


default search action
The Computer Journal, Volume 53, 2010
Volume 53, Number 1, January 2010
- Erol Gelenbe

:
Editorial. 1-2 - Yongzhi Cao

:
A Hierarchy of Behavioral Equivalences in the π-calculus with Noisy Channels. 3-20 - Xiaowei Huang

, Li Jiao, Weiming Lu:
Congruence Formats for Weak Readiness Equivalence and Weak Possible Future Equivalence. 21-36 - Xuejun Yang, Ji Wang, Xiaodong Yi:

Slicing Execution with Partial Weakest Precondition for Model Abstraction of C Programs. 37-49
- Daniel Cutting, Aaron J. Quigley

, Björn Landfeldt:
Special Interest Messaging: A Comparison of IGM Approaches. 50-68 - Patrick Erik Bradley

, Norbert Paul:
Using the Relational Model to Capture Topological Information of Spaces. 69-89 - Wil M. P. van der Aalst

, Niels Lohmann
, Peter Massuthe, Christian Stahl, Karsten Wolf:
Multiparty Contracts: Agreeing and Implementing Interorganizational Processes. 90-106 - Feng Liu, Chuan Kun Wu, Xi Jun Lin:

Some Extensions on Threshold Visual Cryptography Schemes. 107-119 - A. S. M. Sajeev, Sakgasit Ramingwong:

Mum Effect as an Offshore Outsourcing Risk: A Study of Differences in Perceptions. 120-126
- Ricardo P. Jasinski:

Jari Nurmi: Processor Design - System-on-Chip Computing for ASICs and FPGAs. Springer (2007) ISBN 978-1-4020-5529-4. 127
Volume 53, Number 2, February 2010
- Bo Hu, Bin Hu, Victor Callaghan

, Zongkai Lin:
Combining Theory and Systems Building in Pervasive Computing. 129-130 - Junzhou Luo, Weining Kong, Liang Ge:

Implementation of Learning Path in Process Control Model. 131-141 - Fernando Rivera-Illingworth, Victor Callaghan

, Hani Hagras
:
Detection Of Normal and Novel Behaviours In Ubiquitous Domestic Environments. 142-151 - Baopeng Zhang

, Yuanchun Shi, Xin Xiao:
A Policy-Driven Service Composition Method for Adaptation in Pervasive Computing Environment. 152-165 - Zheng-Yu Wu, Han-Tao Song:

Ant-based Energy-aware Disjoint Multipath Routing Algorithm for MANETs. 166-176 - Jinjiao Lin, Chengxiang Song, Haiyang Wang:

A Rule-based Method for Improving Adaptability in Pervasive Systems. 177-190 - Philip Moore

, Bin Hu, JiZheng Wan
:
Smart-Context: A Context Ontology for Pervasive Mobile Computing. 191-207
- Kumaara Velan:

Modelling Bidders in Sequential Automated Auctions. 208-218 - Zhao Wu, Naixue Xiong, Jong Hyuk Park, Tai-Hoon Kim, Lei Yuan:

A Simulation Model Supporting Time and Non-time Metrics for Web Service Composition. 219-233 - Mouna Allani, Benoît Garbinato

, Fernando Pedone
:
Resource-Aware Multimedia Content Delivery: A Gambling Approach. 234-248
Volume 53, Number 3, March 2010
- Taskin Koçak

:
Two Decades of Random Neural Networks. 249-250 - Stelios Timotheou

:
The Random Neural Network: A Survey. 251-267 - Georgia Sakellari

:
The Cognitive Packet Network: A Survey. 268-279 - Jian Wu, Steve B. Furber

:
A Multicast Routing Scheme for a Universal Spiking Neural Network Architecture. 280-288 - Mustafa Badaroglu, Ugur Halici

, Isik Aybay
, Cuneyt Cerkez:
A Cascadable Random Neural Network Chip with Reconfigurable Topology. 289-303
- Fionn Murtagh:

The Correspondence Analysis Platform for Uncovering Deep Structure in Data and Information. 304-315 - Ching-man Au Yeung, Ho-fung Leung

