Journal: Computing

Volume 104, Issue 9

1949 -- 1975Hao Dai, Yang Wang 0006, Chengzhong Xu 0001. Osprey: a heterogeneous search framework for spatial-temporal similarity
1977 -- 2003Tianhua Li, Yongcheng Yin, Bo Yang 0042, Jialin Hou, Kai Zhou. A self-learning bee colony and genetic algorithm hybrid for cloud manufacturing services
2005 -- 2030Pranitha Sanda, Digambar Pawar, V. Radha 0001. An insight into cloud forensic readiness by leading cloud service providers: a survey
2031 -- 2051Jun Li 0061, Hao Ren, Chenyang Li, Huiling Chen 0001. A novel and efficient salp swarm algorithm for large-scale QoS-aware service composition selection
2053 -- 2076José M. del Álamo, Danny S. Guamán, Boni García, Ana Diez. A systematic mapping study on automated analysis of privacy policies
2077 -- 2100S. Subaselvi, K. Gunaseelan 0001. Energy efficient UAV enabled harvesting with beamforming for clustered SDWSN
2101 -- 2136Somayeh Kalantari, Eslam Nazemi, Behrooz Masoumi. Guided self-organization through an entropy-based self-advising approach
2137 -- 2156Somaye Pirzadi, Mohammad Ali Pourmina, Seyed Mostafa Safavi Hemami. A novel routing method in hybrid DTN-MANET networks in the critical situations

Volume 104, Issue 8

1721 -- 1738Yongfeng Kong, Zhenhui Huang, Wanjie Xiong. Parallelism of the finite-time dynamics method based on GPU
1739 -- 1751Jianghui Liu, Shengxiang Wang. All-dummy k-anonymous privacy protection algorithm based on location offset
1753 -- 1774Taha Shojarazavi, Hamid Barati, Ali Barati. A wrapper method based on a modified two-step league championship algorithm for detecting botnets in IoT environments
1775 -- 1837Salim el Khediri. Wireless sensor networks: a survey, categorization, main issues, and future orientations for clustering protocols
1839 -- 1865Mohamed A. El-Zawawy, Parvez Faruki, Mauro Conti. Formal model for inter-component communication and its security in android
1867 -- 1889Laércio Pioli, Carina F. Dorneles, Douglas D. J. de Macedo, Mario A. R. Dantas. An overview of data reduction solutions at the edge of IoT systems: a systematic mapping of the literature
1891 -- 1922Lynda Alkama, Louiza Bouallouche-Medjkoune, Mouloud Atmani, Lina Bachiri. Performance analysis of the unslotted IEEE 802.15.4k MAC protocols under saturated traffic and fading channel conditions
1923 -- 1947Somayeh Bahramnejad, Naser Movahhedinia. A reliability estimation framework for cognitive radio V2V communications and an ANN-based model for automating estimations

Volume 104, Issue 7

1525 -- 0Ahmed Mostefaoui. QoS and QoE in large Scale Wireless IoT Networks
1527 -- 1550Mandan Naresh, Vikramjeet Das, Paresh Saxena, Manik Gupta. Deep reinforcement learning based QoE-aware actor-learner architectures for video streaming in IoT environments
1551 -- 1564Noura Aljeri, Azzedine Boukerche. Mobility management in space-ground-integrated networks
1565 -- 1588Elio Mansour, Faisal Shahzad, Joe Tekli, Richard Chbeir. Data redundancy management for leaf-edges in connected environments
1589 -- 1613Maninderpal Singh, Gagangeet Singh Aujla, Rasmeet Singh Bali, Ranbir Singh Batth, Amritpal Singh, Sahil Vashisht, Anish Jindal. CovaDel: a blockchain-enabled secure and QoS-aware drone delivery framework for COVID-like pandemics
1615 -- 1641Moustafa Fayad, Ahmed Mostefaoui, Samir Chouali, Salima Benbernou. Toward a design model-oriented methodology to ensure QoS of a cyber-physical healthcare system
1643 -- 1675Mahboubeh Afzali, Hamid Pourmohammadi, Amin Mohammad Vali Samani. An efficient framework for trust evaluation of secure service selection in fog computing based on QoS, reputation, and social criteria
1677 -- 1699Souhila Kettouche, Moufida Maimour, Lakhdar Derdouri. Disjoint multipath RPL for QoE/QoS provision in the Internet of Multimedia Things
1701 -- 1720Heqi Cui, Peng Sun 0007, Azzedine Boukerche. A novel cloud-based traffic aware data routing protocol for smart connected vehicles

