


default search action
The Computer Journal, Volume 55
Volume 55, Number 1, January 2012
- Fairouz Kamareddine:

Capsule Reviews. 1-2
- Akamine Kazuma, Ken Fukuchi, Akisato Kimura, Shigeru Takagi:

Fully Automatic Extraction of Salient Objects from Videos in Near Real Time. 3-14 - Daniel Ruijters

, Philippe Thévenaz:
GPU Prefilter for Accurate Cubic B-spline Interpolation. 15-20 - Sangpil Lee, Won Woo Ro:

Accelerated Network Coding with Dynamic Stream Decomposition on Graphics Processing Unit. 21-34 - Sumeer Goel, Yasser Ismail

, Magdy A. Bayoumi:
High-speed Motion Estimation Architecture for Real-time Video Transmission. 35-46
- Ingrid Petric, Bojan Cestnik

, Nada Lavrac, Tanja Urbancic:
Outlier Detection in Cross-Context Link Discovery for Creative Literature Mining. 47-61 - M. Oguzhan Külekci

, Jeffrey Scott Vitter
, Bojian Xu:
Fast Pattern-Matching via k-bit Filtering Based Text Decomposition. 62-68 - Manuel Abellanas, António Leslie Bajuelos, Inês Matos:

Minimizing the Range for k-Covered Paths on Sensor Networks. 69-81 - Vid Podpecan, Monika Zemenova, Nada Lavrac:

Orange4WS Environment for Service-Oriented Data Mining. 82-98 - Dick Hamlet:

Science, Mathematics, Computer Science, Software Engineering. 99-110 - Antonio Fariña

, Gonzalo Navarro, José R. Paramá
:
Boosting Text Compression with Word-Based Statistical Encoding. 111-131
Volume 55, Number 2, February 2012
- Fairouz Kamareddine:

Capsule Reviews. 133-135
- Stephen A. Jarvis

:
Editorial Performance Modelling, Benchmarking and Simulation of High-Performance Computing Systems. 136-137 - Simon J. Pennycook

, Simon D. Hammond, Gihan R. Mudalige
, Steven A. Wright
, Stephen A. Jarvis
:
On the Acceleration of Wavefront Applications using Distributed Many-Core Architectures. 138-153 - Xingfu Wu

, Valerie E. Taylor:
Performance Characteristics of Hybrid MPI/OpenMP Implementations of NAS Parallel Benchmarks SP and BT on Large-Scale Multicore Clusters. 154-167 - Mike B. Giles

, Gihan R. Mudalige
, Z. Sharif, Graham R. Markall, Paul H. J. Kelly:
Performance Analysis and Optimization of the OP2 Framework on Many-Core Architectures. 168-180 - Ming-yu Hsieh, Rolf Riesen, Kevin Thompson, William J. Song

, Arun Rodrigues:
SST: A Scalable Parallel Framework for Architecture-Level Performance, Power, Area and Thermal Simulation. 181-191 - Simon McIntosh-Smith

, Terry Wilson, Amaurys Ávila Ibarra, Jonathan Crisp, Richard B. Sessions
:
Benchmarking Energy Efficiency, Power Costs and Carbon Emissions on Heterogeneous Systems. 192-205 - Sandeep Budanur, Frank Mueller, Todd Gamblin:

Memory Trace Compression and Replay for SPMD Systems Using Extended PRSDs. 206-217
- Sergio González-Valenzuela

, Son T. Vuong, Victor C. M. Leung
:
Leveraging Service Discovery in MANETs with Mobile Directories. 218-231 - Dong-Heon Jung, Soo-Mook Moon, Sung-Hwan Bae:

Evaluation of a Java Ahead-of-Time Compiler for Embedded Systems. 232-252
Volume 55, Number 3, March 2012
- Fairouz Kamareddine:

Capsule Reviews. 253-255
- Jason J. Jung

, Dariusz Król
:
Editorial: Engineering Knowledge and Semantic Systems. 256-257 - Grzegorz Kukla, Przemyslaw Kazienko

, Piotr Bródka
, Tomasz Filipowski:
SocLaKE: Social Latent Knowledge Explorator. 258-276 - Zongda Wu, Guandong Xu, Yanchun Zhang, Peter Dolog

, Chenglang Lu:
An Improved Contextual Advertising Matching Approach based on Wikipedia Knowledge. 277-292
- Olcay Taner Yildiz

