Journal: Comput. J.

Volume 59, Issue 9

1275 -- 1281Arambam Neelima, Kh. Manglem Singh. Perceptual Hash Function based on Scale-Invariant Feature Transform and Singular Value Decomposition
1282 -- 1288Wei Ni. Minimized Error Propagation Location Method Based on Error Estimation
1289 -- 1302D. Thenmozhi, Chandrabose Aravindan. Paraphrase Identification by Using Clause-Based Similarity Features and Machine Translation Metrics
1303 -- 1329Alok Kumar Singh Kushwaha, Rajeev Srivastava. Maritime Object Segmentation Using Dynamic Background Modeling and Shadow Suppression
1330 -- 1344Willian Valmorbida, Jorge Luis Victória Barbosa, Débora Nice Ferrari Barbosa, Sandro José Rigo. U-Library: An Intelligent Model for Ubiquitous Library Support
1345 -- 1362Billur Barshan, Aras Yurtman. Investigating Inter-Subject and Inter-Activity Variations in Activity Recognition Using Wearable Motion Sensors
1363 -- 1382Konstantinos Tsakalozos, Spiros Evangelatos, Fotis Psallidas, Marcos R. Vieira, Vassilis J. Tsotras, Alex Delis. DiVA: Using Application-Specific Policies to 'Dive' into Vector Approximations
1383 -- 1391Sunita Garhwal, Ram Jiwari. Parallel Fuzzy Regular Expression and its Conversion to Epsilon-Free Fuzzy Automaton
1392 -- 1407Ohoud Nafea, Sanaa Ghouzali, Wadood Abdul, Qazi Emad-ul-Haq. Hybrid Multi-Biometric Template Protection Using Watermarking
1408 -- 1414Yair Neuman, Yochai Cohen. A Novel Methodology for Automatically Measuring Psychological Dimensions in Textual Data
1415 -- 1425Nilson Donizete Guerin Júnior, Flavio de Barros Vidal, Bruno Macchiavello. Text-dependent User Verification of Handwritten Words and Signatures on Mobile Devices
1426 -- 1432Ümit Ekmekçi, Zehra Çataltepe, Güvenç Güngör, Demir Can Kahya. EigenBots for the Okey Social Board Game

Volume 59, Issue 8

1113 -- 1128Xiang Zhao, Yifan Chen, Chuan Xiao, Yoshiharu Ishikawa, Jiuyang Tang. Frequent Subgraph Mining Based on Pregel
1129 -- 1143Jorge Francisco Cutigi, Adenilso da Silva Simão, Simone R. S. Souza. Reducing FSM-Based Test Suites with Guaranteed Fault Coverage
1144 -- 1154Pablo Pérez-Lantero. Area and Perimeter of the Convex Hull of Stochastic Points
1155 -- 1173Hairong Yu, Guohui Li, Jianjun Li, LihChyun Shu. cyclical: A Latency-Resistant Cyclic Multi-Threading Approach for Automatic Program Parallelization
1174 -- 1179Indra Rajasingh, Paul D. Manuel, N. Parthiban, D. Azubha Jemilet, R. Sundara Rajan. Transmission in Butterfly Networks
1180 -- 1185Zbynek Krivka, Alexander Meduna, Petr Zemek. Phrase-Structure Grammars: Normal Forms and Reduction
1186 -- 1206Robert M. Hierons, Uraz Cengiz Türker. Distinguishing Sequences for Distributed Testing: Adaptive Distinguishing Sequences
1207 -- 1219Huilin Liu, Chen Chen, Junchang Xin, Liyuan Zhang. Searching the Informative Subgraph Based on the PeakGraph Model
1220 -- 1235Hui Cui, Robert H. Deng. Revocable and Decentralized Attribute-Based Encryption
1236 -- 1251Weifeng Wang, Li Jiao. Trace Abstraction Refinement for Solving Horn Clauses
1252 -- 1263Fabrizio Luccio, Bernard Mans, Luke Mathieson, Linda Pagli. Complete Balancing via Rotation
1264 -- 1273Rolando Trujillo-Rasua, Ismael González Yero. Characterizing 1-Metric Antidimensional Trees and Unicyclic Graphs