:
A Formal Model of Ontology for Handling Fuzzy Membership and Typicality of Instances. 316-341 - Ajoy Kumar Datta, Lawrence L. Larmore, Priyanka Vemula:

A Self-Stabilizing O(k)-Time k-Clustering Algorithm. 342-350 - Chih-Yu Lin, Yu-Chee Tseng, Yung-Chih Liu:

Imprecision-Tolerant Location Management for Object-Tracking Wireless Sensor Network. 351-364
Volume 53, Number 4, May 2010
- Marcus Nilsson:

Computational Aspects of Monomial Dynamical Systems. 365-369 - Vladimir Anashin

:
Non-Archimedean Ergodic Theory and Pseudorandom Generators. 370-392 - Patrick Erik Bradley

:
Mumford Dendrograms. 393-404 - Fionn Murtagh:

On Ultrametric Algorithmic Information. 405-416 - Jenny Benois-Pineau

, Andrei Yu. Khrennikov:
Significance Delta Reasoning with p-Adic Neural Networks: Application to Shot Change Detection in Video. 417-431 - Branko Dragovich

, Alexandra Dragovich:
p-Adic Modelling of the Genome and the Genetic Code. 432-442 - Anthony Karel Seda, Pascal Hitzler:

Generalized Distance Functions in the Theory of Computation. 443-464
- Behzad Akbarpour, Amr Talaat Abdel-Hamid, Sofiène Tahar, John Harrison:

Verifying a Synthesized Implementation of IEEE-754 Floating-Point Exponential Function using HOL. 465-488
- Mark Levene:

Rokach Lior and Maimon Oded: Data Mining with Decision Trees: Theory and Applications World Scientific (2008) ISBN-13 978-981-277-171-1. 489 - Boran Gazi:

Krzysztof J. Cios, Witold Pedrycz, Roman W. Swiniarski and Lukasz A. Kurgan: Data Mining: A Knowledge Discovery Approach Springer (2007) ISBN 978-0387333335. 489-490
Volume 53, Number 5, June 2010
- Duncan Gillies, David J. Thornley, Chatschik Bisdikian:

Probabilistic Approaches to Estimating the Quality of Information in Military Sensor Networks. 493-502 - Gita Sukthankar, Katia P. Sycara:

Analyzing Team Decision-Making in Tactical Scenarios. 503-512 - Lei Chen, Zijian Wang, Boleslaw K. Szymanski

, Joel W. Branch, Dinesh C. Verma, Raju Damarla, John Ibbotson:
Dynamic Service Execution in Sensor Networks. 513-527 - Katia P. Sycara, Timothy J. Norman, Joseph Andrew Giampapa, Martin J. Kollingbaum, Chris Burnett, Daniele Masato, Mairi McCallum, Michael H. Strub:

Agent Support for Policy-Driven Collaborative Mission Planning. 528-540 - Dinesh C. Verma, Bong Jun Ko, Petros Zerfos, Kang-Won Lee, Ting He, Matthew Duggan, Kristian D. Stewart, Ananthram Swami, Nikoletta Sofra:

Understanding the Quality of Monitoring for Network Management. 541-550
- Zhongqiang Chen, Yuan Zhang, Zhongrong Chen:

A Categorization Framework for Common Computer Vulnerabilities and Exposures. 551-580 - Hafizur Rahaman

, Jimson Mathew, Dhiraj K. Pradhan:
Secure Testable S-box Architecture for Cryptographic Hardware Implementation. 581-591
- François Baccelli, Bartlomiej Blaszczyszyn, Paul Mühlethaler:

Time-Space Opportunistic Routing in Wireless Ad hoc Networks: Algorithms and Performance Optimization by Stochastic Geometry. 592-609 - Mathew D. Penrose

:
Discussant of Response to the Computer Journal Lecture by Francois Baccelli. 610-611 - Takis Konstantopoulos:

Response to Prof. Baccelli's lecture on Modelling of Wireless Communication Networks by Stochastic Geometry. 612-614
- Rupak Majumdar:

Paul Ammann and Jeff OffuttIntroduction to Software Testing. Cambridge University Press(2008). ISBN: 978-0-521-88038-1, 322 pp. Hardcover. 615 - François Laroussinie:

Christel Baier and Joost-Pieter KatoenPrinciples of Model Checking. MIT Press (May 2008).ISBN: 978-0-262-02649-9, 975 pp. Hardcover. 615-616 - Neil F. Johnson:

Frank Y. ShihDigital Watermarking and Steganography: Fundamentals and Techniques. CRC/Taylor & Francis (2008).ISBN-13: 9781420047578, 180 pp. Hardcover. 616-617
Volume 53, Number 6, July 2010
- Fairouz Kamareddine:

Capsule Reviews. 619-622
- Chien-Liang Chen, Shao-Chi Chin, Hsu-Chun Yen:

Reachability Analysis of Augmented Marked Graphs via Integer Linear Programming. 623-633 - Yu-Chen Kuo:

General Tree k-Coteries to Reduce the Degradation of Quorums. 634-643 - R. Marshall:

Modeling DNA/RNA Strings Using Resistor - Capacitor (RC) Ladder Networks. 644-660 - Ro-Yu Wu, Jou-Ming Chang

, Yue-Li Wang:
Loopless Generation of Non-regular Trees with a Prescribed Branching Sequence. 661-666 - Jywe-Fei Fang:

The Bipancycle-Connectivity and the m-Pancycle-Connectivity of the k-ary n-cube. 667-678 - Roberto Barbuti, Nicoletta De Francesco, Luca Tesei

:
An Abstract Interpretation Approach for Enhancing the Java Bytecode Verifier. 679-700 - Shmuel Tomi Klein

, Miri Kopel Ben-Nissan:
On the Usefulness of Fibonacci Compression Codes. 701-716 - Dae-Hwan Kim

, Hyuk-Jae Lee:
Fine-Grain Register Allocation and Instruction Scheduling in a Reference Flow. 717-740 - Emilio J. Padrón

, Margarita Amor, Montserrat Bóo, Ramon Doallo:
Hierarchical Radiosity for Multiresolution Systems Based on Normal Tests. 741-752 - Iren Valova, Derek Beaton, Daniel MacLean, John Hammond:

NIPSOM: Parallel Architecture and Implementation of a Growing SOM. 753-771 - Anne Benoit

, Mourad Hakem, Yves Robert
:
Multi-criteria Scheduling of Precedence Task Graphs on Heterogeneous Platforms. 772-785 - Xiaoyan Zhu, Qinbao Song, Zihan Jia:

A Weighted Voting-Based Associative Classification Algorithm. 786-801 - Jen-Bang Feng, Iuon-Chang Lin, Yen-Ping Chu, Shyh-Chang Tsaur:

Resampling Halftone Images Using Interpolation and Error-Diffusion. 802-813 - Hans Vandierendonck

, Sean Rul, Koen De Bosschere:
Accelerating Multiple Sequence Alignment with the Cell BE Processor. 814-826 - Michael A. Bekos

, Michael Kaufmann, Katerina Potika
, Antonios Symvonis
:
Area-Feature Boundary Labeling. 827-841 - Rich Picking, Alexia Robinet, Vic Grout

, John McGinn, Armando Roy Delgado, Simon Ellis, Denise Oram:
A Case Study Using a Methodological Approach to Developing User Interfaces for Elderly and Disabled People. 842-859
- Peter G. Harrison

:
Turning Back Time - What Impact on Performance? 860-868 - Erol Gelenbe, Stephen Gilmore:

Discussants' Comments on the Computer Journal Lecture by Peter Harrison presented at the British Computer Society on 24th February 2009. 869-870 - Alessandra Di Pierro

, Chris Hankin
, Herbert Wiklicky:
Program Analysis Probably Counts. 871-880 - Pasquale Malacaria:

Program Analysis Probably Counts: Discussant Contribution for the Computer Journal Lecture by Chris Hankin. 881
Volume 53, Number 7, September 2010
- HaNeul Chon, Taewhan Kim:

Resource Sharing Problem of Timing Variation-Aware Task Scheduling and Binding in MPSoC. 883-894 - Liang Xia, Yongxin Zhu, Jun Yang, Jingwei Ye, Zonghua Gu

:
Implementing a Thermal-Aware Scheduler in Linux Kernel on a Multi-Core Processor. 895-903 - Minje Jun, Eui-Young Chung:

Design of On-Chip Crossbar Network Topology Using Chained Edge Partitioning. 904-917
- Chung-Ming Huang, Jianwei Li, Chun-Ta Chen:

Distributed Hash Table-Based Interrogating-Call Session Control Function Network in the Internet Protocol Multimedia Subsystem for Efficient Query Services. 918-933 - Jongsung Kim, Seokhie Hong:

Side-Channel Attack Using Meet-in-the-Middle Technique. 934-938 - Iuon-Chang Lin, Shih-Shan Tang, Chung-Ming Wang:

Multicast Key Management without Rekeying Processes. 939-950 - Jenn-Wei Lin, Ming-Feng Yang:

Robust Super-Peer-Based P2P File-Sharing Systems. 951-968 - Chuan-Chi Weng, Ching-Wen Chen, Chang-Jung Ku, Shiow-Fen Hwang:

A Bandwidth-Based Power-Aware Routing Protocol with Low Route Discovery Overhead in Mobile Ad hoc Networks. 969-990 - Jonathan Tate, Iain Bate:

Sensornet Protocol Tuning Using Principled Engineering Methods. 991-1019 - Georgios Loukas

, Gülay Öke:
Protection Against Denial of Service Attacks: A Survey. 1020-1037 - Isi Mitrani:

Management of Server Farms for Performance and Profit. 1038-1044 - Andreas Berl, Erol Gelenbe

, Marco Di Girolamo, Giovanni Giuliani, Hermann de Meer, Dang Minh Quan, Kostas Pentikousis:
Energy-Efficient Cloud Computing. 1045-1051 - Erol Gelenbe

, Edith C. H. Ngai:
Adaptive Random Re-Routing for Differentiated QoS in Sensor Networks. 1052-1061 - Tsu-Yang Wu

, Yuh-Min Tseng:
An ID-Based Mutual Authentication and Key Exchange Protocol for Low-Power Mobile Devices. 1062-1070 - Xiuqiang He, Zonghua Gu

, Yongxin Zhu:
Task Allocation and Optimization of Distributed Embedded Systems with Simulated Annealing and Geometric Programming. 1071-1091 - Eyal Loz, Guillermo Pineda-Villavicencio

:
New Benchmarks for Large-Scale Networks with Given Maximum Degree and Diameter. 1092-1105 - Denis Trcek:

Security Metrics Foundations for Computer Security. 1106-1112
- Morris Sloman

, Emil C. Lupu
:
Engineering Policy-Based Ubiquitous Systems. 1113-1127 - Robin Milner:

Discussant of Response to the Computer Journal Lecture by Morris Sloman. 1128
- Mark Levene:

Social Networks: An Introduction. 1129 - Elizabeth Harrin:

Growing Software: Proven Strategies for Managing Software Engineers. 1129-1130
- Michael Elad, Dmitry Datsenko:

Corrigendum: Example-Based Regularization Deployed to Super-Resolution Reconstruction of a Single Image. 1131
Volume 53, Number 8, October 2010
- Sung Woo Chung, Hsien-Hsin S. Lee, Woo Hyong Lee:

Architecture/OS Support for Embedded Multi-core Systems. 1134-1135
- Fariba Sadri, Kostas Stathis

:
Special Issue on Artificial Societies for Ambient Intelligence Editorial Introduction. 1136-1137 - Jurriaan van Diggelen, Robbert-Jan Beun, Rogier M. van Eijk, Peter J. Werkhoven:

Efficient Semantic Information Exchange for Ambient Intelligence. 1138-1151 - Marco P. Locatelli, Marco Loregian, Giuseppe Vizzari

