Journal: Comput. J.

Volume 53, Issue 9

1341 -- 1343Nicholas R. Jennings, Alex Rogers, S. Case, R. Johnston, D. Philpot. Decentralized Data and Information Systems: Theory and Practice
1344 -- 1359Michalis Smyrnakis, David S. Leslie. Dynamic Opponent Modelling in Fictitious Play
1360 -- 1369Erol Gelenbe, Stelios Timotheou, David Nicholson. Fast Distributed Near-Optimum Assignment of Assets to Tasks
1370 -- 1383Nicos G. Pavlidis, Niall M. Adams, David Nicholson, David J. Hand. Prospects for Bandit Solutions in Sensor Management
1384 -- 1400Nikolaos Dimakis, Avgoustinos Filippoupolitis, Erol Gelenbe. Distributed Building Evacuation Simulator for Smart Emergency Management
1401 -- 1414Christoforos Anagnostopoulos, Niall M. Adams, David J. Hand. Streaming Covariance Selection with Applications to Adaptive Querying in Sensor Networks
1415 -- 1429Seung Min Lee, Stephen J. Roberts. Sequential Dynamic Classification Using Latent Variable Models
1430 -- 1446Roman Garnett, Michael A. Osborne, Steven Reece, Alex Rogers, Stephen J. Roberts. Sequential Bayesian Prediction in the Presence of Changepoints and Faults
1447 -- 1461Sarvapali D. Ramchurn, Alessandro Farinelli, Kathryn S. Macarthur, Nicholas R. Jennings. Decentralized Coordination in RoboCup Rescue
1462 -- 1477Archie C. Chapman, Rosa Anna Micillo, Ramachandra Kota, Nicholas R. Jennings. Decentralized Dynamic Task Allocation Using Overlapping Potential Games
1478 -- 1484Lein Harn, Wen-Jung Hsin, Changlu Lin. Efficient On-line/Off-line Signature Schemes Based on Multiple-Collision Trapdoor Hash Families
1485 -- 1496Roberto De Prisco, Alfredo De Santis. Cheating Immune Threshold Visual Secret Sharing
1497 -- 1507Lélia Blin, Christian Laforest, Stephane Rovedakis, Nicolas Thibault. Hardness Results and Heuristic for Multi-groups Interconnection
1508 -- 1522Adenilso da Silva Simão, Alexandre Petrenko. Fault Coverage-Driven Incremental Test Generation
1523 -- 1534Vicent Cholvi, Antonio Fernández, Ernesto Jiménez, Pilar Manzano, Michel Raynal. A Methodological Construction of an Efficient Sequentially Consistent Distributed Shared Memory
1535 -- 1549Michael R. Wetherfield. Personal Recollections of Programming DEUCE in the Late 1950s

Volume 53, Issue 8

1134 -- 1135Sung Woo Chung, Hsien-Hsin S. Lee, Woo Hyong Lee. Architecture/OS Support for Embedded Multi-core Systems
1136 -- 1137Fariba Sadri, Kostas Stathis. Special Issue on Artificial Societies for Ambient Intelligence Editorial Introduction
1138 -- 1151Jurriaan van Diggelen, Robbert-Jan Beun, Rogier M. van Eijk, Peter J. Werkhoven. Efficient Semantic Information Exchange for Ambient Intelligence
1152 -- 1168Marco P. Locatelli, Marco Loregian, Giuseppe Vizzari. Artificial Societies in a Community-Based Approach to Ambient Intelligence
1169 -- 1183Aitor Ibarguren, Iñaki Maurtua, Basilio Sierra. Layered Architecture for Real-Time Sign Recognition
1184 -- 1209Krysia Broda, Christopher J. Hogger. Designing Effective Policies for Minimal Agents
1210 -- 1228Fabio Paternò, Carmen Santoro, Antonio Scorcia. Ambient Intelligence for Supporting Task Continuity across Multiple Devices and Implementation Languages
1229 -- 1256Patrice Caire, Leendert van der Torre. Convivial Ambient Technologies: Requirements, Ontology and Design
1257 -- 1276Alessandra Mileo, Davide Merico, Stefano Pinardi, Roberto Bisiani. A Logical Approach to Home Healthcare with Intelligent Sensor-Network Support
1277 -- 1290Johnsen Kho, Long Tran-Thanh, Alex Rogers, Nicholas R. Jennings. An Agent-Based Distributed Coordination Mechanism for Wireless Visual Sensor Nodes Using Dynamic Programming
1291 -- 1301Guang-Ho Cha. A Context-Aware Similarity Search for a Handwritten Digit Image Database
1302 -- 1314Huzaifa Zafar, Daniel D. Corkill. Reducing Online Model-Development Time by Agents Using Constraints Between Shared Observations
1315 -- 1323Mücahid Kutlu, Celal Cigir, Ilyas Cicekli. Generic Text Summarization for Turkish
1324 -- 1337Göksel Günlü, Hasan S. Bilge. Face Recognition with Discriminating 3D DCT Coefficients
1338 -- 1339Jakub Marecek. Handbook of Approximation Algorithms and Metaheuristics

