Journal: Computing

Volume 101, Issue 9

1225 -- 1226Ahmed Bouajjani, Hugues Fauconnier. Editorial, special issue of NETYS 2015
1227 -- 1240Jad Hamza. On the complexity of linearizability
1241 -- 1264Stéphane Devismes, Anissa Lamani, Franck Petit, Sébastien Tixeuil. Optimal torus exploration by oblivious robots
1265 -- 1286Triet Dang Vo-Huu, Erik-Oliver Blass, Guevara Noubir. EPiC: efficient privacy-preserving counting for MapReduce
1287 -- 1303Hajar El Hammouti, Loubna Echabbi, Rachid El Azouzi. A fully distributed learning algorithm for power allocation in heterogeneous networks
1305 -- 0Yahya Benkaouz, Mohammed Erradi. Special issue on NETYS'17 selected papers
1307 -- 1326Rezwana Reaz, Hrishikesh B. Acharya, Ehab S. Elmallah, Jorge Arturo Cobb, Mohamed G. Gouda. Policy expressions and the bottom-up design of computing policies
1327 -- 1348Driss Ait Omar, M'hamed Outanoute, Mohamed Baslam, Mohamed Fakir, Belaid Bouikhalene. On understanding price-QoS war for competitive market and confused consumers
1349 -- 1368Edward Talmage, Jennifer L. Welch. Anomalies and similarities among consensus numbers of variously-relaxed queues
1369 -- 1390Chen Avin, Louis Cohen, Mahmoud Parham, Stefan Schmid 0001. Competitive clustering of stochastic communication patterns on a ring

Volume 101, Issue 8

893 -- 936Suejb Memeti, Sabri Pllana, Alécio Pedro Delazari Binotto, Joanna Kolodziej, Ivona Brandic. Using meta-heuristics and machine learning for software optimization of parallel computing systems: a systematic literature review
937 -- 967Victor Lira, Eduardo Tavares, Meuse N. Oliveira Jr., Erica Sousa, Bruno Costa e Silva Nogueira. Virtual network mapping considering energy consumption and availability
969 -- 988Hilal Arslan, Murat Manguoglu. A parallel bio-inspried shortest path algorithm
989 -- 1014Jawad Ahmed, Aqsa Malik, Muhammad U. Ilyas, Jalal S. Alowibdi. Instance launch-time analysis of OpenStack virtualization technologies with control plane network errors
1015 -- 1039Ashish Kumar Maurya, Anil Kumar Tripathi. ECP: a novel clustering-based technique to schedule precedence constrained tasks on multiprocessor computing systems
1041 -- 1065Yang Zhao, Mao Ren, Songquan Jiang, Guobin Zhu, Hu Xiong. An efficient and revocable storage CP-ABE scheme in the cloud computing
1067 -- 1090A. R. Parvanak, M. Jahanshahi, M. Dehghan. A cross-layer learning automata based gateway selection method in multi-radio multi-channel wireless mesh networks
1091 -- 1117Lynda Ben Boudaoud, Basel Solaiman, Abdelkamel Tari. Implementation and comparison of binary thinning algorithms on GPU
1119 -- 1145Aly Megahed, Jennifer A. Pazour, Ahmed Nazeem, Samir Tata, Mohamed Mohamed 0001. Monitoring services in the Internet of Things: an optimization approach
1147 -- 1175Negin Samadi, Asgarali Bouyer. Identifying influential spreaders based on edge ratio and neighborhood diversity measures in complex networks
1177 -- 1197Muthukumar Sumathi, Senthilkumar Muthukrishnan, Chinnadurai Veeramani. Dynamic behaviour of competing memes' spread with alert influence in multiplex social-networks
1199 -- 1223Lingmei Ren, Qingyang Zhang, Weisong Shi, Yanjun Peng. Edge-based personal computing services: fall detection as a pilot study

