Journal: Comput. J.

Volume 60, Issue 9

1271 -- 1278Sérgio Luis Sardi Mergen, Viviane Pereira Moreira. DuelMerge: Merging with Fewer Moves
1279 -- 1288Gregorio Hernández, Ana Mafalda Martins. Remote Monitoring by Edges and Faces of Maximal Outerplanar Graphs
1289 -- 1299Wei Gao, Mohammad Reza Farahani. Generalization Bounds and Uniform Bounds for Multi-Dividing Ontology Algorithms with Convex Ontology Loss Function
1300 -- 1315José Quiroga, Francisco Ortin. SSA Transformations to Facilitate Type Inference in Dynamically Typed Code
1316 -- 1337Fahimeh Ramezani, Jie Lu, Javid Taheri, Albert Y. Zomaya. A Multi-Objective Load Balancing System for Cloud Environments
1338 -- 1352Hu He, Xu Yang, Yanjun Zhang. On Improving Performance and Energy Efficiency for Register-File Connected Clustered VLIW Architectures for Embedded System Usage
1353 -- 1362Chuanli Zhao, Chou-Jung Hsu, Win-Chin Lin, Wen-Hsiang Wu, Chin-Chia Wu. An Investigation of Single-Machine Due-Window Assignment with Time-Dependent Processing Times and a Controllable Rate-Modifying Activity
1363 -- 1381Lucas Bueno Ruas de Oliveira, Elena Leroux, Katia Romero Felizardo, Flávio Oquendo, Elisa Yumi Nakagawa. ArchSORS: A Software Process for Designing Software Architectures of Service-Oriented Robotic Systems
1382 -- 1394Jianbin Huang, Xiaojing Sun, Yu Zhou, Heli Sun. A Team Formation Model with Personnel Work Hours and Project Workload Quantified
1395 -- 1413Nieves R. Brisaboa, Guillermo de Bernardo, Gilberto Gutiérrez, Miguel R. Luaces, José R. Paramá. Efficiently Querying Vector and Raster Data

Volume 60, Issue 8

1111 -- 1130Shuling Wang, Flemming Nielson, Hanne Riis Nielson, Naijun Zhan. Modelling and Verifying Communication Failure of Hybrid Systems in HCSP
1131 -- 1144Hailong Zhang 0001, Yongbin Zhou. Mahalanobis Distance Similarity Measure Based Higher Order Optimal Distinguisher
1145 -- 1160Zheng Yang, Junyu Lai, Chao Liu, Wanping Liu, Shuangqing Li. Simpler Generic Constructions for Strongly Secure One-round Key Exchange from Weaker Assumptions
1161 -- 1172Yanwei Zhou, Bo Yang 0003. Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security
1173 -- 1186Guglielmo Cola, Marco Avvenuti, Alessio Vecchio. Real-Time Identification Using Gait Pattern Analysis on a Standalone Wearable Accelerometer
1187 -- 1196Hui-fang Yu, Bo Yang. Pairing-Free and Secure Certificateless Signcryption Scheme
1197 -- 1209Haibo Yi, Weijian Li. On the Importance of Checking Multivariate Public Key Cryptography for Side-Channel Attacks: The Case of enTTS Scheme
1210 -- 1222Junwei Zhou, Hui Duan, Kaitai Liang, Qiao Yan, Fei Chen, F. Richard Yu, Jieming Wu, Jianyong Chen. Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation
1223 -- 1237Shabnam Seradji, Mehran S. Fallah. A Bayesian Game of Whitewashing in Reputation Systems
1238 -- 1250Gamze Tillem, Erkay Savas, Kamer Kaya. A New Method for Computational Private Information Retrieval
1251 -- 1270Yang Liu 0039, Andrew Simpson. AdSelector: A Privacy-Preserving Advertisement Selection Mechanism for Mobile Devices

