


default search action
Journal of Computer and System Sciences, Volume 81
Volume 81, Number 1, February 2015
- Jia Hu, Seetharami Seelam, Laurent Lefèvre:

Introduction to special issue on High Performance Computing Architectures and Systems. 1-2 - Xiaofei Liao, Hai Jin, Shizhan Yu, Yu Zhang:

A novel memory allocation scheme for memory energy reduction in virtualization environment. 3-15 - Hervé Paulino

, Eduardo Marques:
Heterogeneous programming with Single Operation Multiple Data. 16-37 - Seren Soner, Can C. Özturan

:
Integer programming based heterogeneous CPU-GPU cluster schedulers for SLURM resource manager. 38-56 - Jianliang Ma, Licheng Yu, John M. Ye, Tianzhou Chen:

MCMG simulator: A unified simulation framework for CPU and graphic GPU. 57-71 - Imen Chakroun, Nouredine Melab:

Towards a heterogeneous and adaptive parallel Branch-and-Bound algorithm. 72-84 - Hussain Al-Aqrabi

, Lu Liu
, Richard Hill
, Nick Antonopoulos:
Cloud BI: Future of business intelligence in the Cloud. 85-96 - Mustafa Bani Khalaf, Ahmed Yassin Al-Dubai

, Geyong Min:
New efficient velocity-aware probabilistic route discovery schemes for high mobility Ad hoc networks. 97-109 - Jianjiang Wang, Xiaomin Zhu, Laurence T. Yang, Jianghan Zhu, Manhao Ma:

Towards dynamic real-time scheduling for multiple earth observation satellites. 110-124 - Minghui Zheng, Yang Xiang

, Hui-Hua Zhou:
A strong provably secure IBE scheme without bilinear map. 125-131 - Wei Li, Demetres D. Kouvatsos, Rod J. Fretwell:

Towards time domain invariant QoS measures for queues with correlated traffic. 132-144 - Yuwei Xu, Jeremiah D. Deng

, Mariusz Nowostawski, Martin K. Purvis:
Optimized routing for video streaming in multi-hop wireless networks using analytical capacity estimation. 145-157
- Petra Berenbrink, Colin Cooper, Tom Friedetzky

, Tobias Friedrich, Thomas Sauerwald:
Randomized diffusion for indivisible loads. 159-185 - Eun Jung Kim, Christophe Paul

, Geevarghese Philip:
A single-exponential FPT algorithm for the K4-minor cover problem. 186-207 - Yanhui Zhai, Deyu Li

, Kaishe Qu:
Decision implication canonical basis: a logical perspective. 208-218 - Andrea Clementi, Riccardo Silvestri:

Parsimonious flooding in geometric random-walks. 219-233 - Evangelos Bampas

, Davide Bilò
, Guido Drovandi
, Luciano Gualà
, Ralf Klasing, Guido Proietti
:
Network verification via routing table queries. 234-248 - Juha Kortelainen

:
On simple generators of recursively enumerable languages. 249-257 - Christel Baier

, Marcus Daum, Benjamin Engel, Hermann Härtig, Joachim Klein
, Sascha Klüppelholz
, Steffen Märcker, Hendrik Tews, Marcus Völp
:
Locks: Picking key methods for a scalable quantitative analysis. 258-287 - Tomás Brázdil, Stefan Kiefer, Antonín Kucera

, Ivana Hutarová Vareková
:
Runtime analysis of probabilistic programs with unbounded recursion. 288-310 - Xi Chen, Martin E. Dyer

, Leslie Ann Goldberg, Mark Jerrum, Pinyan Lu
, Colin McQuillan, David Richerby
:
The complexity of approximating conservative counting CSPs. 311-329 - Leslie Ann Goldberg, Mark Jerrum, Colin McQuillan:

Approximating the partition function of planar two-state spin systems. 330-358
Volume 81, Number 2, March 2015
- Daowen Qiu, Lvzhou Li, Paulo Mateus

, Amílcar Sernadas
:
Exponentially more concise quantum recognition of non-RMM regular languages. 359-375 - Xuechong Guan

:
Two Cartesian closed categories of information algebras. 376-382 - Alberto Lafuente, Mikel Larrea

, Iratxe Soraluze Arriola
, Roberto Cortiñas
:
Communication-optimal eventually perfect failure detection in partially synchronous systems. 383-397 - Minati De