Volume 53, Issue 7

883 -- 894HaNeul Chon, Taewhan Kim. Resource Sharing Problem of Timing Variation-Aware Task Scheduling and Binding in MPSoC
895 -- 903Liang Xia, Yongxin Zhu, Jun Yang, Jingwei Ye, Zonghua Gu. Implementing a Thermal-Aware Scheduler in Linux Kernel on a Multi-Core Processor
904 -- 917Minje Jun, Eui-Young Chung. Design of On-Chip Crossbar Network Topology Using Chained Edge Partitioning
918 -- 933Chung-Ming Huang, Jian Wei Li, Chun-Ta Chen. Distributed Hash Table-Based Interrogating-Call Session Control Function Network in the Internet Protocol Multimedia Subsystem for Efficient Query Services
934 -- 938Jongsung Kim, Seokhie Hong. Side-Channel Attack Using Meet-in-the-Middle Technique
939 -- 950Iuon-Chang Lin, Shih-Shan Tang, Chung-Ming Wang. Multicast Key Management without Rekeying Processes
951 -- 968Jenn-Wei Lin, Ming-Feng Yang. Robust Super-Peer-Based P2P File-Sharing Systems
969 -- 990Chuan-Chi Weng, Ching-Wen Chen, Chang-Jung Ku, Shiow-Fen Hwang. A Bandwidth-Based Power-Aware Routing Protocol with Low Route Discovery Overhead in Mobile ::::Ad hoc:::: Networks
991 -- 1019Jonathan Tate, Iain Bate. Sensornet Protocol Tuning Using Principled Engineering Methods
1020 -- 1037Georgios Loukas, Gülay Öke. Protection Against Denial of Service Attacks: A Survey
1038 -- 1044Isi Mitrani. Management of Server Farms for Performance and Profit
1045 -- 1051Andreas Berl, Erol Gelenbe, Marco Di Girolamo, Giovanni Giuliani, Hermann de Meer, Minh Quan Dang, Kostas Pentikousis. Energy-Efficient Cloud Computing
1052 -- 1061Erol Gelenbe, Edith C. H. Ngai. Adaptive Random Re-Routing for Differentiated QoS in Sensor Networks
1062 -- 1070Tsu-Yang Wu, Yuh-Min Tseng. An ID-Based Mutual Authentication and Key Exchange Protocol for Low-Power Mobile Devices
1071 -- 1091Xiuqiang He, Zonghua Gu, Yongxin Zhu. Task Allocation and Optimization of Distributed Embedded Systems with Simulated Annealing and Geometric Programming
1092 -- 1105Eyal Loz, Guillermo Pineda-Villavicencio. New Benchmarks for Large-Scale Networks with Given Maximum Degree and Diameter
1106 -- 1112Denis Trcek. Security Metrics Foundations for Computer Security
1113 -- 1127Morris Sloman, Emil C. Lupu. Engineering Policy-Based Ubiquitous Systems
1128 -- 0Robin Milner. Discussant of Response to the ::::Computer Journal Lecture:::: by Morris Sloman
1129 -- 1130Elizabeth Harrin. Growing Software: Proven Strategies for Managing Software Engineers
1131 -- 0Michael Elad, Dmitry Datsenko. Corrigendum: Example-Based Regularization Deployed to Super-Resolution Reconstruction of a Single Image

