Journal: Computing

Volume 97, Issue 9

869 -- 870Vincent Gramoli, Rachid Guerraoui. Special issue on NETYS selected papers
871 -- 891Víctor López Millán, Vicent Cholvi, Luis López, Antonio Fernández Anta. Improving resource location with locally precomputed partial random walks
893 -- 912Yahya Benkaouz, Mohammed Erradi. A distributed protocol for privacy preserving aggregation with non-permanent participants
913 -- 937Mohamed Riduan Abid, Saad Biaz. Airtime ping-pong effect characterization in IEEE 802.11s wireless mesh networks
939 -- 959Diego Didona, Pascal Felber, Derin Harmanci, Paolo Romano, Jörg Schenker. Identifying the optimal level of parallelism in transactional memory applications
961 -- 980Antoine Boutet, Davide Frey, Arnaud Jégou, Anne-Marie Kermarrec, Heverson B. Ribeiro. FreeRec: an anonymous and distributed personalization architecture
981 -- 0. Retraction Note to: New probabilistic models for managing user's locations in PCS networks

Volume 97, Issue 8

769 -- 793Dongeun Lee, Junhee Ryu, Heonshik Shin. Scalable management of storage for massive quality-adjustable sensor data
795 -- 812Tieqiang Mo, Renfa Li. A new memory mapping mechanism for GPGPUs' stencil computation
813 -- 842Roman Anselmo Mora Gutiérrez, María E. Lárraga-Ramírez, Eric Alfredo Rincón García, Antonin Ponsich, Javier Ramírez-Rodríguez. Adaptation of the method of musical composition for solving the multiple sequence alignment problem
843 -- 867Erfan Najmi, Khayyam Hashmi, Zaki Malik, Abdelmounaam Rezgui, Habib Ullah Khan. CAPRA: a comprehensive approach to product ranking using customer reviews

Volume 97, Issue 7

663 -- 666Ladjel Bellatreche, Abdelmalek Amine, Otmane Aït Mohamed. Special issue on contributions of computational intelligence in designing complex information systems
667 -- 690Assad Abbas, Limin Zhang, Samee Ullah Khan. A survey on context-aware recommender systems based on computational intelligence techniques
691 -- 711Samir Ouchani, Mourad Debbabi. Specification, verification, and quantification of security in model-based systems
713 -- 740Linda Mohand-Oussaïd, Idir Aït-Sadoune, Yamine Aït Ameur, Mohamed Ahmed-Nacer. A formal model for output multimodal HCI - An Event-B formalization
741 -- 754Shuhao Yu, Shenglong Zhu, Yan Ma, Demei Mao. Enhancing firefly algorithm using generalized opposition-based learning
755 -- 768Jing Zhang, Hang Lei. A pre-distribution algorithm of component reliability in Internetware system

Volume 97, Issue 6

539 -- 541Masoud Daneshtalab, Nader Bagherzadeh, Hamid Sarbazi-Azad. Special issue on on-chip parallel and network-based systems
543 -- 555Sang-Cheol Kim, Sunggu Lee. Decentralized task scheduling for a fixed priority multicore embedded RTOS
557 -- 577Valery Sklyarov, Iouliia Skliarova. Design and implementation of counting networks
579 -- 592Ayhan Demiriz, Nader Bagherzadeh, Abdulaziz Alhussein. Using constraint programming for the design of network-on-chip architectures
593 -- 609Özcan Özturk, Ismail Akturk, Ismail Kadayif, Suleyman Tosun. Energy reduction in 3D NoCs through communication optimization
611 -- 629Mohammad Hossein Neishaburi, Zeljko Zilic. System on chip failure rate assessment using the executable model of a system
631 -- 648Masoumeh Ebrahimi, Masoud Daneshtalab. A Light-weight fault-tolerant routing algorithm tolerating faulty links and routers
649 -- 661Amir Ghanbari Bavarsad, Ehsan Atoofian. TurboLock: increasing associativity of lock table in transactional memory

Volume 97, Issue 5

439 -- 458Mahdi MollaMotalebi, Raheleh Maghami, Abdul Samad Ismail. THRD: Threshold-based hierarchical resource discovery for Grid environments
459 -- 481Victor Lira, Eduardo Antonio Guimarães Tavares, Stenio F. L. Fernandes, Paulo Romero Martins Maciel. Dependable virtual network mapping
483 -- 507Amir-Mohsen Karimi-Majd, Mohammad Fathian, Babak Amiri. A hybrid artificial immune network for detecting communities in complex networks
509 -- 537Jingyu Han, Ke-Jia Chen, Jianing Wang. Web article quality ranking based on web community knowledge

