


default search action
Computing, Volume 97
Volume 97, Number 1, January 2015
- Ernesto Damiani

, Achim Karduck, Moataz A. Ahmed
:
Editorial. 1-2 - Tetsuo Shinozaki, Yukiko Yamamoto, Setsuo Tsuruta:

Context-based counselor agent for software development ecosystem. 3-28 - Heidi Dikow, Omar Hasan, Harald Kosch

, Lionel Brunie, Renaud Sornin:
Improving the accuracy of Business-to-Business (B2B) reputation systems through rater expertise prediction. 29-49 - Claudio A. Ardagna

, Ravi Jhawar, Vincenzo Piuri:
Dependability certification of services: a model-based approach. 51-78 - Hai Dong

, Farookh Khadeer Hussain:
Service-requester-centered service selection and ranking model for digital transportation ecosystems. 79-102
Volume 97, Number 2, February 2015
- Gianpaolo Cugola, Alessandro Margara, Matteo Matteucci, Giordano Tamburrelli:

Introducing uncertainty in complex event processing: model, implementation, and validation. 103-144 - Stefan Kohek

, Damjan Strnad:
Interactive synthesis of self-organizing tree models on the GPU. 145-169 - Frédérique E. Oggier, Anwitaman Datta

:
Self-repairing codes - Local repairability for cheap and fast maintenance of erasure coded data. 171-201
Volume 97, Number 3, March 2015
- Lynn Choi, Raimund Kirner

:
Introduction to the special issue on software technologies for embedded and ubiquitous systems. 203-204 - Marjan Radi, Behnam Dezfouli, Kamalrulnizam Abu Bakar

, Shukor Abd Razak
, Malrey Lee:
LINKORD: link ordering-based data gathering protocol for wireless sensor networks. 205-236 - Sang Hoon Lee, Yunmook Nah, Lynn Choi:

Influenza surveillance and forecast with smartphone sensors. 237-259 - Susanne Kandl, Sandeep Chandrashekar:

Reasonability of MC/DC for safety-relevant software implemented in programming languages with short-circuit evaluation. 261-279 - Christian Motika, Reinhard von Hanxleden:

Light-weight Synchronous Java (SJL): An approach for programming deterministic reactive systems with Java. 281-307 - T. R. Reshmi, Krishnan Murugan

:
Filter-based address autoconfiguration protocol (FAACP) for duplicate address detection and recovery in MANETs. 309-331
Volume 97, Number 4, April 2015
- Jinjun Chen, Surya Nepal

:
Guest editorial: Special issue on data intensive cloud computing. 333-335 - Mingzhong Wang

, Liehuang Zhu, Kotagiri Ramamohanarao
:
Reasoning task dependencies for robust service selection in data intensive workflows. 337-355 - Khalid Alhamazani, Rajiv Ranjan

, Karan Mitra
, Fethi A. Rabhi, Prem Prakash Jayaraman
, Samee Ullah Khan
, Adnene Guabtni, Vasudha Bhatnagar
:
An overview of the commercial cloud monitoring tools: research dimensions, design issues, and state-of-the-art. 357-377 - Yang Wang, Menglan Hu, Kenneth B. Kent

:
ACS: an effective admission control scheme with deadlock resolutions for workflow scheduling in clouds. 379-402 - Yu Sun, Jianzhong Qi

, Rui Zhang
, Yueguo Chen, Xiaoyong Du:
MapReduce based location selection algorithm for utility maximization with capacity constraints. 403-423 - Mao Lin Huang

, Liang Fu Lu, Xuyun Zhang
:
Using arced axes in parallel coordinates geometry for high dimensional BigData visual analytics in cloud computing. 425-437
Volume 97, Number 5, May 2015
- Mahdi MollaMotalebi, Raheleh Maghami, Abdul Samad Ismail:

THRD: Threshold-based hierarchical resource discovery for Grid environments. 439-458 - Victor Lira, Eduardo Antonio Guimarães Tavares

, Stenio F. L. Fernandes, Paulo Romero Martins Maciel:
Dependable virtual network mapping. 459-481 - Amir-Mohsen Karimi-Majd, Mohammad Fathian, Babak Amiri:

A hybrid artificial immune network for detecting communities in complex networks. 483-507 - Jingyu Han, Kejia Chen, Jianing Wang:

Web article quality ranking based on web community knowledge. 509-537
Volume 97, Number 6, June 2015
- Masoud Daneshtalab

, Nader Bagherzadeh
, Hamid Sarbazi-Azad:
Special issue on on-chip parallel and network-based systems. 539-541 - Sang Cheol Kim, Sunggu Lee:

Decentralized task scheduling for a fixed priority multicore embedded RTOS. 543-555 - Valery Sklyarov

, Iouliia Skliarova
:
Design and implementation of counting networks. 557-577 - Ayhan Demiriz

, Nader Bagherzadeh
, Abdulaziz Alhussein:
Using constraint programming for the design of network-on-chip architectures. 579-592 - Özcan Özturk, Ismail Akturk, Ismail Kadayif, Suleyman Tosun:

Energy reduction in 3D NoCs through communication optimization. 593-609 - Mohammad Hossein Neishaburi, Zeljko Zilic:

System on chip failure rate assessment using the executable model of a system. 611-629 - Masoumeh Ebrahimi, Masoud Daneshtalab

