Journal: Comput. J.

Volume 56, Issue 9

1043 -- 1062Douglas Mota Dias, Marco Aurélio Cavalcanti Pacheco. Quantum-Inspired Linear Genetic Programming as a Knowledge Management System
1063 -- 1082Jianping Gou, Zhang Yi. Locality-Based Discriminant Neighborhood Embedding
1083 -- 1101Jamshaid Ashraf, Omar Khadeer Hussain, Farookh Khadeer Hussain. A Framework for Measuring Ontology Usage on the Web
1102 -- 1112Fasheng Wang, Mingyu Lu. Efficient Visual Tracking via Hamiltonian Monte Carlo Markov Chain
1113 -- 1135Eakasit Pacharawongsakda, Thanaruk Theeramunkong. Multi-Label Classification Using Dependent and Independent Dual Space Reduction
1136 -- 1150Erwan Le Martelot, Chris Hankin. Fast Multi-Scale Detection of Relevant Communities in Large-Scale Networks

Volume 56, Issue 8

923 -- 925Min Chen, Victor C. M. Leung. Green Mobile Networking and Communications
926 -- 937Wei Gong, Kebin Liu, Xiaoxu Li, Xin Miao, Tong Zhu. Quality of Interaction for Sensor Network Energy-Efficient Management
938 -- 946Daqiang Zhang, Zhijun Yang, Vaskar Raychoudhury, Zhe Chen, Jaime Lloret. Ad hoc Networks
947 -- 956Jiafu Wan, Hehua Yan, Di Li, Keliang Zhou, Lu Zeng. Cyber-Physical Systems for Optimal Energy Management Scheme of Autonomous Electric Vehicle
957 -- 967Kai Lin, Xiaofei Wang, Limei Peng, Xuan Zhu. K-Cover Problem in Hybrid Sensor Networks
968 -- 976Jiaojiao Liu, Yige Wang, Gang Wei. Distributed Topology Control Based on Coalition Formation Game in Wireless Networks
977 -- 990Yichao Jin, Yonggang Wen, Qinghua Chen, Zuqing Zhu. An Empirical Investigation of the Impact of Server Virtualization on Energy Efficiency for Green Data Center
991 -- 1000Xiaofei Liao, Hai Jin, Jia Yu, Dingding Li. A Performance Optimization Mechanism for SSD in Virtualized Environment
1001 -- 1009Lei Lei, Jing Zhao, Zhangdui Zhong, Kan Zheng. Flow-Level Analysis of Energy Efficiency Performance for Device-to-Device Communications in OFDM Cellular Networks
1010 -- 1019Jing Zhang, Xi Yang, Qi Yao, Xiaohu Ge, Minho Jo, Guoqiang Mao. Cooperative Energy Efficiency Modeling and Performance Analysis in Co-Channel Interference Cellular Networks
1020 -- 1033Wei-Ting Cho, Ying-Xun Lai, Chin-Feng Lai, Yueh-Min Huang. Appliance-Aware Activity Recognition Mechanism for IoT Energy Management System
1034 -- 1042Yi Sun, Yang Guo, Yuming Ge, Shan Lu, Jihua Zhou, Eryk Dutkiewicz. Ad Hoc Networks

Volume 56, Issue 7

793 -- 818José Raúl Romero, Juan Ignacio Jaen, Antonio Vallecillo. A Tool for the Model-Based Specification of Open Distributed Systems
819 -- 826Manuel Abellanas, José Miguel Díaz-Báñez, Pablo Pérez-Lantero, Inmaculada Ventura. Locating a Communication Path in a Competitive Scenario
827 -- 842Sinisa Ilic, Petar C. Spalevic. Using Wavelet Packets for Selectivity Estimation
843 -- 851Montserrat Bóo, Margarita Amor, Raquel Concheiro, Michael C. Doggett. Efficient Adaptive and Dynamic Mesh Refinement Based on a Non-recursive Strategy
852 -- 870Oguzcan Dobrucali, Billur Barshan. Novel Compression Algorithm Based on Sparse Sampling of 3-D Laser Range Scans
871 -- 881Eddie Cheng, Ke Qiu, Zhizhang Shen. A Generating Function Approach to the Edge Surface Area of the Arrangement Graphs
882 -- 886Tiziana Calamoneri, Dario Frascaria, Blerina Sinaimeri. All Graphs with at Most Seven Vertices are Pairwise Compatibility Graphs
887 -- 900Evmorfia N. Argyriou, Michael A. Bekos, Antonios Symvonis. Maximizing the Total Resolution of Graphs
901 -- 922Sajjad Mahmood, Richard Lai. RE-UML: A Component-Based System Requirements Analysis Language

