Journal: Comput. J.

Volume 57, Issue 9

1279 -- 1280Guandong Xu, Aoying Zhou, Nitin Agarwal. Special Issue on Social Computing and its Applications
1281 -- 1295Ming Gao, Cheqing Jin, Weining Qian, Xueqing Gong. Real-time and Personalized Search over a Microblogging System
1296 -- 1317Michal Szczerbak, François Toutain, Ahmed Bouabdallah, Jean-Marie Bonnin. KRAMER: New Social Medium Based on Collaborative Recognition of Important Situations
1318 -- 1330Hongbo Chen, Jungang Xu, Ben He. Automated Essay Scoring by Capturing Relative Writing Quality
1331 -- 1342Jianshan Sun, Jian Ma, Zhiying Liu, Yajun Miao. Leveraging Content and Connections for Scientific Article Recommendation in Social Computing Contexts
1343 -- 1357Zhiang Wu, Jie Cao, Junjie Wu, Youquan Wang, Chunyang Liu. Detecting Genuine Communities from Large-Scale Social Networks: A Pattern-Based Method
1358 -- 1370Longbing Cao. Non-IIDness Learning in Behavioral and Social Data
1371 -- 1382Mostafa Haghir Chehreghani. An Efficient Algorithm for Approximate Betweenness Centrality Computation
1383 -- 1394Abraham Varghese, Kannan Balakrishnan, Reji Rajan Varghese, Joseph S. Paul. Content-Based Image Retrieval of Axial Brain Slices Using a Novel LBP with a Ternary Encoding
1395 -- 1414Huiyu Zhou, Kotaro Hirasawa. Traffic Density Prediction with Time-Related Data Mining using Genetic Network Programming
1415 -- 1430Haoran Xie, Qing Li, Xudong Mao, Xiaodong Li, Yi Cai, Qianru Zheng. Mining Latent User Community for Tag-Based and Content-Based Search in Social Media
1431 -- 1440Qibin Duan, Dirk P. Kroese, Tim J. Brereton, Aaron Spettl, Volker Schmidt. Inverting Laguerre Tessellations

Volume 57, Issue 8

1117 -- 1131Dilek Demirbas, Ismail Akturk, Özcan Özturk, Ugur Güdükbay. Application-Specific Heterogeneous Network-on-Chip Design
1132 -- 1140Arta Babaee, Moez Draief. Distributed Multivalued Consensus
1141 -- 1154Libo Huang, Zhiying Wang, Nong Xiao, Qiang Dou. Efficient Utilization of SIMD Engines for General-Purpose Processors
1155 -- 1166David Poulain, Joanna Tomasik, Marc-Antoine Weisser, Dominique Barth. A Packing Problem Approach to Lightpath Assignment in an Optical Ring
1167 -- 1177Waheed Yasin, Hamidah Ibrahim, Nur Izura Udzir, Nor Asilah Wati Abdul Hamid. An Overview of Media Streams Caching in Peer-to-Peer Systems
1178 -- 1194Yan Cui, Yingxin Wang, Yu Chen, Yuanchun Shi. Mitigating Resource Contention on Multicore Systems via Scheduling
1195 -- 1210Wassim Ramadan, Eugen Dedu, Julien Bourgeois. Oscillation-Free Video Adaptation at Application Layer on Server Side and Experiments Using DCCP
1211 -- 1229Pingshan Liu, Shengzhong Feng, Guimin Huang, Jianping Fan. Bandwidth-Availability-Based Replication Strategy for P2P VoD Systems
1230 -- 1237Ahmed Ouqour, Younes Jabrane, Brahim Ait Es Said, Abdellah Ait Ouahman. PAPR Reduction in OFDM via Active Constellation Extension-Projection Onto Convex Sets Combined with Particle Swarm Optimization
1238 -- 1261Marjan Radi, Behnam Dezfouli, Kamalrulnizam Abu Bakar, Shukor Abd Razak, Malrey Lee. Network Initialization in Low-Power Wireless Networks: A Comprehensive Study
1262 -- 1278Chathuranga Widanapathirana, Jonathan C. Li, Milosh V. Ivanovich, Paul G. Fitzpatrick, Y. Ahmet Sekercioglu. Adaptive Statistical Signatures of Network Soft-Failures in User Devices