:
A Light-weight fault-tolerant routing algorithm tolerating faulty links and routers. 631-648 - Amir Ghanbari Bavarsad, Ehsan Atoofian:

TurboLock: increasing associativity of lock table in transactional memory. 649-661
Volume 97, Number 7, July 2015
- Ladjel Bellatreche, Abdelmalek Amine

, Otmane Aït Mohamed:
Special issue on contributions of computational intelligence in designing complex information systems. 663-666 - Assad Abbas

, Limin Zhang, Samee Ullah Khan
:
A survey on context-aware recommender systems based on computational intelligence techniques. 667-690 - Samir Ouchani

, Mourad Debbabi
:
Specification, verification, and quantification of security in model-based systems. 691-711 - Linda Mohand-Oussaïd, Idir Aït-Sadoune

, Yamine Aït Ameur, Mohamed Ahmed-Nacer:
A formal model for output multimodal HCI - An Event-B formalization. 713-740 - Shuhao Yu, Shenglong Zhu, Yan Ma, Demei Mao:

Enhancing firefly algorithm using generalized opposition-based learning. 741-754 - Jing Zhang, Hang Lei:

A pre-distribution algorithm of component reliability in Internetware system. 755-768
Volume 97, Number 8, August 2015
- Dongeun Lee, Junhee Ryu, Heonshik Shin:

Scalable management of storage for massive quality-adjustable sensor data. 769-793 - Tieqiang Mo, Renfa Li:

A new memory mapping mechanism for GPGPUs' stencil computation. 795-812 - Román Anselmo Mora Gutiérrez

, María E. Lárraga-Ramírez
, Eric Alfredo Rincón García, Antonin Ponsich, Javier Ramírez-Rodríguez:
Adaptation of the method of musical composition for solving the multiple sequence alignment problem. 813-842 - Erfan Najmi, Khayyam Hashmi, Zaki Malik

, Abdelmounaam Rezgui, Habib Ullah Khan
:
CAPRA: a comprehensive approach to product ranking using customer reviews. 843-867
Volume 97, Number 9, September 2015
- Vincent Gramoli, Rachid Guerraoui

:
Special issue on NETYS selected papers. 869-870 - Víctor López Millán, Vicent Cholvi

, Luis López, Antonio Fernández Anta
:
Improving resource location with locally precomputed partial random walks. 871-891 - Yahya Benkaouz, Mohammed Erradi:

A distributed protocol for privacy preserving aggregation with non-permanent participants. 893-912 - Mohamed Riduan Abid, Saad Biaz:

Airtime ping-pong effect characterization in IEEE 802.11s wireless mesh networks. 913-937 - Diego Didona, Pascal Felber

, Derin Harmanci, Paolo Romano
, Jörg Schenker:
Identifying the optimal level of parallelism in transactional memory applications. 939-959 - Antoine Boutet, Davide Frey, Arnaud Jégou, Anne-Marie Kermarrec

, Heverson B. Ribeiro:
FreeRec: an anonymous and distributed personalization architecture. 961-980
- Retraction Note to: New probabilistic models for managing user's locations in PCS networks. 981

Volume 97, Number 10, October 2015
- Florian Daniel

, George A. Papadopoulos
, Philippe Thiran:
Mobile web information systems (MobiWIS 2013) - Best papers special issue editorial. 983-984 - Tor-Morten Grønli

, Pardis Pourghomi
, Gheorghita Ghinea
:
Towards NFC payments using a lightweight architecture for the Web of Things. 985-999 - Luis Corral

, Alberto Sillitti, Giancarlo Succi
:
Software assurance practices for mobile applications - A survey of the state of the art. 1001-1022 - Ioannis K. Chaniotis, Kyriakos-Ioannis D. Kyriakou, Nikolaos D. Tselikas

:
Is Node.js a viable option for building modern web applications? A performance evaluation study. 1023-1044
Volume 97, Number 11, November 2015
- Kok-Lim Alvin Yau, Hock Guan Goh, David Chieng

, Kae Hsiang Kwong:
Application of reinforcement learning to wireless sensor networks: models and algorithms. 1045-1075 - Juan M. Cebrian

, Magnus Jahre
, Lasse Natvig:
ParVec: vectorizing the PARSEC benchmark suite. 1077-1100 - Saeed Shahrivari, Saeed Jalili

:
Distributed discovery of frequent subgraphs of a network using MapReduce. 1101-1120 - Jamilson Dantas, Rúbens de Souza Matos Júnior, Jean Araujo

, Paulo Romero Martins Maciel:
Eucalyptus-based private clouds: availability modeling and comparison to the cost of a public cloud. 1121-1140
Volume 97, Number 12, December 2015
- Marios Fragkoulis

, Diomidis Spinellis
, Panos Louridas:
An interactive SQL relational interface for querying main-memory data structures. 1141-1164 - Tinghuai Ma

, Yuliang Zhang, Jie Cao, Jian Shen, Meili Tang, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
KDVEM : a k-degree anonymity with vertex and edge modification algorithm. 1165-1184 - Kifayat-Ullah Khan, Waqas Nawaz

, Young-Koo Lee:
Set-based approximate approach for lossless graph summarization. 1185-1207 - Fouad Bahrpeyma

, Hassan Haghighi, Ali Zakerolhosseini:
An adaptive RL based approach for dynamic resource provisioning in Cloud virtualized data centers. 1209-1234

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














