Journal: Comput. J.

Volume 61, Issue 9

1269 -- 1283Bei-yang Zhang, Xiedong Zhang, Zhi-Hua Zhang. Nested-Stacking Genetic Algorithm for the Optimal Placement of Sensors in Bridge
1284 -- 1295Jialei Liu, Shangguang Wang, Ao Zhou, Xiang Xu, Sathish A. P. Kumar, Fangchun Yang. Towards Bandwidth Guaranteed Virtual Cluster Reallocation in the Cloud
1296 -- 1305Zhi Chen, Xiaolin Chang, Zhen Han, Lin Li. Survivability Modeling and Analysis of Cloud Service in Distributed Data Centers
1306 -- 1322Walayat Hussain, Farookh Khadeer Hussain, Omar Hussain 0002, Ravindra Bagia, Elizabeth Chang. Risk-based framework for SLA violation abatement from the cloud service provider's perspective
1323 -- 1328Jian Jin, Ping Ji 0001. Scheduling jobs with resource-dependent ready times and processing times depending on their starting times and positions
1329 -- 1337Ji-Bo Wang, Xin-Na Geng, Lu Liu, Jian-Jun Wang, Yuan-Yuan Lu. Single Machine CON/SLK Due Date Assignment Scheduling with Controllable Processing Time and Job-dependent Learning Effects
1338 -- 1350Shufeng Kong, Sanjiang Li, Michael Sioutis. Exploring Directional Path-Consistency for Solving Constraint Networks
1351 -- 1360Simone Faro, Arianna Pavone. An Efficient Skip-Search Approach to Swap Matching
1361 -- 1373Nurul Liyana Mohamad Zulkufli, Sherzod Turaev, Mohd Izzuddin Bin Mohd Tamrin, Azeddine Messikh. Watson-Crick Context-Free Grammars: Grammar Simplifications and a Parsing Algorithm
1374 -- 1388Andrea Pinna, Roberto Tonelli, Matteo Orrù, Michele Marchesi. A Petri Nets Model for Blockchain Analysis
1389 -- 1406Samuel Tweneboah-Koduah, William J. Buchanan. Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study
1407 -- 1421Pedro Álvarez, Sergio Hernández, Javier Fabra, Joaquín Ezpeleta. Cost-driven provisioning and execution of a computing-intensive service on the Amazon EC2
1422 -- 1428Ji-Bo Wang, Lu Liu, Jian-Jun Wang, Lin Li. Makespan minimization scheduling with ready times, group technology and shortening job processing times

Volume 61, Issue 8

1109 -- 1122Khalifa Toumi, Mohamed H. E. Aouadi, Ana R. Cavalli, Wissam Mallouli, Jordi Puiggalí Allepuz, Pol Valletb Montfort. A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System
1123 -- 1132Rong Wang, Yan Zhu 0007, Tung-Shou Chen, Chin-Chen Chang 0001. An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining
1133 -- 1142Haijiang Wang, Xiaolei Dong, Zhenfu Cao, Dongmei Li. Secure and Efficient Attribute-Based Encryption with Keyword Search
1143 -- 1157Gunikhan Sonowal, K. S. Kuppusamy. SmiDCA: An Anti-Smishing Model with Machine Learning Approach
1158 -- 1165Rongjia Li, Chenhui Jin. Meet-in-the-Middle Attacks on Reduced-Round QARMA-64/128
1166 -- 1179Xiaojuan Zhang 0003, Xiutao Feng, Dongdai Lin. Fault Attack on ACORN v3
1180 -- 1201Amir Daneshgar, Fahimeh Mohebbipoor. A Secure Self-Synchronized Stream Cipher
1202 -- 1215Baoguo Yuan, Junfeng Wang 0003, Zhiyang Fang, Li Qi. A New Software Birthmark based on Weight Sequences of Dynamic Control Flow Graph for Plagiarism Detection
1216 -- 1227Jianye Huang, Qiong Huang, Willy Susilo. Leakage-Resilient Dual-Form Signatures
1228 -- 1239Dianyan Xiao, Yang Yu 0008. Klepto for Ring-LWE Encryption
1240 -- 1251Jianchang Lai, Yi Mu 0001, Fuchun Guo, Peng Jiang, Sha Ma. Identity-Based Broadcast Encryption for Inner Products
1252 -- 1258Ya Liu 0001, Anren Yang, Bo Dai, Wei Li 0013, Zhiqiang Liu, Dawu Gu, Zhiqiang Zeng. Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128
1259 -- 1268Baodong Qin, Qinglan Zhao, Dong Zheng 0001. Bounded Revocable and Outsourceable ABE for Secure Data Sharing

