


default search action
The Computer Journal, Volume 54
Volume 54, Number 1, January 2011
- Qiang Liu, George A. Constantinides, Konstantinos Masselos, Peter Y. K. Cheung: 
 Compiling C-like Languages to FPGA Hardware: Some Novel Approaches Targeting Data Memory Organization. 1-10
- Mark S. Nixon  , Xin U. Liu, Cem Direkoglu , Xin U. Liu, Cem Direkoglu , David J. Hurley: , David J. Hurley:
 On Using Physical Analogies for Feature and Shape Extraction in Computer Vision. 11-25
- Stefan S. Dantchev: 
 Dynamic Neighbourhood Cellular Automata. 26-30
- Corina Cîrstea  , Alexander Kurz , Alexander Kurz , Dirk Pattinson, Lutz Schröder , Dirk Pattinson, Lutz Schröder , Yde Venema: , Yde Venema:
 Modal Logics are Coalgebraic. 31-41
- Glynn Winskel: 
 Events, Causality and Symmetry. 42-57
- Andreas Bauer, Jan Jürjens, Yijun Yu  : :
 Run-Time Security Traceability for Evolving Systems. 58-87
- Kohei Honda, Nobuko Yoshida  : :
 A Unified Theory of Program Logics: An Approach based on the π-Calculus. 88-107
- Heewan Park, Hyun-il Lim, Seokwoo Choi, Taisook Han: 
 Detecting Common Modules in Java Packages Based on Static Object Trace Birthmark. 108-124
- Sebastián Basterrech  , Samir Mohamed, Gerardo Rubino, Mostafa A. Soliman: , Samir Mohamed, Gerardo Rubino, Mostafa A. Soliman:
 Levenberg - Marquardt Training Algorithms for Random Neural Networks. 125-135
- David F. Hartley: 
 EDSAC at 60 - A Celebration of 60 Years Since the First Program Ran on the EDSAC at Cambridge. 136-138
- David W. Barron: 
 EDSAC: A Programmer Remembers. 139-142
- Doron Swade: 
 Inventing the User: EDSAC in Context. 143-147
- Davide Cavagnino, Albert Werbrouck: 
 An Analysis of Associated Dividends in the DBM Algorithm for Division by Constants Using Multiplication. 148-156
- GuanJun Liu, Changjun Jiang, Daniel Y. Chao: 
 A Necessary and Sufficient Condition for the Liveness of Normal Nets. 157-163
- Jing Dong, Tu Peng, Yajing Zhao: 
 On Instantiation and Integration Commutability of Design Pattern. 164-184
Volume 54, Number 2, February 2011
- Fairouz Kamareddine: 
 Capsule Reviews. 185-186
- Antonio Manzalini, Peter H. Deussen, Septimiu Nechifor, Marco Mamei  , Roberto Minerva , Roberto Minerva , Corrado Moiso, Alfons H. Salden, Tim Wauters, Franco Zambonelli , Corrado Moiso, Alfons H. Salden, Tim Wauters, Franco Zambonelli : :
 Self-optimized Cognitive Network of Networks. 189-196
- Yosi Ben-Asher, Sharoni Feldman, Moran Feldman  : :
 Dynamic Multipath Allocation in Ad Hoc Networks. 197-212
- Giuseppe Anastasi, Eleonora Borgia  , Marco Conti , Marco Conti , Enrico Gregori: , Enrico Gregori:
 A Hybrid Adaptive Protocol for Reliable Data Delivery in WSNs with Multiple Mobile Sinks. 213-229
- Oliviu Ghica, Goce Trajcevski, Peter Scheuermann, Nikolay Valtchanov, Zachary S. Bischof  : :
 Controlled Multi-Path Routing in Sensor Networks Using Bezier Curves. 230-254
- Jywe-Fei Fang: 
 The Edge-Fault-Tolerant Bipancyclicity of the Even k-ary n-cube. 255-262
- David Nicholson: 
