default search action
The Computer Journal, Volume 55
Volume 55, Number 1, January 2012
- Fairouz Kamareddine:
Capsule Reviews. 1-2
- Akamine Kazuma, Ken Fukuchi, Akisato Kimura, Shigeru Takagi:
Fully Automatic Extraction of Salient Objects from Videos in Near Real Time. 3-14 - Daniel Ruijters, Philippe Thévenaz:
GPU Prefilter for Accurate Cubic B-spline Interpolation. 15-20 - Sangpil Lee, Won Woo Ro:
Accelerated Network Coding with Dynamic Stream Decomposition on Graphics Processing Unit. 21-34 - Sumeer Goel, Yasser Ismail, Magdy A. Bayoumi:
High-speed Motion Estimation Architecture for Real-time Video Transmission. 35-46
- Ingrid Petric, Bojan Cestnik, Nada Lavrac, Tanja Urbancic:
Outlier Detection in Cross-Context Link Discovery for Creative Literature Mining. 47-61 - M. Oguzhan Külekci, Jeffrey Scott Vitter, Bojian Xu:
Fast Pattern-Matching via k-bit Filtering Based Text Decomposition. 62-68 - Manuel Abellanas, António Leslie Bajuelos, Inês Matos:
Minimizing the Range for k-Covered Paths on Sensor Networks. 69-81 - Vid Podpecan, Monika Zemenova, Nada Lavrac:
Orange4WS Environment for Service-Oriented Data Mining. 82-98 - Dick Hamlet:
Science, Mathematics, Computer Science, Software Engineering. 99-110 - Antonio Fariña, Gonzalo Navarro, José R. Paramá:
Boosting Text Compression with Word-Based Statistical Encoding. 111-131
Volume 55, Number 2, February 2012
- Fairouz Kamareddine:
Capsule Reviews. 133-135
- Stephen A. Jarvis:
Editorial Performance Modelling, Benchmarking and Simulation of High-Performance Computing Systems. 136-137 - Simon J. Pennycook, Simon D. Hammond, Gihan R. Mudalige, Steven A. Wright, Stephen A. Jarvis:
On the Acceleration of Wavefront Applications using Distributed Many-Core Architectures. 138-153 - Xingfu Wu, Valerie E. Taylor:
Performance Characteristics of Hybrid MPI/OpenMP Implementations of NAS Parallel Benchmarks SP and BT on Large-Scale Multicore Clusters. 154-167 - Mike B. Giles, Gihan R. Mudalige, Z. Sharif, Graham R. Markall, Paul H. J. Kelly:
Performance Analysis and Optimization of the OP2 Framework on Many-Core Architectures. 168-180 - Ming-yu Hsieh, Rolf Riesen, Kevin Thompson, William J. Song, Arun Rodrigues:
SST: A Scalable Parallel Framework for Architecture-Level Performance, Power, Area and Thermal Simulation. 181-191 - Simon McIntosh-Smith, Terry Wilson, Amaurys Ávila Ibarra, Jonathan Crisp, Richard B. Sessions:
Benchmarking Energy Efficiency, Power Costs and Carbon Emissions on Heterogeneous Systems. 192-205 - Sandeep Budanur, Frank Mueller, Todd Gamblin:
Memory Trace Compression and Replay for SPMD Systems Using Extended PRSDs. 206-217
- Sergio González-Valenzuela, Son T. Vuong, Victor C. M. Leung:
Leveraging Service Discovery in MANETs with Mobile Directories. 218-231 - Dong-Heon Jung, Soo-Mook Moon, Sung-Hwan Bae:
Evaluation of a Java Ahead-of-Time Compiler for Embedded Systems. 232-252
Volume 55, Number 3, March 2012
- Fairouz Kamareddine:
Capsule Reviews. 253-255
- Jason J. Jung, Dariusz Król:
Editorial: Engineering Knowledge and Semantic Systems. 256-257 - Grzegorz Kukla, Przemyslaw Kazienko, Piotr Bródka, Tomasz Filipowski:
SocLaKE: Social Latent Knowledge Explorator. 258-276 - Zongda Wu, Guandong Xu, Yanchun Zhang, Peter Dolog, Chenglang Lu:
An Improved Contextual Advertising Matching Approach based on Wikipedia Knowledge. 277-292
- Olcay Taner Yildiz:
Univariate Decision Tree Induction using Maximum Margin Classification. 293-298 - Gerasimos Spanakis, Georgios Siolas, Andreas Stafylopatis:
Exploiting Wikipedia Knowledge for Conceptual Hierarchical Clustering of Documents. 299-312 - Mariano Rivera, Oscar Dalmau Cedeño, Washington Mio, Alonso Ramirez-Manzanares:
Spatial Sampling for Image Segmentation. 313-324 - Hideki Katagiri, Ichiro Nishizaki, Tomohiro Hayashida, Takanori Kadoma:
Multiobjective Evolutionary Optimization of Training and Topology of Recurrent Neural Networks for Time-Series Prediction. 325-336 - Jason J. Jung:
Discovering Community of Lingual Practice for Matching Multilingual Tags from Folksonomies. 337-346 - Muhammad Raza, Farookh Khadeer Hussain, Omar Khadeer Hussain:
Neural Network-Based Approach for Predicting Trust Values Based on Non-uniform Input in Mobile Applications. 347-378
Volume 55, Number 4, April 2012
- Fairouz Kamareddine:
Capsule Reviews. 379-381
- Jiankun Hu, Yang Xiang, Wanlei Zhou:
Advances in Network and System Security: Editorial Statement. 382-383 - Leonardo B. Oliveira, Aman Kansal, Conrado Porto Lopes Gouvêa, Diego F. Aranha, Julio López, Bodhi Priyantha, Michel Goraczko, Feng Zhao:
Secure-TWS: Authenticating Node to Multi-user Communication in Shared Sensor Networks. 384-396 - Udaya Kiran Tupakula, Vijay Varadharajan:
Dynamic State-Based Security Architecture for Detecting Security Attacks in Virtual Machines. 397-409 - Shui Yu, Wanlei Zhou, Weijia Jia, Jiankun Hu:
Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics. 410-421 - Xiaoxun Sun, Hua Wang, Jiuyong Li, Yanchun Zhang:
Satisfying Privacy Requirements Before Data Anonymization. 422-437 - Biming Tian, Song Han, Sazia Parvin, Jiankun Hu, Sajal K. Das:
Erratum: Self-Healing Key Distribution Schemes for Wireless Networks: A Survey. 438
- Hung-Yu Chien:
Improved Anonymous Multi-receiver Identity-Based Encryption. 439-446 - Xiangyang Luo, Fenlin Liu, Chunfang Yang, Shiguo Lian, Daoshun Wang:
On F5 Steganography in Images. 447-456 - Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu:
Certificateless Signatures: New Schemes and Security Models. 457-474 - Yuh-Min Tseng, Tung-Tso Tsai:
Efficient Revocable ID-Based Encryption with a Public Channel. 475-486 - Lina Zhu, Li Feng, Zuochang Zhang:
Predicting the Propagation Path of Random Worm by Subnet Infection Situation Using Fuzzy Reasoning. 487-496 - Lanfranco Lopriore:
Encrypted Pointers in Protection System Design. 497-507
Volume 55, Number 5, May 2012
- Fairouz Kamareddine:
Capsule Reviews. 509-511
- Nihal Pekergin:
Introduction to the Special Issue on Probability Models in Performance Analysis. 512-514 - Peter Whittle:
Neural Memories and Oscillatory Operation. 515-521 - Azaria Paz, Jack W. Carlyle:
Chaotic Evolution via Generalized Probabilistic Automata (Probabilistic Arrays). 522-533 - Nguyen Tien Viet, François Baccelli:
A Stochastic Geometry Model for Cognitive Radio Networks. 534-552 - Emmanuel Hyon, Alain Jean-Marie:
Scheduling Services in a Queuing System with Impatience and Setup Costs. 553-563 - Hind Castel-Taleb, Idriss Ismael Aouled, Nihal Pekergin:
Bounding Aggregations for Transient and Stationary Performance Analysis of Subnetworks. 564-576 - Thu-Ha Dao-Thi, Jean-Michel Fourneau, Minh-Anh Tran:
Erratum: Multiple Class Symmetric G-networks with Phase Type Service Times. 577
- Mehmet Hakan Karaata, Ozgur Sinanoglu, Bader F. AlBdaiwi:
An Optimal Inherently Stabilizing 2-Neighborhood Crash Resilient Protocol for Secure and Reliable Routing in Hypercube Networks. 578-589 - Jakub Stárka, Martin Svoboda, Jan Sochna, Jirí Schejbal, Irena Mlýnková, David Bednárek:
Analyzer: A Complex System for Data Analysis. 590-615 - Supriya Aggarwal, Kavita Khare:
Design Techniques Targeting Low-Area-Power-Delay Product in Hyperbolic CORDIC Algorithm. 616-628 - Samuel Antao, Jean-Claude Bajard, Leonel Sousa:
RNS-Based Elliptic Curve Point Multiplication for Massive Parallel Architectures. 629-647
Volume 55, Number 6, June 2012
- Fairouz Kamareddine:
Capsule Reviews. 649-650
- Wojciech Mazurczyk, Krzysztof Szczypiorski:
Toward Effective and Reliable Digital Forensics. 651-652 - Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux:
Steganography: A Class of Secure and Robust Algorithms. 653-666 - Gaurav Bhatnagar, Q. M. Jonathan Wu, Balasubramanian Raman:
Image and Video Encryption based on Dual Space-Filling Curves. 667-685 - Xiaofeng Wang, Nanning Zheng, Jianru Xue, Zhenli Liu:
A Novel Image Signature Method for Content Authentication. 686-701 - Hui Tian, Hong Jiang, Ke Zhou, Dan Feng:
Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography. 702-716 - Chunfang Yang, Fenlin Liu, Shiguo Lian, Xiangyang Luo, Daoshun Wang:
Weighted Stego-Image Steganalysis of Messages Hidden into Each Bit Plane. 717-727
- Ronaldo M. Salles, Donato A. Marino Jr.:
Strategies and Metric for Resilience in Computer Networks. 728-739 - João V. P. Gomes, Pedro R. M. Inácio, Manuela Pereira, Mário M. Freire, Paulo P. Monteiro:
Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic. 740-755 - Chao-Hsien Lee, Chung-Ming Huang, Chia-Ching Yang, Tai-Hsiang Wang:
Co-SVC-MDC-Based Cooperative Video Streaming Over Vehicular Networks. 756-768 - Antoine Bossard, Keiichi Kaneko:
The Set-to-Set Disjoint-Path Problem in Perfect Hierarchical Hypercubes. 769-775
Volume 55, Number 7, July 2012
- Fairouz Kamareddine:
Capsule Reviews. 777-778
- Simon H. Lavington:
A Synopsis of the Book Alan Turing and his Contemporaries: Building the World's First Computers. 779-787 - Peter Whittle:
A Natural Channel Coding for the Finite and Infinite Time Axes. 788-798 - Peter J. Denning:
Reflections on a Symposium on Computation. 799-802 - Peter J. Denning, Peter Wegner:
Introduction to What is Computation. 803-804 - Peter J. Denning:
Opening Statement: What is Computation? 805-810 - Peter Wegner:
The Evolution of Computation. 811-813 - John S. Conery:
Computation is Symbol Manipulation. 814-816 - Dennis J. Frailey:
Computation is Process. 817-819 - Paul S. Rosenbloom:
Computing and Computation. 820-824 - Ruzena Bajcsy:
Computation and Information. 825 - Dave Bacon:
Computation and Fundamental Physics. 826-829 - Lance Fortnow:
The Enduring Legacy of the Turing Machine. 830-831 - Alfred V. Aho:
Computation and Computational Thinking. 832-835 - Joseph F. Traub:
What is the Right Computational Model for Continuous Scientific Problems? 836-837 - Jeffrey P. Buzen:
Computation, Uncertainty and Risk. 838-847 - Erol Gelenbe:
Natural Computation. 848-851 - Melanie Mitchell:
Biological Computation. 852-855 - Paolo Rocchi:
What is Information: Beyond the Jungle of Information Theories. 856-860 - Peter A. Freeman:
Consideration Of The Question "What Is Computation" Considered Harmful. 861-862 - Peter J. Denning:
Closing Statement: What Have We Said About Computation? 863-865
- Jane Hillston, Mirco Tribastone, Stephen Gilmore:
Stochastic Process Algebras: From Individuals to Populations. 866-881 - Jeremy T. Bradley, Nigel Thomas, Richard A. Hayden, Anton Stefanek:
Invited Response to Computer Journal Lecture by Prof. Jane Hillston. 882-886 - Jinhai Cai:
Robust Filtering-Based Thinning Algorithm for Pattern Recognition. 887-896 - Jie Lin, Donald A. Adjeroh:
All-Against-All Circular Pattern Matching. 897-906
Volume 55, Number 8, August 2012
- Bharat Jayaraman:
Special Issue on Security and Performance of Networks and Clouds: Guest Editor's Introduction. 907-908 - Rachit Agarwal, Abhik Banerjee, Vincent Gauthier, Monique Becker, Chai Kiat Yeo, Bu-Sung Lee:
Achieving Small-World Properties using Bio-Inspired Techniques in Wireless Networks. 909-931 - Yan Sun, Qiangfeng Jiang, Mukesh Singhal:
A Hill-Area-Restricted Geographic Routing Protocol for Mobile Ad Hoc and Sensor Networks. 932-949 - Omer H. Abdelrahman, Erol Gelenbe:
Packet Delay and Energy Consumption in Non-homogeneous Networks. 950-964 - Hongfang Yu, Vishal Anand, Chunming Qiao:
Virtual Infrastructure Design for Surviving Physical Link Failures. 965-978 - Antonio Muñoz, Javier Gonzalez, Antonio Maña:
A Performance-Oriented Monitoring System for Security Properties in Cloud Computing Applications. 979-994 - Timothy Wood, K. K. Ramakrishnan, Prashant J. Shenoy, Jacobus E. van der Merwe:
Enterprise-Ready Virtual Cloud Pools: Vision, Opportunities and Challenges. 995-1004 - Shivsubramani Krishnamoorthy, Preeti Bhargava, Matthew Mah, Ashok K. Agrawala:
Representing and Managing the Context of a Situation. 1005-1019
Volume 55, Number 9, September 2012
- Fairouz Kamareddine:
Capsule Reviews. 1021-1022
- Mark Burgin, Eugene Eberbach:
Evolutionary Automata: Expressiveness and Convergence of Evolutionary Computation. 1023-1029 - Yang Wang, Lin Wu, Xiaodi Huang, Xuemin Lin:
Human Action Recognition from Video Sequences by Enforcing Tri-view Constraints. 1030-1040 - Iyad F. Jafar, Khalid A. Darabkh, Ghazi M. Al-Sukkar:
A Rule-Based Fuzzy Inference System for Adaptive Image Contrast Enhancement. 1041-1057 - Jianping Gou, Zhang Yi, Lan Du, Taisong Xiong:
A Local Mean-Based k-Nearest Centroid Neighbor Classifier. 1058-1071 - Alex Pappachen James, Sima Dimitrijev:
Nearest Neighbor Classifier Based on Nearest Feature Decisions. 1072-1087 - Zhang Zhang, Jun Cheng, Jun Li, Wei Bian, Dacheng Tao:
Segment-Based Features for Time Series Classification. 1088-1102 - Kui Yu, Xindong Wu, Wei Ding, Hao Wang:
Exploring Causal Relationships with Streaming Features. 1103-1117 - I-Ching Hsu:
Semantic Tag-based Profile Framework for Social Tagging Systems. 1118-1129 - Paul C. Conilione, Dianhui Wang:
Fuzzy Approach for Semantic Face Image Retrieval. 1130-1145
Volume 55, Number 10, October 2012
- Fairouz Kamareddine:
Capsule Reviews. 1147
- Manoj A. Thomas, Gurpreet Dhillon:
Interpreting Deep Structures of Information Systems Security. 1148-1156 - Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang, Li Xu:
A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption. 1157-1168 - Yu-Fang Chung, Zhen Yu Wu:
Casting Ballots over Internet Connection Against Bribery and Coercion. 1169-1179 - Chang Xu, Zhoujun Li, Yi Mu, Hua Guo, Tao Guo:
Affiliation-Hiding Authenticated Asymmetric Group Key Agreement. 1180-1191 - Lin Ding, Jie Guan:
Cryptanalysis of Loiss Stream Cipher. 1192-1201 - Jinguang Han, Willy Susilo, Yi Mu, Jun Yan:
Attribute-Based Oblivious Access Control. 1202-1215 - Derek Chi-Wai Pao, Xing Wang:
Multi-Stride String Searching for High-Speed Content Inspection. 1216-1231 - Hyejin Son, Tae Yoon Kang, Hwangnam Kim, Jong-Bae Park, Jae Hyung Roh:
A Fair and Secure Bandwidth Allocation for AMI Mesh Network in Smart Grid. 1232-1243 - Nimalaprakasan Skandhakumar, Jason Reid, Ed Dawson, Robin Drogemuller, Farzad Salim:
An Authorization Framework using Building Information Models. 1244-1264
- João V. P. Gomes, Pedro R. M. Inácio, Manuela Pereira, Mário M. Freire, Paulo P. Monteiro:
Corrigendum: Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic. 1265
- Paul S. Rosenbloom:
Erratum: Computing and Computation. 1266
Volume 55, Number 11, November 2012
- Fairouz Kamareddine:
Capsule Reviews. 1267-1269
- Haitao Dan, Robert M. Hierons:
Controllability Problems in MSC-Based Testing. 1270-1287 - Suraj Pandey, Rajkumar Buyya:
Scheduling Workflow Applications Based on Multi-source Parallel Data Retrieval in Distributed Computing Networks. 1288-1308 - Winfried K. Grassmann:
A Computer Built with Relays and a Mechanical Memory, and ALGOL. 1309-1316 - Tayfun Kucukyilmaz, Ata Turk, Cevdet Aykanat:
A Parallel Framework for In-Memory Construction of Term-Partitioned Inverted Indexes. 1317-1330 - Doohwan Oh, Won Woo Ro:
Multi-Threading and Suffix Grouping on Massive Multiple Pattern Matching Algorithm. 1331-1346 - Shmuel T. Klein, Dana Shapira:
The String-to-Dictionary Matching Problem. 1347-1356 - Mina Memar, Mahmood Deypir, Mohammad Hadi Sadreddini, Seyed Mostafa Fakhrahmad:
An Efficient Frequent Itemset Mining Method over High-speed Data Streams. 1357-1366 - Hyungjung Seo, Jaewon Seo, Taewhan Kim:
Algorithms for Combined Inter- and Intra-Task Dynamic Voltage Scaling. 1367-1382 - Jie Ding, Jane Hillston:
Numerically Representing Stochastic Process Algebra Models. 1383-1397 - Matthias Weidlich, Remco M. Dijkman, Mathias Weske:
Behaviour Equivalence and Compatibility of Business Process Models with Complex Correspondences. 1398-1418
Volume 55, Number 12, December 2012
- Fairouz Kamareddine:
Capsule Reviews. 1419
- Mohamed Adel Serhani, Abdelghani Benharref, Elarbi Badidi, Salah Bouktif:
Scalable Federated Broker Management for Selection of Web Services. 1420-1439 - Antoine Bossard, Keiichi Kaneko:
Node-to-Set Disjoint-Path Routing in Hierarchical Cubic Networks. 1440-1446 - Oguzhan Erdem, Cüneyt F. Bazlamaçci:
High-performance IP Lookup Engine with Compact Clustered Trie Search. 1447-1466 - Chuan-Gang Liu, Chih-Hung Chao, Chih-Wen Leou, Jung-Shian Li:
Iterative Key Distribution Based on MAD Neighborhood in Underwater Mobile Sensor Networks. 1467-1485 - Dan Wang, Xiaowei Han, Hong Yang, Binbin Hao:
On Global Adaptive Synchronization in Weighted Complex Networks. 1486-1491 - Debraj De, Wen-Zhan Song, Shaojie Tang, Diane J. Cook:
EAR: An Energy and Activity-Aware Routing Protocol for Wireless Sensor Networks in Smart Environments. 1492-1506 - Fabíola Greve, Pierre Sens, Luciana Arantes, Véronique Simon:
Eventually Strong Failure Detector with Unknown Membership. 1507-1524 - Ozgur Sinanoglu:
Fault Model Independent, Maximal Compaction of Test Responses in the Presence of Unknown Response Bits. 1525-1537
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.