


default search action
The Computer Journal, Volume 58
Volume 58, Number 1, January 2015
Original Articles
- Nikolay Grozev, Rajkumar Buyya:

Performance Modelling and Simulation of Three-Tier Applications in Cloud and Multi-Cloud Environments. 1-22 - Marco Beccuti

, Chiara Fornari, Giuliana Franceschinis, Sami M. Halawani, Omar M. Ba-Rukab, Ab Rahman Ahmad, Gianfranco Balbo:
From Symmetric Nets to Differential Equations exploiting Model Symmetries. 23-39 - Shenlu Wang, Muhammad Aamir Cheema

, Xuemin Lin:
Efficiently Monitoring Reverse k-Nearest Neighbors in Spatial Networks. 40-56 - Gianfranco Balbo, Maria Grazia Vigliotti:

On the Analysis of a M/M/1 Queue with Bulk Services. 57-74 - Zhe Chen:

Control Systems on Automata and Grammars. 75-94 - James Pallister, Simon J. Hollis, Jeremy Bennett:

Identifying Compiler Options to Minimize Energy Consumption for Embedded Platforms. 95-109 - Yang Wang, Hua Li, Menglan Hu:

Reusing Garbage Data for Efficient Workflow Computation. 110-125 - James G. Dowty

:
SMML Estimators for 1-Dimensional Continuous Data. 126-133 - Michal Klempa, Michal Kozák, Mario Mikula, Robert Smetana, Jakub Stárka, Michal Svirec, Matej Vitásek, Martin Necaský

, Irena Holubová
:
jInfer: A Framework for XML Schema Inference. 134-156 - Albert Corominas, Alberto García-Villoria, Rafael Pastor

:
Technical Note: Relating to the Parameter Values Given by Nelder and Mead in their Algorithm. 157-159 - António Leslie Bajuelos, Santiago Canales, Gregorio Hernández-Peñalver

, Ana Mafalda Martins
, Inês Matos:
Some Results on Open-Edge and Open Mobile Guarding of Polygons and Triangulations. 160-171
Volume 58, Number 2, February 2015
Original Articles
- Omar Alsaleh

, Bella Bose, Bechir Hamdaoui:
One-to-Many Node-Disjoint Paths Routing in Dense Gaussian Networks. 173-187 - Chung-Ming Huang, Yih-Chung Chen, Shih Yang Lin

:
Packet Scheduling and Congestion Control Schemes for Multipath Datagram Congestion Control Protocol. 188-203 - Oguzhan Erdem, Aydin Carus, Hoang Le:

Value-Coded Trie Structure for High-Performance IPv6 Lookup. 204-214 - Paola Cappanera

, Alessandro Lori, Giovanni Stea
, Gigliola Vaglini:
On the Schedulability of Deadline-Constrained Traffic in TDMA Wireless Mesh Networks. 215-233 - Sami J. Habib, Paulvanna Nayaki Marimuthu, Naser Zaeri

:
Carbon-aware Enterprise Network through Redesign. 234-245 - Sen Su, Qingjia Huang, Jian Li, Xiang Cheng, Peng Xu, Kai Shuang:

Enhanced Energy-Efficient Scheduling for Parallel Tasks Using Partial Optimal Slacking. 246-257 - Shahbaz Akhtar Abid, Mazliza Othman

, Nadir Shah, Mazhar Ali, Atta ur Rehman Khan
:
3D-RP: A DHT-Based Routing Protocol for MANETs. 258-279 - Islam Elgedawy

:
CRESCENT: A Reliable Framework for Durable Composite Web Services Management. 280-299 - Mostafa Rezvani, Mohammad Kazem Akbari, Bahman Javadi:

Resource Allocation in Cloud Computing Environments Based on Integer Linear Programming. 300-314 - Chien-Fu Cheng

, Hsien-Chun Liao:
A Malicious-Resilient Protocol for Consistent Scheduling Problem in the Cloud Computing Environment. 315-330 - Mirka Miller, R. Sundara Rajan

, N. Parthiban
, Indra Rajasingh
:
Minimum Linear Arrangement of Incomplete Hypercubes. 331-337 - Shih-Chang Huang, Hong-Yi Chang:

A Bidirectional Route Repair Method for Wireless Mobile Ad Hoc Networks. 338-353
Volume 58, Number 3, March 2015
Special Focus on Enabling Technologies and Infrastructures for Collaboration
- Slim Kallel

, Mohamed Jmaiel, Sumitra Reddy:
Enabling Technologies: Infrastructure for Collaborative Enterprises. 355 - Wassim Derguech, Sami Bhiri

, Souleiman Hasan
, Edward Curry
:
Using Formal Concept Analysis for Organizing and Discovering Sensor Capabilities. 356-367 - Zahra Movahedi, Walid Gaaloul

, Sami Bhiri
, Bruno Defude
:
Assisting Sensor-Based Application Design and Instantiation Using Activity Recommendation. 368-384 - Afef Jmal Maâlej, Moez Krichen:

Study on the Limitations of WS-BPEL Compositions Under Load Conditions. 385-402 - Ines Houidi, Wajdi Louati, Djamal Zeghlache