Volume 56, Issue 6

671 -- 673John Lloyd. Special Issue on Dependable Software Systems: Associate Editor's Introduction
674 -- 692Matthew Leeke, Arshad Jhumka, Sarabjot Singh Anand. Towards the Design of Efficient Error Detection Mechanisms for Transient Data Errors
693 -- 715Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo. BFT-TO: Intrusion Tolerance with Less Replicas
716 -- 740Wenbing Zhao, P. M. Melliar-Smith, Louise E. Moser. Low Latency Fault Tolerance System
741 -- 755Ian J. Hayes, Alan Burns, Brijesh Dongol, Cliff B. Jones. Comparing Degrees of Non-Determinism in Expression Evaluation
756 -- 770Ra'ed Al-Dujaily, Terrence S. T. Mak, Kai-Pui Lam, Fei Xia, Alex Yakovlev, Chi-Sang Poon. Dynamic On-Chip Thermal Optimization for Three-Dimensional Networks-On-Chip
771 -- 784Jinpyo Hong, Hwangnam Kim. A Dual Mobility Model with User Profiling: Decoupling User Mobile Patterns from Association Patterns
785 -- 792Xiaoling Zhang, Jianguo Qian. q)-Labeling and Integer Flow on Planar Graphs

Volume 56, Issue 5

527 -- 528Marios C. Angelides. Editorial: MPEG Applications and Services
529 -- 553Luis Herranz, José María Martínez Sanchez. Combining MPEG Tools to Generate Video Summaries Adapted to the Terminal and Network
554 -- 572Razib Iqbal, Shervin Shirmohammadi, Behnoosh Hariri. Modeling and Evaluation of a Metadata-Based Adaptive P2P Video-Streaming System
573 -- 592Martín López Nores, Yolanda Blanco-Fernández, José J. Pazos Arias. Cloud-Based Personalization of New Advertising and e-Commerce Models for Video Consumption
593 -- 616Harry W. Agius, Marios C. Angelides, Damon Daylamani Zad. 2: A Framework and Service for MPEG-7 Content-Modelling Communities
617 -- 627Anish Mittal, Anush K. Moorthy, Alan C. Bovik. Visually Lossless H.264 Compression of Natural Videos
628 -- 645David C. Gibbon, Z. Liu, Andrea Basso, Behzad Shahraray. Automated Content Metadata Extraction Services Based on MPEG Standards
646 -- 663Benjamin J. Ford, Haiping Xu, Iren Valova. A Real-Time Self-Adaptive Classifier for Identifying Suspicious Bidders in Online Auctions
664 -- 670Martin Richards. How BCPL Evolved from CPL

Volume 56, Issue 4

407 -- 421Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou. Efficient Linkable and/or Threshold Ring Signature Without Random Oracles
422 -- 439Geraldine Vache Marconato, Mohamed Kaâniche, Vincent Nicomette. A Vulnerability Life Cycle-Based Security Modeling and Evaluation Approach
440 -- 463Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan. Dynamic Access Control Policies: Specification and Verification
464 -- 477Mingwu Zhang, Bo Yang 0003, Tsuyoshi Takagi. Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate
478 -- 496Lanfranco Lopriore. Protection Structures in Multithreaded Systems
497 -- 507Joonsang Baek, Quang Hieu Vu, Abdulhadi Shoufan, Andrew Jones, Duncan S. Wong. Stateful Public-Key Encryption Schemes Forward-Secure Against State Exposure
508 -- 525Gianluca Dini, Marco Tiloca. HISS: A HIghly Scalable Scheme for Group Rekeying

Volume 56, Issue 3

271 -- 273Einoshin Suzuki. Special Issue on Discovery Science: Guest Editor's Introduction
274 -- 288Tobias Girschick, Ulrich Rückert 0002, Stefan Kramer. Adapted Transfer of Distance Measures for Quantitative Structure-Activity Relationships and Data-Driven Selection of Source Datasets
289 -- 303Laura Langohr, Vid Podpecan, Marko Petek, Igor Mozetic, Kristina Gruden, Nada Lavrac, Hannu Toivonen. Contrasting Subgroup Discovery
304 -- 320Anze Vavpetic, Nada Lavrac. Semantic Subgroup Discovery Systems and Workflows in the SDM-Toolkit
321 -- 335Miha Grcar, Nejc Trdin, Nada Lavrac. A Methodology for Mining Document-Enriched Heterogeneous Information Networks
336 -- 354Dongsheng Duan, Yuhua Li, Ruixuan Li, Zhengding Lu, Aiming Wen. MEI: Mutual Enhanced Infinite Community-Topic Model for Analyzing Text-Augmented Social Networks
355 -- 364Hiromichi Nagao, Tomoyuki Higuchi, Satoshi Miura, Daisuke Inazu. Time-Series Modeling of Tide Gauge Records for Monitoring of the Crustal Activities Related to Oceanic Trench Earthquakes Around Japan
365 -- 377Nina Gierasimczuk, Dick De Jongh. On the Complexity of Conclusive Update
378 -- 392Jiuyong Li, Jixue Liu, Hannu Toivonen, Jianming Yong. Effective Pruning for the Discovery of Conditional Functional Dependencies
393 -- 406S. R. Kannan, S. Ramathilagam, R. Devi, Yueh-Min Huang. c-Means Algorithms for Effective Data Clustering Problems