, Subhas C. Nandy, Sasanka Roy:
Prune-and-search with limited workspace. 398-414 - Ilkka Törmä:

A uniquely ergodic cellular automaton. 415-442 - Simone Bova, Hubie Chen:

The complexity of equivalence, entailment, and minimization in existential positive logic. 443-457 - Rafael Trapani Possignolo, Cíntia Borges Margi

, Paulo S. L. M. Barreto:
Quantum-assisted QD-CFS signatures. 458-467 - Juha Honkala:

Products of matrices and recursively enumerable sets. 468-472 - Petr Sosík

, Ludek Cienciala
:
A limitation of cell division in tissue P systems by PSPACE. 473-484
Volume 81, Number 3, May 2015
- Quan Z. Sheng

, Elhadi M. Shakshuki
:
Ambient and context-aware services. 485-486 - Nabil Sahli

, Nafaâ Jabeur, Mohamad Badra:
Agent-based framework for sensor-to-sensor personalization. 487-495 - Mohamed Amine Abid, Abdelfettah Belghith

, Khalil Drira:
SARP: A dynamically readjustable period size proactive routing protocol for MANETs. 496-515 - Tayseer Alkhdour

, Elhadi M. Shakshuki
, Uthman A. Baroudi
, Shokri Z. Selim
:
A cross layer optimization modeling for a periodic WSN application. 516-532 - Jian Yu

, Quan Z. Sheng
, Joshua K. Y. Swee, Jun Han, Chengfei Liu
, Talal H. Noor:
Model-driven development of adaptive web service processes with aspects and rules. 533-552 - Tyler J. Gunn, John Anderson:

Dynamic heterogeneous team formation for robotic urban search and rescue. 553-567 - Luk Knapen

, Irith Ben-Arroyo Hartman, Daniel Keren, Ansar-Ul-Haque Yasar
, Sungjin Cho
, Tom Bellemans
, Davy Janssens
, Geert Wets
:
Scalability issues in optimal assignment for carpooling. 568-584 - Yoann Lebrun, Emmanuel Adam

, René Mandiau
, Christophe Kolski
:
A model for managing interactions between tangible and virtual agents on an RFID interactive tabletop: Case study in traffic simulation. 585-598 - Liang Huai Yang

, Yanzhu Zhao, Yulei Fan, Yihua Zhu, Jian Yu
:
Peak power modeling for join algorithms in DBMS. 599-614
Volume 81, Number 4, June 2015
- Qi Shi

, Ning Zhang
, Madjid Merabti:
Fair signature exchange via delegation on ubiquitous networks. 615-631 - Gábor Erdélyi, Michael R. Fellows, Jörg Rothe, Lena Schend:

Control complexity in Bucklin and fallback voting: A theoretical analysis. 632-660 - Gábor Erdélyi, Michael R. Fellows, Jörg Rothe, Lena Schend:

Control complexity in Bucklin and fallback voting: An experimental analysis. 661-670 - Eric J. Schwabe, Ian M. Sutherland:

Optimizing large data transfers in parity-declustered data layouts. 671-691 - Noga Alon, Hagit Attiya

, Shlomi Dolev
, Swan Dubois
, Maria Potop-Butucaru, Sébastien Tixeuil:
Practically stabilizing SWMR atomic memory in message-passing systems. 692-701 - Mark Jerrum, Kitty Meeks

:
The parameterised complexity of counting connected subgraphs and graph motifs. 702-716 - Xun Zhou, Jing He

, Guangyan Huang, Yanchun Zhang:
SVD-based incremental approaches for recommender systems. 717-733 - Lijuan Wang, Jun Shen

, Junzhou Luo:
Facilitating an ant colony algorithm for multi-objective data-intensive service provision. 734-746 - Henning Fernau

, Pinar Heggernes, Yngve Villanger:
A multi-parameter analysis of hard problems on deterministic finite automata. 747-765 - Robert Bredereck, Jiehua Chen, Sepp Hartung, Christian Komusiewicz, Rolf Niedermeier, Ondrej Suchý

:
On explaining integer vectors by few homogeneous segments. 766-782 - Jianghua Zhong, Dongdai Lin:

A new linearization method for nonlinear feedback shift registers. 783-796
Volume 81, Number 5, August 2015
- Dirk Pattinson, Lutz Schröder