Volume 104, Issue 6

1233 -- 1254Hrudaya Kumar Tripathy, Sushruta Mishra, Shubham Suman, Anand Nayyar, Kshira Sagar Sahoo. Smart COVID-shield: an IoT driven reliable and automated prototype model for COVID-19 symptoms tracking
1255 -- 1284Behrouz Samieiyan, Poorya MohammadiNasab, Mostafa Abbas Mollaei, Fahimeh Hajizadeh, Mohammadreza Kangavari. Solving dimension reduction problems for classification using Promoted Crow Search Algorithm (PCSA)
1285 -- 1306Hung Cong Tran, Khiet Thanh Bui, Tran Vu Pham. Virtual machine migration policy for multi-tier application in cloud computing based on Q-learning algorithm
1307 -- 1335Mohammad Reza Akbari, Hamid Barati, Ali Barati. An efficient gray system theory-based routing protocol for energy consumption management in the Internet of Things using fog and cloud computing
1337 -- 1358Adnan Mahmood, Sarah Ali Siddiqui, Quan Z. Sheng, Wei Emma Zhang, Hajime Suzuki, Wei Ni 0001. Trust on wheels: Towards secure and resource efficient IoV networks
1359 -- 1395Uddalak Chatterjee, Sangram Ray, Muhammad Khurram Khan, Mou Dasgupta, Chien-Ming Chen. An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing
1397 -- 1423Sven Smolka, Zoltán Ádám Mann. Evaluation of fog application placement algorithms: a survey
1425 -- 1460Yuegang Li, Dongyang Ou, Xin Zhou, Congfeng Jiang, Christophe Cérin. Scalability and performance analysis of BDPS in clouds
1461 -- 1480Wei Du, Gang Li, Xiaochen He. Network structure optimization for social networks by minimizing the average path length
1481 -- 1496Abdulqader M. Almars, El-Sayed Atlam, Talal H. Noor, Elmarhomy Ghada, Rasha M. Al-Makhlasawy, Ibrahim Gad. Users opinion and emotion understanding in social media regarding COVID-19 vaccine
1497 -- 1524Xing Fan, Baoning Niu, Zhenliang Liu. Scalable blockchain storage systems: research progress and models

Volume 104, Issue 5

981 -- 1015Lei Chen, Yu Tian, Yunpeng Ma 0001. An improved grasshopper optimization algorithm based on dynamic dual elite learning and sinusoidal mutation
1017 -- 1032Xiulei Liu, Ruoyu Chen, Qiang Tong, Zhihui Qin, Qinfu Shi, Li Duan. An ontology-based deep belief network model
1033 -- 1059Faris A. Almalki, Abdullah Alhumaidi Alotaibi, Marios C. Angelides. Coupling multifunction drones with AI in the fight against the coronavirus pandemic
1061 -- 1076Muhammad U. Ilyas, Soltan Abed Alharbi. Machine learning approaches to network intrusion detection for contemporary internet traffic
1077 -- 1098Anisha Kumari, Ranjan Kumar Behera, Bibudatta Sahoo, Satya Prakash Sahoo. Prediction of link evolution using community detection in social network
1099 -- 1122Elmira Pourabbasi, Vahid Majidnezhad, Saeid Taghavi Afshord, Yasser Jafari. A novel memorizing single chromosome evolutionary algorithm for detecting communities in complex networks
1123 -- 1154Sahar Samsam Shariat, Behrang Barekatain. HATMOG: an enhanced hybrid task assignment algorithm based on AHP-TOPSIS and multi-objective genetic in cloud computing
1155 -- 1171Na Bai, Fanrong Meng, Xiaobin Rui, Zhixiao Wang. Rumor detection based on a Source-Replies conversation Tree Convolutional Neural Net
1173 -- 1202Shivangi Shukla, Sankita J. Patel. A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing
1203 -- 1217Hameed Khan, Kamal K. Kushwah, Muni Raj Maurya, Saurabh Singh, Prashant Jha, Sujeet K. Mahobia, Sanjay Soni, Subham Sahu, Kishor Kumar Sadasivuni. Machine learning driven intelligent and self adaptive system for traffic management in smart cities
1219 -- 1231Luis Antonio Leite Francisco da Costa, Rafael Kunst, Edison Pignaton de Freitas. Intelligent resource sharing to enable quality of service for network clients: the trade-off between accuracy and complexity

