


default search action
The Computer Journal, Volume 58
Volume 58, Number 1, January 2015
Original Articles
- Nikolay Grozev, Rajkumar Buyya:
Performance Modelling and Simulation of Three-Tier Applications in Cloud and Multi-Cloud Environments. 1-22 - Marco Beccuti
, Chiara Fornari, Giuliana Franceschinis, Sami M. Halawani, Omar M. Ba-Rukab, Ab Rahman Ahmad, Gianfranco Balbo:
From Symmetric Nets to Differential Equations exploiting Model Symmetries. 23-39 - Shenlu Wang, Muhammad Aamir Cheema
, Xuemin Lin:
Efficiently Monitoring Reverse k-Nearest Neighbors in Spatial Networks. 40-56 - Gianfranco Balbo, Maria Grazia Vigliotti:
On the Analysis of a M/M/1 Queue with Bulk Services. 57-74 - Zhe Chen:
Control Systems on Automata and Grammars. 75-94 - James Pallister, Simon J. Hollis, Jeremy Bennett:
Identifying Compiler Options to Minimize Energy Consumption for Embedded Platforms. 95-109 - Yang Wang, Hua Li, Menglan Hu:
Reusing Garbage Data for Efficient Workflow Computation. 110-125 - James G. Dowty
:
SMML Estimators for 1-Dimensional Continuous Data. 126-133 - Michal Klempa, Michal Kozák, Mario Mikula, Robert Smetana, Jakub Stárka, Michal Svirec, Matej Vitásek, Martin Necaský
, Irena Holubová
:
jInfer: A Framework for XML Schema Inference. 134-156 - Albert Corominas, Alberto García-Villoria, Rafael Pastor
:
Technical Note: Relating to the Parameter Values Given by Nelder and Mead in their Algorithm. 157-159 - António Leslie Bajuelos, Santiago Canales, Gregorio Hernández-Peñalver
, Ana Mafalda Martins
, Inês Matos:
Some Results on Open-Edge and Open Mobile Guarding of Polygons and Triangulations. 160-171
Volume 58, Number 2, February 2015
Original Articles
- Omar Alsaleh, Bella Bose, Bechir Hamdaoui:
One-to-Many Node-Disjoint Paths Routing in Dense Gaussian Networks. 173-187 - Chung-Ming Huang, Yih-Chung Chen, Shih Yang Lin:
Packet Scheduling and Congestion Control Schemes for Multipath Datagram Congestion Control Protocol. 188-203 - Oguzhan Erdem, Aydin Carus, Hoang Le:
Value-Coded Trie Structure for High-Performance IPv6 Lookup. 204-214 - Paola Cappanera
, Alessandro Lori, Giovanni Stea
, Gigliola Vaglini:
On the Schedulability of Deadline-Constrained Traffic in TDMA Wireless Mesh Networks. 215-233 - Sami J. Habib, Paulvanna Nayaki Marimuthu, Naser Zaeri
:
Carbon-aware Enterprise Network through Redesign. 234-245 - Sen Su, Qingjia Huang, Jian Li, Xiang Cheng, Peng Xu, Kai Shuang:
Enhanced Energy-Efficient Scheduling for Parallel Tasks Using Partial Optimal Slacking. 246-257 - Shahbaz Akhtar Abid, Mazliza Othman
, Nadir Shah, Mazhar Ali, Atta ur Rehman Khan
:
3D-RP: A DHT-Based Routing Protocol for MANETs. 258-279 - Islam Elgedawy
:
CRESCENT: A Reliable Framework for Durable Composite Web Services Management. 280-299 - Mostafa Rezvani, Mohammad Kazem Akbari, Bahman Javadi:
Resource Allocation in Cloud Computing Environments Based on Integer Linear Programming. 300-314 - Chien-Fu Cheng
, Hsien-Chun Liao:
A Malicious-Resilient Protocol for Consistent Scheduling Problem in the Cloud Computing Environment. 315-330 - Mirka Miller, R. Sundara Rajan
, N. Parthiban
, Indra Rajasingh:
Minimum Linear Arrangement of Incomplete Hypercubes. 331-337 - Shih-Chang Huang, Hong-Yi Chang:
A Bidirectional Route Repair Method for Wireless Mobile Ad Hoc Networks. 338-353
