Journal: Comput. J.

Volume 55, Issue 9

1021 -- 1022Fairouz Kamareddine. Capsule Reviews
1023 -- 1029Mark Burgin, Eugene Eberbach. Evolutionary Automata: Expressiveness and Convergence of Evolutionary Computation
1030 -- 1040Yang Wang, Lin Wu, Xiaodi Huang, Xuemin Lin. Human Action Recognition from Video Sequences by Enforcing Tri-view Constraints
1041 -- 1057Iyad F. Jafar, Khalid A. Darabkh, Ghazi M. Al-Sukkar. A Rule-Based Fuzzy Inference System for Adaptive Image Contrast Enhancement
1058 -- 1071Jianping Gou, Zhang Yi, Lan Du, Taisong Xiong. k-Nearest Centroid Neighbor Classifier
1072 -- 1087Alex Pappachen James, Sima Dimitrijev. Nearest Neighbor Classifier Based on Nearest Feature Decisions
1088 -- 1102Zhang Zhang, Jun Cheng, Jun Li 0010, Wei Bian, Dacheng Tao. Segment-Based Features for Time Series Classification
1103 -- 1117Kui Yu, Xindong Wu, Wei Ding 0003, Hao Wang. Exploring Causal Relationships with Streaming Features
1118 -- 1129I.-Ching Hsu. Semantic Tag-based Profile Framework for Social Tagging Systems
1130 -- 1145Paul C. Conilione, Dianhui Wang. Fuzzy Approach for Semantic Face Image Retrieval

Volume 55, Issue 8

907 -- 908Bharat Jayaraman. Special Issue on Security and Performance of Networks and Clouds: Guest Editor's Introduction
909 -- 931Rachit Agarwal 0002, Abhik Banerjee, Vincent Gauthier, Monique Becker, Chai Kiat Yeo, Bu-Sung Lee. Achieving Small-World Properties using Bio-Inspired Techniques in Wireless Networks
932 -- 949Yan Sun, Qiangfeng Jiang, Mukesh Singhal. Ad Hoc and Sensor Networks
950 -- 964Omer H. Abdelrahman, Erol Gelenbe. Packet Delay and Energy Consumption in Non-homogeneous Networks
965 -- 978Hongfang Yu, Vishal Anand, Chunming Qiao. Virtual Infrastructure Design for Surviving Physical Link Failures
979 -- 994Antonio Muñoz, Javier Gonzalez, Antonio Maña. A Performance-Oriented Monitoring System for Security Properties in Cloud Computing Applications
995 -- 1004Timothy Wood, K. K. Ramakrishnan, Prashant J. Shenoy, Jacobus E. van der Merwe. Enterprise-Ready Virtual Cloud Pools: Vision, Opportunities and Challenges
1005 -- 1019Shivsubramani Krishnamoorthy, Preeti Bhargava, Matthew Mah, Ashok K. Agrawala. Representing and Managing the Context of a Situation

Volume 55, Issue 7

777 -- 778Fairouz Kamareddine. Capsule Reviews
779 -- 787Simon H. Lavington. Alan Turing and his Contemporaries: Building the World's First Computers
788 -- 798P. Whittle. A Natural Channel Coding for the Finite and Infinite Time Axes
799 -- 802Peter J. Denning. Reflections on a Symposium on Computation
803 -- 804Peter J. Denning, Peter Wegner. Introduction to What is Computation
805 -- 810Peter J. Denning. Opening Statement: What is Computation?
811 -- 813Peter Wegner. The Evolution of Computation
814 -- 816John S. Conery. Computation is Symbol Manipulation
817 -- 819Dennis J. Frailey. Computation is Process
820 -- 824Paul S. Rosenbloom. Computing and Computation
825 -- 0Ruzena Bajcsy. Computation and Information
826 -- 829Dave Bacon. Computation and Fundamental Physics
830 -- 831Lance Fortnow. The Enduring Legacy of the Turing Machine
832 -- 835Alfred V. Aho. Computation and Computational Thinking
836 -- 837Joseph F. Traub. What is the Right Computational Model for Continuous Scientific Problems?
838 -- 847Jeffrey P. Buzen. Computation, Uncertainty and Risk
848 -- 851Erol Gelenbe. Natural Computation
852 -- 855Melanie Mitchell. Biological Computation
856 -- 860Paolo Rocchi. What is Information: Beyond the Jungle of Information Theories
861 -- 862Peter A. Freeman. Consideration Of The Question "What Is Computation" Considered Harmful
863 -- 865Peter J. Denning. Closing Statement: What Have We Said About Computation?
866 -- 881Jane Hillston, Mirco Tribastone, Stephen Gilmore. Stochastic Process Algebras: From Individuals to Populations
882 -- 886Jeremy T. Bradley, Nigel Thomas, Richard A. Hayden, Anton Stefanek. Invited Response to Computer Journal Lecture by Prof. Jane Hillston
887 -- 896Jinhai Cai. Robust Filtering-Based Thinning Algorithm for Pattern Recognition
897 -- 906Jie Lin, Donald A. Adjeroh. All-Against-All Circular Pattern Matching

