515 | -- | 517 | Guojun Wang, Jianhua Ma, Xiaolin Andy Li, Athanasios V. Vasilakos. Special issue of JCSS on UbiSafe computing and communications |
518 | -- | 529 | Meikang Qiu, Lei Zhang, Zhong Ming, Zhi Chen, Xiao Qin, Laurence T. Yang. Security-aware optimization for ubiquitous computing systems with SEAT graph approach |
530 | -- | 541 | Chaitanya Belwal, Albert M. K. Cheng, Bo Liu. Feasibility interval for the transactional event handlers of P-FRP |
542 | -- | 555 | Xuyun Zhang, Chang Liu, Surya Nepal, Jinjun Chen. An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud |
556 | -- | 572 | Zheng Yan, Yu Chen, Yue Shen. A practical reputation system for pervasive social chatting |
573 | -- | 585 | Jun Zhang, Yang Xiang, Wanlei Zhou, Yu Wang. Unsupervised traffic classification using flow statistical properties and IP packet payload |
586 | -- | 595 | Sancheng Peng, Guojun Wang, Shui Yu. Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones |
596 | -- | 608 | Xing Su, Minjie Zhang, Yi Mu, Quan Bai. A robust trust model for service-oriented systems |
609 | -- | 621 | Jianxin Wang, Yongjie Yang, Jiong Guo, Jianer Chen. Planar graph vertex partition for linear problem kernels |
622 | -- | 639 | Dominik D. Freydenberger, Daniel Reidenbach. Inferring descriptive generalisations of formal languages |
640 | -- | 657 | Krishnendu Chatterjee, Luca de Alfaro, Thomas A. Henzinger. Strategy improvement for concurrent reachability and turn-based stochastic safety games |
658 | -- | 668 | Hamed M. K. Alazemi, Anton Cerný. Several extensions of the Parikh matrix L-morphism |
669 | -- | 688 | Nai-Wen Chang, Sun-Yuan Hsieh. {2,3}-Extraconnectivities of hypercube-like networks |
689 | -- | 713 | Stéphane Demri. On selective unboundedness of VASS |
714 | -- | 724 | Olivier Bournez, Daniel S. Graça, Emmanuel Hainry. Computation with perturbed dynamical systems |
725 | -- | 736 | Rohit Khandekar, Guy Kortsarz, Zeev Nutov. On some network design problems with degree constraints |