Volume 101, Issue 7

725 -- 727Fatos Xhafa. Special issue "Internet of Things (IoT)-based Services"
729 -- 742Ping Zhang 0017, Mimoza Durresi, Arjan Durresi. Multi-access edge computing aided mobility for privacy protection in Internet of Things
743 -- 772A. S. M. Kayes, Wenny Rahayu, Tharam S. Dillon. Critical situation management utilizing IoT-based data resources through dynamic contextual role modeling and activation
773 -- 790Xu an Wang, Yudong Liu, Arun Kumar Sangaiah, Jindan Zhang. Improved publicly verifiable group sum evaluation over outsourced data streams in IoT setting
791 -- 818Mohammad Dahman Alshehri, Farookh Khadeer Hussain. A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT)
819 -- 830Flora Amato, Giovanni Cozzolino, Antonino Mazzeo, Francesco Moscato 0001. Detect and correlate information system events through verbose logging messages analysis
831 -- 856Zahoor Ali Khan, Ghazanfar Latif, Arshad Sher, Imran Usman, Mahmood Ashraf Khan, Manzoor Ilahi, Nadeem Javaid. Efficient routing for corona based underwater wireless sensor networks
857 -- 872Stig Bosmans, Siegfried Mercelis, Joachim Denil, Peter Hellinckx. Testing IoT systems using a hybrid simulation based testing approach
873 -- 891Jens de Hoog, Arthur Janssens, Siegfried Mercelis, Peter Hellinckx. Towards a distributed real-time hybrid simulator for autonomous vehicles

Volume 101, Issue 6

495 -- 498Kelvin Kian Loong Wong, Zhihua Liu, Quan Zou. Multi-objective optimization and data analysis in informationization
499 -- 529Alireza Goli, Erfan Babaee Tirkolaee, Behnam Malmir, Gui-bin Bian, Arun Kumar Sangaiah. A multi-objective invasive weed optimization algorithm for robust aggregate production planning under uncertain seasonal demand
531 -- 545Qunsheng Ruan, Qingfeng Wu, Yingdong Wang, Xiling Liu, Fengyu Miao. Effective learning model of user classification based on ensemble learning algorithms
547 -- 570Erfan Babaee Tirkolaee, Alireza Goli, Milad Hematian, Arun Kumar Sangaiah, Tao Han. Multi-objective multi-mode resource constrained project scheduling problem using Pareto-based algorithms
571 -- 585Ming Li, Changqin Huang, Dianhui Wang, Qintai Hu, Jia Zhu, Yong Tang. Improved randomized learning algorithms for imbalanced and noisy educational data classification
587 -- 604Xizhe Wang, Pengze Wu, Guang Liu, Qionghao Huang, Xiaoling Hu, Haijiao Xu. Learning performance prediction via convolutional GRU and explainable neural networks in e-learning environments
605 -- 619Chao Yang, Shiqian Wu, Hongping Fang, Meng Joo Er. Adaptive Weber-face for robust illumination face recognition
621 -- 635Xiaobo Lai, Xiaomei Xu, Lili Lv, Zihe Huang, Jinyan Zhang, Peng Huang. A novel non-parametric transform stereo matching method based on mutual relationship
637 -- 652Xiaodong Zhang, Yiqun Zhang, Qingmao Hu. Deep learning based vein segmentation from susceptibility-weighted images
653 -- 665Chenchu Xu, Lin Xu, Heye Zhang, Yanping Zhang, Xiuquan Du, Shuo Li 0001. A novel machine-learning algorithm to estimate the position and size of myocardial infarction for MRI sequence
667 -- 678Weiwei Zhang, Jinglin Zhang, Xiuquan Du, Yanping Zhang, Shuo Li. An end-to-end joint learning framework of artery-specific coronary calcium scoring in non-contrast cardiac CT
679 -- 692Hanfei Zhang, Yu Lu, Shiwei Ma, Shuhao Cao, Qingwei Xia, Yanyan Liu, Haiyan Zhang. Adaptive sparse reconstruction of damage localization via Lamb waves for structure health monitoring
693 -- 703Kuo Wang, Sumei Li, Qing Wang, Chunping Hou. Identification of hormone-binding proteins using a novel ensemble classifier
705 -- 724Taoying Li, Qian Yin, Runyu Song, Mingyue Gao, Yan Chen. Multidimensional scaling method for prediction of lysine glycation sites

