Journal: J. Comput. Syst. Sci.

Volume 79, Issue 8

1199 -- 0Yanming Shen, Keqiu Li, Weisong Shi. Advanced topics on cloud computing
1200 -- 1213Wei Wu, Jianying Zhou, Yang Xiang, Li Xu. How to achieve non-repudiation of origin with privacy protection in cloud computing
1214 -- 1229Xuanhua Shi, Hongbo Jiang, Ligang He, Hai Jin, Chonggang Wang, Bo Yu, Xueguang Chen. Developing an optimized application hosting framework in Clouds
1230 -- 1242Yongqiang Gao, Haibing Guan, Zhengwei Qi, Yang Hou, Liang Liu. A multi-objective ant colony system algorithm for virtual machine placement in cloud computing
1243 -- 1255Waseem Ahmed, Yong-Wei Wu. A survey on reliability in distributed systems
1256 -- 1268Xingfu Wu, Valerie E. Taylor. Performance modeling of hybrid MPI/OpenMP scientific applications on large-scale multicore supercomputers
1269 -- 1286Iain A. Stewart. Multiswapped networks and their topological and algorithmic properties
1287 -- 1301Zoltán Ádám Mann, Aniko Szajko. Average-case complexity of backtrack search for coloring sparse random graphs
1302 -- 1321Michael Benedikt, Gabriele Puppis, Cristian Riveros. Bounded repairability of word languages
1322 -- 1340Krishnaram Kenthapadi, Nina Mishra, Kobbi Nissim. Denials leak information: Simulatable auditing
1341 -- 1351Miguel Caballer, Carlos de Alfonso, Fernando Alvarruiz, Germán Moltó. EC3: Elastic Cloud Computing Cluster

Volume 79, Issue 7

1003 -- 1004Tomoya Enokido, Leonard Barolli, Makoto Takizawa. Special issue on intelligent and innovative information systems
1005 -- 1016Joseph Kee-Yin Ng, Kam-yiu Lam, Quan Jia Cheng, Kevin Chin Yiu Shum. An effective signal strength-based wireless location estimation system for tracking indoor mobile users
1017 -- 1039David Taniar, Wenny Rahayu. A taxonomy for nearest neighbour queries in spatial databases
1040 -- 1056Anhar Fazal, Farookh Khadeer Hussain, Tharam S. Dillon. An innovative approach for automatically grading spelling in essays using rubric-based scoring
1057 -- 1076Rubén Casado, Muhammad Younas, Javier Tuya. Multi-dimensional criteria for testing web services transactions
1077 -- 1085Minoru Uehara. Advanced orthogonal RAID based on virtual disks
1086 -- 1100Fatos Xhafa, Xavier Herrero, Admir Barolli, Leonard Barolli, Makoto Takizawa. Evaluation of struggle strategy in Genetic Algorithms for ground stations scheduling problem
1101 -- 1112Akio Koyama, Hiroyuki Suzuki. Real object-oriented communication method for ad hoc networks
1113 -- 1125Nils Müllner, Oliver E. Theel, Martin Fränzle. Combining decomposition and reduction for state space analysis of a self-stabilizing system
1126 -- 1143Mark McCann, Nicholas Pippenger. Fault tolerance in cellular automata at low fault rates
1144 -- 1155Lavinia Egidi, Giovanni Manzini. Better spaced seeds using Quadratic Residues
1156 -- 1163Uéverton dos Santos Souza, Fábio Protti, Maise Dantas da Silva. Revisiting the complexity of and/or graph solution
1164 -- 1180Dariusz R. Kowalski, Andrzej Pelc. Leader election in ad hoc radio networks: A keen ear helps
1181 -- 1198Yuan Feng, Nengkun Yu, Mingsheng Ying. Model checking quantum Markov chains

