Journal: Comput. J.

Volume 58, Issue 9

1859 -- 1860Neil Y. Yen, Uyen Trang Nguyen, Jong Hyuk Park. Mining Social Media for Knowledge Discovery
1861 -- 1875Thomas Steiner, Ruben Verborgh, Joaquim Gabarró, Erik Mannens, Rik Van de Walle. Clustering Media Items Stemming from Multiple Social Networks
1876 -- 1883Weiwei Yuan, Donghai Guan, Sungyoung Lee, Jin Wang. Skeleton Searching Strategy for Recommender Searching Mechanism of Trust-Aware Recommender Systems
1884 -- 1893Yongkoo Han, Kisung Park, Donghai Guan, Sajal Halder, Young-Koo Lee. Topological Similarity-Based Feature Selection for Graph Classification
1894 -- 1908Lihua Zhou, Kevin Lü. Detecting Communities with Different Sizes for Social Network Analysis
1909 -- 1920Wu He, Gongjun Yan. Mining Blogs And Forums To Understand the Use of Social Media in Customer Co-creation
1921 -- 1936Chen Yang, Jian Ma, Thushari Silva, Xiaoyan Liu, Zhongsheng Hua. A Multilevel Information Mining Approach for Expert Recommendation in Online Scientific Communities
1937 -- 1954Lida Ghahremanloo, Wanita Sherchan, James A. Thom. Geotagging Twitter Messages in Crisis Management
1955 -- 1966Seyed Mohammadhadi Daneshmand, Amin Javari, Seyed Ebrahim Abtahi, Mahdi Jalili. A Time-Aware Recommender System Based on Dependency Network of Items
1967 -- 1999Naeem Khalid Janjua, Omar Khadeer Hussain, Farookh Khadeer Hussain, Elizabeth Chang. Philosophical and Logic-Based Argumentation-Driven Reasoning Approaches and their Realization on the WWW: A Survey
2000 -- 2025Roberto Rodríguez-Rodríguez, Fernando Castro, Daniel Chaver, Rekai González-Alberquilla, Luis Piñuel, Francisco Tirado. Write-Aware Replacement Policies for PCM-Based Systems
2026 -- 2043Muhammad Ashad Kabir, Jun Han, Jian Yu, Alan W. Colman. Inferring User Situations from Interaction Events in Social Media
2044 -- 2060Hiren Mewada, Rahul Patel, Suprava Patnaik. A Novel Structure Tensor Modulated Chan-Vese Model for Texture Image Segmentation
2061 -- 2078Yi Liu, Xiongzi Ge, Xiaoxia Huang, David H. C. Du. MOLAR: A Cost-Efficient, High-Performance SSD-Based Hybrid Storage Cache
2079 -- 2091Sadegh Aliakbary, Jafar Habibi, Ali Movaghar. Feature Extraction from Degree Distribution for Comparison and Analysis of Complex Networks
2092 -- 2108Mehmet Ali Abbasoglu, Bugra Gedik, Hakan Ferhatosmanoglu. Aggregate Profile Clustering for Streaming Analytics
2109 -- 2119Yanmin Zhu, Yin Wang, George Forman, Hong Wei. Mining Large-Scale GPS Streams for Connectivity Refinement of Road Maps
2120 -- 2134Lin Wu, Xiaodi Huang, John Shepherd, Yang Wang. Multi-Query Augmentation-Based Web Landmark Photo Retrieval
2135 -- 2171Minaz J. Parmar, Marios C. Angelides. MAC-REALM: A Video Content Feature Extraction and Modelling Framework
2171 -- 2191Alvaro Rubio-Largo, Miguel A. Vega-Rodríguez, David L. González-Álvarez. A Parallel Multiobjective Approach based on Honey Bees for Traffic Grooming in Optical Networks

