The Computer Journal, Volume 58 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



jump to

- > Home > Journals > The Computer Journal
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 58, Number 1, January 2015
Section A
Original Articles

Nikolay Grozev, Rajkumar Buyya:
Performance Modelling and Simulation of Three-Tier Applications in Cloud and Multi-Cloud Environments. 1-22

Marco Beccuti
, Chiara Fornari, Giuliana Franceschinis, Sami M. Halawani, Omar M. Ba-Rukab, Ab Rahman Ahmad, Gianfranco Balbo:
From Symmetric Nets to Differential Equations exploiting Model Symmetries. 23-39

Shenlu Wang, Muhammad Aamir Cheema
, Xuemin Lin:
Efficiently Monitoring Reverse _k_-Nearest Neighbors in Spatial Networks. 40-56

Gianfranco Balbo, Maria Grazia Vigliotti:
On the Analysis of a M/M/1 Queue with Bulk Services. 57-74

Zhe Chen:
Control Systems on Automata and Grammars. 75-94

James Pallister, Simon J. Hollis, Jeremy Bennett:
Identifying Compiler Options to Minimize Energy Consumption for Embedded Platforms. 95-109

Yang Wang, Hua Li, Menglan Hu:
Reusing Garbage Data for Efficient Workflow Computation. 110-125

James G. Dowty
:
SMML Estimators for 1-Dimensional Continuous Data. 126-133

Michal Klempa, Michal Kozák, Mario Mikula, Robert Smetana, Jakub Stárka, Michal Svirec, Matej Vitásek, Martin Necaský
, Irena Holubová
:
jInfer: A Framework for XML Schema Inference. 134-156

Albert Corominas, Alberto García-Villoria, Rafael Pastor
:
Technical Note: Relating to the Parameter Values Given by Nelder and Mead in their Algorithm. 157-159

António Leslie Bajuelos, Santiago Canales, Gregorio Hernández-Peñalver
, Ana Mafalda Martins
, Inês Matos:
Some Results on Open-Edge and Open Mobile Guarding of Polygons and Triangulations. 160-171
Volume 58, Number 2, February 2015
Section B
Original Articles

Omar Alsaleh
, Bella Bose, Bechir Hamdaoui:
One-to-Many Node-Disjoint Paths Routing in Dense Gaussian Networks. 173-187

Chung-Ming Huang, Yih-Chung Chen, Shih Yang Lin
:
Packet Scheduling and Congestion Control Schemes for Multipath Datagram Congestion Control Protocol. 188-203

Oguzhan Erdem, Aydin Carus, Hoang Le:
Value-Coded Trie Structure for High-Performance IPv6 Lookup. 204-214

Paola Cappanera
, Alessandro Lori, Giovanni Stea
, Gigliola Vaglini:
On the Schedulability of Deadline-Constrained Traffic in TDMA Wireless Mesh Networks. 215-233

Sami J. Habib, Paulvanna Nayaki Marimuthu, Naser Zaeri
:
Carbon-aware Enterprise Network through Redesign. 234-245

Sen Su, Qingjia Huang, Jian Li, Xiang Cheng, Peng Xu, Kai Shuang:
Enhanced Energy-Efficient Scheduling for Parallel Tasks Using Partial Optimal Slacking. 246-257

Shahbaz Akhtar Abid, Mazliza Othman
, Nadir Shah, Mazhar Ali, Atta ur Rehman Khan
:
3D-RP: A DHT-Based Routing Protocol for MANETs. 258-279

Islam Elgedawy
:
CRESCENT: A Reliable Framework for Durable Composite Web Services Management. 280-299

Mostafa Rezvani, Mohammad Kazem Akbari, Bahman Javadi:
Resource Allocation in Cloud Computing Environments Based on Integer Linear Programming. 300-314

Chien-Fu Cheng
, Hsien-Chun Liao:
A Malicious-Resilient Protocol for Consistent Scheduling Problem in the Cloud Computing Environment. 315-330

Mirka Miller, R. Sundara Rajan
, N. Parthiban
, Indra Rajasingh
:
Minimum Linear Arrangement of Incomplete Hypercubes. 331-337

Shih-Chang Huang, Hong-Yi Chang:
A Bidirectional Route Repair Method for Wireless Mobile Ad Hoc Networks. 338-353
Volume 58, Number 3, March 2015
Section C
Special Focus on Enabling Technologies and Infrastructures for Collaboration

Slim Kallel
, Mohamed Jmaiel, Sumitra Reddy:
Enabling Technologies: Infrastructure for Collaborative Enterprises. 355

Wassim Derguech, Sami Bhiri
, Souleiman Hasan
, Edward Curry
:
Using Formal Concept Analysis for Organizing and Discovering Sensor Capabilities. 356-367

Zahra Movahedi, Walid Gaaloul
, Sami Bhiri
, Bruno Defude
:
Assisting Sensor-Based Application Design and Instantiation Using Activity Recommendation. 368-384

