


default search action
Journal of Computer and System Sciences, Volume 80
Volume 80, Number 1, February 2014
- Sebastián Ventura

, Cristóbal Romero
, Ajith Abraham:
Foreword: Intelligent data analysis. 1-2
- Manuel Baena-García, José M. Carmona-Cejudo, Rafael Morales Bueno:

String analysis by sliding positioning strategy. 3-15 - Prakash Shelokar

, Arnaud Quirin
, Oscar Cordón
:
Three-objective subgraph mining using multiobjective evolutionary programming. 16-26 - Abir Smiti, Zied Elouedi

:
WCOID-DG: An approach for case base maintenance based on Weighting, Clustering, Outliers, Internal Detection and Dbsan-Gmeans. 27-38 - Ricardo Cerri

, Rodrigo C. Barros
, André Carlos Ponce de Leon Ferreira de Carvalho
:
Hierarchical multi-label classification using local neural networks. 39-56 - Alvaro Ortigosa, Rosa M. Carro

, José Ignacio Quiroga:
Predicting user personality by mining social interactions in Facebook. 57-71 - Pasquale De Meo, Emilio Ferrara

, Giacomo Fiumara, Alessandro Provetti:
Mixing local and global information for community detection in large networks. 72-87 - José Otero

, Luciano Sánchez
, Inés Couso
, Ana M. Palacios:
Bootstrap analysis of multiple repetitions of experiments using an interval-valued multiple comparison procedure. 88-100 - David García, Antonio González Muñoz

, Raúl Pérez
:
A feature construction approach for genetic iterative rule learning algorithm. 101-117 - María Martínez-Ballesteros

, Isabel A. Nepomuceno-Chamorro
, José C. Riquelme:
Discovering gene association networks by multi-objective evolutionary quantitative association rules. 118-136
- Tomás Brázdil, Václav Brozek, Vojtech Forejt, Antonín Kucera

:
Branching-time model-checking of probabilistic pushdown automata. 139-156 - Fedor V. Fomin

, Petr A. Golovach
:
Parameterized complexity of connected even/odd subgraph problems. 157-179 - Robert Ganian

, Petr Hlinený
, Alexander Langer, Jan Obdrzálek, Peter Rossmanith, Somnath Sikdar:
Lower bounds on the complexity of MSO1 model-checking. 180-194 - Kaiping Xue

, Peilin Hong, Changsha Ma:
A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. 195-206 - Archontia C. Giannopoulou

, Iosif Salem
, Dimitris Zoros:
Effective computation of immersion obstructions for unions of graph classes. 207-216 - Jin-Yi Cai, Pinyan Lu

, Mingji Xia:
The complexity of complex weighted Boolean #CSP. 217-236 - Shuping Wan

, Jiuying Dong:
A possibility degree method for interval-valued intuitionistic fuzzy multi-attribute group decision making. 237-256 - Paolo Romano

, Roberto Palmieri
, Francesco Quaglia, Nuno Carvalho, Luís E. T. Rodrigues:
On speculative replication of transactional systems. 257-276 - Arnaud Durand, Stefan Mengel:

The complexity of weighted counting for acyclic conjunctive queries. 277-296 - Mika Göös, Tuomo Lempiäinen

, Eugen Czeizler
, Pekka Orponen
:
Search methods for tile sets in patterned DNA self-assembly. 297-319
Volume 80, Number 2, March 2014
- Anuj Dawar

, Ruy J. G. B. de Queiroz:
Editor's foreword: WoLLIC 2010. 321-322 - Naeem Abbasi, Osman Hasan

, Sofiène Tahar:
An approach for lifetime reliability analysis using theorem proving. 323-345 - Aditi Barthwal, Michael Norrish

:
A mechanisation of some context-free language theory in HOL4. 346-362 - Tomer Kotek, Johann A. Makowsky:

A representation theorem for (q-)holonomic sequences. 363-374 - Markus Latte, Martin Lange:

Branching-time logics with path relativisation. 375-389 - Glyn Morrill, Oriol Valentín

