Journal: J. Comput. Syst. Sci.

Volume 81, Issue 8

1415 -- 1416Tomoya Enokido, Leonard Barolli, Makoto Takizawa. Journal of Computer and System Sciences Special Issue on Reliability and Optimization for Wireless Networking and Cloud Computing
1417 -- 1428Fatos Xhafa, Christian Sánchez, Admir Barolli, Makoto Takizawa. Solving mesh router nodes placement problem in Wireless Mesh Networks by Tabu Search algorithm
1429 -- 1440Marcelo Luiz Brocardo, Issa Traoré, Isaac Woungang. Authorship verification of e-mail and tweet messages applied for continuous authentication
1441 -- 1451Shigenari Nakamura, Dilawaer Duolikun, Makoto Takizawa. Read-abortion (RA) based synchronization protocols to prevent illegal information flow
1452 -- 1463José Luis Hernández Ramos, María Victoria Moreno, Jorge Bernal Bernabé, Dan García Carrillo, Antonio F. Skarmeta. SAFIR: Secure access framework for IoT-enabled services on smart buildings
1464 -- 1478Arcangelo Castiglione, Francesco Palmieri, Ugo Fiore, Aniello Castiglione, Alfredo De Santis. Modeling energy-efficient secure communications in multi-mode wireless mobile devices
1479 -- 1495Amin M. Khan, Ümit Cavus Büyüksahin, Felix Freitag. Incentive-based resource assignment and regulation for collaborative cloud services in community networks
1496 -- 1507Admir Barolli, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa, Vincenzo Loia. Node placement for wireless mesh networks: Analysis of WMN-GA system simulation results for different parameters and distributions
1508 -- 1531David Taniar, J. Wenny Rahayu. A taxonomy for region queries in spatial databases
1532 -- 1541Jin Li, Xiaofeng Chen 0001, Fatos Xhafa, Leonard Barolli. Secure deduplication storage systems supporting keyword search
1542 -- 1555Ricardo Garibay-Martínez, Geoffrey Nelissen, Luis Lino Ferreira, Luís Miguel Pinho. Task partitioning and priority assignment for distributed hard real-time systems
1556 -- 1574Laurent Bulteau, Guillaume Fertin, Irena Rusu. Pancake Flipping is hard
1575 -- 1591Laurent Bienvenu, Rodney G. Downey, André Nies, Wolfgang Merkle. Solovay functions and their applications in algorithmic randomness
1592 -- 1613Verónica Becher, Olivier Carton, Pablo Ariel Heiber. Normality and automata
1614 -- 1622Gábor Horváth, Chrystopher L. Nehaniv. Length of polynomials over finite groups
1623 -- 1647Laurent Boyer, Martin Delacourt, Victor Poupet, Mathieu Sablik, Guillaume Theyssier. μ-Limit sets of cellular automata from a computational complexity perspective
1648 -- 1664Emmanuel Jeandel, Pascal Vanier. Hardness of conjugacy, embedding and factorization of multidimensional subshifts
1665 -- 1677Marek Karpinski, Michael Lampis, Richard Schmied. New inapproximability bounds for TSP
1678 -- 1697Radim Belohlávek, Martin Trnecka. From-below approximations in Boolean matrix factorization: Geometry and new algorithm
1698 -- 1714Steven Fortune. Equivalence and generalization in a layered network model
1715 -- 1747Dariusz Dereniowski, Wieslaw Kubiak, Yori Zwols. The complexity of minimum-length path decompositions

