Journal: J. Comput. Syst. Sci.

Volume 80, Issue 8

1491 -- 1492Yang Xiang, Ivan Stojmenovic, Peter Mueller. Editorial: Special Issue on Theory and Applications in Parallel and Distributed Computing Systems
1493 -- 1503Hua Wang, Lili Sun, Elisa Bertino. Building access control policy model for privacy preserving and testing policy conflicting problems
1504 -- 1517Ahmed Sallam, Kenli Li, Aijia Ouyang, Zhiyong Li 0001. Proactive workload management in dynamic virtualized environments
1518 -- 1533Lan Zhou, Vijay Varadharajan, Michael Hitchens. Secure administration of cryptographic role-based access control for large-scale cloud storage systems
1534 -- 1548Zhide Chen, Cheng Qiao, Yihui Qiu, Li Xu, Wei Wu. Dynamics stability in wireless sensor networks active defense model
1549 -- 1562Guiyi Wei, Rongxing Lu, Jun Shao. EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption
1563 -- 1583Chi Yang, Xuyun Zhang, Changmin Zhong, Chang Liu, Jian Pei, Kotagiri Ramamohanarao, Jinjun Chen. A spatiotemporal compression based approach for efficient big data processing on Cloud
1584 -- 1596Younchan Jung, Enrique Festijo. One-time packet key exchange scheme for secure real-time multimedia applications
1597 -- 1614Sébastien Gambs, Marc-Olivier Killijian, Miguel Núñez del Prado Cortez. De-anonymization attack on geolocated data

Volume 80, Issue 7

1175 -- 1190Julio Aracena, A. Richard, Lilian Salinas. Maximum number of fixed points in AND-OR-NOT networks
1191 -- 1213Tom J. Ameloot, Jan Van den Bussche. Positive Dedalus programs tolerate non-causality
1214 -- 1244Edith Cohen, Nick G. Duffield, Haim Kaplan, Carsten Lund, Mikkel Thorup. Algorithms and estimators for summarization of unaggregated data streams
1245 -- 1253Amihood Amir, Alberto Apostolico, Gad M. Landau, Avivit Levy, Moshe Lewenstein, Ely Porat. Range LCP
1254 -- 1265Jesús García-López, Florin Manea, Victor Mitrana. Prefix-suffix duplication
1266 -- 1284Nikolaos Laoutaris, Laura J. Poplawski, Rajmohan Rajaraman, Ravi Sundaram, Shang-Hua Teng. Bounded Budget Connection (BBC) games or how to make friends and influence people, on a budget
1285 -- 1297Cristina Bazgan, Morgan Chopin, Marek Cygan, Michael R. Fellows, Fedor V. Fomin, Erik Jan van Leeuwen. Parameterized complexity of firefighting
1298 -- 1322Manfred Broy. Verifying of interface assertions for infinite state Mealy machines
1323 -- 1338Amir Talaei-Khoei, Suchada Vichitvanichphong, Terje Solvoll, Pradeep Ray, Amir Hossein Ghapanchi. A methodology to develop awareness in computer supported collaborative work using policies
1339 -- 1349Chunguang Li, Shouzhen Zeng, Tiejun Pan, Leina Zheng. A method based on induced aggregation operators and distance measures to multiple attribute decision making under 2-tuple linguistic environment
1350 -- 1358Haitao Jiang, Binhai Zhu. A linear kernel for the complementary maximal strip recovery problem
1359 -- 1373Christian Glaßer, Stephen D. Travers, Klaus W. Wagner. Perfect correspondences between dot-depth and polynomial-time hierarchies
1374 -- 1383Fedor V. Fomin, Yngve Villanger. Searching for better fill-in
1384 -- 1403Matthias Mnich, Geevarghese Philip, Saket Saurabh, Ondrej Suchý. Beyond Max-Cut: λ-extendible properties parameterized above the Poljak-Turzík bound
1404 -- 1414Moein Kianpour, Reza Sabbaghi-Nadooshan, Keivan Navi. A novel design of 8-bit adder/subtractor by quantum-dot cellular automata
1415 -- 1429Albert Atserias, Sergi Oliva. Bounded-width QBF is PSPACE-complete
1430 -- 1447Fedor V. Fomin, Stefan Kratsch, Marcin Pilipczuk, Michal Pilipczuk, Yngve Villanger. Tight bounds for parameterized complexity of Cluster Editing with a small number of clusters
1448 -- 1489Sergio Flesca, Filippo Furfaro, Francesco Parisi. Consistency checking and querying in probabilistic databases under integrity constraints