Volume 58, Issue 8

1687 -- 1688Quan Z. Sheng, Elhadi M. Shakshuki, Jian Yu. Ambient and Context-Aware Services for the Future Web
1689 -- 1700Khalid Elgazzar, Sharief M. A. Oteafy, Walid M. Ibrahim, Hossam S. Hassanein. A Resilient P2P Architecture for Mobile Resource Sharing
1701 -- 1716Zahoor Ali Khan, Shyamala C. Sivakumar, William J. Phillips, Bill Robertson. QPRR: QoS-Aware Peering Routing Protocol for Reliability Sensitive Data in Body Area Network Communication
1717 -- 1731Alireza Nafarieh, Shyamala C. Sivakumar, William Robertson, William J. Phillips. SLA-Based Time-Aware Provisioning Mechanisms in Shared Mesh Protected Optical Networks
1732 -- 1746Heiko Desruelle, Frank Gielen. Context-Driven Progressive Enhancement of Mobile Web Applications: A Multicriteria Decision-Making Approach
1747 -- 1762Yanling Hu, Anfeng Liu. An Efficient Heuristic Subtraction Deployment Strategy to Guarantee Quality of Event Detection for WSNs
1763 -- 1775David Díez Hernández, Jaime García-Reinoso, Iván Vidal. SFP: Statistical Filtering Policy for Caching in Content-Centric Networking
1776 -- 1791Xing Su, Minjie Zhang, Quan Bai. Dynamic Task Allocation for Heterogeneous Agents in Disaster Environments Under Time, Space and Communication Constraints
1792 -- 1810Xiuchao Wu, Kenneth N. Brown, Cormac J. Sreenan. Contact Probing Mechanisms for Opportunistic Sensor Data Collection
1811 -- 1825Ping Xie, Jianzhong Huang, Qiang Cao, Xiao Qin, Changsheng Xie. A New Non-MDS RAID-6 Code to Support Fast Reconstruction and Balanced I/Os
1826 -- 1841Guangjun Qin, Mingfa Zhu, Limin Xiao, Li Ruan. Lessen Interflow Interference Using Virtual Channels Partitioning
1842 -- 1856Jaime García-Reinoso, Iván Vidal, David Díez, Daniel Corujo, Rui L. Aguiar. Analysis and Enhancements to Probabilistic Caching in Content-Centric Networking
1857 -- 0Ahmed Kheiri, Ender Özcan. Corrigendum: Constructing Constrained-Version of Magic Squares Using Selection Hyper-heuristics

Volume 58, Issue 7

1495 -- 1529Viliam Simko, David Hauzar, Petr Hnetynka, Tomás Bures, Frantisek Plasil. Formal Verification of Annotated Textual Use-Cases
1530 -- 1547Achal Kaushik, Deo Prakash Vidyarthi. A Green Energy Model for Resource Allocation in Computational Grid
1548 -- 1565HamidReza Ahmadifar, Ghassem Jaberipur. q±1}
1566 -- 1572Edem Kwedzo Bankas, Kazeem Alagbe Gbolagade. n+2 - 1}
1573 -- 1584Qian Mao, K. Bharanitharan, Chin-Chen Chang. A Proxy User Authentication Protocol Using Source-Based Image Morphing
1585 -- 1597Yi-Wen Zhang, Rui-feng Guo. Low-Power Scheduling Algorithms for Sporadic Task with Shared Resources in Hard Real-Time Systems
1598 -- 1606Chao-Liang Liu, Wang-Jui Tsai, Ting Yi Chang, Chun-Cheng Peng, Peng-Shiang Wong. Meaningful Share Generation for (2, 2)-Multiple Visual Secret Sharing Scheme Without Pixel Expansion
1607 -- 1627Abdelli Abdelkrim. Improving the State Space Computation of the Time Stream Petri Nets Model
1628 -- 1644Yang Wang, Wei Shi. Dataflow-Based Scheduling for Scientific Workflows in HPC with Storage Constraints
1645 -- 1655Murat Yesilyurt, Yildiray Yalman, Ahmet Turan Özcerit. A Robust Watermarking Method for Mpeg-4 Based on Kurtosis
1656 -- 1672Alexandre Petrenko, Adenilso Simão. Generalizing the DS-Methods for Testing Non-Deterministic FSMs
1673 -- 1686Niko Beerenwinkel, Stefano Beretta, Paola Bonizzoni, Riccardo Dondi, Yuri Pirola. Covering Pairs in Directed Acyclic Graphs