Volume 56, Issue 2

139 -- 140Irfan Awan. Editorial Performance Engineering of Communication Systems and Applications
141 -- 155Steven A. Wright, Simon D. Hammond, Simon J. Pennycook, R. F. Bird, J. A. Herdman, I. Miller, A. Vadgama, Abhir H. Bhalerao, Stephen A. Jarvis. Parallel File System Analysis Through Application I/O Tracing
156 -- 174O. F. J. Perks, D. A. Beckingsale, Simon D. Hammond, I. Miller, J. A. Herdman, A. Vadgama, Abhir H. Bhalerao, Ligang He, Stephen A. Jarvis. Towards Automated Memory Model Generation Via Event Tracing
175 -- 183Malik Jahan Khan, Mian Muhammad Awais, Shafay Shamail. A Randomized Partitioning Approach for CBR-Based Autonomic Systems to Improve Retrieval Performance
184 -- 197Constandinos X. Mavromoustakis, Helen D. Karatza. Performance Evaluation of Opportunistic Resource-Sharing Scheme Using Socially Oriented Outsourcing in Wireless Devices
198 -- 213Ramon Bertran, Marc González, Xavier Martorell, Nacho Navarro, Eduard Ayguadé. Counter-Based Power Modeling Methods: Top-Down vs. Bottom-Up
214 -- 228Sabela Ramos, Guillermo L. Taboada, Roberto R. Expósito, Juan Touriño, Ramon Doallo. Design of Scalable Java Communication Middleware for Multi-Core Systems
229 -- 238Yi Xie, J. Hu, S. Tang, X. Huang. A Forward-Backward Algorithm for Nested Hidden semi-Markov Model and Application to Network Traffic
239 -- 257Pingshan Liu, Guimin Huang, Shengzhong Feng, Jianping Fan. Event-Driven High-Priority First Data Scheduling Scheme for P2P VoD Streaming
258 -- 269Hongbing Fan, Yu-Liang Wu, Ray C. C. Cheung. Design Automation Framework for Reconfigurable Interconnection Networks

Volume 56, Issue 12

1397 -- 1398Jacob Beal, Stefan Dulman, Olivier Michel, Antoine Spicher. Editorial
1399 -- 1416Avgoustinos Filippoupolitis, Gökçe Görbil, Erol Gelenbe. Spatial Computers for Emergency Support
1417 -- 1431Muhammad Jafar Sadeq, Matt Duckham, Michael F. Worboys. Decentralized Detection of Topological Events in Evolving Spatial Regions
1432 -- 1449Alan Both, Matt Duckham, Patrick Laube, Tim Wark, Jeremy Yeoman. Decentralized Monitoring of Moving Objects in a Transportation Network Augmented with Checkpoints
1450 -- 1468David H. Ackley, Daniel C. Cannon, Lance R. Williams. A Movable Architecture for Robust Spatial Computing
1469 -- 1499Qingzhi Liu, Andrei Pruteanu, Stefan Dulman. Gradient-Based Distance Estimation for Spatial Computers
1500 -- 1517Jacob Beal, Kyle Usbeck, Brett Benyo. On the Evaluation of Space-Time Functions
1518 -- 1536David Rincón, Anna Agusti-Torra, Juan Felipe Botero, F. Raspall, David Remondo, Xavier Hesselbach, Michael Till Beck, Hermann de Meer, Florian Niedermeier, Giovanni Giuliani. A Novel Collaboration Paradigm for Reducing Energy Consumption and Carbon Dioxide Emissions in Data Centres

