Journal: Comput. J.

Volume 62, Issue 9

1247 -- 1264Natarajan Meghanathan. Centrality and Partial Correlation Coefficient-Based Assortativity Analysis of Real-World Networks
1265 -- 1276Kenji Yasunaga. Error Correction by Structural Simplicity: Correcting Samplable Additive Errors
1277 -- 1283Shu-Li Zhao, Rong-Xia Hao, Lidong Wu. The Generalized Connectivity of (n, k)-Bubble-Sort Graphs
1284 -- 1300Khalil Mohamed, Ayman El Shenawy, Hany Harb. A Hybrid Decentralized Coordinated Approach for Multi-Robot Exploration Task
1301 -- 1312Jinyong Wang, Xiaoping Mi. Open Source Software Reliability Model with the Decreasing Trend of Fault Detection Rate
1313 -- 1321Yuxing Yang. Characterizations of Minimum Structure- and Substructure-Cuts of Hypercubes
1322 -- 1341Zhiwu Xu, Ping Lu, Haiming Chen. Towards an Effective Syntax and a Generator for Deterministic Standard Regular Expressions
1342 -- 1364Tangliu Wen, Lan Song, Zhen You. Proving Linearizability Using Reduction
1365 -- 1402Ying Jiang, Jian Liu, Gilles Dowek, Kailiang Ji. Towards Combining Model Checking and Proof Checking

Volume 62, Issue 8

1087 -- 1091Xi Jun Lin, Lin Sun 0005, Haipeng Qu, He-qun Xian. Cryptanalysis of a Compact Anonymous HIBE with Constant Size Private Keys
1092 -- 1105Yanwei Zhou, Bo Yang 0003, Hong-xia Hou, Lina Zhang, Tao Wang 0039, Mingxiao Hu. Continuous Leakage-Resilient Identity-Based Encryption with Tight Security
1106 -- 1120Jordan S. Queiroz, Eduardo Feitosa. A Web Browser Fingerprinting Method Based on the Web Audio API
1121 -- 1131Qian Wang 0013, Chenhui Jin. A Method to Bound the Number of Active S-Boxes for a Kind of AES-Like Structure
1132 -- 1147Jiahui Chen, Jie Ling, Jianting Ning, Jintai Ding. Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems
1148 -- 1157Nanyuan Cao, Zhenfu Cao, Zhen Liu, Xiaolei Dong, Xiaopeng Zhao. All-But-Many Lossy Trapdoor Functions under Decisional RSA Subgroup Assumption and Application
1158 -- 1165Hanqiu Liu, Chenhui Jin. An Improvement of the CS Attack to DSC Cipher
1166 -- 1177Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang. Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification
1178 -- 1193Parvin Rastegari, Willy Susilo, Mohammad Dakhlalian. Efficient Certificateless Signcryption in the Standard Model: Revisiting Luo and Wan's Scheme from Wireless Personal Communications (2018)
1194 -- 1213Thierry Mefenza, Damien Vergnaud. Cryptanalysis of Server-Aided RSA Protocols with Private-Key Splitting
1214 -- 1231Jinguang Han, Maoxuan Bei, Liqun Chen, Yang Xiang, Jie Cao, Fuchun Guo, Weizhi Meng. Attribute-Based Information Flow Control
1232 -- 1245Jinyong Chang, Genqing Bian, Yanyan Ji, MaoZhi Xu. On the KDM-CCA Security from Partial Trapdoor One-Way Family in the Random Oracle Model

Volume 62, Issue 7

961 -- 976Lida Ghahremanlou, Abdel-Rahman H. Tawil, Paul Kearney, Hossein Nevisi, Xia Zhao, Ali Abdallah. A Survey of Open Data Platforms in Six UK Smart City Initiatives
977 -- 1000Saber Amri, Hela Ltifi, Mounir Ben Ayed. A Predictive Visual Analytics Evaluation Approach Based on Adaptive Neuro-Fuzzy Inference System
1001 -- 1015Ibrahim Furkan Ince, Yusuf Sait Erdem, Faruk Bulut, Md. Haidar Sharif. A Low-Cost Pupil Center Localization Algorithm Based on Maximized Integral Voting of Circular Hollow Kernels
1016 -- 1035Xuezhi Yan, Ruige Li, Xiaoying Sun, Guohong Liu. Effects of Touch Force Profiles and Waveforms of Electrostatic Tactile Feedback on Touchscreen Pan Operation
1036 -- 1043M. Dhivya, M. Renuka Devi. Detection of Structural Defects in Fabric Parts Using a Novel Edge Detection Method
1044 -- 1060Alex Bogatu, Norman W. Paton, Alvaro A. A. Fernandes, Martin Koehler. Towards Automatic Data Format Transformations: Data Wrangling at Scale
1061 -- 1085Alireza Nazemi, Marziyeh Mortezaee. A Novel Collaborate Neural Dynamic System Model for Solving a Class of Min-Max Optimization Problems with an Application in Portfolio Management