Volume 61, Issue 7

949 -- 958Chao Tong, Xiang Yin 0004, Jun Li 0045, Tongyu Zhu, Renli Lv, Liang Sun, Joel J. P. C. Rodrigues. A shilling attack detector based on convolutional neural network for collaborative recommender system in social aware network
959 -- 970Jieren Cheng, Jinghe Zhou, Qiang Liu 0004, Xiangyan Tang, Yanxiang Guo. A DDoS Detection Method for Socially Aware Networking Based on Forecasting Fusion Feature Sequence
971 -- 986Noor Ullah, Xiangjie Kong, Liangtian Wan, Honglong Chen, Zhibo Wang, Feng Xia 0001. A Social Utility-Based Dissemination Scheme for Emergency Warning Messages in Vehicular Social Networks
987 -- 997Jiaqi Wang, Yunyao Lu, Xiaojie Wang, Jing Dong, Xiping Hu. SAR: A Social-Aware Route Recommendation System for Intelligent Transportation
998 -- 1014Mostafa Haghir Chehreghani, Albert Bifet, Talel Abdessalem. Discriminative Distance-Based Network Indices with Application to Link Prediction
1015 -- 1037Xiaogang Fu, Jianyong Sun. Reference-Inspired Many-Objective Evolutionary Algorithm Based on Decomposition
1038 -- 1063Alexey Stakhov. Mission-Critical Systems, Paradox of Hamming Code, Row Hammer Effect, 'Trojan Horse' of the Binary System and Numeral Systems with Irrational Bases
1064 -- 1074Yonghong Hou, Lin Xue, Shuo Li 0003, Jiaming Xing. User-Experience-Oriented Fuzzy Logic Controller for Adaptive Streaming
1075 -- 1098Wassim Derguech, Sami Bhiri, Edward Curry. Using Ontologies for Business Capability modelling: Describing What Services and Processes Achieve
1099 -- 1108C. Harriet Linda, G. Wiselin Jiji. Hierarchical Approach to Detect Fractures in CT DICOM Images

Volume 61, Issue 6

789 -- 797Feng Dan, Yajie Ma, Fengxing Zhou, Xiaomao Wang, Kai He. A Safety Message Broadcast Strategy in Hybrid Vehicular Network Environment
798 -- 807Tua Agustinus Tamba. On Handelman's Representation of Network Utility Maximization
808 -- 831Giuseppe Lettieri, Vincenzo Maffione, Luigi Rizzo. A Study of I/O Performance of Virtual Machines
832 -- 846Atul Tripathi, Isha Pathak, Deo Prakash Vidyarthi. Energy Efficient VM Placement for Effective Resource Utilization using Modified Binary PSO
847 -- 855Jyotshana Kanti, Geetam Singh Tomar. Solution of sensing failure problem: an improved two-stage detector
856 -- 880Roberto Rodríguez-Rodríguez, J. Díaz, Fernando Castro, Pablo Ibáñez, Daniel Chaver, Víctor Viñals, Juan Carlos Saez, Manuel Prieto-Matías, Luis Piñuel, Teresa Monreal Arnal, José María Llabería. Reuse Detector: Improving the Management of STT-RAM SLLCs
881 -- 895Nileshkumar R. Patel, Shishir Kumar. Energy-Efficient Approach for Effective Estimation of Delimited Node Position with Limited References
896 -- 911Ping Xie, Jianzhong Huang 0001, Xiao Qin 0001, Changsheng Xie. SmartRec: Fast Recovery from Single Failures in Heterogeneous RAID-Coded Storage Systems
912 -- 925Francisco José Esteban 0002, David Díaz, Pilar Hernández, Juan Antonio Caballero, Gabriel Dorado, Sergio Gálvez. MC64-Cluster: Many-Core CPU Cluster Architecture and Performance Analysis in B-Tree Searches
926 -- 936Thompson Stephan, K. Suresh Joseph. Particle Swarm Optimization-Based Energy Efficient Channel Assignment Technique for Clustered Cognitive Radio Sensor Networks
937 -- 948Tong Liu 0001, Yanmin Zhu, Ting Wen, Jiadi Yu. Location Privacy-Preserving Method for Auction-Based Incentive Mechanisms in Mobile Crowd Sensing