Volume 58, Issue 6

1225 -- 1226ZhangBing Zhou, Huansheng Ning, Meikang Qiu, Habib F. Rashvand. Editorial: Green Energy Management and Smart Grid
1227 -- 1242Jianxin Li, Jieyu Zhao, Yi Li, Lei Cui, Bo Li, Lu Liu, John Panneerselvam. iMIG: Toward an Adaptive Live Migration Method for KVM Virtual Machines
1243 -- 1253Kehua Guo, Biao Tian, Jianhua Ma. AMPS: An Adaptive Message Push Strategy for the Energy Efficiency Optimization in Mobile Terminals
1254 -- 1266Liyun Zuo, Shoubin Dong, Chunsheng Zhu, Lei Shu, Guangjie Han. A Cloud Resource Evaluation Model Based on Entropy Optimization and Ant Colony Clustering
1267 -- 1279Jianhui Zhang, Zhi Li, Feng Xia, ShaoJie Tang, Xingfa Shen, Bei Zhao. Cooperative Scheduling for Adaptive Duty Cycling in Asynchronous Sensor Networks
1280 -- 1292Guangjie Han, Xun Li, Jinfang Jiang, Lei Shu, Jaime Lloret. Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks
1293 -- 1305Zhiyong Feng, Bo Lan, Zhen Zhang, Shizhan Chen. A Study of Semantic Web Services Network
1306 -- 1313Xiang Wang, Ying Lu, Yi Zhang, Zexi Zhao, Tongsheng Xia, Limin Xiao. Power Optimization in Logic Synthesis for Mixed Polarity Reed-Muller Logic Circuits
1314 -- 1329Domen Zupancic, Mitja Lustrek, Matjaz Gams. Multi-Agent Architecture for Control of Heating and Cooling in a Residential Space
1330 -- 1343Linghe Kong, Xiao-Yang Liu, Meixia Tao, Min-You Wu, Yu Gu 0001, Long Cheng, Jianwei Niu. Resource-Efficient Data Gathering in Sensor Networks for Environment Reconstruction
1344 -- 1359Jin Liu, Juan Li, Xiaoguang Niu, Xiaohui Cui, Yunchuan Sun. GreenOCR: An Energy-Efficient Optimal Clustering Routing Protocol
1360 -- 1372Yongzhao Zhan, Shan Dai, Qirong Mao, Lu Liu, Wei Sheng. A Video Semantic Analysis Method Based on Kernel Discriminative Sparse Representation and Weighted KNN
1373 -- 1383He Li, Mianxiong Dong, Xiaofei Liao, Hai Jin. Deduplication-Based Energy Efficient Storage System in Cloud Environment
1384 -- 1398Hamed Javidi, Maziar Goudarzi. TABEMS: Tariff-Aware Building Energy Management System for Sustainability through Better Use of Electricity
1399 -- 1415Xiaolan Tang, Juhua Pu, Yang Gao, Yu Xie, Zhang Xiong. GPS-Based Replica Deletion Scheme with Anti-Packet Distribution for Vehicular Networks
1416 -- 1430Antonio Frangioni, Laura Galli, Giovanni Stea. Optimal Joint Path Computation and Rate Allocation for Real-time Traffic
1431 -- 1442Andrew Larkin, David E. Williams, Molly L. Kile, William M. Baird. Developing a Smartphone Software Package for Predicting Atmospheric Pollutant Concentrations at Mobile Locations
1443 -- 1455Nizam Ayyildiz, Ece Güran Schmidt, Hasan Cengiz Güran. S-DIRECT: Scalable and Dynamically Reconfigurable TCAM Architecture for High-Speed IP Lookup
1456 -- 1468Pavel Rajmic, Jiri Hosek, Michal Fusek, Sergey D. Andreev, Július Stecík. Simplified Probabilistic Modelling and Analysis of Enhanced Distributed Coordination Access in IEEE 802.11
1469 -- 1481Sangyeon Kim, Dong-Wan Choi, Chin-Wan Chung. Finding a Friendly Community in Social Networks Considering Bad Relationships
1482 -- 1493Hamid Saadatfar, Hossein Deldari, Mahmoud Naghibzadeh. Improving the Scheduler's Energy Saving Capability by Noting both Job and Resource Characteristics

Volume 58, Issue 5

1041 -- 1060Gabriel Ciobanu, Maciej Koutny. PerTiMo: A Model of Spatial Migration with Safe Access Permissions
1061 -- 1073Jie Lin, Yue Jiang, Don Adjeroh. Circular Pattern Discovery
1074 -- 1084Jia Jie Liu, Yue-Li Wang, Yu-shan Chiu. Constrained Longest Common Subsequences with Run-Length-Encoded Strings
1085 -- 1098Emilio Di Giacomo, Walter Didimo, Luca Grilli, Giuseppe Liotta, Salvatore Agostino Romeo. Heuristics for the Maximum 2-Layer RAC Subgraph Problem
1099 -- 1111Ahmad Sabri, Vincent Vajnovszki. Two Reflected Gray Code-Based Orders on Some Restricted Growth Sequences
1112 -- 1121Chia Shin Ou, Chin Lung Lu, Richard C. T. Lee. A Systematical and Parallel Approach to Solve Problems Involving Special Properties of Bit-Vectors
1122 -- 1139Amy Affleck, Aneesh Krishna, Narasimaha Achuthan. Non-Functional Requirements Framework: A Mathematical Programming Approach
1140 -- 1159Florentin Ipate, Alin Stefanescu, Ionut Dinca. Model Learning and Test Generation Using Cover Automata
1160 -- 1168Antonio Badia, Daniel Lemire. Functional Dependencies with null Markers
1169 -- 1185Petr Procházka, Jan Holub. Compression of a Set of Files with Natural Language Content
1186 -- 1198Joel Fuentes, Pablo Sáez, Gilberto Gutierrez, Isaac D. Scherson. A Method to Find Functional Dependencies Through Refutations and Duality of Hypergraphs
1199 -- 1213Chang-ai Sun, Yimeng Zai, Huai Liu. Evaluating and Comparing Fault-Based Testing Strategies for General Boolean Specifications: A Series of Experiments
1214 -- 1223Behrooz Parhami. Digital Arithmetic in Nature: Continuous-Digit RNS

