default search action
The Computer Journal, Volume 62
Volume 62, Number 1, January 2019
Original Articles
- Nazmun Naher, Tanzima Hashem:
Think Ahead: Enabling Continuous Sharing of Location Data in Real-Time with Privacy Guarantee. 1-19 - Shmuel T. Klein, Dana Shapira:
Context Sensitive Rewriting Codes for Flash Memory†. 20-29 - Zbynek Krivka, Jirí Kucera, Alexander Meduna:
Jumping Pure Grammars. 30-41 - Chengcheng Mou, Shaoping Chen, Yi-Cheng Tu:
A Comparative Study of Dual-Tree Algorithms for Computing Spatial Distance Histograms. 42-62 - Yuan Lin, Zhongzhi Zhang:
Non-Backtracking Centrality Based Random Walk on Networks. 63-80 - Weiwei Liu, Chong Jiang, Ji-Bo Wang, Yuan-Yuan Lu:
Single-machine scheduling with simultaneous considerations of resource allocation and deteriorating jobs. 81-89 - Yu Ti, Ming Xu, Chong Jiang, Ji-Bo Wang, Xiao-Yuan Wang:
No-wait resource allocation flowshop scheduling with learning effect under limited cost availability. 90-96 - Abel Cabrera Martínez, Frank Angel Hernández Mira, José M. Sigarreta Almira, Ismael González Yero:
On Computational and Combinatorial Properties of the Total Co-independent Domination Number of Graphs. 97-108 - Vanderson Hafemann Fragal, Adenilso Simão, Mohammad Reza Mousavi, Uraz Cengiz Türker:
Extending HSI Test Generation Method for Software Product Lines. 109-129 - Dong-Yuh Yang, Yi-Chun Cho:
Analysis of the N-policy GI/M/1/K Queueing Systems with Working Breakdowns and Repairs. 130-143 - Shu-Li Zhao, Rong-Xia Hao:
The Generalized Three-Connectivity of Two Kinds of Cayley Graphs. 144-149 - Bing Zhu, Kenneth W. Shum, Hui Li:
On the Duality and File Size Hierarchy of Fractional Repetition Codes. 150-160
Volume 62, Number 2, February 2019
Original Articles
- Bruno Guazzelli Batista, Bruno Tardiole Kuehne, Dionisio Machado Leite Filho, Maycon Leone Maciel Peixoto:
Security Overhead on a Service with Automatic Resource Management: A Performance Analysis. 161-173 - Salman Taherizadeh, Vlado Stankovski:
Dynamic Multi-level Auto-scaling Rules for Containerized Applications. 174-197 - Yeim-Kuan Chang, Han-Chen Chen:
Fast Packet Classification using Recursive Endpoint-Cutting and Bucket Compression on FPGA. 198-214 - Fan Zhang, Tao Jing, Yan Huo, Kai-Wei Jiang:
Joint Optimization of Spectrum Sensing and Transmit Power in Energy Harvesting Cognitive Radio Sensor Networks. 215-230 - Matthieu Barjon, Arnaud Casteigts, Serge Chaumette, Colette Johnen, Yessin M. Neggaz:
Maintaining a Distributed Spanning Forest in Highly Dynamic Networks. 231-246 - Jianzhong Huang, Panping Zhou, Xiao Qin, Yanqun Wang, Changsheng Xie:
Optimizing Erasure-Coded Data Archival for Replica-Based Storage Clusters. 247-262 - C. BrijilalRuban, B. Paramasivan:
Cluster-Based Secure Communication and Certificate Revocation Scheme for VANET. 263-275 - Neetesh Kumar, Deo Prakash Vidyarthi:
A Hybrid Heuristic for Load-Balanced Scheduling of Heterogeneous Workload on Heterogeneous Systems. 276-291 - Ahmad A. Hiasat, Leonel Sousa:
On the Design of RNS Inter-Modulo Processing Units for the Arithmetic-Friendly Moduli Sets {2n+k, 2n - 1, 2n+1 - 1}. 292-300 - Xinjian Luo, Xiaofeng Gao, Guihai Chen:
Accelerate Data Retrieval by Multi-Dimensional Indexing in Switch-Centric Data Centers. 301-320
Volume 62, Number 3, March 2019
Original Articles
- Jesús Manuel Almendros-Jiménez, Antonio Becerra-Terón, Manuel Torres:
Integrating and Querying OpenStreetMap and Linked Geo Open Data. 321-345 - Raphael Angulu, Jules-Raymond Tapamo, Aderemi Oluyinka Adewumi:
Age-Group Estimation Using Feature and Decision Level Fusion. 346-358 - Ximing Li, Ang Zhang, Changchun Li, Lantian Guo, Wenting Wang, Jihong Ouyang:
Relational Biterm Topic Model: Short-Text Topic Modeling using Word Embeddings. 359-372 - Chris J. Mitchell:
Security issues in a group key establishment protocol. 373-376 - Asieh Ghanbarpour, Hassan Naderi:
A Model-based Keyword Search Approach for Detecting Top-k Effective Answers. 377-393 - Michael Scriney, Suzanne McCarthy, Andrew McCarren, Paolo Cappellari, Mark Roantree:
Automating Data Mart Construction from Semi-structured Data Sources. 394-413 - Hafiz Tayyeb Javed, Mirza Omer Beg, Hasan Mujtaba, Hammad Majeed, Muhammad Asim:
Fairness in Real-Time Energy Pricing for Smart Grid Using Unsupervised Learning. 414-429 - Weihua Li, Quan Bai, Minjie Zhang:
A Multi-agent System for Modelling Preference-Based Complex Influence Diffusion in Social Networks. 430-447 - Zeynep Engin, Philip C. Treleaven:
Algorithmic Government: Automating Public Services and Supporting Civil Servants in using Data Science Technologies. 448-460 - Sandra Sampaio, Mashael Aljubairah, Hapsoro Adi Permana, Pedro Sampaio:
A Conceptual Approach for Supporting Traffic Data Wrangling Tasks. 461-480
Volume 62, Number 4, April 2019
Original Articles
- Gaoli Wang, Zhenfu Cao, Xiaolei Dong:
Improved Fault-Tolerant Aggregate Signatures. 481-489 - Hui Guo, Zhenfeng Zhang, Jing Xu, Ningyu An:
Non-transferable Proxy Re-encryption. 490-506 - Fatemeh Rezaeibagha, Yi Mu:
Efficient Micropayment of Cryptocurrency from Blockchains. 507-517 - Van Tuyen Dang, Truong Thu Huong, Nguyen Huu Thanh, Pham Ngoc Nam, Ngoc Thanh Nguyen, Alan Marshall:
SDN-Based SYN Proxy - A Solution to Enhance Performance of Attack Mitigation Under TCP SYN Flood. 518-534 - Rongjia Li, Chenhui Jin, Ruya Fan:
Improved Integral Distinguishers on Compression Function of GOST R Hash Function. 535-544 - Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park, Moti Yung:
CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts. 545-562 - Ming Zeng, Kai Zhang, Haifeng Qian, Xiaofeng Chen, Jie Chen:
A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications. 563-578 - Hongyun Cai, Fuzhi Zhang:
An Unsupervised Method for Detecting Shilling Attacks in Recommender Systems by Mining Item Relationship and Identifying Target Items. 579-597 - Muhammed Ali Bingöl, Osman Biçer, Mehmet Sabir Kiraz, Albert Levi:
An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates. 598-613 - Keita Emura, Hayato Kimura, Toshihiro Ohigashi, Tatsuya Suzuki:
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions and Its Implementations. 614-630 - Yi Zhao, Yong Yu, Bo Yang:
Leakage Resilient CCA Security in Stronger Model: Branch Hidden ABO-LTFs and Their Applications. 631-640
Volume 62, Number 5, May 2019
Original Articles
- Mahmoud Darwich, Mohsen Amini Salehi, Ege Beyazit, Magdy A. Bayoumi:
Cost-Efficient Cloud-Based Video Streaming Through Measuring Hotness. 641-656 - Mira Gonen, Dana Shapira, James A. Storer:
Edit Distance with Multiple Block Operations†. 657-669 - A. S. M. Kayes, Jun Han, Wenny Rahayu, Tharam S. Dillon, Md. Saiful Islam, Alan Colman:
A Policy Model and Framework for Context-Aware Access Control to Information Resources†. 670-705 - Shuang Zhao, Jixiang Meng:
Arc Fault Tolerance of Maximally Arc-Connected Networks Modeled By Digraphs. 706-714 - Shiying Wang, Mujiangshan Wang:
The strong connectivity of bubble-sort star graphs. 715-729 - Alkida Balliu, Pierre Fraigniaud:
Certification of Compact Low-Stretch Routing Schemes. 730-746 - Yafei Zhai, Limei Lin, Li Xu, Xinxin Zhang, Yanze Huang:
The Conditional Diagnosability with g-Good-Neighbor of Exchanged Hypercubes. 747-756 - Khaled El-Fakih, Nina Yevtushenko, Ayat Saleh:
Incremental and Heuristic Approaches for Deriving Adaptive Distinguishing Test Cases for Non-deterministic Finite-State Machines. 757-768 - Yi Qi, Yuhao Yi, Zhongzhi Zhang:
Topological and Spectral Properties of Small-World Hierarchical Graphs. 769-784 - Chunlin Li, Jingpan Bai, Shaofeng Du, Chunguang Yang, Youlong Luo:
Combining Tag Correlation and Interactive Behaviors for Community Discovery. 785-800
Volume 62, Number 6, June 2019
Original Articles
- Zina Nakhla, Kaouther Nouira, Ahmed Ferchichi:
Prescription Adverse Drug Events System (PrescADE) Based on Ontology and Internet of Things. 801-805 - Ian Pyle:
Software for the Linesman Radar Data Processing System. 806-819 - Faisal Ahmed, Corentin Kervadec, Yannick Le Moullec, Gert Tamberg, Paul Annus:
Autonomous Wireless Sensor Networks: Implementation of Transient Computing and Energy Prediction for Improved Node Performance and Link Quality. 820-837 - Muhammad Usman, Aris Cahyadi Risdianto, Jung-Su Han, JongWon Kim:
Interactive Visualization of SDN-Enabled Multisite Cloud Playgrounds Leveraging SmartX MultiView Visibility Framework. 838-854 - Ab Shaqoor Nengroo, K. S. Kuppusamy:
'Advertisements or adverse-tisements?' - An accessibility barrier for persons with visual impairments. 855-868 - Jianzhong Huang, Jie Xia, Xiao Qin, Qiang Cao, Changsheng Xie:
Optimization of Small Updates for Erasure-Coded In-memory Stores. 869-883 - Christine Niyizamwiyitira, Lars Lundberg:
A Utilization-Based Schedulability Test of Real-Time Systems Running on a Multiprocessor Virtual Machine. 884-904 - Xing Su, Minjie Zhang, Quan Bai:
Two Mathematical Programming-Based Approaches for Wireless Mobile Robot Deployment in Disaster Environments. 905-918 - Lamiaa Fattouh Ibrahim, Hesham Abou El Fetouh Salman, Sara Y. Sery, Zaki Taha:
Using Clustering Techniques to Plan Indoor Femtocell Base Stations Layout in Multi-floors. 919-930 - Manju C. Thayammal, M. Mary Linda:
Utility-Based Optimal Resource Allocation in LTE-A Networks by Hybrid ACO-TS with MFA Scheme. 931-942 - Francesc D. Muñoz-Escoí, Rubén de Juan-Marín, José-Ramón García-Escrivá, José Ramón González de Mendívil, José M. Bernabéu-Aubán:
CAP Theorem: Revision of Its Related Consistency Models. 943-960
Volume 62, Number 7, July 2019
Original Articles
- Lida Ghahremanlou, Abdel-Rahman H. Tawil, Paul Kearney, Hossein Nevisi, Xia Zhao, Ali Abdallah:
A Survey of Open Data Platforms in Six UK Smart City Initiatives. 961-976 - Saber Amri, Hela Ltifi, Mounir Ben Ayed:
A Predictive Visual Analytics Evaluation Approach Based on Adaptive Neuro-Fuzzy Inference System. 977-1000 - Ibrahim Furkan Ince, Yusuf Sait Erdem, Faruk Bulut, Md. Haidar Sharif:
A Low-Cost Pupil Center Localization Algorithm Based on Maximized Integral Voting of Circular Hollow Kernels. 1001-1015 - Xuezhi Yan, Ruige Li, Xiaoying Sun, Guohong Liu:
Effects of Touch Force Profiles and Waveforms of Electrostatic Tactile Feedback on Touchscreen Pan Operation. 1016-1035 - M. Dhivya, M. Renuka Devi:
Detection of Structural Defects in Fabric Parts Using a Novel Edge Detection Method. 1036-1043 - Alex Bogatu, Norman W. Paton, Alvaro A. A. Fernandes, Martin Koehler:
Towards Automatic Data Format Transformations: Data Wrangling at Scale. 1044-1060 - Alireza Nazemi, Marziyeh Mortezaee:
A Novel Collaborate Neural Dynamic System Model for Solving a Class of Min-Max Optimization Problems with an Application in Portfolio Management. 1061-1085