Volume 97, Issue 4

333 -- 335Jinjun Chen, Surya Nepal. Guest editorial: Special issue on data intensive cloud computing
337 -- 355Mingzhong Wang, Liehuang Zhu, Kotagiri Ramamohanarao. Reasoning task dependencies for robust service selection in data intensive workflows
357 -- 377Khalid Alhamazani, Rajiv Ranjan, Karan Mitra, Fethi A. Rabhi, Prem Prakash Jayaraman, Samee Ullah Khan, Adnene Guabtni, Vasudha Bhatnagar. An overview of the commercial cloud monitoring tools: research dimensions, design issues, and state-of-the-art
379 -- 402Yang Wang, Menglan Hu, Kenneth B. Kent. ACS: an effective admission control scheme with deadlock resolutions for workflow scheduling in clouds
403 -- 423Yu Sun, Jianzhong Qi, Rui Zhang, Yueguo Chen, Xiaoyong Du. MapReduce based location selection algorithm for utility maximization with capacity constraints
425 -- 437Mao Lin Huang, Liang Fu Lu, Xuyun Zhang. Using arced axes in parallel coordinates geometry for high dimensional BigData visual analytics in cloud computing

Volume 97, Issue 3

203 -- 204Lynn Choi, Raimund Kirner. Introduction to the special issue on software technologies for embedded and ubiquitous systems
205 -- 236Marjan Radi, Behnam Dezfouli, Kamalrulnizam Abu Bakar, Shukor Abd Razak, Malrey Lee. LINKORD: link ordering-based data gathering protocol for wireless sensor networks
237 -- 259Sang-Hoon Lee, Yunmook Nah, Lynn Choi. Influenza surveillance and forecast with smartphone sensors
261 -- 279Susanne Kandl, Sandeep Chandrashekar. Reasonability of MC/DC for safety-relevant software implemented in programming languages with short-circuit evaluation
281 -- 307Christian Motika, Reinhard von Hanxleden. Light-weight Synchronous Java (SJL): An approach for programming deterministic reactive systems with Java
309 -- 331T. R. Reshmi, Krishnan Murugan. Filter-based address autoconfiguration protocol (FAACP) for duplicate address detection and recovery in MANETs

Volume 97, Issue 2

103 -- 144Gianpaolo Cugola, Alessandro Margara, Matteo Matteucci, Giordano Tamburrelli. Introducing uncertainty in complex event processing: model, implementation, and validation
145 -- 169Stefan Kohek, Damjan Strnad. Interactive synthesis of self-organizing tree models on the GPU
171 -- 201Frédérique E. Oggier, Anwitaman Datta. Self-repairing codes - Local repairability for cheap and fast maintenance of erasure coded data

Volume 97, Issue 12

1141 -- 1164Marios Fragkoulis, Diomidis Spinellis, Panos Louridas. An interactive SQL relational interface for querying main-memory data structures
1165 -- 1184Tinghuai Ma, Yuliang Zhang, Jie Cao, Jian Shen, Meili Tang, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan. KDVEM : a k-degree anonymity with vertex and edge modification algorithm
1185 -- 1207Kifayat-Ullah Khan, Waqas Nawaz, Young-Koo Lee. Set-based approximate approach for lossless graph summarization
1209 -- 1234Fouad Bahrpeyma, Hassan Haghighi, Ali Zakerolhosseini. An adaptive RL based approach for dynamic resource provisioning in Cloud virtualized data centers

Volume 97, Issue 11

1045 -- 1075Kok-Lim Alvin Yau, Hock Guan Goh, David Chieng, Kae Hsiang Kwong. Application of reinforcement learning to wireless sensor networks: models and algorithms
1077 -- 1100Juan M. Cebrian, Magnus Jahre, Lasse Natvig. ParVec: vectorizing the PARSEC benchmark suite
1101 -- 1120Saeed Shahrivari, Saeed Jalili. Distributed discovery of frequent subgraphs of a network using MapReduce
1121 -- 1140Jamilson Dantas, Rubens Romero Martins Matos, Jean Araujo, Paulo Romero Martins Maciel. Eucalyptus-based private clouds: availability modeling and comparison to the cost of a public cloud

Volume 97, Issue 10

983 -- 984Florian Daniel, George A. Papadopoulos, Philippe Thiran. Mobile web information systems (MobiWIS 2013) - Best papers special issue editorial
985 -- 999Tor-Morten Grønli, Pardis Pourghomi, Gheorghita Ghinea. Towards NFC payments using a lightweight architecture for the Web of Things
1001 -- 1022Luis Corral, Alberto Sillitti, Giancarlo Succi. Software assurance practices for mobile applications - A survey of the state of the art
1023 -- 1044Ioannis K. Chaniotis, Kyriakos-Ioannis D. Kyriakou, Nikolaos D. Tselikas. Is Node.js a viable option for building modern web applications? A performance evaluation study

Volume 97, Issue 1

1 -- 2Ernesto Damiani, Achim Karduck, Moataz Ahmed. Editorial
3 -- 28Tetsuo Shinozaki, Yukiko Yamamoto, Setsuo Tsuruta. Context-based counselor agent for software development ecosystem
29 -- 49Heidi Dikow, Omar Hasan, Harald Kosch, Lionel Brunie, Renaud Sornin. Improving the accuracy of Business-to-Business (B2B) reputation systems through rater expertise prediction
51 -- 78Claudio Agostino Ardagna, Ravi Jhawar, Vincenzo Piuri. Dependability certification of services: a model-based approach
79 -- 102Hai Dong, Farookh Khadeer Hussain. Service-requester-centered service selection and ranking model for digital transportation ecosystems