Journal: Comput. J.

Volume 53, Issue 7

883 -- 894HaNeul Chon, Taewhan Kim. Resource Sharing Problem of Timing Variation-Aware Task Scheduling and Binding in MPSoC
895 -- 903Liang Xia, Yongxin Zhu, Jun Yang, Jingwei Ye, Zonghua Gu. Implementing a Thermal-Aware Scheduler in Linux Kernel on a Multi-Core Processor
904 -- 917Minje Jun, Eui-Young Chung. Design of On-Chip Crossbar Network Topology Using Chained Edge Partitioning
918 -- 933Chung-Ming Huang, Jian Wei Li, Chun-Ta Chen. Distributed Hash Table-Based Interrogating-Call Session Control Function Network in the Internet Protocol Multimedia Subsystem for Efficient Query Services
934 -- 938Jongsung Kim, Seokhie Hong. Side-Channel Attack Using Meet-in-the-Middle Technique
939 -- 950Iuon-Chang Lin, Shih-Shan Tang, Chung-Ming Wang. Multicast Key Management without Rekeying Processes
951 -- 968Jenn-Wei Lin, Ming-Feng Yang. Robust Super-Peer-Based P2P File-Sharing Systems
969 -- 990Chuan-Chi Weng, Ching-Wen Chen, Chang-Jung Ku, Shiow-Fen Hwang. A Bandwidth-Based Power-Aware Routing Protocol with Low Route Discovery Overhead in Mobile ::::Ad hoc:::: Networks
991 -- 1019Jonathan Tate, Iain Bate. Sensornet Protocol Tuning Using Principled Engineering Methods
1020 -- 1037Georgios Loukas, Gülay Öke. Protection Against Denial of Service Attacks: A Survey
1038 -- 1044Isi Mitrani. Management of Server Farms for Performance and Profit
1045 -- 1051Andreas Berl, Erol Gelenbe, Marco Di Girolamo, Giovanni Giuliani, Hermann de Meer, Minh Quan Dang, Kostas Pentikousis. Energy-Efficient Cloud Computing
1052 -- 1061Erol Gelenbe, Edith C. H. Ngai. Adaptive Random Re-Routing for Differentiated QoS in Sensor Networks
1062 -- 1070Tsu-Yang Wu, Yuh-Min Tseng. An ID-Based Mutual Authentication and Key Exchange Protocol for Low-Power Mobile Devices
1071 -- 1091Xiuqiang He, Zonghua Gu, Yongxin Zhu. Task Allocation and Optimization of Distributed Embedded Systems with Simulated Annealing and Geometric Programming
1092 -- 1105Eyal Loz, Guillermo Pineda-Villavicencio. New Benchmarks for Large-Scale Networks with Given Maximum Degree and Diameter
1106 -- 1112Denis Trcek. Security Metrics Foundations for Computer Security
1113 -- 1127Morris Sloman, Emil C. Lupu. Engineering Policy-Based Ubiquitous Systems
1128 -- 0Robin Milner. Discussant of Response to the ::::Computer Journal Lecture:::: by Morris Sloman
1129 -- 1130Elizabeth Harrin. Growing Software: Proven Strategies for Managing Software Engineers
1131 -- 0Michael Elad, Dmitry Datsenko. Corrigendum: Example-Based Regularization Deployed to Super-Resolution Reconstruction of a Single Image