Volume 81, Issue 7

1059 -- 1087Javier Ignacio Almarza, Santiago Figueira. Normality in non-integer bases and polynomial time randomness
1088 -- 1109John Augustine, Gopal Pandurangan, Peter Robinson 0002, Eli Upfal. Distributed agreement in dynamic peer-to-peer networks
1110 -- 1126Qusai Shambour, Jie Lu. An effective recommender system by unifying user and item trust information for B2B applications
1127 -- 1143David A. Cohen, Martin C. Cooper, Guillaume Escamocher, Stanislav Zivny. Variable and value elimination in binary constraint satisfaction via forbidden patterns
1144 -- 1158Lvzhou Li, Yuan Feng. On hybrid models of quantum finite automata
1159 -- 1170Jhih-Hong Ye, Biing-Feng Wang. On the minmax regret path median problem on trees
1171 -- 1193John Fearnley, Doron Peled, Sven Schewe. Synthesis of succinct systems
1194 -- 1209Susanne Albers, Antonios Antoniadis, Gero Greiner. On multi-processor speed scaling with migration
1210 -- 1220Cristina G. Fernandes, Maya Jakobine Stein. Geodesic stability for memoryless binary long-lived consensus
1221 -- 1251Atle Refsdal, Ragnhild Kobro Runde, Ketil Stølen. Stepwise refinement of sequence diagrams with soft real-time constraints
1252 -- 1277Sylvain Salvati. 2 is captured by the IO and the OI hierarchies
1278 -- 1297Leonid Libkin, Tony Tan, Domagoj Vrgoc. Regular expressions for data words
1298 -- 1310Florin Manea, Mike Müller, Dirk Nowotka. Cubic patterns with permutations
1311 -- 1332Christer Bäckström, Peter Jonsson, Sebastian Ordyniak, Stefan Szeider. A complete parameterized complexity analysis of bounded planning
1333 -- 1356Pierluigi Crescenzi, Daniel Gildea, Andrea Marino, Gianluca Rossi, Giorgio Satta. Synchronous context-free grammars and optimal linear parsing strategies
1373 -- 1386Gábor Ivanyos, Marek Karpinski, Youming Qiao, Miklos Santha. Generalized Wong sequences and their applications to Edmonds' problems
1387 -- 1412George Barmpalias, Rodney G. Downey, Michael McInerney. Integer valued betting strategies and Turing degrees
1413 -- 0Tianrong Lin. Corrigendum to "Another approach to the equivalence of measure-many one-way quantum infinite automata and its application" [J. Comput. Syst. Sci. 78(3) (2012) 807-821]

Volume 81, Issue 6

941 -- 942Anne E. James. Optimisation, security, privacy and trust in e-business systems
943 -- 957Goodhead Tomvie Abraham, Anne E. James, Norlaily Yaacob. Priority-grouping method for parallel multi-scheduling in Grid
958 -- 965Ahmad Al-Daraiseh, Eyas El-Qawasmeh, Nazaraf Shah. Multi-agent system for energy consumption optimisation in higher education institutions
966 -- 980Chen-Fang Tsai. Dynamic grey platform for efficient forecasting management
981 -- 999Waleed Bul'ajoul, Anne E. James, mandeep Pannu. Improving network intrusion detection system performance through quality of service configuration and parallel technology
1000 -- 1011Fran Casino, Josep Domingo-Ferrer, Constantinos Patsakis, Domènec Puig, Agusti Solanas. A k-anonymous approach to privacy preserving collaborative filtering
1012 -- 1026Ping Wang, Yu-Shih Wang. Malware behavioural detection and vaccine development by using a support vector model classifier
1027 -- 1041Shan Chang, Li Lu, Xiaoqiang Liu, Hui Song, Qingsong Yao. Vulnerability aware graphs for RFID protocol security benchmarking
1042 -- 1058Neeraj Kumar, Rahat Iqbal, Sudip Misra, Joel J. P. C. Rodrigues. An intelligent approach for building a secure decentralized public key infrastructure in VANET

Volume 81, Issue 5

797 -- 798Dirk Pattinson, Lutz Schröder. From the Editors
799 -- 812Samson Abramsky, Jonathan A. Zvesper. From Lawvere to Brandenburger-Keisler: Interactive forms of diagonalization and self-reference
813 -- 833Jirí Adámek, Stefan Milius, Lawrence S. Moss, Henning Urbat. On finitary functors and their presentations
834 -- 858Giorgio Bacci, Marino Miculan. Structural operational semantics for continuous state stochastic transition systems
859 -- 879Bart Jacobs, Alexandra Silva 0001, Ana Sokolova. Trace semantics via determinization
880 -- 900Johannes Marti, Yde Venema. Lax extensions of coalgebra functors and their logic
901 -- 910Pawel Sobocinski. Relational presheaves, change of base and weak simulation
911 -- 939Joost Winter, Marcello M. Bonsangue, Jan J. M. M. Rutten. Context-free coalgebras