:
Univariate Decision Tree Induction using Maximum Margin Classification. 293-298 - Gerasimos Spanakis, Georgios Siolas, Andreas Stafylopatis:

Exploiting Wikipedia Knowledge for Conceptual Hierarchical Clustering of Documents. 299-312 - Mariano Rivera

, Oscar Dalmau Cedeño
, Washington Mio, Alonso Ramirez-Manzanares:
Spatial Sampling for Image Segmentation. 313-324 - Hideki Katagiri, Ichiro Nishizaki

, Tomohiro Hayashida, Takanori Kadoma:
Multiobjective Evolutionary Optimization of Training and Topology of Recurrent Neural Networks for Time-Series Prediction. 325-336 - Jason J. Jung

:
Discovering Community of Lingual Practice for Matching Multilingual Tags from Folksonomies. 337-346 - Muhammad Raza, Farookh Khadeer Hussain, Omar Khadeer Hussain

:
Neural Network-Based Approach for Predicting Trust Values Based on Non-uniform Input in Mobile Applications. 347-378
Volume 55, Number 4, April 2012
- Fairouz Kamareddine:

Capsule Reviews. 379-381
- Jiankun Hu

, Yang Xiang
, Wanlei Zhou
:
Advances in Network and System Security: Editorial Statement. 382-383 - Leonardo B. Oliveira, Aman Kansal, Conrado Porto Lopes Gouvêa, Diego F. Aranha

, Julio López, Bodhi Priyantha, Michel Goraczko, Feng Zhao:
Secure-TWS: Authenticating Node to Multi-user Communication in Shared Sensor Networks. 384-396 - Udaya Kiran Tupakula, Vijay Varadharajan

:
Dynamic State-Based Security Architecture for Detecting Security Attacks in Virtual Machines. 397-409 - Shui Yu

, Wanlei Zhou
, Weijia Jia
, Jiankun Hu
:
Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics. 410-421 - Xiaoxun Sun, Hua Wang

, Jiuyong Li
, Yanchun Zhang:
Satisfying Privacy Requirements Before Data Anonymization. 422-437 - Biming Tian, Song Han, Sazia Parvin

, Jiankun Hu
, Sajal K. Das
:
Erratum: Self-Healing Key Distribution Schemes for Wireless Networks: A Survey. 438
- Hung-Yu Chien:

Improved Anonymous Multi-receiver Identity-Based Encryption. 439-446 - Xiangyang Luo, Fenlin Liu, Chunfang Yang, Shiguo Lian, Daoshun Wang:

On F5 Steganography in Images. 447-456 - Xinyi Huang, Yi Mu, Willy Susilo

, Duncan S. Wong, Wei Wu:
Certificateless Signatures: New Schemes and Security Models. 457-474 - Yuh-Min Tseng, Tung-Tso Tsai:

Efficient Revocable ID-Based Encryption with a Public Channel. 475-486 - Lina Zhu, Li Feng, Zuochang Zhang:

Predicting the Propagation Path of Random Worm by Subnet Infection Situation Using Fuzzy Reasoning. 487-496 - Lanfranco Lopriore:

Encrypted Pointers in Protection System Design. 497-507
Volume 55, Number 5, May 2012
- Fairouz Kamareddine:

Capsule Reviews. 509-511
- Nihal Pekergin:

Introduction to the Special Issue on Probability Models in Performance Analysis. 512-514 - Peter Whittle:

Neural Memories and Oscillatory Operation. 515-521 - Azaria Paz, Jack W. Carlyle:

Chaotic Evolution via Generalized Probabilistic Automata (Probabilistic Arrays). 522-533 - Nguyen Tien Viet, François Baccelli:

A Stochastic Geometry Model for Cognitive Radio Networks. 534-552 - Emmanuel Hyon, Alain Jean-Marie:

Scheduling Services in a Queuing System with Impatience and Setup Costs. 553-563 - Hind Castel-Taleb, Idriss Ismael Aouled, Nihal Pekergin:

Bounding Aggregations for Transient and Stationary Performance Analysis of Subnetworks. 564-576 - Thu-Ha Dao-Thi, Jean-Michel Fourneau, Minh-Anh Tran:

Erratum: Multiple Class Symmetric G-networks with Phase Type Service Times. 577
- Mehmet Hakan Karaata, Ozgur Sinanoglu

