Journal: Computing

Volume 101, Issue 12

1763 -- 1788Sankar Mukherjee, Daya Sagar Gupta, G. P. Biswas. An efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using lattice
1789 -- 1811Julio Mendonca, Ermeson C. Andrade, Ricardo M. F. Lima. Assessing mobile applications performance and energy consumption through experiments and Stochastic models
1813 -- 1836Georgios Sakellariou, Anastasios Gounaris. Homomorphically encrypted k-means on cloud-hosted servers with low client-side load
1837 -- 1860Jun Gao, Yi Lu Murphey, Honghui Zhu. Personalized detection of lane changing behavior using multisensor data fusion
1861 -- 1884Dong-Oh Kim, Hong-Yeon Kim, Young-Kyun Kim, Jeong-Joon Kim. Efficient techniques of parallel recovery for erasure-coding-based distributed file systems
1885 -- 1908Andreas Kosmatopoulos, Anastasios Gounaris, Kostas Tsichlas. Hinode: implementing a vertex-centric modelling approach to maintaining historical graph data
1909 -- 1933Luise Pufahl, Mathias Weske. Batch activity: enhancing business process modeling and enactment with batch processing
1935 -- 1970Enver Ever, Purav Shah, Leonardo Mostarda, Fredrick A. Omondi, Orhan Gemikonakli. On the performance, availability and energy consumption modelling of clustered IoT systems
1971 -- 1988Jun Jiang, Liangcai Zeng, Bin Chen, Yang Lu, Wei Xiong 0001. An accurate and flexible technique for camera calibration