Volume 58, Number 3, March 2015
Special Focus on Enabling Technologies and Infrastructures for Collaboration
- Slim Kallel
, Mohamed Jmaiel, Sumitra Reddy:
Enabling Technologies: Infrastructure for Collaborative Enterprises. 355 - Wassim Derguech, Sami Bhiri
, Souleiman Hasan
, Edward Curry
:
Using Formal Concept Analysis for Organizing and Discovering Sensor Capabilities. 356-367 - Zahra Movahedi, Walid Gaaloul
, Sami Bhiri
, Bruno Defude
:
Assisting Sensor-Based Application Design and Instantiation Using Activity Recommendation. 368-384 - Afef Jmal Maâlej, Moez Krichen:
Study on the Limitations of WS-BPEL Compositions Under Load Conditions. 385-402 - Ines Houidi, Wajdi Louati, Djamal Zeghlache
:
Exact Multi-Objective Virtual Network Embedding in Cloud Environments. 403-415 - Ryszard Janicki, Mohammad Hadi Soudkhah:
On Classification with Pairwise Comparisons, Support Vector Machines and Feature Domain Overlapping. 416-431
- María Arsuaga-Ríos, Miguel A. Vega-Rodríguez
:
Multiobjective Small-World Optimization for Energy Saving in Grid Environments. 432-447 - Ajay Kumar
, Anil Kumar Verma
:
An Improved Algorithm for the Metamorphosis of Semi-Extended Regular Expressions to Deterministic Finite Automata. 448-456 - Lei Du
, Qinbao Song, Lei Zhu
, Xiaoyan Zhu:
A Selective Detector Ensemble for Concept Drift Detection. 457-471 - Omar Khadeer Hussain
, Zia-ur Rahman, Farookh Khadeer Hussain, Jaipal Singh, Naeem Khalid Janjua
, Elizabeth Chang
:
A User-Based Early Warning Service Management Framework in Cloud Computing. 472-496 - Jianxin Li
, Chengfei Liu
, Rui Zhou
, Jeffrey Xu Yu:
Query-Driven Frequent Co-Occurring Term Computation over Relational Data Using MapReduce. 497-513
Volume 58, Number 4, April 2015
Special Focus on Security, Trust and Risk in Multimedia Social Networks
- Zhiyong Zhang
:
Security, Trust and Risk in Multimedia Social Networks. 515-517 - Constantinos Patsakis
, Athanasios Zigomitros
, Achilleas Papageorgiou, Agusti Solanas
:
Privacy and Security for Multimedia Content shared on OSNs: Issues and Countermeasures. 518-535 - Hui Zhu, Cheng Huang, Hui Li:
Information Diffusion Model Based on Privacy Setting in Online Social Networking Services. 536-548 - Hong Zhu
, Shengli Tian, Kevin Lü:
Privacy-Preserving Data Publication with Features of Independent ℓ-Diversity. 549-571 - WeiTao Song, Bin Hu:
Approach to Detecting Type-Flaw Attacks Based on Extended Strand Spaces. 572-587 - Bin Yang, Xingming Sun, Xianyi Chen, Jianjun Zhang, Xu Li:
Exposing Photographic Splicing by Detecting the Inconsistencies in Shadows. 588-600 - Ayesha Kanwal, Rahat Masood
, Muhammad Awais Shibli, Rafia Mumtaz
:
Taxonomy for Trust Models in Cloud Computing. 601-626 - Qingqi Pei, Dingyu Yan, Lichuan Ma, Zi Li, Yang Liao:
A Strong and Weak Ties Feedback-Based Trust Model in Multimedia Social Networks. 627-643 - Zhen Yang, Kaiming Gao, Kefeng Fan, Yingxu Lai:
Sensational Headline Identification By Normalized Cross Entropy-Based Metric. 644-655 - Hui Lin, Jia Hu, Jianfeng Ma, Li Xu, Li Yang:
CRM: A New Dynamic Cross-Layer Reputation Computation Model in Wireless Networks. 656-667 - Zhiyong Zhang
, Kanliang Wang:
A Formal Analytic Approach to Credible Potential Path and Mining Algorithms for Multimedia Social Networks. 668-678 - V. Natarajan, Shina Sheen, R. Anitha:
Multilevel Analysis to Detect Covert Social Botnet in Multimedia Social Networks. 679-687 - Guowei Wu, Zuosong Liu, Lin Yao, Jing Deng, Jie Wang:
A Trust Routing for Multimedia Social Networks. 688-699 - Danmei Niu, Lanlan Rui, Cheng Zhong, Xuesong Qiu:
A Composition and Recovery Strategy for Mobile Social Network Service in Disaster. 700-708
- Volkmar Lotz, Francesco Di Cerbo, Michele Bezzi, Samuel Paul Kaluvuri, Antonino Sabetta, Slim Trabelsi:
Security Certification for Service-Based Business Ecosystems. 709-723 - Qiang Tang
, Hua Ma, Xiaofeng Chen:
Extend the Concept of Public Key Encryption with Delegated Search. 724-734 - Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi, Yi Mu:
Functional Encryption Resilient to Hard-to-Invert Leakage. 735-749 - Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang:
Leakage-Free ID-Based Signature. 750-757 - M. Francisca Hinarejos
, Andreu Pere Isern-Deyà
, Josep Lluís Ferrer-Gomila
, Magdalena Payeras-Capellà
:
MC-2D: An Efficient and Scalable Multicoupon Scheme. 758-778 - Ying-Kai Tang, Sherman S. M. Chow
, Joseph K. Liu
:
Comments on 'Efficient Revocable Certificateless Encryption Secure in the Standard Model'. 779-781 - Lanfranco Lopriore:
Password Capabilities Revisited. 782-791 - Ke Gu
, Weijia Jia
, Chunlin Jiang:
Efficient Identity-Based Proxy Signature in the Standard Model. 792-807 - Debasish Das, Utpal Sharma, D. K. Bhattacharyya
:
Detection of Cross-Site Scripting Attack under Multiple Scenarios. 808-822 - Xinyu Fan, Guomin Yang
, Yi Mu, Yong Yu
:
On Indistinguishability in Remote Data Integrity Checking. 823-830 - Alptekin Küpçü
:
Official Arbitration with Secure Cloud Storage Application. 831-852 - Jiguo Li, Huiyun Teng, Xinyi Huang, Yichen Zhang, Jianying Zhou
:
A Forward-Secure Certificate-Based Signature Scheme. 853-866 - Yong Yu
, Man Ho Au
, Yi Mu, Willy Susilo
, Huai Wu:
Secure Delegation of Signing Power from Factorization. 867-877 - Hai Le Vu
, Kenneth K. Khaw, Tsong Yueh Chen
:
A New Approach for Network Vulnerability Analysis. 878-891 - Stavros N. Shiaeles
, Maria Papadaki
:
FHSD: An Improved IP Spoof Detection Method for Web DDoS Attacks. 892-903 - Huacui Liu, Chenhui Jin:
Lower Bounds of Differential and Linear Active S-boxes for 3D-like Structure. 904-921 - Yu-Chi Chen
:
SPEKS: Secure Server-Designation Public Key Encryption with Keyword Search against Keyword Guessing Attacks. 922-933 - Cheng-Chi Lee
, Yan-Ming Lai:
Toward A Secure Single Sign-On Mechanism for Distributed Computer Networks. 934-943 - Franco Frattolillo
:
Watermarking Protocols: Problems, Challenges and a Possible Solution. 944-960 - Abdulah Abdulah Zadeh, Howard M. Heys
:
Application of Simple Power Analysis to Stream Ciphers Constructed Using Feedback Shift Registers. 961-972 - Haider Salim Hmood, Zhitang Li, Hasan Khalaf Abdulwahid, Yang Zhang:
Adaptive Caching Approach to Prevent DNS Cache Poisoning Attack. 973-985 - Sha Ma, Mingwu Zhang, Qiong Huang, Bo Yang:
Public Key Encryption with Delegated Equality Test in a Multi-User Setting. 986-1002 - Qiang Tang
:
From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data. 1003-1020 - Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo
:
An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants. 1021-1039
Volume 58, Number 5, May 2015
Original Articles
- Gabriel Ciobanu
, Maciej Koutny:
PerTiMo: A Model of Spatial Migration with Safe Access Permissions. 1041-1060 - Jie Lin, Yue Jiang, Don Adjeroh:
Circular Pattern Discovery. 1061-1073 - Jia Jie Liu, Yue-Li Wang, Yu-shan Chiu:
Constrained Longest Common Subsequences with Run-Length-Encoded Strings. 1074-1084 - Emilio Di Giacomo, Walter Didimo, Luca Grilli
, Giuseppe Liotta
, Salvatore Agostino Romeo:
Heuristics for the Maximum 2-Layer RAC Subgraph Problem. 1085-1098 - Ahmad Sabri
, Vincent Vajnovszki:
Two Reflected Gray Code-Based Orders on Some Restricted Growth Sequences. 1099-1111 - Chia Shin Ou, Chin Lung Lu, Richard C. T. Lee:
A Systematical and Parallel Approach to Solve Problems Involving Special Properties of Bit-Vectors. 1112-1121 - Amy Affleck, Aneesh Krishna, Narasimaha Achuthan:
Non-Functional Requirements Framework: A Mathematical Programming Approach. 1122-1139 - Florentin Ipate, Alin Stefanescu
, Ionut Dinca:
Model Learning and Test Generation Using Cover Automata. 1140-1159 - Antonio Badia, Daniel Lemire:
Functional Dependencies with null Markers. 1160-1168 - Petr Procházka, Jan Holub
:
Compression of a Set of Files with Natural Language Content. 1169-1185 - Joel Fuentes
, Pablo Sáez, Gilberto Gutiérrez
, Isaac D. Scherson:
A Method to Find Functional Dependencies Through Refutations and Duality of Hypergraphs. 1186-1198 - Chang-Ai Sun, Yimeng Zai, Huai Liu
:
Evaluating and Comparing Fault-Based Testing Strategies for General Boolean Specifications: A Series of Experiments. 1199-1213 - Behrooz Parhami:
Digital Arithmetic in Nature: Continuous-Digit RNS. 1214-1223
Volume 58, Number 6, June 2015
Special Focus on Green Energy Management and Smart Grid
- Zhangbing Zhou, Huansheng Ning
, Meikang Qiu, Habib F. Rashvand:
Editorial: Green Energy Management and Smart Grid. 1225-1226 - Jianxin Li, Jieyu Zhao, Yi Li, Lei Cui, Bo Li, Lu Liu
, John Panneerselvam
:
iMIG: Toward an Adaptive Live Migration Method for KVM Virtual Machines. 1227-1242 - Kehua Guo, Biao Tian, Jianhua Ma:
AMPS: An Adaptive Message Push Strategy for the Energy Efficiency Optimization in Mobile Terminals. 1243-1253 - Liyun Zuo, Shoubin Dong
, Chunsheng Zhu, Lei Shu
, Guangjie Han:
A Cloud Resource Evaluation Model Based on Entropy Optimization and Ant Colony Clustering. 1254-1266 - Jianhui Zhang, Zhi Li, Feng Xia
, Shaojie Tang, Xingfa Shen, Bei Zhao:
Cooperative Scheduling for Adaptive Duty Cycling in Asynchronous Sensor Networks. 1267-1279 - Guangjie Han, Xun Li, Jinfang Jiang, Lei Shu
, Jaime Lloret:
Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks. 1280-1292 - Zhiyong Feng, Bo Lan, Zhen Zhang, Shizhan Chen:
A Study of Semantic Web Services Network. 1293-1305 - Xiang Wang, Ying Lu, Yi Zhang, Zexi Zhao, Tongsheng Xia, Limin Xiao:
Power Optimization in Logic Synthesis for Mixed Polarity Reed-Muller Logic Circuits. 1306-1313 - Domen Zupancic, Mitja Lustrek, Matjaz Gams:
Multi-Agent Architecture for Control of Heating and Cooling in a Residential Space. 1314-1329 - Linghe Kong, Xiao-Yang Liu, Meixia Tao, Min-You Wu, Yu Gu, Long Cheng, Jianwei Niu:
Resource-Efficient Data Gathering in Sensor Networks for Environment Reconstruction. 1330-1343 - Jin Liu, Juan Li, Xiaoguang Niu, Xiaohui Cui, Yunchuan Sun:
GreenOCR: An Energy-Efficient Optimal Clustering Routing Protocol. 1344-1359 - Yongzhao Zhan, Shan Dai, Qirong Mao, Lu Liu