Volume 104, Issue 4

711 -- 715Ladjel Bellatreche, A Min Tjoa. Special issue on advances in data, information and knowledge engineering in data science era
717 -- 739Orestis Lampridis, Dimitra Karanatsiou, Athena Vakali. MANIFESTO: a huMAN-centric explaInable approach for FakE news spreaders deTectiOn
741 -- 765Mohamed Ali Ben Hassine, Safa Abdellatif, Sadok Ben Yahia. A novel imbalanced data classification approach for suicidal ideation detection on social media
767 -- 788Carlos Sáenz-Adán, Francisco J. García Izquierdo, Beatriz Pérez 0001, Trung Dong Huynh, Luc Moreau 0001. Automated and non-intrusive provenance capture with UML2PROV
789 -- 808Nayera Tarek, Mariam Abo Mandour, Nada El-Madah, Reem Ali, Sara Yahia, Bassant Mohamed, Dina Mostafa, Sara El-Metwally. Morse glasses: an IoT communication system based on Morse code for users with speech impairments
809 -- 833Antonio Brogi, Jose Carrasco 0001, Francisco Durán 0001, Ernesto Pimentel 0001, Jacopo Soldani. Self-healing trans-cloud applications
835 -- 857Roberto Reda, Filippo Piccinini, Giovanni Martinelli, Antonella Carbonaro. Heterogeneous self-tracked health and fitness data integration and sharing according to a linked open data approach
859 -- 891Soraya Touloum, Louiza Bouallouche-Medjkoune, Mohand Yazid, Mohand Moktefi, Djamil Aïssani. Performance modeling of the IEEE 802.15.4e TSCH enabling both shared and dedicated links in industrial WSNs
893 -- 923Diwakar Tripathi, B. Ramachandra Reddy, Alok Kumar Shukla. CFR: collaborative feature ranking for improving the performance of credit scoring data classification
925 -- 950Chinmaya Kumar Swain, Aryabartta Sahu. Interference Aware Workload Scheduling for Latency Sensitive Tasks in Cloud Environment
951 -- 979Somayeh Bahramnejad, Naser Movahhedinia. A fuzzy arithmetic-based analytical reliability assessment framework (FAARAF): case study, cognitive radio vehicular networks with drivers

Volume 104, Issue 3

459 -- 460Ozcan Ozturk 0001, Sabri Pllana, Smaïl Niar, Kaoutar El Maghraoui. Special issue on recent advances in autonomous vehicle solutions in the digital continuum
461 -- 479Augusto Vega, Alper Buyuktosunoglu, Davide Callegaro, Marco Levorato, Pradip Bose. Cloud-backed mobile cognition
481 -- 502Hamid Tabani, Roger Pujol, Miguel Alcon, Joan Moya, Jaume Abella 0001, Francisco J. Cazorla. ADBench: benchmarking autonomous driving systems
503 -- 531Hind Bangui, Mouzhi Ge, Barbora Buhnova. A hybrid machine learning model for intrusion detection in VANET
533 -- 552Djamila Zamouche, Mohamed Mohammedi, Sofiane Aissani, Mawloud Omar. Ultra-safe and reliable enhanced train-centric communication-based train control system
553 -- 576Partha Ghosh, Zaid Alam, Ritu Raj Sharma, Santanu Phadikar. An efficient SGM based IDS in cloud environment
577 -- 599Lalatendu Behera. A fault-tolerant time-triggered scheduling algorithm of mixed-criticality systems
601 -- 625Ahmad Taghinezhad-Niar, Saeid Pashazadeh, Javid Taheri. Energy-efficient workflow scheduling with budget-deadline constraints for cloud
627 -- 656Hong Yu 0007, Zhao Fu, Guoyin Wang 0001, Yongfang Xie, Jie Li 0002. A Multi-objective optimization algorithm based on dynamic user-preference information
657 -- 680Suman Banerjee, Mamata Jenamani, Dilip Kumar Pratihar. An approximate marginal spread computation approach for the budgeted influence maximization with delay
681 -- 710Ali Belgacem. Dynamic resource allocation in cloud computing: analysis and taxonomies

