


default search action
The Computer Journal, Volume 60
Volume 60, Number 1, 2017
Original Articles
- Weidong Chen, Shan Ling:

Node-Pancyclic Properties of Biswapped Networks Based on Cycles in Their Factor Networks. 1-12 - Shuo-I Wang, Fu-Hsing Wang:

Independent Spanning Trees in RTCC-Pyramids. 13-26 - Jian Yu

, Jun Han, Jean-Guy Schneider
, Cameron M. Hine, Steve Versteeg:
A Petri-Net-Based Virtual Deployment Testing Environment for Enterprise Software Systems. 27-44 - Aimal Rextin, Patrick Healy:

Dynamic Upward Planarity Testing of Single Source Embedded Digraphs. 45-59 - Juan Carlos Saez

, Adrian Pousa
, Roberto Rodríguez-Rodríguez, Fernando Castro
, Manuel Prieto-Matías
:
PMCTrack: Delivering Performance Monitoring Counter Support to the OS Scheduler. 60-85 - Alejandro Pérez, Pablo Sánchez

:
On the Use of C# Partial Classes for the Implementation of Software Product Lines. 86-109 - Robert M. Hierons

, Uraz Cengiz Türker:
Distinguishing Sequences for Distributed Testing: Preset Distinguishing Sequences. 110-125 - Maryam Shoaran

, Alex Thomo
:
Zero-Knowledge-Private Counting of Group Triangles in Social Networks. 126-134 - Emilio Di Giacomo, Walter Didimo, Giuseppe Liotta, Fabrizio Montecchiani

:
Area-Thickness Trade-Offs for Straight-Line Drawings of Planar Graphs. 135-142 - Chang-Ai Sun, Lin Pan, Qiaoling Wang, Huai Liu, Xiangyu Zhang:

An Empirical Study on Mutation Testing of WS-BPEL Programs. 143-158
Volume 60, Number 2, 2017
Original Articles
- Yali Lv, Cheng-Kuan Lin, Jianxi Fan:

Hamiltonian Cycle and Path Embeddings in k-Ary n-Cubes Based on Structure Faults. 159-179 - Cyriac Grigorious, Sudeep Stephen

, Bharati Rajan, Mirka Miller:
On the Partition Dimension of Circulant Graphs. 180-184 - Seyyed Amir Ali Ghafourian Ghahramani

, Ali Mohammad Afshin Hemmatyar:
A Graph-based Performance Analysis of the 802.11p MAC Protocol for Safety Communications in Highway Vehicular Ad Hoc Networks. 185-209 - Keyvan RahimiZadeh

, Morteza Analoui
, Peyman Kabiri
, Bahman Javadi:
Workload-Aware Placement of Multi-Tier Applications in Virtualized Datacenters. 210-239 - Joshua Higgins

, Violeta Holmes
, Colin C. Venters
:
Autonomous Discovery and Management in Virtual Container Clusters. 240-252 - Yen-Hung Chen

, Yuan-Cheng Lai, Ching-Neng Lai, Yang-Chi Li:
A Group Bandwidth Reservation Scheme to Enhance the Driver's Safety in Vehicles and Transport Environment. 253-267 - Tong Liu, Yanmin Zhu, Hongzi Zhu, Jiadi Yu, Yuanyuan Yang

, Fan Ye:
Online Pricing for Efficient Renewable Energy Sharing in a Sustainable Microgrid. 268-284
Volume 60, Number 3, 2017
Special Issue on Databases and Data Science
- Sebastian Maneth, Alexandra Poulovassilis:

Data Science. 285-286 - Yang Cao, Wenfei Fan

, Shuai Ma:
Virtual Network Mapping in Cloud Computing: A Graph Pattern Matching Approach. 287-307 - Lena Wiese

, Tim Waage, Ferdinand Bollwein
:
A Replication Scheme for Multiple Fragmentations with Overlapping Fragments. 308-328 - Andreas Weiler

, Michael Grossniklaus, Marc H. Scholl
:
Editorial: Survey and Experimental Analysis of Event Detection Techniques for Twitter. 329-346 - Yu Liu, Peter McBrien:

Transactional and Incremental Type Inference from Data Updates. 347-368 - Reem Qadan Al Fayez

, Mike Joy
:
Using Linked Data for Integrating Educational Medical Web Databases Based on BioMedical Ontologies. 369-388
- Eleni Tsalapati

, Giorgos Stoilos, Alexandros Chortaras
, Giorgos Stamou, George Koletsos:
Query Rewriting Under Ontology Change. 389-409 - Adnan Idris, Asifullah Khan