Volume 55, Issue 6

649 -- 650Fairouz Kamareddine. Capsule Reviews
651 -- 652Wojciech Mazurczyk, Krzysztof Szczypiorski. Toward Effective and Reliable Digital Forensics
653 -- 666Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux. Steganography: A Class of Secure and Robust Algorithms
667 -- 685Gaurav Bhatnagar, Q. M. Jonathan Wu, Balasubramanian Raman. Image and Video Encryption based on Dual Space-Filling Curves
686 -- 701Xiaofeng Wang, Nanning Zheng, Jianru Xue, Zhenli Liu. A Novel Image Signature Method for Content Authentication
702 -- 716Hui Tian, Hong Jiang, Ke Zhou, Dan Feng. Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography
717 -- 727Chunfang Yang, Fenlin Liu, Shiguo Lian, Xiangyang Luo, Daoshun Wang. Weighted Stego-Image Steganalysis of Messages Hidden into Each Bit Plane
728 -- 739Ronaldo M. Salles, Donato A. Marino Jr.. Strategies and Metric for Resilience in Computer Networks
740 -- 755João V. P. Gomes, Pedro R. M. Inácio, Manuela Pereira, Mário M. Freire, Paulo P. Monteiro. Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic
756 -- 768Chao-Hsien Lee, Chung-Ming Huang, Chia-Ching Yang, Tai-Hsiang Wang. Co-SVC-MDC-Based Cooperative Video Streaming Over Vehicular Networks
769 -- 775Antoine Bossard, Keiichi Kaneko. The Set-to-Set Disjoint-Path Problem in Perfect Hierarchical Hypercubes

Volume 55, Issue 5

509 -- 511Fairouz Kamareddine. Capsule Reviews
512 -- 514Nihal Pekergin. Introduction to the Special Issue on Probability Models in Performance Analysis
515 -- 521Peter Whittle. Neural Memories and Oscillatory Operation
522 -- 533Azaria Paz, Jack W. Carlyle. Chaotic Evolution via Generalized Probabilistic Automata (Probabilistic Arrays)
534 -- 552Nguyen Tien Viet, François Baccelli. A Stochastic Geometry Model for Cognitive Radio Networks
553 -- 563Emmanuel Hyon, Alain Jean-Marie. Scheduling Services in a Queuing System with Impatience and Setup Costs
564 -- 576Hind Castel-Taleb, Idriss Ismael-Aouled, Nihal Pekergin. Bounding Aggregations for Transient and Stationary Performance Analysis of Subnetworks
577 -- 0Thu-Ha Dao-Thi, Jean-Michel Fourneau, Minh-Anh Tran. Erratum: Multiple Class Symmetric G-networks with Phase Type Service Times
578 -- 589Mehmet Hakan Karaata, Ozgur Sinanoglu, Bader F. AlBdaiwi. An Optimal Inherently Stabilizing 2-Neighborhood Crash Resilient Protocol for Secure and Reliable Routing in Hypercube Networks
590 -- 615Jakub Stárka, Martin Svoboda, Jan Sochna, Jirí Schejbal, Irena Mlýnková, David Bednárek. Analyzer: A Complex System for Data Analysis
616 -- 628Supriya Aggarwal, Kavita Khare. Design Techniques Targeting Low-Area-Power-Delay Product in Hyperbolic CORDIC Algorithm
629 -- 647Samuel Antao, Jean-Claude Bajard, Leonel Sousa. RNS-Based Elliptic Curve Point Multiplication for Massive Parallel Architectures