, Bader F. AlBdaiwi:
An Optimal Inherently Stabilizing 2-Neighborhood Crash Resilient Protocol for Secure and Reliable Routing in Hypercube Networks. 578-589 - Jakub Stárka, Martin Svoboda

, Jan Sochna, Jirí Schejbal, Irena Mlýnková
, David Bednárek
:
Analyzer: A Complex System for Data Analysis. 590-615 - Supriya Aggarwal

, Kavita Khare
:
Design Techniques Targeting Low-Area-Power-Delay Product in Hyperbolic CORDIC Algorithm. 616-628 - Samuel Antao, Jean-Claude Bajard

, Leonel Sousa
:
RNS-Based Elliptic Curve Point Multiplication for Massive Parallel Architectures. 629-647
Volume 55, Number 6, June 2012
- Fairouz Kamareddine:

Capsule Reviews. 649-650
- Wojciech Mazurczyk

, Krzysztof Szczypiorski
:
Toward Effective and Reliable Digital Forensics. 651-652 - Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux

:
Steganography: A Class of Secure and Robust Algorithms. 653-666 - Gaurav Bhatnagar

, Q. M. Jonathan Wu, Balasubramanian Raman:
Image and Video Encryption based on Dual Space-Filling Curves. 667-685 - Xiaofeng Wang, Nanning Zheng, Jianru Xue, Zhenli Liu:

A Novel Image Signature Method for Content Authentication. 686-701 - Hui Tian

, Hong Jiang, Ke Zhou, Dan Feng:
Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography. 702-716 - Chunfang Yang, Fenlin Liu, Shiguo Lian, Xiangyang Luo, Daoshun Wang:

Weighted Stego-Image Steganalysis of Messages Hidden into Each Bit Plane. 717-727
- Ronaldo M. Salles

, Donato A. Marino Jr.:
Strategies and Metric for Resilience in Computer Networks. 728-739 - João V. P. Gomes, Pedro R. M. Inácio

, Manuela Pereira
, Mário M. Freire
, Paulo P. Monteiro
:
Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic. 740-755 - Chao-Hsien Lee, Chung-Ming Huang, Chia-Ching Yang, Tai-Hsiang Wang:

Co-SVC-MDC-Based Cooperative Video Streaming Over Vehicular Networks. 756-768 - Antoine Bossard, Keiichi Kaneko

:
The Set-to-Set Disjoint-Path Problem in Perfect Hierarchical Hypercubes. 769-775
Volume 55, Number 7, July 2012
- Fairouz Kamareddine:

Capsule Reviews. 777-778
- Simon H. Lavington:

A Synopsis of the Book Alan Turing and his Contemporaries: Building the World's First Computers. 779-787 - Peter Whittle:

A Natural Channel Coding for the Finite and Infinite Time Axes. 788-798 - Peter J. Denning:

Reflections on a Symposium on Computation. 799-802 - Peter J. Denning, Peter Wegner:

Introduction to What is Computation. 803-804 - Peter J. Denning:

Opening Statement: What is Computation? 805-810 - Peter Wegner:

The Evolution of Computation. 811-813 - John S. Conery:

Computation is Symbol Manipulation. 814-816 - Dennis J. Frailey:

Computation is Process. 817-819 - Paul S. Rosenbloom:

Computing and Computation. 820-824 - Ruzena Bajcsy:

Computation and Information. 825 - Dave Bacon:

Computation and Fundamental Physics. 826-829 - Lance Fortnow:

The Enduring Legacy of the Turing Machine. 830-831 - Alfred V. Aho:

Computation and Computational Thinking. 832-835 - Joseph F. Traub:

What is the Right Computational Model for Continuous Scientific Problems? 836-837 - Jeffrey P. Buzen:

Computation, Uncertainty and Risk. 838-847 - Erol Gelenbe

:
Natural Computation. 848-851 - Melanie Mitchell:

Biological Computation. 852-855 - Paolo Rocchi:

What is Information: Beyond the Jungle of Information Theories. 856-860 - Peter A. Freeman:

Consideration Of The Question "What Is Computation" Considered Harmful. 861-862 - Peter J. Denning:

Closing Statement: What Have We Said About Computation? 863-865
- Jane Hillston, Mirco Tribastone

