Starting from the fifth issue of 2020, Computer Systems Science & Engineering (ISSN 0267-6192) is published by Tech Science Press. All enquiries regarding submissions or subscriptions should be addressed to TSP.
Volume 35 2020
Vol 35 No 1 January 2020
An Internet of things platform for Air Station remote sensing and smart monitoring
David Corral-Plaza, Juan Boubeta-Puig, Guadalupe Ortiz and Alfonso Garcia-de-Prado
Developing an adaptation process for real-coded genetic algorithms
Ridvan Saraçoglu and Ahmet Fatih Kazankaya
Enhanced GPU-based anti-noise hybrid edge detection method
Sa’ed Abed, Mohammed H Ali and Mohammad Al-Shayeji
Impact of fuzzy normalization on clustering microarray temporal datasets using cuckoo search
P Swathypriyadharsini and K Premalatha
Multi level key exchange and encryption protocol for internet of things (IoT)
C T Poomagal, G A Sathish Kumar and Deval Mehta
Vol 35 No 2 March 2020
A model to create organizational value with big data analytics
Ali Mirarab, Seyedeh Leili Mirtaheri and Seyed Amir Asghari
Intelligent choice of machine learning methods for predictive maintenance of intelligent machines
Marius Becherer, Michael Zipperle and Achim Karduck
Application research of color design and collocation in image processing
Feiying Xia and Shenghong Huang
Enhanced schemes for data fragmentation, allocation, and replication in distributed database systems
Masood Niazi Torshiz, Azadeh Salehi Esfaji and Haleh Amintoosi
Research on e-commerce transaction payment system basedf on C4.5 decision tree data mining algorithm
Bing Xu, Darong Huang and Bo Mi
Vol 35 No 3 May 2020
Analysis of factors affecting the profits of closed-loop supply chain members under different subsidy objects
Jing-Hua Zhao, Da-Lin Zeng, Ting-Wei Zhou, Yan Hui and Na Sun
Classification-based fraud detection for payment marketing and promotion
Shuo He, Jianbin Zheng, Jiale Lin, Tao Tang, Jintao Zhao and Hongbao Liu
Data mining of urban new energy vehicles in an intelligent government subsidy environment using closed-loop supply chain pricing model
Jing-Hua Zhao, Da-Lin Zeng, Ting-Wei Zhou and Ze-Chao Zhu
Injury analysis of vehicle-pedestrian collision based on orthogonal experiments
Yuan Min, Xu Fengxiang, Wu Junhao and Zheng Xuefeng
Japanese teaching quality satisfaction analysis with improved apriori algorithms under cloud computing platform
Lini Cai
Study of assessment method based on coupling factor of casualty in earthquake disasters in Guangdong area
He Ping
The impact of privacy seal on users’ perception in network transactions
Jing Chen, Yuchen Luo and Ruiqi Du
The implementation of an English word learning system feedback system and smartphone app
Ye Zhang
The influence ofdigital multimedia communication forms on graphic design
Shenghong Huang
The method for extracting new login sentiment words from Chinese micro-blog basedf on improved mutual information
Guangli Zhu, Wenting Liu, Shunxiang Zhang, Xiang Chen and Chang Yin
Vol 35 No 4 July 2020
Prediction of college students’ physical fitness based on K-means clustering and SVR
Peng Tang, Yu Wang and Ning Shen
Pattern recognition of construction bidding system based on image processing
Xianzhe Zhang, Sheng Zhou, Jun Fang and Yanling Ni
A digital start-up project – CARM tool as an innovative approach to digital government transformation
S Green
A proposal for addressing security issues related to dynamic code loading on Android platform
Aleksandar Kelec and Zoran Djuric
Cost effective smart system for water pollution control with underwater wireless sensor networks: a simulation study
Muhammed Enes Bayrakdar
Decision tree algorithm for precision marketing via network channel
Yulan Zheng
Security of chip bank card in remote payment based on risk feature
Zheng Fang, Junyun Cai and Lifang Tian
Volume 34 2019
Vol 34 No 1 January 2019
A mathematical task dispatching model in wireless sensor actor networks
Morteza Okhovvat and Mohammad Reza Kangavari
TSLBS: A time-sensitive and load balanced scheduling approach to wireless sensor actor networks
Morteza Okhovvat and Mohammad Reza Kangavari
A novel approach to steganography: enhanced least significant bit substitution algorithm integrated with self-determining encryption feature
Resul Das, Muhammet Baykara and Gurkan Tuna
Modeling and analysis of leftover issues and release time planning in multi-release open source software using entropy based measure
Meera Sharma, H Pham and V B Singh
CORE – an optimal data placement strategy in Hadoop for data intentitive applications based on cohesion relation
S Vengadeswaran and S R Balasundaram
Vol 34 No 2 March 2019
Incorporating stress status in suicide detection through microblog