Volume 59, Issue 7

945 -- 954Joseph K. Liu, Sze-Ling Yeo, Wun-She Yap, Sherman S. M. Chow, Duncan S. Wong, Willy Susilo. Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol
955 -- 969Peng Jiang, Yi Mu, Fuchun Guo, Xiaofen Wang, Qiaoyan Wen. Online/Offline Ciphertext Retrieval on Resource Constrained Devices
970 -- 982Chunpeng Ge, Willy Susilo, Jiandong Wang, Zhiqiu Huang, Liming Fang, Yongjun Ren. A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles
983 -- 1004Zhen Liu, Duncan S. Wong. Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe
1005 -- 1027Amir Jalaly Bidgoly, Behrouz Tork Ladani. Modeling and Quantitative Verification of Trust Systems Against Malicious Attackers
1028 -- 1039Jiguo Li, Haiting Du, Yichen Zhang. Certificate-Based Key-Insulated Signature in the Standard Model
1040 -- 1053Joseph K. Liu, Willy Susilo, Tsz Hon Yuen, Man Ho Au, Jun-bin Fang, Zoe L. Jiang, Jianying Zhou. Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles
1054 -- 1065Kunpeng Bai, Chuankun Wu. An AES-Like Cipher and Its White-Box Implementation
1066 -- 1075Jiguo Li, Meilin Teng, Yichen Zhang, Qihong Yu. A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme
1076 -- 1090Mario Diego Munoz-Hernandez, Miguel Morales-Sandoval, Jose Juan Garcia Hernandez. An End-to-End Security Approach for Digital Document Management
1091 -- 1101Haibo Yi, Shaohua Tang. Very Small FPGA Processor for Multivariate Signatures
1102 -- 1112Haibo Yi, Shaohua Tang, Ranga Vemuri. Fast Inversions in Small Finite Fields by Using Binary Trees

Volume 59, Issue 6

775 -- 776Bernabé Dorronsoro, Sergio Nesmachnow. Parallel Soft Computing Techniques in High-Performance Computing Systems
777 -- 792Francisco Luna, Gustavo R. Zavala, Antonio J. Nebro, Juan José Durillo, Carlos A. Coello Coello. Distributed Multi-Objective Metaheuristics for Real-World Structural Optimization Problems
793 -- 809Misun Yu, Doo-Hwan Bae. +: Fast and Accurate Hybrid Data Race Detection
810 -- 835Nadia Nedjah, Rogério De Moraes Calazan, Luiza de Macedo Mourelle. Particle, Dimension and Cooperation-Oriented PSO Parallelization Strategies for Efficient High-Dimension Problem Optimizations on Graphics Processing Units
836 -- 847Guillermo Vigueras, Juan M. Orduña. On the Use of GPU for Accelerating Communication-Aware Mapping Techniques
848 -- 860Jianliang Gao, Ping Liu, Xuedan Kang, Lixia Zhang, Jianxin Wang. PRS: Parallel Relaxation Simulation for Massive Graphs
861 -- 874Zhuo Wang, Tingting Hou, Dawei Song, Zhun Li, Tianqi Kong. Detecting Review Spammer Groups via Bipartite Graph Projection
875 -- 888Chris Gorman, Iren Valova. GORMANN: Gravitationally Organized Related Mapping Artificial Neural Network
889 -- 907D. Thenmozhi, Chandrabose Aravindan. An Automatic and Clause-Based Approach to Learn Relations for Ontologies
908 -- 922Mert Ozer, Ilkcan Keles, Ismail Hakki Toroslu, Pinar Karagoz, Hasan Davulcu. Predicting the Location and Time of Mobile Phone Users by Using Sequential Pattern Mining Techniques
923 -- 943Sangeeta Bhattacharya, Subramanian Selvakumar. Multi-Measure Multi-Weight Ranking Approach for the Identification of the Network Features for the Detection of DoS and Probe Attacks