Volume 60, Issue 7

941 -- 956Susan Lomax, Sunil Vadera. A Cost-Sensitive Decision Tree Learning Algorithm Based on a Multi-Armed Bandit Framework
957 -- 968Lin Zheng, Fuxi Zhu, Alshahrani Mohammed. Attribute and Global Boosting: A Rating Prediction Method in Context-Aware Recommendation
969 -- 985Salma Ben Jemaa, Mohamed Hammami, Hanêne Ben-Abdallah. Finger Surfaces Recognition Using Rank Level Fusion
986 -- 994S. Thayammal, D. Selvathi. Edge Preserved Multispectral Image Compression Using Extended Shearlet Transform
995 -- 1018Karam Abdulahhad, Jean-Pierre Chevallet, Catherine Berrut. Logics, Lattices and Probability: The Missing Links to Information Retrieval
1019 -- 1031Long Chen, Joemon M. Jose, Haitao Yu, Fajie Yuan. A Hybrid Approach for Question Retrieval in Community Question Answerin
1032 -- 1043Zhiping Peng, Bo Xu, Antonio Marcel Gates, Delong Cui, Weiwei Lin. A Study of a Multi-Agent Organizational Framework with Virtual Machine Clusters as the Unit of Granularity in Cloud Computing
1044 -- 1077Joshua Z. Goncalves, Aneesh Krishna. Incorporating Change Management Within Dynamic Requirements-Based Model-Driven Agent Development
1078 -- 1095Jianbin Huang, Yu Zhou, Xiaolin Jia, Heli Sun. A Novel Social Event Organization Approach for Diverse User Choices
1096 -- 1109Angelo Furfaro, Maria Carmela Groccia, Simona E. Rombo. 2D Motif Basis Applied to the Classification of Digital Images

Volume 60, Issue 6

777 -- 790Wei Wu, Jiguang Wan, Ling Zhan, Jibin Wang, Changsheng Xie. DROP: A New RAID Architecture for Enhancing Shared RAID Performance
791 -- 809Qiufen Xia, Weifa Liang, Zichuan Xu. Data Locality-Aware Big Data Query Evaluation in Distributed Clouds
810 -- 821Xiaoyin Li, Lianshan Yan, Wei Pan, Bin Luo. Secure and Robust DV-Hop Localization Based on the Vector Refinement Feedback Method for Wireless Sensor Networks
822 -- 834Meng-Shu Chiang, Chung-Ming Huang, Duy-Tuan Dao, Binh-Chau Pham. GB-PMIPv6: A Group-Based Handover Control Scheme for PMIPv6 Using the 'Hitch on' Concept
835 -- 849Ramzi R. Saifan, Iyad F. Jafar, Ghazi M. Al-Sukkar. Optimized Cooperative Spectrum Sensing Algorithms in Cognitive Radio Networks
850 -- 865Jia Peng, Yanmin Zhu, Qingwen Zhao, Hongzi Zhu, Jian Cao, Guangtao Xue, Bo Li 0001. Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones
866 -- 882Parisa Jalili Marandi, Marco Primi, Nicolas Schiper, Fernando Pedone. Ring Paxos: High-Throughput Atomic Broadcast†
883 -- 897Ihsan Mert Ozcelik, Ibrahim Korpeoglu, Ashok Agrawala. Energy Efficient IP-Connectivity with IEEE 802.11 for Home M2M Networks
898 -- 910Chen Ying, Hao Huang, Ajay Gopinathan, Zongpeng Li. A Prior-Free Spectrum Auction for Approximate Revenue Maximization
911 -- 924Fan Zhang, Tao Jing, Yan Huo, Kai-Wei Jiang. Throughput Optimization for Energy Harvesting Cognitive Radio Networks with Save-Then-Transmit Protocol
925 -- 939Li Chunlin, Zhou Min, Youlong Luo. Efficient Load-Balancing Aware Cloud Resource Scheduling for Mobile User

Volume 60, Issue 5

625 -- 635Xiang Xu, Shuming Zhou, Jinqiang Li. Reliability of Complete Cubic Networks under the Condition of g-Good-Neighbor
636 -- 656Ornela Dardha, Daniele Gorla, Daniele Varacca. Semantic Subtyping for Objects and Classes
657 -- 674Stefan Edelkamp, Amr Elmasry, Jyrki Katajainen. Heap Construction - 50 Years Later
675 -- 689Wang Lin, Min Wu, Zhengfeng Yang, Zhenbing Zeng. Verification for Non-polynomial Hybrid Systems Using Rational Invariants
690 -- 710Yu Yang, Hongbo Liu, Hua Wang, Ansheng Deng, Colton Magnant. On Algorithms for Enumerating Subtrees of Hexagonal and Phenylene Chains
711 -- 728Akinori Kawachi, Yoshio Okamoto, Keisuke Tanaka, Kenji Yasunaga. General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction
729 -- 750Wiktor B. Daszczuk. Communication and Resource Deadlock Analysis Using IMDS Formalism and Model Checking
751 -- 760Cheng Zhou, Zhonghai Yin, Youqian Feng. Events Algebra of Triggers
761 -- 775Seungbum Jo, Stelios Joannou, Daisuke Okanohara, Rajeev Raman, Srinivasa Rao Satti. Compressed Bit vectors Based on Variable-to-Fixed Encodings