Volume 101, Issue 5

387 -- 433José A. Galindo, David Benavides, Pablo Trinidad, Antonio Manuel Gutiérrez-Fernández, Antonio Ruiz Cortés. Automated analysis of feature models: Quo vadis?
435 -- 453Phuong Luu Vo, Nguyen H. Tran. Cooperative caching for HTTP-based adaptive streaming contents in cache-enabled radio access networks
455 -- 475Saad Saeed, Muhammad Asim, Thar Baker, Zakaria Maamar. A location-sensitive and network-aware broker for recommending Web services
477 -- 493Lingyun Zhou, Lixin Ding, Maode Ma, Wan Tang. An accurate partially attracted firefly algorithm

Volume 101, Issue 4

291 -- 318Elarbi Badidi, Yacine Atif, Quan Z. Sheng, Muthucumaru Maheswaran. On personalized cloud service provisioning for mobile users using adaptive and context-aware service composition
319 -- 337Konstantinos Tsiknas, Konstantinos Rantos, Christos J. Schinas, Andrew Soilemes. Performance evaluation of TCP-BIAD in high-speed, long-distance networks
339 -- 361Jinoh Kim, Alex Sim, Brian Tierney, Sang C. Suh, Ikkyun Kim. Multivariate network traffic analysis using clustered patterns
363 -- 385Saeed Sedighian Kashi. Area coverage of heterogeneous wireless sensor networks in support of Internet of Things demands

Volume 101, Issue 3

187 -- 209Nasrullah Sheikh, Zekarias T. Kefato, Alberto Montresor. gat2vec: representation learning for attributed graphs
211 -- 235Chao-Tung Yang, Shuo-Tsung Chen, Jung-Chun Liu, Yi-Wei Su, Deepak Puthal, Rajiv Ranjan. A predictive load balancing technique for software defined networked cloud services
237 -- 261Mohammad Allahbakhsh, Saeed Arbabi, Mohammadreza Galavii, Florian Daniel, Boualem Benatallah. Crowdsourcing planar facility location allocation problems
263 -- 288Mohamed Sellami, Zakaria Maamar, Sylvain Lefebvre 0002, Noura Faci. Logs and enterprise networks for overcoming obstacles in business processes
289 -- 0Oscar Herrera-Alcántara, Miguel González-Mendoza. Correction to: Inverse formulas of parameterized orthogonal wavelets

Volume 101, Issue 2

75 -- 76Rogério de Lemos. Special issue on dependable computing: theory and practice
77 -- 96Ilya Tuzov, David de Andrés, Juan Carlos Ruiz. Simulating the effects of logic faults in implementation-level VITAL-compliant models
97 -- 118Michael Eischer, Tobias Distler. Scalable Byzantine fault-tolerant state-machine replication on heterogeneous servers
119 -- 138Raul Barbosa, Frederico Cerveira, Luís Gonçalo, Henrique Madeira. Emulating representative software vulnerabilities using field data
139 -- 160Yazdan Movahedi, Michel Cukier, Ambrose Andongabo, Ilir Gashi. Cluster-based vulnerability assessment of operating systems and web browsers
161 -- 185Paulo Jorge Costa Nunes, Ibéria Medeiros, José Fonseca 0002, Nuno Neves 0001, Miguel Correia 0001, Marco Vieira. An empirical study on combining diverse static analysis tools for web security vulnerabilities based on development scenarios

