Journal: Computers and Artificial Intelligence

Volume 38, Issue 6

1237 -- 1271Atul O. Thakare, Parag S. Deshpande. Probabilistic Page Replacement Policy in Buffer Cache Management for Flash-Based Cloud Databases
1272 -- 1300Sonal Kukreja, Geeta Kasana, Singara Singh Kasana. Cellular Automata Based Image Authentication Scheme Using Extended Visual Cryptography
1301 -- 1319Xiuxiu Liao, Kejia Bai, Qian Zhang, Xiping Jia, Shaopeng Liu, Jin Zhan. Image Super-Resolution Based on Sparse Coding with Multi-Class Dictionaries
1320 -- 1340José Agustín Tortolero Osuna, Alberto Jorge Rosales-Silva. Parallel Peer Group Filter for Impulse Denoising in Digital Images on GPU
1341 -- 1374Alena Martonova, Jozef Marcin, Pavol Návrat, Jozef Tvarozek, Gabriela Grmanová. Automatic Query Refining Based on Eye-Tracking Feedback
1375 -- 1402Jorão Gomes Jr., Laura Lima Dias, Eduardo Rocha Soares, Eduardo Barrére, Jairo Francisco de Souza. Framework for Knowledge Discovery in Educational Video Repositories
1403 -- 1417Xiao Zhang. Fuzzy Knowledge Inference: Quickly Estimate Evidence via Formula Embedding
1418 -- 1443Jana Lovísková, Daniel Pernecký. Generalized Selection Method
1444 -- 1478Hojjat Emami. Chaotic Election Algorithm

Volume 38, Issue 5

1009 -- 1038Ha Thi Thu Doan, Kazuhiro Ogata 0001. A More Faithful Formal Definition of the Desired Property for Distributed Snapshot Algorithms to Model Check the Property
1039 -- 1066Weijuan Sun, Ning Wang. Gathering Information on the Web by Consistent Entity Augmentation
1067 -- 1090Vladimir Maksimovic, Branimir Jaksic, Mile Petrovic, Petar C. Spalevic, Stefan Panic. New Approach to Edge Detection on Different Level of Wavelet Decomposition
1091 -- 1110Yan Xing, Fanrong Meng, Yong Zhou 0003, Guibin Sun, Zhixiao Wang. Overlapping Community Detection Extended from Disjoint Community Structure
1111 -- 1130Dmytro Konotop, Valeriy Zinchenko, Ivana Budinská, Wei Li. Information Technology of Generalized Model Creation of Complex Technical Objects
1131 -- 1148Juyong Lee, Daeyoub Kim, Jihoon Lee. Mobile Edge Computing Based Immersive Virtual Reality Streaming Scheme
1149 -- 1180Fadi Obeid, Philippe Dhaussy. Formal Verification of Security Pattern Composition: Application to SCADA
1181 -- 1209William Steingartner, Valerie Novitzká, Wolfgang Schreiner. Coalgebraic Operational Semantics for an Imperative Language
1210 -- 1236Nayden Chivarov, Denis Chikurtev, Stefan Chivarov, Matús Pleva, Stanislav Ondás, Jozef Juhár, Kaloyan Yovchev. Case Study on Human-Robot Interaction of the Remote-Controlled Service Robot for Elderly and Disabled Care

Volume 38, Issue 4

765 -- 789Dongxia Wang, Yongmei Lei, Shenghong Jiang. Group-Based Asynchronous Distributed Alternating Direction Method of Multipliers in Multicore Cluster
790 -- 816Piotr Nawrocki, Bartlomiej Sniezynski, Jakub Kolodziej. Agent-Based System for Mobile Service Adaptation Using Online Machine Learning and Mobile Cloud Computing Paradigm
817 -- 850Luisa D'Amore, Valeria Mele, Diego Romano, Giuliano Laccetti. Multilevel Algebraic Approach for Performance Analysis of Parallel Algorithms
851 -- 882Syed Irtaza Muzaffar, Khurram Shahzad 0002, Faisal Aslam, Madiha Khalid, Kamran Malik. Process Matching: Performance Trade-Off Between Summary and Full-Length Descriptions
883 -- 916Ha Bang Ban, Due Nghia Nguyen, Kien Nguyen. An Effective Metaheuristic for Multiple Traveling Repairman Problem with Distance Constraints
917 -- 936Xinghua Zheng, Zhengming Ma, Hangjian Che, Lei Li. HSIC Regularized LTSA
937 -- 962Robert Susik, Szymon Grabowski, Kimmo Fredriksson. Revisiting Multiple Pattern Matching
963 -- 985Gábor Szabó, László Kovács. Optimization of the Morpher Morphology Engine Using Knowledge Base Reduction Techniques
986 -- 1008Vahideh Reshadat, Heshaam Faili. A New Open Information Extraction System Using Sentence Difficulty Estimation