Volume 60, Issue 4

457 -- 475Tomasz Hyla, Jerzy Pejas. A Hess-Like Signature Scheme Based on Implicit and Explicit Certificates
476 -- 490Jeremy Maitin-Shepard, Mehdi Tibouchi, Diego F. Aranha. Elliptic Curve Multiset Hash
491 -- 496Xi Jun Lin, Lin Sun, Haipeng Qu, Xiaoshuai Zhang. Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme
497 -- 506Shaoquan Jiang. Bounds for Message Authentication with Distortion
507 -- 526Jing Liu, Yunyun Wu, Xuezheng Liu, Yunchun Zhang, Gang Xue. On the (In)Security of Recent Group Key Distribution Protocols
527 -- 540Kenneth Radke, Colin Boyd. Security Proofs for Protocols Involving Humans
541 -- 554Leyou Zhang, Jingxia Zhang, Yi Mu. Novel Leakage-Resilient Attribute-Based Encryption from Hash Proof System
555 -- 572Emin Islam Tatli, Bedirhan Urgun. WIVET - Benchmarking Coverage Qualities of Web Crawlers
573 -- 587Muhammet Yildiz, Berrin A. Yanikoglu, Alisher Kholmatov, Alper Kanak, Umut Uludag. Biometric Layering with Fingerprints: Template Security and Privacy Through Multi-Biometric Template Fusion
588 -- 599Man Ho Au, Joseph K. Liu, Zhenfei Zhang, Willy Susilo, Jin Li. Anonymous Announcement System (AAS) for Electric Vehicle in VANETs
600 -- 612Yujue Wang, HweeHwa Pang. Probabilistic Public Key Encryption for Controlled Equijoin in Relational Databases
613 -- 624Wentan Yi, Shaozhen Chen, Yuchen Li. Zero-correlation Linear Cryptanalysis of SAFER Block Cipher Family Using the Undisturbed Bits

Volume 60, Issue 3

285 -- 286Sebastian Maneth, Alexandra Poulovassilis. Data Science
287 -- 307Yang Cao, Wenfei Fan, Shuai Ma. Virtual Network Mapping in Cloud Computing: A Graph Pattern Matching Approach
308 -- 328Lena Wiese, Tim Waage, Ferdinand Bollwein. A Replication Scheme for Multiple Fragmentations with Overlapping Fragments
329 -- 346Andreas Weiler, Michael Grossniklaus, Marc H. Scholl. Editorial: Survey and Experimental Analysis of Event Detection Techniques for Twitter
347 -- 368Yu Liu, Peter McBrien. Transactional and Incremental Type Inference from Data Updates
369 -- 388Reem Qadan Al Fayez, Mike Joy. Using Linked Data for Integrating Educational Medical Web Databases Based on BioMedical Ontologies
389 -- 409Eleni Tsalapati, Giorgos Stoilos, Alexandros Chortaras, Giorgos Stamou, George Koletsos. Query Rewriting Under Ontology Change
410 -- 430Adnan Idris, Asifullah Khan. Churn Prediction System for Telecom using Filter-Wrapper and Ensemble Classification
431 -- 443Alireza Nazemi, Ozra Ghezelsofla. A Dual Neural Network Scheme for Solving the Assignment Problem
444 -- 456Prabavathy Balasundaram, Chitra Babu, Subha Devi M. Improving Read Throughput of Deduplicated Cloud Storage using Frequent Pattern-Based Prefetching Technique

