


default search action
The Computer Journal, Volume 59
Volume 59, Number 1, January 2016
Original Articles
- Rodrigo Andrade, Márcio Ribeiro

, Henrique Rebêlo, Paulo Borba, Vaidas Gasiunas, Lucas Satabin:
Assessing Idioms for a Flexible Feature Binding Time. 1-32 - Robert M. Hierons

:
A More Precise Implementation Relation for Distributed Testing. 33-46 - Chunlin Li, Layuan Li:

Context-Aware Integrated Scheme for Mobile Cloud Service Allocation. 47-63 - K. Hemant Kumar Reddy

, Diptendu Sinha Roy:
DPPACS: A Novel Data Partitioning and Placement Aware Computation Scheduling Scheme for Data-Intensive Cloud Applications. 64-82 - Shay Gueron

, Vlad Krasnov:
Fast Quicksort Implementation Using AVX Instructions. 83-90 - Sulin Song

, Shuming Zhou, Xiaoyan Li
:
Conditional Diagnosability of Burnt Pancake Networks Under the PMC Model. 91-105 - Zaharije Radivojevic, Milos Cvetanovic, Sasa Stojanovic:

Comparison of Binary Procedures: A Set of Techniques for Evading Compiler Transformations. 106-118 - Jie Zhao

, Rongcai Zhao, Jinchen Xu:
Code Generation for Distributed-Memory Architectures. 119-132 - Carla Binucci

, Walter Didimo:
Computing Quasi-Upward Planar Drawings of Mixed Graphs. 133-150 - Zhendong Shao, Igor Averbakh, Sandi Klavzar

:
Labeling Dot-Cartesian and Dot-Lexicographic Product Graphs with a Condition at Distance Two. 151-158
Volume 59, Number 2, February 2016
Original Articles
- You Wang, Jun Bi:

Software-Defined Mobility Support in IP Networks. 159-177 - Abdul Hameed, Adnan Noor Mian:

Towards Better Traffic Localization of Virtual LANs Using Genetic Algorithm. 178-191 - Júlio Araújo

, Frédéric Giroire, Joanna Moulierac, Yaning Liu, Remigiusz Modrzejewski:
Energy Efficient Content Distribution. 192-207 - Sareh Fotuhi Piraghaj, Rodrigo N. Calheiros

, Jeffrey Chan
, Amir Vahid Dastjerdi, Rajkumar Buyya:
Virtual Machine Customization and Task Mapping Architecture for Efficient Allocation of Cloud Data Center Resources. 208-224 - Lélia Blin, Maria Potop-Butucaru, Stephane Rovedakis, Sébastien Tixeuil:

A New Self-Stabilizing Minimum Spanning Tree Construction with Loop-Free Property. 225-243 - Mahmood Naderan-Tahan, Hamid Sarbazi-Azad:

Why Does Data Prefetching Not Work for Modern Workloads? 244-259 - Md. Abu Layek

, TaeChoong Chung, Eui-Nam Huh:
Adaptive Desktop Delivery Scheme for Provisioning Quality of Experience in Cloud Desktop as a Service. 260-274 - Jacques M. Bahi, Wiem Elghazel, Christophe Guyeux

, Mohammed Haddad, Mourad Hakem, Kamal Medjaher, Noureddine Zerhouni:
Resiliency in Distributed Sensor Networks for Prognostics and Health Management of the Monitoring Targets. 275-284
Volume 59, Number 3, March 2016
Special Focus on Cloud Computing and its Scientific Applications
- Surya Nepal

, Suraj Pandey:
Guest Editorial: Cloud Computing and Scientific Applications (CCSA) - Big Data Analysis in the Cloud. 285-286 - Roberto R. Expósito

, Guillermo L. Taboada
, Sabela Ramos, Juan Touriño
, Ramón Doallo:
Performance Evaluation of Data-Intensive Computing Applications on a Public IaaS Cloud. 287-307 - Sami Yangui, Samir Tata:

An OCCI Compliant Model for PaaS Resources Description and Provisioning. 308-324 - Liang Li, Endong Wang, Xiaoshe Dong

, Zhengdong Zhu:
The Optimization of Memory Access Congestion for MapReduce Applications on Manycore Systems. 325-337 - Christian Napoli

, Giuseppe Pappalardo, Emiliano Tramontana, Gaetano Zappalà
:
A Cloud-Distributed GPU Architecture for Pattern Identification in Segmented Detectors Big-Data Surveys. 338-352 - Veni Thangaraj, S. Mary Saira Bhanu:

MDedup++: Exploiting Temporal and Spatial Page-Sharing Behaviors for Memory Deduplication Enhancement. 353-370 - Sérgio Esteves, Luís Veiga

:
WaaS: Workflow-as-a-Service for the Cloud with Scheduling of Continuous and Data-Intensive Workflows. 371-383
- David L. González-Álvarez, Miguel A. Vega-Rodríguez

, Álvaro Rubio-Largo
:
A Comparative Study of Different Motif Occurrence Models Applied to a Hybrid Multiobjective Shuffle Frog Leaping Algorithm. 384-402 - Yan Kong, Minjie Zhang

, Dayong Ye
:
An Auction-Based Approach for Group Task Allocation in an Open Network Environment. 403-422 - Iyad F. Jafar, Khalid A. Darabkh

, Raed T. Al-Zubi, Rami A. Al Namneh:
Efficient Reversible Data Hiding Using Multiple Predictors. 423-438
Volume 59, Number 4, April 2016
Original Articles
- Wuqiang Shen, Shaohua Tang:

RGB, a Mixed Multivariate Signature Scheme. 439-451 - Leyou Zhang

, Yi Mu, Qing Wu:
Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys. 452-461 - Simeon Veloudis

, Nimal Nissanke:
A Novel Permission Hierarchy for RBAC for Dealing with SoD in MAC Models. 462-492 - Mingwu Zhang, Yi Mu:

Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations. 493-507 - Joonsang Baek

, Duncan S. Wong, Jin Li, Man Ho Au
:
Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction. 508-521 - Peng Zhou

, Xiaojing Gu, Rocky K. C. Chang
:
Harvesting File Download Exploits in the Web: A Hacker's View. 522-540 - Xinran Li, Chen-Hui Jin, Fang-Wei Fu:

Improved Results of Impossible Differential Cryptanalysis on Reduced FOX. 541-548 - Guo-qiang Liu, Chen-Hui Jin:

Linear Cryptanalysis of PRESENT-like Ciphers with Secret Permutation. 549-558 - Jiannan Wei, Guomin Yang

, Yi Mu, Kaitai Liang
:
Anonymous Proxy Signature with Hierarchical Traceability. 559-569 - Emma Osborn, Andrew C. Simpson

:
On Safety and Security Requirements in Emerging Ubiquitous Computing Models. 570-591 - Hung-Yu Chien:

A Generic Approach to Improving Diffie-Hellman Key Agreement Efficiency for Thin Clients. 592-601
Volume 59, Number 5, May 2016
- Josh Chopin

, Hamid Laga, Stanley J. Miklavcic
:
The Influence of Object Shape on the Convergence of Active Contour Models for Image Segmentation. 603-615 - Jia Jie Liu

, Cheng-Ju Hsu, Chien-Hung Lin:
Computing Global Secure Set on Trees. 616-629 - Riku Saikkonen, Eljas Soisalon-Soininen:

Cache-Sensitive Memory Layout for Dynamic Binary Trees. 630-649 - Konrad K. Dabrowski, Daniël Paulusma

:
Clique-Width of Graph Classes Defined by Two Forbidden Induced Subgraphs. 650-666 - Natarajan Meghanathan

:
Maximal Assortative Matching and Maximal Dissortative Matching for Complex Network Graphs. 667-684 - Ju Hee Choi

, Gi-Ho Park:
Demand-Aware NVM Capacity Management Policy for Hybrid Cache Architecture. 685-700 - Jia-Chun Lin, Fang-Yie Leu, Ying-Ping Chen:

Impacts of Task Re-Execution Policy on MapReduce Jobs. 701-714 - Hao Zheng, Xiaoshe Dong, Zhengdong Zhu, Baoke Chen, Xiuxiu Bai, Xingjun Zhang, Endong Wang:

Improving the Reliability of the Operating System Inside a VM. 715-740 - Tao Zhang

, He Jiang, Xiapu Luo
, Alvin T. S. Chan:
A Literature Review of Research in Bug Resolution: Tasks, Challenges and Future Directions. 741-773
Volume 59, Number 6, June 2016
- Bernabé Dorronsoro, Sergio Nesmachnow:

Parallel Soft Computing Techniques in High-Performance Computing Systems. 775-776 - Francisco Luna

, Gustavo R. Zavala, Antonio J. Nebro
, Juan José Durillo, Carlos A. Coello Coello
:
Distributed Multi-Objective Metaheuristics for Real-World Structural Optimization Problems. 777-792 - Misun Yu, Doo-Hwan Bae:

SimpleLock+: Fast and Accurate Hybrid Data Race Detection. 793-809 - Nadia Nedjah