Volume 81, Issue 4

615 -- 631Qi Shi, Ning Zhang, Madjid Merabti. Fair signature exchange via delegation on ubiquitous networks
632 -- 660Gábor Erdélyi, Michael R. Fellows, Jörg Rothe, Lena Schend. Control complexity in Bucklin and fallback voting: A theoretical analysis
661 -- 670Gábor Erdélyi, Michael R. Fellows, Jörg Rothe, Lena Schend. Control complexity in Bucklin and fallback voting: An experimental analysis
671 -- 691Eric J. Schwabe, Ian M. Sutherland. Optimizing large data transfers in parity-declustered data layouts
692 -- 701Noga Alon, Hagit Attiya, Shlomi Dolev, Swan Dubois, Maria Potop-Butucaru, Sébastien Tixeuil. Practically stabilizing SWMR atomic memory in message-passing systems
702 -- 716Mark Jerrum, Kitty Meeks. The parameterised complexity of counting connected subgraphs and graph motifs
717 -- 733Xun Zhou, Jing He, Guangyan Huang, Yanchun Zhang. SVD-based incremental approaches for recommender systems
734 -- 746Lijuan Wang, Jun Shen, Junzhou Luo. Facilitating an ant colony algorithm for multi-objective data-intensive service provision
747 -- 765Henning Fernau, Pinar Heggernes, Yngve Villanger. A multi-parameter analysis of hard problems on deterministic finite automata
766 -- 782Robert Bredereck, Jiehua Chen, Sepp Hartung, Christian Komusiewicz, Rolf Niedermeier, Ondrej Suchý. On explaining integer vectors by few homogeneous segments
783 -- 796Jianghua Zhong, Dongdai Lin. A new linearization method for nonlinear feedback shift registers

Volume 81, Issue 3

485 -- 486Quan Z. Sheng, Elhadi M. Shakshuki. Ambient and context-aware services
487 -- 495Nabil Sahli, Nafaâ Jabeura, Mohamad Badra. Agent-based framework for sensor-to-sensor personalization
496 -- 515Mohamed Amine Abid, Abdelfettah Belghith, Khalil Drira. SARP: A dynamically readjustable period size proactive routing protocol for MANETs
516 -- 532Tayseer Alkhdour, Elhadi Shakshuki, Uthman A. Baroudi, Shokri Z. Selim. A cross layer optimization modeling for a periodic WSN application
533 -- 552Jian Yu, Quan Z. Sheng, Joshua K. Y. Swee, Jun Han, Chengfei Liu, Talal H. Noor. Model-driven development of adaptive web service processes with aspects and rules
553 -- 567Tyler J. Gunn, John Anderson. Dynamic heterogeneous team formation for robotic urban search and rescue
568 -- 584Luk Knapen, Irith Ben-Arroyo Hartman, Daniel Keren, Ansar-Ul-Haque Yasar, Sungjin Cho, Tom Bellemans, Davy Janssens, Geert Wets. Scalability issues in optimal assignment for carpooling
585 -- 598Yoann Lebrun, Emmanuel Adam, René Mandiau, Christophe Kolski. A model for managing interactions between tangible and virtual agents on an RFID interactive tabletop: Case study in traffic simulation
599 -- 614Liang Huai Yang, Yanzhu Zhao, Yulei Fan, Yihua Zhu, Jian Yu. Peak power modeling for join algorithms in DBMS

Volume 81, Issue 2

359 -- 375Daowen Qiu, Lvzhou Li, Paulo Mateus, Amílcar Sernadas. Exponentially more concise quantum recognition of non-RMM regular languages
376 -- 382Xuechong Guan. Two Cartesian closed categories of information algebras
383 -- 397Alberto Lafuente, Mikel Larrea, Iratxe Soraluze Arriola, Roberto Cortiñas. Communication-optimal eventually perfect failure detection in partially synchronous systems
398 -- 414Minati De, Subhas C. Nandy, Sasanka Roy. Prune-and-search with limited workspace
415 -- 442Ilkka Törmä. A uniquely ergodic cellular automaton
443 -- 457Simone Bova, Hubie Chen. The complexity of equivalence, entailment, and minimization in existential positive logic
458 -- 467Rafael Trapani Possignolo, Cintia Borges Margi, Paulo S. L. M. Barreto. Quantum-assisted QD-CFS signatures
468 -- 472Juha Honkala. Products of matrices and recursively enumerable sets
473 -- 484Petr Sosík, Ludek Cienciala. A limitation of cell division in tissue P systems by PSPACE

