Journal: J. King Saud Univ. Comput. Inf. Sci.

Volume 28, Issue 4

363 -- 0Nasser-Eddine Rikli. Message from the Editor
364 -- 380Jihen Maâzoun, Nadia Bouassida, Hanêne Ben-Abdallah. Change impact analysis for software product lines
381 -- 394Gandhimathi Amirthalingam, G. Radhamani. New chaff point based fuzzy vault for multimodal biometric cryptosystem using particle swarm optimization
395 -- 406Syahid Anuar, Ali Selamat, Roselina Sallehuddin. A modified scout bee for artificial bee colony algorithm and its performance on optimization problems
407 -- 415Tazeem Fatma, Omar Farooq, Yusuf Uzzaman Khan, Manjari Tripathi, Priyanka Sharma. Automatic detection of non-convulsive seizures: A reduced complexity approach
416 -- 431K. Usha, M. Ezhilarasan. Personal recognition using finger knuckle shape oriented features and texture analysis
432 -- 446Malik Mubashir Hassan, Umer Farooq. Adaptive and ubiquitous video streaming over Wireless Mesh Networks
447 -- 456R. D. Kulkarni, B. F. Momin. Skyline computation for frequent queries in update intensive environment
457 -- 469Ali Selamat, Nicholas Akosu. Word-length algorithm for language identification of under-resourced languages
470 -- 480Zainab M. Aljazzaf, Miriam A. M. Capretz, Mark Perry 0001. Trust-based Service-Oriented Architecture

Volume 28, Issue 3

247 -- 0Nasser-Eddine Rikli. Message from the Editor
248 -- 261Naeem Ahmad, S. Zeeshan Hussain. Broadcast Expenses Controlling Techniques in Mobile Ad-hoc Networks: A Survey
262 -- 275Mohamed Elhoseny, Hamdy K. Elminir, Alaa Mohamed Riad, Xiaohui Yuan 0001. A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption
276 -- 288Bharti Sharma, Ravinder Singh Bhatia, Awadhesh Kumar Singh. A hierarchical virtual backbone construction protocol for mobile ad hoc networks
289 -- 302Rajendiran Manoharan, Janakiraman Sengathir. Erlang coefficient based conditional probabilistic model for reliable data dissemination in MANETs
303 -- 310Ali Reihanian, Behrouz Minaei-Bidgoli, Hosein Alizadeh. Topic-oriented community detection of rating-based social networks
311 -- 329Shaker H. Ali El-Sappagh, Mohammed Elmogy. An encoding methodology for medical knowledge using SNOMED CT ontology
330 -- 344Muhammad Bilal, Huma Israr, Muhammad Shahid, Amin Khan. Sentiment classification of Roman-Urdu opinions using Naïve Bayesian, Decision Tree and KNN classification techniques
345 -- 361Amit Mishra, Sanjay Kumar Jain. A survey on question answering systems with classification

Volume 28, Issue 2

148 -- 156Ali Abd Almisreb, Ahmad Farid Abidin, Nooritawati Md Tahir. An acoustic investigation of Arabic vowels pronounced by Malay speakers
157 -- 169Attia Nehar, Djelloul Ziadi, Hadda Cherroun. Rational kernels for Arabic Root Extraction and Text Classification
170 -- 183Srinivas Nallagonda, Sanjay Dhar Roy, Sumit Kundu. Combined diversity and improved energy detection in cooperative spectrum sensing with faded reporting channels
184 -- 198Ahmed Aldammas, Adel Soudani, Abdullah Al-Dhelaan. The efficiency of buffer and buffer-less data-flow control schemes for congestion avoidance in Networks on Chip
199 -- 210Amlan Karmakar, Amit Phadikar, Baisakhi Sur Phadikar, Goutam Kr. Maity. A blind video watermarking scheme resistant to rotation and collusion attacks
211 -- 229M. Thirumaran, M. Jannani, N. Sivakumar. A formal approach for change impact analysis of long term composed services using Probabilistic Cellular Automata
230 -- 246Natarajan Meghanathan. Maximal assortative matching for complex network graphs

Volume 28, Issue 1

1 -- 0Nasser-Eddine Rikli. Message from the Editor
2 -- 12G. Vinodhini, R. M. Chandrasekaran. A comparative performance evaluation of neural network based approach for sentiment classification of online reviews
13 -- 26Samin Salemi, Ali Selamat, Marek Penhaker. A model transformation framework to increase OCL usability
27 -- 36Abdulatif Alabdulatif, Mohammed Kaosar. Privacy preserving cloud computation using Domingo-Ferrer scheme
37 -- 54D. Chandramohan 0001, T. Vengattaraman, D. Rajaguru, P. Dhavachelvan. A new privacy preserving technique for cloud service user endorsement using multi-agents
55 -- 67N. Moganarangan, R. G. Babukarthik, S. Bhuvaneswari, M. S. Saleem Basha, P. Dhavachelvan. A novel algorithm for reducing energy-consumption in cloud computing environment: Web service computing approach
68 -- 81Vanga Odelu, Ashok Kumar Das, Adrijit Goswami. A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system
82 -- 97Shahram Moadab, Hassan Rashidi. Automatic path-oriented test data generation by boundary hypercuboids
98 -- 109Ghizlane Bencheikh, Jaouad Boukachour, Ahmed El Hilali Alaoui. A memetic algorithm to solve the dynamic multiple runway aircraft landing problem
110 -- 124K. Seetharaman, S. Sathiamoorthy. A unified learning framework for content based medical image retrieval using a statistical model
125 -- 132Saber Benharzallah, Hammadi Bennoui, Okba Kazar. Reformulating XQuery queries using GLAV mapping and complex unification
133 -- 145Ayman E. Lotfy, Ahmed I. Saleh, Haitham A. El-Ghareeb, Hesham A. Ali. A middle layer solution to support ACID properties for NoSQL databases