default search action
The Computer Journal, Volume 60
Volume 60, Number 1, 2017
Original Articles
- Weidong Chen, Shan Ling:
Node-Pancyclic Properties of Biswapped Networks Based on Cycles in Their Factor Networks. 1-12 - Shuo-I Wang, Fu-Hsing Wang:
Independent Spanning Trees in RTCC-Pyramids. 13-26 - Jian Yu, Jun Han, Jean-Guy Schneider, Cameron M. Hine, Steve Versteeg:
A Petri-Net-Based Virtual Deployment Testing Environment for Enterprise Software Systems. 27-44 - Aimal Rextin, Patrick Healy:
Dynamic Upward Planarity Testing of Single Source Embedded Digraphs. 45-59 - Juan Carlos Saez, Adrian Pousa, Roberto Rodríguez-Rodríguez, Fernando Castro, Manuel Prieto-Matías:
PMCTrack: Delivering Performance Monitoring Counter Support to the OS Scheduler. 60-85 - Alejandro Pérez, Pablo Sánchez:
On the Use of C# Partial Classes for the Implementation of Software Product Lines. 86-109 - Robert M. Hierons, Uraz Cengiz Türker:
Distinguishing Sequences for Distributed Testing: Preset Distinguishing Sequences. 110-125 - Maryam Shoaran, Alex Thomo:
Zero-Knowledge-Private Counting of Group Triangles in Social Networks. 126-134 - Emilio Di Giacomo, Walter Didimo, Giuseppe Liotta, Fabrizio Montecchiani:
Area-Thickness Trade-Offs for Straight-Line Drawings of Planar Graphs. 135-142 - Chang-Ai Sun, Lin Pan, Qiaoling Wang, Huai Liu, Xiangyu Zhang:
An Empirical Study on Mutation Testing of WS-BPEL Programs. 143-158
Volume 60, Number 2, 2017
Original Articles
- Yali Lv, Cheng-Kuan Lin, Jianxi Fan:
Hamiltonian Cycle and Path Embeddings in k-Ary n-Cubes Based on Structure Faults. 159-179 - Cyriac Grigorious, Sudeep Stephen, Bharati Rajan, Mirka Miller:
On the Partition Dimension of Circulant Graphs. 180-184 - Seyyed Amir Ali Ghafourian Ghahramani, Ali Mohammad Afshin Hemmatyar:
A Graph-based Performance Analysis of the 802.11p MAC Protocol for Safety Communications in Highway Vehicular Ad Hoc Networks. 185-209 - Keyvan RahimiZadeh, Morteza Analoui, Peyman Kabiri, Bahman Javadi:
Workload-Aware Placement of Multi-Tier Applications in Virtualized Datacenters. 210-239 - Joshua Higgins, Violeta Holmes, Colin C. Venters:
Autonomous Discovery and Management in Virtual Container Clusters. 240-252 - Yen-Hung Chen, Yuan-Cheng Lai, Ching-Neng Lai, Yang-Chi Li:
A Group Bandwidth Reservation Scheme to Enhance the Driver's Safety in Vehicles and Transport Environment. 253-267 - Tong Liu, Yanmin Zhu, Hongzi Zhu, Jiadi Yu, Yuanyuan Yang, Fan Ye:
Online Pricing for Efficient Renewable Energy Sharing in a Sustainable Microgrid. 268-284
Volume 60, Number 3, 2017
Special Issue on Databases and Data Science
- Sebastian Maneth, Alexandra Poulovassilis:
Data Science. 285-286 - Yang Cao, Wenfei Fan, Shuai Ma:
Virtual Network Mapping in Cloud Computing: A Graph Pattern Matching Approach. 287-307 - Lena Wiese, Tim Waage, Ferdinand Bollwein:
A Replication Scheme for Multiple Fragmentations with Overlapping Fragments. 308-328 - Andreas Weiler, Michael Grossniklaus, Marc H. Scholl:
Editorial: Survey and Experimental Analysis of Event Detection Techniques for Twitter. 329-346 - Yu Liu, Peter McBrien:
Transactional and Incremental Type Inference from Data Updates. 347-368 - Reem Qadan Al Fayez, Mike Joy:
Using Linked Data for Integrating Educational Medical Web Databases Based on BioMedical Ontologies. 369-388
- Eleni Tsalapati, Giorgos Stoilos, Alexandros Chortaras, Giorgos Stamou, George Koletsos:
Query Rewriting Under Ontology Change. 389-409 - Adnan Idris, Asifullah Khan:
Churn Prediction System for Telecom using Filter-Wrapper and Ensemble Classification. 410-430 - Alireza Nazemi, Ozra Ghezelsofla:
A Dual Neural Network Scheme for Solving the Assignment Problem. 431-443 - Prabavathy Balasundaram, Chitra Babu, Subha Devi M:
Improving Read Throughput of Deduplicated Cloud Storage using Frequent Pattern-Based Prefetching Technique. 444-456
Volume 60, Number 4, 2017
Original Articles
- Tomasz Hyla, Jerzy Pejas:
A Hess-Like Signature Scheme Based on Implicit and Explicit Certificates. 457-475 - Jeremy Maitin-Shepard, Mehdi Tibouchi, Diego F. Aranha:
Elliptic Curve Multiset Hash. 476-490
- Xi Jun Lin, Lin Sun, Haipeng Qu, Xiaoshuai Zhang:
Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme. 491-496
- Shaoquan Jiang:
Bounds for Message Authentication with Distortion. 497-506 - Jing Liu, Yunyun Wu, Xuezheng Liu, Yunchun Zhang, Gang Xue:
On the (In)Security of Recent Group Key Distribution Protocols. 507-526 - Kenneth Radke, Colin Boyd:
Security Proofs for Protocols Involving Humans. 527-540 - Leyou Zhang, Jingxia Zhang, Yi Mu:
Novel Leakage-Resilient Attribute-Based Encryption from Hash Proof System. 541-554 - Emin Islam Tatli, Bedirhan Urgun:
WIVET - Benchmarking Coverage Qualities of Web Crawlers. 555-572 - Muhammet Yildiz, Berrin A. Yanikoglu, Alisher Kholmatov, Alper Kanak, Umut Uludag:
Biometric Layering with Fingerprints: Template Security and Privacy Through Multi-Biometric Template Fusion. 573-587 - Man Ho Au, Joseph K. Liu, Zhenfei Zhang, Willy Susilo, Jin Li:
Anonymous Announcement System (AAS) for Electric Vehicle in VANETs. 588-599 - Yujue Wang, HweeHwa Pang:
Probabilistic Public Key Encryption for Controlled Equijoin in Relational Databases. 600-612 - Wentan Yi, Shaozhen Chen, Yuchen Li:
Zero-correlation Linear Cryptanalysis of SAFER Block Cipher Family Using the Undisturbed Bits. 613-624
Volume 60, Number 5, April 2017
Original Articles
- Xiang Xu, Shuming Zhou, Jinqiang Li:
Reliability of Complete Cubic Networks under the Condition of g-Good-Neighbor. 625-635 - Ornela Dardha, Daniele Gorla, Daniele Varacca:
Semantic Subtyping for Objects and Classes. 636-656 - Stefan Edelkamp, Amr Elmasry, Jyrki Katajainen:
Heap Construction - 50 Years Later. 657-674 - Wang Lin, Min Wu, Zhengfeng Yang, Zhenbing Zeng:
Verification for Non-polynomial Hybrid Systems Using Rational Invariants. 675-689 - Yu Yang, Hongbo Liu, Hua Wang, Ansheng Deng, Colton Magnant:
On Algorithms for Enumerating Subtrees of Hexagonal and Phenylene Chains. 690-710 - Akinori Kawachi, Yoshio Okamoto, Keisuke Tanaka, Kenji Yasunaga:
General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction. 711-728 - Wiktor B. Daszczuk:
Communication and Resource Deadlock Analysis Using IMDS Formalism and Model Checking. 729-750 - Cheng Zhou, Zhonghai Yin, Youqian Feng:
Events Algebra of Triggers. 751-760 - Seungbum Jo, Stelios Joannou, Daisuke Okanohara, Rajeev Raman, Srinivasa Rao Satti:
Compressed Bit vectors Based on Variable-to-Fixed Encodings. 761-775
Volume 60, Number 6, June 2017
Original Articles
- Wei Wu, Jiguang Wan, Ling Zhan, Jibin Wang, Changsheng Xie:
DROP: A New RAID Architecture for Enhancing Shared RAID Performance. 777-790 - Qiufen Xia, Weifa Liang, Zichuan Xu:
Data Locality-Aware Big Data Query Evaluation in Distributed Clouds. 791-809 - Xiaoyin Li, Lianshan Yan, Wei Pan, Bin Luo:
Secure and Robust DV-Hop Localization Based on the Vector Refinement Feedback Method for Wireless Sensor Networks. 810-821 - Meng-Shu Chiang, Chung-Ming Huang, Duy-Tuan Dao, Binh-Chau Pham:
GB-PMIPv6: A Group-Based Handover Control Scheme for PMIPv6 Using the 'Hitch on' Concept. 822-834 - Ramzi R. Saifan, Iyad F. Jafar, Ghazi M. Al-Sukkar:
Optimized Cooperative Spectrum Sensing Algorithms in Cognitive Radio Networks. 835-849 - Jia Peng, Yanmin Zhu, Qingwen Zhao, Hongzi Zhu, Jian Cao, Guangtao Xue, Bo Li:
Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones. 850-865 - Parisa Jalili Marandi, Marco Primi, Nicolas Schiper, Fernando Pedone:
Ring Paxos: High-Throughput Atomic Broadcast. 866-882 - Ihsan Mert Ozcelik, Ibrahim Korpeoglu, Ashok K. Agrawala:
Energy Efficient IP-Connectivity with IEEE 802.11 for Home M2M Networks. 883-897 - Chen Ying, Hao Huang, Ajay Gopinathan, Zongpeng Li:
A Prior-Free Spectrum Auction for Approximate Revenue Maximization. 898-910 - Fan Zhang, Tao Jing, Yan Huo, Kai-Wei Jiang:
Throughput Optimization for Energy Harvesting Cognitive Radio Networks with Save-Then-Transmit Protocol. 911-924 - Chunlin Li, Zhou Min, Youlong Luo:
Efficient Load-Balancing Aware Cloud Resource Scheduling for Mobile User. 925-939
Volume 60, Number 7, July 2017
Original Articles
- Susan Lomax, Sunil Vadera:
A Cost-Sensitive Decision Tree Learning Algorithm Based on a Multi-Armed Bandit Framework. 941-956 - Lin Zheng, Fuxi Zhu, Alshahrani Mohammed:
Attribute and Global Boosting: A Rating Prediction Method in Context-Aware Recommendation. 957-968 - Salma Ben Jemaa, Mohamed Hammami, Hanêne Ben-Abdallah:
Finger Surfaces Recognition Using Rank Level Fusion. 969-985 - S. Thayammal, D. Selvathi:
Edge Preserved Multispectral Image Compression Using Extended Shearlet Transform. 986-994 - Karam Abdulahhad, Jean-Pierre Chevallet, Catherine Berrut:
Logics, Lattices and Probability: The Missing Links to Information Retrieval. 995-1018 - Long Chen, Joemon M. Jose, Haitao Yu, Fajie Yuan:
A Hybrid Approach for Question Retrieval in Community Question Answerin. 1019-1031 - Zhiping Peng, Bo Xu, Antonio Marcel Gates, Delong Cui, Weiwei Lin:
A Study of a Multi-Agent Organizational Framework with Virtual Machine Clusters as the Unit of Granularity in Cloud Computing. 1032-1043 - Joshua Z. Goncalves, Aneesh Krishna:
Incorporating Change Management Within Dynamic Requirements-Based Model-Driven Agent Development. 1044-1077 - Jianbin Huang, Yu Zhou, Xiaolin Jia, Heli Sun:
A Novel Social Event Organization Approach for Diverse User Choices. 1078-1095 - Angelo Furfaro, Maria Carmela Groccia, Simona E. Rombo:
2D Motif Basis Applied to the Classification of Digital Images. 1096-1109
Volume 60, Number 8, August 2017
Original Articles
- Shuling Wang, Flemming Nielson, Hanne Riis Nielson, Naijun Zhan:
Modelling and Verifying Communication Failure of Hybrid Systems in HCSP. 1111-1130 - Hailong Zhang, Yongbin Zhou:
Mahalanobis Distance Similarity Measure Based Higher Order Optimal Distinguisher. 1131-1144 - Zheng Yang, Junyu Lai, Chao Liu, Wanping Liu, Shuangqing Li:
Simpler Generic Constructions for Strongly Secure One-round Key Exchange from Weaker Assumptions. 1145-1160 - Yanwei Zhou, Bo Yang:
Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security. 1161-1172 - Guglielmo Cola, Marco Avvenuti, Alessio Vecchio:
Real-Time Identification Using Gait Pattern Analysis on a Standalone Wearable Accelerometer. 1173-1186 - Huifang Yu, Bo Yang:
Pairing-Free and Secure Certificateless Signcryption Scheme. 1187-1196 - Haibo Yi, Weijian Li:
On the Importance of Checking Multivariate Public Key Cryptography for Side-Channel Attacks: The Case of enTTS Scheme. 1197-1209 - Junwei Zhou, Hui Duan, Kaitai Liang, Qiao Yan, Fei Chen, F. Richard Yu, Jieming Wu, Jianyong Chen:
Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation. 1210-1222 - Shabnam Seradji, Mehran S. Fallah:
A Bayesian Game of Whitewashing in Reputation Systems. 1223-1237 - Gamze Tillem, Erkay Savas, Kamer Kaya:
A New Method for Computational Private Information Retrieval. 1238-1250 - Yang Liu, Andrew Simpson:
AdSelector: A Privacy-Preserving Advertisement Selection Mechanism for Mobile Devices. 1251-1270
Volume 60, Number 9, September 2017
Original Articles
- Sérgio Luis Sardi Mergen, Viviane Pereira Moreira:
DuelMerge: Merging with Fewer Moves. 1271-1278 - Gregorio Hernández-Peñalver, Ana Mafalda Martins:
Remote Monitoring by Edges and Faces of Maximal Outerplanar Graphs. 1279-1288 - Wei Gao, Mohammad Reza Farahani:
Generalization Bounds and Uniform Bounds for Multi-Dividing Ontology Algorithms with Convex Ontology Loss Function. 1289-1299 - José Quiroga, Francisco Ortin:
SSA Transformations to Facilitate Type Inference in Dynamically Typed Code. 1300-1315 - Fahimeh Ramezani, Jie Lu, Javid Taheri, Albert Y. Zomaya:
A Multi-Objective Load Balancing System for Cloud Environments. 1316-1337 - Hu He, Xu Yang, Yanjun Zhang:
On Improving Performance and Energy Efficiency for Register-File Connected Clustered VLIW Architectures for Embedded System Usage. 1338-1352 - Chuanli Zhao, Chou-Jung Hsu, Win-Chin Lin, Wen-Hsiang Wu, Chin-Chia Wu:
An Investigation of Single-Machine Due-Window Assignment with Time-Dependent Processing Times and a Controllable Rate-Modifying Activity. 1353-1362 - Lucas Bueno Ruas de Oliveira, Elena Leroux, Kátia Romero Felizardo, Flávio Oquendo, Elisa Yumi Nakagawa:
ArchSORS: A Software Process for Designing Software Architectures of Service-Oriented Robotic Systems. 1363-1381 - Jianbin Huang, Xiaojing Sun, Yu Zhou, Heli Sun:
A Team Formation Model with Personnel Work Hours and Project Workload Quantified. 1382-1394 - Nieves R. Brisaboa, Guillermo de Bernardo, Gilberto Gutiérrez, Miguel R. Luaces, José R. Paramá:
Efficiently Querying Vector and Raster Data. 1395-1413
Volume 60, Number 10, October 2017
Section B: Computer and Communications Networks and Systems
Guest Editorial
- Special Issue on Software-Defined Wireless Networks. 1415-1416
- Xiao Liu, Anfeng Liu, Qingyong Deng, Haolin Liu:
Large-Scale Programing Code Dissemination for Software-Defined Wireless Networks. 1417-1442 - Yaser Jararweh, Mohammad A. Alsmirat, Mahmoud Al-Ayyoub, Elhadj Benkhelifa, Ala Darabseh, Brij Bhooshan Gupta, Ahmad Doulat:
Software-Defined System Support for Enabling Ubiquitous Mobile Edge Computing. 1443-1457 - Ramon dos Reis Fontes, Mohamed Naoufal Mahfoudi, Walid Dabbous, Thierry Turletti, Christian Esteve Rothenberg:
How Far Can We Go? Towards Realistic Software-Defined Wireless Networking Experiments. 1458-1471 - Shichao Li, Gang Zhu, Siyu Lin, Chao Shen, Qian Gao, Weiliang Xie, Xiaoyu Qiao:
Ultra Dense Cells Management and Resource Allocation in Green Software-Defined Wireless Networks. 1472-1481 - Seyed Hamed Rastegar, Aliazam Abbasfar, Vahid Shah-Mansouri:
Latency-Aware Sum-Rate Maximization for 5G Software-Defined Radio Access Networks. 1482-1497 - Tao Song, Yuchen Liu, Yiding Wang, Ruhui Ma, Alei Liang, Zhengwei Qi, Haibing Guan:
Ashman: A Bandwidth Fragmentation-Based Dynamic Flow Scheduling for Data Center Networks. 1498-1509 - Ahmed Abdelaziz, Tan Fong Ang, Abdullah Gani, Suleman Khan, Faiz Alotaibi, Muhammad Khurram Khan:
On Software-Defined Wireless Network (SDWN) Network Virtualization: Challenges and Open Issues. 1510-1519 - Michael Rademacher, Karl Jonas, Florian Siebertz, Adam Rzyska, Moritz Schlebusch, Markus Kessel:
Software-Defined Wireless Mesh Networking: Current Status and Challenges. 1520-1535 - Shaohua Wan, Yin Zhang:
Coverage Hole Bypassing in Wireless Sensor Networks. 1536-1544
Volume 60, Number 11, November 2017
Original Articles
- Jianbin Huang, Ze Lv, Yu Zhou, He Li, Heli Sun, Xiaolin Jia:
Forming Grouped Teams with Efficient Collaboration in Social Networks. 1545-1560 - Saurav Acharya, Byung Suk Lee, Paul Hines:
Causal Prediction of Top-k Event Types Over Real-Time Event Streams. 1561-1581 - Lein Harn, Ching-Fang Hsu:
A Practical Hybrid Group Key Establishment for Secure Group Communications. 1582-1589 - Emna Fendri, Mayssa Frikha, Mohamed Hammami:
Adaptive Person Re-identification Based on Visible Salient Body Parts in Large Camera Network. 1590-1608 - Hai-Xia Xu, Wei Zhou, Yaonan Wang, Wei Wang, Yan Mo:
Matrix Separation Based on LMaFit-Seed. 1609-1618 - Tung Doan Nguyen, Quan Bai:
Enhance Trust Management in Composite Services with Indirect Ratings. 1619-1632 - Shervan Fekri Ershad, Farshad Tajeripour:
Impulse-Noise Resistant Color-Texture Classification Approach Using Hybrid Color Local Binary Patterns and Kullback-Leibler Divergence. 1633-1648 - H. M. W. Verbeek, Wil M. P. van der Aalst, Jorge Munoz-Gama:
Divide and Conquer: A Tool Framework for Supporting Decomposed Discovery in Process Mining. 1649-1674 - Ming-Hung Wang, Alex Chuan-Hsien Chang, Kuan-Ta Chen, Chin-Laung Lei:
Estimating Ideological Scores of Facebook Pages: An Empirical Study in Taiwan. 1675-1686 - XiaoHong Han, Yan Qiang, Yuan Lan:
A Bird Flock Gravitational Search Algorithm Based on the Collective Response of Birds. 1687-1716 - Lidia Fotia, Fabrizio Messina, Domenico Rosaci, Giuseppe M. L. Sarné:
Using Local Trust for Forming Cohesive Social Structures in Virtual Communities. 1717-1727
Volume 60, Number 12, December 2017
Original Article
- Yang Lu, Jiguo Li, Jian Shen:
Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model. 1729-1744 - El-Sayed M. El-Alfy:
Detection of Phishing Websites Based on Probabilistic Neural Networks and K-Medoids Clustering. 1745-1759 - Abderrahim Ait Wakrime:
Satisfiability-Based Privacy-Aware Cloud Computing. 1760-1769 - Jayashree Pougajendy, Arun Raj Kumar Parthiban:
Detection of SIP-Based Denial of Service Attack Using Dual Cost Formulation of Support Vector Machine. 1770-1784 - Ying Wu, Jinyong Chang, Rui Xue, Rui Zhang:
Homomorphic MAC from Algebraic One-Way Functions for Network Coding with Small Key Size. 1785-1800 - Damien Vergnaud:
Comment on 'Attribute-Based Signatures for Supporting Anonymous Certification' by N. Kaaniche and M. Laurent (ESORICS 2016). 1801-1808 - Jianchang Lai, Yi Mu, Fuchun Guo, Rongmao Chen:
Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization. 1809-1821 - Sha Ma:
Authorized Equi-join for Multiple Data Contributors in the PKC-Based Setting. 1822-1838 - Howard M. Heys:
Statistical Cipher Feedback of Stream Ciphers. 1839-1851 - Xiaofang Xia, Wei Liang, Yang Xiao, Meng Zheng:
Difference-Comparison-based Malicious Meter Inspection in Neighborhood Area Networks in Smart Grid. 1852-1870 - Weiran Liu, Xiao Liu, Jianwei Liu, Qianhong Wu:
Auditing Revocable Privacy-Preserving Access Control for EHRs in Clouds. 1871-1888 - Xavier Bonnaire, Rudyar Cortés, Fabrice Kordon, Olivier Marin:
ASCENT: A Provably Terminating Decentralized Logging Service. 1889-1911 - Dario Fiore, María Isabel González Vasco, Claudio Soriente:
Partitioned Group Password-Based Authenticated Key Exchange. 1912-1922
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.