


default search action
The Computer Journal, Volume 57
Volume 57, Number 1, January 2014
- Reinaldo A. Vallejos C., José M. Martínez V.:

A Fast Transformation of Markov Chains and Their Respective Steady-State Probability Distributions. 1-11 - Artem Polyvyanyy

, Luciano García-Bañuelos
, Dirk Fahland
, Mathias Weske:
Maximal Structuring of Acyclic Process Models. 12-35 - Juan de Lara

, Esther Guerra
, Ruth Cobos
, Jaime Moreno-Llorena
:
Extending Deep Meta-Modelling for Practical Model-Driven Engineering. 36-58 - Arnold L. Rosenberg:

Region Management by Finite-State Robots. 59-72 - Michel A. Reniers

, Rob Schoren, Tim A. C. Willemse
:
Results on Embeddings Between State-Based and Event-Based Systems. 73-92 - Jinn-Shyong Yang, Jou-Ming Chang

:
Optimal Independent Spanning Trees on Cartesian Product of Hybrid Graphs. 93-99 - Iván Cores

, Gabriel Rodríguez
, Patricia González
, María J. Martín
:
Failure Avoidance in MPI Applications Using an Application-Level Approach. 100-114 - Yongjian Li, Naiju Zeng, William N. N. Hung, Xiaoyu Song:

Combining Symmetry Reduction with Generalized Symbolic Trajectory Evaluation. 115-128 - K. Subramani

, James Worthington:
On Certifying Instances of Zero-Clairvoyant Scheduling. 129-137 - Alev Mutlu, Pinar Senkul

:
Improving Hit Ratio of ILP-based Concept Discovery System with Memoization. 138-153 - Kewen Liao

, Hong Shen:
LP-Based Approximation Algorithms for Reliable Resource Allocation. 154-164 - Oana Agrigoroaiei, Gabriel Ciobanu

:
Rewriting Systems Over Indexed Multisets. 165-179
Volume 57, Number 2, February 2014
- Jongsung Kim, Bo Hong, Naveen K. Chilamkurti:

Advanced Computer Technologies and Applications in Grid and Cloud Computing. 181-182 - Haibin Zhai, Albert K. Wong

, Hai Jiang, Yi Sun, Jun Li, Zhongcheng Li:
A Node-Link-Based P2P Cache Deployment Algorithm in ISP Networks. 183-194 - Ahmed Sallam, Kenli Li:

A Multi-objective Virtual Machine Migration Policy in Cloud Systems. 195-204 - Aun Irtaza, M. Arfan Jaffar, Muhammad Tariq Mahmood

:
Semantic Image Retrieval in a Grid Computing Environment Using Support Vector Machines. 205-216 - Hong-Chang Lee, Jong-Eun Park, Myung-Joon Lee:

C3ware: A Middleware Supporting Collaborative Services over Cloud Storage. 217-224 - Lin Yao, Guowei Wu, Jiankang Ren, Yanwei Zhu, Ying Li:

Guaranteeing Fault-Tolerant Requirement Load Balancing Scheme Based on VM Migration. 225-232 - Joon-Sang Park

, Seung Jun Baek, Kyogu Lee:
A Highly Parallelized Decoder for Random Network Coding leveraging GPGPU. 233-240 - Ayad Ibrahim, Hai Jin, Ali A. Yassin

, Deqing Zou, Peng Xu:
Towards Efficient Yet Privacy-Preserving Approximate Search in Cloud Computing. 241-254 - Hong-Yi Chang, Hsin-Che Lu, Yu-Huei Huang, Yuan-Wei Lin, Yih-Jou Tzang:

Novel Auction Mechanism with Factor Distribution Rule for Cloud Resource Allocation. 255-262 - Yong Tae Park, Pranesh Sthapit

, Jae-Young Pyun:
Energy Efficient Data Fragmentation for Ubiquitous Computing. 263-272 - Juan Caubet

, Carlos Gañán
, Oscar Esparza
, Jose L. Muñoz
, Jorge Mata-Díaz, Juanjo Alins:
Certificate Revocation List Distribution System for the KAD Network. 273-280 - Neeraj Kumar

, Naveen K. Chilamkurti, Sherali Zeadally, Young-Sik Jeong:
Achieving Quality of Service (QoS) Using Resource Allocation and Adaptive Scheduling in Cloud Computing with Grid Support. 281-290 - Zhipiao Liu, Shangguang Wang

, Qibo Sun, Hua Zou, Fangchun Yang:
Cost-Aware Cloud Service Request Scheduling for SaaS Providers. 291-301 - Hwamin Lee