, Stephen Gilmore:
Stochastic Process Algebras: From Individuals to Populations. 866-881 - Jeremy T. Bradley, Nigel Thomas, Richard A. Hayden, Anton Stefanek:

Invited Response to Computer Journal Lecture by Prof. Jane Hillston. 882-886 - Jinhai Cai:

Robust Filtering-Based Thinning Algorithm for Pattern Recognition. 887-896 - Jie Lin, Donald A. Adjeroh:

All-Against-All Circular Pattern Matching. 897-906
Volume 55, Number 8, August 2012
- Bharat Jayaraman:

Special Issue on Security and Performance of Networks and Clouds: Guest Editor's Introduction. 907-908 - Rachit Agarwal, Abhik Banerjee

, Vincent Gauthier
, Monique Becker, Chai Kiat Yeo
, Bu-Sung Lee
:
Achieving Small-World Properties using Bio-Inspired Techniques in Wireless Networks. 909-931 - Yan Sun, Qiangfeng Jiang, Mukesh Singhal:

A Hill-Area-Restricted Geographic Routing Protocol for Mobile Ad Hoc and Sensor Networks. 932-949 - Omer H. Abdelrahman

, Erol Gelenbe
:
Packet Delay and Energy Consumption in Non-homogeneous Networks. 950-964 - Hongfang Yu, Vishal Anand, Chunming Qiao:

Virtual Infrastructure Design for Surviving Physical Link Failures. 965-978 - Antonio Muñoz, Javier Gonzalez, Antonio Maña

:
A Performance-Oriented Monitoring System for Security Properties in Cloud Computing Applications. 979-994 - Timothy Wood

, K. K. Ramakrishnan
, Prashant J. Shenoy
, Jacobus E. van der Merwe:
Enterprise-Ready Virtual Cloud Pools: Vision, Opportunities and Challenges. 995-1004 - Shivsubramani Krishnamoorthy, Preeti Bhargava, Matthew Mah, Ashok K. Agrawala:

Representing and Managing the Context of a Situation. 1005-1019
Volume 55, Number 9, September 2012
- Fairouz Kamareddine:

Capsule Reviews. 1021-1022
- Mark Burgin, Eugene Eberbach

:
Evolutionary Automata: Expressiveness and Convergence of Evolutionary Computation. 1023-1029 - Yang Wang, Lin Wu

, Xiaodi Huang
, Xuemin Lin
:
Human Action Recognition from Video Sequences by Enforcing Tri-view Constraints. 1030-1040 - Iyad F. Jafar, Khalid A. Darabkh

, Ghazi M. Al-Sukkar:
A Rule-Based Fuzzy Inference System for Adaptive Image Contrast Enhancement. 1041-1057 - Jianping Gou

, Zhang Yi, Lan Du
, Taisong Xiong:
A Local Mean-Based k-Nearest Centroid Neighbor Classifier. 1058-1071 - Alex Pappachen James

, Sima Dimitrijev
:
Nearest Neighbor Classifier Based on Nearest Feature Decisions. 1072-1087 - Zhang Zhang, Jun Cheng, Jun Li

, Wei Bian, Dacheng Tao
:
Segment-Based Features for Time Series Classification. 1088-1102 - Kui Yu, Xindong Wu, Wei Ding

, Hao Wang:
Exploring Causal Relationships with Streaming Features. 1103-1117 - I-Ching Hsu:

Semantic Tag-based Profile Framework for Social Tagging Systems. 1118-1129 - Paul C. Conilione, Dianhui Wang:

Fuzzy Approach for Semantic Face Image Retrieval. 1130-1145
Volume 55, Number 10, October 2012
- Fairouz Kamareddine:

Capsule Reviews. 1147
- Manoj A. Thomas

, Gurpreet Dhillon
:
Interpreting Deep Structures of Information Systems Security. 1148-1156 - Wei Wu, Yi Mu, Willy Susilo

, Xinyi Huang, Li Xu:
A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption. 1157-1168 - Yu-Fang Chung

, Zhen Yu Wu
:
Casting Ballots over Internet Connection Against Bribery and Coercion. 1169-1179 - Chang Xu

, Zhoujun Li, Yi Mu, Hua Guo, Tao Guo:
Affiliation-Hiding Authenticated Asymmetric Group Key Agreement. 1180-1191 - Lin Ding

