Journal: J. Comput. Syst. Sci.

Volume 77, Issue 6

933 -- 935Alfredo Cuzzocrea, David Taniar. Distributed XML Processing and Management: Theory and Practice
936 -- 964Serge Abiteboul, Georg Gottlob, Marco Manna. Distributed XML design
965 -- 987Alfredo Cuzzocrea, Elisa Bertino. Privacy Preserving OLAP over Distributed XML Data: A Theoretically-Sound Secure-Multiparty-Computation Approach
988 -- 1008Sergio Greco, Francesco Gullo, Giovanni Ponti, Andrea Tagarelli. Collaborative clustering of XML documents
1009 -- 1022Leonardo O. Moreira, Flávio R. C. Sousa, Javam C. Machado. A distributed concurrency control mechanism for XML data
1023 -- 1038Stasys Jukna, Georg Schnitger. Min-rank conjecture for log-depth circuits
1039 -- 1053Sung-Soon Choi, Kyomin Jung, Jeong Han Kim. Almost tight upper bound for finding Fourier coefficients of bounded pseudo-Boolean functions
1054 -- 1057Bang Ye Wu. A note on approximating the min-max vertex disjoint paths on directed acyclic graphs
1058 -- 1070Iyad A. Kanj, Michael J. Pelsmajer, Marcus Schaefer, Ge Xia. On the induced matching problem
1071 -- 1078Stéphane Bessy, Fedor V. Fomin, Serge Gaspers, Christophe Paul, Anthony Perez, Saket Saurabh, Stéphan Thomassé. Kernels for feedback arc set in tournaments
1079 -- 1107Foto N. Afrati, Rada Chirkova. Selecting and using views to compute aggregate queries
1108 -- 1119Feodor F. Dragan, Fedor V. Fomin, Petr A. Golovach. Spanners in sparse graphs
1120 -- 1140Prakash Ramanan. Memory lower bounds for XPath evaluation over XML streams
1141 -- 1158Michael R. Fellows, Jiong Guo, Hannes Moser, Rolf Niedermeier. A generalization of Nemhauser and Trotterʼs local optimization theorem
1159 -- 1171Omid Amini, Fedor V. Fomin, Saket Saurabh. Implicit branching and parameterized partial cover problems
1172 -- 1197Carme Àlvarez, Joaquim Gabarró, Maria J. Serna. Equilibria problems on games: Complexity versus succinctness

Volume 77, Issue 5

835 -- 836Lin Guan, Xin Gang Wang, Irfan Awan, Waltenegus Dargie. Performance modeling and evaluation of heterogeneous computer networks
837 -- 851Glenford E. Mapp, Dhawal N. Thakker, Orhan Gemikonakli. Exploring gate-limited analytical models for high-performance network storage servers
852 -- 860Waltenegus Dargie, Alexander Schill. Stability and performance analysis of randomly deployed wireless networks
861 -- 868Richard G. Clegg, Raul Landa, Miguel Rio. Criticisms of modelling packet traffic using long-range dependence (extended version)
869 -- 883Jinpyo Hong, Hwangnam Kim. An empirical framework for user mobility models: Refining and modeling user registration patterns
884 -- 897Sureshkumar V. Subramanian, Rudra Dutta. A study of performance and scalability metrics of a SIP proxy server - a practical approach
898 -- 916Lee Booi Lim, Lin Guan, Alan Grigg, Iain W. Phillips, Xin Gang Wang, Irfan-Ullah Awan. Controlling mean queuing delay under multi-class bursty and correlated traffic
917 -- 932Dong Kun Noh, Kyungtae Kang. Balanced energy allocation scheme for a solar-powered sensor system and its effects on network-wide performance

Volume 77, Issue 4

595 -- 596Fatos Xhafa, Leonard Barolli. Special issue foreword: Advances in pervasive computing systems and applications
597 -- 620François Siewe, Hussein Zedan, Antonio Cau. The Calculus of Context-aware Ambients
621 -- 636George Papamarkos, Alexandra Poulovassilis, Peter T. Wood. Performance modelling of Event-Condition-Action rules in P2P networks
637 -- 651Kefeng Xuan, Geng Zhao, David Taniar, J. Wenny Rahayu, Maytham Safar, Bala Srinivasan. Voronoi-based range and continuous range query processing in mobile databases
652 -- 664Jason B. Ernst, Mieso K. Denko. The design and evaluation of fair scheduling in wireless mesh networks
665 -- 676Jie Wang 0001, Lin Guan, Lee Booi Lim, Xin Gang Wang, Alan Grigg, Irfan Awan, I. Philips, Xuefen Chi. QoS enhancements and performance analysis for delay sensitive applications
677 -- 686Arjan Durresi, Mimoza Durresi, Leonard Barolli. Network trust management in emergency situations
687 -- 704Hai Dong, Farookh Khadeer Hussain, Elizabeth Chang. A framework for discovering and classifying ubiquitous services in digital health ecosystems
705 -- 719Tarek R. Sheltami, Elhadi Shakshuki, Hussein T. Mouftah. Video streaming application over WEAC protocol in MANET
720 -- 727Hui-Huang Hsu, Hsuan-Ting Liao. A mobile RFID-based tour system with instant microblogging
728 -- 737Timothy Y. Chow. Almost-natural proofs
738 -- 742Sebastiaan A. Terwijn, Leen Torenvliet, Paul M. B. Vitányi. Nonapproximability of the normalized information distance
743 -- 759Emilie Charlier, Marion Le Gonidec, Michel Rigo. Representing real numbers in a generalized numeration system
760 -- 773Sanjay Jain, Frank Stephan, Jason Teutsch. Index sets and universal numberings
774 -- 789Nadja Betzler, Jiong Guo, Christian Komusiewicz, Rolf Niedermeier. Average parameterization and partial kernelization for computing medians
790 -- 798Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei. Provably secure and efficient identification and key agreement protocol with user anonymity
799 -- 811Michael R. Fellows, Guillaume Fertin, Danny Hermelin, Stéphane Vialette. Upper and lower bounds for finding connected motifs in vertex-colored graphs
812 -- 819Cristian S. Calude, Nicholas J. Hay, Frank Stephan. Representation of left-computable ε-random reals
820 -- 833Vincent D. Blondel, Stéphane Gaubert, Natacha Portier. The set of realizations of a max-plus linear sequence is semi-polyhedral

