Journal: Comput. J.

Volume 65, Issue 6

1353 -- 1364Yati Phyo, Canh Minh Do, Kazuhiro Ogata 0001. A Divide & Conquer Approach to Leads-to Model Checking
1365 -- 1385C. Venkata Narasimhulu. A New Blind Watermark Embedding Model: Spiral Updated Rider Optimization Algorithm
1386 -- 1411Carlo Blundo, Stelvio Cimato, Luisa Siniscalchi. Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints
1412 -- 1433Tomasz Boinski, Pawel Czarnul. Optimization of Data Assignment for Parallel Processing in a Hybrid Heterogeneous Environment Using Integer Linear Programming
1434 -- 1460Sreenithya Sumesh, Aneesh Krishna. i* Goal Model
1461 -- 1471Lei Wang, Qiang Zhang, Qing Qian, Jishuai Wang, Yujun Pan, Renbing Yang, Wenbo Cheng. Multispectral Palm Print and Palm Vein Acquisition Platform and Recognition Method Based on Convolutional Neural Network
1472 -- 1488Fernando J. Fiori, Waltteri Pakalén, Jorma Tarhio. Approximate String Matching with SIMD
1489 -- 1511Shengyuan Feng, Junqing Gong 0001, Jie Chen. Binary Tree Encryption with Constant-Size Public Key in the Standard Model
1512 -- 1526Tonglai Liu, Jigang Wu, Jiaxing Li, Jingyi Li, Zikai Zhang. Efficient Algorithms For Storage Load Balancing Of Outsourced Data In Blockchain Network
1527 -- 1539Surbhi Gupta, Manoj K. Gupta. Computational Prediction of Cervical Cancer Diagnosis Using Ensemble-Based Classification Algorithm
1540 -- 1559Sahil 0001, Sandeep Kumar Sood. Fog-assisted Energy Efficient Cyber Physical System for Panic-based Evacuation during Disasters
1560 -- 1573Xichao Hu, Yongqiang Li 0001, Lin Jiao, Mingsheng Wang. New Division Property Propagation Table: Applications to Block Ciphers with Large S-boxes
1574 -- 1585Meijuan Huang, Bo Yang 0003, Yanwei Zhou, Xuewei Hu. Continual Leakage-Resilient Hedged Public-Key Encryption
1586 -- 1597G. Gokulkumari. Metaheuristic-Enabled Artificial Neural Network Framework For Multimodal Biometric Recognition With Local Fusion Visual Features
1598 -- 1610Zeyi Liu, Weijuan Zhang, Ji Xiang, Daren Zha, Lei Wang 0135. NP-LFA: Non-profiled Leakage Fingerprint Attacks against Improved Rotating S-box Masking Scheme
1611 -- 1630Selvapandian Arumugam, Nagendra Prabhu Selvaraj, P. Sivakumar 0002, Jagannadha Rao D. B.. Lung Cancer Detection and Severity Level Classification Using Sine Cosine Sail Fish Optimization Based Generative Adversarial Network with CT Images
1631 -- 1638Qiong Sun, Xiankai Huang, Zheng Liu. Tourists' Digital Footprint: Prediction Method of Tourism Consumption Decision Preference
1639 -- 1652I Edwin Albert, A. J. Deepa, A. Lenin Fred. Fidelity Homogenous Genesis Recommendation Model for User Trust with Item Ratings