Journal: Comput. J.

Volume 65, Issue 10

2547 -- 2569Rajalakshmi Shenbaga Moorthy, P. Pabitha. Accelerating Analytics Using Improved Binary Particle Swarm Optimization for Discrete Feature Selection
2570 -- 2588Binanda Sengupta, Yingjiu Li, Yangguang Tian, Robert H. Deng, Zheng Yang. Policy-Based Editing-Enabled Signatures: Authenticating Fine-Grained and Restricted Data Modification
2589 -- 2609Muhammad Inaam Ul Haq, Qianmu Li, Jun Hou 0002. Analyzing the Research Trends of IoT Using Topic Modeling
2610 -- 2614Michael H. Albert, Vincent Vatter. How Many Pop-Stacks Does It Take To Sort A Permutation?
2615 -- 2630Zhiyao Li, Wei Liu, Xiaofeng Gao 0001, Guihai Chen. Friends-Based Crowdsourcing: Algorithms For Task Dissemination Over Social Groups
2631 -- 2640Elif Ustundag Soykan, Leyli Karaçay, Zeki Bilgin, Emrah Tomur, Mehmet Akif Ersoy, Ferhat Karakoç, Pinar Çomak. Context-Aware Authentication with Dynamic Credentials using Electricity Consumption Data
2641 -- 2653Mohsen Salehi, Jafar Razmara, Shahriar Lotfi, Farnaz Mahan. A One-Dimensional Probabilistic Convolutional Neural Network for Prediction of Breast Cancer Survivability
2654 -- 2663Mehmet Akif Bülbül, Celal Öztürk, Mehmet Fatih Isik. Optimization of Climatic Conditions Affecting Determination of the Amount of Water Needed by Plants in Relation to Their Life Cycle with Particle Swarm Optimization, and Determining the Optimum Irrigation Schedule
2664 -- 2677Shefali Gupta, Ankit Goel, Meenu Dave. Tunicate Swarm Magnetic Optimization With Deep Convolution Neural Network For Collaborative Filter Recommendation
2678 -- 2692S. Guruvammal, T. Chellatamilan, L. Jegatha Deborah. Automatic Detection of Autism in Young Children Using Weighted Logarithmic Transformed Data with Optimized Deep Learning
2693 -- 2708Xiaoyang Liu, Xiang Li. A Social Network Link Prediction Method Based on Stacked Generalization
2709 -- 2719Pramod Ganapathi, Rezaul Chowdhury. Parallel Divide-and-Conquer Algorithms for Bubble Sort, Selection Sort and Insertion Sort
2720 -- 2729Yanzhao Shen, Ting Wu 0001, Gaoli Wang, Xinfeng Dong, Haifeng Qian. Improved Collision Detection Of MD5 Using Sufficient Condition Combination
2730 -- 2740Vikas Chaurasia, Saurabh Pal. Ensemble Technique to Predict Breast Cancer on Multiple Dataset
2741 -- 2754Ayoub Lahmidi, Khalid Minaoui, Chouaib Moujahdi, Mohammed Rziza. Fingerprint Template Protection Using Irreversible Minutiae Tetrahedrons
2755 -- 2768María Magdalena Payeras Capellà, Macià Mut Puigserver, Miquel A. Cabot-Nadal, Llorenç Huguet i Rotger. Blockchain-Based Confidential Multiparty Contract Signing Protocol Without TTP Using Elliptic Curve Cryptography
2769 -- 2779Milad Seddigh, Hadi Soleimany. Flush+Reload Attacks on SEED
2780 -- 2800Amel Mammar, Lazhar Hamel, Mohamed Graiet. An Event-B-Based Approach to Model and Verify Behaviors for Component-Based Applications
2801 -- 2814Sohei Ito, Kenji Osari, Masaya Shimakawa, Shigeki Hagihara, Naoki Yonezaki. Efficient Realizability Checking by Modularization of LTL Specifications
2815 -- 2827Muhammad Asif, Maaz Bin Ahmad, Shiza Mushtaq, Khalid Masood, Toqeer Mahmood, Arfan Ali Nagra. Long Multi-digit Number Recognition from Images Empowered by Deep Convolutional Neural Networks
2828 -- 2844Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen. Public-Key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-Resistant Instantiation
2845 -- 0M. KrishnaSiva Prasad, Poonam Sharma. Corrigendum to: Similarity of Sentences With Contradiction Using Semantic Similarity Measures
2846 -- 0Binlin Cheng, Jinjun Liu, Jiejie Chen, Shudong Shi, Xufu Peng, Xingwen Zhang, Haiqing Hai. Erratum to: MoG: Behavior-Obfuscation Resistance Malware Detection