Volume 55, Issue 4

379 -- 381Fairouz Kamareddine. Capsule Reviews
382 -- 383Jiankun Hu, Yang Xiang, Wanlei Zhou. Advances in Network and System Security: Editorial Statement
384 -- 396Leonardo B. Oliveira, Aman Kansal, Conrado Porto Lopes Gouvêa, Diego F. Aranha, Julio López, Bodhi Priyantha, Michel Goraczko, Feng Zhao. Secure-TWS: Authenticating Node to Multi-user Communication in Shared Sensor Networks
397 -- 409Udaya Kiran Tupakula, Vijay Varadharajan. Dynamic State-Based Security Architecture for Detecting Security Attacks in Virtual Machines
410 -- 421Shui Yu, Wanlei Zhou, Weijia Jia, Jiankun Hu. Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics
422 -- 437Xiaoxun Sun, Hua Wang, Jiuyong Li, Yanchun Zhang. Satisfying Privacy Requirements Before Data Anonymization
438 -- 0Biming Tian, Song Han, Sazia Parvin, Jiankun Hu, Sajal K. Das. Erratum: Self-Healing Key Distribution Schemes for Wireless Networks: A Survey
439 -- 446Hung-Yu Chien. Improved Anonymous Multi-receiver Identity-Based Encryption
447 -- 456Xiangyang Luo, Fenlin Liu, Chunfang Yang, Shiguo Lian, Daoshun Wang. On F5 Steganography in Images
457 -- 474Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu. Certificateless Signatures: New Schemes and Security Models
475 -- 486Yuh-Min Tseng, Tung-Tso Tsai. Efficient Revocable ID-Based Encryption with a Public Channel
487 -- 496Li-na Zhu, Li Feng, Zuochang Zhang. Predicting the Propagation Path of Random Worm by Subnet Infection Situation Using Fuzzy Reasoning
497 -- 507Lanfranco Lopriore. Encrypted Pointers in Protection System Design

Volume 55, Issue 3

253 -- 255Fairouz Kamareddine. Capsule Reviews
256 -- 257Jason J. Jung, Dariusz Król. Editorial: Engineering Knowledge and Semantic Systems
258 -- 276Grzegorz Kukla, Przemyslaw Kazienko, Piotr Bródka, Tomasz Filipowski. SocLaKE: Social Latent Knowledge Explorator
277 -- 292Zongda Wu, Guandong Xu, Yanchun Zhang, Peter Dolog, Chenglang Lu. An Improved Contextual Advertising Matching Approach based on Wikipedia Knowledge
293 -- 298Olcay Taner Yildiz. Univariate Decision Tree Induction using Maximum Margin Classification
299 -- 312Gerasimos Spanakis, Georgios Siolas, Andreas Stafylopatis. Exploiting Wikipedia Knowledge for Conceptual Hierarchical Clustering of Documents
313 -- 324Mariano Rivera, Oscar Dalmau Cedeño, Washington Mio, Alonso Ramirez-Manzanares. Spatial Sampling for Image Segmentation
325 -- 336Hideki Katagiri, Ichiro Nishizaki, Tomohiro Hayashida, Takanori Kadoma. Multiobjective Evolutionary Optimization of Training and Topology of Recurrent Neural Networks for Time-Series Prediction
337 -- 346Jason J. Jung. Discovering Community of Lingual Practice for Matching Multilingual Tags from Folksonomies
347 -- 378Muhammad Raza, Farookh Khadeer Hussain, Omar Khadeer Hussain. Neural Network-Based Approach for Predicting Trust Values Based on Non-uniform Input in Mobile Applications