:
Churn Prediction System for Telecom using Filter-Wrapper and Ensemble Classification. 410-430 - Alireza Nazemi, Ozra Ghezelsofla:

A Dual Neural Network Scheme for Solving the Assignment Problem. 431-443 - Prabavathy Balasundaram, Chitra Babu

, Subha Devi M:
Improving Read Throughput of Deduplicated Cloud Storage using Frequent Pattern-Based Prefetching Technique. 444-456
Volume 60, Number 4, 2017
Original Articles
- Tomasz Hyla

, Jerzy Pejas
:
A Hess-Like Signature Scheme Based on Implicit and Explicit Certificates. 457-475 - Jeremy Maitin-Shepard, Mehdi Tibouchi

, Diego F. Aranha
:
Elliptic Curve Multiset Hash. 476-490
- Xi Jun Lin, Lin Sun, Haipeng Qu, Xiaoshuai Zhang:

Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme. 491-496
- Shaoquan Jiang:

Bounds for Message Authentication with Distortion. 497-506 - Jing Liu, Yunyun Wu, Xuezheng Liu, Yunchun Zhang, Gang Xue:

On the (In)Security of Recent Group Key Distribution Protocols. 507-526 - Kenneth Radke, Colin Boyd:

Security Proofs for Protocols Involving Humans. 527-540 - Leyou Zhang

, Jingxia Zhang, Yi Mu:
Novel Leakage-Resilient Attribute-Based Encryption from Hash Proof System. 541-554 - Emin Islam Tatli, Bedirhan Urgun:

WIVET - Benchmarking Coverage Qualities of Web Crawlers. 555-572 - Muhammet Yildiz, Berrin A. Yanikoglu, Alisher Kholmatov, Alper Kanak

, Umut Uludag:
Biometric Layering with Fingerprints: Template Security and Privacy Through Multi-Biometric Template Fusion. 573-587 - Man Ho Au, Joseph K. Liu, Zhenfei Zhang, Willy Susilo

, Jin Li:
Anonymous Announcement System (AAS) for Electric Vehicle in VANETs. 588-599 - Yujue Wang, HweeHwa Pang

:
Probabilistic Public Key Encryption for Controlled Equijoin in Relational Databases. 600-612 - Wentan Yi, Shaozhen Chen, Yuchen Li:

Zero-correlation Linear Cryptanalysis of SAFER Block Cipher Family Using the Undisturbed Bits. 613-624
Volume 60, Number 5, April 2017
Original Articles
- Xiang Xu, Shuming Zhou, Jinqiang Li:

Reliability of Complete Cubic Networks under the Condition of g-Good-Neighbor. 625-635 - Ornela Dardha

, Daniele Gorla
, Daniele Varacca:
Semantic Subtyping for Objects and Classes. 636-656 - Stefan Edelkamp

, Amr Elmasry, Jyrki Katajainen:
Heap Construction - 50 Years Later. 657-674 - Wang Lin, Min Wu, Zhengfeng Yang, Zhenbing Zeng:

Verification for Non-polynomial Hybrid Systems Using Rational Invariants. 675-689 - Yu Yang

, Hongbo Liu
, Hua Wang, Ansheng Deng, Colton Magnant:
On Algorithms for Enumerating Subtrees of Hexagonal and Phenylene Chains. 690-710 - Akinori Kawachi, Yoshio Okamoto

, Keisuke Tanaka, Kenji Yasunaga:
General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction. 711-728 - Wiktor B. Daszczuk

:
Communication and Resource Deadlock Analysis Using IMDS Formalism and Model Checking. 729-750 - Cheng Zhou, Zhonghai Yin, Youqian Feng:

Events Algebra of Triggers. 751-760 - Seungbum Jo

, Stelios Joannou, Daisuke Okanohara, Rajeev Raman
, Srinivasa Rao Satti:
Compressed Bit vectors Based on Variable-to-Fixed Encodings. 761-775
Volume 60, Number 6, June 2017
Original Articles
- Wei Wu, Jiguang Wan, Ling Zhan, Jibin Wang, Changsheng Xie:

DROP: A New RAID Architecture for Enhancing Shared RAID Performance. 777-790 - Qiufen Xia, Weifa Liang

, Zichuan Xu:
Data Locality-Aware Big Data Query Evaluation in Distributed Clouds. 791-809 - Xiaoyin Li, Lianshan Yan, Wei Pan, Bin Luo:

Secure and Robust DV-Hop Localization Based on the Vector Refinement Feedback Method for Wireless Sensor Networks. 810-821 - Meng-Shu Chiang, Chung-Ming Huang, Duy-Tuan Dao, Binh-Chau Pham:

GB-PMIPv6: A Group-Based Handover Control Scheme for PMIPv6 Using the 'Hitch on' Concept. 822-834 - Ramzi R. Saifan, Iyad F. Jafar, Ghazi M. Al-Sukkar:

Optimized Cooperative Spectrum Sensing Algorithms in Cognitive Radio Networks. 835-849 - Jia Peng, Yanmin Zhu, Qingwen Zhao, Hongzi Zhu, Jian Cao, Guangtao Xue, Bo Li:

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones. 850-865 - Parisa Jalili Marandi, Marco Primi, Nicolas Schiper, Fernando Pedone

:
Ring Paxos: High-Throughput Atomic Broadcast. 866-882 - Ihsan Mert Ozcelik

, Ibrahim Korpeoglu
, Ashok K. Agrawala:
Energy Efficient IP-Connectivity with IEEE 802.11 for Home M2M Networks. 883-897 - Chen Ying, Hao Huang, Ajay Gopinathan, Zongpeng Li:

A Prior-Free Spectrum Auction for Approximate Revenue Maximization. 898-910 - Fan Zhang, Tao Jing, Yan Huo, Kai-Wei Jiang:

Throughput Optimization for Energy Harvesting Cognitive Radio Networks with Save-Then-Transmit Protocol. 911-924 - Chunlin Li, Zhou Min, Youlong Luo:

Efficient Load-Balancing Aware Cloud Resource Scheduling for Mobile User. 925-939
Volume 60, Number 7, July 2017
Original Articles
- Susan Lomax, Sunil Vadera:

A Cost-Sensitive Decision Tree Learning Algorithm Based on a Multi-Armed Bandit Framework. 941-956 - Lin Zheng

, Fuxi Zhu, Alshahrani Mohammed:
Attribute and Global Boosting: A Rating Prediction Method in Context-Aware Recommendation. 957-968 - Salma Ben Jemaa, Mohamed Hammami, Hanêne Ben-Abdallah

:
Finger Surfaces Recognition Using Rank Level Fusion. 969-985 - S. Thayammal, D. Selvathi:

Edge Preserved Multispectral Image Compression Using Extended Shearlet Transform. 986-994 - Karam Abdulahhad

, Jean-Pierre Chevallet, Catherine Berrut:
Logics, Lattices and Probability: The Missing Links to Information Retrieval. 995-1018 - Long Chen, Joemon M. Jose

, Haitao Yu, Fajie Yuan:
A Hybrid Approach for Question Retrieval in Community Question Answerin. 1019-1031 - Zhiping Peng, Bo Xu

, Antonio Marcel Gates, Delong Cui
, Weiwei Lin:
A Study of a Multi-Agent Organizational Framework with Virtual Machine Clusters as the Unit of Granularity in Cloud Computing. 1032-1043 - Joshua Z. Goncalves, Aneesh Krishna

:
Incorporating Change Management Within Dynamic Requirements-Based Model-Driven Agent Development. 1044-1077 - Jianbin Huang, Yu Zhou

, Xiaolin Jia, Heli Sun
:
A Novel Social Event Organization Approach for Diverse User Choices. 1078-1095 - Angelo Furfaro

, Maria Carmela Groccia, Simona E. Rombo:
2D Motif Basis Applied to the Classification of Digital Images. 1096-1109
Volume 60, Number 8, August 2017
Original Articles
- Shuling Wang, Flemming Nielson

, Hanne Riis Nielson
, Naijun Zhan:
Modelling and Verifying Communication Failure of Hybrid Systems in HCSP. 1111-1130 - Hailong Zhang, Yongbin Zhou:

Mahalanobis Distance Similarity Measure Based Higher Order Optimal Distinguisher. 1131-1144 - Zheng Yang

, Junyu Lai, Chao Liu, Wanping Liu, Shuangqing Li:
Simpler Generic Constructions for Strongly Secure One-round Key Exchange from Weaker Assumptions. 1145-1160 - Yanwei Zhou, Bo Yang:

Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security. 1161-1172 - Guglielmo Cola

, Marco Avvenuti, Alessio Vecchio:
Real-Time Identification Using Gait Pattern Analysis on a Standalone Wearable Accelerometer. 1173-1186 - Huifang Yu, Bo Yang:

Pairing-Free and Secure Certificateless Signcryption Scheme. 1187-1196 - Haibo Yi, Weijian Li:

On the Importance of Checking Multivariate Public Key Cryptography for Side-Channel Attacks: The Case of enTTS Scheme. 1197-1209 - Junwei Zhou