:
From the Editors. 797-798 - Samson Abramsky

, Jonathan A. Zvesper:
From Lawvere to Brandenburger-Keisler: Interactive forms of diagonalization and self-reference. 799-812 - Jirí Adámek, Stefan Milius, Lawrence S. Moss, Henning Urbat:

On finitary functors and their presentations. 813-833 - Giorgio Bacci

, Marino Miculan
:
Structural operational semantics for continuous state stochastic transition systems. 834-858 - Bart Jacobs, Alexandra Silva, Ana Sokolova

:
Trace semantics via determinization. 859-879 - Johannes Marti, Yde Venema:

Lax extensions of coalgebra functors and their logic. 880-900 - Pawel Sobocinski

:
Relational presheaves, change of base and weak simulation. 901-910 - Joost Winter, Marcello M. Bonsangue

, Jan J. M. M. Rutten:
Context-free coalgebras. 911-939
Volume 81, Number 6, September 2015
- Anne E. James

:
Optimisation, security, privacy and trust in e-business systems. 941-942
- Goodhead Tomvie Abraham, Anne E. James

, Norlaily Yaacob
:
Priority-grouping method for parallel multi-scheduling in Grid. 943-957 - Ahmad A. Al-Daraiseh

, Eyas El-Qawasmeh, Nazaraf Shah
:
Multi-agent system for energy consumption optimisation in higher education institutions. 958-965 - Chen-Fang Tsai:

Dynamic grey platform for efficient forecasting management. 966-980
- Waleed Bul'ajoul, Anne E. James

, Mandeep Pannu:
Improving network intrusion detection system performance through quality of service configuration and parallel technology. 981-999 - Fran Casino

, Josep Domingo-Ferrer
, Constantinos Patsakis
, Domenec Puig, Agusti Solanas
:
A k-anonymous approach to privacy preserving collaborative filtering. 1000-1011 - Ping Wang, Yu-Shih Wang:

Malware behavioural detection and vaccine development by using a support vector model classifier. 1012-1026 - Shan Chang, Li Lu, Xiaoqiang Liu, Hui Song, Qingsong Yao:

Vulnerability aware graphs for RFID protocol security benchmarking. 1027-1041 - Neeraj Kumar

, Rahat Iqbal
, Sudip Misra, Joel J. P. C. Rodrigues:
An intelligent approach for building a secure decentralized public key infrastructure in VANET. 1042-1058
Volume 81, Number 7, November 2015
- Javier Ignacio Almarza, Santiago Figueira

:
Normality in non-integer bases and polynomial time randomness. 1059-1087
- John Augustine, Gopal Pandurangan

, Peter Robinson, Eli Upfal
:
Distributed agreement in dynamic peer-to-peer networks. 1088-1109 - Qusai Shambour

, Jie Lu
:
An effective recommender system by unifying user and item trust information for B2B applications. 1110-1126 - David A. Cohen, Martin C. Cooper

, Guillaume Escamocher, Stanislav Zivný:
Variable and value elimination in binary constraint satisfaction via forbidden patterns. 1127-1143 - Lvzhou Li, Yuan Feng

:
On hybrid models of quantum finite automata. 1144-1158 - Jhih-Hong Ye, Biing-Feng Wang:

On the minmax regret path median problem on trees. 1159-1170 - John Fearnley, Doron A. Peled, Sven Schewe

:
Synthesis of succinct systems. 1171-1193 - Susanne Albers, Antonios Antoniadis, Gero Greiner:

On multi-processor speed scaling with migration. 1194-1209 - Cristina G. Fernandes

, Maya Jakobine Stein
:
Geodesic stability for memoryless binary long-lived consensus. 1210-1220 - Atle Refsdal, Ragnhild Kobro Runde, Ketil Stølen:

Stepwise refinement of sequence diagrams with soft real-time constraints. 1221-1251 - Sylvain Salvati:

MIX is a 2-MCFL and the word problem in Z2 is captured by the IO and the OI hierarchies. 1252-1277 - Leonid Libkin

, Tony Tan, Domagoj Vrgoc:
Regular expressions for data words. 1278-1297 - Florin Manea, Mike Müller, Dirk Nowotka

:
Cubic patterns with permutations. 1298-1310 - Christer Bäckström, Peter Jonsson, Sebastian Ordyniak

, Stefan Szeider
:
A complete parameterized complexity analysis of bounded planning. 1311-1332 - Pierluigi Crescenzi