:
Exact Multi-Objective Virtual Network Embedding in Cloud Environments. 403-415 - Ryszard Janicki, Mohammad Hadi Soudkhah:

On Classification with Pairwise Comparisons, Support Vector Machines and Feature Domain Overlapping. 416-431
- María Arsuaga-Ríos, Miguel A. Vega-Rodríguez

:
Multiobjective Small-World Optimization for Energy Saving in Grid Environments. 432-447 - Ajay Kumar

, Anil Kumar Verma
:
An Improved Algorithm for the Metamorphosis of Semi-Extended Regular Expressions to Deterministic Finite Automata. 448-456 - Lei Du

, Qinbao Song, Lei Zhu
, Xiaoyan Zhu:
A Selective Detector Ensemble for Concept Drift Detection. 457-471 - Omar Khadeer Hussain

, Zia-ur Rahman, Farookh Khadeer Hussain, Jaipal Singh, Naeem Khalid Janjua
, Elizabeth Chang
:
A User-Based Early Warning Service Management Framework in Cloud Computing. 472-496 - Jianxin Li

, Chengfei Liu
, Rui Zhou
, Jeffrey Xu Yu:
Query-Driven Frequent Co-Occurring Term Computation over Relational Data Using MapReduce. 497-513
Volume 58, Number 4, April 2015
Special Focus on Security, Trust and Risk in Multimedia Social Networks
- Zhiyong Zhang

:
Security, Trust and Risk in Multimedia Social Networks. 515-517 - Constantinos Patsakis

, Athanasios Zigomitros
, Achilleas Papageorgiou, Agusti Solanas
:
Privacy and Security for Multimedia Content shared on OSNs: Issues and Countermeasures. 518-535 - Hui Zhu, Cheng Huang, Hui Li:

Information Diffusion Model Based on Privacy Setting in Online Social Networking Services. 536-548 - Hong Zhu

, Shengli Tian, Kevin Lü:
Privacy-Preserving Data Publication with Features of Independent ℓ-Diversity. 549-571 - WeiTao Song, Bin Hu:

Approach to Detecting Type-Flaw Attacks Based on Extended Strand Spaces. 572-587 - Bin Yang, Xingming Sun, Xianyi Chen, Jianjun Zhang, Xu Li:

Exposing Photographic Splicing by Detecting the Inconsistencies in Shadows. 588-600 - Ayesha Kanwal, Rahat Masood

, Muhammad Awais Shibli, Rafia Mumtaz
:
Taxonomy for Trust Models in Cloud Computing. 601-626 - Qingqi Pei, Dingyu Yan, Lichuan Ma, Zi Li, Yang Liao:

A Strong and Weak Ties Feedback-Based Trust Model in Multimedia Social Networks. 627-643 - Zhen Yang, Kaiming Gao, Kefeng Fan, Yingxu Lai:

Sensational Headline Identification By Normalized Cross Entropy-Based Metric. 644-655 - Hui Lin, Jia Hu, Jianfeng Ma, Li Xu, Li Yang:

CRM: A New Dynamic Cross-Layer Reputation Computation Model in Wireless Networks. 656-667 - Zhiyong Zhang

, Kanliang Wang:
A Formal Analytic Approach to Credible Potential Path and Mining Algorithms for Multimedia Social Networks. 668-678 - V. Natarajan, Shina Sheen, R. Anitha:

Multilevel Analysis to Detect Covert Social Botnet in Multimedia Social Networks. 679-687 - Guowei Wu, Zuosong Liu, Lin Yao, Jing Deng, Jie Wang:

A Trust Routing for Multimedia Social Networks. 688-699 - Danmei Niu, Lanlan Rui, Cheng Zhong, Xuesong Qiu:

A Composition and Recovery Strategy for Mobile Social Network Service in Disaster. 700-708
- Volkmar Lotz, Francesco Di Cerbo, Michele Bezzi, Samuel Paul Kaluvuri, Antonino Sabetta, Slim Trabelsi:

Security Certification for Service-Based Business Ecosystems. 709-723 - Qiang Tang

, Hua Ma, Xiaofeng Chen:
Extend the Concept of Public Key Encryption with Delegated Search. 724-734 - Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi, Yi Mu:

Functional Encryption Resilient to Hard-to-Invert Leakage. 735-749 - Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang:

Leakage-Free ID-Based Signature. 750-757 - M. Francisca Hinarejos

, Andreu Pere Isern-Deyà
, Josep Lluís Ferrer-Gomila
, Magdalena Payeras-Capellà
:
MC-2D: An Efficient and Scalable Multicoupon Scheme. 758-778 - Ying-Kai Tang, Sherman S. M. Chow

, Joseph K. Liu
:
Comments on 'Efficient Revocable Certificateless Encryption Secure in the Standard Model'. 779-781 - Lanfranco Lopriore:

Password Capabilities Revisited. 782-791 - Ke Gu

, Weijia Jia
, Chunlin Jiang:
Efficient Identity-Based Proxy Signature in the Standard Model. 792-807 - Debasish Das, Utpal Sharma, D. K. Bhattacharyya