 Defence Applications of Agent-Based Information Fusion. 263-273
- Thu-Ha Dao-Thi, Jean-Michel Fourneau, Minh-Anh Tran: 
 Multiple Class Symmetric G-networks with Phase Type Service Times. 274-284
- Lucas Vespa, Ning Weng, Ramaswamy Ramaswamy: 
 MS-DFA: Multiple-Stride Pattern Matching for Scalable Deep Packet Inspection. 285-303
- Mihaela Ulieru: 
 WIRED for Innovation: How Information Technology is Reshaping the Economy. 304-305
Volume 54, Number 3, March 2011
- Alex Rogers: 
 Agent Technologies for Sensor Networks. 307-308
- Ettore Ferranti, Niki Trigoni  : :
 Practical Issues in Deploying Mobile Agents to Explore a Sensor-Instrumented Environment. 309-320
- Dirk Bade, Winfried Lamersdorf: 
 An Agent-Based Event Processing Middleware for Sensor Networks and RFID Systems. 321-331
- Damla Turgut, Ladislau Bölöni: 
 Heuristic Approaches for Transmission Scheduling in Sensor Networks with Multiple Mobile Sinks. 332-344
- Shunichiro Suenaga, Nobukazu Yoshioka  , Shinichi Honiden: , Shinichi Honiden:
 Group Migration by Mobile Agents in Wireless Sensor Networks. 345-355
- Murat Sensoy  , Thao P. Le, Wamberto Weber Vasconcelos , Thao P. Le, Wamberto Weber Vasconcelos , Timothy J. Norman, Alun D. Preece: , Timothy J. Norman, Alun D. Preece:
 Resource Determination and Allocation in Sensor Networks: A Hybrid Approach. 356-372
- Sherine Abdelhak, Rabi S. Chaudhuri, Chandra Sekhar Gurram, Soumik Ghosh, Magdy A. Bayoumi: 
 Energy-Aware Distributed QR Decomposition on Wireless Sensor Nodes. 373-391
- Daniel D. Corkill: 
 Deploying Power-Aware, Wireless Sensor Agents. 392-405
- Edison Pignaton de Freitas  , Tales Heimfarth, Carlos Eduardo Pereira , Tales Heimfarth, Carlos Eduardo Pereira , Armando Morado Ferreira, Flávio Rech Wagner, Tony Larsson: , Armando Morado Ferreira, Flávio Rech Wagner, Tony Larsson:
 Multi-Agent Support in a Middleware for Mission-Driven Heterogeneous Sensor Networks. 406-420
- Andrew Markham  , Niki Trigoni , Niki Trigoni : :
 The Automatic Evolution of Distributed Controllers to Configure Sensor Network Operation. 421-438
- Francesco Aiello, Giancarlo Fortino  , Raffaele Gravina , Raffaele Gravina , Antonio Guerrieri , Antonio Guerrieri : :
 A Java-Based Agent Platform for Programming Wireless Sensor Networks. 439-454
- Meritxell Vinyals, Juan A. Rodríguez-Aguilar  , Jesús Cerquides , Jesús Cerquides : :
 A Survey on Sensor Networks from a Multiagent Perspective. 455-470
- Antony Waldock, David Nicholson: 
 A Framework for Cooperative Control Applied to a Distributed Sensor Network. 471-481
- Partha Mukherjee, Sandip Sen  : :
 Comparing Reputation Schemes for Detecting Malicious Nodes in Sensor Networks. 482-489
- Richard Tynan, Conor Muldoon, Gregory M. P. O'Hare  , Michael J. O'Grady , Michael J. O'Grady : :
 Coordinated Intelligent Power Management and the Heterogeneous Sensing Coverage Problem. 490-502
Volume 54, Number 4, April 2011
- Fairouz Kamareddine: 
 Capsule Reviews. 503-504
- Zuowen Tan: 
 An Off-line Electronic Cash Scheme Based on Proxy Blind Signature. 505-512