Volume 59, Issue 5

603 -- 615Josh Chopin, Hamid Laga, Stanley J. Miklavcic. The Influence of Object Shape on the Convergence of Active Contour Models for Image Segmentation
616 -- 629Jia Jie Liu, Cheng-Ju Hsu, Chien-Hung Lin. Computing Global Secure Set on Trees
630 -- 649Riku Saikkonen, Eljas Soisalon-Soininen. Cache-Sensitive Memory Layout for Dynamic Binary Trees
650 -- 666Konrad Dabrowski, Daniël Paulusma. Clique-Width of Graph Classes Defined by Two Forbidden Induced Subgraphs
667 -- 684Natarajan Meghanathan. Maximal Assortative Matching and Maximal Dissortative Matching for Complex Network Graphs
685 -- 700Ju Hee Choi, Gi-Ho Park. Demand-Aware NVM Capacity Management Policy for Hybrid Cache Architecture
701 -- 714Jia-Chun Lin, Fang-Yie Leu, Ying-Ping Chen. Impacts of Task Re-Execution Policy on MapReduce Jobs
715 -- 740Hao Zheng, Xiaoshe Dong, Zhengdong Zhu, Baoke Chen, Xiuxiu Bai, Xingjun Zhang, Endong Wang. Improving the Reliability of the Operating System Inside a VM
741 -- 773Tao Zhang, He Jiang, Xiapu Luo, Alvin T. S. Chan. A Literature Review of Research in Bug Resolution: Tasks, Challenges and Future Directions

Volume 59, Issue 4

439 -- 451Wuqiang Shen, Shaohua Tang. RGB, a Mixed Multivariate Signature Scheme
452 -- 461Leyou Zhang, Yi Mu, Qing Wu. Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys
462 -- 492Simeon Veloudis, Nimal Nissanke. A Novel Permission Hierarchy for RBAC for Dealing with SoD in MAC Models
493 -- 507Mingwu Zhang, Yi Mu. Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations
508 -- 521Joonsang Baek, Duncan S. Wong, Jin Li, Man Ho Au. Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction
522 -- 540Peng Zhou, Xiaojing Gu, Rocky K. C. Chang. Harvesting File Download Exploits in the Web: A Hacker's View
541 -- 548Xinran Li, Chen-Hui Jin, Fang-Wei Fu. Improved Results of Impossible Differential Cryptanalysis on Reduced FOX
549 -- 558Guo-qiang Liu, Chen-Hui Jin. Linear Cryptanalysis of PRESENT-like Ciphers with Secret Permutation
559 -- 569Jiannan Wei, Guomin Yang, Yi Mu, Kaitai Liang. Anonymous Proxy Signature with Hierarchical Traceability
570 -- 591Emma Osborn, Andrew C. Simpson. On Safety and Security Requirements in Emerging Ubiquitous Computing Models
592 -- 601Hung-Yu Chien. A Generic Approach to Improving Diffie-Hellman Key Agreement Efficiency for Thin Clients

Volume 59, Issue 3

285 -- 286Surya Nepal, Suraj Pandey. Guest Editorial: Cloud Computing and Scientific Applications (CCSA) - Big Data Analysis in the Cloud
287 -- 307Roberto R. Expósito, Guillermo L. Taboada, Sabela Ramos, Juan Touriño, Ramón Doallo. Performance Evaluation of Data-Intensive Computing Applications on a Public IaaS Cloud
308 -- 324Sami Yangui, Samir Tata. An OCCI Compliant Model for PaaS Resources Description and Provisioning
325 -- 337Liang Li, Endong Wang, Xiaoshe Dong, Zhengdong Zhu. The Optimization of Memory Access Congestion for MapReduce Applications on Manycore Systems
338 -- 352Christian Napoli, Giuseppe Pappalardo, Emiliano Tramontana, Gaetano Zappalà. A Cloud-Distributed GPU Architecture for Pattern Identification in Segmented Detectors Big-Data Surveys
353 -- 370T. Veni, S. Mary Saira Bhanu. MDedup++: Exploiting Temporal and Spatial Page-Sharing Behaviors for Memory Deduplication Enhancement
371 -- 383Sérgio Esteves, Luís Veiga. WaaS: Workflow-as-a-Service for the Cloud with Scheduling of Continuous and Data-Intensive Workflows
384 -- 402David L. González-Álvarez, Miguel A. Vega-Rodríguez, Alvaro Rubio-Largo. A Comparative Study of Different Motif Occurrence Models Applied to a Hybrid Multiobjective Shuffle Frog Leaping Algorithm
403 -- 422Yan Kong, Minjie Zhang, Dayong Ye. An Auction-Based Approach for Group Task Allocation in an Open Network Environment
423 -- 438Iyad F. Jafar, Khalid A. Darabkh, Raed T. Al-Zubi, Rami A. Al Namneh. Efficient Reversible Data Hiding Using Multiple Predictors