Volume 104, Issue 2

251 -- 269S. S. Vinod Chandra, Hareendran S. Anand. Nature inspired meta heuristic algorithms for optimization problems
271 -- 294Praveen Lalwani, Manas Kumar Mishra, Jasroop Singh Chadha, Pratyush Sethi. Customer churn prediction system: a machine learning approach
295 -- 313Khawla Asmi, Dounia Lotfi, Abdallah Abarda. The greedy coupled-seeds expansion method for the overlapping community detection in social networks
315 -- 337Carlos Melo, Jean Araujo, Jamilson Dantas, Paulo Pereira, Paulo Maciel. A model-based approach for planning blockchain service provisioning
339 -- 358Jia Hou Chin, Kuru Ratnavelu. Community detection using constrained label propagation algorithm with nodes exemption
359 -- 382Sanjay Kumar, Dipti Lohia, Darsh Pratap, Ashutosh Krishna, B. S. Panda 0001. MDER: modified degree with exclusion ratio algorithm for influence maximisation in social networks
383 -- 412Jixian Zhang, Laixin Chi, Ning Xie, Xutao Yang, Xuejie Zhang 0002, Weidong Li 0002. Strategy-proof mechanism for online resource allocation in cloud and edge collaboration
413 -- 432Hongjian Li, Hongxi Dai, Zengyan Liu, Hao Fu, Yang Zou. Dynamic energy-efficient scheduling for streaming applications in storm
433 -- 457Israr Ullah, Muhammad Fayaz, Muhammad Aman, DoHyeun Kim 0001. An optimization scheme for IoT based smart greenhouse climate control with efficient energy consumption

Volume 104, Issue 12

2541 -- 2556Haichi Huang, Xuan Tian, Sisi Luo, Yanli Shi. Item enhanced graph collaborative network for collaborative filtering recommendation
2557 -- 2579Reza Shojaee, Nasser Yazdani. Stochastic model-driven capacity planning framework for multi-access edge computing
2581 -- 2604Nazeef Ul Haq, M. M. Fraz, Tufail Sajjad Shah Hashmi, Muhammad Shahzad. Orientation aware weapons detection in visual data: a benchmark dataset
2605 -- 2633Thirumoorthy Karpagalingam, J. Jerold John Britto. A clustering approach for software defect prediction using hybrid social mimic optimization algorithm
2635 -- 2657Chintoo Kumar, C. Ravindranath Chowdary. OPHAencoder: An unsupervised approach to identify groups in group recommendations
2659 -- 2684Theodoros Toliopoulos, Anastasios Gounaris. Adaptivity in continuous massively parallel distance-based outlier detection
2685 -- 2709Mohamed Salah Kettouch, Cristina Luca. LinkD: element-based data interlinking of RDF datasets in linked data
2711 -- 2747Jorge Pérez 0002, Jessica Díaz, Javier Berrocal, Ramón López-Viana, Ángel González-Prieto. Edge computing
2749 -- 2783Leila Helali, Mohamed-Nazih Omri. Intelligent and compliant dynamic software license consolidation in cloud environment