Volume 57, Issue 7

953 -- 967Shan Ling, Weidong Chen. Node-to-Set Disjoint Paths in Biswapped Networks
968 -- 979Gloria Ortega López, Francisco Vázquez, Inmaculada García, Ester M. Garzón. FastSpMM: An Efficient Library for Sparse Matrix Matrix Product on GPUs
980 -- 986Sushanta Karmakar, A. Chandrakanth Reddy. An Improved Algorithm for Distributed Trigger Counting in Ring
987 -- 1001Haitao Dan, Robert M. Hierons. The Oracle Problem When Testing from MSCs
1002 -- 1016Anthony Danalis, Piotr Luszczek, Gabriel Marin, Jeffrey S. Vetter, Jack Dongarra. BlackjackBench: Portable Hardware Characterization with Automated Results' Analysis
1017 -- 1032Pablo Llopis, Javier García Blas, Florin Isaila, Jesús Carretero. Survey of Energy-Efficient and Power-Proportional Storage Systems
1033 -- 1045Hui Kong, Xiaoyu Song, Dong Han, Ming Gu, Jiaguang Sun. A New Barrier Certificate for Safety Verification of Hybrid Systems
1046 -- 1091Frank Zeyda, Lalkhumsanga Lalkhumsanga, Ana Cavalcanti, Andy J. Wellings. Circus Models for Safety-Critical Java Programs
1092 -- 1104Jiufeng Zhou, Lixin Han, Yuan Yao, Xiaoqin Zeng, Feng Xu. A Parallel Approach to Link Sign Prediction in Large-Scale Online Social Networks
1105 -- 1116Janardan Misra. A Calculus of Incomplete Fusions

Volume 57, Issue 6

797 -- 798Juan A. Rodriguez-Aguilar. Special Issue on Optimization in Multi-Agent Systems: Guest Editor's Introduction
799 -- 824Jesús Cerquides, Alessandro Farinelli, Pedro Meseguer, Sarvapali D. Ramchurn. A Tutorial on Optimization for Multi-Agent Systems
825 -- 839Sejoon Lim, Daniela Rus. Congestion-Aware Multi-Agent Path Planning: Distributed Algorithm and Applications
840 -- 855Hala Mostafa, Partha Pal, Patrick Hurley. Message Passing for Distributed QoS-Security Tradeoffs
856 -- 874Meritxell Vinyals, Kathryn S. Macarthur, Alessandro Farinelli, Sarvapali D. Ramchurn, Nicholas R. Jennings. A Message-Passing Approach to Decentralized Parallel Machine Scheduling
875 -- 892Archie C. Chapman, David S. Leslie, Alex Rogers, Nicholas R. Jennings. Learning in Unknown Reward Games: Application to Sensor Networks
893 -- 905Jason Tsai, Thanh Hong Nguyen, Nicholas Weller, Milind Tambe. Game-Theoretic Target Selection in Contagion-Based Domains
906 -- 923Christian Bessiere, Ismel Brito, Patricia Gutierrez, Pedro Meseguer. Global Constraints in Distributed Constraint Satisfaction and Optimization
924 -- 938Faisal Iradat, Sergey D. Andreev, Sayeed Ghani, Syed Irfan Nabi, Waseem Arain. Revisiting Assumptions in Backoff Process Modeling and Queueing Analysis of Wireless Local Area Networks (WLANs)
939 -- 951Shih-Chang Huang. 2PS: Direction and Distance Positioning System in Wireless Networks

Volume 57, Issue 5

639 -- 674Joshua Amavi, Béatrice Bouchou, Agata Savary. On Correcting XML Documents with Respect to a Schema
675 -- 692Rekai González-Alberquilla, Fernando Emmanuel Frati, Luis Piñuel, Karin Strauss, Luis Ceze. Data Race Detection with Minimal Hardware Support
693 -- 707Victor Khomenko, Andrey Mokhov. Direct Construction of Complete Merged Processes
708 -- 730Chao Zhu, Qiang Zhu, Calisto Zuzarte. Optimization of Monotonic Linear Progressive Queries Based on Dynamic Materialized Views
731 -- 743Kuei-Hao Chen, Guan-Shieng Huang, Richard Chia-Tung Lee. Bit-Parallel Algorithms for Exact Circular String Matching
744 -- 758Lijun Lun, Xin Chi, Hui Xu. The Relationship between Forward Slicing and Backward Slicing for Software Architecture
759 -- 774Patrick J. Graydon, Iain Bate. Realistic Safety Cases for the Timing of Systems
775 -- 795Rada Chirkova. Combined-Semantics Equivalence and Minimization of Conjunctive Queries