:
Displacement logic for anaphora. 390-409 - Renata Hax Sander Reiser

, Benjamín R. C. Bedregal, G. A. A. dos Reis:
Interval-valued fuzzy coimplications and related dual interval-valued conjugate functions. 410-425
- Nadia Creignou, Odile Papini, Reinhard Pichler, Stefan Woltran:

Belief revision within fragments of propositional logic. 427-449 - Aryeh Kontorovich, Ari Trachtenberg:

Deciding unique decodability of bigram counts via finite automata. 450-456 - Adrian Ionescu, Ernst L. Leiss:

On the role of complementation in implicit language equations and relations. 457-467 - Fedor V. Fomin

, Bart M. P. Jansen, Michal Pilipczuk
:
Preprocessing subgraph and minor problems: When does a small vertex cover help? 468-495
- William Hesse, Eric Allender

, David A. Mix Barrington:
Corrigendum to "Uniform constant-depth threshold circuits for division and iterated multiplication" [J. Comput. System Sci. 65(4) (2002) 695-716]. 496-497
Volume 80, Number 3, May 2014
- Al-Sakib Khan Pathan

, Zubair Md Fadlullah
, Mostafa Fouda
, Hae Young Lee
:
Defending against wireless network intrusion. 499-501
- Alif Wahid, Christopher Leckie

, Chenfeng Vincent Zhou:
Estimating the number of hosts corresponding to an intrusion alert while preserving privacy. 502-519 - Yifan Zhao, Swee-Won Lo, Robert H. Deng

, Xuhua Ding
:
Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks. 520-532 - Yang Yang:

Broadcast encryption based non-interactive key distribution in MANETs. 533-545 - Zhiwei Wang, Guozi Sun, Danwei Chen:

A new definition of homomorphic signature for identity management in mobile cloud computing. 546-553 - Paulo Manoel Mafra, Joni da Silva Fraga, Altair Olivo Santin

:
Algorithms for a distributed IDS in MANETs. 554-570 - Manuel Gil Pérez

, Félix Gómez Mármol
, Gregorio Martínez Pérez
, Antonio Fernandez Gómez-Skarmeta
:
Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems. 571-590 - Saeed Ur Rehman

, Kevin W. Sowerby, Colin Coghill:
Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers. 591-601 - Guangjie Han, Jinfang Jiang, Lei Shu

, Jianwei Niu
, Han-Chieh Chao
:
Management and applications of trust in Wireless Sensor Networks: A survey. 602-617 - Thanassis Giannetsos

, Tassos Dimitriou:
LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks. 618-643 - Hosein Shafiei

, Ahmad Khonsari
, H. Derakhshi, Payam Mousavi:
Detection and mitigation of sinkhole attacks in wireless sensor networks. 644-653 - Mauro Conti

, Roberto Di Pietro
, Angelo Spognardi
:
Clone wars: Distributed detection of clone attacks in mobile WSNs. 654-669 - Leonardo Maccari

, Renato Lo Cigno
:
Betweenness estimation in OLSR-based multi-hop networks for distributed filtering. 670-685
Volume 80, Number 4, June 2014
- Robert Crowston, Michael R. Fellows

, Gregory Z. Gutin, Mark Jones, Eun Jung Kim, Fran Rosamond
, Imre Z. Ruzsa, Stéphan Thomassé
, Anders Yeo
:
Satisfying more than half of a system of linear equations over GF(2): A multivariate approach. 687-696 - Edith Hemaspaandra, Lane A. Hemaspaandra

, Jörg Rothe:
The complexity of online manipulation of sequential elections. 697-710 - Gabriele Fici

:
On the structure of bispecial Sturmian words. 711-719 - Stanislav Böhm, Stefan Göller, Petr Jancar

:
Bisimulation equivalence and regularity for real-time one-counter automata. 720-743 - Richard Královic:

Infinite vs. finite size-bounded randomized computations. 744-765 - Sam Buss, Michael Soltys

:
Unshuffling a square is NP-hard. 766-776 - Sanjay Jain, Eric Martin, Frank Stephan

:
Robust learning of automatic classes of languages. 777-795 - Carlos Gómez-Rodríguez

:
Finding the smallest binarization of a CFG is NP-hard. 796-805 - John Case, Sanjay Jain, Yuh Shin Ong, Pavel Semukhin