, Daniel Gildea, Andrea Marino
, Gianluca Rossi
, Giorgio Satta
:
Synchronous context-free grammars and optimal linear parsing strategies. 1333-1356 - Gábor Ivanyos

, Marek Karpinski, Youming Qiao
, Miklos Santha:
Generalized Wong sequences and their applications to Edmonds' problems. 1373-1386 - George Barmpalias

, Rodney G. Downey, Michael McInerney:
Integer valued betting strategies and Turing degrees. 1387-1412
- Tianrong Lin

:
Corrigendum to "Another approach to the equivalence of measure-many one-way quantum infinite automata and its application" [J. Comput. Syst. Sci. 78(3) (2012) 807-821]. 1413
Volume 81, Number 8, December 2015
- Tomoya Enokido, Leonard Barolli, Makoto Takizawa

:
Journal of Computer and System Sciences Special Issue on Reliability and Optimization for Wireless Networking and Cloud Computing. 1415-1416 - Fatos Xhafa, Christian Sánchez, Admir Barolli, Makoto Takizawa

:
Solving mesh router nodes placement problem in Wireless Mesh Networks by Tabu Search algorithm. 1417-1428 - Marcelo Luiz Brocardo, Issa Traoré, Isaac Woungang:

Authorship verification of e-mail and tweet messages applied for continuous authentication. 1429-1440 - Shigenari Nakamura

, Dilawaer Duolikun, Makoto Takizawa
:
Read-abortion (RA) based synchronization protocols to prevent illegal information flow. 1441-1451 - José Luis Hernández-Ramos

, María Victoria Moreno Cano
, Jorge Bernal Bernabé
, Dan García-Carrillo
, Antonio F. Skarmeta
:
SAFIR: Secure access framework for IoT-enabled services on smart buildings. 1452-1463 - Arcangelo Castiglione

, Francesco Palmieri
, Ugo Fiore
, Aniello Castiglione
, Alfredo De Santis
:
Modeling energy-efficient secure communications in multi-mode wireless mobile devices. 1464-1478 - Amin M. Khan

, Ümit Cavus Büyüksahin, Felix Freitag
:
Incentive-based resource assignment and regulation for collaborative cloud services in community networks. 1479-1495 - Admir Barolli, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa, Vincenzo Loia:

Node placement for wireless mesh networks: Analysis of WMN-GA system simulation results for different parameters and distributions. 1496-1507 - David Taniar

, J. Wenny Rahayu:
A taxonomy for region queries in spatial databases. 1508-1531 - Jin Li, Xiaofeng Chen, Fatos Xhafa, Leonard Barolli:

Secure deduplication storage systems supporting keyword search. 1532-1541
- Ricardo Garibay-Martínez, Geoffrey Nelissen

, Luis Lino Ferreira
, Luís Miguel Pinho
:
Task partitioning and priority assignment for distributed hard real-time systems. 1542-1555 - Laurent Bulteau

, Guillaume Fertin
, Irena Rusu:
Pancake Flipping is hard. 1556-1574 - Laurent Bienvenu, Rodney G. Downey, André Nies

, Wolfgang Merkle
:
Solovay functions and their applications in algorithmic randomness. 1575-1591 - Verónica Becher

, Olivier Carton, Pablo Ariel Heiber:
Normality and automata. 1592-1613 - Gábor Horváth, Chrystopher L. Nehaniv

:
Length of polynomials over finite groups. 1614-1622 - Laurent Boyer, Martin Delacourt, Victor Poupet, Mathieu Sablik, Guillaume Theyssier:

μ-Limit sets of cellular automata from a computational complexity perspective. 1623-1647 - Emmanuel Jeandel, Pascal Vanier

:
Hardness of conjugacy, embedding and factorization of multidimensional subshifts. 1648-1664 - Marek Karpinski, Michael Lampis, Richard Schmied:

New inapproximability bounds for TSP. 1665-1677 - Radim Belohlávek, Martin Trnecka

:
From-below approximations in Boolean matrix factorization: Geometry and new algorithm. 1678-1697 - Steven Fortune:

Equivalence and generalization in a layered network model. 1698-1714 - Dariusz Dereniowski

, Wieslaw Kubiak, Yori Zwols:
The complexity of minimum-length path decompositions. 1715-1747

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