Volume 80, Issue 6

1037 -- 0Lev D. Beklemishev, Ruy J. G. B. de Queiroz, Andre Scedrov. Editors' foreword
1038 -- 1045Antonis Achilleos. A complexity question in justification logic
1046 -- 1066Samuel Bucheli, Roman Kuznets, Thomas Studer. Realizing public announcements by justifications
1067 -- 1086Ranald Clouston. Nominal Lawvere Theories: A category theoretic account of equational theories with names
1087 -- 1101Francicleber Martins Ferreira, Cibele Matos Freire, Mario R. F. Benevides, L. Menasché Schechter, Ana Teresa C. Martins. Polynomial hierarchy graph properties in hybrid logic
1102 -- 1118Santiago Figueira, Daniel Gorín, Rafael Grimson. Independence friendly logic with classical negation via flattening is a second-order logic with weak dependencies
1119 -- 1137Julian Gutierrez, Glynn Winskel. On the determinacy of concurrent games on event structures with infinite winning sets
1138 -- 1151Max I. Kanovich. Multiset rewriting over Fibonacci and Tribonacci numbers
1152 -- 1162Juha Kontinen, Jakub Szymanik. A characterization of definability of second-order generalized quantifiers with applications to non-definability
1163 -- 1173Rick Statman. On polymorphic types of untyped terms

Volume 80, Issue 5

901 -- 0Rebecca Capone. Publisher's note
902 -- 0Jinjun Chen, Jianxun Liu. Special Issue: Dependable and Secure Computing
903 -- 915Yongming Xie, Guojun Wang. Message matching-based greedy behavior detection in delay tolerant networks
916 -- 934Aarthi Nagarajan, Vijay Varadharajan, Nathan Tarr. Trust enhanced distributed authorisation for web services
935 -- 952Christopher Bailey, David W. Chadwick, Rogério de Lemos. Self-adaptive federated authorization infrastructures
953 -- 972Atef Shalan, Mohammad Zulkernine. Software control flow error detection and correlation with system performance deviation
973 -- 993Julian Jang-Jaccard, Surya Nepal. A survey of emerging threats in cybersecurity
994 -- 1007Jiaqi Zhao, Lizhe Wang, Jie Tao, Jinjun Chen, Weiye Sun, Rajiv Ranjan, Joanna Kolodziej, Achim Streit, Dimitrios Georgakopoulos. A security framework in G-Hadoop for big data computing across distributed Cloud data centres
1008 -- 1020Xuyun Zhang, Chang Liu, Surya Nepal, Chi Yang, Wanchun Dou, Jinjun Chen. A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud
1021 -- 1036Yu Wang, Yang Xiang, Jun Zhang, Wanlei Zhou, Bailin Xie. Internet traffic clustering with side information