Afef Jmal Maâlej, Moez Krichen:
Study on the Limitations of WS-BPEL Compositions Under Load Conditions. 385-402

Ines Houidi, Wajdi Louati, Djamal Zeghlache
:
Exact Multi-Objective Virtual Network Embedding in Cloud Environments. 403-415

Ryszard Janicki, Mohammad Hadi Soudkhah:
On Classification with Pairwise Comparisons, Support Vector Machines and Feature Domain Overlapping. 416-431
Original Articles

María Arsuaga-Ríos, Miguel A. Vega-Rodríguez
:
Multiobjective Small-World Optimization for Energy Saving in Grid Environments. 432-447

Ajay Kumar
, Anil Kumar Verma
:
An Improved Algorithm for the Metamorphosis of Semi-Extended Regular Expressions to Deterministic Finite Automata. 448-456

Lei Du
, Qinbao Song, Lei Zhu
, Xiaoyan Zhu:
A Selective Detector Ensemble for Concept Drift Detection. 457-471

Omar Khadeer Hussain
, Zia-ur Rahman, Farookh Khadeer Hussain, Jaipal Singh, Naeem Khalid Janjua
, Elizabeth Chang
:
A User-Based Early Warning Service Management Framework in Cloud Computing. 472-496

Jianxin Li
, Chengfei Liu
, Rui Zhou
, Jeffrey Xu Yu:
Query-Driven Frequent Co-Occurring Term Computation over Relational Data Using MapReduce. 497-513
Volume 58, Number 4, April 2015
Section D
Special Focus on Security, Trust and Risk in Multimedia Social Networks

Zhiyong Zhang
:
Security, Trust and Risk in Multimedia Social Networks. 515-517

Constantinos Patsakis
, Athanasios Zigomitros
, Achilleas Papageorgiou, Agusti Solanas
:
Privacy and Security for Multimedia Content shared on OSNs: Issues and Countermeasures. 518-535

Hui Zhu, Cheng Huang, Hui Li:
Information Diffusion Model Based on Privacy Setting in Online Social Networking Services. 536-548

Hong Zhu
, Shengli Tian, Kevin Lü:
Privacy-Preserving Data Publication with Features of Independent ℓ-Diversity. 549-571

WeiTao Song, Bin Hu:
Approach to Detecting Type-Flaw Attacks Based on Extended Strand Spaces. 572-587

Bin Yang, Xingming Sun, Xianyi Chen, Jianjun Zhang, Xu Li:
Exposing Photographic Splicing by Detecting the Inconsistencies in Shadows. 588-600

Ayesha Kanwal, Rahat Masood
, Muhammad Awais Shibli, Rafia Mumtaz
:
Taxonomy for Trust Models in Cloud Computing. 601-626

Qingqi Pei, Dingyu Yan, Lichuan Ma, Zi Li, Yang Liao:
A Strong and Weak Ties Feedback-Based Trust Model in Multimedia Social Networks. 627-643

Zhen Yang, Kaiming Gao, Kefeng Fan, Yingxu Lai:
Sensational Headline Identification By Normalized Cross Entropy-Based Metric. 644-655

Hui Lin, Jia Hu, Jianfeng Ma, Li Xu, Li Yang:
CRM: A New Dynamic Cross-Layer Reputation Computation Model in Wireless Networks. 656-667

Zhiyong Zhang
, Kanliang Wang:
A Formal Analytic Approach to Credible Potential Path and Mining Algorithms for Multimedia Social Networks. 668-678

V. Natarajan, Shina Sheen, R. Anitha:
Multilevel Analysis to Detect Covert Social Botnet in Multimedia Social Networks. 679-687

Guowei Wu, Zuosong Liu, Lin Yao, Jing Deng, Jie Wang:
A Trust Routing for Multimedia Social Networks. 688-699

Danmei Niu, Lanlan Rui, Cheng Zhong, Xuesong Qiu:
A Composition and Recovery Strategy for Mobile Social Network Service in Disaster. 700-708
Original Articles

Volkmar Lotz, Francesco Di Cerbo, Michele Bezzi, Samuel Paul Kaluvuri, Antonino Sabetta, Slim Trabelsi:
Security Certification for Service-Based Business Ecosystems. 709-723

Qiang Tang
, Hua Ma, Xiaofeng Chen:
Extend the Concept of Public Key Encryption with Delegated Search. 724-734

Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi, Yi Mu:
Functional Encryption Resilient to Hard-to-Invert Leakage. 735-749

Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang:
Leakage-Free ID-Based Signature. 750-757

M. Francisca Hinarejos
, Andreu-Pere Isern-Deyà
, Josep-Lluís Ferrer-Gomila
, Magdalena Payeras-Capellà
:
MC-2D: An Efficient and Scalable Multicoupon Scheme. 758-778

Ying-Kai Tang, Sherman S. M. Chow
, Joseph K. Liu
:
Comments on 'Efficient Revocable Certificateless Encryption Secure in the Standard Model'. 779-781