, Rogério De Moraes Calazan
, Luiza de Macedo Mourelle
:
Particle, Dimension and Cooperation-Oriented PSO Parallelization Strategies for Efficient High-Dimension Problem Optimizations on Graphics Processing Units. 810-835 - Guillermo Vigueras

, Juan M. Orduña:
On the Use of GPU for Accelerating Communication-Aware Mapping Techniques. 836-847
- Jianliang Gao, Ping Liu, Xuedan Kang, Lixia Zhang, Jianxin Wang:

PRS: Parallel Relaxation Simulation for Massive Graphs. 848-860 - Zhuo Wang

, Tingting Hou, Dawei Song, Zhun Li, Tianqi Kong:
Detecting Review Spammer Groups via Bipartite Graph Projection. 861-874 - Chris Gorman, Iren Valova:

GORMANN: Gravitationally Organized Related Mapping Artificial Neural Network. 875-888 - D. Thenmozhi, Chandrabose Aravindan

:
An Automatic and Clause-Based Approach to Learn Relations for Ontologies. 889-907 - Mert Ozer

, Ilkcan Keles
, Ismail Hakki Toroslu
, Pinar Karagoz
, Hasan Davulcu:
Predicting the Location and Time of Mobile Phone Users by Using Sequential Pattern Mining Techniques. 908-922 - Sangeeta Bhattacharya, Subramanian Selvakumar

:
Multi-Measure Multi-Weight Ranking Approach for the Identification of the Network Features for the Detection of DoS and Probe Attacks. 923-943
Volume 59, Number 7, July 2016
Original Articles
- Joseph K. Liu, Sze Ling Yeo, Wun-She Yap

, Sherman S. M. Chow
, Duncan S. Wong, Willy Susilo
:
Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol. 945-954 - Peng Jiang

, Yi Mu, Fuchun Guo
, Xiaofen Wang, Qiaoyan Wen:
Online/Offline Ciphertext Retrieval on Resource Constrained Devices. 955-969 - Chunpeng Ge, Willy Susilo

, Jiandong Wang, Zhiqiu Huang, Liming Fang, Yongjun Ren:
A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles. 970-982 - Zhen Liu, Duncan S. Wong:

Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe. 983-1004 - Amir Jalaly Bidgoly

, Behrouz Tork Ladani
:
Modeling and Quantitative Verification of Trust Systems Against Malicious Attackers. 1005-1027 - Jiguo Li, Haiting Du, Yichen Zhang:

Certificate-Based Key-Insulated Signature in the Standard Model. 1028-1039 - Joseph K. Liu, Willy Susilo

, Tsz Hon Yuen
, Man Ho Au
, Jun-bin Fang
, Zoe Lin Jiang, Jianying Zhou
:
Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles. 1040-1053 - Kunpeng Bai, Chuankun Wu:

An AES-Like Cipher and Its White-Box Implementation. 1054-1065 - Jiguo Li, Meilin Teng, Yichen Zhang, Qihong Yu:

A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme. 1066-1075 - Mario Diego Munoz-Hernandez, Miguel Morales-Sandoval

, Jose Juan Garcia-Hernandez:
An End-to-End Security Approach for Digital Document Management. 1076-1090 - Haibo Yi, Shaohua Tang:

Very Small FPGA Processor for Multivariate Signatures. 1091-1101 - Haibo Yi, Shaohua Tang, Ranga Vemuri

:
Fast Inversions in Small Finite Fields by Using Binary Trees. 1102-1112
Volume 59, Number 8, August 2016
Original Articles
- Xiang Zhao, Yifan Chen, Chuan Xiao

, Yoshiharu Ishikawa
, Jiuyang Tang:
Frequent Subgraph Mining Based on Pregel. 1113-1128 - Jorge Francisco Cutigi

, Adenilso da Silva Simão
, Simone R. S. Souza
:
Reducing FSM-Based Test Suites with Guaranteed Fault Coverage. 1129-1143 - Pablo Pérez-Lantero

:
Area and Perimeter of the Convex Hull of Stochastic Points. 1144-1154 - Hairong Yu, Guohui Li, Jianjun Li, LihChyun Shu:

DOcyclical: A Latency-Resistant Cyclic Multi-Threading Approach for Automatic Program Parallelization. 1155-1173 - Indra Rajasingh

, Paul D. Manuel
, N. Parthiban
, D. Azubha Jemilet
, R. Sundara Rajan
:
Transmission in Butterfly Networks. 1174-1179 - Zbynek Krivka

, Alexander Meduna
, Petr Zemek:
Phrase-Structure Grammars: Normal Forms and Reduction. 1180-1185 - Robert M. Hierons