Volume 58, Issue 4

515 -- 517Zhiyong Zhang. Security, Trust and Risk in Multimedia Social Networks
518 -- 535Constantinos Patsakis, Athanasios Zigomitros, Achilleas Papageorgiou, Agusti Solanas. Privacy and Security for Multimedia Content shared on OSNs: Issues and Countermeasures
536 -- 548Hui Zhu, Cheng Huang, Hui Li. Information Diffusion Model Based on Privacy Setting in Online Social Networking Services
549 -- 571Hong Zhu, Shengli Tian, Kevin Lü. Privacy-Preserving Data Publication with Features of Independent ℓ-Diversity
572 -- 587WeiTao Song, Bin Hu. Approach to Detecting Type-Flaw Attacks Based on Extended Strand Spaces
588 -- 600Bin Yang, Xingming Sun, Xianyi Chen, Jianjun Zhang, Xu Li. Exposing Photographic Splicing by Detecting the Inconsistencies in Shadows
601 -- 626Ayesha Kanwal, Rahat Masood, Muhammad Awais Shibli, Rafia Mumtaz. Taxonomy for Trust Models in Cloud Computing
627 -- 643Qingqi Pei, Dingyu Yan, Lichuan Ma, Zi Li, Yang Liao. A Strong and Weak Ties Feedback-Based Trust Model in Multimedia Social Networks
644 -- 655Zhen Yang, Kaiming Gao, Kefeng Fan, Yingxu Lai. Sensational Headline Identification By Normalized Cross Entropy-Based Metric
656 -- 667Hui Lin, Jia Hu, Jianfeng Ma, Li Xu, Li Yang. CRM: A New Dynamic Cross-Layer Reputation Computation Model in Wireless Networks
668 -- 678Zhiyong Zhang, Kanliang Wang. A Formal Analytic Approach to Credible Potential Path and Mining Algorithms for Multimedia Social Networks
679 -- 687V. Natarajan, Shina Sheen, R. Anitha 0002. Multilevel Analysis to Detect Covert Social Botnet in Multimedia Social Networks
688 -- 699Guowei Wu, Zuosong Liu, Lin Yao, Jing Deng, Jie Wang. A Trust Routing for Multimedia Social Networks
700 -- 708Danmei Niu, Lanlan Rui, Cheng Zhong, Xuesong Qiu. A Composition and Recovery Strategy for Mobile Social Network Service in Disaster
709 -- 723Volkmar Lotz, Francesco Di Cerbo, Michele Bezzi, Samuel Paul Kaluvuri, Antonino Sabetta, Slim Trabelsi. Security Certification for Service-Based Business Ecosystems
724 -- 734Qiang Tang, Hua Ma, Xiaofeng Chen 0001. Extend the Concept of Public Key Encryption with Delegated Search
735 -- 749Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi, Yi Mu. Functional Encryption Resilient to Hard-to-Invert Leakage
750 -- 757Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang. Leakage-Free ID-Based Signature
758 -- 778M. Francisca Hinarejos, Andreu Pere Isern-Deyà, Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà. MC-2D: An Efficient and Scalable Multicoupon Scheme
779 -- 781Ying-Kai Tang, Sherman S. M. Chow, Joseph K. Liu. Comments on 'Efficient Revocable Certificateless Encryption Secure in the Standard Model'
782 -- 791Lanfranco Lopriore. Password Capabilities Revisited
792 -- 807Ke Gu, Weijia Jia, Chunlin Jiang. Efficient Identity-Based Proxy Signature in the Standard Model
808 -- 822Debasish Das, Utpal Sharma, D. K. Bhattacharyya. Detection of Cross-Site Scripting Attack under Multiple Scenarios
823 -- 830Xinyu Fan, Guomin Yang, Yi Mu, Yong Yu. On Indistinguishability in Remote Data Integrity Checking
831 -- 852Alptekin Küpçü. Official Arbitration with Secure Cloud Storage Application
853 -- 866Jiguo Li, Huiyun Teng, Xinyi Huang, Yichen Zhang, Jianying Zhou. A Forward-Secure Certificate-Based Signature Scheme
867 -- 877Yong Yu, Man Ho Au, Yi Mu, Willy Susilo, Huai Wu. Secure Delegation of Signing Power from Factorization
878 -- 891Hai L. Vu, Kenneth K. Khaw, Tsong Yueh Chen. A New Approach for Network Vulnerability Analysis
892 -- 903Stavros N. Shiaeles, Maria Papadaki. FHSD: An Improved IP Spoof Detection Method for Web DDoS Attacks
904 -- 921Huacui Liu, Chenhui Jin. Lower Bounds of Differential and Linear Active S-boxes for 3D-like Structure
922 -- 933Yu-Chi Chen. SPEKS: Secure Server-Designation Public Key Encryption with Keyword Search against Keyword Guessing Attacks
934 -- 943Cheng-Chi Lee, Yan-Ming Lai. Toward A Secure Single Sign-On Mechanism for Distributed Computer Networks
944 -- 960Franco Frattolillo. Watermarking Protocols: Problems, Challenges and a Possible Solution
961 -- 972Abdulah Abdulah Zadeh, Howard M. Heys. Application of Simple Power Analysis to Stream Ciphers Constructed Using Feedback Shift Registers
973 -- 985Haider Salim Hmood, Zhitang Li, Hasan Khalaf Abdulwahid, Yang Zhang. Adaptive Caching Approach to Prevent DNS Cache Poisoning Attack
986 -- 1002Sha Ma, Mingwu Zhang, Qiong Huang, Bo Yang. Public Key Encryption with Delegated Equality Test in a Multi-User Setting
1003 -- 1020Qiang Tang. From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data
1021 -- 1039Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo. An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants

Volume 58, Issue 3

355 -- 0Slim Kallel, Mohamed Jmaiel, Sumitra Reddy. Enabling Technologies: Infrastructure for Collaborative Enterprises
356 -- 367Wassim Derguech, Sami Bhiri, Souleiman Hasan, Edward Curry. Using Formal Concept Analysis for Organizing and Discovering Sensor Capabilities
368 -- 384Zahra Movahedi, Walid Gaaloul, Sami Bhiri, Bruno Defude. Assisting Sensor-Based Application Design and Instantiation Using Activity Recommendation
385 -- 402Afef Jmal Maâlej, Moez Krichen. Study on the Limitations of WS-BPEL Compositions Under Load Conditions
403 -- 415Ines Houidi, Wajdi Louati, Djamal Zeghlache. Exact Multi-Objective Virtual Network Embedding in Cloud Environments
416 -- 431Ryszard Janicki, Mohammad Hadi Soudkhah. On Classification with Pairwise Comparisons, Support Vector Machines and Feature Domain Overlapping
432 -- 447María Arsuaga-Ríos, Miguel A. Vega-Rodríguez. Multiobjective Small-World Optimization for Energy Saving in Grid Environments
448 -- 456Ajay Kumar, Anil Kumar Verma. An Improved Algorithm for the Metamorphosis of Semi-Extended Regular Expressions to Deterministic Finite Automata
457 -- 471Lei Du, Qinbao Song, Lei Zhu, Xiaoyan Zhu. A Selective Detector Ensemble for Concept Drift Detection
472 -- 496Omar Khadeer Hussain, Zia-ur Rahman, Farookh Khadeer Hussain, Jaipal Singh, Naeem Khalid Janjua, Elizabeth Chang. A User-Based Early Warning Service Management Framework in Cloud Computing
497 -- 513Jianxin Li, Chengfei Liu, Rui Zhou 0001, Jeffrey Xu Yu. Query-Driven Frequent Co-Occurring Term Computation over Relational Data Using MapReduce

Volume 58, Issue 2

173 -- 187Omar Alsaleh, Bella Bose, Bechir Hamdaoui. One-to-Many Node-Disjoint Paths Routing in Dense Gaussian Networks
188 -- 203Chung-Ming Huang, Yih-Chung Chen, Shih Yang Lin. Packet Scheduling and Congestion Control Schemes for Multipath Datagram Congestion Control Protocol
204 -- 214Oguzhan Erdem, Aydin Carus, Hoang Le. Value-Coded Trie Structure for High-Performance IPv6 Lookup
215 -- 233Paola Cappanera, Alessandro Lori, Giovanni Stea, Gigliola Vaglini. On the Schedulability of Deadline-Constrained Traffic in TDMA Wireless Mesh Networks
234 -- 245Sami J. Habib, Paulvanna Nayaki Marimuthu, Naser Zaeri. Carbon-aware Enterprise Network through Redesign
246 -- 257Sen Su, Qingjia Huang, Jian Li, Xiang Cheng, Peng Xu, Kai Shuang. Enhanced Energy-Efficient Scheduling for Parallel Tasks Using Partial Optimal Slacking
258 -- 279Shahbaz Akhtar Abid, Mazliza Othman, Nadir Shah, Mazhar Ali, A. R. Khan. 3D-RP: A DHT-Based Routing Protocol for MANETs
280 -- 299Islam Elgedawy. CRESCENT: A Reliable Framework for Durable Composite Web Services Management
300 -- 314Mostafa Rezvani, Mohammad Kazem Akbari, Bahman Javadi. Resource Allocation in Cloud Computing Environments Based on Integer Linear Programming
315 -- 330Chien-Fu Cheng, Hsien-Chun Liao. A Malicious-Resilient Protocol for Consistent Scheduling Problem in the Cloud Computing Environment
331 -- 337Mirka Miller, R. Sundara Rajan, N. Parthiban, Indra Rajasingh. Minimum Linear Arrangement of Incomplete Hypercubes
338 -- 353Shih-Chang Huang, Hong-Yi Chang. A Bidirectional Route Repair Method for Wireless Mobile Ad Hoc Networks

