researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Comput. J.
Home
Index
Info
Volume
Volume
55
, Issue
9
1021
--
1022
Fairouz Kamareddine
.
Capsule Reviews
1023
--
1029
Mark Burgin
,
Eugene Eberbach
.
Evolutionary Automata: Expressiveness and Convergence of Evolutionary Computation
1030
--
1040
Yang Wang
,
Lin Wu
,
Xiaodi Huang
,
Xuemin Lin
.
Human Action Recognition from Video Sequences by Enforcing Tri-view Constraints
1041
--
1057
Iyad F. Jafar
,
Khalid A. Darabkh
,
Ghazi M. Al-Sukkar
.
A Rule-Based Fuzzy Inference System for Adaptive Image Contrast Enhancement
1058
--
1071
Jianping Gou
,
Zhang Yi
,
Lan Du
,
Taisong Xiong
.
k-Nearest Centroid Neighbor Classifier
1072
--
1087
Alex Pappachen James
,
Sima Dimitrijev
.
Nearest Neighbor Classifier Based on Nearest Feature Decisions
1088
--
1102
Zhang Zhang
,
Jun Cheng
,
Jun Li 0010
,
Wei Bian
,
Dacheng Tao
.
Segment-Based Features for Time Series Classification
1103
--
1117
Kui Yu
,
Xindong Wu
,
Wei Ding 0003
,
Hao Wang
.
Exploring Causal Relationships with Streaming Features
1118
--
1129
I.-Ching Hsu
.
Semantic Tag-based Profile Framework for Social Tagging Systems
1130
--
1145
Paul C. Conilione
,
Dianhui Wang
.
Fuzzy Approach for Semantic Face Image Retrieval
Volume
55
, Issue
8
907
--
908
Bharat Jayaraman
.
Special Issue on Security and Performance of Networks and Clouds: Guest Editor's Introduction
909
--
931
Rachit Agarwal 0002
,
Abhik Banerjee
,
Vincent Gauthier
,
Monique Becker
,
Chai Kiat Yeo
,
Bu-Sung Lee
.
Achieving Small-World Properties using Bio-Inspired Techniques in Wireless Networks
932
--
949
Yan Sun
,
Qiangfeng Jiang
,
Mukesh Singhal
.
Ad Hoc and Sensor Networks
950
--
964
Omer H. Abdelrahman
,
Erol Gelenbe
.
Packet Delay and Energy Consumption in Non-homogeneous Networks
965
--
978
Hongfang Yu
,
Vishal Anand
,
Chunming Qiao
.
Virtual Infrastructure Design for Surviving Physical Link Failures
979
--
994
Antonio Muñoz
,
Javier Gonzalez
,
Antonio Maña
.
A Performance-Oriented Monitoring System for Security Properties in Cloud Computing Applications
995
--
1004
Timothy Wood
,
K. K. Ramakrishnan
,
Prashant J. Shenoy
,
Jacobus E. van der Merwe
.
Enterprise-Ready Virtual Cloud Pools: Vision, Opportunities and Challenges
1005
--
1019
Shivsubramani Krishnamoorthy
,
Preeti Bhargava
,
Matthew Mah
,
Ashok K. Agrawala
.
Representing and Managing the Context of a Situation
Volume
55
, Issue
7
777
--
778
Fairouz Kamareddine
.
Capsule Reviews
779
--
787
Simon H. Lavington
.
Alan Turing and his Contemporaries: Building the World's First Computers
788
--
798
P. Whittle
.
A Natural Channel Coding for the Finite and Infinite Time Axes
799
--
802
Peter J. Denning
.
Reflections on a Symposium on Computation
803
--
804
Peter J. Denning
,
Peter Wegner
.
Introduction to What is Computation
805
--
810
Peter J. Denning
.
Opening Statement: What is Computation?
811
--
813
Peter Wegner
.
The Evolution of Computation
814
--
816
John S. Conery
.
Computation is Symbol Manipulation
817
--
819
Dennis J. Frailey
.
Computation is Process
820
--
824
Paul S. Rosenbloom
.
Computing and Computation
825
--
0
Ruzena Bajcsy
.
Computation and Information
826
--
829
Dave Bacon
.
Computation and Fundamental Physics
830
--
831
Lance Fortnow
.
The Enduring Legacy of the Turing Machine
832
--
835
Alfred V. Aho
.
Computation and Computational Thinking
836
--
837
Joseph F. Traub
.
What is the Right Computational Model for Continuous Scientific Problems?
838
--
847
Jeffrey P. Buzen
.
