default search action
The Computer Journal, Volume 53, 2010
Volume 53, Number 1, January 2010
- Erol Gelenbe:
Editorial. 1-2 - Yongzhi Cao:
A Hierarchy of Behavioral Equivalences in the π-calculus with Noisy Channels. 3-20 - Xiaowei Huang, Li Jiao, Weiming Lu:
Congruence Formats for Weak Readiness Equivalence and Weak Possible Future Equivalence. 21-36 - Xuejun Yang, Ji Wang, Xiaodong Yi:
Slicing Execution with Partial Weakest Precondition for Model Abstraction of C Programs. 37-49
- Daniel Cutting, Aaron J. Quigley, Björn Landfeldt:
Special Interest Messaging: A Comparison of IGM Approaches. 50-68 - Patrick Erik Bradley, Norbert Paul:
Using the Relational Model to Capture Topological Information of Spaces. 69-89 - Wil M. P. van der Aalst, Niels Lohmann, Peter Massuthe, Christian Stahl, Karsten Wolf:
Multiparty Contracts: Agreeing and Implementing Interorganizational Processes. 90-106 - Feng Liu, Chuan Kun Wu, Xi Jun Lin:
Some Extensions on Threshold Visual Cryptography Schemes. 107-119 - A. S. M. Sajeev, Sakgasit Ramingwong:
Mum Effect as an Offshore Outsourcing Risk: A Study of Differences in Perceptions. 120-126
- Ricardo P. Jasinski:
Jari Nurmi: Processor Design - System-on-Chip Computing for ASICs and FPGAs. Springer (2007) ISBN 978-1-4020-5529-4. 127
Volume 53, Number 2, February 2010
- Bo Hu, Bin Hu, Victor Callaghan, Zongkai Lin:
Combining Theory and Systems Building in Pervasive Computing. 129-130 - Junzhou Luo, Weining Kong, Liang Ge:
Implementation of Learning Path in Process Control Model. 131-141 - Fernando Rivera-Illingworth, Victor Callaghan, Hani Hagras:
Detection Of Normal and Novel Behaviours In Ubiquitous Domestic Environments. 142-151 - Baopeng Zhang, Yuanchun Shi, Xin Xiao:
A Policy-Driven Service Composition Method for Adaptation in Pervasive Computing Environment. 152-165 - Zheng-Yu Wu, Han-Tao Song:
Ant-based Energy-aware Disjoint Multipath Routing Algorithm for MANETs. 166-176 - Jinjiao Lin, Chengxiang Song, Haiyang Wang:
A Rule-based Method for Improving Adaptability in Pervasive Systems. 177-190 - Philip Moore, Bin Hu, JiZheng Wan:
Smart-Context: A Context Ontology for Pervasive Mobile Computing. 191-207
- Kumaara Velan:
Modelling Bidders in Sequential Automated Auctions. 208-218 - Zhao Wu, Naixue Xiong, Jong Hyuk Park, Tai-Hoon Kim, Lei Yuan:
A Simulation Model Supporting Time and Non-time Metrics for Web Service Composition. 219-233 - Mouna Allani, Benoît Garbinato, Fernando Pedone:
Resource-Aware Multimedia Content Delivery: A Gambling Approach. 234-248
Volume 53, Number 3, March 2010
- Taskin Koçak:
Two Decades of Random Neural Networks. 249-250 - Stelios Timotheou:
The Random Neural Network: A Survey. 251-267 - Georgia Sakellari:
The Cognitive Packet Network: A Survey. 268-279 - Jian Wu, Steve B. Furber:
A Multicast Routing Scheme for a Universal Spiking Neural Network Architecture. 280-288 - Mustafa Badaroglu, Ugur Halici, Isik Aybay, Cuneyt Cerkez:
A Cascadable Random Neural Network Chip with Reconfigurable Topology. 289-303
- Fionn Murtagh:
The Correspondence Analysis Platform for Uncovering Deep Structure in Data and Information. 304-315 - Ching-man Au Yeung, Ho-fung Leung:
A Formal Model of Ontology for Handling Fuzzy Membership and Typicality of Instances. 316-341 - Ajoy Kumar Datta, Lawrence L. Larmore, Priyanka Vemula:
A Self-Stabilizing O(k)-Time k-Clustering Algorithm. 342-350 - Chih-Yu Lin, Yu-Chee Tseng, Yung-Chih Liu:
Imprecision-Tolerant Location Management for Object-Tracking Wireless Sensor Network. 351-364
Volume 53, Number 4, May 2010
- Marcus Nilsson:
Computational Aspects of Monomial Dynamical Systems. 365-369 - Vladimir Anashin:
Non-Archimedean Ergodic Theory and Pseudorandom Generators. 370-392 - Patrick Erik Bradley:
Mumford Dendrograms. 393-404 - Fionn Murtagh:
On Ultrametric Algorithmic Information. 405-416 - Jenny Benois-Pineau, Andrei Yu. Khrennikov:
Significance Delta Reasoning with p-Adic Neural Networks: Application to Shot Change Detection in Video. 417-431 - Branko Dragovich, Alexandra Dragovich:
p-Adic Modelling of the Genome and the Genetic Code. 432-442 - Anthony Karel Seda, Pascal Hitzler:
Generalized Distance Functions in the Theory of Computation. 443-464
- Behzad Akbarpour, Amr Talaat Abdel-Hamid, Sofiène Tahar, John Harrison:
Verifying a Synthesized Implementation of IEEE-754 Floating-Point Exponential Function using HOL. 465-488
- Mark Levene:
Rokach Lior and Maimon Oded: Data Mining with Decision Trees: Theory and Applications World Scientific (2008) ISBN-13 978-981-277-171-1. 489 - Boran Gazi:
Krzysztof J. Cios, Witold Pedrycz, Roman W. Swiniarski and Lukasz A. Kurgan: Data Mining: A Knowledge Discovery Approach Springer (2007) ISBN 978-0387333335. 489-490
Volume 53, Number 5, June 2010
- Duncan Gillies, David J. Thornley, Chatschik Bisdikian:
Probabilistic Approaches to Estimating the Quality of Information in Military Sensor Networks. 493-502 - Gita Sukthankar, Katia P. Sycara:
Analyzing Team Decision-Making in Tactical Scenarios. 503-512 - Lei Chen, Zijian Wang, Boleslaw K. Szymanski, Joel W. Branch, Dinesh C. Verma, Raju Damarla, John Ibbotson:
Dynamic Service Execution in Sensor Networks. 513-527 - Katia P. Sycara, Timothy J. Norman, Joseph Andrew Giampapa, Martin J. Kollingbaum, Chris Burnett, Daniele Masato, Mairi McCallum, Michael H. Strub:
Agent Support for Policy-Driven Collaborative Mission Planning. 528-540 - Dinesh C. Verma, Bong Jun Ko, Petros Zerfos, Kang-Won Lee, Ting He, Matthew Duggan, Kristian D. Stewart, Ananthram Swami, Nikoletta Sofra:
Understanding the Quality of Monitoring for Network Management. 541-550
- Zhongqiang Chen, Yuan Zhang, Zhongrong Chen:
A Categorization Framework for Common Computer Vulnerabilities and Exposures. 551-580 - Hafizur Rahaman, Jimson Mathew, Dhiraj K. Pradhan:
Secure Testable S-box Architecture for Cryptographic Hardware Implementation. 581-591
- François Baccelli, Bartlomiej Blaszczyszyn, Paul Mühlethaler:
Time-Space Opportunistic Routing in Wireless Ad hoc Networks: Algorithms and Performance Optimization by Stochastic Geometry. 592-609 - Mathew D. Penrose:
Discussant of Response to the Computer Journal Lecture by Francois Baccelli. 610-611 - Takis Konstantopoulos:
Response to Prof. Baccelli's lecture on Modelling of Wireless Communication Networks by Stochastic Geometry. 612-614