Volume 60, Issue 2

159 -- 179Yali Lv, Cheng-Kuan Lin, Jianxi Fan. Hamiltonian Cycle and Path Embeddings in k-Ary n-Cubes Based on Structure Faults
180 -- 184Cyriac Grigorious, Sudeep Stephen, Bharati Rajan, Mirka Miller. On the Partition Dimension of Circulant Graphs
185 -- 209Seyyed Amir Ali Ghafourian Ghahramani, Ali Mohammad Afshin Hemmatyar. A Graph-based Performance Analysis of the 802.11p MAC Protocol for Safety Communications in Highway Vehicular Ad Hoc Networks
210 -- 239Keyvan RahimiZadeh, Morteza Analoui, Peyman Kabiri, Bahman Javadi. Workload-Aware Placement of Multi-Tier Applications in Virtualized Datacenters
240 -- 252Joshua Higgins, Violeta Holmes, Colin C. Venters. Autonomous Discovery and Management in Virtual Container Clusters
253 -- 267Yen Hung Chen, Yuan-Cheng Lai, Ching-Neng Lai, Yang-Chi Li. A Group Bandwidth Reservation Scheme to Enhance the Driver's Safety in Vehicles and Transport Environment
268 -- 284Tong Liu, Yanmin Zhu, Hongzi Zhu, Jiadi Yu, Yuanyuan Yang. Online Pricing for Efficient Renewable Energy Sharing in a Sustainable Microgrid

Volume 60, Issue 12

1729 -- 1744Yang Lu 0001, Jiguo Li, Jian Shen. Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model
1745 -- 1759El-Sayed M. El-Alfy. Detection of Phishing Websites Based on Probabilistic Neural Networks and K-Medoids Clustering
1760 -- 1769Abderrahim Ait Wakrime. Satisfiability-Based Privacy-Aware Cloud Computing
1770 -- 1784Jayashree Pougajendy, Arun Raj Kumar Parthiban. Detection of SIP-Based Denial of Service Attack Using Dual Cost Formulation of Support Vector Machine
1785 -- 1800Ying Wu, Jinyong Chang, Rui Xue, Rui Zhang 0016. Homomorphic MAC from Algebraic One-Way Functions for Network Coding with Small Key Size
1801 -- 1808Damien Vergnaud. Comment on 'Attribute-Based Signatures for Supporting Anonymous Certification' by N. Kaaniche and M. Laurent (ESORICS 2016)
1809 -- 1821Jianchang Lai, Yi Mu, Fuchun Guo, Rongmao Chen. Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization
1822 -- 1838Sha Ma. Authorized Equi-join for Multiple Data Contributors in the PKC-Based Setting
1839 -- 1851Howard M. Heys. Statistical Cipher Feedback of Stream Ciphers
1852 -- 1870Xiaofang Xia, Wei Liang, Yang Xiao, Meng Zheng. Difference-Comparison-based Malicious Meter Inspection in Neighborhood Area Networks in Smart Grid
1871 -- 1888Weiran Liu, Xiao Liu, Jianwei Liu, Qianhong Wu. Auditing Revocable Privacy-Preserving Access Control for EHRs in Clouds
1889 -- 1911Xavier Bonnaire, Rudyar Cortes, Fabrice Kordon, Olivier Marin. ASCENT: A Provably Terminating Decentralized Logging Service
1912 -- 1922Dario Fiore, Maria Isabel Gonzalez Vasco, Claudio Soriente. Partitioned Group Password-Based Authenticated Key Exchange

Volume 60, Issue 11

1545 -- 1560Jianbin Huang, Ze Lv, Yu Zhou, He Li, Heli Sun, Xiaolin Jia. Forming Grouped Teams with Efficient Collaboration in Social Networks
1561 -- 1581Saurav Acharya, Byung Suk Lee, Paul Hines. Causal Prediction of Top-k Event Types Over Real-Time Event Streams
1582 -- 1589Lein Harn, Ching-Fang Hsu. A Practical Hybrid Group Key Establishment for Secure Group Communications
1590 -- 1608Emna Fendri, Mayssa Frikha, Mohamed Hammami. Adaptive Person Re-identification Based on Visible Salient Body Parts in Large Camera Network
1609 -- 1618Haixia Xu, Wei Zhou, Yao-nan Wang, Wei Wang, Yan Mo. Matrix Separation Based on LMaFit-Seed
1619 -- 1632Tung Doan Nguyen, Quan Bai. Enhance Trust Management in Composite Services with Indirect Ratings
1633 -- 1648Shervan Fekri Ershad, Farshad Tajeripour. Impulse-Noise Resistant Color-Texture Classification Approach Using Hybrid Color Local Binary Patterns and Kullback-Leibler Divergence
1649 -- 1674H. M. W. Verbeek, Wil M. P. van der Aalst, Jorge Munoz-Gama. Divide and Conquer: A Tool Framework for Supporting Decomposed Discovery in Process Mining
1675 -- 1686Ming-Hung Wang, Alex Chuan-Hsien Chang, Kuan-Ta Chen, Chin-Laung Lei. Estimating Ideological Scores of Facebook Pages: An Empirical Study in Taiwan
1687 -- 1716XiaoHong Han, Yan Qiang, Yuan Lan. A Bird Flock Gravitational Search Algorithm Based on the Collective Response of Birds
1717 -- 1727Lidia Fotia, Fabrizio Messina, Domenico Rosaci, Giuseppe M. L. Sarné. Using Local Trust for Forming Cohesive Social Structures in Virtual Communities