Computation, Uncertainty and Risk
848
--
851
Erol Gelenbe
.
Natural Computation
852
--
855
Melanie Mitchell
.
Biological Computation
856
--
860
Paolo Rocchi
.
What is Information: Beyond the Jungle of Information Theories
861
--
862
Peter A. Freeman
.
Consideration Of The Question "What Is Computation" Considered Harmful
863
--
865
Peter J. Denning
.
Closing Statement: What Have We Said About Computation?
866
--
881
Jane Hillston
,
Mirco Tribastone
,
Stephen Gilmore
.
Stochastic Process Algebras: From Individuals to Populations
882
--
886
Jeremy T. Bradley
,
Nigel Thomas
,
Richard A. Hayden
,
Anton Stefanek
.
Invited Response to Computer Journal Lecture by Prof. Jane Hillston
887
--
896
Jinhai Cai
.
Robust Filtering-Based Thinning Algorithm for Pattern Recognition
897
--
906
Jie Lin
,
Donald A. Adjeroh
.
All-Against-All Circular Pattern Matching
Volume
55
, Issue
6
649
--
650
Fairouz Kamareddine
.
Capsule Reviews
651
--
652
Wojciech Mazurczyk
,
Krzysztof Szczypiorski
.
Toward Effective and Reliable Digital Forensics
653
--
666
Jacques M. Bahi
,
Jean-François Couchot
,
Christophe Guyeux
.
Steganography: A Class of Secure and Robust Algorithms
667
--
685
Gaurav Bhatnagar
,
Q. M. Jonathan Wu
,
Balasubramanian Raman
.
Image and Video Encryption based on Dual Space-Filling Curves
686
--
701
Xiaofeng Wang
,
Nanning Zheng
,
Jianru Xue
,
Zhenli Liu
.
A Novel Image Signature Method for Content Authentication
702
--
716
Hui Tian
,
Hong Jiang
,
Ke Zhou
,
Dan Feng
.
Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography
717
--
727
Chunfang Yang
,
Fenlin Liu
,
Shiguo Lian
,
Xiangyang Luo
,
Daoshun Wang
.
Weighted Stego-Image Steganalysis of Messages Hidden into Each Bit Plane
728
--
739
Ronaldo M. Salles
,
Donato A. Marino Jr.
.
Strategies and Metric for Resilience in Computer Networks
740
--
755
João V. P. Gomes
,
Pedro R. M. Inácio
,
Manuela Pereira
,
Mário M. Freire
,
Paulo P. Monteiro
.
Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic
756
--
768
Chao-Hsien Lee
,
Chung-Ming Huang
,
Chia-Ching Yang
,
Tai-Hsiang Wang
.
Co-SVC-MDC-Based Cooperative Video Streaming Over Vehicular Networks
769
--
775
Antoine Bossard
,
Keiichi Kaneko
.
The Set-to-Set Disjoint-Path Problem in Perfect Hierarchical Hypercubes
Volume
55
, Issue
5
509
--
511
Fairouz Kamareddine
.
Capsule Reviews
512
--
514
Nihal Pekergin
.
Introduction to the Special Issue on Probability Models in Performance Analysis
515
--
521
Peter Whittle
.
Neural Memories and Oscillatory Operation
522
--
533
Azaria Paz
,
Jack W. Carlyle
.
Chaotic Evolution via Generalized Probabilistic Automata (Probabilistic Arrays)
534
--
552
Nguyen Tien Viet
,
François Baccelli
.
A Stochastic Geometry Model for Cognitive Radio Networks
553
--
563
Emmanuel Hyon
,
Alain Jean-Marie
.
Scheduling Services in a Queuing System with Impatience and Setup Costs
564
--
576
Hind Castel-Taleb
,
Idriss Ismael-Aouled
,
Nihal Pekergin
.
Bounding Aggregations for Transient and Stationary Performance Analysis of Subnetworks
577
--
0
Thu-Ha Dao-Thi
,
Jean-Michel Fourneau
,
Minh-Anh Tran
.
Erratum: Multiple Class Symmetric G-networks with Phase Type Service Times
578
--
589
Mehmet Hakan Karaata
,
Ozgur Sinanoglu
,
Bader F. AlBdaiwi
.
An Optimal Inherently Stabilizing 2-Neighborhood Crash Resilient Protocol for Secure and Reliable Routing in Hypercube Networks
590
--
615
Jakub Stárka
,
Martin Svoboda
,
Jan Sochna
,
Jirí Schejbal
,
Irena Mlýnková
,
David Bednárek
.