, Wei Sheng:
A Video Semantic Analysis Method Based on Kernel Discriminative Sparse Representation and Weighted KNN. 1360-1372 - He Li
, Mianxiong Dong, Xiaofei Liao, Hai Jin:
Deduplication-Based Energy Efficient Storage System in Cloud Environment. 1373-1383 - Hamed Javidi
, Maziar Goudarzi
:
TABEMS: Tariff-Aware Building Energy Management System for Sustainability through Better Use of Electricity. 1384-1398
- Xiaolan Tang
, Juhua Pu, Yang Gao, Yu Xie, Zhang Xiong:
GPS-Based Replica Deletion Scheme with Anti-Packet Distribution for Vehicular Networks. 1399-1415 - Antonio Frangioni
, Laura Galli, Giovanni Stea
:
Optimal Joint Path Computation and Rate Allocation for Real-time Traffic. 1416-1430 - Andrew Larkin, David E. Williams, Molly L. Kile, William M. Baird:
Developing a Smartphone Software Package for Predicting Atmospheric Pollutant Concentrations at Mobile Locations. 1431-1442 - Nizam Ayyildiz, Ece Güran Schmidt
, Hasan Cengiz Güran:
S-DIRECT: Scalable and Dynamically Reconfigurable TCAM Architecture for High-Speed IP Lookup. 1443-1455 - Pavel Rajmic
, Jiri Hosek
, Michal Fusek
, Sergey D. Andreev
, Július Stecík:
Simplified Probabilistic Modelling and Analysis of Enhanced Distributed Coordination Access in IEEE 802.11. 1456-1468 - Sangyeon Kim, Dong-Wan Choi, Chin-Wan Chung:
Finding a Friendly Community in Social Networks Considering Bad Relationships. 1469-1481 - Hamid Saadatfar, Hossein Deldari, Mahmoud Naghibzadeh
:
Improving the Scheduler's Energy Saving Capability by Noting both Job and Resource Characteristics. 1482-1493
Volume 58, Number 7, July 2015
Original Articles
- Viliam Simko, David Hauzar, Petr Hnetynka
, Tomás Bures
, Frantisek Plásil
:
Formal Verification of Annotated Textual Use-Cases. 1495-1529 - Achal Kaushik
, Deo Prakash Vidyarthi:
A Green Energy Model for Resource Allocation in Computational Grid. 1530-1547 - HamidReza Ahmadifar
, Ghassem Jaberipur:
A New Residue Number System with 5-Moduli Set: {22q, 2q±3, 2q±1}. 1548-1565 - Edem Kwedzo Bankas, Kazeem Alagbe Gbolagade
:
New MRC Adder-Based Reverse Converter for the Moduli Set {2n, 22n+1 - 1, 22n+2 - 1}. 1566-1572 - Qian Mao, K. Bharanitharan, Chin-Chen Chang:
A Proxy User Authentication Protocol Using Source-Based Image Morphing. 1573-1584 - Yiwen Zhang, Rui-feng Guo:
Low-Power Scheduling Algorithms for Sporadic Task with Shared Resources in Hard Real-Time Systems. 1585-1597 - Chao-Liang Liu, Wang-Jui Tsai, Ting-Yi Chang, Chun-Cheng Peng, Peng-Shiang Wong:
Meaningful Share Generation for (2, 2)-Multiple Visual Secret Sharing Scheme Without Pixel Expansion. 1598-1606 - Abdelli Abdelkrim
:
Improving the State Space Computation of the Time Stream Petri Nets Model. 1607-1627 - Yang Wang, Wei Shi
:
Dataflow-Based Scheduling for Scientific Workflows in HPC with Storage Constraints. 1628-1644 - Murat Yesilyurt, Yildiray Yalman, Ahmet Turan Özcerit
:
A Robust Watermarking Method for Mpeg-4 Based on Kurtosis. 1645-1655 - Alexandre Petrenko
, Adenilso Simão
:
Generalizing the DS-Methods for Testing Non-Deterministic FSMs. 1656-1672 - Niko Beerenwinkel, Stefano Beretta
, Paola Bonizzoni
, Riccardo Dondi, Yuri Pirola
:
Covering Pairs in Directed Acyclic Graphs. 1673-1686
Volume 58, Number 8, August 2015
Special Focus on Ambient and Context-Aware Services for the Future Web