Volume 53, Issue 6

619 -- 622Fairouz Kamareddine. Capsule Reviews
623 -- 633Chien-Liang Chen, Shao-Chi Chin, Hsu-Chun Yen. Reachability Analysis of Augmented Marked Graphs via Integer Linear Programming
634 -- 643Yu-Chen Kuo. General Tree ::::k::::-Coteries to Reduce the Degradation of Quorums
644 -- 660R. Marshall. Modeling DNA/RNA Strings Using Resistor - Capacitor (RC) Ladder Networks
661 -- 666Ro-Yu Wu, Jou-Ming Chang, Yue-Li Wang. Loopless Generation of Non-regular Trees with a Prescribed Branching Sequence
667 -- 678Jywe-Fei Fang. The Bipancycle-Connectivity and the ::::m::::-Pancycle-Connectivity of the ::::k::::-ary ::::n::::-cube
679 -- 700Roberto Barbuti, Nicoletta De Francesco, Luca Tesei. An Abstract Interpretation Approach for Enhancing the Java Bytecode Verifier
701 -- 716Shmuel Tomi Klein, Miri Kopel Ben-Nissan. On the Usefulness of Fibonacci Compression Codes
717 -- 740Dae-Hwan Kim, Hyuk-Jae Lee. Fine-Grain Register Allocation and Instruction Scheduling in a Reference Flow
741 -- 752Emilio J. Padrón, Margarita Amor, Montserrat Bóo, Ramon Doallo. Hierarchical Radiosity for Multiresolution Systems Based on Normal Tests
753 -- 771Iren Valova, Derek Beaton, Daniel MacLean, John Hammond. NIPSOM: Parallel Architecture and Implementation of a Growing SOM
772 -- 785Anne Benoit, Mourad Hakem, Yves Robert. Multi-criteria Scheduling of Precedence Task Graphs on Heterogeneous Platforms
786 -- 801Xiaoyan Zhu, Qinbao Song, Zihan Jia. A Weighted Voting-Based Associative Classification Algorithm
802 -- 813Jen-Bang Feng, Iuon-Chang Lin, Yen-Ping Chu, Shyh-Chang Tsaur. Resampling Halftone Images Using Interpolation and Error-Diffusion
814 -- 826Hans Vandierendonck, Sean Rul, Koen De Bosschere. Accelerating Multiple Sequence Alignment with the Cell BE Processor
827 -- 841Michael A. Bekos, Michael Kaufmann, Katerina Potika, Antonios Symvonis. Area-Feature Boundary Labeling
842 -- 859Richard Picking, Alexia Robinet, Vic Grout, John McGinn, Armando Roy Delgado, Simon Ellis, Denise Oram. A Case Study Using a Methodological Approach to Developing User Interfaces for Elderly and Disabled People
860 -- 868Peter G. Harrison. Turning Back Time - What Impact on Performance?
869 -- 870Erol Gelenbe, Stephen Gilmore. Discussants Comments on the ::::Computer Journal Lecture:::: by Peter Harrison presented at the British Computer Society on 24th February 2009
871 -- 880Alessandra Di Pierro, Chris Hankin, Herbert Wiklicky. Program Analysis Probably Counts
881 -- 0Pasquale Malacaria. Program Analysis Probably Counts: Discussant Contribution for the ::::Computer Journal Lecture:::: by Chris Hankin

Volume 53, Issue 5

493 -- 502Duncan Gillies, David Thornley, Chatschik Bisdikian. Probabilistic Approaches to Estimating the Quality of Information in Military Sensor Networks
503 -- 512Gita Sukthankar, Katia P. Sycara. Analyzing Team Decision-Making in Tactical Scenarios
513 -- 527Lei Chen 0005, Zijian Wang, Boleslaw K. Szymanski, Joel W. Branch, Dinesh C. Verma, Raju Damarla, John Ibbotson. Dynamic Service Execution in Sensor Networks
528 -- 540Katia P. Sycara, Timothy J. Norman, Joseph A. Giampapa, Martin J. Kollingbaum, Chris Burnett, Daniele Masato, Mairi McCallum, Michael H. Strub. Agent Support for Policy-Driven Collaborative Mission Planning
541 -- 550Dinesh C. Verma, Bong-Jun Ko, Petros Zerfos, Kang-Won Lee, Ting He, Matthew Duggan, Kristian Stewart, Ananthram Swami, Nikoletta Sofra. Understanding the Quality of Monitoring for Network Management
551 -- 580Zhongqiang Chen, Yuan Zhang, Zhongrong Chen. A Categorization Framework for Common Computer Vulnerabilities and Exposures
581 -- 591Hafizur Rahaman, Jimson Mathew, Dhiraj K. Pradhan. Secure Testable S-box Architecture for Cryptographic Hardware Implementation
592 -- 609François Baccelli, Bartlomiej Blaszczyszyn, Paul Mühlethaler. Time-Space Opportunistic Routing in Wireless ::::Ad hoc:::: Networks: Algorithms and Performance Optimization by Stochastic Geometry
610 -- 611Mathew D. Penrose. Discussant of Response to the ::::Computer Journal Lecture:::: by Francois Baccelli
612 -- 614Takis Konstantopoulos. Response to Prof. Baccelli s lecture on Modelling of Wireless Communication Networks by Stochastic Geometry
615 -- 616François Laroussinie. Christel Baier and Joost-Pieter Katoen::::Principles of Model Checking::::. MIT Press (May 2008).ISBN: 978-0-262-02649-9, 975 pp. Hardcover
615 -- 0Rupak Majumdar. Paul Ammann and Jeff Offutt::::Introduction to Software Testing::::. Cambridge University Press(2008). ISBN: 978-0-521-88038-1, 322 pp. Hardcover
616 -- 617Neil F. Johnson. Frank Y. Shih::::Digital Watermarking and Steganography: Fundamentals and Techniques::::. CRC/Taylor & Francis (2008).ISBN-13: 9781420047578, 180 pp. Hardcover