:
Detection of Cross-Site Scripting Attack under Multiple Scenarios. 808-822 - Xinyu Fan, Guomin Yang

, Yi Mu, Yong Yu
:
On Indistinguishability in Remote Data Integrity Checking. 823-830 - Alptekin Küpçü

:
Official Arbitration with Secure Cloud Storage Application. 831-852 - Jiguo Li, Huiyun Teng, Xinyi Huang, Yichen Zhang, Jianying Zhou

:
A Forward-Secure Certificate-Based Signature Scheme. 853-866 - Yong Yu

, Man Ho Au
, Yi Mu, Willy Susilo
, Huai Wu:
Secure Delegation of Signing Power from Factorization. 867-877 - Hai Le Vu

, Kenneth K. Khaw, Tsong Yueh Chen
:
A New Approach for Network Vulnerability Analysis. 878-891 - Stavros N. Shiaeles

, Maria Papadaki
:
FHSD: An Improved IP Spoof Detection Method for Web DDoS Attacks. 892-903 - Huacui Liu, Chenhui Jin:

Lower Bounds of Differential and Linear Active S-boxes for 3D-like Structure. 904-921 - Yu-Chi Chen

:
SPEKS: Secure Server-Designation Public Key Encryption with Keyword Search against Keyword Guessing Attacks. 922-933 - Cheng-Chi Lee

, Yan-Ming Lai:
Toward A Secure Single Sign-On Mechanism for Distributed Computer Networks. 934-943 - Franco Frattolillo

:
Watermarking Protocols: Problems, Challenges and a Possible Solution. 944-960 - Abdulah Abdulah Zadeh, Howard M. Heys

:
Application of Simple Power Analysis to Stream Ciphers Constructed Using Feedback Shift Registers. 961-972 - Haider Salim Hmood, Zhitang Li, Hasan Khalaf Abdulwahid, Yang Zhang:

Adaptive Caching Approach to Prevent DNS Cache Poisoning Attack. 973-985 - Sha Ma, Mingwu Zhang, Qiong Huang, Bo Yang:

Public Key Encryption with Delegated Equality Test in a Multi-User Setting. 986-1002 - Qiang Tang

:
From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data. 1003-1020 - Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo

:
An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants. 1021-1039
Volume 58, Number 5, May 2015
Original Articles
- Gabriel Ciobanu

, Maciej Koutny:
PerTiMo: A Model of Spatial Migration with Safe Access Permissions. 1041-1060 - Jie Lin, Yue Jiang, Don Adjeroh:

Circular Pattern Discovery. 1061-1073 - Jia Jie Liu

, Yue-Li Wang, Yu-shan Chiu:
Constrained Longest Common Subsequences with Run-Length-Encoded Strings. 1074-1084 - Emilio Di Giacomo, Walter Didimo, Luca Grilli

, Giuseppe Liotta
, Salvatore Agostino Romeo:
Heuristics for the Maximum 2-Layer RAC Subgraph Problem. 1085-1098 - Ahmad Sabri

, Vincent Vajnovszki:
Two Reflected Gray Code-Based Orders on Some Restricted Growth Sequences. 1099-1111 - Chia Shin Ou, Chin Lung Lu, Richard C. T. Lee:

A Systematical and Parallel Approach to Solve Problems Involving Special Properties of Bit-Vectors. 1112-1121 - Amy Affleck, Aneesh Krishna, Narasimaha Achuthan:

Non-Functional Requirements Framework: A Mathematical Programming Approach. 1122-1139 - Florentin Ipate, Alin Stefanescu

, Ionut Dinca:
Model Learning and Test Generation Using Cover Automata. 1140-1159 - Antonio Badia

, Daniel Lemire:
Functional Dependencies with null Markers. 1160-1168 - Petr Procházka, Jan Holub

:
Compression of a Set of Files with Natural Language Content. 1169-1185 - Joel Fuentes

, Pablo Sáez, Gilberto Gutiérrez
, Isaac D. Scherson:
A Method to Find Functional Dependencies Through Refutations and Duality of Hypergraphs. 1186-1198 - Chang-Ai Sun, Yimeng Zai, Huai Liu

:
Evaluating and Comparing Fault-Based Testing Strategies for General Boolean Specifications: A Series of Experiments. 1199-1213 - Behrooz Parhami:

Digital Arithmetic in Nature: Continuous-Digit RNS. 1214-1223
Volume 58, Number 6, June 2015
Special Focus on Green Energy Management and Smart Grid
- Zhangbing Zhou, Huansheng Ning

, Meikang Qiu, Habib F. Rashvand:
Editorial: Green Energy Management and Smart Grid. 1225-1226 - Jianxin Li, Jieyu Zhao, Yi Li, Lei Cui, Bo Li, Lu Liu

, John Panneerselvam
:
iMIG: Toward an Adaptive Live Migration Method for KVM Virtual Machines. 1227-1242 - Kehua Guo, Biao Tian, Jianhua Ma:

AMPS: An Adaptive Message Push Strategy for the Energy Efficiency Optimization in Mobile Terminals. 1243-1253 - Liyun Zuo, Shoubin Dong