Volume 58, Issue 12

3217 -- 3241Sérgio Esteves, Paulo Ferreira, Luís Veiga. Cycle-sharing Computing Cloud Platforms
3242 -- 3254Yuhao Yi, Zhongzhi Zhang, Yuan Lin, Guanrong Chen. Small-World Topology Can Significantly Improve the Performance of Noisy Consensus in a Complex Network
3255 -- 3270Huajun He, Yang Zhao, Jinfu Wu, Ye Tian. Cost-Aware Capacity Provisioning for Internet Video Streaming CDNs
3271 -- 3278R. Sundara Rajan, Paul D. Manuel, Indra Rajasingh, N. Parthiban, Mirka Miller. A Lower Bound for Dilation of an Embedding
3279 -- 3294Yonggang Che, Chuanfu Xu, Jianbin Fang, Yongxian Wang, Zhenghua Wang. Realistic Performance Characterization of CFD Applications on Intel Many Integrated Core Architecture
3295 -- 3305Wei Zhou, Tao Jing, Yan Huo, Jin Qian, Zhen Li. Double Auction for Joint Channel and Power Allocation in Cognitive Radio Networks
3306 -- 3324Chun-Chieh Huang, Ren-Song Ko. A Study on Maximizing the Parallelism of Macroscopically Derived Routing Algorithms for WSNs

Volume 58, Issue 11

2793 -- 2803Nina Yevtushenko, Khaled El-Fakih, Tiziano Villa, Jie-Hong R. Jiang. Deriving Compositionally Deadlock-Free Components over Synchronous Automata Compositions
2804 -- 2823Ahmet Kara 0001, Halit Oguztüzün, M. Nedim Alpdemir. A Methodology for Resolution Mapping for Cross-Resolution Simulation using Event-B
2824 -- 2840Weiqiang Kong, Leyuan Liu, Takahiro Ando, Hirokazu Yatsu, Kenji Hisazumi, Akira Fukuda. Facilitating Multicore Bounded Model Checking with Stateless Explicit-State Exploration
2841 -- 2851Xiaowang Zhang, Jan Van den Bussche. On the Power of SPARQL in Expressing Navigational Queries
2852 -- 2863Sung-In Jang, Su-Kyung Yoon, Kihyun Park, Gi-Ho Park, Shin-Dug Kim. Data Classification Management with its Interfacing Structure for Hybrid SLC/MLC PRAM Main Memory
2864 -- 2875Shaowei Cai, Chuan Luo, Kaile Su. Improving WalkSAT By Effective Tie-Breaking and Efficient Implementation
2876 -- 2891Pablo Muñoz, David F. Barrero, María D. R.-Moreno. A Statistically Rigorous Analysis of 2D Path-Planning Algorithms
2892 -- 2899Gauthier van den Hove. On the Origin of Recursive Procedures
2900 -- 2920Paolo Arcaini, Angelo Gargantini, Elvinia Riccobene. How to Optimize the Use of SAT and SMT Solvers for Test Generation of Boolean Expressions
2921 -- 2927Frank Gurski. Linear Programming Formulations for Computing Graph Layout Parameters
2928 -- 2943Shiyu Yang, Muhammad Aamir Cheema, Xuemin Lin. Impact Set: Computing Influence Using Query Logs
2944 -- 2955Xi Wang, Alejandro Erickson, Jianxi Fan, Xiaohua Jia. Hamiltonian Properties of DCell Networks
2956 -- 2971Giorgos Stoilos, Tassos Venetis, Giorgos Stamou. A Fuzzy Extension to the OWL 2 RL Ontology Language
2972 -- 2981Jinn-Shyong Yang, Sih-Syuan Luo, Jou-Ming Chang. Pruning Longer Branches of Independent Spanning Trees on Folded Hyper-Stars
2982 -- 2999Thomas Roelleke, Andreas Kaltenbrunner, Ricardo A. Baeza-Yates. Harmony Assumptions in Information Retrieval and Social Networks
3000 -- 3034A. S. M. Kayes, Jun Han, Alan Colman. OntCAAC: An Ontology-Based Approach to Context-Aware Access Control for Software Services
3035 -- 3056Hao Zheng, Xiaoshe Dong, Zhengdong Zhu, Baoke Chen, Yizhi Zhang, Xingjun Zhang. Research on Algorithms to Capture Drivers' Write Operations
3057 -- 3073Jorge F. Fabeiro, Diego Andrade, Basilio B. Fraguela, Ramón Doallo. Automatic Generation of Optimized OpenCL Codes Using OCLoptimizer
3074 -- 3088Shenwei Huang, Matthew Johnson 0002, Daniël Paulusma. t)-Free Graphs
3089 -- 3113Robert M. Hierons, Uraz Cengiz Türker. Incomplete Distinguishing Sequences for Finite State Machines
3114 -- 3125Yinglei Song, Chunmei Liu, Yongzhong Li. A New Parameterized Algorithm for Predicting the Secondary Structure of RNA Sequences Including Pseudoknots
3126 -- 3140Emilio Di Giacomo, Walter Didimo, Giuseppe Liotta, Henk Meijer, Stephen K. Wismath. Planar and Quasi-Planar Simultaneous Geometric Embedding
3141 -- 3170Outi Sievi-Korte, Kai Koskimies, Erkki Mäkinen. Techniques for Genetic Software Architecture Design
3171 -- 3186László Lengyel, Tamás Mészáros, Márk Asztalos, Péter Boros, Attila Máté, Gábor Madács, Péter Hudák, Kristóf Kovács, András Tresch, Hassan Charaf. Quality Assured Model-Driven Requirements Engineering and Software Development
3187 -- 3201Kun Ma, Fusen Dong, Bo Yang. Large-Scale Schema-Free Data Deduplication Approach with Adaptive Sliding Window Using MapReduce
3202 -- 3216Amir Vahid Dastjerdi, Rajkumar Buyya. An Autonomous Time-Dependent SLA Negotiation Strategy for Cloud Computing