Lanfranco Lopriore:
Password Capabilities Revisited. 782-791

Ke Gu
, Weijia Jia
, Chunlin Jiang:
Efficient Identity-Based Proxy Signature in the Standard Model. 792-807

Debasish Das, Utpal Sharma, D. K. Bhattacharyya
:
Detection of Cross-Site Scripting Attack under Multiple Scenarios. 808-822

Xinyu Fan, Guomin Yang
, Yi Mu, Yong Yu
:
On Indistinguishability in Remote Data Integrity Checking. 823-830

Alptekin Küpçü
:
Official Arbitration with Secure Cloud Storage Application. 831-852

Jiguo Li, Huiyun Teng, Xinyi Huang, Yichen Zhang, Jianying Zhou
:
A Forward-Secure Certificate-Based Signature Scheme. 853-866

Yong Yu
, Man Ho Au
, Yi Mu, Willy Susilo
, Huai Wu:
Secure Delegation of Signing Power from Factorization. 867-877

Hai Le Vu
, Kenneth K. Khaw, Tsong Yueh Chen
:
A New Approach for Network Vulnerability Analysis. 878-891

Stavros N. Shiaeles
, Maria Papadaki
:
FHSD: An Improved IP Spoof Detection Method for Web DDoS Attacks. 892-903

Huacui Liu, Chenhui Jin:
Lower Bounds of Differential and Linear Active S-boxes for 3D-like Structure. 904-921

Yu-Chi Chen
:
SPEKS: Secure Server-Designation Public Key Encryption with Keyword Search against Keyword Guessing Attacks. 922-933

Cheng-Chi Lee
, Yan-Ming Lai:
Toward A Secure Single Sign-On Mechanism for Distributed Computer Networks. 934-943

Franco Frattolillo
:
Watermarking Protocols: Problems, Challenges and a Possible Solution. 944-960

Abdulah Abdulah Zadeh, Howard M. Heys
:
Application of Simple Power Analysis to Stream Ciphers Constructed Using Feedback Shift Registers. 961-972

Haider Salim Hmood, Zhitang Li, Hasan Khalaf Abdulwahid, Yang Zhang:
Adaptive Caching Approach to Prevent DNS Cache Poisoning Attack. 973-985

Sha Ma, Mingwu Zhang, Qiong Huang, Bo Yang:
Public Key Encryption with Delegated Equality Test in a Multi-User Setting. 986-1002

Qiang Tang
:
From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data. 1003-1020

Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo
:
An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants. 1021-1039
Volume 58, Number 5, May 2015
Section A
Original Articles

Gabriel Ciobanu
, Maciej Koutny:
PerTiMo: A Model of Spatial Migration with Safe Access Permissions. 1041-1060

Jie Lin, Yue Jiang, Don Adjeroh:
Circular Pattern Discovery. 1061-1073

Jia Jie Liu
, Yue-Li Wang, Yu-shan Chiu:
Constrained Longest Common Subsequences with Run-Length-Encoded Strings. 1074-1084

Emilio Di Giacomo, Walter Didimo, Luca Grilli
, Giuseppe Liotta
, Salvatore Agostino Romeo:
Heuristics for the Maximum 2-Layer RAC Subgraph Problem. 1085-1098

Ahmad Sabri
, Vincent Vajnovszki:
Two Reflected Gray Code-Based Orders on Some Restricted Growth Sequences. 1099-1111

Chia Shin Ou, Chin Lung Lu, Richard C. T. Lee:
A Systematical and Parallel Approach to Solve Problems Involving Special Properties of Bit-Vectors. 1112-1121

Amy Affleck, Aneesh Krishna
, Narasimaha Achuthan:
Non-Functional Requirements Framework: A Mathematical Programming Approach. 1122-1139

Florentin Ipate, Alin Stefanescu
, Ionut Dinca:
Model Learning and Test Generation Using Cover Automata. 1140-1159

Antonio Badia
, Daniel Lemire:
Functional Dependencies with null Markers. 1160-1168

Petr Procházka, Jan Holub
:
Compression of a Set of Files with Natural Language Content. 1169-1185

Joel Fuentes
, Pablo Sáez, Gilberto Gutiérrez
, Isaac D. Scherson:
A Method to Find Functional Dependencies Through Refutations and Duality of Hypergraphs. 1186-1198

Chang-Ai Sun, Yimeng Zai, Huai Liu
:
Evaluating and Comparing Fault-Based Testing Strategies for General Boolean Specifications: A Series of Experiments. 1199-1213

Behrooz Parhami:
Digital Arithmetic in Nature: Continuous-Digit RNS. 1214-1223
Volume 58, Number 6, June 2015
Section B
Special Focus on Green Energy Management and Smart Grid

Zhangbing Zhou, Huansheng Ning
, Meikang Qiu, Habib F. Rashvand:
Editorial: Green Energy Management and Smart Grid. 1225-1226

Jianxin Li, Jieyu Zhao, Yi Li, Lei Cui, Bo Li, Lu Liu
, John Panneerselvam
:
iMIG: Toward an Adaptive Live Migration Method for KVM Virtual Machines. 1227-1242