, Chunsheng Zhu, Lei Shu
, Guangjie Han:
A Cloud Resource Evaluation Model Based on Entropy Optimization and Ant Colony Clustering. 1254-1266 - Jianhui Zhang, Zhi Li, Feng Xia

, Shaojie Tang, Xingfa Shen, Bei Zhao:
Cooperative Scheduling for Adaptive Duty Cycling in Asynchronous Sensor Networks. 1267-1279 - Guangjie Han, Xun Li, Jinfang Jiang, Lei Shu

, Jaime Lloret:
Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks. 1280-1292 - Zhiyong Feng, Bo Lan, Zhen Zhang, Shizhan Chen:

A Study of Semantic Web Services Network. 1293-1305 - Xiang Wang, Ying Lu, Yi Zhang, Zexi Zhao, Tongsheng Xia, Limin Xiao:

Power Optimization in Logic Synthesis for Mixed Polarity Reed-Muller Logic Circuits. 1306-1313 - Domen Zupancic, Mitja Lustrek, Matjaz Gams:

Multi-Agent Architecture for Control of Heating and Cooling in a Residential Space. 1314-1329 - Linghe Kong

, Xiao-Yang Liu, Meixia Tao, Min-You Wu, Yu Gu, Long Cheng, Jianwei Niu
:
Resource-Efficient Data Gathering in Sensor Networks for Environment Reconstruction. 1330-1343 - Jin Liu, Juan Li, Xiaoguang Niu, Xiaohui Cui, Yunchuan Sun:

GreenOCR: An Energy-Efficient Optimal Clustering Routing Protocol. 1344-1359 - Yongzhao Zhan, Shan Dai, Qirong Mao, Lu Liu

, Wei Sheng:
A Video Semantic Analysis Method Based on Kernel Discriminative Sparse Representation and Weighted KNN. 1360-1372 - He Li

, Mianxiong Dong, Xiaofei Liao, Hai Jin:
Deduplication-Based Energy Efficient Storage System in Cloud Environment. 1373-1383 - Hamed Javidi

, Maziar Goudarzi
:
TABEMS: Tariff-Aware Building Energy Management System for Sustainability through Better Use of Electricity. 1384-1398
- Xiaolan Tang

, Juhua Pu, Yang Gao, Yu Xie, Zhang Xiong:
GPS-Based Replica Deletion Scheme with Anti-Packet Distribution for Vehicular Networks. 1399-1415 - Antonio Frangioni

, Laura Galli, Giovanni Stea
:
Optimal Joint Path Computation and Rate Allocation for Real-time Traffic. 1416-1430 - Andrew Larkin, David E. Williams, Molly L. Kile, William M. Baird:

Developing a Smartphone Software Package for Predicting Atmospheric Pollutant Concentrations at Mobile Locations. 1431-1442 - Nizam Ayyildiz, Ece Güran Schmidt

, Hasan Cengiz Güran:
S-DIRECT: Scalable and Dynamically Reconfigurable TCAM Architecture for High-Speed IP Lookup. 1443-1455 - Pavel Rajmic

, Jiri Hosek
, Michal Fusek
, Sergey D. Andreev
, Július Stecík:
Simplified Probabilistic Modelling and Analysis of Enhanced Distributed Coordination Access in IEEE 802.11. 1456-1468 - Sangyeon Kim, Dong-Wan Choi, Chin-Wan Chung:

Finding a Friendly Community in Social Networks Considering Bad Relationships. 1469-1481 - Hamid Saadatfar, Hossein Deldari, Mahmoud Naghibzadeh

:
Improving the Scheduler's Energy Saving Capability by Noting both Job and Resource Characteristics. 1482-1493
Volume 58, Number 7, July 2015
Original Articles
- Viliam Simko, David Hauzar, Petr Hnetynka

, Tomás Bures
, Frantisek Plásil
:
Formal Verification of Annotated Textual Use-Cases. 1495-1529 - Achal Kaushik

, Deo Prakash Vidyarthi:
A Green Energy Model for Resource Allocation in Computational Grid. 1530-1547 - HamidReza Ahmadifar

, Ghassem Jaberipur:
A New Residue Number System with 5-Moduli Set: {22q, 2q±3, 2q±1}. 1548-1565 - Edem Kwedzo Bankas, Kazeem Alagbe Gbolagade

:
New MRC Adder-Based Reverse Converter for the Moduli Set {2n, 22n+1 - 1, 22n+2 - 1}. 1566-1572 - Qian Mao, K. Bharanitharan, Chin-Chen Chang:

A Proxy User Authentication Protocol Using Source-Based Image Morphing. 1573-1584 - Yiwen Zhang, Rui-feng Guo:

Low-Power Scheduling Algorithms for Sporadic Task with Shared Resources in Hard Real-Time Systems. 1585-1597 - Chao-Liang Liu, Wang-Jui Tsai, Ting-Yi Chang, Chun-Cheng Peng, Peng-Shiang Wong:

Meaningful Share Generation for (2, 2)-Multiple Visual Secret Sharing Scheme Without Pixel Expansion. 1598-1606 - Abdelli Abdelkrim

:
Improving the State Space Computation of the Time Stream Petri Nets Model. 1607-1627 - Yang Wang, Wei Shi

:
Dataflow-Based Scheduling for Scientific Workflows in HPC with Storage Constraints. 1628-1644 - Murat Yesilyurt, Yildiray Yalman

, Ahmet Turan Özcerit
:
A Robust Watermarking Method for Mpeg-4 Based on Kurtosis. 1645-1655 - Alexandre Petrenko

, Adenilso Simão
:
Generalizing the DS-Methods for Testing Non-Deterministic FSMs. 1656-1672 - Niko Beerenwinkel, Stefano Beretta

, Paola Bonizzoni
, Riccardo Dondi, Yuri Pirola
:
Covering Pairs in Directed Acyclic Graphs. 1673-1686
Volume 58, Number 8, August 2015
Special Focus on Ambient and Context-Aware Services for the Future Web
- Quan Z. Sheng

, Elhadi M. Shakshuki
, Jian Yu
:
Ambient and Context-Aware Services for the Future Web. 1687-1688 - Khalid Elgazzar, Sharief M. A. Oteafy

, Walid M. Ibrahim, Hossam S. Hassanein
:
A Resilient P2P Architecture for Mobile Resource Sharing. 1689-1700 - Zahoor Ali Khan

, Shyamala C. Sivakumar, William J. Phillips, Bill Robertson:
QPRR: QoS-Aware Peering Routing Protocol for Reliability Sensitive Data in Body Area Network Communication. 1701-1716 - Alireza Nafarieh, Shyamala C. Sivakumar, William Robertson, William J. Phillips:

SLA-Based Time-Aware Provisioning Mechanisms in Shared Mesh Protected Optical Networks. 1717-1731 - Heiko Desruelle, Frank Gielen:

Context-Driven Progressive Enhancement of Mobile Web Applications: A Multicriteria Decision-Making Approach. 1732-1746
- Yanling Hu, Anfeng Liu:

An Efficient Heuristic Subtraction Deployment Strategy to Guarantee Quality of Event Detection for WSNs. 1747-1762 - David Díez Hernández, Jaime García-Reinoso

, Iván Vidal
:
SFP: Statistical Filtering Policy for Caching in Content-Centric Networking. 1763-1775 - Xing Su, Minjie Zhang

, Quan Bai
:
Dynamic Task Allocation for Heterogeneous Agents in Disaster Environments Under Time, Space and Communication Constraints. 1776-1791 - Xiuchao Wu, Kenneth N. Brown

, Cormac J. Sreenan:
Contact Probing Mechanisms for Opportunistic Sensor Data Collection. 1792-1810 - Ping Xie, Jianzhong Huang, Qiang Cao, Xiao Qin

, Changsheng Xie:
A New Non-MDS RAID-6 Code to Support Fast Reconstruction and Balanced I/Os. 1811-1825 - Guangjun Qin, Mingfa Zhu, Limin Xiao, Li Ruan:

Lessen Interflow Interference Using Virtual Channels Partitioning. 1826-1841 - Jaime García-Reinoso

, Iván Vidal
, David Díez, Daniel Corujo
, Rui L. Aguiar
:
Analysis and Enhancements to Probabilistic Caching in Content-Centric Networking. 1842-1856
- Ahmed Kheiri

, Ender Özcan
:
Corrigendum: Constructing Constrained-Version of Magic Squares Using Selection Hyper-heuristics. 1857
Volume 58, Number 9, September 2015
Special Focus on Mining Social Media for Knowledge Discovery
- Neil Y. Yen, Uyen Trang Nguyen, Jong Hyuk Park:

Mining Social Media for Knowledge Discovery. 1859-1860 - Thomas Steiner

, Ruben Verborgh
, Joaquim Gabarró, Erik Mannens
, Rik Van de Walle:
Clustering Media Items Stemming from Multiple Social Networks. 1861-1875 - Weiwei Yuan, Donghai Guan, Sungyoung Lee, Jin Wang:

Skeleton Searching Strategy for Recommender Searching Mechanism of Trust-Aware Recommender Systems. 1876-1883 - Yongkoo Han, Kisung Park, Donghai Guan, Sajal Halder

, Young-Koo Lee:
Topological Similarity-Based Feature Selection for Graph Classification. 1884-1893 - Lihua Zhou, Kevin Lü

:
Detecting Communities with Different Sizes for Social Network Analysis. 1894-1908 - Wu He, Gongjun Yan:

Mining Blogs And Forums To Understand the Use of Social Media in Customer Co-creation. 1909-1920 - Chen Yang, Jian Ma

, Thushari P. Silva
, Xiaoyan Liu
, Zhongsheng Hua
:
A Multilevel Information Mining Approach for Expert Recommendation in Online Scientific Communities. 1921-1936 - Lida Ghahremanloo, Wanita Sherchan, James A. Thom

:
Geotagging Twitter Messages in Crisis Management. 1937-1954 - Seyed Mohammadhadi Daneshmand, Amin Javari, Seyed Ebrahim Abtahi, Mahdi Jalili