, Frank Stephan
:
Automatic learners with feedback queries. 806-820 - Stefania Tosi, Sara Casolari, Michele Colajanni

:
Detecting correlation between server resources for system management. 821-836 - Qi Duan, Jinhui Xu:

On the connectivity preserving minimum cut problem. 837-848 - Ali Çivril

:
Column Subset Selection Problem is UG-hard. 849-859 - Danny Dolev, Matthias Függer, Markus Posch, Ulrich Schmid, Andreas Steininger

, Christoph Lenzen:
Rigorously modeling self-stabilizing fault-tolerant circuits: An ultra-robust clocking scheme for systems-on-chip. 860-900
Volume 80, Number 5, August 2014
- Rebecca Capone:

Publisher's note. 901
- Jinjun Chen, Jianxun Liu:

Special Issue: Dependable and Secure Computing. 902
- Yongming Xie, Guojun Wang:

Message matching-based greedy behavior detection in delay tolerant networks. 903-915 - Aarthi Nagarajan, Vijay Varadharajan

, Nathan Tarr:
Trust enhanced distributed authorisation for web services. 916-934 - Christopher Bailey, David W. Chadwick

, Rogério de Lemos:
Self-adaptive federated authorization infrastructures. 935-952 - Atef Shalan, Mohammad Zulkernine:

Software control flow error detection and correlation with system performance deviation. 953-972 - Julian Jang-Jaccard

, Surya Nepal
:
A survey of emerging threats in cybersecurity. 973-993 - Jiaqi Zhao, Lizhe Wang

, Jie Tao, Jinjun Chen, Weiye Sun, Rajiv Ranjan
, Joanna Kolodziej
, Achim Streit
, Dimitrios Georgakopoulos
:
A security framework in G-Hadoop for big data computing across distributed Cloud data centres. 994-1007 - Xuyun Zhang

, Chang Liu, Surya Nepal
, Chi Yang, Wanchun Dou, Jinjun Chen:
A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud. 1008-1020 - Yu Wang

, Yang Xiang
, Jun Zhang
, Wanlei Zhou
, Bailin Xie:
Internet traffic clustering with side information. 1021-1036
Volume 80, Number 6, September 2014
- Lev D. Beklemishev

, Ruy J. G. B. de Queiroz, Andre Scedrov
:
Editors' foreword. 1037 - Antonis Achilleos

:
A complexity question in justification logic. 1038-1045 - Samuel Bucheli, Roman Kuznets

, Thomas Studer
:
Realizing public announcements by justifications. 1046-1066 - Ranald Clouston:

Nominal Lawvere Theories: A category theoretic account of equational theories with names. 1067-1086 - Francicleber Martins Ferreira, Cibele Matos Freire, Mario R. F. Benevides

, Luis Menasché Schechter, Ana Teresa C. Martins:
Polynomial hierarchy graph properties in hybrid logic. 1087-1101 - Santiago Figueira

, Daniel Gorín, Rafael Grimson:
Independence friendly logic with classical negation via flattening is a second-order logic with weak dependencies. 1102-1118 - Julian Gutierrez, Glynn Winskel:

On the determinacy of concurrent games on event structures with infinite winning sets. 1119-1137 - Max I. Kanovich:

Multiset rewriting over Fibonacci and Tribonacci numbers. 1138-1151 - Juha Kontinen

, Jakub Szymanik:
A characterization of definability of second-order generalized quantifiers with applications to non-definability. 1152-1162 - Rick Statman:

On polymorphic types of untyped terms. 1163-1173
Volume 80, Number 7, November 2014
- Julio Aracena, Adrien Richard, Lilian Salinas

:
Maximum number of fixed points in AND-OR-NOT networks. 1175-1190 - Tom J. Ameloot, Jan Van den Bussche

:
Positive Dedalus programs tolerate non-causality. 1191-1213 - Edith Cohen, Nick G. Duffield

, Haim Kaplan, Carsten Lund, Mikkel Thorup
:
Algorithms and estimators for summarization of unaggregated data streams. 1214-1244 - Amihood Amir, Alberto Apostolico, Gad M. Landau, Avivit Levy, Moshe Lewenstein, Ely Porat:

Range LCP. 1245-1253 - Jesús García-López, Florin Manea, Victor Mitrana

:
Prefix-suffix duplication. 1254-1265 - Nikolaos Laoutaris

, Laura J. Poplawski, Rajmohan Rajaraman, Ravi Sundaram, Shang-Hua Teng:
Bounded Budget Connection (BBC) games or how to make friends and influence people, on a budget. 1266-1284 - Cristina Bazgan, Morgan Chopin

, Marek Cygan
, Michael R. Fellows
, Fedor V. Fomin
, Erik Jan van Leeuwen:
Parameterized complexity of firefighting. 1285-1297 - Manfred Broy:

Verifying of interface assertions for infinite state Mealy machines. 1298-1322 - Amir Talaei-Khoei, Suchada Vichitvanichphong, Terje Solvoll, Pradeep Ray

, Amir Hossein Ghapanchi
:
A methodology to develop awareness in computer supported collaborative work using policies. 1323-1338 - Chunguang Li, Shouzhen Zeng

, Tiejun Pan, Leina Zheng:
A method based on induced aggregation operators and distance measures to multiple attribute decision making under 2-tuple linguistic environment. 1339-1349 - Haitao Jiang, Binhai Zhu:

A linear kernel for the complementary maximal strip recovery problem. 1350-1358 - Christian Glaßer, Stephen D. Travers, Klaus W. Wagner:

Perfect correspondences between dot-depth and polynomial-time hierarchies. 1359-1373 - Fedor V. Fomin

, Yngve Villanger:
Searching for better fill-in. 1374-1383 - Matthias Mnich

, Geevarghese Philip, Saket Saurabh, Ondrej Suchý
:
Beyond Max-Cut: λ-extendible properties parameterized above the Poljak-Turzík bound. 1384-1403 - Moein Kianpour

, Reza Sabbaghi-Nadooshan, Keivan Navi:
A novel design of 8-bit adder/subtractor by quantum-dot cellular automata. 1404-1414 - Albert Atserias, Sergi Oliva:

Bounded-width QBF is PSPACE-complete. 1415-1429 - Fedor V. Fomin

, Stefan Kratsch, Marcin Pilipczuk, Michal Pilipczuk, Yngve Villanger:
Tight bounds for parameterized complexity of Cluster Editing with a small number of clusters. 1430-1447 - Sergio Flesca

, Filippo Furfaro
, Francesco Parisi
:
Consistency checking and querying in probabilistic databases under integrity constraints. 1448-1489
Volume 80, Number 8, December 2014
- Yang Xiang

, Ivan Stojmenovic, Peter Mueller
:
Editorial: Special Issue on Theory and Applications in Parallel and Distributed Computing Systems. 1491-1492 - Hua Wang

, Lili Sun, Elisa Bertino:
Building access control policy model for privacy preserving and testing policy conflicting problems. 1493-1503 - Ahmed Sallam, Kenli Li, Aijia Ouyang, Zhiyong Li:

Proactive workload management in dynamic virtualized environments. 1504-1517 - Lan Zhou, Vijay Varadharajan

, Michael Hitchens
:
Secure administration of cryptographic role-based access control for large-scale cloud storage systems. 1518-1533 - Zhide Chen, Cheng Qiao, Yihui Qiu, Li Xu, Wei Wu:

Dynamics stability in wireless sensor networks active defense model. 1534-1548 - Guiyi Wei, Rongxing Lu, Jun Shao:

EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption. 1549-1562 - Chi Yang, Xuyun Zhang

, Changmin Zhong, Chang Liu, Jian Pei
, Kotagiri Ramamohanarao
, Jinjun Chen:
A spatiotemporal compression based approach for efficient big data processing on Cloud. 1563-1583 - Younchan Jung

, Enrique Festijo:
One-time packet key exchange scheme for secure real-time multimedia applications. 1584-1596 - Sébastien Gambs, Marc-Olivier Killijian, Miguel Núñez del Prado Cortez

:
De-anonymization attack on geolocated data. 1597-1614

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