, Doosoon Park:
A Grid Service-Based Virtual Screening System. 302-307 - Tien-Dung Nguyen, An Thuy Nguyen, Man Doan Nguyen, Nguyen Van Mui, Eui-Nam Huh:

An Improvement of Resource Allocation for Migration Process in Cloud Environment. 308-318
- Daniel Piso Fernandez, Javier D. Bruguera:

Obtaining Accurate Error Expressions and Bounds for Floating-Point Multiplicative Algorithms. 319-331 - Antoine Bossard, Keiichi Kaneko

:
Set-to-Set Disjoint Paths Routing in Hierarchical Cubic Networks. 332-337
Volume 57, Number 3, March 2014
- Hyun-Chul Kim, Jaewook Lee, Daewon Lee:

Transductive Gaussian Processes with Applications to Object Pose Estimation. 339-346 - Fabrizio Riguzzi

:
Speeding Up Inference for Probabilistic Logic Programs. 347-363 - Linjia Sun, Xiaohui Liang

, Qinping Zhao:
Recursive Templates Segmentation and Exemplars Matching for Human Parsing. 364-377 - Beaux Sharifi, David I. Inouye

, Jugal K. Kalita:
Summarization of Twitter Microblogs. 378-402 - Rachel Chasin, Daryl Woodward, Jeremy Witmer, Jugal Kalita:

Extracting and Displaying Temporal and Geospatial Entities from Articles on Historical Events. 403-426 - John Reeder, Michael Georgiopoulos:

Generative Neural Networks for Multi-task Life-Long Learning. 427-450 - Pitipong Chanloha, Jatuporn Chinrungrueng, Wipawee Usaha, Chaodit Aswakul

:
Cell Transmission Model-Based Multiagent Q-Learning for Network-Scale Signal Control With Transit Priority. 451-468 - Ahmed Kheiri

, Ender Özcan
:
Constructing Constrained-Version of Magic Squares Using Selection Hyper-heuristics. 469-479
Volume 57, Number 4, April 2014
- Fuchun Guo

, Yi Mu, Willy Susilo
, Vijay Varadharajan
:
Server-Aided Signature Verification for Lightweight Devices. 481-493 - Salman Niksefat, Babak Sadeghiyan, Payman Mohassel, Seyed Saeed Sadeghian:

ZIDS: A Privacy-Preserving Intrusion Detection System Using Secure Two-Party Computation Protocols. 494-509 - Juan Manuel González Nieto, Mark Manulis

, Dongdong Sun:
Forward-Secure Hierarchical Predicate Encryption. 510-536 - Monowar H. Bhuyan, Hirak Jyoti Kashyap, Dhruba Kumar Bhattacharyya

, Jugal K. Kalita:
Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions. 537-556 - Tao Han, Weiming Zhang, Chao Wang, Nenghai Yu, Yue-Fei Zhu:

Adaptive ±1 Steganography in Extended Noisy Region. 557-566 - Shengke Zeng, Shaoquan Jiang:

A New Framework for Conditionally Anonymous Ring Signature. 567-578 - Jinguang Han

, Willy Susilo
, Yi Mu, Jun Yan
:
Attribute-Based Data Transfer with Filtering Scheme in Cloud Computing. 579-591 - Limin Shen, Futai Zhang, Yinxia Sun:

Efficient Revocable Certificateless Encryption Secure in the Standard Model. 592-601 - Prasanta Gogoi, D. K. Bhattacharyya

, Bhogeswar Borah
, Jugal K. Kalita:
MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method. 602-623 - Faezeh Sadat Babamir

, Ali Norouzi:
Achieving Key Privacy and Invisibility for Unattended Wireless Sensor Networks in Healthcare. 624-635 - Huaqun Wang:

Insecurity of 'Improved Anonymous Multi-Receiver Identity-Based Encryption'. 636-638
Volume 57, Number 5, May 2014
- Joshua Amavi, Béatrice Bouchou, Agata Savary:

On Correcting XML Documents with Respect to a Schema. 639-674 - Rekai González-Alberquilla, Fernando Emmanuel Frati

, Luis Piñuel, Karin Strauss, Luis Ceze:
Data Race Detection with Minimal Hardware Support. 675-692 - Victor Khomenko, Andrey Mokhov:

Direct Construction of Complete Merged Processes. 693-707 - Chao Zhu, Qiang Zhu, Calisto Zuzarte:

Optimization of Monotonic Linear Progressive Queries Based on Dynamic Materialized Views. 708-730 - Kuei-Hao Chen, Guan-Shieng Huang, Richard Chia-Tung Lee:

Bit-Parallel Algorithms for Exact Circular String Matching. 731-743 - Lijun Lun, Xin Chi, Hui Xu:

The Relationship between Forward Slicing and Backward Slicing for Software Architecture. 744-758 - Patrick J. Graydon, Iain Bate:

Realistic Safety Cases for the Timing of Systems. 759-774 - Rada Chirkova:

Combined-Semantics Equivalence and Minimization of Conjunctive Queries. 775-795
Volume 57, Number 6, June 2014
- Juan A. Rodríguez-Aguilar

:
Special Issue on Optimization in Multi-Agent Systems: Guest Editor's Introduction. 797-798 - Jesús Cerquides

, Alessandro Farinelli
, Pedro Meseguer, Sarvapali D. Ramchurn
:
A Tutorial on Optimization for Multi-Agent Systems. 799-824 - Sejoon Lim, Daniela Rus:

Congestion-Aware Multi-Agent Path Planning: Distributed Algorithm and Applications. 825-839 - Hala Mostafa, Partha P. Pal

, Patrick Hurley:
Message Passing for Distributed QoS-Security Tradeoffs. 840-855 - Meritxell Vinyals, Kathryn S. Macarthur, Alessandro Farinelli

, Sarvapali D. Ramchurn
, Nicholas R. Jennings
:
A Message-Passing Approach to Decentralized Parallel Machine Scheduling. 856-874 - Archie C. Chapman

, David S. Leslie
, Alex Rogers, Nicholas R. Jennings
:
Learning in Unknown Reward Games: Application to Sensor Networks. 875-892 - Jason Tsai, Thanh Hong Nguyen, Nicholas Weller, Milind Tambe:

Game-Theoretic Target Selection in Contagion-Based Domains. 893-905 - Christian Bessiere, Ismel Brito, Patricia Gutierrez, Pedro Meseguer:

Global Constraints in Distributed Constraint Satisfaction and Optimization. 906-923
- Faisal Iradat

, Sergey D. Andreev
, Sayeed Ghani, Syed Irfan Nabi, Waseem Arain:
Revisiting Assumptions in Backoff Process Modeling and Queueing Analysis of Wireless Local Area Networks (WLANs). 924-938 - Shih-Chang Huang

:
D2PS: Direction and Distance Positioning System in Wireless Networks. 939-951
Volume 57, Number 7, July 2014
Original Articles
- Shan Ling, Weidong Chen:

Node-to-Set Disjoint Paths in Biswapped Networks. 953-967 - Gloria Ortega

, Francisco Vázquez, Inmaculada García
, Ester M. Garzón:
FastSpMM: An Efficient Library for Sparse Matrix Matrix Product on GPUs. 968-979 - Sushanta Karmakar, A. Chandrakanth Reddy:

An Improved Algorithm for Distributed Trigger Counting in Ring. 980-986 - Haitao Dan, Robert M. Hierons

:
The Oracle Problem When Testing from MSCs. 987-1001 - Anthony Danalis, Piotr Luszczek, Gabriel Marin, Jeffrey S. Vetter, Jack J. Dongarra:

BlackjackBench: Portable Hardware Characterization with Automated Results' Analysis. 1002-1016 - Pablo Llopis, Javier García Blas

, Florin Isaila, Jesús Carretero
:
Survey of Energy-Efficient and Power-Proportional Storage Systems. 1017-1032 - Hui Kong, Xiaoyu Song, Dong Han, Ming Gu, Jiaguang Sun:

A New Barrier Certificate for Safety Verification of Hybrid Systems. 1033-1045 - Frank Zeyda

, Lalkhumsanga Lalkhumsanga, Ana Cavalcanti
, Andy J. Wellings:
Circus Models for Safety-Critical Java Programs. 1046-1091 - Jiufeng Zhou, Lixin Han, Yuan Yao, Xiaoqin Zeng, Feng Xu:

A Parallel Approach to Link Sign Prediction in Large-Scale Online Social Networks. 1092-1104 - Janardan Misra:

A Calculus of Incomplete Fusions. 1105-1116
Volume 57, Number 8, August 2014
Original Articles
- Dilek Demirbas, Ismail Akturk, Özcan Özturk, Ugur Güdükbay:

Application-Specific Heterogeneous Network-on-Chip Design. 1117-1131 - Arta Babaee, Moez Draief:

Distributed Multivalued Consensus. 1132-1140 - Libo Huang, Zhiying Wang, Nong Xiao, Qiang Dou:

Efficient Utilization of SIMD Engines for General-Purpose Processors. 1141-1154 - David Poulain, Joanna Tomasik, Marc-Antoine Weisser, Dominique Barth:

A Packing Problem Approach to Lightpath Assignment in an Optical Ring. 1155-1166 - Waheed Yasin, Hamidah Ibrahim, Nur Izura Udzir, Nor Asilah Wati Abdul Hamid

:
An Overview of Media Streams Caching in Peer-to-Peer Systems. 1167-1177 - Yan Cui, Yingxin Wang, Yu Chen, Yuanchun Shi:

Mitigating Resource Contention on Multicore Systems via Scheduling. 1178-1194 - Wassim Ramadan, Eugen Dedu, Julien Bourgeois:

Oscillation-Free Video Adaptation at Application Layer on Server Side and Experiments Using DCCP. 1195-1210 - Pingshan Liu, Shengzhong Feng, Guimin Huang, Jianping Fan:

Bandwidth-Availability-Based Replication Strategy for P2P VoD Systems. 1211-1229 - Ahmed Ouqour, Younes Jabrane

, Brahim Ait Es Said, Abdellah Ait Ouahman:
PAPR Reduction in OFDM via Active Constellation Extension-Projection Onto Convex Sets Combined with Particle Swarm Optimization. 1230-1237 - Marjan Radi, Behnam Dezfouli

, Kamalrulnizam Abu Bakar
, Shukor Abd Razak
, Malrey Lee:
Network Initialization in Low-Power Wireless Networks: A Comprehensive Study. 1238-1261 - Chathuranga Widanapathirana, Jonathan C. Li

, Milosh V. Ivanovich, Paul G. Fitzpatrick, Y. Ahmet Sekercioglu
:
Adaptive Statistical Signatures of Network Soft-Failures in User Devices. 1262-1278
Volume 57, Number 9, September 2014
Special Focus on Social Computing and its Applications
- Guandong Xu, Aoying Zhou, Nitin Agarwal:

Special Issue on Social Computing and its Applications. 1279-1280 - Ming Gao, Cheqing Jin, Weining Qian, Xueqing Gong:

Real-time and Personalized Search over a Microblogging System. 1281-1295 - Michal Szczerbak, François Toutain, Ahmed Bouabdallah, Jean-Marie Bonnin:

KRAMER: New Social Medium Based on Collaborative Recognition of Important Situations. 1296-1317 - Hongbo Chen, Jungang Xu, Ben He:

Automated Essay Scoring by Capturing Relative Writing Quality. 1318-1330 - Jianshan Sun, Jian Ma

, Zhiying Liu, Yajun Miao:
Leveraging Content and Connections for Scientific Article Recommendation in Social Computing Contexts. 1331-1342 - Zhiang Wu, Jie Cao, Junjie Wu, Youquan Wang, Chunyang Liu:

Detecting Genuine Communities from Large-Scale Social Networks: A Pattern-Based Method. 1343-1357 - Longbing Cao

:
Non-IIDness Learning in Behavioral and Social Data. 1358-1370
- Mostafa Haghir Chehreghani

:
An Efficient Algorithm for Approximate Betweenness Centrality Computation. 1371-1382 - Abraham Varghese

, Kannan Balakrishnan, Reji Rajan Varghese, Joseph S. Paul:
Content-Based Image Retrieval of Axial Brain Slices Using a Novel LBP with a Ternary Encoding. 1383-1394 - Huiyu Zhou

, Kotaro Hirasawa:
Traffic Density Prediction with Time-Related Data Mining using Genetic Network Programming. 1395-1414 - Haoran Xie

, Qing Li
, Xudong Mao, Xiaodong Li, Yi Cai, Qianru Zheng:
Mining Latent User Community for Tag-Based and Content-Based Search in Social Media. 1415-1430 - Qibin Duan

, Dirk P. Kroese
, Tim J. Brereton, Aaron Spettl
, Volker Schmidt:
Inverting Laguerre Tessellations. 1431-1440
Volume 57, Number 10, October 2014
Original Articles
- Chin-Chen Chang, Ting-Fang Cheng:

A Secure Diverse Ticket-Sale System in a Distributed Cloud Environment. 1441-1459 - Lourdes López-García

, Luis J. Dominguez Perez
, Francisco Rodríguez-Henríquez:
A Pairing-Based Blind Signature E-Voting Scheme. 1460-1471 - Hui Cui

, Yi Mu, Man Ho Au
:
Signcryption Secure Against Linear Related-Key Attacks. 1472-1483 - Duygu Karaoglan, Albert Levi