Volume 61, Issue 5

629 -- 644Shuanglong Kan, Zhiqiu Huang. Partial Order Reduction for the full Class of State/Event Linear Temporal Logic
645 -- 657Lalit Mohan Goyal, M. M. Sufyan Beg, Tanvir Ahmad. An Efficient Framework for Mining Association Rules in the Distributed Databases
658 -- 671Liangze Yin, Wei Dong, Fei He, Ji Wang. A True-Concurrency Encoding for BMC of Compositional Systems
672 -- 686Mei-Mei Gu, Rong-Xia Hao, Yan-Quan Feng, Ai-Mei Yu. The 3-extra Connectivity and Faulty Diagnosability
687 -- 713Edans Flavius de Oliveira Sandes, George Luiz Medeiros Teodoro, Maria Emilia M. T. Walter, Xavier Martorell, Eduard Ayguadé, Alba Cristina Magalhaes Alves de Melo. Formalization of Block Pruning: Reducing the Number of Cells Computed in Exact Biological Sequence Comparison Algorithms
714 -- 721Liqiong Xu, Shuming Zhou, Guanqin Lian, Zuwen Luo. A Kind of Conditional Connectivity of Cayley Graphs Generated by 2-trees
722 -- 744Mosong Zhou, Xiaoshe Dong, Heng Chen, Xingjun Zhang. A Runtime Available Resource Capacity Evaluation Model Based on the Concept of Similar Tasks
745 -- 760Yi Qi, Huan Li 0002, Zhongzhi Zhang. Extended Corona Product as an Exactly Tractable Model for Weighted Heterogeneous Networks
761 -- 772Shiying Wang, Guozhen Zhang, Kai-Feng. Edge Fault Tolerance of Cartesian Product Graphs on Super Restricted Edge Connectivity
773 -- 788Andrea Farruggia, Travis Gagie, Gonzalo Navarro, Simon J. Puglisi, Jouni Sirén. Relative Suffix Trees

Volume 61, Issue 4

469 -- 471Jianhong Zhang, Jian Mao. On the Security of a Pairing-Free Certificateless Signcryption Scheme
472 -- 495Emma Osborn, Andrew Simpson. Risk and the Small-Scale Cyber Security Decision Making Dialogue - a UK Case Study
496 -- 511Haiqin Wu, Liangmin Wang, Shunrong Jiang. Secure Top-k Preference Query for Location-based Services in Crowd-outsourcing Environments
512 -- 525Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo. Criteria-Based Encryption
526 -- 538Yanping Shen, Kangfeng Zheng, Chunhua Wu, Mingwu Zhang, Xinxin Niu, Yixian Yang. An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection
539 -- 544Xi Jun Lin, Lin Sun, Haipeng Qu, Dongxiao Liu. Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme
545 -- 560Siyuan Chen, Peng Zeng, Kim-Kwang Raymond Choo, Xiaolei Dong. Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols
561 -- 574Qiqi Lai, Bo Yang 0003, Yong Yu, Yuan Chen, Jian Bai. Novel Smooth Hash Proof Systems Based on Lattices
575 -- 585Husen Wang, Qiang Tang 0001. Efficient Homomorphic Integer Polynomial Evaluation Based on GSW FHE
586 -- 600Yanwei Zhou, Bo Yang 0003, Yi Mu. Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles
601 -- 613Kamalkumar R. Macwan, Sankita J. Patel. k-NMF Anonymization in Social Network Data Publishing
614 -- 628Kaushal A. Shah, Devesh C. Jinwala. Privacy Preserving, Verifiable and Resilient Data Aggregation in Grid-Based Networks