Volume 60, Issue 10

1415 -- 1416. Special Issue on Software-Defined Wireless Networks
1417 -- 1442Xiao Liu, Anfeng Liu, Qingyong Deng, Haolin Liu. Large-Scale Programing Code Dissemination for Software-Defined Wireless Networks
1443 -- 1457Yaser Jararweh, Mohammad A. Alsmirat, Mahmoud Al-Ayyoub, Elhadj Benkhelifa, Ala Darabseh, Brij Bhooshan Gupta, Ahmad Doulat. Software-Defined System Support for Enabling Ubiquitous Mobile Edge Computing
1458 -- 1471Ramon dos Reis Fontes, Mohamed Naoufal Mahfoudi, Walid Dabbous, Thierry Turletti, Christian Esteve Rothenberg. How Far Can We Go? Towards Realistic Software-Defined Wireless Networking Experiments
1472 -- 1481Shichao Li, Gang Zhu, Siyu Lin, Chao Shen, Qian Gao, Weiliang Xie, Xiaoyu Qiao. Ultra Dense Cells Management and Resource Allocation in Green Software-Defined Wireless Networks
1482 -- 1497Seyed Hamed Rastegar, Aliazam Abbasfar, Vahid Shah-Mansouri. Latency-Aware Sum-Rate Maximization for 5G Software-Defined Radio Access Networks
1498 -- 1509Tao Song, Yuchen Liu, Yiding Wang, Ruhui Ma, Alei Liang, Zhengwei Qi, Haibing Guan. Ashman: A Bandwidth Fragmentation-Based Dynamic Flow Scheduling for Data Center Networks
1510 -- 1519Ahmed Abdelaziz, Ang Tan Fong, Abdullah Gani, Suleman khan, Faiz Alotaibi, Muhammad Khurram Khan. On Software-Defined Wireless Network (SDWN) Network Virtualization: Challenges and Open Issues
1520 -- 1535Michael Rademacher, Karl Jonas, Florian Siebertz, Adam Rzyska, Moritz Schlebusch, Markus Kessel. Software-Defined Wireless Mesh Networking: Current Status and Challenges
1536 -- 1544Shaohua Wan, Yin Zhang. Coverage Hole Bypassing in Wireless Sensor Networks

Volume 60, Issue 1

1 -- 12Weidong Chen, Shan Ling. Node-Pancyclic Properties of Biswapped Networks Based on Cycles in Their Factor Networks
13 -- 26Shuo-I Wang, Fu-Hsing Wang. Independent Spanning Trees in RTCC-Pyramids
27 -- 44Jian Yu, Jun Han, Jean-Guy Schneider, Cameron M. Hine, Steve Versteeg. A Petri-Net-Based Virtual Deployment Testing Environment for Enterprise Software Systems
45 -- 59Aimal Rextin, Patrick Healy. Dynamic Upward Planarity Testing of Single Source Embedded Digraphs
60 -- 85Juan Carlos Saez, Adrian Pousa, R. Rodriíguez-Rodriíguez, F. Castro, Manuel Prieto-Matias. PMCTrack: Delivering Performance Monitoring Counter Support to the OS Scheduler
86 -- 109Alejandro Pérez, Pablo Sánchez. On the Use of C# Partial Classes for the Implementation of Software Product Lines
110 -- 125Robert M. Hierons, Uraz Cengiz Türker. Distinguishing Sequences for Distributed Testing: Preset Distinguishing Sequences
126 -- 134Maryam Shoaran, Alex Thomo. Zero-Knowledge-Private Counting of Group Triangles in Social Networks
135 -- 142Emilio Di Giacomo, Walter Didimo, Giuseppe Liotta, Fabrizio Montecchiani. Area-Thickness Trade-Offs for Straight-Line Drawings of Planar Graphs
143 -- 158Chang-ai Sun, Lin Pan, Qiaoling Wang, Huai Liu, Xiangyu Zhang. An Empirical Study on Mutation Testing of WS-BPEL Programs