Analyzer: A Complex System for Data Analysis
616
--
628
Supriya Aggarwal
,
Kavita Khare
.
Design Techniques Targeting Low-Area-Power-Delay Product in Hyperbolic CORDIC Algorithm
629
--
647
Samuel Antao
,
Jean-Claude Bajard
,
Leonel Sousa
.
RNS-Based Elliptic Curve Point Multiplication for Massive Parallel Architectures
Volume
55
, Issue
4
379
--
381
Fairouz Kamareddine
.
Capsule Reviews
382
--
383
Jiankun Hu
,
Yang Xiang
,
Wanlei Zhou
.
Advances in Network and System Security: Editorial Statement
384
--
396
Leonardo B. Oliveira
,
Aman Kansal
,
Conrado Porto Lopes Gouvêa
,
Diego F. Aranha
,
Julio López
,
Bodhi Priyantha
,
Michel Goraczko
,
Feng Zhao
.
Secure-TWS: Authenticating Node to Multi-user Communication in Shared Sensor Networks
397
--
409
Udaya Kiran Tupakula
,
Vijay Varadharajan
.
Dynamic State-Based Security Architecture for Detecting Security Attacks in Virtual Machines
410
--
421
Shui Yu
,
Wanlei Zhou
,
Weijia Jia
,
Jiankun Hu
.
Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics
422
--
437
Xiaoxun Sun
,
Hua Wang
,
Jiuyong Li
,
Yanchun Zhang
.
Satisfying Privacy Requirements Before Data Anonymization
438
--
0
Biming Tian
,
Song Han
,
Sazia Parvin
,
Jiankun Hu
,
Sajal K. Das
.
Erratum: Self-Healing Key Distribution Schemes for Wireless Networks: A Survey
439
--
446
Hung-Yu Chien
.
Improved Anonymous Multi-receiver Identity-Based Encryption
447
--
456
Xiangyang Luo
,
Fenlin Liu
,
Chunfang Yang
,
Shiguo Lian
,
Daoshun Wang
.
On F5 Steganography in Images
457
--
474
Xinyi Huang
,
Yi Mu
,
Willy Susilo
,
Duncan S. Wong
,
Wei Wu
.
Certificateless Signatures: New Schemes and Security Models
475
--
486
Yuh-Min Tseng
,
Tung-Tso Tsai
.
Efficient Revocable ID-Based Encryption with a Public Channel
487
--
496
Li-na Zhu
,
Li Feng
,
Zuochang Zhang
.
Predicting the Propagation Path of Random Worm by Subnet Infection Situation Using Fuzzy Reasoning
497
--
507
Lanfranco Lopriore
.
Encrypted Pointers in Protection System Design
Volume
55
, Issue
3
253
--
255
Fairouz Kamareddine
.
Capsule Reviews
256
--
257
Jason J. Jung
,
Dariusz Król
.
Editorial: Engineering Knowledge and Semantic Systems
258
--
276
Grzegorz Kukla
,
Przemyslaw Kazienko
,
Piotr Bródka
,
Tomasz Filipowski
.
SocLaKE: Social Latent Knowledge Explorator
277
--
292
Zongda Wu
,
Guandong Xu
,
Yanchun Zhang
,
Peter Dolog
,
Chenglang Lu
.
An Improved Contextual Advertising Matching Approach based on Wikipedia Knowledge
293
--
298
Olcay Taner Yildiz
.
Univariate Decision Tree Induction using Maximum Margin Classification
299
--
312
Gerasimos Spanakis
,
Georgios Siolas
,
Andreas Stafylopatis
.
Exploiting Wikipedia Knowledge for Conceptual Hierarchical Clustering of Documents
313
--
324
Mariano Rivera
,
Oscar Dalmau Cedeño
,
Washington Mio
,
Alonso Ramirez-Manzanares
.
Spatial Sampling for Image Segmentation
325
--
336
Hideki Katagiri
,
Ichiro Nishizaki
,
Tomohiro Hayashida
,
Takanori Kadoma
.
Multiobjective Evolutionary Optimization of Training and Topology of Recurrent Neural Networks for Time-Series Prediction
337
--
346
Jason J. Jung
.
Discovering Community of Lingual Practice for Matching Multilingual Tags from Folksonomies
347
--
378
Muhammad Raza
,
Farookh Khadeer Hussain
,
Omar Khadeer Hussain
.
Neural Network-Based Approach for Predicting Trust Values Based on Non-uniform Input in Mobile Applications
Volume
55
, Issue
2
133
--
135
Fairouz Kamareddine
.