Volume 59, Issue 2

159 -- 177You Wang, Jun Bi. Software-Defined Mobility Support in IP Networks
178 -- 191Abdul Hameed, Adnan Noor Mian. Towards Better Traffic Localization of Virtual LANs Using Genetic Algorithm
192 -- 207Júlio Araújo, Frédéric Giroire, Joanna Moulierac, YaNing Liu, Remigiusz Modrzejewski. Energy Efficient Content Distribution
208 -- 224Sareh Fotuhi Piraghaj, Rodrigo N. Calheiros, Jeffrey Chan, Amir Vahid Dastjerdi, Rajkumar Buyya. Virtual Machine Customization and Task Mapping Architecture for Efficient Allocation of Cloud Data Center Resources
225 -- 243Lélia Blin, Maria Potop-Butucaru, Stephane Rovedakis, Sébastien Tixeuil. A New Self-Stabilizing Minimum Spanning Tree Construction with Loop-Free Property
244 -- 259Mahmood Naderan-Tahan, Hamid Sarbazi-Azad. Why Does Data Prefetching Not Work for Modern Workloads?
260 -- 274Md. Abu Layek, TaeChoong Chung, Eui-nam Huh. Adaptive Desktop Delivery Scheme for Provisioning Quality of Experience in Cloud Desktop as a Service
275 -- 284Jacques M. Bahi, Wiem Elghazel, Christophe Guyeux, M. Haddad, Mourad Hakem, Kamal Medjaher, Noureddine Zerhouni. Resiliency in Distributed Sensor Networks for Prognostics and Health Management of the Monitoring Targets

Volume 59, Issue 12

1749 -- 1759Minhaj Ahmad Khan. A Transformation For Optimizing String-Matching Algorithms For Long Patterns
1760 -- 1783Walayat Hussain, Farookh Khadeer Hussain, Omar Khadeer Hussain, Elizabeth Chang. Provider-Based Optimized Personalized Viable SLA (OPV-SLA) Framework to Prevent SLA Violation
1784 -- 1804Mariem Mefteh, Nadia Bouassida, Hanêne Ben-Abdallah. Mining Feature Models from Functional Requirements
1805 -- 1816Khaled El-Fakih, Nina Yevtushenko. Test Translation for Embedded Finite State Machine Components
1817 -- 1830Farah Aït-Salaht, Hind Castel-Taleb, Jean-Michel Fourneau, Nihal Pekergin. Performance Analysis of a Queue by Combining Stochastic Bounds, Real Traffic Traces and Histograms
1831 -- 1838Patrizio Angelini, Giordano Da Lozzo. SEFE = C-Planarity?
1839 -- 1856Shiying Wang, Zhenhua Wang, Mujiangshan Wang. The 2-Extra Connectivity and 2-Extra Diagnosability of Bubble-Sort Star Graph Networks
1857 -- 1871Liang Bao, Fen Zhao, Mengqing Shen, Yutao Qi, Ping Chen. An Orthogonal Genetic Algorithm for QoS-Aware Service Composition
1872 -- 1899Simone Brognoli, Gianfranco Lamperti, Michele Scandale. Incremental Determinization of Expanding Automata
1900 -- 1910Sandi Klavzar, Paul D. Manuel, Mohammad J. Nadjafi-Arani, R. Sundara Rajan, Cyriac Grigorious, Sudeep Stephen. Average Distance in Interconnection Networks via Reduction Theorems for Vertex-Weighted Graphs

Volume 59, Issue 11

1581 -- 1592Magdy M. Fadel, Ali I. Eldesoky, Amira Y. Haikel, Labib M. Labib. A Low-Storage Precise IP Traceback Technique Based on Packet Marking and Logging
1593 -- 1611Lan Zhou, Vijay Varadharajan, K. Gopinath. A Secure Role-Based Cloud Storage System For Encrypted Patient-Centric Health Records
1612 -- 1622Mohannad J. Alhanahnah, Arshad Jhumka, Sahel Alouneh. A Multidimension Taxonomy of Insider Threats in Cloud Computing
1623 -- 1636Fatemeh Imani-Mehr, Mehran S. Fallah. How Powerful Are Run-Time Monitors with Static Information?
1637 -- 1658Shifeng Sun, Joseph K. Liu, Yu Yu, Baodong Qin, Dawu Gu. RKA-Secure Public Key Encryptions Against Efficiently Invertible Functions
1659 -- 1668Yanli Ren, Ning Ding, Xinpeng Zhang, Haining Lu, Dawu Gu. Identity-Based Encryption with Verifiable Outsourced Revocation
1669 -- 1688Junqing Gong, Xiaolei Dong, Zhenfu Cao, Jie Chen 0021. Almost-Tight Identity Based Encryption Against Selective Opening Attack
1689 -- 1694Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang. et al.'s Public Key Encryption with Authorized Equality Test
1695 -- 1713Jiangshan Yu, Vincent Cheval, Mark Ryan. DTKI: A New Formalized PKI with Verifiable Trusted Parties
1714 -- 1734Jianghong Wei, Xinyi Huang, Wenfen Liu, Xuexian Hu. Practical Attribute-based Signature: Traceability and Revocability
1735 -- 1748Byungho Min, Vijay Varadharajan. Rethinking Software Component Security: Software Component Level Integrity and Cross Verification