Volume 77, Issue 3

449 -- 0Marcelo Arenas. Guest editorial: Special issue on database theory
450 -- 472Henrik Björklund, Wim Martens, Thomas Schwentick. Conjunctive query containment over trees
473 -- 490Nilesh N. Dalvi, Christopher Re, Dan Suciu. Queries and materialized views on probabilistic databases
491 -- 504Floris Geerts, Jan Van den Bussche. Relational completeness of query languages for annotated databases
505 -- 519Wouter Gelade, Frank Neven. Succinctness of pattern-based schema languages for XML
520 -- 541Claudio Gutierrez, Carlos A. Hurtado, Alberto O. Mendelzon, Jorge Pérez. Foundations of Semantic Web databases
542 -- 571Leonid Libkin, Cristina Sirangelo. Data exchange and schema mappings in open and closed worlds
572 -- 594Riccardo Rosati. On the finite controllability of conjunctive query answering in databases under open-world assumption

Volume 77, Issue 2

221 -- 222Rachid Anane, Muhammad Younas. Editorial for the special issue on Adaptivity in Heterogeneous Environments
223 -- 243Wei-Li Lin, Chi-Chun Lo, Kuo-Ming Chao, Nick Godwin. Multi-group QoS consensus for web services
244 -- 261Christian Glasner, Jens Volkert. Adaps - A three-phase adaptive prediction system for the run-time of jobs based on user behaviour
262 -- 281Agustín C. Caminero, Omer Rana, Blanca Caminero, Carmen Carrión. Network-aware heuristics for inter-domain meta-scheduling in Grids
282 -- 292Fuad Bajaber, Irfan Awan. Adaptive decentralized re-clustering protocol for wireless sensor networks
293 -- 304Martin Randles, David Lamb, E. Odat, A. Taleb-Bendiab. Distributed redundancy and robustness in complex systems
305 -- 321Richard John Anthony, Mona Ghassemian. Automatic mobility status estimation in wireless self-organised networks
322 -- 331Sandford Bessler, Alexander Fischer, eva Kühn, Richard Mordinyi, Slobodanka Tomic. Using tuple-spaces to manage the storage and dissemination of spatial-temporal content
332 -- 347Mohamed Ariff Ameedeen, Behzad Bordbar, Rachid Anane. Model interoperability via Model Driven Development
348 -- 371Qi Shi, Ning Zhang, Madjid Merabti. Fair exchange of valuable information: A generalised framework
372 -- 378Pablo Arrighi, Vincent Nesme, Reinhard F. Werner. Unitarity plus causality implies localizability
379 -- 392Bin Fu. Theory and application of width bounded geometric separators
393 -- 421Marco Manna, Francesco Scarcello, Nicola Leone. On the complexity of regular-grammars with integer attributes
422 -- 429Gregory Gutin, Eun Jung Kim, Stefan Szeider, Anders Yeo. A probabilistic approach to problems parameterized above or below tight bounds
430 -- 438Wendy Myrvold, William Kocay. Errors in graph embedding algorithms
439 -- 447Leah Epstein, Asaf Levin, Gerhard J. Woeginger. Graph coloring with rejection

Volume 77, Issue 1

1 -- 2Jin-yi Cai, Alan L. Selman. Foreword
3 -- 13Manindra Agrawal. The isomorphism conjecture for constant depth reductions
14 -- 40Eric Allender, Michal Koucký, Detlef Ronneburger, Sambuddha Roy. The pervasive reach of resource-bounded Kolmogorov complexity in computational complexity theory
41 -- 61Jin-yi Cai, Pinyan Lu. Holographic algorithms: From art to science
62 -- 90Chandan K. Dubey, Uriel Feige, Walter Unger. Hardness results for approximating the bandwidth
91 -- 106Lance Fortnow, Rahul Santhanam. Infeasibility of instance compression and succinct PCPs for NP
107 -- 121Parikshit Gopalan, Venkatesan Guruswami. Hardness amplification within NP against deterministic algorithms
122 -- 128Richard M. Karp. Heuristic algorithms in computational molecular biology
129 -- 141Subhash Khot, Rishi Saket. On the hardness of learning intersections of two halfspaces
142 -- 153David Buchfuhrer, Christopher Umans. The complexity of Boolean formula minimization
154 -- 166Leslie G. Valiant. A bridging model for multi-core computing
167 -- 190Ran Raz, Amir Yehudayoff. Multilinear formulas, maximal-partition discrepancy and mixed-sources extractors
191 -- 220Jesse Kamp, Anup Rao, Salil P. Vadhan, David Zuckerman. Deterministic extractors for small-space sources