:
Artificial Societies in a Community-Based Approach to Ambient Intelligence. 1152-1168 - Aitor Ibarguren

, Iñaki Maurtua
, Basilio Sierra
:
Layered Architecture for Real-Time Sign Recognition. 1169-1183 - Krysia Broda, Christopher J. Hogger:

Designing Effective Policies for Minimal Agents. 1184-1209 - Fabio Paternò

, Carmen Santoro
, Antonio Scorcia:
Ambient Intelligence for Supporting Task Continuity across Multiple Devices and Implementation Languages. 1210-1228 - Patrice Caire, Leendert W. N. van der Torre

:
Convivial Ambient Technologies: Requirements, Ontology and Design. 1229-1256 - Alessandra Mileo, Davide Merico, Stefano Pinardi

, Roberto Bisiani:
A Logical Approach to Home Healthcare with Intelligent Sensor-Network Support. 1257-1276
- Johnsen Kho, Long Tran-Thanh, Alex Rogers, Nicholas R. Jennings

:
An Agent-Based Distributed Coordination Mechanism for Wireless Visual Sensor Nodes Using Dynamic Programming. 1277-1290 - Guang-Ho Cha:

A Context-Aware Similarity Search for a Handwritten Digit Image Database. 1291-1301 - Huzaifa Zafar, Daniel D. Corkill:

Reducing Online Model-Development Time by Agents Using Constraints Between Shared Observations. 1302-1314 - Mücahid Kutlu

, Celal Cigir, Ilyas Cicekli:
Generic Text Summarization for Turkish. 1315-1323 - Göksel Günlü, Hasan S. Bilge:

Face Recognition with Discriminating 3D DCT Coefficients. 1324-1337
- Jakub Marecek:

Handbook of Approximation Algorithms and Metaheuristics. 1338-1339
Volume 53, Number 9, November 2010
- Nicholas R. Jennings

, Alex Rogers, S. Case, R. Johnston, D. Philpot:
Decentralized Data and Information Systems: Theory and Practice. 1341-1343 - Michalis Smyrnakis, David S. Leslie

:
Dynamic Opponent Modelling in Fictitious Play. 1344-1359 - Erol Gelenbe

, Stelios Timotheou
, David Nicholson:
Fast Distributed Near-Optimum Assignment of Assets to Tasks. 1360-1369 - Nicos G. Pavlidis

, Niall M. Adams, David Nicholson, David J. Hand
:
Prospects for Bandit Solutions in Sensor Management. 1370-1383 - Nikolaos Dimakis, Avgoustinos Filippoupolitis

, Erol Gelenbe
:
Distributed Building Evacuation Simulator for Smart Emergency Management. 1384-1400 - Christoforos Anagnostopoulos

, Niall M. Adams, David J. Hand
:
Streaming Covariance Selection with Applications to Adaptive Querying in Sensor Networks. 1401-1414 - Seung Min Lee, Stephen J. Roberts:

Sequential Dynamic Classification Using Latent Variable Models. 1415-1429 - Roman Garnett, Michael A. Osborne

, Steven Reece, Alex Rogers, Stephen J. Roberts:
Sequential Bayesian Prediction in the Presence of Changepoints and Faults. 1430-1446 - Sarvapali D. Ramchurn, Alessandro Farinelli

, Kathryn S. Macarthur, Nicholas R. Jennings
:
Decentralized Coordination in RoboCup Rescue. 1447-1461 - Archie C. Chapman

, Rosa Anna Micillo, Ramachandra Kota, Nicholas R. Jennings
:
Decentralized Dynamic Task Allocation Using Overlapping Potential Games. 1462-1477
- Lein Harn, Wen-Jung Hsin, Changlu Lin:

Efficient On-line/Off-line Signature Schemes Based on Multiple-Collision Trapdoor Hash Families. 1478-1484 - Roberto De Prisco