, Jie Guan:
Cryptanalysis of Loiss Stream Cipher. 1192-1201 - Jinguang Han

, Willy Susilo
, Yi Mu, Jun Yan
:
Attribute-Based Oblivious Access Control. 1202-1215 - Derek Chi-Wai Pao

, Xing Wang:
Multi-Stride String Searching for High-Speed Content Inspection. 1216-1231 - Hyejin Son, Tae Yoon Kang, Hwangnam Kim, Jong-Bae Park, Jae Hyung Roh

:
A Fair and Secure Bandwidth Allocation for AMI Mesh Network in Smart Grid. 1232-1243 - Nimalaprakasan Skandhakumar

, Jason Reid, Ed Dawson
, Robin Drogemuller
, Farzad Salim:
An Authorization Framework using Building Information Models. 1244-1264
- João V. P. Gomes, Pedro R. M. Inácio

, Manuela Pereira
, Mário M. Freire
, Paulo P. Monteiro
:
Corrigendum: Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic. 1265
- Paul S. Rosenbloom:

Erratum: Computing and Computation. 1266
Volume 55, Number 11, November 2012
- Fairouz Kamareddine:

Capsule Reviews. 1267-1269
- Haitao Dan, Robert M. Hierons

:
Controllability Problems in MSC-Based Testing. 1270-1287 - Suraj Pandey, Rajkumar Buyya:

Scheduling Workflow Applications Based on Multi-source Parallel Data Retrieval in Distributed Computing Networks. 1288-1308 - Winfried K. Grassmann

:
A Computer Built with Relays and a Mechanical Memory, and ALGOL. 1309-1316 - Tayfun Kucukyilmaz

, Ata Turk, Cevdet Aykanat:
A Parallel Framework for In-Memory Construction of Term-Partitioned Inverted Indexes. 1317-1330 - Doohwan Oh, Won Woo Ro:

Multi-Threading and Suffix Grouping on Massive Multiple Pattern Matching Algorithm. 1331-1346 - Shmuel T. Klein

, Dana Shapira
:
The String-to-Dictionary Matching Problem. 1347-1356 - Mina Memar, Mahmood Deypir, Mohammad Hadi Sadreddini, Seyed Mostafa Fakhrahmad

:
An Efficient Frequent Itemset Mining Method over High-speed Data Streams. 1357-1366 - Hyungjung Seo, Jaewon Seo, Taewhan Kim:

Algorithms for Combined Inter- and Intra-Task Dynamic Voltage Scaling. 1367-1382 - Jie Ding, Jane Hillston:

Numerically Representing Stochastic Process Algebra Models. 1383-1397 - Matthias Weidlich

, Remco M. Dijkman
, Mathias Weske:
Behaviour Equivalence and Compatibility of Business Process Models with Complex Correspondences. 1398-1418
Volume 55, Number 12, December 2012
- Fairouz Kamareddine:

Capsule Reviews. 1419
- Mohamed Adel Serhani, Abdelghani Benharref, Elarbi Badidi

, Salah Bouktif:
Scalable Federated Broker Management for Selection of Web Services. 1420-1439 - Antoine Bossard, Keiichi Kaneko

:
Node-to-Set Disjoint-Path Routing in Hierarchical Cubic Networks. 1440-1446 - Oguzhan Erdem, Cüneyt F. Bazlamaçci

:
High-performance IP Lookup Engine with Compact Clustered Trie Search. 1447-1466 - Chuan-Gang Liu, Chih-Hung Chao, Chih-Wen Leou, Jung-Shian Li:

Iterative Key Distribution Based on MAD Neighborhood in Underwater Mobile Sensor Networks. 1467-1485 - Dan Wang, Xiaowei Han, Hong Yang, Binbin Hao:

On Global Adaptive Synchronization in Weighted Complex Networks. 1486-1491 - Debraj De, Wen-Zhan Song

, Shaojie Tang, Diane J. Cook:
EAR: An Energy and Activity-Aware Routing Protocol for Wireless Sensor Networks in Smart Environments. 1492-1506 - Fabíola Greve, Pierre Sens, Luciana Arantes

, Véronique Simon:
Eventually Strong Failure Detector with Unknown Membership. 1507-1524 - Ozgur Sinanoglu

:
Fault Model Independent, Maximal Compaction of Test Responses in the Presence of Unknown Response Bits. 1525-1537

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