Capsule Reviews
136
--
137
Stephen A. Jarvis
.
Editorial Performance Modelling, Benchmarking and Simulation of High-Performance Computing Systems
138
--
153
Simon J. Pennycook
,
Simon D. Hammond
,
Gihan R. Mudalige
,
Steven A. Wright
,
Stephen A. Jarvis
.
On the Acceleration of Wavefront Applications using Distributed Many-Core Architectures
154
--
167
Xingfu Wu
,
Valerie E. Taylor
.
Performance Characteristics of Hybrid MPI/OpenMP Implementations of NAS Parallel Benchmarks SP and BT on Large-Scale Multicore Clusters
168
--
180
Mike B. Giles
,
Gihan R. Mudalige
,
Z. Sharif
,
Graham R. Markall
,
Paul H. J. Kelly
.
Performance Analysis and Optimization of the OP2 Framework on Many-Core Architectures
181
--
191
Ming Yu Hsieh
,
Rolf Riesen
,
Kevin Thompson
,
William Song
,
Arun Rodrigues
.
SST: A Scalable Parallel Framework for Architecture-Level Performance, Power, Area and Thermal Simulation
192
--
205
Simon McIntosh-Smith
,
Terry Wilson
,
Amaurys Ávila Ibarra
,
Jonathan Crisp
,
Richard B. Sessions
.
Benchmarking Energy Efficiency, Power Costs and Carbon Emissions on Heterogeneous Systems
206
--
217
Sandeep Budanur
,
Frank Mueller
,
Todd Gamblin
.
Memory Trace Compression and Replay for SPMD Systems Using Extended PRSDs
218
--
231
Sergio González-Valenzuela
,
Son T. Vuong
,
Victor C. M. Leung
.
Leveraging Service Discovery in MANETs with Mobile Directories
232
--
252
Dong-Heon Jung
,
Soo-Mook Moon
,
Sung-Hwan Bae
.
Evaluation of a Java Ahead-of-Time Compiler for Embedded Systems
Volume
55
, Issue
12
1419
--
0
Fairouz Kamareddine
.
Capsule Reviews
1420
--
1439
Mohamed Adel Serhani
,
Abdelghani Benharref
,
Elarbi Badidi
,
Salah Bouktif
.
Scalable Federated Broker Management for Selection of Web Services
1440
--
1446
Antoine Bossard
,
Keiichi Kaneko
.
Node-to-Set Disjoint-Path Routing in Hierarchical Cubic Networks
1447
--
1466
Oguzhan Erdem
,
Cüneyt F. Bazlamaçci
.
High-performance IP Lookup Engine with Compact Clustered Trie Search
1467
--
1485
Chuan-Gang Liu
,
Chih-Hung Chao
,
Chih-Wen Leou
,
Jung-Shian Li
.
Iterative Key Distribution Based on MAD Neighborhood in Underwater Mobile Sensor Networks
1486
--
1491
Dan Wang
,
Xiaowei Han
,
Hong Yang
,
Binbin Hao
.
On Global Adaptive Synchronization in Weighted Complex Networks
1492
--
1506
Debraj De
,
Wen-Zhan Song
,
ShaoJie Tang
,
Diane J. Cook
.
EAR: An Energy and Activity-Aware Routing Protocol for Wireless Sensor Networks in Smart Environments
1507
--
1524
Fabíola Greve
,
Pierre Sens
,
Luciana Arantes
,
Véronique Simon
.
Eventually Strong Failure Detector with Unknown Membership
1525
--
1537
Ozgur Sinanoglu
.
Fault Model Independent, Maximal Compaction of Test Responses in the Presence of Unknown Response Bits
Volume
55
, Issue
11
1267
--
1269
Fairouz Kamareddine
.
Capsule Reviews
1270
--
1287
Haitao Dan
,
Robert M. Hierons
.
Controllability Problems in MSC-Based Testing
1288
--
1308
Suraj Pandey
,
Rajkumar Buyya
.
Scheduling Workflow Applications Based on Multi-source Parallel Data Retrieval in Distributed Computing Networks
1309
--
1316
Winfried K. Grassmann
.
A Computer Built with Relays and a Mechanical Memory, and ALGOL
1317
--
1330
Tayfun Kucukyilmaz
,
Ata Turk
,
Cevdet Aykanat
.
A Parallel Framework for In-Memory Construction of Term-Partitioned Inverted Indexes
1331
--
1346
Doohwan Oh
,
Won W. Ro
.