Kehua Guo, Biao Tian, Jianhua Ma:
AMPS: An Adaptive Message Push Strategy for the Energy Efficiency Optimization in Mobile Terminals. 1243-1253

Liyun Zuo, Shoubin Dong
, Chunsheng Zhu, Lei Shu
, Guangjie Han:
A Cloud Resource Evaluation Model Based on Entropy Optimization and Ant Colony Clustering. 1254-1266

Jianhui Zhang, Zhi Li, Feng Xia
, Shaojie Tang, Xingfa Shen, Bei Zhao:
Cooperative Scheduling for Adaptive Duty Cycling in Asynchronous Sensor Networks. 1267-1279

Guangjie Han, Xun Li, Jinfang Jiang, Lei Shu
, Jaime Lloret:
Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks. 1280-1292

Zhiyong Feng, Bo Lan, Zhen Zhang, Shizhan Chen:
A Study of Semantic Web Services Network. 1293-1305

Xiang Wang, Ying Lu, Yi Zhang, Zexi Zhao, Tongsheng Xia, Limin Xiao:
Power Optimization in Logic Synthesis for Mixed Polarity Reed-Muller Logic Circuits. 1306-1313

Domen Zupancic, Mitja Lustrek, Matjaz Gams:
Multi-Agent Architecture for Control of Heating and Cooling in a Residential Space. 1314-1329

Linghe Kong
, Xiao-Yang Liu, Meixia Tao, Min-You Wu, Yu Gu, Long Cheng, Jianwei Niu
:
Resource-Efficient Data Gathering in Sensor Networks for Environment Reconstruction. 1330-1343

Jin Liu, Juan Li, Xiaoguang Niu, Xiaohui Cui, Yunchuan Sun:
GreenOCR: An Energy-Efficient Optimal Clustering Routing Protocol. 1344-1359

Yongzhao Zhan, Shan Dai, Qirong Mao, Lu Liu
, Wei Sheng:
A Video Semantic Analysis Method Based on Kernel Discriminative Sparse Representation and Weighted KNN. 1360-1372

He Li
, Mianxiong Dong, Xiaofei Liao, Hai Jin:
Deduplication-Based Energy Efficient Storage System in Cloud Environment. 1373-1383

Hamed Javidi
, Maziar Goudarzi
:
TABEMS: Tariff-Aware Building Energy Management System for Sustainability through Better Use of Electricity. 1384-1398
Original Articles

Xiaolan Tang
, Juhua Pu, Yang Gao, Yu Xie, Zhang Xiong:
GPS-Based Replica Deletion Scheme with Anti-Packet Distribution for Vehicular Networks. 1399-1415

Antonio Frangioni
, Laura Galli, Giovanni Stea
:
Optimal Joint Path Computation and Rate Allocation for Real-time Traffic. 1416-1430

Andrew Larkin
, David E. Williams, Molly L. Kile, William M. Baird:
Developing a Smartphone Software Package for Predicting Atmospheric Pollutant Concentrations at Mobile Locations. 1431-1442

Nizam Ayyildiz, Ece Güran Schmidt
, Hasan Cengiz Güran:
S-DIRECT: Scalable and Dynamically Reconfigurable TCAM Architecture for High-Speed IP Lookup. 1443-1455

Pavel Rajmic
, Jiri Hosek
, Michal Fusek
, Sergey D. Andreev
, Július Stecík:
Simplified Probabilistic Modelling and Analysis of Enhanced Distributed Coordination Access in IEEE 802.11. 1456-1468

Sangyeon Kim, Dong-Wan Choi, Chin-Wan Chung:
Finding a Friendly Community in Social Networks Considering Bad Relationships. 1469-1481

Hamid Saadatfar, Hossein Deldari, Mahmoud Naghibzadeh
:
Improving the Scheduler's Energy Saving Capability by Noting both Job and Resource Characteristics. 1482-1493
Volume 58, Number 7, July 2015
Section A
Original Articles

Viliam Simko, David Hauzar, Petr Hnetynka
, Tomás Bures
, Frantisek Plásil
:
Formal Verification of Annotated Textual Use-Cases. 1495-1529

Achal Kaushik
, Deo Prakash Vidyarthi:
A Green Energy Model for Resource Allocation in Computational Grid. 1530-1547

HamidReza Ahmadifar
, Ghassem Jaberipur:
A New Residue Number System with 5-Moduli Set: {22_q_, 2_q_±3, 2_q_±1}. 1548-1565

Edem Kwedzo Bankas, Kazeem Alagbe Gbolagade
:
New MRC Adder-Based Reverse Converter for the Moduli Set {2_n_, 22_n_+1 - 1, 22_n_+2 - 1}. 1566-1572

Qian Mao, K. Bharanitharan, Chin-Chen Chang:
A Proxy User Authentication Protocol Using Source-Based Image Morphing. 1573-1584