Volume 62, Issue 6

801 -- 805Zina Nakhla, Kaouther Nouira, Ahmed Ferchichi. Prescription Adverse Drug Events System (PrescADE) Based on Ontology and Internet of Things
806 -- 819Ian Pyle. Software for the Linesman Radar Data Processing System
820 -- 837Faisal Ahmed, Corentin Kervadec, Yannick Le Moullec, Gert Tamberg, Paul Annus. Autonomous Wireless Sensor Networks: Implementation of Transient Computing and Energy Prediction for Improved Node Performance and Link Quality
838 -- 854Muhammad Usman 0012, Aris Cahyadi Risdianto, Jung-Su Han, JongWon Kim. Interactive Visualization of SDN-Enabled Multisite Cloud Playgrounds Leveraging SmartX MultiView Visibility Framework
855 -- 868Ab Shaqoor Nengroo, K. S. Kuppusamy. 'Advertisements or adverse-tisements?' - An accessibility barrier for persons with visual impairments
869 -- 883Jianzhong Huang 0001, Jie Xia, Xiao Qin 0001, Qiang Cao, Changsheng Xie. Optimization of Small Updates for Erasure-Coded In-memory Stores
884 -- 904Christine Niyizamwiyitira, Lars Lundberg. A Utilization-Based Schedulability Test of Real-Time Systems Running on a Multiprocessor Virtual Machine
905 -- 918Xing Su 0001, Minjie Zhang, Quan Bai. Two Mathematical Programming-Based Approaches for Wireless Mobile Robot Deployment in Disaster Environments
919 -- 930Lamiaa Fattouh Ibrahim, Hesham A. Salman, Sara Y. Sery, Zaki Taha. Using Clustering Techniques to Plan Indoor Femtocell Base Stations Layout in Multi-floors
931 -- 942Manju C. Thayammal, M. Mary Linda. Utility-Based Optimal Resource Allocation in LTE-A Networks by Hybrid ACO-TS with MFA Scheme
943 -- 960Francesc D. Muñoz-Escoí, Rubén de Juan-Marín, José-Ramón García-Escrivá, José Ramón González de Mendívil, José M. Bernabéu-Aubán. CAP Theorem: Revision of Its Related Consistency Models

Volume 62, Issue 5

641 -- 656Mahmoud Darwich, Mohsen Amini Salehi, Ege Beyazit, Magdy Bayoumi. Cost-Efficient Cloud-Based Video Streaming Through Measuring Hotness
657 -- 669Mira Gonen, Dana Shapira, James A. Storer. Edit Distance with Multiple Block Operations†
670 -- 705A. S. M. Kayes, Jun Han 0004, Wenny Rahayu, Tharam S. Dillon, Md. Saiful Islam 0003, Alan Colman. A Policy Model and Framework for Context-Aware Access Control to Information Resources†
706 -- 714Shuang Zhao, Jixiang Meng. Arc Fault Tolerance of Maximally Arc-Connected Networks Modeled By Digraphs
715 -- 729Shiying Wang, Mujiangshan Wang. The strong connectivity of bubble-sort star graphs
730 -- 746Alkida Balliu, Pierre Fraigniaud. Certification of Compact Low-Stretch Routing Schemes
747 -- 756Yafei Zhai, Limei Lin, Li Xu 0002, Xinxin Zhang, Yanze Huang. The Conditional Diagnosability with g-Good-Neighbor of Exchanged Hypercubes
757 -- 768Khaled El-Fakih, Nina Yevtushenko, Ayat Saleh. Incremental and Heuristic Approaches for Deriving Adaptive Distinguishing Test Cases for Non-deterministic Finite-State Machines
769 -- 784Yi Qi, Yuhao Yi, Zhongzhi Zhang. Topological and Spectral Properties of Small-World Hierarchical Graphs
785 -- 800ChunLin Li, Jingpan Bai, Shaofeng Du, Chunguang Yang, Youlong Luo. Combining Tag Correlation and Interactive Behaviors for Community Discovery