Volume 79, Issue 6

737 -- 738Pablo Barceló. Editor's foreword
739 -- 762Serge Abiteboul, Balder ten Cate, Yannis Katsis. On the equivalence of distributed systems with queries and communication
763 -- 784Marcelo Arenas, Jorge Pérez 0001, Juan L. Reutter, Cristian Riveros. The language of plain SO-tgds: Composition, inversion and structural properties
785 -- 815Mikolaj Bojanczyk, Leszek Aleksander Kolodziejczyk, Filip Murlak. Solutions in XML data exchange
816 -- 834Diego Calvanese, Giuseppe De Giacomo, Maurizio Lenzerini, Moshe Y. Vardi. On simplification of schema mappings
835 -- 872Evgeny Kharlamov, Dmitriy Zheleznyakov, Diego Calvanese. Capturing model-based ontology evolution at the instance level: The case of DL-Lite
873 -- 891Ting Deng, Wenfei Fan, Leonid Libkin, Yinghui Wu. On the aggregation problem for synthesized Web services
892 -- 909Dominik D. Freydenberger, Nicole Schweikardt. Expressiveness and static analysis of extended conjunctive regular path queries
910 -- 936Wouter Gelade, Tomasz Idziaszek, Wim Martens, Frank Neven, Jan Paredaens. Simplifying XML Schema: Single-type approximations of regular tree languages
937 -- 957Michael Meier 0002, Michael Schmidt, Fang Wei, Georg Lausen. Semantic query optimization in the presence of types
958 -- 983Dany Maslowski, Jef Wijsen. A dichotomy in the complexity of counting database repairs
984 -- 1001Reinhard Pichler, Sebastian Skritek. Tractable counting of the answers to conjunctive queries

Volume 79, Issue 5

515 -- 517Guojun Wang, Jianhua Ma, Xiaolin Andy Li, Athanasios V. Vasilakos. Special issue of JCSS on UbiSafe computing and communications
518 -- 529Meikang Qiu, Lei Zhang, Zhong Ming, Zhi Chen, Xiao Qin, Laurence T. Yang. Security-aware optimization for ubiquitous computing systems with SEAT graph approach
530 -- 541Chaitanya Belwal, Albert M. K. Cheng, Bo Liu. Feasibility interval for the transactional event handlers of P-FRP
542 -- 555Xuyun Zhang, Chang Liu, Surya Nepal, Jinjun Chen. An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud
556 -- 572Zheng Yan, Yu Chen, Yue Shen. A practical reputation system for pervasive social chatting
573 -- 585Jun Zhang, Yang Xiang, Wanlei Zhou, Yu Wang. Unsupervised traffic classification using flow statistical properties and IP packet payload
586 -- 595Sancheng Peng, Guojun Wang, Shui Yu. Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones
596 -- 608Xing Su, Minjie Zhang, Yi Mu, Quan Bai. A robust trust model for service-oriented systems
609 -- 621Jianxin Wang, Yongjie Yang, Jiong Guo, Jianer Chen. Planar graph vertex partition for linear problem kernels
622 -- 639Dominik D. Freydenberger, Daniel Reidenbach. Inferring descriptive generalisations of formal languages
640 -- 657Krishnendu Chatterjee, Luca de Alfaro, Thomas A. Henzinger. Strategy improvement for concurrent reachability and turn-based stochastic safety games
658 -- 668Hamed M. K. Alazemi, Anton Cerný. Several extensions of the Parikh matrix L-morphism
669 -- 688Nai-Wen Chang, Sun-Yuan Hsieh. {2,3}-Extraconnectivities of hypercube-like networks
689 -- 713Stéphane Demri. On selective unboundedness of VASS
714 -- 724Olivier Bournez, Daniel S. Graça, Emmanuel Hainry. Computation with perturbed dynamical systems
725 -- 736Rohit Khandekar, Guy Kortsarz, Zeev Nutov. On some network design problems with degree constraints

Volume 79, Issue 4

403 -- 405Hamid Sarbazi-Azad, Nader Bagherzadeh. Multicore computing systems: Architecture, programming tools, and applications
406 -- 420Morteza Mohaqeqi, Mehdi Kargahi. Utility accrual object distribution in MPSoC real-time embedded systems
421 -- 439Chifeng Wang, Wen-Hsiang Hu, Nader Bagherzadeh. Scalable load balancing congestion-aware Network-on-Chip router architecture
440 -- 456Amir-Mohammad Rahmani, Pasi Liljeberg, Juha Plosila, Hannu Tenhunen. Developing a power-efficient and low-cost 3D NoC using smart GALS-based vertical channels
457 -- 474A. Mahabadi, S. M. Zahedi, Ahmad Khonsari. Reliable energy-aware application mapping and voltage-frequency island partitioning for GALS-based NoC
475 -- 491Masoumeh Ebrahimi, Masoud Daneshtalab, Pasi Liljeberg, Juha Plosila, Hannu Tenhunen. Cluster-based topologies for 3D Networks-on-Chip using advanced inter-layer bus architecture
492 -- 513Mohammad Arjomand, S. Hamid Amiri, Hamid Sarbazi-Azad. Efficient genetic based topological mapping using analytical models for on-chip networks

