Journal: Comput. Syst. Sci. Eng.

Volume 32, Issue 6

0 -- 0Xiaobo Zhou, Kequi Li. Preface
0 -- 0Ehsan Atoofian, Ahsan Saghir. An efficient racetrack memory for L2 cache in GPGPUs
0 -- 0Qiang Lin, Guowei Wu, Jiankang Ren. Probabilistic energy-aware scheduling for wireless networked control systems
0 -- 0Jia Shi, Zhaobin Liu, Zhiyang Li, Chang Liu, Wenyu Qu. Learning-based distributed locality sensitive hashing
0 -- 0Peng Liu 0027, Jia Xu, Biao Xu, Tingting Fu, Zhen Jiang, Jie Wu. A practical M x N search routing in mobile opportunistic networks
0 -- 0Chengming Yang, Zaojian Zou. Straight-line tracking control for underactuated ships based on LOS and adaptive fuzzy method
0 -- 0Zongliang ZhuanSun, Kequi Li, Heng Qi, Guolong Chen. Joint correlation exploitation and network coding in two-way relaying systems
0 -- 0Darcy Qingzhi Hou, Zhe Wang, Jianwu Dang, Wenhuan Lu, Yuejin Cai, Jianguo Wei. Simulation of heat conduction in fluids on GPU with particle method
0 -- 0Xiang Gao, Tianfang Xiao, Meifang Yang. SCS - A new non-volatile cache mechanism for SSD systems
0 -- 0Weilian Xue, Zhibo Yuan, Bingxin Niu. A CRAHNs routing protocol based on the hops, channel number and channel capacity
0 -- 0Lei Zhang, Gang Zhang, Bin Wu, Ting Zhao, Yang Shao. Distributed state prediction based geographic routing for underwater acoustic sensor network

Volume 32, Issue 5

0 -- 0Seyyed Hamid Samareh Moosavi, Vahid Khatibi Bardsiri. An optimized adaptive neuro-fuzzy inference system to estimate software development effort
0 -- 0Hari Singh, Seema Bawa. A MapReduce-based efficient H-bucket PMR quadtree spatial index
0 -- 0Amjad Gawanmeh, Abdullah Abu Omar, Alain April. Design and analysis of control strategies for a cyber physical system
0 -- 0Zheng Wang, Xiangxian Chen, Hai Huang, Yue Zhang. Genetic algorithm based energy-saving ATO control algorithm for CBTC
0 -- 0S. Hemalatha, V. Rajamani, V. Parthasarathy. Design of optimal elliptic curve cryptography by using partial parallel shifting multiplier with parallel complementary
0 -- 0Shugang Zhang, Zhiqiang Wei, Jie Nie, Lei Huang, Zhen Li. A context-aware hierarchical approach for activity recognition based on mobile devices

Volume 32, Issue 4

0 -- 0Jalel Eddine Hajlaoui, Mohamed-Nazih Omri, Djamal Benslimane. A QoS-aware approach for discovering and selecting configurable IaaS Cloud services
0 -- 0Jinwen Zhang, Baoning Niu. A clustering-based sampling method for building query response time models
0 -- 0Abdelkader Hameurlain, Riad Mokadem. Special Issue: Elastic Data Management in Cloud Systems
0 -- 0David A. Monge, Yisel Gari, Cristian Mateos, Carlos García Garino. Autoscaling scientific workflows on the cloud by combining on-demand and spot instances
0 -- 0Sumita Barahmand, Shahram Ghandeharizadeh, Jia Li. On scalability of two NoSQL data stores for processing interactive social networking actions
0 -- 0Houcine Matallah, Ghalem Belalem, Karim Bouamrane. Experimental comparative study of NoSQL databases: HBASE versus MongoDB by YCSB

Volume 32, Issue 3

0 -- 0Sara Bouzid. A bottom-up semantic mapping approach for exploring manufacturing information resources in industry
0 -- 0Sardar Khaliq uz Zaman, Atta ur Rehman Khan, Saif Ur Rehman Malik, Abdul Nasir Khan, Tahir Maqsood, Sajjad Ahmad Madani. Formal verification and performance evaluation of task scheduling heuristics for makespan optimization and workflow distribution in large-scale computing systems
0 -- 0Sa'ed Abed, Mohammed H. Ali, Mohammad H. Al Shayeji. An adaptive edge detection operator for noisy images based on a total variation approach restoration
0 -- 0Shun-Sheng Wang, Shu-Ching Wang. Optimal agreement under fallible mobile network
0 -- 0Shouki A. Ebad. Inspection reading techniques applied to software artifacts - a systematic review

Volume 32, Issue 2

0 -- 0Sooyeon Shin, Taekyoung Kwon 0002. A corrupted cloud and corrupted multi-cloud identification method for batch auditing in cloud storage services
0 -- 0Qian He, Ning Zhang, Jinshu Su, Xiao-Song Zhang. Fast backup and recovery for web protectiuon using trigger and block hash approach
0 -- 0Chang Choi, Junho Choi, PanKoo Kim. Abnormal behaviour pattern mining for unknown threat detection
0 -- 0C. Mala, N. Renugadevi, Hsing-Chung Chen. Enhanced TKTOFT protocol for ternary based distributed group key management in cognitive radio networks
0 -- 0Ilsun You, Sherali Zeadally, A Min Tjoa. Special Issue: Foundations and Practice of Security in Emerging ICT Applications
0 -- 0Mingxin Wang, Huachun Zhou, Jia Chen. Achieving a scalable and secure software defined network by identifiers separating and mapping
0 -- 0Bayu Adhi Tama, Kyung Hyune Rhee. An extensive empirical evaluation of classifier ensembles for intrusion detection task
0 -- 0Fatima Hussain, Lilatul Ferdouse, Alagan Anpalagan, Lutful Karim, Isaac Woungang. Security threats in M2M networks: a survey with case study
0 -- 0Xiaochao Wei, Qiuliang Xu, Yi Tang. k-out-of-n oblivious transfer protocol with security against malicious adversaries
0 -- 0Marcin Urbanski, Wojciech Mazurczyk, Jean-François Lalande, Luca Caviglione. Detecting local covert channels using process activity correlation on Android smartphones

Volume 32, Issue 1

0 -- 0Sakib Ahammed, Muhammad Sheikh Sadi, Md Shamimur Rahman, Jan Jürjens. Soft error tolerance using HVDQ (Horizontal-Vertical-Diagonal-Queen parity method)
0 -- 0Bassam Rajabi, Sai Peck Lee. Change management technique for supporting object oriented diagrams changes
0 -- 0Sa'ed Abed, Mohammed H. Ali, Mohammad H. Al Shayeji. An adaptive edge detection operator for noisy images based on a total variation approach restoration
0 -- 0Wail Mardini, Yaser M. Khamayseh, Marwa Salayma, Muneer Bani Yassien, Hussein T. Mouftah. Adaptive Duty Cycle (ADC) energy efficient algorithm for ZigBee networks