Volume 57, Issue 4

481 -- 493Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan. Server-Aided Signature Verification for Lightweight Devices
494 -- 509Salman Niksefat, Babak Sadeghiyan, Payman Mohassel, Seyed Saeed Sadeghian. ZIDS: A Privacy-Preserving Intrusion Detection System Using Secure Two-Party Computation Protocols
510 -- 536Juan Manuel González Nieto, Mark Manulis, Dongdong Sun. Forward-Secure Hierarchical Predicate Encryption
537 -- 556Monowar H. Bhuyan, Hirak Jyoti Kashyap, Dhruba Kumar Bhattacharyya, Jugal K. Kalita. Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions
557 -- 566Tao Han, Weiming Zhang, Chao Wang, Nenghai Yu, Yue-fei Zhu. Adaptive ±1 Steganography in Extended Noisy Region
567 -- 578Shengke Zeng, Shaoquan Jiang. A New Framework for Conditionally Anonymous Ring Signature
579 -- 591Jinguang Han, Willy Susilo, Yi Mu, Jun Yan. Attribute-Based Data Transfer with Filtering Scheme in Cloud Computing
592 -- 601Limin Shen, Futai Zhang, Yinxia Sun. Efficient Revocable Certificateless Encryption Secure in the Standard Model
602 -- 623Prasanta Gogoi, D. K. Bhattacharyya, Bhogeswar Borah, Jugal K. Kalita. MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method
624 -- 635Faezeh Sadat Babamir, Ali Norouzi. Achieving Key Privacy and Invisibility for Unattended Wireless Sensor Networks in Healthcare
636 -- 638Huaqun Wang. Insecurity of 'Improved Anonymous Multi-Receiver Identity-Based Encryption'

Volume 57, Issue 3

339 -- 346Hyun-Chul Kim, Jaewook Lee, Daewon Lee. Transductive Gaussian Processes with Applications to Object Pose Estimation
347 -- 363Fabrizio Riguzzi. Speeding Up Inference for Probabilistic Logic Programs
364 -- 377Linjia Sun, Xiaohui Liang, Qinping Zhao. Recursive Templates Segmentation and Exemplars Matching for Human Parsing
378 -- 402Beaux Sharifi, David Inouye, Jugal K. Kalita. Summarization of Twitter Microblogs
403 -- 426Rachel Chasin, Daryl Woodward, Jeremy Witmer, Jugal Kalita. Extracting and Displaying Temporal and Geospatial Entities from Articles on Historical Events
427 -- 450John Reeder, Michael Georgiopoulos. Generative Neural Networks for Multi-task Life-Long Learning
451 -- 468Pitipong Chanloha, Jatuporn Chinrungrueng, Wipawee Usaha, Chaodit Aswakul. Cell Transmission Model-Based Multiagent Q-Learning for Network-Scale Signal Control With Transit Priority
469 -- 479Ahmed Kheiri, Ender Özcan. Constructing Constrained-Version of Magic Squares Using Selection Hyper-heuristics

