Shao:
EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption. 1549-1562 - Chi Yang, Xuyun Zhang
, Changmin Zhong, Chang Liu, Jian Pei
, Kotagiri Ramamohanarao
, Jinjun Chen:
A spatiotemporal compression based approach for efficient big data processing on Cloud. 1563-1583 - Younchan Jung
, Enrique Festijo:
One-time packet key exchange scheme for secure real-time multimedia applications. 1584-1596 - Sébastien Gambs, Marc-Olivier Killijian, Miguel Núñez del Prado Cortez
:
De-anonymization attack on geolocated data. 1597-1614

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.