Volume 58, Issue 10

2193 -- 2194David G. Rosado, Nadira Lammari, Jan Jürjens. Special Issue on Secure Information Systems Engineering
2195 -- 2212Maryam Sepehri, Stelvio Cimato, Ernesto Damiani. Privacy-Preserving Query Processing by Multi-Party Computation
2213 -- 2224Evangelia Kavakli, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis. Privacy as an Integral Part of the Implementation of Cloud Solutions
2225 -- 2232D. Marudhadevi, V. Neelaya Dhatchayani, V. S. Shankar Sriram. A Trust Evaluation Model for Cloud Computing Using Service Level Agreement
2233 -- 2254Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina. ISGcloud: a Security Governance Framework for Cloud Computing
2255 -- 2279Thomas Quirchmayr, Mark Strembeck. A Discussion of Communication Schemes for Process Execution Histories to Enforce Entailment Constraints in Process-Driven SOAs
2280 -- 2296Katarzyna Mazur, Bogdan Ksiezopolski, Zbigniew Kotulski. The Robust Measurement Method for Security Metrics Generation
2297 -- 2312Takeshi Takahashi, Youki Kadobayashi. Reference Ontology for Cybersecurity Operational Information
2313 -- 2327Ricardo J. Rodríguez, José Merseguer, Simona Bernardi. Modelling Security of Critical Infrastructures: A Survivability Assessment
2328 -- 2350Jose Fran. Ruiz, Antonio Maña, Carsten Rudolph. An Integrated Security and Systems Engineering Process and Modelling Framework
2351 -- 2367Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo. Modernizing Secure OLAP Applications with a Model-Driven Approach
2368 -- 2387Kazim Yumbul, Erkay Savas. Enhancing an Embedded Processor Core for Efficient and Isolated Execution of Cryptographic Algorithms
2388 -- 2403Udaya Kiran Tupakula, Vijay Varadharajan. Trust Enhanced Security for Tenant Transactions in the Cloud Environment
2404 -- 2425Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Harry Bartlett. CHURNs: Freshness Assurance for Humans
2426 -- 2442Chunfeng Lian, Liaojun Pang, Jimin Liang. Generalized Random Grid-Based Visual Secret Sharing for General Access Structures
2443 -- 2460Xing Wang, Nga Lam Or, Ziyan Lu, Derek Pao. Hardware Accelerator to Detect Multi-Segment Virus Patterns
2461 -- 2475Chanying Huang, Hwaseong Lee, Hyoseung Kim, Dong-Hoon Lee. mvSERS: A Secure Emergency Response Solution for Mobile Healthcare in Vehicular Environments
2476 -- 2491Grazielle Vernize, André Luiz Pires Guedes, Luiz Carlos Pessoa Albini. Malicious Nodes Identification for Complex Network Based on Local Views
2492 -- 2506Jianghong Wei, Wenfen Liu, Xuexian Hu. Forward-Secure Threshold Attribute-Based Signature Scheme
2507 -- 2508Debiao He, Mingwu Zhang, Baowen Xu. Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model
2509 -- 2519Chang Xu, Liehuang Zhu, Zhoujun Li, Feng Wang. One-Round Affiliation-Hiding Authenticated Asymmetric Group Key Agreement with Semi-trusted Group Authority
2520 -- 2536Shifeng Sun, Dawu Gu, Zhengan Huang. Fully Secure Wicked Identity-Based Encryption Against Key Leakage Attacks
2537 -- 2556Zoran Djuric, Dragan Gasevic. FEIPS: A Secure Fair-Exchange Payment System for Internet Transactions
2557 -- 2566Lanfranco Lopriore. Password Management: Distribution, Review and Revocation
2567 -- 2582Amir Jalaly Bidgoly, Behrouz Tork Ladani. Modelling and Quantitative Verification of Reputation Systems Against Malicious Attackers
2583 -- 2594Wien Hong, Gwoboa Horng, Chih-Wei Shiu, Tung-Shou Chen, Yu-Chi Chen. Reversible Steganographic Method Using Complexity Control and Human Visual System
2595 -- 2607Dong Lai Fu, Xinguang Peng, Yuli Yang. Trusted Validation for Geolocation of Cloud Data
2608 -- 2621Shahid Alam, Issa Traoré, Ibrahim Sogukpinar. Annotated Control Flow Graph for Metamorphic Malware Detection
2622 -- 2635Md. Saiful Islam, Naif Alajlan. Model-based Alignment of Heartbeat Morphology for Enhancing Human Recognition Capability
2636 -- 2648SK Hafizul Islam, Fagen Li. Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings
2649 -- 2664Pericle Perazzo, Pavel Skvortsov, Gianluca Dini. On Designing Resilient Location-Privacy Obfuscators
2665 -- 2676Yang Wang, Willy Susilo, Man Ho Au. Revisiting Security Against the Arbitrator in Optimistic Fair Exchange
2677 -- 2685Lin Ding, Chenhui Jin, Jie Guan, ShaoWu Zhang, Ting Cui, Dong Han, Wei Zhao. Cryptanalysis of WG Family of Stream Ciphers
2686 -- 2697Kaibin Huang, Raylin Tso, Yu-Chi Chen, Sk. Md. Mizanur Rahman, Ahmad Almogren, Atif Alamri. PKE-AET: Public Key Encryption with Authorized Equality Test
2698 -- 2715Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Yusuke Sakai. Revocable Group Signature with Constant-Size Revocation List
2716 -- 2737Erkay Savas, Cemal Yilmaz. A Generic Method for the Analysis of a Class of Cache Attacks: A Case Study for AES
2738 -- 2746Mayana Pereira, Rafael Dowsley, Anderson C. A. Nascimento, Goichiro Hanaoka. Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions
2747 -- 2757Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen. Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited
2758 -- 2777André Ricardo Abed Grégio, Vitor Monte Afonso, Dario Simões Fernandes Filho, Paulo Lício de Geus, Mario Jino. Toward a Taxonomy of Malware Behaviors
2778 -- 2792Kaitai Liang, Willy Susilo, Joseph K. Liu, Duncan S. Wong. Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption

Volume 58, Issue 1

1 -- 22Nikolay Grozev, Rajkumar Buyya. Performance Modelling and Simulation of Three-Tier Applications in Cloud and Multi-Cloud Environments
23 -- 39Marco Beccuti, Chiara Fornari, Giuliana Franceschinis, Sami M. Halawani, Omar M. Ba-Rukab, Ab Rahman Ahmad, Gianfranco Balbo. From Symmetric Nets to Differential Equations exploiting Model Symmetries
40 -- 56Shenlu Wang, Muhammad Aamir Cheema, Xuemin Lin. k-Nearest Neighbors in Spatial Networks
57 -- 74Gianfranco Balbo, Maria Grazia Vigliotti. On the Analysis of a M/M/1 Queue with Bulk Services
75 -- 94Zhe Chen. Control Systems on Automata and Grammars
95 -- 109James Pallister, Simon J. Hollis, Jeremy Bennett. Identifying Compiler Options to Minimize Energy Consumption for Embedded Platforms
110 -- 125Yang Wang, Hua Li, Menglan Hu. Reusing Garbage Data for Efficient Workflow Computation
126 -- 133James G. Dowty. SMML Estimators for 1-Dimensional Continuous Data
134 -- 156Michal Klempa, Michal Kozák, Mario Mikula, Robert Smetana, Jakub Stárka, Michal Svirec, Matej Vitásek, Martin Necaský, Irena Holubová. jInfer: A Framework for XML Schema Inference
157 -- 159Albert Corominas, Alberto García-Villoria, Rafael Pastor. Technical Note: Relating to the Parameter Values Given by Nelder and Mead in their Algorithm
160 -- 171António Leslie Bajuelos, Santiago Canales, Gregorio Hernández, Mafalda Martins, Inês Matos. Some Results on Open-Edge and Open Mobile Guarding of Polygons and Triangulations