- Fuchun Guo  , Yi Mu, Willy Susilo , Yi Mu, Willy Susilo : :
 Short Signatures with a Tighter Security Reduction Without Random Oracles. 513-524
- Qiong Huang, Duncan S. Wong, Guomin Yang  : :
 Heterogeneous Signcryption with Key Privacy. 525-536
- Mehran S. Fallah, Maryam Mouzarani: 
 A Game-based Sybil-resistant Strategy for Reputation Systems in Self-organizing MANETs. 537-548
- Biming Tian, Song Han, Sazia Parvin  , Jiankun Hu , Jiankun Hu , Sajal K. Das , Sajal K. Das : :
 Self-Healing Key Distribution Schemes for Wireless Networks: A Survey. 549-569
- Prasanta Gogoi, D. K. Bhattacharyya  , Bhogeswar Borah , Bhogeswar Borah , Jugal K. Kalita: , Jugal K. Kalita:
 A Survey of Outlier Detection Methods in Network Anomaly Identification. 570-588
- Ender Yüksel, Hanne Riis Nielson  , Flemming Nielson , Flemming Nielson : :
 A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks. 589-601
- Murat Ergun, Albert Levi  , Erkay Savas: , Erkay Savas:
 Increasing Resiliency in Multi-phase Wireless Sensor Networks: Generationwise Key Predistribution Approach. 602-616
- David Taniar  , Maytham Safar , Maytham Safar , Quoc Thai Tran, J. Wenny Rahayu, Jong Hyuk Park: , Quoc Thai Tran, J. Wenny Rahayu, Jong Hyuk Park:
 Spatial Network RNN Queries in GIS. 617-627
- Chien-Lung Chan  : :
 Information Security Risk Modeling Using Bayesian Index. 628-638
Volume 54, Number 5, May 2011
- Fairouz Kamareddine: 
 Capsule Reviews. 639-640
- Jeremy T. Bradley: 
 Computer Performance Evaluation: Preface. 641-642
- Nigel Thomas, Yishi Zhao: 
 Mean value analysis for a class of PEPA models. 643-652
- Gianfranco Balbo, Marco Beccuti  , Massimiliano De Pierro, Giuliana Franceschinis: , Massimiliano De Pierro, Giuliana Franceschinis:
 First Passage Time Computation in Tagged GSPNs with Queue Places. 653-673
- Connie U. Smith, Catalina M. Lladó, Ramón Puigjaner: 
 Model Interchange Format Specifications for Experiments, Output and Results. 674-690
- Abigail S. Lebrecht, Nicholas J. Dingle, William J. Knottenbelt: 
 Analytical and Simulation Modelling of Zoned RAID Systems. 691-707
- Mehmet Serkan Apaydin  , Bülent Çatay, Nicholas Patrick, Bruce Randall Donald: , Bülent Çatay, Nicholas Patrick, Bruce Randall Donald:
 NVR-BIP: Nuclear Vector Replacement using Binary Integer Programming for NMR Structure-Based Assignments. 708-716
- Ender Sevinç, Ahmet Cosar: 
 An Evolutionary Genetic Algorithm for Optimization of Distributed Database Queries. 717-725
- Hamid Sarbazi-Azad, Ahmad Khonsari  , Mohamed Ould-Khaoua: , Mohamed Ould-Khaoua:
 On the Topological Properties of Grid-Based Interconnection Networks: Surface Area and Volume of Radial Spheres. 726-737
- Rifat Benveniste  , Cem Ünsalan , Cem Ünsalan : :
 A Color Invariant for Line Stripe-Based Range Scanners. 738-753
- Marco Bozzano  , Alessandro Cimatti , Alessandro Cimatti , Joost-Pieter Katoen , Joost-Pieter Katoen , Viet Yen Nguyen, Thomas Noll , Viet Yen Nguyen, Thomas Noll , Marco Roveri , Marco Roveri : :