, Hui Duan, Kaitai Liang
, Qiao Yan, Fei Chen, F. Richard Yu
, Jieming Wu, Jianyong Chen:
Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation. 1210-1222 - Shabnam Seradji, Mehran S. Fallah:

A Bayesian Game of Whitewashing in Reputation Systems. 1223-1237 - Gamze Tillem, Erkay Savas, Kamer Kaya:

A New Method for Computational Private Information Retrieval. 1238-1250 - Yang Liu

, Andrew Simpson
:
AdSelector: A Privacy-Preserving Advertisement Selection Mechanism for Mobile Devices. 1251-1270
Volume 60, Number 9, September 2017
Original Articles
- Sérgio Luis Sardi Mergen, Viviane Pereira Moreira:

DuelMerge: Merging with Fewer Moves. 1271-1278 - Gregorio Hernández-Peñalver

, Ana Mafalda Martins
:
Remote Monitoring by Edges and Faces of Maximal Outerplanar Graphs. 1279-1288 - Wei Gao, Mohammad Reza Farahani

:
Generalization Bounds and Uniform Bounds for Multi-Dividing Ontology Algorithms with Convex Ontology Loss Function. 1289-1299 - José Quiroga

, Francisco Ortin
:
SSA Transformations to Facilitate Type Inference in Dynamically Typed Code. 1300-1315 - Fahimeh Ramezani

, Jie Lu
, Javid Taheri, Albert Y. Zomaya
:
A Multi-Objective Load Balancing System for Cloud Environments. 1316-1337 - Hu He, Xu Yang, Yanjun Zhang

:
On Improving Performance and Energy Efficiency for Register-File Connected Clustered VLIW Architectures for Embedded System Usage. 1338-1352 - Chuanli Zhao, Chou-Jung Hsu, Win-Chin Lin, Wen-Hsiang Wu, Chin-Chia Wu

:
An Investigation of Single-Machine Due-Window Assignment with Time-Dependent Processing Times and a Controllable Rate-Modifying Activity. 1353-1362 - Lucas Bueno Ruas de Oliveira, Elena Leroux, Kátia Romero Felizardo

, Flávio Oquendo, Elisa Yumi Nakagawa:
ArchSORS: A Software Process for Designing Software Architectures of Service-Oriented Robotic Systems. 1363-1381 - Jianbin Huang, Xiaojing Sun, Yu Zhou, Heli Sun

:
A Team Formation Model with Personnel Work Hours and Project Workload Quantified. 1382-1394 - Nieves R. Brisaboa

, Guillermo de Bernardo
, Gilberto Gutiérrez
, Miguel R. Luaces
, José R. Paramá
:
Efficiently Querying Vector and Raster Data. 1395-1413
Volume 60, Number 10, October 2017
Section B: Computer and Communications Networks and Systems
Guest Editorial
- Special Issue on Software-Defined Wireless Networks. 1415-1416

- Xiao Liu, Anfeng Liu

, Qingyong Deng, Haolin Liu:
Large-Scale Programing Code Dissemination for Software-Defined Wireless Networks. 1417-1442 - Yaser Jararweh, Mohammad A. Alsmirat

, Mahmoud Al-Ayyoub, Elhadj Benkhelifa
, Ala Darabseh, Brij Bhooshan Gupta
, Ahmad Doulat:
Software-Defined System Support for Enabling Ubiquitous Mobile Edge Computing. 1443-1457 - Ramon dos Reis Fontes, Mohamed Naoufal Mahfoudi, Walid Dabbous, Thierry Turletti, Christian Esteve Rothenberg

:
How Far Can We Go? Towards Realistic Software-Defined Wireless Networking Experiments. 1458-1471 - Shichao Li, Gang Zhu, Siyu Lin, Chao Shen, Qian Gao, Weiliang Xie, Xiaoyu Qiao:

Ultra Dense Cells Management and Resource Allocation in Green Software-Defined Wireless Networks. 1472-1481 - Seyed Hamed Rastegar, Aliazam Abbasfar, Vahid Shah-Mansouri:

Latency-Aware Sum-Rate Maximization for 5G Software-Defined Radio Access Networks. 1482-1497 - Tao Song

, Yuchen Liu, Yiding Wang, Ruhui Ma, Alei Liang, Zhengwei Qi, Haibing Guan:
Ashman: A Bandwidth Fragmentation-Based Dynamic Flow Scheduling for Data Center Networks. 1498-1509 - Ahmed Abdelaziz

, Tan Fong Ang, Abdullah Gani
, Suleman Khan, Faiz Alotaibi
, Muhammad Khurram Khan
:
On Software-Defined Wireless Network (SDWN) Network Virtualization: Challenges and Open Issues. 1510-1519 - Michael Rademacher