Yiwen Zhang, Rui-feng Guo:
Low-Power Scheduling Algorithms for Sporadic Task with Shared Resources in Hard Real-Time Systems. 1585-1597

Chao-Liang Liu, Wang-Jui Tsai, Ting-Yi Chang, Chun-Cheng Peng, Peng-Shiang Wong:
Meaningful Share Generation for (2, 2)-Multiple Visual Secret Sharing Scheme Without Pixel Expansion. 1598-1606

Abdelli Abdelkrim
:
Improving the State Space Computation of the Time Stream Petri Nets Model. 1607-1627

Murat Yesilyurt, Yildiray Yalman
, Ahmet Turan Özcerit
:
A Robust Watermarking Method for Mpeg-4 Based on Kurtosis. 1645-1655

Alexandre Petrenko
, Adenilso Simão
:
Generalizing the DS-Methods for Testing Non-Deterministic FSMs. 1656-1672

Niko Beerenwinkel, Stefano Beretta
, Paola Bonizzoni
, Riccardo Dondi, Yuri Pirola
:
Covering Pairs in Directed Acyclic Graphs. 1673-1686
Volume 58, Number 8, August 2015
Section B
Special Focus on Ambient and Context-Aware Services for the Future Web

Quan Z. Sheng
, Elhadi M. Shakshuki
, Jian Yu
:
Ambient and Context-Aware Services for the Future Web. 1687-1688

Khalid Elgazzar, Sharief M. A. Oteafy
, Walid M. Ibrahim, Hossam S. Hassanein
:
A Resilient P2P Architecture for Mobile Resource Sharing. 1689-1700

Zahoor Ali Khan
, Shyamala C. Sivakumar, William J. Phillips, Bill Robertson:
QPRR: QoS-Aware Peering Routing Protocol for Reliability Sensitive Data in Body Area Network Communication. 1701-1716

Alireza Nafarieh, Shyamala C. Sivakumar, William Robertson, William J. Phillips:
SLA-Based Time-Aware Provisioning Mechanisms in Shared Mesh Protected Optical Networks. 1717-1731

Heiko Desruelle, Frank Gielen:
Context-Driven Progressive Enhancement of Mobile Web Applications: A Multicriteria Decision-Making Approach. 1732-1746
Original Articles

Yanling Hu, Anfeng Liu:
An Efficient Heuristic Subtraction Deployment Strategy to Guarantee Quality of Event Detection for WSNs. 1747-1762

David Díez Hernández, Jaime García-Reinoso
, Iván Vidal
:
SFP: Statistical Filtering Policy for Caching in Content-Centric Networking. 1763-1775

Xing Su, Minjie Zhang
, Quan Bai
:
Dynamic Task Allocation for Heterogeneous Agents in Disaster Environments Under Time, Space and Communication Constraints. 1776-1791

Xiuchao Wu, Kenneth N. Brown
, Cormac J. Sreenan:
Contact Probing Mechanisms for Opportunistic Sensor Data Collection. 1792-1810

Ping Xie, Jianzhong Huang, Qiang Cao, Xiao Qin
, Changsheng Xie:
A New Non-MDS RAID-6 Code to Support Fast Reconstruction and Balanced I/Os. 1811-1825

Guangjun Qin, Mingfa Zhu, Limin Xiao, Li Ruan:
Lessen Interflow Interference Using Virtual Channels Partitioning. 1826-1841

Jaime García-Reinoso
, Iván Vidal
, David Díez, Daniel Corujo
, Rui L. Aguiar
:
Analysis and Enhancements to Probabilistic Caching in Content-Centric Networking. 1842-1856
Corrigendum
Volume 58, Number 9, September 2015
Section C
Special Focus on Mining Social Media for Knowledge Discovery

Neil Y. Yen, Uyen Trang Nguyen, Jong Hyuk Park:
Mining Social Media for Knowledge Discovery. 1859-1860

Thomas Steiner
, Ruben Verborgh
, Joaquim Gabarró, Erik Mannens
, Rik Van de Walle:
Clustering Media Items Stemming from Multiple Social Networks. 1861-1875

Weiwei Yuan, Donghai Guan, Sungyoung Lee, Jin Wang:
Skeleton Searching Strategy for Recommender Searching Mechanism of Trust-Aware Recommender Systems. 1876-1883

Yongkoo Han, Kisung Park, Donghai Guan, Sajal Halder
, Young-Koo Lee:
Topological Similarity-Based Feature Selection for Graph Classification. 1884-1893

Lihua Zhou, Kevin Lü
:
Detecting Communities with Different Sizes for Social Network Analysis. 1894-1908

Wu He, Gongjun Yan:
Mining Blogs And Forums To Understand the Use of Social Media in Customer Co-creation. 1909-1920

Chen Yang, Jian Ma
, Thushari P. Silva
, Xiaoyan Liu
, Zhongsheng Hua
:
A Multilevel Information Mining Approach for Expert Recommendation in Online Scientific Communities. 1921-1936