Volume 80, Issue 4

687 -- 696Robert Crowston, Michael R. Fellows, Gregory Gutin, Mark Jones, E.-J. Kim, Fran Rosamond, Imre Z. Ruzsa, Stéphan Thomassé, Anders Yeo. Satisfying more than half of a system of linear equations over GF(2): A multivariate approach
697 -- 710Edith Hemaspaandra, Lane A. Hemaspaandra, Jörg Rothe. The complexity of online manipulation of sequential elections
711 -- 719Gabriele Fici. On the structure of bispecial Sturmian words
720 -- 743Stanislav Böhm, Stefan Göller, Petr Jancar. Bisimulation equivalence and regularity for real-time one-counter automata
744 -- 765Richard Královic. Infinite vs. finite size-bounded randomized computations
766 -- 776Sam Buss, Michael Soltys. Unshuffling a square is NP-hard
777 -- 795Sanjay Jain, Eric Martin 0002, Frank Stephan. Robust learning of automatic classes of languages
796 -- 805Carlos Gómez-Rodríguez. Finding the smallest binarization of a CFG is NP-hard
806 -- 820John Case, Sanjay Jain, Yuh Shin Ong, Pavel Semukhin, Frank Stephan. Automatic learners with feedback queries
821 -- 836Stefania Tosi, Sara Casolari, Michele Colajanni. Detecting correlation between server resources for system management
837 -- 848Qi Duan, Jinhui Xu. On the connectivity preserving minimum cut problem
849 -- 859Ali Çivril. Column Subset Selection Problem is UG-hard
860 -- 900Danny Dolev, Matthias Függer, Markus Posch, Ulrich Schmid, Andreas Steininger, Christoph Lenzen. Rigorously modeling self-stabilizing fault-tolerant circuits: An ultra-robust clocking scheme for systems-on-chip

Volume 80, Issue 3

499 -- 501Al-Sakib Khan Pathan, Zubair Md. Fadlullah, Mostafa Fouda, Hae Young Lee. Defending against wireless network intrusion
502 -- 519Alif Wahid, Christopher Leckie, Chenfeng Vincent Zhou. Estimating the number of hosts corresponding to an intrusion alert while preserving privacy
520 -- 532Yifan Zhao, Swee-Won Lo, Robert H. Deng, Xuhua Ding. Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks
533 -- 545Yang Yang. Broadcast encryption based non-interactive key distribution in MANETs
546 -- 553Zhiwei Wang, Guozi Sun, Danwei Chen. A new definition of homomorphic signature for identity management in mobile cloud computing
554 -- 570Paulo Manoel Mafra, Joni da Silva Fraga, Altair Olivo Santin. Algorithms for a distributed IDS in MANETs
571 -- 590Manuel Gil Pérez, Félix Gómez Mármol, Gregorio Martínez Pérez, Antonio F. Gómez-Skarmeta. Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems
591 -- 601Saeed-ur Rehman, Kevin W. Sowerby, Colin Coghill. Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers
602 -- 617Guangjie Han, Jinfang Jiang, Lei Shu, Jianwei Niu, Han-Chieh Chao. Management and applications of trust in Wireless Sensor Networks: A survey
618 -- 643Thanassis Giannetsos, Tassos Dimitriou. LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks
644 -- 653Hosein Shafiei, Ahmad Khonsari, H. Derakhshi, P. Mousavi. Detection and mitigation of sinkhole attacks in wireless sensor networks
654 -- 669Mauro Conti, Roberto Di Pietro, Angelo Spognardi. Clone wars: Distributed detection of clone attacks in mobile WSNs
670 -- 685Leonardo Maccari, Renato Lo Cigno. Betweenness estimation in OLSR-based multi-hop networks for distributed filtering