Volume 53, Issue 4

365 -- 369Marcus Nilsson. Computational Aspects of Monomial Dynamical Systems
393 -- 404Patrick Erik Bradley. Mumford Dendrograms
417 -- 431Jenny Benois-Pineau, Andrei Khrennikov. Significance Delta Reasoning with ::::p::::-Adic Neural Networks: Application to Shot Change Detection in Video
432 -- 442Branko Dragovich, Alexandra Dragovich. p-Adic Modelling of the Genome and the Genetic Code
443 -- 464Anthony Karel Seda, Pascal Hitzler. Generalized Distance Functions in the Theory of Computation
465 -- 488Behzad Akbarpour, Amr T. Abdel-Hamid, Sofiène Tahar, John Harrison. Verifying a Synthesized Implementation of IEEE-754 Floating-Point Exponential Function using HOL
489 -- 490Boran Gazi. Krzysztof J. Cios, Witold Pedrycz, Roman W. Swiniarski and Lukasz A. Kurgan: ::::Data Mining: A Knowledge Discovery Approach:::: Springer (2007) ISBN 978-0387333335

Volume 53, Issue 3

249 -- 250Taskin Koçak. Two Decades of Random Neural Networks
251 -- 267Stelios Timotheou. The Random Neural Network: A Survey
268 -- 279Georgia Sakellari. The Cognitive Packet Network: A Survey
280 -- 288Jian Wu, Steve Furber. A Multicast Routing Scheme for a Universal Spiking Neural Network Architecture
289 -- 303Mustafa Badaroglu, Ugur Halici, Isik Aybay, Cuneyt Cerkez. A Cascadable Random Neural Network Chip with Reconfigurable Topology
316 -- 341Ching-man Au Yeung, Ho-Fung Leung. A Formal Model of Ontology for Handling Fuzzy Membership and Typicality of Instances
342 -- 350Ajoy Kumar Datta, Lawrence L. Larmore, Priyanka Vemula. A Self-Stabilizing ::::O::::(::::k::::)-Time ::::k::::-Clustering Algorithm
351 -- 364Chih-Yu Lin, Yu-Chee Tseng, Yung-Chih Liu. Imprecision-Tolerant Location Management for Object-Tracking Wireless Sensor Network

Volume 53, Issue 2

129 -- 130Bo Hu, Bin Hu, Victor Callaghan, Zongkai Lin. Combining Theory and Systems Building in Pervasive Computing
131 -- 141Junzhou Luo, Weining Kong, Liang Ge. Implementation of Learning Path in Process Control Model
142 -- 151Fernando Rivera-Illingworth, Victor Callaghan, Hani Hagras. Detection Of Normal and Novel Behaviours In Ubiquitous Domestic Environments
152 -- 165Baopeng Zhang, Yuanchun Shi, Xin Xiao. A Policy-Driven Service Composition Method for Adaptation in Pervasive Computing Environment
166 -- 176Zheng-Yu Wu, Han-Tao Song. Ant-based Energy-aware Disjoint Multipath Routing Algorithm for MANETs
177 -- 190Jinjiao Lin, Chengxiang Song, Haiyang Wang. A Rule-based Method for Improving Adaptability in Pervasive Systems
191 -- 207Philip Moore, Bin Hu, JiZheng Wan. Smart-Context: A Context Ontology for Pervasive Mobile Computing
208 -- 218Kumaara Velan. Modelling Bidders in Sequential Automated Auctions
219 -- 233Zhao Wu, Naixue Xiong, Jong Hyuk Park, Tai-Hoon Kim, Lei Yuan. A Simulation Model Supporting Time and Non-time Metrics for Web Service Composition
234 -- 248Mouna Allani, Benoît Garbinato, Fernando Pedone. Resource-Aware Multimedia Content Delivery: A Gambling Approach