Volume 104, Issue 11

2347 -- 2374Tian Bai 0007, Zhijie Li, Bo Fan, Jun Liao. Maintaining temporal validity of real-time data in component-based systems
2375 -- 2403Ricardo Pérez-Castillo, Mario Piattini. Design of classical-quantum systems with UML
2405 -- 2429Sven Ihde, Luise Pufahl, Maximilian Völker, Asvin Goel, Mathias Weske. A framework for modeling and executing task-Specific resource allocations in business processes
2431 -- 2451Danyang Xiao, Chengang Yang, Weigang Wu. Efficient DNN training based on backpropagation parallelization
2453 -- 2487Ali Walid Daher, Enrico Ferrari, Marco Muselli, Hussein Chible, Daniele D. Caviglia. VAMPIRE: vectorized automated ML pre-processing and post-processing framework for edge applications
2489 -- 2509Hong Jin, Cheng Jiang, Shengping Lv, Haiping He, Xinting Liao. A hybrid teaching-learning-based optimization algorithm for QoS-aware manufacturing cloud service composition
2511 -- 2540Yasir Afaq, Ankush Manocha. Dew computing-assisted cognitive Intelligence-inspired smart environment for diarrhea prediction

Volume 104, Issue 10

2157 -- 0Mohamed Faouzi Atig. The Computing Journal gratefully acknowledges the editorial work of the scientists listed below on the special issue entitled "S.I. : NETYS 2019"
2159 -- 2179Ved Prakash Chaudhary, Chirag Juyal, Sandeep S. Kulkarni, Sweta Kumari, Sathya Peri. Achieving starvation-freedom in multi-version transactional memory systems
2181 -- 2201Rachid Zennou, Ranadeep Biswas, Ahmed Bouajjani, Constantin Enea, Mohammed Erradi. Checking causal consistency of distributed databases
2203 -- 2223Peter Chini, Roland Meyer 0001, Prakash Saivasan. Liveness in broadcast networks
2225 -- 2252Prasad Jayanti, Anup Joshi. Recoverable mutual exclusion with abortability
2253 -- 2277Bin Yu, Xiaofeng Li, He Zhao 0011, Tong Zhou. A scalable blockchain network model with transmission paths and neighbor node subareas
2279 -- 2305Miguel Areias 0001, Ricardo Rocha 0001. On the correctness of a lock-free compression-based elastic mechanism for a hash trie design
2307 -- 2345Anass Sedrati, Aafaf Ouaddah, Abdellatif Mezrioui, Badr Bellaj. IoT-Gov: an IoT governance framework using the blockchain

Volume 104, Issue 1

1 -- 19Daoqu Geng, HanWen He, XingChuan Lan, Chang Liu. Bearing fault diagnosis based on improved federated learning algorithm
21 -- 42Saeid Aghaalizadeh, Saeid Taghavi Afshord, Asgarali Bouyer, Babak Anari. Improving the stability of label propagation algorithm by propagating from low-significance nodes for community detection in social networks
43 -- 72M. Marimuthu, J. Akilandeswari, P. R. Chelliah. Identification of trustworthy cloud services: solution approaches and research directions to build an automated cloud broker
73 -- 93Kjell Jørgen Hole. Tutorial on systems with antifragility to downtime
95 -- 122Manjari Gupta, Lava Bhargava, S. Indu 0001. Deep neural network learning for power limited heterogeneous system with workload classification
123 -- 147Zheng Li 0001, Pedro Pinacho Davidson, Monserrat Martínez-Marin, Guillermo Cabrera-Vives, Yiqun Chen, María Andrea Rodríguez, Albert Y. Zomaya, Rajiv Ranjan. Bonus computing: towards free-of-charge metacomputing in the public cloud
149 -- 168Selvaraj Srinivasan. An incremental approach for detecting distributed deadlocks in the generalized model
169 -- 208Fatemeh Davami, Sahar Adabi, Ali Rezaee, Amir Masoud Rahmani. Fog-based architecture for scheduling multiple workflows with high availability requirement
209 -- 250Paraskevas Koukaras, Christos Tjortjis, Paschalis Gkaidatzis, Napoleon Bezas, Dimosthenis Ioannidis, Dimitrios Tzovaras. An interdisciplinary approach on efficient virtual microgrid to virtual microgrid energy balancing incorporating data preprocessing techniques