 Safety, Dependability and Performance Analysis of Extended AADL Models. 754-775
- James F. Korsh: 
 Fast Generation of t-ary Trees. 776-785
- Ramon Bertran  , Marc González, Xavier Martorell , Marc González, Xavier Martorell , Nacho Navarro, Eduard Ayguadé , Nacho Navarro, Eduard Ayguadé : :
 Local Memory Design Space Exploration for High-Performance Computing. 786-799
- Murat Ali Bayir, Murat Demirbas, Ahmet Cosar: 
 A Web-Based Personalized Mobility Service for Smartphone Applications. 800-814
- Minhaj Ahmad Khan: 
 Data Cache Prefetching With Dynamic Adaptation. 815-823
- Yen-Ju Chen, Jia Jie Liu  , Yue-Li Wang: , Yue-Li Wang:
 An Optimal Rotation Distance Set. 824-830
- Mark Levene: 
 Search Engines: Information Retrieval in Practice. 831-832
Volume 54, Number 6, June 2011
- Fairouz Kamareddine: 
 Capsule Reviews. 833-835
- Django Armstrong, Karim Djemame  : :
 Performance Issues in Clouds: An Evaluation of Virtual Image Propagation and I/O Paravirtualization. 836-849
- Erol Gelenbe  , Christina Morfopoulou: , Christina Morfopoulou:
 A Framework for Energy-Aware Routing in Packet Networks. 850-859
- Arshad Jhumka, Matthew Leeke, Sambid Shrestha: 
 On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy. 860-874
- Osama Younes  , Nigel Thomas: , Nigel Thomas:
 An SRN Model of the IEEE 802.11 DCF MAC Protocol in Multi-Hop Ad Hoc Networks with Hidden Nodes. 875-893
- Feng Liu, Xiaoyu Song, Qingping Tan, Gang Chen: 
 Formal Analysis of Hybrid Prefix/Carry-Select Arithmetic Systems. 894-904
- Qiang Li, Qinfen Hao, Limin Xiao, Zhoujun Li: 
 An Integrated Approach to Automatic Management of Virtualized Resources in Cloud Environments. 905-919
- Yonghong Xiang, Iain A. Stewart  : :
 A Multipath Analysis of Biswapped Networks. 920-930
- Kalika Suksomboon, Panita Pongpaibool, Yusheng Ji, Chaodit Aswakul  : :
 PC-Nash: QoS Provisioning Framework With Path-Classification Scheme Under Nash Equilibrium. 931-943
- Mustafa K. Gurcan, Hadhrami Ab. Ghani, Jihai Zhou, Anusorn Chungtragarn: 
 Bit Energy Consumption Minimization for Multi-path Routing in Ad Hoc Networks. 944-959
- Stephen A. Jarvis  : :
 UK Performance Engineering Workshop 2010. 960-961
- Jie Yu, Zhoujun Li, Peng Xiao, Chengfang Fang, Jia Xu  , Ee-Chien Chang , Ee-Chien Chang : :
 ID Repetition in Structured P2P Networks. 962-975
- Guangyan Huang, Yanchun Zhang, Jing He  , Jinli Cao , Jinli Cao : :
 Fault Tolerance in Data Gathering Wireless Sensor Networks. 976-987
- A. Sinan Akyurek, Elif Uysal-Biyikoglu  : :
 A Depth-optimal Low-complexity Distributed Wireless Multicast Algorithm. 988-1003
Volume 54, Number 7, July 2011
- Fairouz Kamareddine: 
 Capsule Reviews. 1005-1009
- Alex W. Stedmon, Benjamin Hasseldine, David Rice, Mark Young  , Steve Markham, Michael Hancox, Edward Brickell, Joanna Noble: , Steve Markham, Michael Hancox, Edward Brickell, Joanna Noble:
 'MotorcycleSim': An Evaluation of Rider Interaction with an Innovative Motorcycle Simulator. 1010-1025