Volume 61, Issue 3

319 -- 348Mona Taghavi, Jamal Bentahar, Kaveh Bakhtiyari, Chihab Hanachi. New Insights Towards Developing Recommender Systems
349 -- 368Iqbal H. Sarker, Alan Colman, Muhammad Ashad Kabir, Jun Han. Individualized Time-Series Segmentation for Mining Mobile Phone User Behavior
369 -- 385Prashant Srivastava, Ashish Khare. Content-Based Image Retrieval using Local Binary Curvelet Co-occurrence Pattern - A Multiresolution Technique
386 -- 398Vasilis Kolias, Ioannis Anagnostopoulos, Sherali Zeadally. Structural analysis and classification of search interfaces for the deep web
399 -- 408Jeremy Barnett, Philip C. Treleaven. Algorithmic Dispute Resolution - The Automation of Professional Dispute Resolution Using AI and Blockchain Technologies
409 -- 426Zhou Shao, Muhammad Aamir Cheema, David Taniar. Trip Planning Queries in Indoor Venues
427 -- 446Chitra M. Subramanian, Aneesh Krishna, Arshinder Kaur. Game Theory-Based Requirements Analysis in the i* Framework
447 -- 458Meng-Jia Zhang, Kang Zhang, Jie Li, Yi-Na Li. Visual Exploration of 3D Geospatial Networks in a Virtual Reality Environment
459 -- 468Hazem Hiary, Rawan Zaghloul, Moh'd B. Al-Zoubi. Single-Image Shadow Detection using Quaternion Cues

Volume 61, Issue 2

159 -- 179Saurabh K. Pandey, Mukesh A. Zaveri. Quasi Random Deployment and Localization in Layered Framework for the Internet of Things
180 -- 198Xiaolin Chang, Tianju Wang, Ricardo J. Rodríguez, Zhenjiang Zhang. Modeling and Analysis of High Availability Techniques in a Virtualized System
199 -- 222Natarajan Meghanathan. Complex Network Analysis-Based Graph Theoretic Metrics to Determine Stable Data Gathering Trees for Mobile Sensor Networks
223 -- 232I Karthiga, Sharmila Sankar. Providing Secret Authentication in Clustered Security Architecture for Cloud-Based WBAN
233 -- 247Tahani Hussain, Paulvanna Nayaki Marimuthu, Sami J. Habib. Exploration of Storage Architectures for Enterprise Network
248 -- 263Subramaniam Sarathambekai, Kandaswamy Umamaheswari. Multi-Objective Optimization Techniques for Task Scheduling Problem in Distributed Systems
264 -- 272Bang Chul Jung, Jae Sook Yoo, Woongsup Lee. A Practical Physical-Layer Network Coding with Spatial Modulation in Two-Way Relay Networks
273 -- 287Jigang Wu, Long Chen 0006, Xu Wang, Guiyuan Jiang, Siew Kei Lam, Thambipillai Srikanthan. Algorithms for Replica Placement and Update in Tree Network
288 -- 318Lin Lyu, Shengli Liu, Shuai Han. Public-Key Encryption with Tight Simulation-Based Selective-Opening Security