Volume 55, Issue 2

133 -- 135Fairouz Kamareddine. Capsule Reviews
136 -- 137Stephen A. Jarvis. Editorial Performance Modelling, Benchmarking and Simulation of High-Performance Computing Systems
138 -- 153Simon J. Pennycook, Simon D. Hammond, Gihan R. Mudalige, Steven A. Wright, Stephen A. Jarvis. On the Acceleration of Wavefront Applications using Distributed Many-Core Architectures
154 -- 167Xingfu Wu, Valerie E. Taylor. Performance Characteristics of Hybrid MPI/OpenMP Implementations of NAS Parallel Benchmarks SP and BT on Large-Scale Multicore Clusters
168 -- 180Mike B. Giles, Gihan R. Mudalige, Z. Sharif, Graham R. Markall, Paul H. J. Kelly. Performance Analysis and Optimization of the OP2 Framework on Many-Core Architectures
181 -- 191Ming Yu Hsieh, Rolf Riesen, Kevin Thompson, William Song, Arun Rodrigues. SST: A Scalable Parallel Framework for Architecture-Level Performance, Power, Area and Thermal Simulation
192 -- 205Simon McIntosh-Smith, Terry Wilson, Amaurys Ávila Ibarra, Jonathan Crisp, Richard B. Sessions. Benchmarking Energy Efficiency, Power Costs and Carbon Emissions on Heterogeneous Systems
206 -- 217Sandeep Budanur, Frank Mueller, Todd Gamblin. Memory Trace Compression and Replay for SPMD Systems Using Extended PRSDs
218 -- 231Sergio González-Valenzuela, Son T. Vuong, Victor C. M. Leung. Leveraging Service Discovery in MANETs with Mobile Directories
232 -- 252Dong-Heon Jung, Soo-Mook Moon, Sung-Hwan Bae. Evaluation of a Java Ahead-of-Time Compiler for Embedded Systems

Volume 55, Issue 12

1419 -- 0Fairouz Kamareddine. Capsule Reviews
1420 -- 1439Mohamed Adel Serhani, Abdelghani Benharref, Elarbi Badidi, Salah Bouktif. Scalable Federated Broker Management for Selection of Web Services
1440 -- 1446Antoine Bossard, Keiichi Kaneko. Node-to-Set Disjoint-Path Routing in Hierarchical Cubic Networks
1447 -- 1466Oguzhan Erdem, Cüneyt F. Bazlamaçci. High-performance IP Lookup Engine with Compact Clustered Trie Search
1467 -- 1485Chuan-Gang Liu, Chih-Hung Chao, Chih-Wen Leou, Jung-Shian Li. Iterative Key Distribution Based on MAD Neighborhood in Underwater Mobile Sensor Networks
1486 -- 1491Dan Wang, Xiaowei Han, Hong Yang, Binbin Hao. On Global Adaptive Synchronization in Weighted Complex Networks
1492 -- 1506Debraj De, Wen-Zhan Song, ShaoJie Tang, Diane J. Cook. EAR: An Energy and Activity-Aware Routing Protocol for Wireless Sensor Networks in Smart Environments
1507 -- 1524Fabíola Greve, Pierre Sens, Luciana Arantes, Véronique Simon. Eventually Strong Failure Detector with Unknown Membership
1525 -- 1537Ozgur Sinanoglu. Fault Model Independent, Maximal Compaction of Test Responses in the Presence of Unknown Response Bits