Volume 57, Issue 2

181 -- 182Jongsung Kim, Bo Hong, Naveen Chilamkurti. Advanced Computer Technologies and Applications in Grid and Cloud Computing
183 -- 194Haibin Zhai, Albert K. Wong, Hai Jiang, Yi Sun, Jun Li, Zhongcheng Li. A Node-Link-Based P2P Cache Deployment Algorithm in ISP Networks
195 -- 204Ahmed Sallam, Kenli Li. A Multi-objective Virtual Machine Migration Policy in Cloud Systems
205 -- 216Aun Irtaza, M. Arfan Jaffar, Muhammad Tariq Mahmood. Semantic Image Retrieval in a Grid Computing Environment Using Support Vector Machines
217 -- 224Hong-Chang Lee, Jong-Eun Park, Myung-Joon Lee. C3ware: A Middleware Supporting Collaborative Services over Cloud Storage
225 -- 232Lin Yao, Guowei Wu, Jiankang Ren, Yanwei Zhu, Ying Li. Guaranteeing Fault-Tolerant Requirement Load Balancing Scheme Based on VM Migration
233 -- 240Joon-Sang Park, Seung Jun Baek, Kyogu Lee. A Highly Parallelized Decoder for Random Network Coding leveraging GPGPU
241 -- 254Ayad Ibrahim, Hai Jin, Ali A. Yassin, Deqing Zou, Peng Xu. Towards Efficient Yet Privacy-Preserving Approximate Search in Cloud Computing
255 -- 262Hong-Yi Chang, Hsin-Che Lu, Yu-Huei Huang, Yuan-Wei Lin, Yih-Jou Tzang. Novel Auction Mechanism with Factor Distribution Rule for Cloud Resource Allocation
263 -- 272Yong-Tae Park, Pranesh Sthapit, Jae-Young Pyun. Energy Efficient Data Fragmentation for Ubiquitous Computing
273 -- 280Juan Caubet, Carlos Gañán, Oscar Esparza, Jose L. Muñoz, Jorge Mata-Díaz, Juanjo Alins. Certificate Revocation List Distribution System for the KAD Network
281 -- 290Neeraj Kumar, Naveen Chilamkurti, Sherali Zeadally, Young-Sik Jeong. Achieving Quality of Service (QoS) Using Resource Allocation and Adaptive Scheduling in Cloud Computing with Grid Support
291 -- 301Zhipiao Liu, Shangguang Wang, Qibo Sun, Hua Zou, Fangchun Yang. Cost-Aware Cloud Service Request Scheduling for SaaS Providers
302 -- 307HwaMin Lee, Doosoon Park. A Grid Service-Based Virtual Screening System
308 -- 318Tien Dung Nguyen, An Thuy Nguyen, Man Doan Nguyen, Nguyen Van Mui, Eui-nam Huh. An Improvement of Resource Allocation for Migration Process in Cloud Environment
319 -- 331Daniel Piso Fernandez, Javier D. Bruguera. Obtaining Accurate Error Expressions and Bounds for Floating-Point Multiplicative Algorithms
332 -- 337Antoine Bossard, Keiichi Kaneko. Set-to-Set Disjoint Paths Routing in Hierarchical Cubic Networks

Volume 57, Issue 12

1765 -- 1775Raed T. Al-Zubi, Mohammed Hawa, Ghazi M. Al-Sukkar, Khalid A. Darabkh. Markov-Based Distributed Approach for Mitigating Self-Coexistence Problem in IEEE 802.22 WRANs
1776 -- 1789Hong-Yi Chang, Chih-Chun Lai, Yuan-Wei Lin. A Fast SVC-Based Channel-Recommendation System for an IPTV on a Cloud and P2P Hybrid Platform
1790 -- 1816Sain Saginbekov, Arshad Jhumka. Towards Efficient Stabilizing Code Dissemination in Wireless Sensor Networks
1817 -- 1833Hwangnam Kim, Hwantae Kim, Wonkyun Park, Mungyu Bae. Disabling Misbehavior with Traffic Constraints in WLANs
1834 -- 1851Heejung Yang, Chin-Wan Chung. Efficient Iceberg Query Processing in Sensor Networks
1852 -- 1869Orhan Dagdeviren, Vahid Khalilpour Akram. An Energy-Efficient Distributed Cut Vertex Detection Algorithm for Wireless Sensor Networks
1870 -- 1892Marco Beccuti, Giuliana Franceschinis, Daniele Codetta Raiteri, Serge Haddad. Computing Optimal Repair Strategies by Means of NdRFT Modeling and Analysis
1893 -- 1911Prem Nath, Chiranjeev Kumar. Mobility Management Scheme for Fixed Mobility Pattern Mobile Users in IPv4 Networks
1912 -- 1924V. S. Felix Enigo, V. Ramachandran. Enhancing the Scalability of Non-Spatial Concurrent Queries in Wireless Sensor Networks