Volume 62, Number 8, August 2019
- Xi Jun Lin, Lin Sun, Haipeng Qu, He-Qun Xian:
Cryptanalysis of a Compact Anonymous HIBE with Constant Size Private Keys. 1087-1091 - Yanwei Zhou, Bo Yang, Hong-xia Hou, Lina Zhang, Tao Wang, Mingxiao Hu:
Continuous Leakage-Resilient Identity-Based Encryption with Tight Security. 1092-1105 - Jordan S. Queiroz, Eduardo Feitosa:
A Web Browser Fingerprinting Method Based on the Web Audio API. 1106-1120 - Qian Wang, Chenhui Jin:
A Method to Bound the Number of Active S-Boxes for a Kind of AES-Like Structure. 1121-1131 - Jiahui Chen, Jie Ling, Jianting Ning, Jintai Ding:
Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems. 1132-1147 - Nanyuan Cao, Zhenfu Cao, Zhen Liu, Xiaolei Dong, Xiaopeng Zhao:
All-But-Many Lossy Trapdoor Functions under Decisional RSA Subgroup Assumption and Application. 1148-1157 - Hanqiu Liu, Chenhui Jin:
An Improvement of the CS Attack to DSC Cipher. 1158-1165 - Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang:
Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification. 1166-1177 - Parvin Rastegari, Willy Susilo, Mohammad Dakhilalian:
Efficient Certificateless Signcryption in the Standard Model: Revisiting Luo and Wan's Scheme from Wireless Personal Communications (2018). 1178-1193 - Thierry Mefenza, Damien Vergnaud:
Cryptanalysis of Server-Aided RSA Protocols with Private-Key Splitting. 1194-1213 - Jinguang Han, Maoxuan Bei, Liqun Chen, Yang Xiang, Jie Cao, Fuchun Guo, Weizhi Meng:
Attribute-Based Information Flow Control. 1214-1231 - Jinyong Chang, Genqing Bian, Yanyan Ji, Maozhi Xu:
On the KDM-CCA Security from Partial Trapdoor One-Way Family in the Random Oracle Model. 1232-1245
Volume 62, Number 9, September 2019
- Natarajan Meghanathan:
Centrality and Partial Correlation Coefficient-Based Assortativity Analysis of Real-World Networks. 1247-1264 - Kenji Yasunaga:
Error Correction by Structural Simplicity: Correcting Samplable Additive Errors. 1265-1276 - Shu-Li Zhao, Rong-Xia Hao, Lidong Wu:
The Generalized Connectivity of (n, k)-Bubble-Sort Graphs. 1277-1283 - Khalil Mohamed, Ayman El Shenawy, Hany Harb:
A Hybrid Decentralized Coordinated Approach for Multi-Robot Exploration Task. 1284-1300 - Jinyong Wang, Xiaoping Mi:
Open Source Software Reliability Model with the Decreasing Trend of Fault Detection Rate. 1301-1312 - Yuxing Yang:
Characterizations of Minimum Structure- and Substructure-Cuts of Hypercubes. 1313-1321 - Zhiwu Xu, Ping Lu, Haiming Chen:
Towards an Effective Syntax and a Generator for Deterministic Standard Regular Expressions. 1322-1341 - Tangliu Wen, Lan Song, Zhen You:
Proving Linearizability Using Reduction. 1342-1364 - Ying Jiang, Jian Liu, Gilles Dowek, Kailiang Ji:
Towards Combining Model Checking and Proof Checking. 1365-1402
Volume 62, Number 10, October 2019
- Saurabh K. Pandey, Mukesh A. Zaveri:
DoA-Based Event Localization Using Uniform Concentric Circular Array in the IoT Environment. 1403-1425 - Islam Elleuch, Achraf Makni, Rafik Bouaziz:
Cooperative Overtaking Assistance System Based on V2V Communications and RTDB. 1426-1449 - Zikai Zhang, Jigang Wu, Long Chen, Guiyuan Jiang, Siew-Kei Lam:
Collaborative Task Offloading with Computation Result Reusing for Mobile Edge Computing. 1450-1462 - Guijuan Wang, Cheng-Kuan Lin, Baolei Cheng, Jianxi Fan, Weibei Fan:
Structure Fault-Tolerance of the Generalized Hypercube. 1463-1476 - Hisham M. Almasaeid:
Maximizing Achievable Transmission Time in Cognitive Radio Networks Under Sensor-Aided Crowdsourced Spectrum Sensing. 1477-1489 - Hui Cai, Yanmin Zhu, Jie Li, Jiadi Yu:
Double Auction for a Data Trading Market with Preferences and Conflicts of Interest. 1490-1504 - Mohamed A. Bayoumi, Tarek M. Salem, Samir M. Koriem:
Improving the Mechanism of Detecting and Measuring Holes in Ad hoc Wireless Sensor Network. 1505-1514 - Jianhua Fan, Tao Liang, Tongxiang Wang, Jianwei Liu:
Identification and Localization of the Jammer in Wireless Sensor Networks. 1515-1527 - Moresh Madhukar Mukhedkar, Uttam D. Kolekar:
Trust-Based Secure Routing in Mobile Ad Hoc Network Using Hybrid Optimization Algorithm. 1528-1545
Volume 62, Number 11, November 2019
- Sarah Alhumoud:
Twitter Analysis for Intelligent Transportation. 1547-1556 - Sreenithya Sumesh, Aneesh Krishna, Chitra M. Subramanian:
Game Theory-Based Reasoning of Opposing Non-functional Requirements using Inter-actor Dependencies. 1557-1583 - Vasile Palade, J. Gerard Wolff:
A Roadmap for the Development of the 'SP Machine' for Artificial Intelligence. 1584-1604 - Muhammad Adnan, Muhammad Afzal, Khadim Hussain Asif:
Ontology-Oriented Software Effort Estimation System for E-commerce Applications Based on Extreme Programming and Scrum Methodologies. 1605-1624 - Jianbin Huang, Qingquan Bian, Heli Sun, Yaming Yang, Yu Zhou:
Parameter-free Community Detection through Distance Dynamic Synchronization. 1625-1638 - Manashee Kalita, Themrichon Tuithung, Swanirbhar Majumder:
A New Steganography Method Using Integer Wavelet Transform and Least Significant Bit Substitution. 1639-1655 - N. Shankar, S. Sathish Babu, C. Viswanathan:
Femur Bone Volumetric Estimation for Osteoporosis Classification Using Optimization-Based Deep Belief Network in X-Ray Images. 1656-1670 - Roger Santos Ferreira, Denilson Alves Pereira:
BigFeel - A Distributed Processing Environment for the Integration of Sentiment Analysis Methods. 1671-1683 - Ondrej Zamazal:
Machine Learning Support for EU Funding Project Categorization. 1684-1694 - Rajangam Vijayarajan, P. Gnanasivam, R. Avudaiammal:
Bio-Key Based AES for Personalized Image Cryptography. 1695-1705
Volume 62, Number 12, December 2019
- Nghi Huynh, Marc Frappier, Herman Pooda, Amel Mammar, Régine Laleau:
SGAC: A Multi-Layered Access Control Model with Conflict Resolution Strategy. 1707-1733 - Binlin Cheng, Jinjun Liu, Jiejie Chen, Shudong Shi, Xufu Peng, Xingwen Zhang, Haiqing Hai:
MoG: Behavior-Obfuscation Resistance Malware Detection. 1734-1747 - Yang Chen, Wenmin Li, Fei Gao, Wei Yin, Kaitai Liang, Hua Zhang, Qiaoyan Wen:
Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures. 1748-1760 - Ya Liu, Yifan Shi, Dawu Gu, Zhiqiang Zeng, Fengyu Zhao, Wei Li, Zhiqiang Liu, Yang Bao:
Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC. 1761-1776 - Zhenhui Han, Xingshu Chen, Xuemei Zeng, Yi Zhu, Mingyong Yin:
Detecting Proxy User Based on Communication Behavior Portrait. 1777-1792
- Jianghua Zhong, Dongdai Lin:
On Equivalence of Cascade Connections of Two Nonlinear Feedback Shift Registers. 1793-1804 - Lele Chen, Gaoli Wang, Guoyan Zhang:
MILP-based Related-Key Rectangle Attack and Its Application to GIFT, Khudra, MIBS. 1805-1821 - Venkatraman Subbarayalu, B. Surendiran, P. Arun Raj Kumar:
Hybrid Network Intrusion Detection System for Smart Environments Based on Internet of Things. 1822-1839 - Haibo Hong, Licheng Wang, Jun Shao, Jianhua Yan, Haseeb Ahmad, Guiyi Wei, Mande Xie, Yixian Yang:
A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type. 1840-1848 - San Ling, Khoa Nguyen, Huaxiong Wang, Juanyang Zhang:
Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation. 1849-1862
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.