:
A Time-Aware Recommender System Based on Dependency Network of Items. 1955-1966
- Naeem Khalid Janjua

, Omar Khadeer Hussain
, Farookh Khadeer Hussain, Elizabeth Chang
:
Philosophical and Logic-Based Argumentation-Driven Reasoning Approaches and their Realization on the WWW: A Survey. 1967-1999 - Roberto Rodríguez-Rodríguez

, Fernando Castro
, Daniel Chaver
, Rekai González-Alberquilla, Luis Piñuel, Francisco Tirado
:
Write-Aware Replacement Policies for PCM-Based Systems. 2000-2025 - Muhammad Ashad Kabir

, Jun Han, Jian Yu
, Alan W. Colman
:
Inferring User Situations from Interaction Events in Social Media. 2026-2043 - Hiren K. Mewada

, Rahul Patel, Suprava Patnaik
:
A Novel Structure Tensor Modulated Chan-Vese Model for Texture Image Segmentation. 2044-2060 - Yi Liu, Xiongzi Ge, Xiaoxia Huang, David H. C. Du:

MOLAR: A Cost-Efficient, High-Performance SSD-Based Hybrid Storage Cache. 2061-2078 - Sadegh Aliakbary, Jafar Habibi, Ali Movaghar

:
Feature Extraction from Degree Distribution for Comparison and Analysis of Complex Networks. 2079-2091 - Mehmet Ali Abbasoglu, Bugra Gedik, Hakan Ferhatosmanoglu

:
Aggregate Profile Clustering for Streaming Analytics. 2092-2108 - Yanmin Zhu, Yin Wang, George Forman, Hong Wei:

Mining Large-Scale GPS Streams for Connectivity Refinement of Road Maps. 2109-2119 - Lin Wu

, Xiaodi Huang
, John Shepherd
, Yang Wang:
Multi-Query Augmentation-Based Web Landmark Photo Retrieval. 2120-2134 - Minaz J. Parmar, Marios C. Angelides:

MAC-REALM: A Video Content Feature Extraction and Modelling Framework. 2135-2171 - Álvaro Rubio-Largo

, Miguel A. Vega-Rodríguez
, David L. González-Álvarez:
A Parallel Multiobjective Approach based on Honey Bees for Traffic Grooming in Optical Networks. 2171-2191
Volume 58, Number 10, October 2015
Special Focus on Secure Information Systems Engineering
- David Garcia Rosado

, Nadira Lammari, Jan Jürjens:
Special Issue on Secure Information Systems Engineering. 2193-2194 - Maryam Sepehri, Stelvio Cimato

, Ernesto Damiani
:
Privacy-Preserving Query Processing by Multi-Party Computation. 2195-2212 - Evangelia Kavakli, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis

:
Privacy as an Integral Part of the Implementation of Cloud Solutions. 2213-2224 - D. Marudhadevi, V. Neelaya Dhatchayani, V. S. Shankar Sriram

:
A Trust Evaluation Model for Cloud Computing Using Service Level Agreement. 2225-2232 - Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina

:
ISGcloud: a Security Governance Framework for Cloud Computing. 2233-2254 - Thomas Quirchmayr, Mark Strembeck:

A Discussion of Communication Schemes for Process Execution Histories to Enforce Entailment Constraints in Process-Driven SOAs. 2255-2279 - Katarzyna Mazur

, Bogdan Ksiezopolski
, Zbigniew Kotulski
:
The Robust Measurement Method for Security Metrics Generation. 2280-2296 - Takeshi Takahashi

, Youki Kadobayashi:
Reference Ontology for Cybersecurity Operational Information. 2297-2312 - Ricardo J. Rodríguez

, José Merseguer
, Simona Bernardi
:
Modelling Security of Critical Infrastructures: A Survivability Assessment. 2313-2327 - José Fran. Ruiz, Antonio Maña, Carsten Rudolph

:
An Integrated Security and Systems Engineering Process and Modelling Framework. 2328-2350 - Carlos Blanco

, Eduardo Fernández-Medina
, Juan Trujillo
:
Modernizing Secure OLAP Applications with a Model-Driven Approach. 2351-2367
- Kazim Yumbul, Erkay Savas:

Enhancing an Embedded Processor Core for Efficient and Isolated Execution of Cryptographic Algorithms . 2368-2387 - Udaya Kiran Tupakula

, Vijay Varadharajan
:
Trust Enhanced Security for Tenant Transactions in the Cloud Environment. 2388-2403 - Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Harry Bartlett

:
CHURNs: Freshness Assurance for Humans. 2404-2425 - Chunfeng Lian

, Liaojun Pang
, Jimin Liang
:
Generalized Random Grid-Based Visual Secret Sharing for General Access Structures. 2426-2442 - Xing Wang, Nga Lam Or, Ziyan Lu, Derek Chi-Wai Pao:

Hardware Accelerator to Detect Multi-Segment Virus Patterns. 2443-2460 - Chanying Huang, Hwaseong Lee, Hyoseung Kim, Dong Hoon Lee:

mvSERS: A Secure Emergency Response Solution for Mobile Healthcare in Vehicular Environments. 2461-2475 - Grazielle Vernize, André Luiz Pires Guedes