Volume 101, Issue 12

1763 -- 1788Sankar Mukherjee, Daya Sagar Gupta, G. P. Biswas. An efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using lattice
1789 -- 1811Julio Mendonca, Ermeson C. Andrade, Ricardo M. F. Lima. Assessing mobile applications performance and energy consumption through experiments and Stochastic models
1813 -- 1836Georgios Sakellariou, Anastasios Gounaris. Homomorphically encrypted k-means on cloud-hosted servers with low client-side load
1837 -- 1860Jun Gao, Yi Lu Murphey, Honghui Zhu. Personalized detection of lane changing behavior using multisensor data fusion
1861 -- 1884Dong-Oh Kim, Hong-Yeon Kim, Young-Kyun Kim, Jeong-Joon Kim. Efficient techniques of parallel recovery for erasure-coding-based distributed file systems
1885 -- 1908Andreas Kosmatopoulos, Anastasios Gounaris, Kostas Tsichlas. Hinode: implementing a vertex-centric modelling approach to maintaining historical graph data
1909 -- 1933Luise Pufahl, Mathias Weske. Batch activity: enhancing business process modeling and enactment with batch processing
1935 -- 1970Enver Ever, Purav Shah, Leonardo Mostarda, Fredrick A. Omondi, Orhan Gemikonakli. On the performance, availability and energy consumption modelling of clustered IoT systems
1971 -- 1988Jun Jiang, Liangcai Zeng, Bin Chen, Yang Lu, Wei Xiong 0001. An accurate and flexible technique for camera calibration

Volume 101, Issue 11

1565 -- 1584Xiaoxiang Song, Yan Guo 0002, Ning Li, Peng Qian. A novel approach for missing data prediction in coevolving time series
1585 -- 1607Boni García, Micael Gallego, Francisco Gortázar, Antonia Bertolino. Understanding and estimating quality of experience in WebRTC applications
1609 -- 1632Ajay Kumar, Seema Bawa. Generalized Ant Colony Optimizer: swarm-based meta-heuristic algorithm for cloud services execution
1633 -- 1659Rashmi Chaudhry, Shashikala Tapaswi. Bio-inspired energy conserving adaptive power and rate control in MANET
1661 -- 1685Aneta Poniszewska-Maranda, Daniel Kaczmarek, Natalia Kryvinska, Fatos Xhafa. Studying usability of AI in the IoT systems/paradigm through embedding NN techniques into mobile smart service system
1687 -- 1710Kostas Kolomvatsos. A distributed, proactive intelligent scheme for securing quality in large scale data processing
1711 -- 1733Kamal Berahmand, Asgarali Bouyer, Negin Samadi. A new local and multidimensional ranking measure to detect spreaders in social networks
1735 -- 1761Fulvio Corno, Luigi De Russis, Teodoro Montanaro. XDN: cross-device framework for custom notifications management

Volume 101, Issue 10

1391 -- 1395Yassine Ouhammou, Ladjel Bellatreche, Mirjana Ivanovic, Alberto Abelló. Model and data engineering for advanced data-intensive systems and applications
1397 -- 1429Simin Cai, Barbara Gallina, Dag Nyström, Cristina Seceleanu. Data aggregation processes: a survey, a taxonomy, and design guidelines
1431 -- 1456Panos Vassiliadis, Michail-Romanos Kolozoff, Maria Zerva, Apostolos V. Zarras. Schema evolution and foreign keys: a study on usage, heartbeat of change and relationship of foreign keys to table activity
1457 -- 1488Li Yan 0001, Ping Zhao, Zongmin Ma. Indexing temporal RDF graph
1489 -- 1511Sara Qassimi, El Hassan Abdelwahed. The role of collaborative tagging and ontologies in emerging semantic of web resources
1513 -- 1538Milos Savic 0001, Vladimir Kurbalija, Zoran Bosnic, Mirjana Ivanovic. Feature selection based on community detection in feature correlation networks
1539 -- 1563George Roumelis, Athanasios Fevgas, Michael Vassilakopoulos, Antonio Corral, Panayiotis Bozanis, Yannis Manolopoulos. +-trees in Solid State Drives

Volume 101, Issue 1

1 -- 2Parosh Aziz Abdulla, Carole Delporte. Special Issue on NETYS'2016
3 -- 17Achour Mostéfaoui, Michel Raynal, Matthieu Roy. Time-efficient read/write register in crash-prone asynchronous message-passing systems
19 -- 38Javier Olivares, Anne-Marie Kermarrec, Nitin Chiluka. The out-of-core KNN awakens: the light side of computation force on large datasets
39 -- 57Gadi Taubenfeld. Waiting in concurrent algorithms
59 -- 74Suha Orhun Mutluergil, Serdar Tasiran. A mechanized refinement proof of the Chase-Lev deque using a proof system