Volume 62, Issue 4

481 -- 489Gaoli Wang, Zhenfu Cao, Xiaolei Dong. Improved Fault-Tolerant Aggregate Signatures
490 -- 506Hui Guo, Zhenfeng Zhang, Jing Xu 0002, Ningyu An. Non-transferable Proxy Re-encryption
507 -- 517Fatemeh Rezaeibagha, Yi Mu 0001. Efficient Micropayment of Cryptocurrency from Blockchains
518 -- 534Van Tuyen Dang, Thu-Huong Truong, Nguyen Huu Thanh, Pham Ngoc Nam 0001, Ngoc Thanh Nguyen, Alan Marshall. SDN-Based SYN Proxy - A Solution to Enhance Performance of Attack Mitigation Under TCP SYN Flood
535 -- 544Rongjia Li, Chenhui Jin, Ruya Fan. Improved Integral Distinguishers on Compression Function of GOST R Hash Function
545 -- 562Kwangsu Lee, Dong-Hoon Lee, Jong Hwan Park, Moti Yung. CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts
563 -- 578Ming Zeng, Kai Zhang 0016, Haifeng Qian, Xiaofeng Chen, Jie Chen. A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications
579 -- 597HongYun Cai, Fuzhi Zhang. An Unsupervised Method for Detecting Shilling Attacks in Recommender Systems by Mining Item Relationship and Identifying Target Items
598 -- 613Muhammed Ali Bingöl, Osman Biçer, Mehmet Sabir Kiraz, Albert Levi. An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates
614 -- 630Keita Emura, Hayato Kimura, Toshihiro Ohigashi, Tatsuya Suzuki 0002. Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions and Its Implementations
631 -- 640Yi Zhao, Yong Yu 0002, Bo Yang 0003. Leakage Resilient CCA Security in Stronger Model: Branch Hidden ABO-LTFs and Their Applications

Volume 62, Issue 3

321 -- 345Jesús Manuel Almendros-Jiménez, Antonio Becerra-Terón, Manuel Torres. Integrating and Querying OpenStreetMap and Linked Geo Open Data
346 -- 358Raphael Angulu, Jules-Raymond Tapamo, Aderemi Oluyinka Adewumi. Age-Group Estimation Using Feature and Decision Level Fusion
359 -- 372XiMing Li, ang Zhang, Changchun Li, Lantian Guo, Wenting Wang, Jihong OuYang. Relational Biterm Topic Model: Short-Text Topic Modeling using Word Embeddings
373 -- 376Chris J. Mitchell. Security issues in a group key establishment protocol
377 -- 393Asieh Ghanbarpour, Hassan Naderi. A Model-based Keyword Search Approach for Detecting Top-k Effective Answers
394 -- 413Michael Scriney, Suzanne McCarthy, Andrew McCarren, Paolo Cappellari, Mark Roantree. Automating Data Mart Construction from Semi-structured Data Sources
414 -- 429Hafiz Tayyeb Javed, Mirza Omer Beg, Hasan Mujtaba, Hammad Majeed, Muhammad Asim. Fairness in Real-Time Energy Pricing for Smart Grid Using Unsupervised Learning
430 -- 447Weihua Li, Quan Bai, Minjie Zhang. A Multi-agent System for Modelling Preference-Based Complex Influence Diffusion in Social Networks
448 -- 460Zeynep Engin, Philip C. Treleaven. Algorithmic Government: Automating Public Services and Supporting Civil Servants in using Data Science Technologies
461 -- 480Sandra Sampaio, Mashael Aljubairah, Hapsoro Adi Permana, Pedro Sampaio. A Conceptual Approach for Supporting Traffic Data Wrangling Tasks