Lida Ghahremanloo, Wanita Sherchan, James A. Thom
:
Geotagging Twitter Messages in Crisis Management. 1937-1954

Seyed Mohammadhadi Daneshmand, Amin Javari, Seyed Ebrahim Abtahi, Mahdi Jalili
:
A Time-Aware Recommender System Based on Dependency Network of Items. 1955-1966
Original Articles

Naeem Khalid Janjua
, Omar Khadeer Hussain
, Farookh Khadeer Hussain, Elizabeth Chang
:
Philosophical and Logic-Based Argumentation-Driven Reasoning Approaches and their Realization on the WWW: A Survey. 1967-1999

Roberto Rodríguez-Rodríguez
, Fernando Castro
, Daniel Chaver
, Rekai González-Alberquilla, Luis Piñuel, Francisco Tirado
:
Write-Aware Replacement Policies for PCM-Based Systems. 2000-2025

Muhammad Ashad Kabir
, Jun Han, Jian Yu
, Alan W. Colman
:
Inferring User Situations from Interaction Events in Social Media. 2026-2043

Hiren K. Mewada
, Rahul Patel, Suprava Patnaik
:
A Novel Structure Tensor Modulated Chan-Vese Model for Texture Image Segmentation. 2044-2060

Yi Liu, Xiongzi Ge, Xiaoxia Huang, David H. C. Du:
MOLAR: A Cost-Efficient, High-Performance SSD-Based Hybrid Storage Cache. 2061-2078

Sadegh Aliakbary, Jafar Habibi, Ali Movaghar
:
Feature Extraction from Degree Distribution for Comparison and Analysis of Complex Networks. 2079-2091

Mehmet Ali Abbasoglu, Bugra Gedik, Hakan Ferhatosmanoglu
:
Aggregate Profile Clustering for Streaming Analytics. 2092-2108

Yanmin Zhu, Yin Wang, George Forman, Hong Wei:
Mining Large-Scale GPS Streams for Connectivity Refinement of Road Maps. 2109-2119

Lin Wu
, Xiaodi Huang
, John Shepherd
, Yang Wang:
Multi-Query Augmentation-Based Web Landmark Photo Retrieval. 2120-2134

Minaz J. Parmar, Marios C. Angelides:
MAC-REALM: A Video Content Feature Extraction and Modelling Framework. 2135-2171

Álvaro Rubio-Largo
, Miguel A. Vega-Rodríguez
, David L. González-Álvarez:
A Parallel Multiobjective Approach based on Honey Bees for Traffic Grooming in Optical Networks. 2171-2191
Volume 58, Number 10, October 2015
Section D
Special Focus on Secure Information Systems Engineering

David Garcia Rosado
, Nadira Lammari, Jan Jürjens:
Special Issue on Secure Information Systems Engineering. 2193-2194

Maryam Sepehri, Stelvio Cimato
, Ernesto Damiani
:
Privacy-Preserving Query Processing by Multi-Party Computation. 2195-2212

Evangelia Kavakli, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis
:
Privacy as an Integral Part of the Implementation of Cloud Solutions. 2213-2224

D. Marudhadevi, V. Neelaya Dhatchayani, V. S. Shankar Sriram
:
A Trust Evaluation Model for Cloud Computing Using Service Level Agreement. 2225-2232

Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina
:
ISGcloud: a Security Governance Framework for Cloud Computing. 2233-2254

Thomas Quirchmayr, Mark Strembeck:
A Discussion of Communication Schemes for Process Execution Histories to Enforce Entailment Constraints in Process-Driven SOAs. 2255-2279

Katarzyna Mazur
, Bogdan Ksiezopolski
, Zbigniew Kotulski
:
The Robust Measurement Method for Security Metrics Generation. 2280-2296

Takeshi Takahashi
, Youki Kadobayashi:
Reference Ontology for Cybersecurity Operational Information. 2297-2312

Ricardo J. Rodríguez
, José Merseguer
, Simona Bernardi
:
Modelling Security of Critical Infrastructures: A Survivability Assessment. 2313-2327

José Fran. Ruiz, Antonio Maña, Carsten Rudolph
:
An Integrated Security and Systems Engineering Process and Modelling Framework. 2328-2350

Carlos Blanco
, Eduardo Fernández-Medina
, Juan Trujillo
:
Modernizing Secure OLAP Applications with a Model-Driven Approach. 2351-2367
Original Articles

Kazim Yumbul, Erkay Savas:
Enhancing an Embedded Processor Core for Efficient and Isolated Execution of Cryptographic Algorithms . 2368-2387

Udaya Kiran Tupakula
, Vijay Varadharajan
:
Trust Enhanced Security for Tenant Transactions in the Cloud Environment. 2388-2403

Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Harry Bartlett
:
CHURNs: Freshness Assurance for Humans. 2404-2425

Chunfeng Lian
, Liaojun Pang
, Jimin Liang
:
Generalized Random Grid-Based Visual Secret Sharing for General Access Structures. 2426-2442