- Rupak Majumdar:
Paul Ammann and Jeff OffuttIntroduction to Software Testing. Cambridge University Press(2008). ISBN: 978-0-521-88038-1, 322 pp. Hardcover. 615 - François Laroussinie:
Christel Baier and Joost-Pieter KatoenPrinciples of Model Checking. MIT Press (May 2008).ISBN: 978-0-262-02649-9, 975 pp. Hardcover. 615-616 - Neil F. Johnson:
Frank Y. ShihDigital Watermarking and Steganography: Fundamentals and Techniques. CRC/Taylor & Francis (2008).ISBN-13: 9781420047578, 180 pp. Hardcover. 616-617
Volume 53, Number 6, July 2010
- Fairouz Kamareddine:
Capsule Reviews. 619-622
- Chien-Liang Chen, Shao-Chi Chin, Hsu-Chun Yen:
Reachability Analysis of Augmented Marked Graphs via Integer Linear Programming. 623-633 - Yu-Chen Kuo:
General Tree k-Coteries to Reduce the Degradation of Quorums. 634-643 - R. Marshall:
Modeling DNA/RNA Strings Using Resistor - Capacitor (RC) Ladder Networks. 644-660 - Ro-Yu Wu, Jou-Ming Chang, Yue-Li Wang:
Loopless Generation of Non-regular Trees with a Prescribed Branching Sequence. 661-666 - Jywe-Fei Fang:
The Bipancycle-Connectivity and the m-Pancycle-Connectivity of the k-ary n-cube. 667-678 - Roberto Barbuti, Nicoletta De Francesco, Luca Tesei:
An Abstract Interpretation Approach for Enhancing the Java Bytecode Verifier. 679-700 - Shmuel Tomi Klein, Miri Kopel Ben-Nissan:
On the Usefulness of Fibonacci Compression Codes. 701-716 - Dae-Hwan Kim, Hyuk-Jae Lee:
Fine-Grain Register Allocation and Instruction Scheduling in a Reference Flow. 717-740 - Emilio J. Padrón, Margarita Amor, Montserrat Bóo, Ramon Doallo:
Hierarchical Radiosity for Multiresolution Systems Based on Normal Tests. 741-752 - Iren Valova, Derek Beaton, Daniel MacLean, John Hammond:
NIPSOM: Parallel Architecture and Implementation of a Growing SOM. 753-771 - Anne Benoit, Mourad Hakem, Yves Robert:
Multi-criteria Scheduling of Precedence Task Graphs on Heterogeneous Platforms. 772-785 - Xiaoyan Zhu, Qinbao Song, Zihan Jia:
A Weighted Voting-Based Associative Classification Algorithm. 786-801 - Jen-Bang Feng, Iuon-Chang Lin, Yen-Ping Chu, Shyh-Chang Tsaur:
Resampling Halftone Images Using Interpolation and Error-Diffusion. 802-813 - Hans Vandierendonck, Sean Rul, Koen De Bosschere:
Accelerating Multiple Sequence Alignment with the Cell BE Processor. 814-826 - Michael A. Bekos, Michael Kaufmann, Katerina Potika, Antonios Symvonis:
Area-Feature Boundary Labeling. 827-841 - Rich Picking, Alexia Robinet, Vic Grout, John McGinn, Armando Roy Delgado, Simon Ellis, Denise Oram:
A Case Study Using a Methodological Approach to Developing User Interfaces for Elderly and Disabled People. 842-859
- Peter G. Harrison:
Turning Back Time - What Impact on Performance? 860-868 - Erol Gelenbe, Stephen Gilmore:
Discussants' Comments on the Computer Journal Lecture by Peter Harrison presented at the British Computer Society on 24th February 2009. 869-870 - Alessandra Di Pierro, Chris Hankin, Herbert Wiklicky:
Program Analysis Probably Counts. 871-880 - Pasquale Malacaria:
Program Analysis Probably Counts: Discussant Contribution for the Computer Journal Lecture by Chris Hankin. 881