Volume 56, Issue 11

1269 -- 1278Wei Sun, Tao Wen, Quan Guo. Improving the Start-up Performance of the TFRC Protocol
1279 -- 1291Massimo Melucci. Deriving a Quantum Information Retrieval Basis
1292 -- 1304Chwan-Yi Shiah, Yun-Sheng Yen. Compression of Chinese Document Images by Complex Shape Matching
1305 -- 1319Robert M. Hierons. Implementation Relations for Testing Through Asynchronous Channels
1320 -- 1327Mircea Merca. Binary Diagrams for Storing Ascending Compositions
1328 -- 1346Bingyue Peng, Junjie Wu, Hua Yuan, Qingwei Guo, Dacheng Tao. ANEEC: A Quasi-Automatic System for Massive Named Entity Extraction and Categorization
1347 -- 1362Baolei Cheng, Jianxi Fan, Xiaohua Jia, Shukui Zhang, Bangrui Chen. Constructive Algorithm of Independent Spanning Trees on Möbius Cubes
1363 -- 1380Ioannis Dimitriou. Analysis of a Priority Retrial Queue with Dependent Vacation Scheme and Application to Power Saving in Wireless Communication Systems
1381 -- 1387Stephen T. Hedetniemi, David Pokrass Jacobs, K. E. Kennedy. Linear-Time Self-Stabilizing Algorithms for Disjoint Independent Sets
1388 -- 1395Ro-Yu Wu, Jou-Ming Chang, An-Hang Chen, Chun-Liang Liu. t-ary Trees in a Gray-Code Order

Volume 56, Issue 10

1151 -- 1153Young-Sik Jeong, Damien Sauveron, Jong Hyuk Park. Advanced Security Technologies and Services for Future Computing Environments
1154 -- 1166Guangjie Han, Jinfang Jiang, Lei Shu, Mohsen Guizani, Shojiro Nishio. A Two-Step Secure Localization for Wireless Sensor Networks
1167 -- 1175Yao-Hsin Chou, Shuo-Mao Chen, Yu-Ting Lin, Chi-Yuan Chen, Han-Chieh Chao. Using GHZ-State for Multiparty Quantum Secret Sharing Without Code Table
1176 -- 1188Bin Zhang, Jiahai Yang, Jianping Wu, Ziyu Wang. MBST: Detecting Packet-Level Traffic Anomalies by Feature Stability
1189 -- 1197Jong-Hyouk Lee, Thierry Ernst. IPv6 Security Issues in Cooperative Intelligent Transportation Systems
1198 -- 1215Andreu Pere Isern-Deyà, Arnau Vives-Guasch, Macià Mut Puigserver, Magdalena Payeras-Capellà, Jordi Castellà-Roca. A Secure Automatic Fare Collection System for Time-Based or Distance-Based Services with Revocable Anonymity for Users
1216 -- 1227Aikaterini Mitrokotsa, Pedro Peris-Lopez, Christos Dimitrakakis, Serge Vaudenay. On Selecting the Nonce Length in Distance-Bounding Protocols
1228 -- 1248Yinghui Zhang, Xiaofeng Chen 0001, Hui Li. Key-Evolving Hierarchical ID-Based Signcryption
1249 -- 1257Yuanju Gan, Lihua Wang, Licheng Wang, Ping Pan, Yixian Yang. Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie-Hellman Assumption
1258 -- 1267Gerard Draper-Gil, Josep Lluís Ferrer-Gomila, M. Francisca Hinarejos, Jianying Zhou. An Asynchronous Optimistic Protocol for Atomic Multi-Two-Party Contract Signing

Volume 56, Issue 1

1 -- 0Fairouz Kamareddine. Capsule Reviews
2 -- 0Jan A. Bergstra, Jens Blanck, Faron Moller, Stanley S. Wainer. Guest Editorial
3 -- 14Jan A. Bergstra, Inge Bethke, Alban Ponse. Cancellation Meadows: A Generic Basis Theorem and Some Applications
15 -- 33Nick D. James, Jeffery I. Zucker. A Class of Contracting Stream Operators
34 -- 44Maciej Gazda, Wan Fokkink. Turning GSOS Rules into Equations for Linear Time-Branching Time Semantics
45 -- 52Jens Blanck. Interval Domains and Computable Sequences: A Case Study of Domain Reductions
53 -- 69Bernhard Möller. Modal Knowledge and Game Semirings
70 -- 86Zoran Duric, Dragan Gasevic. A Source Code Similarity System for Plagiarism Detection
87 -- 114Estefanía Serral, Pedro Valderas, Vicente Pelechano. Context-Adaptive Coordination of Pervasive Services by Interpreting Models during Runtime†
115 -- 137Thi Nguyen, Zhen He, Yi-Ping Phoebe Chen. eTPR*-tree: Efficient Buffering for Spatiotemporal Indexes Via Shared Execution