- Petr Hnetynka  , Liam Murphy , Liam Murphy , John Murphy: , John Murphy:
 Comparing the Service Component Architecture and Fractal Component Model. 1026-1037
- Tatjana Kapus: 
 Closing a System in the Dynamic Input/Output Automata Model. 1038-1048
- Ahmad Taherkhani, Ari Korhonen  , Lauri Malmi , Lauri Malmi : :
 Recognizing Algorithms Using Language Constructs, Software Metrics and Roles of Variables: An Experiment with Sorting Algorithms. 1049-1066
- Paul E. Dunne  : :
 On Constructing Minimal Formulae. 1067-1075
- Alessandro Basso, Davide Cavagnino, Victor Pomponiu, Annamaria Vernone  : :
 Blind Watermarking of Color Images Using Karhunen-Loève Transform Keying. 1076-1090
- Yuqing Wu, Dirk Van Gucht, Marc Gyssens  , Jan Paredaens: , Jan Paredaens:
 A Study of a Positive Fragment of Path Queries: Expressiveness, Normal Form and Minimization. 1091-1118
- Harold W. Thimbleby  : :
 Signposting in Documents. 1119-1135
- Chuen-Horng Lin, Wei-Chih Lin: 
 Image Retrieval System Based on Adaptive Color Histogram and Texture Features. 1136-1147
- David Pinto  , Paolo Rosso, Héctor Jiménez-Salazar: , Paolo Rosso, Héctor Jiménez-Salazar:
 A Self-enriching Methodology for Clustering Narrow Domain Short Texts. 1148-1165
- Sven Hartmann, Uwe Leck, Sebastian Link  : :
 On Codd Families of Keys over Incomplete Relations. 1166-1180
- Tetsu Narumi, Kenji Yasuoka, Makoto Taiji  , Francesco Zerbetto , Francesco Zerbetto , Siegfried Höfinger: , Siegfried Höfinger:
 Fast Calculation of Electrostatic Potentials on the GPU or the ASIC MD-GRAPE-3. 1181-1187
- Alexandre R. J. François  : :
 An Architectural Framework for the Design, Analysis and Implementation of Interactive Systems. 1188-1204
- Yulai Xie: 
 Some Results on Minimum Discrete Bending Energy Path in Simple Polygon. 1205-1210
- Jia Lee, Susumu Adachi, Ferdinand Peper: 
 A Partitioned Cellular Automaton Approach for Efficient Implementation of Asynchronous Circuits. 1211-1220
- Medeni Soysal  , A. Aydin Alatan: , A. Aydin Alatan:
 Joint Utilization of Appearance, Geometry and Chance for Scene Logo Retrieval. 1221-1231
Volume 54, Number 8, August 2011
- Fairouz Kamareddine: 
 Capsule Reviews. 1233-1234
- Constandinos X. Mavromoustakis, Helen D. Karatza  : :
 Embedded Socio-oriented Model for End-to-End Reliable Stream Schedules by Using Collaborative Outsourcing in MP2P Systems. 1235-1247
- Amirhosein Taherkordi, Frédéric Loiret, Romain Rouvoy  , Frank Eliassen: , Frank Eliassen:
 A Generic Component-Based Approach for Programming, Composing and Tuning Sensor Software. 1248-1266
- In Hwan Doh, Jongmoo Choi, Donghee Lee, Sam H. Noh: 
 An Empirical Study of Deploying Storage Class Memory into the I/O Path of Portable Systems. 1267-1281
- José Luis March, Julio Sahuquillo  , Houcine Hassan , Houcine Hassan , Salvador Petit , Salvador Petit , José Duato , José Duato : :
 A New Energy-Aware Dynamic Task Set Partitioning Algorithm for Soft and Hard Embedded Real-Time Systems. 1282-1294
- Ali Ahmadinia, Alireza Shahrabi  : :