Volume 38, Issue 3

525 -- 554Altaf Hussain, Muhammad Aleem, Muhammad Azhar Iqbal, Muhammad Arshad Islam. Investigation of Cloud Scheduling Algorithms for Resource Utilization Using CloudSim
555 -- 574Tomasz Marek Kowalski, Szymon Grabowski, Kimmo Fredriksson. Suffix Arrays with a Twist
575 -- 596Ayslan Trevizan Possebom, M. Mariela Morveli-Espinoza, Cesar Augusto Tacla. Dialogue Model Using Arguments for Consensus Decision Making Through Common Knowledge Formation
597 -- 620Mohammed Wasid, Rashid Ali. Fuzzy Side Information Clustering-Based Framework for Effective Recommendations
621 -- 646Xiaoyu Wu, Ning Wang, Huaxi Liu. Discovering Foreign Keys on Web Tables with the Crowd
647 -- 678Lubos Ovsenik, Ján Turán, Tomás Huszaník, Jakub Oravec, Ondrej Kovac, Milan Oravec. Image Encryption Algorithm with Plaintext Related Chaining
679 -- 700Jedrzej Potoniec. Learning SPARQL Queries from Expected Results
701 -- 727Aytekin Yildizhan, Nurettin Topaloglu. Chaotic Encryption and Privilege Based Visual Secret Sharing Model for Color Images
728 -- 764Frantisek Capkovic. Petri Nets at Modelling and Control of Discrete-Event Systems with Nondeterminism - Part 2

Volume 38, Issue 2

265 -- 290Rafael Rodriguez-Reche, Rocío Pérez de Prado, Sebastian García Galán, José Enrique Muñoz Expósito, Nicolás Ruiz-Reyes. Specific Parameter-Free Global Optimization to Speed Up Setting and Avoid Factors Interactions
291 -- 320Petrônio Bezerra, Marcela Santos, Edlane Alves, Fellype Albuquerque, Gustavo Martins, Reinaldo Gomes, Anderson F. B. F. da Costa. An Experimental Study on Virtual Machine Live Migration Impact on Services Performance
321 -- 342Sonal Kukreja, Geeta Kasana, Singara Singh Kasana. Adaptive Reversible Data Hiding Scheme for Digital Images Based on Histogram Shifting
343 -- 366Liberios Vokorokos, Branislav Mados, Norbert Ádám, Anton Baláz, Jaroslav Porubän, Eva Chovancová. Multi-Carrier Steganographic Algorithm Using File Fragmentation of FAT FS
367 -- 389Aleksander Cislak, Szymon Grabowski. Lightweight Fingerprints for Fast Approximate Keyword Matching Using Bitwise Operations
390 -- 420Francisca Aparecida Prado Pinto, Henrique Jorge A. Holanda, Carla K. De M. Marques, Giovanni Cordeiro Barroso. Efficient Methods for Scheduling Jobs in a Simulation Model Using a Multicore Multicluster Architecture
421 -- 453Mohsen Kiani, Amir Rajabzadeh. RDGC: A Reuse Distance-Based Approach to GPU Cache Performance Analysis
454 -- 472Juris Rats. Developing and Evaluating ECM Data Persistence Architecture
473 -- 496Atul Thakare, Srijay Deshpande, Amit Kshirsagar, Parag S. Deshpande. Mining Query Plans for Finding Candidate Queries and Sub-Queries for Materialized Views in BI Systems Without Cube Generation
497 -- 524Verislav Djukic, Aleksandar Popovic, Ivan Lukovic, Vladimir Ivancevic. Model Variations and Automated Refinement of Domain-Specific Modeling Languages for Robot-Motion Control

Volume 38, Issue 1

1 -- 18Dong Liu. A New Dynamic Load Balancing Algorithm for Multi-ROIA
19 -- 56Son Thanh Cao, Linh Anh Nguyen. Incorporating Stratified Negation into Query-Subquery Nets for Evaluating Queries to Stratified Deductive Databases
57 -- 84Marija Ivanovic, Dragan Urosevic. Variable Neighborhood Search Approach for Solving Roman and Weak Roman Domination Problems on Graphs
85 -- 114Mohammad Nosrati, Hassan Haghighi. A Probabilistic Extension of UML-B
115 -- 150Sihem Klai, Antoine Zimmermann, Mohamed Tarek Khadir. Networked Ontologies with Contextual Alignments
151 -- 172Irem Ülkü, Ersin Kizgut. Lossy Compressive Sensing Based on Online Dictionary Learning
173 -- 196SeongKi Kim, Hyuksoo Han. CL-Vis: Visualization Platform for Understanding and Checking the OpenCL Programs
197 -- 222Jaroslaw Bylina. Assessment of Two Task Frameworks with Dependencies for Matrix Factorizations on a Multicore Architecture
223 -- 239Zhanquan Sun, Feng Li, Huifen Huang. Study on Unsupervised Feature Selection Method Based on Extended Entropy
240 -- 264Hasan Zafari, Maryam Hourali. From Parsed Corpora to Semantically Related Verbs