Volume 59, Issue 10

1433 -- 1452Pilar González-Férez, Juan Piernas, Toni Cortes. Improving I/O Performance Through an In-Kernel Disk Simulator
1453 -- 1469Lois Orosa, Javier D. Bruguera, Elisardo Antelo. Asymmetric Allocation in a Shared Flexible Signature Module for Multicore Processors
1470 -- 1478Rui Hou, Jigang Wu, Yawen Chen, Haibo Zhang 0001. Note on Edge-Colored Graphs for Networks with Homogeneous Faults
1479 -- 1491Ankur Singh Kang, Renu Vig. Comparatative Performance Evaluation of Modified Prototype Filter Bank Multicarrier Cognitive Radio Under Constraints of Lp, K, N and D
1492 -- 1510Yung-Ting Chuang, P. M. Melliar-Smith, Louise E. Moser, Isai Michel Lombera. Statistical Estimation and Dynamic Adaptation Algorithms for the iTrust Publication, Search and Retrieval System
1511 -- 1526Hongzhi Zhao, Yuan Xue. RSD Fault Block Model for Highly Efficient Fault-Tolerant Manhattan Routing Algorithms in 2D Mesh
1527 -- 1535L. Sivagami, J. Martin Leo Manickam. Cluster-Based MAC Protocol for Collision Avoidance and TDMA Scheduling in Underwater Wireless Sensor Networks
1536 -- 1550Yili Gong, Chuang Hu, Yanyan Xu, Wenjie Wang. A Distributed File System with Variable Sized Objects for Enhanced Random Writes
1551 -- 1562I. S. Akila, R. Venkatesan. A Fuzzy Based Energy-aware Clustering Architecture for Cooperative Communication in WSN
1563 -- 1580Xiang Hu, Li Jiao, Zhijia Li. Modelling and Performance Analysis of IEEE 802.11 DCF Using Coloured Petri Nets

Volume 59, Issue 1

1 -- 32Rodrigo Andrade, Márcio Ribeiro, Henrique Rebêlo, Paulo Borba, Vaidas Gasiunas, Lucas Satabin. Assessing Idioms for a Flexible Feature Binding Time
33 -- 46Robert M. Hierons. A More Precise Implementation Relation for Distributed Testing
47 -- 63Li Chunlin, Li Layuan. Context-Aware Integrated Scheme for Mobile Cloud Service Allocation
64 -- 82K. Hemant Kumar Reddy, Diptendu Sinha Roy. DPPACS: A Novel Data Partitioning and Placement Aware Computation Scheduling Scheme for Data-Intensive Cloud Applications
83 -- 90Shay Gueron, Vlad Krasnov. Fast Quicksort Implementation Using AVX Instructions
91 -- 105SuLin Song, Shuming Zhou, Xiaoyan Li. Conditional Diagnosability of Burnt Pancake Networks Under the PMC Model
106 -- 118Zaharije Radivojevic, Milos Cvetanovic, Sasa Stojanovic. Comparison of Binary Procedures: A Set of Techniques for Evading Compiler Transformations
119 -- 132Jie Zhao, Rongcai Zhao, Jinchen Xu. Code Generation for Distributed-Memory Architectures
133 -- 150Carla Binucci, Walter Didimo. Computing Quasi-Upward Planar Drawings of Mixed Graphs
151 -- 158Zhendong Shao, Igor Averbakh, Sandi Klavzar. Labeling Dot-Cartesian and Dot-Lexicographic Product Graphs with a Condition at Distance Two