Multi-Threading and Suffix Grouping on Massive Multiple Pattern Matching Algorithm
1347
--
1356
Shmuel T. Klein
,
Dana Shapira
.
The String-to-Dictionary Matching Problem
1357
--
1366
Mina Memar
,
Mahmood Deypir
,
Mohammad Hadi Sadreddini
,
Seyyed Mostafa Fakhrahmad
.
An Efficient Frequent Itemset Mining Method over High-speed Data Streams
1367
--
1382
Hyungjung Seo
,
Jaewon Seo
,
Taewhan Kim
.
Algorithms for Combined Inter- and Intra-Task Dynamic Voltage Scaling
1383
--
1397
Jie Ding
,
Jane Hillston
.
Numerically Representing Stochastic Process Algebra Models
1398
--
1418
Matthias Weidlich
,
Remco M. Dijkman
,
Mathias Weske
.
Behaviour Equivalence and Compatibility of Business Process Models with Complex Correspondences
Volume
55
, Issue
10
1147
--
0
Fairouz Kamareddine
.
Capsule Reviews
1148
--
1156
Manoj Thomas
,
Gurpreet Dhillon
.
Interpreting Deep Structures of Information Systems Security
1157
--
1168
Wei Wu
,
Yi Mu
,
Willy Susilo
,
Xinyi Huang
,
Li Xu
.
A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption
1169
--
1179
Yu-Fang Chung
,
Zhen Yu Wu
.
Casting Ballots over Internet Connection Against Bribery and Coercion
1180
--
1191
Chang Xu
,
Zhoujun Li
,
Yi Mu
,
Hua Guo
,
Tao Guo
.
Affiliation-Hiding Authenticated Asymmetric Group Key Agreement
1192
--
1201
Lin Ding
,
Jie Guan
.
Cryptanalysis of Loiss Stream Cipher
1202
--
1215
Jinguang Han
,
Willy Susilo
,
Yi Mu
,
Jun Yan
.
Attribute-Based Oblivious Access Control
1216
--
1231
Derek Pao
,
Xing Wang
.
Multi-Stride String Searching for High-Speed Content Inspection
1232
--
1243
Hyejin Son
,
Tae Yoon Kang
,
Hwangnam Kim
,
Jong-Bae Park
,
Jae Hyung Roh
.
A Fair and Secure Bandwidth Allocation for AMI Mesh Network in Smart Grid
1244
--
1264
Nimalaprakasan Skandhakumar
,
Jason Reid
,
Ed Dawson
,
Robin Drogemuller
,
Farzad Salim
.
An Authorization Framework using Building Information Models
1265
--
0
João V. P. Gomes
,
Pedro R. M. Inácio
,
Manuela Pereira
,
Mário M. Freire
,
Paulo P. Monteiro
.
Corrigendum: Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic
1266
--
0
Paul S. Rosenbloom
.
Erratum: Computing and Computation
Volume
55
, Issue
1
1
--
2
Fairouz Kamareddine
.
Capsule Reviews
3
--
14
Akamine Kazuma
,
Ken Fukuchi
,
Akisato Kimura
,
Shigeru Takagi
.
Fully Automatic Extraction of Salient Objects from Videos in Near Real Time
15
--
20
Daniel Ruijters
,
Philippe Thévenaz
.
GPU Prefilter for Accurate Cubic B-spline Interpolation
21
--
34
Sangpil Lee
,
Won W. Ro
.
Accelerated Network Coding with Dynamic Stream Decomposition on Graphics Processing Unit
35
--
46
Sumeer Goel
,
Yasser Ismail
,
Magdy Bayoumi
.
High-speed Motion Estimation Architecture for Real-time Video Transmission
47
--
61
Ingrid Petric
,
Bojan Cestnik
,
Nada Lavrac
,
Tanja Urbancic
.
Outlier Detection in Cross-Context Link Discovery for Creative Literature Mining
62
--
68
M. Oguzhan Külekci
,
Jeffrey Scott Vitter
,
Bojian Xu
.
k-bit Filtering Based Text Decomposition
69
--
81
Manuel Abellanas
,
António Leslie Bajuelos
,
Inês Matos
.
k-Covered Paths on Sensor Networks
82
--
98
Vid Podpecan
,
Monika Zemenova
,
Nada Lavrac
.
Orange4WS Environment for Service-Oriented Data Mining
99
--
110
Dick Hamlet
.
Science, Mathematics, Computer Science, Software Engineering
111
--
131
Antonio Fariña
,
Gonzalo Navarro
,
José R. Paramá
.
Boosting Text Compression with Word-Based Statistical Encoding