Volume 81, Issue 1

1 -- 2Jia Hu, Seetharami Seelam, Laurent Lefevre. Introduction to special issue on High Performance Computing Architectures and Systems
3 -- 15Xiaofei Liao, Hai Jin, Shizhan Yu, Yu Zhang. A novel memory allocation scheme for memory energy reduction in virtualization environment
16 -- 37Hervé Paulino, Eduardo Marques. Heterogeneous programming with Single Operation Multiple Data
38 -- 56Seren Soner, Can Özturan. Integer programming based heterogeneous CPU-GPU cluster schedulers for SLURM resource manager
57 -- 71Jianliang Ma, Licheng Yu, John M. Ye, Tianzhou Chen. MCMG simulator: A unified simulation framework for CPU and graphic GPU
72 -- 84Imen Chakroun, Nouredine Melab. Towards a heterogeneous and adaptive parallel Branch-and-Bound algorithm
85 -- 96Hussain Al-Aqrabi, Lu Liu, Richard Hill, Nick Antonopoulos. Cloud BI: Future of business intelligence in the Cloud
97 -- 109Mustafa Bani Khalaf, Ahmed Yassin Al-Dubai, Geyong Min. New efficient velocity-aware probabilistic route discovery schemes for high mobility Ad hoc networks
110 -- 124Jianjiang Wang, Xiaomin Zhu, Laurence T. Yang, Jianghan Zhu, Manhao Ma. Towards dynamic real-time scheduling for multiple earth observation satellites
125 -- 131Minghui Zheng, Yang Xiang, Hui-Hua Zhou. A strong provably secure IBE scheme without bilinear map
132 -- 144Wei Li, Demetres D. Kouvatsos, Rod J. Fretwell. Towards time domain invariant QoS measures for queues with correlated traffic
145 -- 157Yuwei Xu, Jeremiah D. Deng, Mariusz Nowostawski, Martin K. Purvis. Optimized routing for video streaming in multi-hop wireless networks using analytical capacity estimation
159 -- 185Petra Berenbrink, Colin Cooper, Tom Friedetzky, Tobias Friedrich, Thomas Sauerwald. Randomized diffusion for indivisible loads
186 -- 207Eun Jung Kim 0002, Christophe Paul, Geevarghese Philip. 4-minor cover problem
208 -- 218Yanhui Zhai, Deyu Li, Kaishe Qu. Decision implication canonical basis: a logical perspective
219 -- 233Andrea E. F. Clementi, Riccardo Silvestri. Parsimonious flooding in geometric random-walks
234 -- 248Evangelos Bampas, Davide Bilò, Guido Drovandi, Luciano Gualà, Ralf Klasing, Guido Proietti. Network verification via routing table queries
249 -- 257Juha Kortelainen. On simple generators of recursively enumerable languages
258 -- 287Christel Baier, Marcus Daum, Benjamin Engel, Hermann Härtig, Joachim Klein, Sascha Klüppelholz, Steffen Märcker, Hendrik Tews, Marcus Völp. Locks: Picking key methods for a scalable quantitative analysis
288 -- 310Tomás Brázdil, Stefan Kiefer, Antonín Kucera, Ivana Hutarová Vareková. Runtime analysis of probabilistic programs with unbounded recursion
311 -- 329Xi Chen, Martin E. Dyer, Leslie Ann Goldberg, Mark Jerrum, Pinyan Lu, Colin McQuillan, David Richerby. The complexity of approximating conservative counting CSPs
330 -- 358Leslie Ann Goldberg, Mark Jerrum, Colin McQuillan. Approximating the partition function of planar two-state spin systems