Volume 79, Issue 3

309 -- 311Alfredo Cuzzocrea. Theoretical and practical aspects of warehousing, querying and mining sensor and streaming data
312 -- 329Rimma V. Nehme, Karen Works, Chuan Lei, Elke A. Rundensteiner, Elisa Bertino. Multi-route query processing and optimization
330 -- 348Karen Works, Elke A. Rundensteiner, Emmanuel Agu. Optimizing adaptive multi-route query processing via time-partitioned indices
349 -- 368Georgios Chatzimilioudis, Alfredo Cuzzocrea, Dimitrios Gunopulos, Nikos Mamoulis. A novel distributed framework for optimizing query routing trees in wireless sensor networks via optimal operator placement
369 -- 382Mohamed Medhat Gaber, Shonali Krishnaswamy, Brett Gillick, Hasnain AlTaiar, Nicholas Nicoloudis, Jonathan Liono, Arkady B. Zaslavsky. Interactive self-adaptive clutter-aware visualisation for mobile data mining
383 -- 401Lu-An Tang, Xiao Yu, Sangkyum Kim, Quanquan Gu, Jiawei Han, Alice Leung, Thomas F. La Porta. Trustworthiness analysis of sensor data in cyber-physical systems

Volume 79, Issue 2

173 -- 174Xiaolong Jin, Ahmed Yassin Al-Dubai, Laurence Tianruo Yang. Special issue: Frontiers and advance topics of computer and information technology
175 -- 186John M. Ye, Man Cao, Zening Qu, Tianzhou Chen. Regional cache organization for NoC based many-core processors
187 -- 200Dingding Li, Hai Jin, Xiaofei Liao, Yu Zhang, Bing Bing Zhou. Improving disk I/O performance in a virtualized system
201 -- 215Gang Chen 0003, Yongwei Wu, Jie Wu 0001, Weimin Zheng. TopCluster: A hybrid cluster model to support dynamic deployment in Grid
216 -- 229You Li, Kaiyong Zhao, Xiaowen Chu, Jiming Liu. Speeding up k-Means algorithm by GPUs
230 -- 244Ranieri Baraglia, Gabriele Capannini, Patrizio Dazzi, Giancarlo Pagano. A multi-criteria job scheduling framework for large computing farms
245 -- 255Lihong Zheng, Xiangjian He, Bijan Samali, Laurence Tianruo Yang. An algorithm for accuracy enhancement of license plate recognition
256 -- 268Jun Ma, Long Zheng, Mianxiong Dong, Xiangjian He, Minyi Guo, Yuichi Yaguchi, Ryuichi Oka. A segmentation-free method for image classification based on pixel-wise matching
269 -- 278Junfeng Xu, Keqiu Li, Geyong Min. Asymmetric multi-path division communications in underwater acoustic networks with fading channels
279 -- 290Guojun Wang, Fengshun Yue, Qin Liu. A secure self-destructing scheme for electronic data
291 -- 308Ranieri Baraglia, Patrizio Dazzi, Matteo Mordacchini, Laura Ricci. A peer-to-peer recommender system for self-emerging user communities based on gossip overlays

Volume 79, Issue 1

1 -- 6Fedor V. Fomin, Serge Gaspers, Saket Saurabh, Stéphan Thomassé. A linear vertex kernel for maximum internal spanning tree
7 -- 22Florin Manea, Catalin Tiseanu. The hardness of counting full words compatible with partial words
23 -- 38Stéphane Demri, Marcin Jurdzinski, Oded Lachish, Ranko Lazic. The covering and boundedness problems for branching vector addition systems
39 -- 49Klaus Jansen, Stefan Kratsch, Dániel Marx, Ildikó Schlotter. Bin packing with fixed number of bins revisited
50 -- 67Bhaskar DasGupta, Devendra Desai. On the complexity of Newman's community finding approach for biological and social networks
68 -- 78Leslie Ann Goldberg, Mark Jerrum. Approximating the Tutte polynomial of a binary matroid and other related combinatorial polynomials
79 -- 100Manuel Bodirsky, Víctor Dalmau. Datalog and constraint satisfaction with infinite templates
101 -- 110Juha Honkala. The sequence equivalence problem for primitive D0L systems
111 -- 121Alexander Kesselman, Kirill Kogan, Sergey Nemzer, Michael Segal. Space and speed tradeoffs in TCAM hierarchical packet classification
122 -- 130Longyan Gong, Jingxin Pan, Beibei Liu, Shengmei Zhao. A novel one-time password mutual authentication scheme on sharing renewed finite random sub-passwords
131 -- 143Peide Liu. Some generalized dependent aggregation operators with intuitionistic linguistic numbers and their application to group decision making
144 -- 151Dániel Marx. Completely inapproximable monotone and antimonotone parameterized problems
152 -- 172Yongzhi Cao, Lirong Xia, Mingsheng Ying. Probabilistic automata for computing with words