, Luiz Carlos Pessoa Albini:
Malicious Nodes Identification for Complex Network Based on Local Views. 2476-2491 - Jianghong Wei

, Wenfen Liu, Xuexian Hu:
Forward-Secure Threshold Attribute-Based Signature Scheme. 2492-2506 - Debiao He

, Mingwu Zhang, Baowen Xu
:
Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model. 2507-2508 - Chang Xu

, Liehuang Zhu, Zhoujun Li, Feng Wang:
One-Round Affiliation-Hiding Authenticated Asymmetric Group Key Agreement with Semi-trusted Group Authority. 2509-2519 - Shifeng Sun, Dawu Gu, Zhengan Huang:

Fully Secure Wicked Identity-Based Encryption Against Key Leakage Attacks. 2520-2536 - Zoran Djuric, Dragan Gasevic

:
FEIPS: A Secure Fair-Exchange Payment System for Internet Transactions. 2537-2556 - Lanfranco Lopriore:

Password Management: Distribution, Review and Revocation. 2557-2566 - Amir Jalaly Bidgoly

, Behrouz Tork Ladani
:
Modelling and Quantitative Verification of Reputation Systems Against Malicious Attackers. 2567-2582 - Wien Hong, Gwoboa Horng, Chih-Wei Shiu

, Tung-Shou Chen, Yu-Chi Chen
:
Reversible Steganographic Method Using Complexity Control and Human Visual System. 2583-2594 - Dong Lai Fu, Xinguang Peng, Yuli Yang:

Trusted Validation for Geolocation of Cloud Data. 2595-2607 - Shahid Alam

, Issa Traoré, Ibrahim Sogukpinar
:
Annotated Control Flow Graph for Metamorphic Malware Detection. 2608-2621 - Md. Saiful Islam

, Naif Alajlan
:
Model-based Alignment of Heartbeat Morphology for Enhancing Human Recognition Capability. 2622-2635 - SK Hafizul Islam

, Fagen Li
:
Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings. 2636-2648 - Pericle Perazzo

, Pavel Skvortsov, Gianluca Dini:
On Designing Resilient Location-Privacy Obfuscators. 2649-2664 - Yang Wang, Willy Susilo

, Man Ho Au
:
Revisiting Security Against the Arbitrator in Optimistic Fair Exchange. 2665-2676 - Lin Ding

, Chenhui Jin, Jie Guan, Shaowu Zhang, Ting Cui, Dong Han, Wei Zhao:
Cryptanalysis of WG Family of Stream Ciphers. 2677-2685 - Kaibin Huang, Raylin Tso

, Yu-Chi Chen
, Sk. Md. Mizanur Rahman
, Ahmad Almogren
, Atif Alamri:
PKE-AET: Public Key Encryption with Authorized Equality Test. 2686-2697 - Nuttapong Attrapadung

, Keita Emura
, Goichiro Hanaoka
, Yusuke Sakai
:
Revocable Group Signature with Constant-Size Revocation List. 2698-2715 - Erkay Savas, Cemal Yilmaz:

A Generic Method for the Analysis of a Class of Cache Attacks: A Case Study for AES. 2716-2737 - Mayana Pereira, Rafael Dowsley, Anderson C. A. Nascimento

, Goichiro Hanaoka
:
Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions. 2738-2746 - Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen:

Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited. 2747-2757 - André Ricardo Abed Grégio

, Vitor Monte Afonso, Dario Simões Fernandes Filho, Paulo Lício de Geus
, Mário Jino:
Toward a Taxonomy of Malware Behaviors. 2758-2777 - Kaitai Liang

, Willy Susilo
, Joseph K. Liu
, Duncan S. Wong:
Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption. 2778-2792
Volume 58, Number 11, November 2015
Original Articles
- Nina Yevtushenko, Khaled El-Fakih, Tiziano Villa, Jie-Hong R. Jiang:

Deriving Compositionally Deadlock-Free Components over Synchronous Automata Compositions. 2793-2803 - Ahmet Kara

, Halit Oguztüzün, Mahmut Nedim Alpdemir
:
A Methodology for Resolution Mapping for Cross-Resolution Simulation using Event-B. 2804-2823 - Weiqiang Kong, Leyuan Liu

, Takahiro Ando, Hirokazu Yatsu, Kenji Hisazumi
, Akira Fukuda:
Facilitating Multicore Bounded Model Checking with Stateless Explicit-State Exploration. 2824-2840 - Xiaowang Zhang

, Jan Van den Bussche
:
On the Power of SPARQL in Expressing Navigational Queries. 2841-2851 - Sung-In Jang, Su-Kyung Yoon, Kihyun Park, Gi-Ho Park, Shin-Dug Kim:

Data Classification Management with its Interfacing Structure for Hybrid SLC/MLC PRAM Main Memory. 2852-2863 - Shaowei Cai

, Chuan Luo, Kaile Su
:
Improving WalkSAT By Effective Tie-Breaking and Efficient Implementation. 2864-2875 - Pablo Muñoz