, Karl Jonas
, Florian Siebertz, Adam Rzyska, Moritz Schlebusch, Markus Kessel:
Software-Defined Wireless Mesh Networking: Current Status and Challenges. 1520-1535 - Shaohua Wan

, Yin Zhang
:
Coverage Hole Bypassing in Wireless Sensor Networks. 1536-1544
Volume 60, Number 11, November 2017
Original Articles
- Jianbin Huang, Ze Lv, Yu Zhou, He Li, Heli Sun

, Xiaolin Jia:
Forming Grouped Teams with Efficient Collaboration in Social Networks. 1545-1560 - Saurav Acharya, Byung Suk Lee, Paul Hines:

Causal Prediction of Top-k Event Types Over Real-Time Event Streams. 1561-1581 - Lein Harn, Ching-Fang Hsu:

A Practical Hybrid Group Key Establishment for Secure Group Communications. 1582-1589 - Emna Fendri, Mayssa Frikha, Mohamed Hammami:

Adaptive Person Re-identification Based on Visible Salient Body Parts in Large Camera Network. 1590-1608 - Hai-Xia Xu

, Wei Zhou, Yaonan Wang, Wei Wang, Yan Mo:
Matrix Separation Based on LMaFit-Seed. 1609-1618 - Tung Doan Nguyen

, Quan Bai
:
Enhance Trust Management in Composite Services with Indirect Ratings. 1619-1632 - Shervan Fekri Ershad

, Farshad Tajeripour:
Impulse-Noise Resistant Color-Texture Classification Approach Using Hybrid Color Local Binary Patterns and Kullback-Leibler Divergence. 1633-1648 - H. M. W. Verbeek

, Wil M. P. van der Aalst
, Jorge Munoz-Gama:
Divide and Conquer: A Tool Framework for Supporting Decomposed Discovery in Process Mining. 1649-1674 - Ming-Hung Wang

, Alex Chuan-Hsien Chang, Kuan-Ta Chen, Chin-Laung Lei:
Estimating Ideological Scores of Facebook Pages: An Empirical Study in Taiwan. 1675-1686 - XiaoHong Han, Yan Qiang, Yuan Lan:

A Bird Flock Gravitational Search Algorithm Based on the Collective Response of Birds. 1687-1716 - Lidia Fotia

, Fabrizio Messina, Domenico Rosaci
, Giuseppe M. L. Sarné:
Using Local Trust for Forming Cohesive Social Structures in Virtual Communities. 1717-1727
Volume 60, Number 12, December 2017
Original Article
- Yang Lu, Jiguo Li, Jian Shen

:
Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model. 1729-1744 - El-Sayed M. El-Alfy

:
Detection of Phishing Websites Based on Probabilistic Neural Networks and K-Medoids Clustering. 1745-1759 - Abderrahim Ait Wakrime:

Satisfiability-Based Privacy-Aware Cloud Computing. 1760-1769 - Jayashree Pougajendy

, Arun Raj Kumar Parthiban
:
Detection of SIP-Based Denial of Service Attack Using Dual Cost Formulation of Support Vector Machine. 1770-1784 - Ying Wu, Jinyong Chang, Rui Xue, Rui Zhang:

Homomorphic MAC from Algebraic One-Way Functions for Network Coding with Small Key Size. 1785-1800 - Damien Vergnaud

:
Comment on 'Attribute-Based Signatures for Supporting Anonymous Certification' by N. Kaaniche and M. Laurent (ESORICS 2016). 1801-1808 - Jianchang Lai, Yi Mu, Fuchun Guo

, Rongmao Chen:
Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization. 1809-1821 - Sha Ma

:
Authorized Equi-join for Multiple Data Contributors in the PKC-Based Setting. 1822-1838 - Howard M. Heys

:
Statistical Cipher Feedback of Stream Ciphers. 1839-1851 - Xiaofang Xia, Wei Liang, Yang Xiao

, Meng Zheng:
Difference-Comparison-based Malicious Meter Inspection in Neighborhood Area Networks in Smart Grid. 1852-1870 - Weiran Liu, Xiao Liu, Jianwei Liu, Qianhong Wu:

Auditing Revocable Privacy-Preserving Access Control for EHRs in Clouds. 1871-1888 - Xavier Bonnaire, Rudyar Cortés

, Fabrice Kordon, Olivier Marin
:
ASCENT: A Provably Terminating Decentralized Logging Service. 1889-1911 - Dario Fiore, María Isabel González Vasco

, Claudio Soriente
:
Partitioned Group Password-Based Authenticated Key Exchange. 1912-1922

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