Volume 80, Issue 2

321 -- 322Anuj Dawar, Ruy J. G. B. de Queiroz. Editor's foreword: WoLLIC 2010
323 -- 345Naeem Abbasi, Osman Hasan, Sofiène Tahar. An approach for lifetime reliability analysis using theorem proving
346 -- 362Aditi Barthwal, Michael Norrish. A mechanisation of some context-free language theory in HOL4
363 -- 374Tomer Kotek, Johann A. Makowsky. A representation theorem for (q-)holonomic sequences
375 -- 389Markus Latte, Martin Lange. Branching-time logics with path relativisation
390 -- 409Glyn Morrill, Oriol Valentín. Displacement logic for anaphora
410 -- 425Renata Hax Sander Reiser, Benjamín C. Bedregal, G. A. A. dos Reis. Interval-valued fuzzy coimplications and related dual interval-valued conjugate functions
427 -- 449Nadia Creignou, Odile Papini, Reinhard Pichler, Stefan Woltran. Belief revision within fragments of propositional logic
450 -- 456Aryeh Kontorovich, Ari Trachtenberg. Deciding unique decodability of bigram counts via finite automata
457 -- 467Adrian Ionescu, Ernst L. Leiss. On the role of complementation in implicit language equations and relations
468 -- 495Fedor V. Fomin, Bart M. P. Jansen, Michal Pilipczuk. Preprocessing subgraph and minor problems: When does a small vertex cover help?
496 -- 497William Hesse, Eric Allender, David A. Mix Barrington. Corrigendum to "Uniform constant-depth threshold circuits for division and iterated multiplication" [J. Comput. System Sci. 65(4) (2002) 695-716]

Volume 80, Issue 1

1 -- 2S. Ventura, C. Romero, A. Abraham. Foreword: Intelligent data analysis
3 -- 15Manuel Baena-García, José M. Carmona-Cejudo, Rafael Morales Bueno. String analysis by sliding positioning strategy
16 -- 26Prakash Shelokar, Arnaud Quirin, Oscar Cordón. Three-objective subgraph mining using multiobjective evolutionary programming
27 -- 38Abir Smiti, Zied Elouedi. WCOID-DG: An approach for case base maintenance based on Weighting, Clustering, Outliers, Internal Detection and Dbsan-Gmeans
39 -- 56Ricardo Cerri, Rodrigo C. Barros, André Carlos Ponce Leon Ferreira de Carvalho. Hierarchical multi-label classification using local neural networks
57 -- 71Alvaro Ortigosa, Rosa M. Carro, José Ignacio Quiroga. Predicting user personality by mining social interactions in Facebook
72 -- 87Pasquale De Meo, Emilio Ferrara, Giacomo Fiumara, Alessandro Provetti. Mixing local and global information for community detection in large networks
88 -- 100José Otero, Luciano Sánchez, Inés Couso, Ana M. Palacios. Bootstrap analysis of multiple repetitions of experiments using an interval-valued multiple comparison procedure
101 -- 117David Garcia, Antonio González, Raúl Pérez. A feature construction approach for genetic iterative rule learning algorithm
118 -- 136Maria Martínez-Ballesteros, Isabel A. Nepomuceno-Chamorro, José C. Riquelme. Discovering gene association networks by multi-objective evolutionary quantitative association rules
139 -- 156Tomás Brázdil, Václav Brozek, Vojtech Forejt, Antonín Kucera. Branching-time model-checking of probabilistic pushdown automata
157 -- 179Fedor V. Fomin, Petr A. Golovach. Parameterized complexity of connected even/odd subgraph problems
180 -- 194Robert Ganian, Petr Hlinený, Alexander Langer, Jan Obdrzálek, Peter Rossmanith, Somnath Sikdar. 1 model-checking
195 -- 206Kaiping Xue, Peilin Hong, Changsha Ma. A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture
207 -- 216Archontia C. Giannopoulou, Iosif Salem, Dimitris Zoros. Effective computation of immersion obstructions for unions of graph classes
217 -- 236Jin-yi Cai, Pinyan Lu, Mingji Xia. The complexity of complex weighted Boolean #CSP
237 -- 256Shuping Wan, Jiuying Dong. A possibility degree method for interval-valued intuitionistic fuzzy multi-attribute group decision making
257 -- 276Paolo Romano, Roberto Palmieri, Francesco Quaglia, Nuno Carvalho, Luís Rodrigues. On speculative replication of transactional systems
277 -- 296Arnaud Durand, Stefan Mengel. The complexity of weighted counting for acyclic conjunctive queries
297 -- 319Mika Göös, Tuomo Lempiäinen, Eugen Czeizler, Pekka Orponen. Search methods for tile sets in patterned DNA self-assembly