Xing Wang, Nga Lam Or, Ziyan Lu, Derek Chi-Wai Pao:
Hardware Accelerator to Detect Multi-Segment Virus Patterns. 2443-2460

Chanying Huang, Hwaseong Lee, Hyoseung Kim, Dong Hoon Lee:
mvSERS: A Secure Emergency Response Solution for Mobile Healthcare in Vehicular Environments. 2461-2475

Grazielle Vernize, André Luiz Pires Guedes
, Luiz Carlos Pessoa Albini:
Malicious Nodes Identification for Complex Network Based on Local Views. 2476-2491

Jianghong Wei
, Wenfen Liu, Xuexian Hu:
Forward-Secure Threshold Attribute-Based Signature Scheme. 2492-2506

Debiao He
, Mingwu Zhang, Baowen Xu
:
Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model. 2507-2508

Chang Xu
, Liehuang Zhu, Zhoujun Li, Feng Wang:
One-Round Affiliation-Hiding Authenticated Asymmetric Group Key Agreement with Semi-trusted Group Authority. 2509-2519

Shifeng Sun, Dawu Gu, Zhengan Huang:
Fully Secure Wicked Identity-Based Encryption Against Key Leakage Attacks. 2520-2536

Zoran Djuric, Dragan Gasevic
:
FEIPS: A Secure Fair-Exchange Payment System for Internet Transactions. 2537-2556

Lanfranco Lopriore:
Password Management: Distribution, Review and Revocation. 2557-2566

Amir Jalaly Bidgoly
, Behrouz Tork Ladani
:
Modelling and Quantitative Verification of Reputation Systems Against Malicious Attackers. 2567-2582

Wien Hong, Gwoboa Horng, Chih-Wei Shiu
, Tung-Shou Chen, Yu-Chi Chen
:
Reversible Steganographic Method Using Complexity Control and Human Visual System. 2583-2594

Dong Lai Fu, Xinguang Peng, Yuli Yang:
Trusted Validation for Geolocation of Cloud Data. 2595-2607

Shahid Alam
, Issa Traoré, Ibrahim Sogukpinar
:
Annotated Control Flow Graph for Metamorphic Malware Detection. 2608-2621

Md. Saiful Islam
, Naif Alajlan
:
Model-based Alignment of Heartbeat Morphology for Enhancing Human Recognition Capability. 2622-2635

SK Hafizul Islam
, Fagen Li
:
Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings. 2636-2648

Pericle Perazzo
, Pavel Skvortsov, Gianluca Dini:
On Designing Resilient Location-Privacy Obfuscators. 2649-2664

Yang Wang, Willy Susilo
, Man Ho Au
:
Revisiting Security Against the Arbitrator in Optimistic Fair Exchange. 2665-2676

Lin Ding
, Chenhui Jin, Jie Guan, Shaowu Zhang, Ting Cui, Dong Han, Wei Zhao:
Cryptanalysis of WG Family of Stream Ciphers. 2677-2685

Kaibin Huang, Raylin Tso
, Yu-Chi Chen
, Sk. Md. Mizanur Rahman
, Ahmad Almogren
, Atif Alamri:
PKE-AET: Public Key Encryption with Authorized Equality Test. 2686-2697

Nuttapong Attrapadung
, Keita Emura
, Goichiro Hanaoka
, Yusuke Sakai
:
Revocable Group Signature with Constant-Size Revocation List. 2698-2715

Erkay Savas, Cemal Yilmaz:
A Generic Method for the Analysis of a Class of Cache Attacks: A Case Study for AES. 2716-2737

Mayana Pereira, Rafael Dowsley, Anderson C. A. Nascimento
, Goichiro Hanaoka
:
Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions. 2738-2746

Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen:
Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited. 2747-2757

André Ricardo Abed Grégio
, Vitor Monte Afonso, Dario Simões Fernandes Filho, Paulo Lício de Geus
, Mário Jino:
Toward a Taxonomy of Malware Behaviors. 2758-2777

Kaitai Liang
, Willy Susilo
, Joseph K. Liu
, Duncan S. Wong:
Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption. 2778-2792
Volume 58, Number 11, November 2015
Section A
Original Articles

Nina Yevtushenko, Khaled El-Fakih, Tiziano Villa, Jie-Hong R. Jiang:
Deriving Compositionally Deadlock-Free Components over Synchronous Automata Compositions. 2793-2803

Ahmet Kara
, Halit Oguztüzün, Mahmut Nedim Alpdemir
:
A Methodology for Resolution Mapping for Cross-Resolution Simulation using Event-B. 2804-2823

Weiqiang Kong, Leyuan Liu
, Takahiro Ando, Hirokazu Yatsu, Kenji Hisazumi
, Akira Fukuda:
Facilitating Multicore Bounded Model Checking with Stateless Explicit-State Exploration. 2824-2840

Xiaowang Zhang
, Jan Van den Bussche
:
On the Power of SPARQL in Expressing Navigational Queries. 2841-2851