, David F. Barrero
, María D. R.-Moreno
:
A Statistically Rigorous Analysis of 2D Path-Planning Algorithms. 2876-2891 - Gauthier van den Hove:

On the Origin of Recursive Procedures. 2892-2899 - Paolo Arcaini

, Angelo Gargantini, Elvinia Riccobene
:
How to Optimize the Use of SAT and SMT Solvers for Test Generation of Boolean Expressions. 2900-2920 - Frank Gurski

:
Linear Programming Formulations for Computing Graph Layout Parameters. 2921-2927 - Shiyu Yang, Muhammad Aamir Cheema, Xuemin Lin:

Impact Set: Computing Influence Using Query Logs. 2928-2943 - Xi Wang, Alejandro Erickson, Jianxi Fan, Xiaohua Jia

:
Hamiltonian Properties of DCell Networks. 2944-2955 - Giorgos Stoilos, Tassos Venetis, Giorgos Stamou:

A Fuzzy Extension to the OWL 2 RL Ontology Language. 2956-2971 - Jinn-Shyong Yang, Sih-Syuan Luo, Jou-Ming Chang

:
Pruning Longer Branches of Independent Spanning Trees on Folded Hyper-Stars. 2972-2981 - Thomas Roelleke, Andreas Kaltenbrunner

, Ricardo Baeza-Yates
:
Harmony Assumptions in Information Retrieval and Social Networks. 2982-2999 - A. S. M. Kayes

, Jun Han, Alan Colman
:
OntCAAC: An Ontology-Based Approach to Context-Aware Access Control for Software Services. 3000-3034 - Hao Zheng, Xiaoshe Dong

, Zhengdong Zhu, Baoke Chen, Yizhi Zhang, Xingjun Zhang:
Research on Algorithms to Capture Drivers' Write Operations. 3035-3056 - Jorge F. Fabeiro

, Diego Andrade, Basilio B. Fraguela
, Ramón Doallo:
Automatic Generation of Optimized OpenCL Codes Using OCLoptimizer. 3057-3073 - Shenwei Huang, Matthew Johnson

, Daniël Paulusma
:
Narrowing the Complexity Gap for Colouring (Cs, Pt)-Free Graphs. 3074-3088 - Robert M. Hierons

, Uraz Cengiz Türker:
Incomplete Distinguishing Sequences for Finite State Machines. 3089-3113 - Yinglei Song, Chunmei Liu, Yongzhong Li:

A New Parameterized Algorithm for Predicting the Secondary Structure of RNA Sequences Including Pseudoknots. 3114-3125 - Emilio Di Giacomo, Walter Didimo, Giuseppe Liotta, Henk Meijer, Stephen K. Wismath:

Planar and Quasi-Planar Simultaneous Geometric Embedding. 3126-3140 - Outi Sievi-Korte

, Kai Koskimies, Erkki Mäkinen
:
Techniques for Genetic Software Architecture Design. 3141-3170 - László Lengyel, Tamás Mészáros, Márk Asztalos, Péter Boros, Attila Máté, Gábor Madács, Péter Hudák, Kristóf Kovács, András Tresch, Hassan Charaf:

Quality Assured Model-Driven Requirements Engineering and Software Development. 3171-3186 - Kun Ma

, Fusen Dong, Bo Yang:
Large-Scale Schema-Free Data Deduplication Approach with Adaptive Sliding Window Using MapReduce. 3187-3201 - Amir Vahid Dastjerdi, Rajkumar Buyya:

An Autonomous Time-Dependent SLA Negotiation Strategy for Cloud Computing. 3202-3216
Volume 58, Number 12, December 2015
Original Articles
- Sérgio Esteves, Paulo Ferreira

, Luís Veiga
:
C3 P: A Re-Configurable Framework to Design Cycle-sharing Computing Cloud Platforms. 3217-3241 - Yuhao Yi, Zhongzhi Zhang

, Yuan Lin, Guanrong Chen:
Small-World Topology Can Significantly Improve the Performance of Noisy Consensus in a Complex Network. 3242-3254 - Huajun He, Yang Zhao, Jinfu Wu, Ye Tian

:
Cost-Aware Capacity Provisioning for Internet Video Streaming CDNs. 3255-3270 - R. Sundara Rajan

, Paul D. Manuel
, Indra Rajasingh
, N. Parthiban
, Mirka Miller:
A Lower Bound for Dilation of an Embedding. 3271-3278 - Yonggang Che, Chuanfu Xu, Jianbin Fang

, Yongxian Wang
, Zhenghua Wang:
Realistic Performance Characterization of CFD Applications on Intel Many Integrated Core Architecture. 3279-3294 - Wei Zhou, Tao Jing, Yan Huo, Jin Qian, Zhen Li:

Double Auction for Joint Channel and Power Allocation in Cognitive Radio Networks. 3295-3305 - Chun-Chieh Huang, Ren-Song Ko:

A Study on Maximizing the Parallelism of Macroscopically Derived Routing Algorithms for WSNs. 3306-3324

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