Volume 62, Issue 2

161 -- 173Bruno Guazzelli Batista, Bruno Tardiole Kuehne, Dionisio Machado Leite Filho, Maycon Leone Maciel Peixoto. Security Overhead on a Service with Automatic Resource Management: A Performance Analysis
174 -- 197Salman Taherizadeh, Vlado Stankovski. Dynamic Multi-level Auto-scaling Rules for Containerized Applications
198 -- 214Yeim-Kuan Chang, Han-Chen Chen. Fast Packet Classification using Recursive Endpoint-Cutting and Bucket Compression on FPGA
215 -- 230Fan Zhang 0012, Tao Jing, Yan Huo, Kai-Wei Jiang. Joint Optimization of Spectrum Sensing and Transmit Power in Energy Harvesting Cognitive Radio Sensor Networks
231 -- 246Matthieu Barjon, Arnaud Casteigts, Serge Chaumette, Colette Johnen, Yessin M. Neggaz. Maintaining a Distributed Spanning Forest in Highly Dynamic Networks
247 -- 262Jianzhong Huang 0001, Panping Zhou, Xiao Qin 0001, Yanqun Wang, Changsheng Xie. Optimizing Erasure-Coded Data Archival for Replica-Based Storage Clusters
263 -- 275C. BrijilalRuban, B. Paramasivan. Cluster-Based Secure Communication and Certificate Revocation Scheme for VANET
276 -- 291Neetesh Kumar, Deo Prakash Vidyarthi. A Hybrid Heuristic for Load-Balanced Scheduling of Heterogeneous Workload on Heterogeneous Systems
292 -- 300Ahmad Hiasat, Leonel Sousa. On the Design of RNS Inter-Modulo Processing Units for the Arithmetic-Friendly Moduli Sets {2n+k, 2n - 1, 2n+1 - 1}
301 -- 320Xinjian Luo, Xiaofeng Gao, Guihai Chen. Accelerate Data Retrieval by Multi-Dimensional Indexing in Switch-Centric Data Centers

Volume 62, Issue 12

1707 -- 1733Nghi Huynh, Marc Frappier, Herman Pooda, Amel Mammar, Régine Laleau. SGAC: A Multi-Layered Access Control Model with Conflict Resolution Strategy
1734 -- 1747Binlin Cheng, Jinjun Liu, Jiejie Chen, Shudong Shi, Xufu Peng, Xingwen Zhang, Haiqing Hai. MoG: Behavior-Obfuscation Resistance Malware Detection
1748 -- 1760Yang Chen, Wenmin Li, Fei Gao 0001, Wei Yin 0004, Kaitai Liang, Hua Zhang 0001, Qiaoyan Wen. Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures
1761 -- 1776Ya Liu 0001, Yifan Shi, Dawu Gu, Zhiqiang Zeng, Fengyu Zhao, Wei Li 0013, Zhiqiang Liu, Yang Bao. Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC
1777 -- 1792Zhenhui Han, Xingshu Chen, Xuemei Zeng, Yi Zhu, MingYong Yin. Detecting Proxy User Based on Communication Behavior Portrait
1793 -- 1804Jianghua Zhong, Dongdai Lin. On Equivalence of Cascade Connections of Two Nonlinear Feedback Shift Registers
1805 -- 1821Lele Chen, Gaoli Wang, Guoyan Zhang. MILP-based Related-Key Rectangle Attack and Its Application to GIFT, Khudra, MIBS
1822 -- 1839Venkatraman Subbarayalu, B. Surendiran, P. Arun Raj Kumar. Hybrid Network Intrusion Detection System for Smart Environments Based on Internet of Things
1840 -- 1848Haibo Hong, Licheng Wang, Jun Shao, Jianhua Yan, Haseeb Ahmad, Guiyi Wei, Mande Xie, Yixian Yang. A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type
1849 -- 1862San Ling, Khoa Nguyen, Huaxiong Wang, Juanyang Zhang. Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation

Volume 62, Issue 11

1547 -- 1556Sarah AlHumoud. Twitter Analysis for Intelligent Transportation
1557 -- 1583Sreenithya Sumesh, Aneesh Krishna, Chitra M. Subramanian. Game Theory-Based Reasoning of Opposing Non-functional Requirements using Inter-actor Dependencies
1584 -- 1604Vasile Palade, J. Gerard Wolff. A Roadmap for the Development of the 'SP Machine' for Artificial Intelligence
1605 -- 1624Muhammad Adnan, Muhammad Afzal, Khadim Hussain Asif. Ontology-Oriented Software Effort Estimation System for E-commerce Applications Based on Extreme Programming and Scrum Methodologies
1625 -- 1638Jianbin Huang, Qingquan Bian, Heli Sun, Yaming Yang, Yu Zhou. Parameter-free Community Detection through Distance Dynamic Synchronization
1639 -- 1655Manashee Kalita, Themrichon Tuithung, Swanirbhar Majumder. A New Steganography Method Using Integer Wavelet Transform and Least Significant Bit Substitution
1656 -- 1670N. Shankar, S. Sathish Babu, C. Viswanathan. Femur Bone Volumetric Estimation for Osteoporosis Classification Using Optimization-Based Deep Belief Network in X-Ray Images
1671 -- 1683Roger Santos Ferreira, Denilson Alves Pereira. BigFeel - A Distributed Processing Environment for the Integration of Sentiment Analysis Methods
1684 -- 1694Ondrej Zamazal. Machine Learning Support for EU Funding Project Categorization
1695 -- 1705R. Vijayarajan, P. Gnanasivam, R. Avudaiammal. Bio-Key Based AES for Personalized Image Cryptography