 A Highly Adaptive and Efficient Router Architecture for Network-on-Chip. 1295-1307
- MinSeong Kim, Andy J. Wellings: 
 Multiprocessors and Asynchronous Event Handling in the Real-Time Specification for Java. 1308-1324
- Mohamed F. Mokbel, Robert D. Kent, Michael Wong: 
 An Abstract Semantically Rich Compiler Collocative and Interpretative Model for OpenMP Programs. 1325-1343
- Tiziana Calamoneri  : :
 The L(h, k)-Labelling Problem: An Updated Survey and Annotated Bibliography. 1344-1371
- Antoine Bossard, Keiichi Kaneko  , Shietung Peng: , Shietung Peng:
 A New Node-to-Set Disjoint-Path Algorithm in Perfect Hierarchical Hypercubes. 1372-1381
- Eun-Chan Park, Minjoong Rim  : :
 Fair Coexistence MAC Protocol for Contention-Based Heterogeneous Networks. 1382-1397
- Onur Yilmaz, Orhan Dagdeviren  , Kayhan Erciyes: , Kayhan Erciyes:
 Interference-Aware Dynamic Algorithms for Energy-Efficient Topology Control in Wireless Ad Hoc and Sensor Networks. 1398-1411
Volume 54, Number 9, September 2011
- Fairouz Kamareddine: 
 Capsule Reviews. 1413-1415
- Shuo Xu, Fan Yu, Zhe Luo, Ze Ji  , Duc Truong Pham, Renxi Qiu , Duc Truong Pham, Renxi Qiu : :
 Adaptive Bees Algorithm - Bioinspiration from Honeybee Foraging to Optimize Fuel Economy of a Semi-Track Air-Cushion Vehicle. 1416-1426
- Hugo Hernández, Christian Blum  : :
 Foundations of Antcycle: Self-synchronized Duty-cycling in Mobile Sensor Networks. 1427-1448
- Wei-Po Lee, Yu-Ting Hsiao: 
 An Adaptive GA - PSO Approach with Gene Clustering to Infer S-system Models of Gene Regulatory Networks. 1449-1464
- Hongxing Wei, Youdong Chen, Miao Liu, Yingpeng Cai, Tianmiao Wang: 
 Swarm Robots: From Self-assembly to Locomotion. 1465-1474
- Hanife Kebapci, Berrin A. Yanikoglu  , Gözde B. Ünal , Gözde B. Ünal : :
 Plant Image Retrieval Using Color, Shape and Texture Features. 1475-1490
- Maria Petrou, Archontis Giannakidis  : :
 Full Tomographic Reconstruction of 2D Vector Fields using Discrete Integral Data. 1491-1504
- Gérard Sabah: 
 Natural Language Understanding, Where Are We Going? Where Could We Go? 1505-1513
- Stelios Timotheou  : :
 Asset-Task Assignment Algorithms in the Presence of Execution Uncertainty. 1514-1525
- Serdar Çakir, A. Enis Çetin  : :
 Mel- and Mellin-cepstral Feature Extraction Algorithms for Face Recognition. 1526-1534
- Gözde Özbal, Hilal Karaman, Ferda Nur Alpaslan  : :
 A Content-Boosted Collaborative Filtering Approach for Movie Recommendation Based on Local and Global Similarity and Missing Data Prediction. 1535-1546
- Sotiris B. Kotsiantis  : :
 Cascade Generalization with Reweighting Data for Handling Imbalanced Problems. 1547-1559
- Mark Levene: 
 Chess Metaphors, Artificial Intelligence and the Human Mind. 1560
Volume 54, Number 10, October 2011
- Fairouz Kamareddine: 
 Capsule Reviews. 1561-1564
- Monowar H. Bhuyan, D. K. Bhattacharyya  , Jugal K. Kalita: , Jugal K. Kalita:
 Surveying Port Scans and Their Detection Methodologies. 1565-1581
- Duc-Phong Le  , Chao-Liang Liu: , Chao-Liang Liu:
 Refinements of Miller's Algorithm over Weierstrass Curves Revisited. 1582-1591
- Salih Ergün  : :
 A Truly Random Number Generator Based on a Pulse-Excited Cross-Coupled Chaotic Oscillator. 1592-1602
- Ruben Rios, Javier López  : :
 Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks. 1603-1615
- Hossein Homaei  , Hamid Reza Shahriari , Hamid Reza Shahriari : :
 Compositional Approach to Quantify the Vulnerability of Computer Systems. 1616-1631
- Kai Xi, Yan Tang, Jiankun Hu  : :
 Correlation Keystroke Verification Scheme for User Access Control in Cloud Computing Environment. 1632-1644
- Yong Yu  , Yi Mu, Guilin Wang, Ying Sun: , Yi Mu, Guilin Wang, Ying Sun:
 Cryptanalysis of an Off-Line Electronic Cash Scheme Based on Proxy Blind Signature. 1645-1651
- Hassan Jameel Asghar  , Josef Pieprzyk , Josef Pieprzyk , Huaxiong Wang: , Huaxiong Wang:
 On the Hardness of the Sum of k Mins Problem. 1652-1660
- Jun Zhang  , Yang Xiang , Yang Xiang , Wanlei Zhou , Wanlei Zhou , Lei Ye, Yi Mu: , Lei Ye, Yi Mu:
 Secure Image Retrieval Based on Visual Content and Watermarking Protocol. 1661-1674
- Lan Zhou, Vijay Varadharajan  , Michael Hitchens , Michael Hitchens : :
 Enforcing Role-Based Access Control for Secure Data Storage in the Cloud. 1675-1687
- Lein Harn, Chia-Yin Lee, Changlu Lin, Chin-Chen Chang: 
 Fully Deniable Message Authentication Protocols Preserving Confidentiality. 1688-1699
- Yini Wang, Sheng Wen  , Silvio Cesare, Wanlei Zhou , Silvio Cesare, Wanlei Zhou , Yang Xiang , Yang Xiang : :
 The Microcosmic Model of Worm Propagation. 1700-1720
- Erika Rosas, Olivier Marin  , Xavier Bonnaire: , Xavier Bonnaire:
 CORPS: Building a Community of Reputable PeerS in Distributed Hash Tables. 1721-1735
Volume 54, Number 11, November 2011
- Fairouz Kamareddine: 
 Capsule Reviews. 1737-1740
- Chenfeng Xu, Hongsheng Xi, Fengguang Wu: 
 Evaluation and Optimization of Kernel File Readaheads Based on Markov Decision Models. 1741-1755
- Edgar G. Daylight: 
 Dijkstra's Rallying Cry for Generalization: The Advent of the Recursive Procedure, Late 1950s-Early 1960s. 1756-1772
- Mitzi McCarthy, Zhen He  : :
 Efficient Updates for OLAP Range Queries on Flash Memory. 1773-1789
- Tien Van Do  : :
 Comparison of Allocation Schemes for Virtual Machines in Energy-Aware Server Farms. 1790-1797
- Amir Kaivani, Ghassem Jaberipur: 
 Decimal CORDIC Rotation based on Selection by Rounding: Algorithm and Architecture. 1798-1809
- Cagatay Turkay  , Emre Koc, Selim Balcisoy , Emre Koc, Selim Balcisoy : :
 Integrating Information Theory in Agent-Based Crowd Simulation Behavior Models. 1810-1820
- Gabriel Rodríguez  , María J. Martín , María J. Martín , Patricia González , Patricia González , Juan Touriño , Juan Touriño : :
 Analysis of Performance-impacting Factors on Checkpointing Frameworks: The CPPC Case Study. 1821-1837
- Jia Jie Liu  , William Chung-Kung Yen, Yen-Ju Chen: , William Chung-Kung Yen, Yen-Ju Chen:
 An Optimal Algorithm for Untangling Binary Trees via Rotations. 1838-1844