, Uraz Cengiz Türker:
Distinguishing Sequences for Distributed Testing: Adaptive Distinguishing Sequences. 1186-1206 - Huilin Liu, Chen Chen, Junchang Xin, Liyuan Zhang:

Searching the Informative Subgraph Based on the PeakGraph Model. 1207-1219 - Hui Cui

, Robert H. Deng
:
Revocable and Decentralized Attribute-Based Encryption. 1220-1235 - Weifeng Wang, Li Jiao:

Trace Abstraction Refinement for Solving Horn Clauses. 1236-1251 - Fabrizio Luccio, Bernard Mans

, Luke Mathieson
, Linda Pagli:
Complete Balancing via Rotation. 1252-1263 - Rolando Trujillo-Rasua

, Ismael González Yero
:
Characterizing 1-Metric Antidimensional Trees and Unicyclic Graphs. 1264-1273
Volume 59, Number 9, September 2016
Original Articles
- Arambam Neelima

, Kh. Manglem Singh
:
Perceptual Hash Function based on Scale-Invariant Feature Transform and Singular Value Decomposition. 1275-1281 - Wei Ni:

Minimized Error Propagation Location Method Based on Error Estimation. 1282-1288 - D. Thenmozhi, Chandrabose Aravindan

:
Paraphrase Identification by Using Clause-Based Similarity Features and Machine Translation Metrics. 1289-1302 - Alok Kumar Singh Kushwaha

, Rajeev Srivastava
:
Maritime Object Segmentation Using Dynamic Background Modeling and Shadow Suppression. 1303-1329 - Willian Valmorbida, Jorge Luis Victória Barbosa

, Débora Nice Ferrari Barbosa
, Sandro José Rigo
:
U-Library: An Intelligent Model for Ubiquitous Library Support. 1330-1344 - Billur Barshan

, Aras Yurtman
:
Investigating Inter-Subject and Inter-Activity Variations in Activity Recognition Using Wearable Motion Sensors. 1345-1362 - Konstantinos Tsakalozos, Spiros Evangelatos, Fotis Psallidas, Marcos R. Vieira, Vassilis J. Tsotras

, Alex Delis:
DiVA: Using Application-Specific Policies to 'Dive' into Vector Approximations. 1363-1382 - Sunita Garhwal

, Ram Jiwari
:
Parallel Fuzzy Regular Expression and its Conversion to Epsilon-Free Fuzzy Automaton. 1383-1391 - Ohoud Nafea, Sanaa Ghouzali

, Wadood Abdul
, Qazi Emad-ul-Haq:
Hybrid Multi-Biometric Template Protection Using Watermarking. 1392-1407 - Yair Neuman, Yochai Cohen:

A Novel Methodology for Automatically Measuring Psychological Dimensions in Textual Data. 1408-1414 - Nilson Donizete Guerin Júnior, Flavio de Barros Vidal

, Bruno Macchiavello
:
Text-dependent User Verification of Handwritten Words and Signatures on Mobile Devices. 1415-1425 - Ümit Ekmekçi, Zehra Çataltepe, Güvenç Güngör, Demir Can Kahya:

EigenBots for the Okey Social Board Game. 1426-1432
Volume 59, Number 10, October 2016
Original Articles
- Pilar González-Férez

, Juan Piernas
, Toni Cortes
:
Improving I/O Performance Through an In-Kernel Disk Simulator. 1433-1452 - Lois Orosa

, Javier D. Bruguera, Elisardo Antelo
:
Asymmetric Allocation in a Shared Flexible Signature Module for Multicore Processors. 1453-1469 - Rui Hou

, Jigang Wu, Yawen Chen
, Haibo Zhang
:
Note on Edge-Colored Graphs for Networks with Homogeneous Faults. 1470-1478 - Ankur Singh Kang, Renu Vig

:
Comparatative Performance Evaluation of Modified Prototype Filter Bank Multicarrier Cognitive Radio Under Constraints of Lp, K, N and D. 1479-1491 - Yung-Ting Chuang, P. M. Melliar-Smith, Louise E. Moser, Isai Michel Lombera:

Statistical Estimation and Dynamic Adaptation Algorithms for the iTrust Publication, Search and Retrieval System. 1492-1510 - Hongzhi Zhao, Yuan Xue:

RSD Fault Block Model for Highly Efficient Fault-Tolerant Manhattan Routing Algorithms in 2D Mesh. 1511-1526 - L. Sivagami, J. Martin Leo Manickam:

Cluster-Based MAC Protocol for Collision Avoidance and TDMA Scheduling in Underwater Wireless Sensor Networks. 1527-1535
- Yili Gong, Chuang Hu

, Yanyan Xu, Wenjie Wang:
A Distributed File System with Variable Sized Objects for Enhanced Random Writes. 1536-1550 - I. S. Akila, R. Venkatesan:

A Fuzzy Based Energy-aware Clustering Architecture for Cooperative Communication in WSN. 1551-1562 - Xiang Hu, Li Jiao, Zhijia Li:

Modelling and Performance Analysis of IEEE 802.11 DCF Using Coloured Petri Nets. 1563-1580
Volume 59, Number 11, November 2016
Original Articles
- Magdy M. Fadel, Ali I. Eldesoky, Amira Y. Haikel, Labib M. Labib:

A Low-Storage Precise IP Traceback Technique Based on Packet Marking and Logging. 1581-1592 - Lan Zhou, Vijay Varadharajan

, K. Gopinath:
A Secure Role-Based Cloud Storage System For Encrypted Patient-Centric Health Records. 1593-1611 - Mohannad J. Alhanahnah, Arshad Jhumka, Sahel Alouneh

:
A Multidimension Taxonomy of Insider Threats in Cloud Computing. 1612-1622 - Fatemeh Imani-Mehr, Mehran S. Fallah:

How Powerful Are Run-Time Monitors with Static Information? 1623-1636 - Shifeng Sun, Joseph K. Liu, Yu Yu, Baodong Qin, Dawu Gu:

RKA-Secure Public Key Encryptions Against Efficiently Invertible Functions. 1637-1658 - Yanli Ren, Ning Ding, Xinpeng Zhang, Haining Lu, Dawu Gu:

Identity-Based Encryption with Verifiable Outsourced Revocation. 1659-1668 - Junqing Gong, Xiaolei Dong, Zhenfu Cao

, Jie Chen:
Almost-Tight Identity Based Encryption Against Selective Opening Attack. 1669-1688 - Hyung Tae Lee, San Ling

, Jae Hong Seo
, Huaxiong Wang:
CCA2 Attack and Modification of Huang et al.'s Public Key Encryption with Authorized Equality Test. 1689-1694 - Jiangshan Yu

, Vincent Cheval
, Mark Ryan
:
DTKI: A New Formalized PKI with Verifiable Trusted Parties. 1695-1713 - Jianghong Wei

, Xinyi Huang, Wenfen Liu, Xuexian Hu:
Practical Attribute-based Signature: Traceability and Revocability. 1714-1734 - Byungho Min, Vijay Varadharajan

:
Rethinking Software Component Security: Software Component Level Integrity and Cross Verification. 1735-1748
Volume 59, Number 12, December 2016
Original Articles
- Minhaj Ahmad Khan:

A Transformation For Optimizing String-Matching Algorithms For Long Patterns. 1749-1759 - Walayat Hussain

, Farookh Khadeer Hussain, Omar Khadeer Hussain
, Elizabeth Chang
:
Provider-Based Optimized Personalized Viable SLA (OPV-SLA) Framework to Prevent SLA Violation. 1760-1783 - Mariem Mefteh, Nadia Bouassida, Hanêne Ben-Abdallah

:
Mining Feature Models from Functional Requirements. 1784-1804 - Khaled El-Fakih, Nina Yevtushenko:

Test Translation for Embedded Finite State Machine Components. 1805-1816 - Farah Aït-Salaht

, Hind Castel-Taleb, Jean-Michel Fourneau, Nihal Pekergin:
Performance Analysis of a Queue by Combining Stochastic Bounds, Real Traffic Traces and Histograms. 1817-1830 - Patrizio Angelini

, Giordano Da Lozzo
:
SEFE = C-Planarity? 1831-1838 - Shiying Wang, Zhenhua Wang, Mujiangshan Wang

:
The 2-Extra Connectivity and 2-Extra Diagnosability of Bubble-Sort Star Graph Networks. 1839-1856 - Liang Bao, Fen Zhao, Mengqing Shen, Yutao Qi, Ping Chen:

An Orthogonal Genetic Algorithm for QoS-Aware Service Composition. 1857-1871 - Simone Brognoli, Gianfranco Lamperti

, Michele Scandale:
Incremental Determinization of Expanding Automata. 1872-1899 - Sandi Klavzar

, Paul D. Manuel
, Mohammad J. Nadjafi-Arani
, R. Sundara Rajan
, Cyriac Grigorious, Sudeep Stephen
:
Average Distance in Interconnection Networks via Reduction Theorems for Vertex-Weighted Graphs. 1900-1910

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