, Alfredo De Santis
:
Cheating Immune Threshold Visual Secret Sharing. 1485-1496 - Lélia Blin, Christian Laforest, Stephane Rovedakis, Nicolas Thibault:

Hardness Results and Heuristic for Multi-groups Interconnection. 1497-1507 - Adenilso da Silva Simão

, Alexandre Petrenko
:
Fault Coverage-Driven Incremental Test Generation. 1508-1522 - Vicent Cholvi

, Antonio Fernández
, Ernesto Jiménez
, Pilar Manzano, Michel Raynal:
A Methodological Construction of an Efficient Sequentially Consistent Distributed Shared Memory. 1523-1534 - Michael R. Wetherfield:

Personal Recollections of Programming DEUCE in the Late 1950s. 1535-1549
Volume 53, Number 10, December 2010
- You-Chiun Wang, Tomoaki Ohtsuki

, Athanasios V. Vasilakos
, Ashutosh Sabharwal, Yuh-Shyan Chen
, Yu-Chee Tseng:
Algorithms, Protocols and Future Applications of Wireless Sensor Networks. 1551-1552 - Orhan Dagdeviren

, Kayhan Erciyes:
Graph Matching-Based Distributed Clustering and Backbone Formation Algorithms for Sensor Networks. 1553-1575 - Thanassis Giannetsos

, Tassos Dimitriou, Ioannis Krontiris, Neeli R. Prasad:
Arbitrary Code Injection through Self-propagating Worms in Von Neumann Architecture Devices. 1576-1593 - Yuan Zhang, Lichun Bao, Shih-Hsien Yang, Max Welling, Di Wu

:
Localization Algorithms for Wireless Sensor Retrieval. 1594-1605 - Aaron B. Kiely, Mingsen Xu, Wen-Zhan Song

, Renjie Huang, Behrooz A. Shirazi:
Adaptive Linear Filtering Compression on Realtime Sensor Networks. 1606-1620 - Chih-Wei Yi

, Peng-Jun Wan, Chao-Min Su, Chen-Wei Huang:
The Critical Grid Size and Transmission Radius for Local-Minimum-Free Grid Routing in Wireless Ad Hoc and Sensor Networks. 1621-1631 - Meng Zheng, Wei Liang, Haibin Yu, Yang Xiao

:
Cross Layer Optimization for Energy-Constrained Wireless Sensor Networks: Joint Rate Control and Routing. 1632-1642 - Long Cheng, Yimin Chen, Canfeng Chen, Jian Ma, Lei Shu

, Athanasios V. Vasilakos
, Naixue Xiong:
Efficient Query-Based Data Collection for Mobile Wireless Monitoring Applications. 1643-1657 - Jaime Lloret, Sandra Sendra

, Hugo Coll, Miguel Garcia:
Saving Energy in Wireless Local Area Sensor Networks. 1658-1673 - Pruet Boonma

, Junichi Suzuki:
Moppet: A Model-Driven Performance Engineering Framework for Wireless Sensor Networks. 1674-1690
- Yu-Ying Shih, Daniel Chao:

Sequence of Control in S3PMR. 1691-1703 - Chung-Ming Huang, Ming-Sian Lin, Lik-Hou Chang:

The Design of Mobile Concurrent Multipath Transfer in Multihomed Wireless Mobile Networks. 1704-1718 - Jianxin Liao, Qi Qi, Xiaomin Zhu, Yufei Cao, Tonghong Li

:
Enhanced IMS Handoff Mechanism for QoS Support over Heterogeneous Network. 1719-1737 - Maria Petrou, Marco Elio Tabacchi, Roberta Piroddi

:
Networks of Concepts and Ideas. 1738-1751 - Jon Crowcroft

:
Internet Failures: an Emergent Sea of Complex Systems and Critical Design Errors? 1752-1757 - Manfred Broy:

A Logical Basis for Component-Oriented Software and Systems Engineering. 1758-1782 - Daniel Y. Chao:

Fewer Monitors and More Efficient Controllability for Deadlock Control in S3PGR2 (Systems of Simple Sequential Processes with General Resource Requirements). 1783-1798

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