- Ahmad Taherkhani: 
 Using Decision Tree Classifiers in Source Code Analysis to Recognize Algorithms: An Experiment with Sorting Algorithms. 1845-1860
- Francisco Vázquez, Ester M. Garzón, José-Jesús Fernández: 
 Matrix Implementation of Simultaneous Iterative Reconstruction Technique (SIRT) on GPUs. 1861-1868
- Tiziana Calamoneri  : :
 The L(2, 1)-Labeling Problem on Oriented Regular Grids. 1869-1875
- Ionut Popa: 
 SE-Compression: A Generalization of Dictionary-Based Compression. 1876-1881
- Yang Liu, Zhen He  , Yi-Ping Phoebe Chen , Yi-Ping Phoebe Chen , Thi Nguyen , Thi Nguyen : :
 External Sorting on Flash Memory Via Natural Page Run Generation. 1882-1990
- Francisco Ortin  : :
 Type Inference to Optimize a Hybrid Statically and Dynamically Typed Language. 1901-1924
Volume 54, Number 12, November 2011
- Fairouz Kamareddine: 
 Capsule Reviews. 1925-1927
- Damianos Gavalas  , Grammati E. Pantziou , Grammati E. Pantziou , Charalampos Konstantopoulos , Charalampos Konstantopoulos : :
 Mobility in Wireless Sensor Networks. 1928-1930
- Roland Kays  , Sameer Tilak, Margaret Crofoot, Tony Fountain, Daniel Obando, Alejandro Ortega, Franz Kuemmeth, Jamie Mandel, George Swenson, Thomas Lambert, Ben Hirsch , Sameer Tilak, Margaret Crofoot, Tony Fountain, Daniel Obando, Alejandro Ortega, Franz Kuemmeth, Jamie Mandel, George Swenson, Thomas Lambert, Ben Hirsch , Martin Wikelski: , Martin Wikelski:
 Tracking Animal Location and Activity with an Automated Radio Telemetry System in a Tropical Rainforest. 1931-1948
- Giuseppe Cardone, Antonio Corradi  , Luca Foschini , Luca Foschini : :
 Cross-Network Opportunistic Collection of Urgent Data in Wireless Sensor Networks. 1949-1962
- Mahdi Zareei  , Alireza Taghizadeh, Rahmat Budiarto , Alireza Taghizadeh, Rahmat Budiarto , Tat Chee Wan , Tat Chee Wan : :
 EMS-MAC: Energy Efficient Contention-Based Medium Access Control Protocol for Mobile Sensor Networks. 1963-1972
- Olof Rensfelt, Frederik Hermans, Per Gunningberg, Lars-Åke Larzon, Erik Björnemo: 
 Repeatable Experiments with Mobile Nodes in a Relocatable WSN Testbed. 1973-1986
- Muhammed Emre Keskin  , I. Kuban Altinel, Necati Aras , I. Kuban Altinel, Necati Aras , Cem Ersoy , Cem Ersoy : :
 Lifetime Maximization in Wireless Sensor Networks Using a Mobile Sink with Nonzero Traveling Time. 1987-1999
- Zeqiang Chen, Liping Di, Genong Yu, Nengcheng Chen  : :
 Real-Time On-Demand Motion Video Change Detection in the Sensor Web Environment. 2000-2016
- Kai-Ting Yang, Ge-Ming Chiu: 
 A Hybrid Pull-Based with Piggybacked Push Protocol for Cache Sharing. 2017-2032
- Jih-Ching Chiu, Yu-Liang Chou, Po-Kai Chen, Ding-Siang Su: 
 A Unitable Computing Architecture for Chip Multiprocessors. 2033-2052
- Yanbo Wu, Quan Z. Sheng  , Damith Chinthana Ranasinghe: , Damith Chinthana Ranasinghe:
 Facilitating Efficient Object Tracking in Large-Scale Traceability Networks. 2053-2071

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