Volume 55, Issue 11

1267 -- 1269Fairouz Kamareddine. Capsule Reviews
1270 -- 1287Haitao Dan, Robert M. Hierons. Controllability Problems in MSC-Based Testing
1288 -- 1308Suraj Pandey, Rajkumar Buyya. Scheduling Workflow Applications Based on Multi-source Parallel Data Retrieval in Distributed Computing Networks
1309 -- 1316Winfried K. Grassmann. A Computer Built with Relays and a Mechanical Memory, and ALGOL
1317 -- 1330Tayfun Kucukyilmaz, Ata Turk, Cevdet Aykanat. A Parallel Framework for In-Memory Construction of Term-Partitioned Inverted Indexes
1331 -- 1346Doohwan Oh, Won W. Ro. Multi-Threading and Suffix Grouping on Massive Multiple Pattern Matching Algorithm
1347 -- 1356Shmuel T. Klein, Dana Shapira. The String-to-Dictionary Matching Problem
1357 -- 1366Mina Memar, Mahmood Deypir, Mohammad Hadi Sadreddini, Seyyed Mostafa Fakhrahmad. An Efficient Frequent Itemset Mining Method over High-speed Data Streams
1367 -- 1382Hyungjung Seo, Jaewon Seo, Taewhan Kim. Algorithms for Combined Inter- and Intra-Task Dynamic Voltage Scaling
1383 -- 1397Jie Ding, Jane Hillston. Numerically Representing Stochastic Process Algebra Models
1398 -- 1418Matthias Weidlich, Remco M. Dijkman, Mathias Weske. Behaviour Equivalence and Compatibility of Business Process Models with Complex Correspondences

Volume 55, Issue 10

1147 -- 0Fairouz Kamareddine. Capsule Reviews
1148 -- 1156Manoj Thomas, Gurpreet Dhillon. Interpreting Deep Structures of Information Systems Security
1157 -- 1168Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang, Li Xu. A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption
1169 -- 1179Yu-Fang Chung, Zhen Yu Wu. Casting Ballots over Internet Connection Against Bribery and Coercion
1180 -- 1191Chang Xu, Zhoujun Li, Yi Mu, Hua Guo, Tao Guo. Affiliation-Hiding Authenticated Asymmetric Group Key Agreement
1192 -- 1201Lin Ding, Jie Guan. Cryptanalysis of Loiss Stream Cipher
1202 -- 1215Jinguang Han, Willy Susilo, Yi Mu, Jun Yan. Attribute-Based Oblivious Access Control
1216 -- 1231Derek Pao, Xing Wang. Multi-Stride String Searching for High-Speed Content Inspection
1232 -- 1243Hyejin Son, Tae Yoon Kang, Hwangnam Kim, Jong-Bae Park, Jae Hyung Roh. A Fair and Secure Bandwidth Allocation for AMI Mesh Network in Smart Grid
1244 -- 1264Nimalaprakasan Skandhakumar, Jason Reid, Ed Dawson, Robin Drogemuller, Farzad Salim. An Authorization Framework using Building Information Models
1265 -- 0João V. P. Gomes, Pedro R. M. Inácio, Manuela Pereira, Mário M. Freire, Paulo P. Monteiro. Corrigendum: Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic
1266 -- 0Paul S. Rosenbloom. Erratum: Computing and Computation

Volume 55, Issue 1

1 -- 2Fairouz Kamareddine. Capsule Reviews
3 -- 14Akamine Kazuma, Ken Fukuchi, Akisato Kimura, Shigeru Takagi. Fully Automatic Extraction of Salient Objects from Videos in Near Real Time
15 -- 20Daniel Ruijters, Philippe Thévenaz. GPU Prefilter for Accurate Cubic B-spline Interpolation
21 -- 34Sangpil Lee, Won W. Ro. Accelerated Network Coding with Dynamic Stream Decomposition on Graphics Processing Unit
35 -- 46Sumeer Goel, Yasser Ismail, Magdy Bayoumi. High-speed Motion Estimation Architecture for Real-time Video Transmission
47 -- 61Ingrid Petric, Bojan Cestnik, Nada Lavrac, Tanja Urbancic. Outlier Detection in Cross-Context Link Discovery for Creative Literature Mining
62 -- 68M. Oguzhan Külekci, Jeffrey Scott Vitter, Bojian Xu. k-bit Filtering Based Text Decomposition
69 -- 81Manuel Abellanas, António Leslie Bajuelos, Inês Matos. k-Covered Paths on Sensor Networks
82 -- 98Vid Podpecan, Monika Zemenova, Nada Lavrac. Orange4WS Environment for Service-Oriented Data Mining
99 -- 110Dick Hamlet. Science, Mathematics, Computer Science, Software Engineering
111 -- 131Antonio Fariña, Gonzalo Navarro, José R. Paramá. Boosting Text Compression with Word-Based Statistical Encoding