Volume 53, Number 7, September 2010
- HaNeul Chon, Taewhan Kim:
Resource Sharing Problem of Timing Variation-Aware Task Scheduling and Binding in MPSoC. 883-894 - Liang Xia, Yongxin Zhu, Jun Yang, Jingwei Ye, Zonghua Gu:
Implementing a Thermal-Aware Scheduler in Linux Kernel on a Multi-Core Processor. 895-903 - Minje Jun, Eui-Young Chung:
Design of On-Chip Crossbar Network Topology Using Chained Edge Partitioning. 904-917
- Chung-Ming Huang, Jian-Wei Li, Chun-Ta Chen:
Distributed Hash Table-Based Interrogating-Call Session Control Function Network in the Internet Protocol Multimedia Subsystem for Efficient Query Services. 918-933 - Jongsung Kim, Seokhie Hong:
Side-Channel Attack Using Meet-in-the-Middle Technique. 934-938 - Iuon-Chang Lin, Shih-Shan Tang, Chung-Ming Wang:
Multicast Key Management without Rekeying Processes. 939-950 - Jenn-Wei Lin, Ming-Feng Yang:
Robust Super-Peer-Based P2P File-Sharing Systems. 951-968 - Chuan-Chi Weng, Ching-Wen Chen, Chang-Jung Ku, Shiow-Fen Hwang:
A Bandwidth-Based Power-Aware Routing Protocol with Low Route Discovery Overhead in Mobile Ad hoc Networks. 969-990 - Jonathan Tate, Iain Bate:
Sensornet Protocol Tuning Using Principled Engineering Methods. 991-1019 - Georgios Loukas, Gülay Öke:
Protection Against Denial of Service Attacks: A Survey. 1020-1037 - Isi Mitrani:
Management of Server Farms for Performance and Profit. 1038-1044 - Andreas Berl, Erol Gelenbe, Marco Di Girolamo, Giovanni Giuliani, Hermann de Meer, Dang Minh Quan, Kostas Pentikousis:
Energy-Efficient Cloud Computing. 1045-1051 - Erol Gelenbe, Edith C. H. Ngai:
Adaptive Random Re-Routing for Differentiated QoS in Sensor Networks. 1052-1061 - Tsu-Yang Wu, Yuh-Min Tseng:
An ID-Based Mutual Authentication and Key Exchange Protocol for Low-Power Mobile Devices. 1062-1070 - Xiuqiang He, Zonghua Gu, Yongxin Zhu:
Task Allocation and Optimization of Distributed Embedded Systems with Simulated Annealing and Geometric Programming. 1071-1091 - Eyal Loz, Guillermo Pineda-Villavicencio:
New Benchmarks for Large-Scale Networks with Given Maximum Degree and Diameter. 1092-1105 - Denis Trcek:
Security Metrics Foundations for Computer Security. 1106-1112
- Morris Sloman, Emil C. Lupu:
Engineering Policy-Based Ubiquitous Systems. 1113-1127 - Robin Milner:
Discussant of Response to the Computer Journal Lecture by Morris Sloman. 1128
- Mark Levene:
Social Networks: An Introduction. 1129 - Elizabeth Harrin:
Growing Software: Proven Strategies for Managing Software Engineers. 1129-1130
- Michael Elad, Dmitry Datsenko:
Corrigendum: Example-Based Regularization Deployed to Super-Resolution Reconstruction of a Single Image. 1131
Volume 53, Number 8, October 2010
- Sung Woo Chung, Hsien-Hsin S. Lee, Woo Hyong Lee:
Architecture/OS Support for Embedded Multi-core Systems. 1134-1135
- Fariba Sadri, Kostas Stathis:
Special Issue on Artificial Societies for Ambient Intelligence Editorial Introduction. 1136-1137 - Jurriaan van Diggelen, Robbert-Jan Beun, Rogier M. van Eijk, Peter J. Werkhoven:
Efficient Semantic Information Exchange for Ambient Intelligence. 1138-1151 - Marco P. Locatelli, Marco Loregian, Giuseppe Vizzari:
Artificial Societies in a Community-Based Approach to Ambient Intelligence. 1152-1168 - Aitor Ibarguren, Iñaki Maurtua, Basilio Sierra:
Layered Architecture for Real-Time Sign Recognition. 1169-1183 - Krysia Broda, Christopher J. Hogger:
Designing Effective Policies for Minimal Agents. 1184-1209 - Fabio Paternò, Carmen Santoro, Antonio Scorcia:
Ambient Intelligence for Supporting Task Continuity across Multiple Devices and Implementation Languages. 1210-1228 - Patrice Caire, Leendert W. N. van der Torre:
Convivial Ambient Technologies: Requirements, Ontology and Design. 1229-1256 - Alessandra Mileo, Davide Merico, Stefano Pinardi, Roberto Bisiani:
A Logical Approach to Home Healthcare with Intelligent Sensor-Network Support. 1257-1276
- Johnsen Kho, Long Tran-Thanh, Alex Rogers, Nicholas R. Jennings:
An Agent-Based Distributed Coordination Mechanism for Wireless Visual Sensor Nodes Using Dynamic Programming. 1277-1290 - Guang-Ho Cha:
A Context-Aware Similarity Search for a Handwritten Digit Image Database. 1291-1301 - Huzaifa Zafar, Daniel D. Corkill:
Reducing Online Model-Development Time by Agents Using Constraints Between Shared Observations. 1302-1314 - Mücahid Kutlu, Celal Cigir, Ilyas Cicekli:
Generic Text Summarization for Turkish. 1315-1323 - Göksel Günlü, Hasan S. Bilge:
Face Recognition with Discriminating 3D DCT Coefficients. 1324-1337
- Jakub Marecek:
Handbook of Approximation Algorithms and Metaheuristics. 1338-1339
Volume 53, Number 9, November 2010
- Nicholas R. Jennings, Alex Rogers, S. Case, R. Johnston, D. Philpot:
Decentralized Data and Information Systems: Theory and Practice. 1341-1343 - Michalis Smyrnakis, David S. Leslie:
Dynamic Opponent Modelling in Fictitious Play. 1344-1359 - Erol Gelenbe, Stelios Timotheou, David Nicholson:
Fast Distributed Near-Optimum Assignment of Assets to Tasks. 1360-1369 - Nicos G. Pavlidis, Niall M. Adams, David Nicholson, David J. Hand:
Prospects for Bandit Solutions in Sensor Management. 1370-1383 - Nikolaos Dimakis, Avgoustinos Filippoupolitis, Erol Gelenbe:
Distributed Building Evacuation Simulator for Smart Emergency Management. 1384-1400 - Christoforos Anagnostopoulos, Niall M. Adams, David J. Hand:
Streaming Covariance Selection with Applications to Adaptive Querying in Sensor Networks. 1401-1414 - Seung Min Lee, Stephen J. Roberts:
Sequential Dynamic Classification Using Latent Variable Models. 1415-1429 - Roman Garnett, Michael A. Osborne, Steven Reece, Alex Rogers, Stephen J. Roberts:
Sequential Bayesian Prediction in the Presence of Changepoints and Faults. 1430-1446 - Sarvapali D. Ramchurn, Alessandro Farinelli, Kathryn S. Macarthur, Nicholas R. Jennings:
Decentralized Coordination in RoboCup Rescue. 1447-1461 - Archie C. Chapman, Rosa Anna Micillo, Ramachandra Kota, Nicholas R. Jennings:
Decentralized Dynamic Task Allocation Using Overlapping Potential Games. 1462-1477
- Lein Harn, Wen-Jung Hsin, Changlu Lin:
Efficient On-line/Off-line Signature Schemes Based on Multiple-Collision Trapdoor Hash Families. 1478-1484 - Roberto De Prisco, Alfredo De Santis:
Cheating Immune Threshold Visual Secret Sharing. 1485-1496 - Lélia Blin, Christian Laforest, Stephane Rovedakis, Nicolas Thibault:
Hardness Results and Heuristic for Multi-groups Interconnection. 1497-1507 - Adenilso da Silva Simão, Alexandre Petrenko:
Fault Coverage-Driven Incremental Test Generation. 1508-1522 - Vicent Cholvi, Antonio Fernández, Ernesto Jiménez, Pilar Manzano, Michel Raynal:
A Methodological Construction of an Efficient Sequentially Consistent Distributed Shared Memory. 1523-1534 - Michael R. Wetherfield:
Personal Recollections of Programming DEUCE in the Late 1950s. 1535-1549
Volume 53, Number 10, December 2010
- You-Chiun Wang, Tomoaki Ohtsuki, Athanasios V. Vasilakos, Ashutosh Sabharwal, Yuh-Shyan Chen, Yu-Chee Tseng:
Algorithms, Protocols and Future Applications of Wireless Sensor Networks. 1551-1552 - Orhan Dagdeviren, Kayhan Erciyes:
Graph Matching-Based Distributed Clustering and Backbone Formation Algorithms for Sensor Networks. 1553-1575 - Thanassis Giannetsos, Tassos Dimitriou, Ioannis Krontiris, Neeli R. Prasad:
Arbitrary Code Injection through Self-propagating Worms in Von Neumann Architecture Devices. 1576-1593 - Yuan Zhang, Lichun Bao, Shih-Hsien Yang, Max Welling, Di Wu:
Localization Algorithms for Wireless Sensor Retrieval. 1594-1605 - Aaron B. Kiely, Mingsen Xu, Wen-Zhan Song, Renjie Huang, Behrooz A. Shirazi:
Adaptive Linear Filtering Compression on Realtime Sensor Networks. 1606-1620 - Chih-Wei Yi, Peng-Jun Wan, Chao-Min Su, Chen-Wei Huang:
The Critical Grid Size and Transmission Radius for Local-Minimum-Free Grid Routing in Wireless Ad Hoc and Sensor Networks. 1621-1631 - Meng Zheng, Wei Liang, Haibin Yu, Yang Xiao:
Cross Layer Optimization for Energy-Constrained Wireless Sensor Networks: Joint Rate Control and Routing. 1632-1642 - Long Cheng, Yimin Chen, Canfeng Chen, Jian Ma, Lei Shu, Athanasios V. Vasilakos, Naixue Xiong:
Efficient Query-Based Data Collection for Mobile Wireless Monitoring Applications. 1643-1657 - Jaime Lloret, Sandra Sendra, Hugo Coll, Miguel Garcia:
Saving Energy in Wireless Local Area Sensor Networks. 1658-1673 - Pruet Boonma, Junichi Suzuki:
Moppet: A Model-Driven Performance Engineering Framework for Wireless Sensor Networks. 1674-1690
- Yu-Ying Shih, Daniel Chao:
Sequence of Control in S3PMR. 1691-1703 - Chung-Ming Huang, Ming-Sian Lin, Lik-Hou Chang:
The Design of Mobile Concurrent Multipath Transfer in Multihomed Wireless Mobile Networks. 1704-1718 - Jianxin Liao, Qi Qi, Xiaomin Zhu, Yufei Cao, Tonghong Li:
Enhanced IMS Handoff Mechanism for QoS Support over Heterogeneous Network. 1719-1737 - Maria Petrou, Marco Elio Tabacchi, Roberta Piroddi:
Networks of Concepts and Ideas. 1738-1751 - Jon Crowcroft:
Internet Failures: an Emergent Sea of Complex Systems and Critical Design Errors? 1752-1757 - Manfred Broy:
A Logical Basis for Component-Oriented Software and Systems Engineering. 1758-1782 - Daniel Y. Chao:
Fewer Monitors and More Efficient Controllability for Deadlock Control in S3PGR2 (Systems of Simple Sequential Processes with General Resource Requirements). 1783-1798
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.