Volume 62, Issue 10

1403 -- 1425Saurabh K. Pandey, Mukesh A. Zaveri. DoA-Based Event Localization Using Uniform Concentric Circular Array in the IoT Environment
1426 -- 1449Islam Elleuch, Achraf Makni, Rafik Bouaziz. Cooperative Overtaking Assistance System Based on V2V Communications and RTDB
1450 -- 1462Zikai Zhang, Jigang Wu, Long Chen 0006, Guiyuan Jiang, Siew Kei Lam. Collaborative Task Offloading with Computation Result Reusing for Mobile Edge Computing
1463 -- 1476Guijuan Wang, Cheng-Kuan Lin, Baolei Cheng, Jianxi Fan, Weibei Fan. Structure Fault-Tolerance of the Generalized Hypercube
1477 -- 1489Hisham M. Almasaeid. Maximizing Achievable Transmission Time in Cognitive Radio Networks Under Sensor-Aided Crowdsourced Spectrum Sensing
1490 -- 1504Hui Cai, Yanmin Zhu, Jie Li 0002, Jiadi Yu. Double Auction for a Data Trading Market with Preferences and Conflicts of Interest
1505 -- 1514Mohamed A. Bayoumi, Tarek M. Salem, Samir M. Koriem. Improving the Mechanism of Detecting and Measuring Holes in Ad hoc Wireless Sensor Network
1515 -- 1527Jianhua Fan, Tao Liang, Tongxiang Wang, Jianwei Liu. Identification and Localization of the Jammer in Wireless Sensor Networks
1528 -- 1545Moresh Madhukar Mukhedkar, Uttam D. Kolekar. Trust-Based Secure Routing in Mobile Ad Hoc Network Using Hybrid Optimization Algorithm

Volume 62, Issue 1

1 -- 19Nazmun Naher, Tanzima Hashem. Think Ahead: Enabling Continuous Sharing of Location Data in Real-Time with Privacy Guarantee
20 -- 29Shmuel T. Klein, Dana Shapira. Context Sensitive Rewriting Codes for Flash Memory†
30 -- 41Zbynek Krivka, Jirí Kucera, Alexander Meduna. Jumping Pure Grammars
42 -- 62Chengcheng Mou, Shaoping Chen, Yi-Cheng Tu. A Comparative Study of Dual-Tree Algorithms for Computing Spatial Distance Histograms
63 -- 80Yuan Lin 0003, Zhongzhi Zhang. Non-Backtracking Centrality Based Random Walk on Networks
81 -- 89Weiwei Liu, Chong Jiang, Ji-Bo Wang, Yuan-Yuan Lu. Single-machine scheduling with simultaneous considerations of resource allocation and deteriorating jobs
90 -- 96Yu Ti, Ming Xu, Chong Jiang, Ji-Bo Wang, Xiao-yuan Wang. No-wait resource allocation flowshop scheduling with learning effect under limited cost availability
97 -- 108Abel Cabrera Martínez, Frank A. Hernández Mira, José M. Sigarreta Almira, Ismael González Yero. On Computational and Combinatorial Properties of the Total Co-independent Domination Number of Graphs
109 -- 129Vanderson Hafemann Fragal, Adenilso Simão, Mohammad Reza Mousavi, Uraz Cengiz Türker. Extending HSI Test Generation Method for Software Product Lines
130 -- 143Dong-Yuh Yang, Yi-Chun Cho. Analysis of the N-policy GI/M/1/K Queueing Systems with Working Breakdowns and Repairs
144 -- 149Shu-Li Zhao, Rong-Xia Hao. The Generalized Three-Connectivity of Two Kinds of Cayley Graphs
150 -- 160Bing Zhu 0003, Kenneth W. Shum, Hui Li 0022. On the Duality and File Size Hierarchy of Fractional Repetition Codes