Sung-In Jang, Su-Kyung Yoon, Kihyun Park, Gi-Ho Park, Shin-Dug Kim:
Data Classification Management with its Interfacing Structure for Hybrid SLC/MLC PRAM Main Memory. 2852-2863

Shaowei Cai
, Chuan Luo, Kaile Su
:
Improving WalkSAT By Effective Tie-Breaking and Efficient Implementation. 2864-2875

Pablo Muñoz
, David F. Barrero
, María D. R.-Moreno
:
A Statistically Rigorous Analysis of 2D Path-Planning Algorithms. 2876-2891

Gauthier van den Hove:
On the Origin of Recursive Procedures. 2892-2899

Paolo Arcaini
, Angelo Gargantini, Elvinia Riccobene
:
How to Optimize the Use of SAT and SMT Solvers for Test Generation of Boolean Expressions. 2900-2920

Frank Gurski
:
Linear Programming Formulations for Computing Graph Layout Parameters. 2921-2927

Shiyu Yang, Muhammad Aamir Cheema, Xuemin Lin:
Impact Set: Computing Influence Using Query Logs. 2928-2943

Xi Wang, Alejandro Erickson, Jianxi Fan, Xiaohua Jia
:
Hamiltonian Properties of DCell Networks. 2944-2955

Giorgos Stoilos, Tassos Venetis, Giorgos Stamou:
A Fuzzy Extension to the OWL 2 RL Ontology Language. 2956-2971

Jinn-Shyong Yang, Sih-Syuan Luo, Jou-Ming Chang
:
Pruning Longer Branches of Independent Spanning Trees on Folded Hyper-Stars. 2972-2981

Thomas Roelleke, Andreas Kaltenbrunner
, Ricardo Baeza-Yates
:
Harmony Assumptions in Information Retrieval and Social Networks. 2982-2999

A. S. M. Kayes
, Jun Han, Alan Colman
:
OntCAAC: An Ontology-Based Approach to Context-Aware Access Control for Software Services. 3000-3034

Hao Zheng, Xiaoshe Dong
, Zhengdong Zhu, Baoke Chen, Yizhi Zhang, Xingjun Zhang:
Research on Algorithms to Capture Drivers' Write Operations. 3035-3056

Jorge F. Fabeiro
, Diego Andrade, Basilio B. Fraguela
, Ramón Doallo:
Automatic Generation of Optimized OpenCL Codes Using OCLoptimizer. 3057-3073

Shenwei Huang, Matthew Johnson
, Daniël Paulusma
:
Narrowing the Complexity Gap for Colouring (Cs, Pt)-Free Graphs. 3074-3088

Robert M. Hierons
, Uraz Cengiz Türker:
Incomplete Distinguishing Sequences for Finite State Machines. 3089-3113

Yinglei Song, Chunmei Liu, Yongzhong Li:
A New Parameterized Algorithm for Predicting the Secondary Structure of RNA Sequences Including Pseudoknots. 3114-3125

Emilio Di Giacomo, Walter Didimo, Giuseppe Liotta, Henk Meijer, Stephen K. Wismath:
Planar and Quasi-Planar Simultaneous Geometric Embedding. 3126-3140

Outi Sievi-Korte
, Kai Koskimies, Erkki Mäkinen
:
Techniques for Genetic Software Architecture Design. 3141-3170

László Lengyel, Tamás Mészáros, Márk Asztalos, Péter Boros, Attila Máté, Gábor Madács, Péter Hudák, Kristóf Kovács, András Tresch, Hassan Charaf:
Quality Assured Model-Driven Requirements Engineering and Software Development. 3171-3186

Kun Ma
, Fusen Dong, Bo Yang:
Large-Scale Schema-Free Data Deduplication Approach with Adaptive Sliding Window Using MapReduce. 3187-3201

Amir Vahid Dastjerdi, Rajkumar Buyya:
An Autonomous Time-Dependent SLA Negotiation Strategy for Cloud Computing. 3202-3216
Volume 58, Number 12, December 2015
Section B
Original Articles

Sérgio Esteves, Paulo Ferreira
, Luís Veiga
:
_C_3 P: A Re-Configurable Framework to Design Cycle-sharing Computing Cloud Platforms. 3217-3241

Yuhao Yi, Zhongzhi Zhang
, Yuan Lin, Guanrong Chen:
Small-World Topology Can Significantly Improve the Performance of Noisy Consensus in a Complex Network. 3242-3254

R. Sundara Rajan
, Paul D. Manuel
, Indra Rajasingh
, N. Parthiban
, Mirka Miller:
A Lower Bound for Dilation of an Embedding. 3271-3278

Yonggang Che, Chuanfu Xu, Jianbin Fang
, Yongxian Wang
, Zhenghua Wang:
Realistic Performance Characterization of CFD Applications on Intel Many Integrated Core Architecture. 3279-3294

Chun-Chieh Huang, Ren-Song Ko:
A Study on Maximizing the Parallelism of Macroscopically Derived Routing Algorithms for WSNs. 3306-3324

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