Volume 57, Issue 11

1591 -- 1615Joaquim Gabarró, Maria J. Serna, Alan Stewart. Analysing Web-Orchestrations Under Stress Using Uncertainty Profiles
1616 -- 1623Tiziana Calamoneri, Antonio Frangioni, Blerina Sinaimeri. Pairwise Compatibility Graphs of Caterpillars
1624 -- 1638Daniel Lemire, Owen Kaser. Strongly Universal String Hashing is Fast
1639 -- 1648Chia-Lin Lee, Tzong-Jye Liu. A Self-Stabilizing Distance-2 Edge Coloring Algorithm
1649 -- 1667Billur Barshan, Murat Cihan Yüksek. Recognizing Daily and Sports Activities in Two Open Source Machine Learning Environments Using Body-Worn Sensor Units
1668 -- 1673Antonio Leslie Bajuelos, Sergey Bereg, Mafalda Martins. Guarding Orthogonal Galleries with Rectangular Rooms
1674 -- 1692Rui Zhou 0001, Chengfei Liu, Jianxin Li, Junhu Wang, Jeffrey Xu Yu. Evaluating Irredundant Maximal Contained Rewritings for XPath Queries on Views
1693 -- 1710Peter G. Harrison, Andrea Marin. Product-Forms in Multi-Way Synchronizations
1711 -- 1722Sheau-Ru Tong, Yuan-Tse Yu. Adaptation of Near-Perfect Packet-Level FEC Interleaving in Mobile Media Streaming
1723 -- 1740Qingting Wei, Jihong Guan, Shuigeng Zhou, Xin Wang. A New and Effective Approach to GML Documents Compression
1741 -- 1755David Novak, Pavel Zezula. Performance Study of Independent Anchor Spaces for Similarity Searching
1756 -- 1764Xu Yang, Deyuan Guo, Hu He, Haijing Tang, Yanjun Zhang. An Implementation of Message-Passing Interface over VxWorks for Real-Time Embedded Multi-Core Systems

Volume 57, Issue 10

1441 -- 1459Chin-Chen Chang, Ting-Fang Cheng. A Secure Diverse Ticket-Sale System in a Distributed Cloud Environment
1460 -- 1471Lourdes López-García, Luis J. Dominguez Perez, Francisco Rodríguez-Henríquez. A Pairing-Based Blind Signature E-Voting Scheme
1472 -- 1483Hui Cui, Yi Mu, Man Ho Au. Signcryption Secure Against Linear Related-Key Attacks
1484 -- 1512Duygu Karaoglan, Albert Levi. A Survey on the Development of Security Mechanisms for Body Area Networks
1513 -- 1536Long Ngo, Colin Boyd, Juan Manuel González Nieto. Automated Proofs for Computational Indistinguishability
1537 -- 1556Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao. CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof System
1557 -- 1569Ren-Junn Hwang, Yu-Kai Hsiao. Anonymous Routing Protocol Based on Weil Pairing for Wireless Mesh Networks
1570 -- 1579Shaoquan Jiang. On Unconditional ϵ-Security of Private Key Encryption
1580 -- 1590Chang Xu, Hua Guo, Zhoujun Li, Yi Mu. Affiliation-Hiding Authenticated Asymmetric Group Key Agreement Based on Short Signature

Volume 57, Issue 1

1 -- 11Reinaldo A. Vallejos C., José M. Martínez V.. A Fast Transformation of Markov Chains and Their Respective Steady-State Probability Distributions
12 -- 35Artem Polyvyanyy, Luciano García-Bañuelos, Dirk Fahland, Mathias Weske. Maximal Structuring of Acyclic Process Models
36 -- 58Juan de Lara, Esther Guerra, Ruth Cobos, Jaime Moreno-Llorena. Extending Deep Meta-Modelling for Practical Model-Driven Engineering
59 -- 72Arnold L. Rosenberg. Region Management by Finite-State Robots
73 -- 92Michel A. Reniers, Rob Schoren, Tim A. C. Willemse. Results on Embeddings Between State-Based and Event-Based Systems
93 -- 99Jinn-Shyong Yang, Jou-Ming Chang. Optimal Independent Spanning Trees on Cartesian Product of Hybrid Graphs
100 -- 114Iván Cores, Gabriel Rodríguez, Patricia González, María J. Martín. Failure Avoidance in MPI Applications Using an Application-Level Approach
115 -- 128Yongjian Li, Naiju Zeng, William N. N. Hung, Xiaoyu Song. Combining Symmetry Reduction with Generalized Symbolic Trajectory Evaluation
129 -- 137K. Subramani, James Worthington. On Certifying Instances of Zero-Clairvoyant Scheduling
138 -- 153Alev Mutlu, Pinar Senkul. Improving Hit Ratio of ILP-based Concept Discovery System with Memoization
154 -- 164Kewen Liao, Hong Shen. LP-Based Approximation Algorithms for Reliable Resource Allocation
165 -- 179Oana Agrigoroaiei, Gabriel Ciobanu. Rewriting Systems Over Indexed Multisets