Volume 61, Issue 12

1749 -- 1771David W. Archer, Dan Bogdanov, Yehuda Lindell, Liina Kamm, Kurt Nielsen, Jakob Illeborg Pagter, Nigel P. Smart, Rebecca N. Wright. From Keys to Databases - Real-World Applications of Secure Multi-Party Computation
1772 -- 1782Eunsung Lee, Sang-Woo Kim. Non-interactive Conditional Proxy Re-Signature in the Standard Model
1783 -- 1790Tingting Lin, Hailun Yan, Xuejia Lai, Yixin Zhong, Yin Jia. Security Evaluation and Improvement of a White-Box SMS4 Implementation Based on Affine Equivalence Algorithm
1791 -- 1793Xi Jun Lin, Lin Sun 0005, Haipeng Qu, Dongxiao Liu. On the Security of Secure Server-Designation Public Key Encryption with Keyword Search
1794 -- 1805Yunhua Wen, Shengli Liu, Ziyuan Hu, Shuai Han. Computational Robust Fuzzy Extractor
1806 -- 1824Yi Dou, Henry C. B. Chan, Man Ho Au. Order-Hiding Range Query over Encrypted Data without Search Pattern Leakage
1825 -- 1844Shuai Han, Shengli Liu, Lin Lyu, Dawu Gu. Tightly Secure Encryption Schemes against Related-Key Attacks
1845 -- 1861Biao Wang, Xueqing Wang, Rui Xue 0001, Xinyi Huang. Matrix FHE and Its Application in Optimizing Bootstrapping
1862 -- 1879Yung-Ting Chuang, Yi-Fan Lee. Defense Mechanism for Malicious and Selective Forwarding Attacks in Large and Mobile Wireless Networks
1880 -- 1896Jinhui Liu, Yong Yu, Bo Yang, Jianwei Jia, Shijia Wang, Houzhen Wang. Structural Key Recovery of Simple Matrix Encryption Scheme Family
1897 -- 1908Qingwen Guo, Qiong Huang, Guomin Yang. Authorized Function Homomorphic Signature

Volume 61, Issue 11

1589 -- 1604Himangshu Sarma, Robert Porzel, Jan D. Smeddinck, Rainer Malaka, Arun B. Samaddar. A Text to Animation System for Physical Exercises
1605 -- 1619Qirong Mao, Feifei Zhang, Liangjun Wang, Sidian Luo, Ming Dong. Cascaded Multi-level Transformed Dirichlet Process for Multi-pose Facial Expression Recognition
1620 -- 1638Ammar Sohail, Muhammad Aamir Cheema, David Taniar. Social-Aware Spatial Top-k and Skyline Queries
1639 -- 1666Md. Mosaddek Khan, Long Tran-Thanh, Sarvapali D. Ramchurn, Nicholas R. Jennings. Speeding Up GDL-Based Message Passing Algorithms for Large-Scale DCOPs
1667 -- 1682Sunny Rai, Shampa Chakraverty, Devendra K. Tayal, Yash Kukreti. A Study on Impact of Context on Metaphor Detection
1683 -- 1694Chandra Prakash, Rajesh Kumar 0002, Namita Mittal. Optimized Clustering Techniques for Gait Profiling in Children with Cerebral Palsy for Rehabilitation
1695 -- 1709Zhenjun Tang, Ziqing Huang, Heng Yao, Xianquan Zhang, Lv Chen, Chunqiang Yu. Perceptual Image Hashing with Weighted DWT Features for Reduced-Reference Image Quality Assessment
1710 -- 1723Zhi-Fang Yang, Chih-Ting Kuo, Te-Hsi Kuo. Authorization Identification by Watermarking in Log-polar Coordinate System
1724 -- 1736Zhi-jie Liang, Sheng-bin Liao, Bing-zhang Hu. 3D Convolutional Neural Networks for Dynamic Sign Language Recognition
1737 -- 1748H. Hassanpour, N. Nowrozian, M. M. AlyanNezhadi, N. Samadiani. Image Zooming Using a Multi-layer Neural Network