:
A Survey on the Development of Security Mechanisms for Body Area Networks. 1484-1512 - Long Ngo, Colin Boyd, Juan Manuel González Nieto:

Automated Proofs for Computational Indistinguishability. 1513-1536 - Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao

:
CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof System. 1537-1556 - Ren-Junn Hwang, Yu-Kai Hsiao:

Anonymous Routing Protocol Based on Weil Pairing for Wireless Mesh Networks. 1557-1569 - Shaoquan Jiang:

On Unconditional ϵ-Security of Private Key Encryption. 1570-1579 - Chang Xu

, Hua Guo, Zhoujun Li, Yi Mu:
Affiliation-Hiding Authenticated Asymmetric Group Key Agreement Based on Short Signature. 1580-1590
Volume 57, Number 11, November 2014
- Joaquim Gabarró, Maria J. Serna

, Alan Stewart:
Analysing Web-Orchestrations Under Stress Using Uncertainty Profiles. 1591-1615 - Tiziana Calamoneri

, Antonio Frangioni
, Blerina Sinaimeri
:
Pairwise Compatibility Graphs of Caterpillars. 1616-1623 - Daniel Lemire, Owen Kaser:

Strongly Universal String Hashing is Fast. 1624-1638 - Chia-Lin Lee, Tzong-Jye Liu:

A Self-Stabilizing Distance-2 Edge Coloring Algorithm. 1639-1648 - Billur Barshan

, Murat Cihan Yüksek:
Recognizing Daily and Sports Activities in Two Open Source Machine Learning Environments Using Body-Worn Sensor Units. 1649-1667 - António Leslie Bajuelos, Sergey Bereg

, Ana Mafalda Martins
:
Guarding Orthogonal Galleries with Rectangular Rooms. 1668-1673 - Rui Zhou

, Chengfei Liu
, Jianxin Li
, Junhu Wang
, Jeffrey Xu Yu:
Evaluating Irredundant Maximal Contained Rewritings for XPath Queries on Views. 1674-1692 - Peter G. Harrison

, Andrea Marin:
Product-Forms in Multi-Way Synchronizations. 1693-1710 - Sheau-Ru Tong, Yuan-Tse Yu:

Adaptation of Near-Perfect Packet-Level FEC Interleaving in Mobile Media Streaming. 1711-1722 - Qingting Wei, Jihong Guan, Shuigeng Zhou, Xin Wang:

A New and Effective Approach to GML Documents Compression. 1723-1740 - David Novak, Pavel Zezula:

Performance Study of Independent Anchor Spaces for Similarity Searching. 1741-1755 - Xu Yang, Deyuan Guo, Hu He, Haijing Tang, Yanjun Zhang

:
An Implementation of Message-Passing Interface over VxWorks for Real-Time Embedded Multi-Core Systems. 1756-1764
Volume 57, Number 12, December 2014
Original Articles
- Raed T. Al-Zubi, Mohammed Hawa

, Ghazi M. Al-Sukkar, Khalid A. Darabkh
:
Markov-Based Distributed Approach for Mitigating Self-Coexistence Problem in IEEE 802.22 WRANs. 1765-1775 - Hong-Yi Chang, Chih-Chun Lai, Yuan-Wei Lin:

A Fast SVC-Based Channel-Recommendation System for an IPTV on a Cloud and P2P Hybrid Platform. 1776-1789 - Sain Saginbekov

, Arshad Jhumka:
Towards Efficient Stabilizing Code Dissemination in Wireless Sensor Networks. 1790-1816 - Hwangnam Kim, Hwantae Kim, Wonkyun Park, Mungyu Bae:

Disabling Misbehavior with Traffic Constraints in WLANs. 1817-1833 - Heejung Yang, Chin-Wan Chung:

Efficient Iceberg Query Processing in Sensor Networks. 1834-1851 - Orhan Dagdeviren

, Vahid Khalilpour Akram:
An Energy-Efficient Distributed Cut Vertex Detection Algorithm for Wireless Sensor Networks. 1852-1869 - Marco Beccuti

, Giuliana Franceschinis, Daniele Codetta Raiteri
, Serge Haddad:
Computing Optimal Repair Strategies by Means of NdRFT Modeling and Analysis. 1870-1892 - Prem Nath, Chiranjeev Kumar

:
Mobility Management Scheme for Fixed Mobility Pattern Mobile Users in IPv4 Networks. 1893-1911 - V. S. Felix Enigo

, V. Ramachandran:
Enhancing the Scalability of Non-Spatial Concurrent Queries in Wireless Sensor Networks. 1912-1924

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