Volume 53, Issue 10

1551 -- 1552You-Chiun Wang, Tomoaki Ohtsuki, Athanasios V. Vasilakos, Ashutosh Sabharwal, Yuh-Shyan Chen, Yu-Chee Tseng. Algorithms, Protocols and Future Applications of Wireless Sensor Networks
1553 -- 1575Orhan Dagdeviren, Kayhan Erciyes. Graph Matching-Based Distributed Clustering and Backbone Formation Algorithms for Sensor Networks
1576 -- 1593Thanassis Giannetsos, Tassos Dimitriou, Ioannis Krontiris, Neeli R. Prasad. Arbitrary Code Injection through Self-propagating Worms in Von Neumann Architecture Devices
1594 -- 1605Yuan Zhang, Lichun Bao, Shih Hsien Yang, Max Welling, Di Wu. Localization Algorithms for Wireless Sensor Retrieval
1606 -- 1620Aaron B. Kiely, Mingsen Xu, Wen-Zhan Song, Renjie Huang, Behrooz Shirazi. Adaptive Linear Filtering Compression on Realtime Sensor Networks
1621 -- 1631Chih-Wei Yi, Peng-Jun Wan, Chao-Min Su, Chen-Wei Huang. The Critical Grid Size and Transmission Radius for Local-Minimum-Free Grid Routing in Wireless Ad Hoc and Sensor Networks
1632 -- 1642Meng Zheng, Wei Liang, Haibin Yu, Yang Xiao. Cross Layer Optimization for Energy-Constrained Wireless Sensor Networks: Joint Rate Control and Routing
1643 -- 1657Long Cheng, Yimin Chen, Canfeng Chen, Jian Ma, Lei Shu, Athanasios V. Vasilakos, Naixue Xiong. Efficient Query-Based Data Collection for Mobile Wireless Monitoring Applications
1658 -- 1673Jaime Lloret, Sandra Sendra, Hugo Coll, Miguel Garcia. Saving Energy in Wireless Local Area Sensor Networks
1674 -- 1690Pruet Boonma, Junichi Suzuki. Moppet: A Model-Driven Performance Engineering Framework for Wireless Sensor Networks
1691 -- 1703Yu-Ying Shih, Daniel Chao. Sequence of Control in S:::3:::PMR
1704 -- 1718Chung-Ming Huang, Ming-Sian Lin, Lik-Hou Chang. The Design of Mobile Concurrent Multipath Transfer in Multihomed Wireless Mobile Networks
1719 -- 1737Jianxin Liao, Qi Qi, Xiaomin Zhu, Yufei Cao, Tonghong Li. Enhanced IMS Handoff Mechanism for QoS Support over Heterogeneous Network
1738 -- 1751Maria Petrou, Marco Elio Tabacchi, Roberta Piroddi. Networks of Concepts and Ideas
1752 -- 1757Jon Crowcroft. Internet Failures: an Emergent Sea of Complex Systems and Critical Design Errors?
1758 -- 1782Manfred Broy. A Logical Basis for Component-Oriented Software and Systems Engineering
1783 -- 1798Daniel Y. Chao. Fewer Monitors and More Efficient Controllability for Deadlock Control in S:::3:::PGR:::2::: (Systems of Simple Sequential Processes with General Resource Requirements)

Volume 53, Issue 1

1 -- 2Erol Gelenbe. Editorial
21 -- 36Xiaowei Huang, Li Jiao, Weiming Lu. Congruence Formats for Weak Readiness Equivalence and Weak Possible Future Equivalence
37 -- 49Xuejun Yang, Ji Wang, Xiaodong Yi. Slicing Execution with Partial Weakest Precondition for Model Abstraction of C Programs
50 -- 68Daniel Cutting, Aaron J. Quigley, Björn Landfeldt. Special Interest Messaging: A Comparison of IGM Approaches
69 -- 89Patrick Erik Bradley, Norbert Paul. Using the Relational Model to Capture Topological Information of Spaces
90 -- 106Wil M. P. van der Aalst, Niels Lohmann, Peter Massuthe, Christian Stahl, Karsten Wolf. Multiparty Contracts: Agreeing and Implementing Interorganizational Processes
107 -- 119Feng Liu, Chuan-Kun Wu, Xi Jun Lin. Some Extensions on Threshold Visual Cryptography Schemes
120 -- 126A. S. M. Sajeev, Sakgasit Ramingwong. Mum Effect as an Offshore Outsourcing Risk: A Study of Differences in Perceptions
127 -- 0Ricardo P. Jasinski. Jari Nurmi: Processor Design - System-on-Chip Computing for ASICs and FPGAs. Springer (2007) ISBN 978-1-4020-5529-4