Volume 61, Issue 10

1429 -- 1442Leonildo José de Melo de Azevedo, Júlio Cezar Estrella, Luis Hideo Vasconcelos Nakamura, Marcos José Santana, Regina H. C. Santana, Claudio Fabiano Motta Toledo, Bruno G. Batista, Stephan Reiff-Marganiec. Optimized Service Level Agreement Establishment in Cloud Computing
1443 -- 1459Zhenni Feng, Yanmin Zhu, Hui Cai, Pingyi Luo. Optimal Distributed Auction for Mobile Crowd Sensing
1460 -- 1467Yunus Ozen, Cuneyt Bayilmis. urgMAC: A New Traffic and QoS-aware Cross-Layer MAC protocol for Wireless Multimedia Sensor Networks
1468 -- 1478Soumya Das, Tamaghna Acharya. Faulty Node Detection in HMM-Based Cooperative Spectrum Sensing For Cognitive Radio Networks
1479 -- 1495Reza Entezari-Maleki, Kishor S. Trivedi, Leonel Sousa, Ali Movaghar. Performability-Based Workflow Scheduling in Grids
1496 -- 1511Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil 0001, Khalil Drira, Saad Al-Ahmadi. Cache Freshness in Named Data Networking for the Internet of Things
1512 -- 1522Margarida Mamede, José Legatheaux Martins, João Horta. BOUQUET - Aggregating Network Paths in Trees to Reduce Data-Plane Forwarding State
1523 -- 1536N. Gobalakrishnan, C. Arun. A New Multi-Objective Optimal Programming Model for Task Scheduling using Genetic Gray Wolf Optimization in Cloud Computing
1537 -- 1556Frédéric Giroire, Nicolas Huin, Joanna Moulierac, Truong Khoa Phan. Energy-Aware Routing in Software-Defined Network using Compression
1557 -- 1576Anubis Graciela de Moraes Rossetto, Cláudio F. R. Geyer, Luciana Arantes, Pierre Sens. Impact FD: An Unreliable Failure Detector Based on Process Relevance and Confidence in the System
1577 -- 1588S. Renuga, S. S. K. Jagatheeshwari. Efficient Privacy-Preserving Data Sanitization over Cloud Using Optimal GSA Algorithm

Volume 61, Issue 1

1 -- 13Xinju Zhang. Multi-state System Reliability Analysis Based on Fuzzy Colored Petri Nets
14 -- 31Chin-Chia Wu, Shang-Chia Liu, Chuanli Zhao, Sheng-Zhi Wang, Win-Chin Lin. A Multi-Machine Order Scheduling with Learning Using the Genetic Algorithm and Particle Swarm Optimization
32 -- 46Jurairat Phuttharak, Seng W. Loke. LogicCrowd: Crowd-Powered Logic Programming Based Mobile Applications
47 -- 53Ji-Bo Wang, Lin Li. Machine Scheduling with Deteriorating Jobs and Modifying Maintenance Activities
54 -- 62Hon-Chan Chen, Tzu-Liang Kung, Lih-Hsing Hsu. An Augmented Pancyclicity Problem of Crossed Cubes
63 -- 73Nidhi Kalra, Ajay Kumar 0003. Deterministic Deep Pushdown Transducer and its Parallel Version
74 -- 94Juan Carlos Saez, Adrian Pousa, Armando De Giusti, Manuel Prieto 0001. On the Interplay Between Throughput, Fairness and Energy Efficiency on Asymmetric Multicore Processors
95 -- 104Nisha Chaurasia, Shashikala Tapaswi, Joydip Dhar. A Resource Efficient Expectation Maximization Clustering Approach for Cloud
105 -- 110Zhenyou Wang, Cuntao Xiao, Xianwei Lin, Yuan-Yuan Lu. Single Machine Total Absolute Differences Penalties Minimization Scheduling with a Deteriorating and Resource-Dependent Maintenance Activity
111 -- 120Wojciech Mula, Nathan Kurz, Daniel Lemire. Faster Population Counts Using AVX2 Instructions
121 -- 128Jou-Ming Chang, Jinn-Shyong Yang, Shyue-Ming Tang, Kung-Jui Pai. The Wide Diameters of Regular Hyper-Stars and Folded Hyper-Stars
129 -- 143Xiaoyan Li, Jianxi Fan, Cheng-Kuan Lin, Xiaohua Jia. Diagnosability Evaluation of the Data Center Network DCell
144 -- 157Xiaodong Meng, Minyi Guo, Jingyu Zhang. An Efficient Graph Query Framework with Structural Recursion
158 -- 0Jianbin Huang, Xiaojing Sun, Yu Zhou, Heli Sun. Corrigendum: A Team Formation Model with Personnel Work Hours and Project Workload Quantified