Yuanyuan Xue, Qi Li, Tong Wu, Ling Feng, Liang Zhao and Feng Yu
A load balanced task scheduling heuristic for large-scale computing systems
Sardar Khaliq uz Zaman, Tahir Maqsood, Mazhar Ali, Kashif Bilal, Sajjad A Madani and Atta ur Rehman Khan
A new enhanced learning approach to automatic image classification based on Salp Swarm Algorithm
Mohammad Behrouzian Nejad and Mohammad Ebrahim Shiri
The implementation of optimization methods for contrast enhancement
Ahmet Elbir, Hamza Osman Ilhan and Nizamettin Aydin
Vol 34 No 3 May 2019
A two-level morphological description of Bashkir Turkish
Can Eyupoglu
A novel fuzzy rough sets theory based CF recommendation system
C Raja Kumar and V E Jayanthi
Non-deterministic outlier detection method based on the variable precision rough set model
Alberto Fernández Oliva, Francisco Maciá Pérez, José Vicente Berná-Martinez and Miguel Abreu Ortega
Application of Radial Basis Function networks with feature selection for GDP per capita estimation based on academic parameters
Abdullah Erdal Tümer and Aytekin Akkus
TeenSensor: Gaussian processes for micro-blog based Teen’s acute and chronic stress detection
Yuanyuan Xue, Qi Li and LingFeng
Vol 34 No 4 July 2019
Special Issue: Applications and Techniques in Cyber Intelligence
Guest Editor: Zheng Xu
An upper bound of task loads in a deadline-d all busy period for multiprocessor global EDF real-time systems
Fengxiang Zhang
Intelligent power compensation system based on adaptive sliding mode control using soft computing and automation
Qidan Zhu and Zhibo Yang
Construction of an onternational digital sharing platform of Dongba manuscripts and Dongba hieroglyphs
Xu Xiaoli, Li Dong, Jiang Zhanglei, Li Ning, Wu Guoxin, Wang Hongjun, Zhang Xu and Bai Feng
Mechanism design and mechanical analysis of multi-suction sliding cleaning robot used in glass curtain wall
Jianxun Deng, Jing Chen and Dingcheng Wang
Modeling and simulation of entrepreneur individual based on dynamic and complex system computing
Xueling Nie, Xinlu Zou and Dishi Zhu
Optimization of the dynamic measure of spillover effect based on knowledge graph
Rui Hua, Yongwen Bao, Shengan Chen and Ziyin Zhuang
Ordering method and empirical study on multiple factor sensitivity of group social attitudes based on entropy theory
Qin He, Shuang Dong and Yaxin Cheng
Personalised product recommendation model based on user interest
Jitao Zhang
R&D investment enhance the financial performance of company driven by big data computing and analysis
Erna Qi and Min Deng
Resource management in cloud computing with optimal pricing policies
Haiyang Zhang, Guolong Chen and Xianwei Li
Vol 34 No 5 September 2019
A survey and systematic categorization of parallel K-means and fuzzy-c-means algorithms
Ahmed A M Jamel and Bahriye Akay
Investigating the effect of software packaging on modular structure stability
Shouki A Ebad and Moataz Ahmed
Implementation of decision trees as an alternative for the support in the decision-making within an intelligent system in order to automatize the regulation of the VOCs in non-industrial inside environments
Liliana Aguilar, Salvador W Nava-Díaz and Gabriel Chavira
Practical application of fractional order controllers to a delay thermal system
Aymen Rhouma, Sami Hafsi and Faouzi Bouani
Vol 34 No 6 November 2019
Computer network assisted test of spoken English
Lu Zuo
Using spatial relations for qualitative specification of gestures
Giuseppe Della Penna and Sergio Orefice
Improving initial flattening of convex-shaped free-form mesh surface patches using a dynamic virtual boundary
Erdem Yavuz, Rifat Yazici, Mustafa Cem Kasapbasi and Turgay Tugay Bilgin
Application layer scheduling in cloud: fundamentals, review and research directions
Vaibhav Pandey and Poonam Saini
Index to Volume 34, 2019
Volume 33 2018
Vol 33 No 1 January 2018
A dynamic independent component analysis approach to fault detection with new statistics
M Teimoortashloo and A Khadi Sedigh
Probabliistic analysis of electrocardiogram (ECG) heart signal
Amjad Gawanmeh, Usman Pervez and Osman Hasan
A scheduling extension scheme of the earliest deadline first policy for hard real-time uniprocessor systems integrated on POSIX threads based on Linux
Vidblain Amaro-Ortega, Arnoldo Díaz-Ramírez, Brenda Leticia Flores-Ríos, Félix Fernando González-Navarro, Frank Werner and Larysa Burtseva
Rank-order correlation-based feature vector context transformation for learning to rank for information retrieval
Jen-Yuan Yeh
Vol 33 No 2 March 2018
Special issue: BigDataSE 2016
Heng Qi and Kequi Li
An iteration-based differentially private social network data release
Tianqing Zhu, Mengmeng Yang, Ping Xiong, Yang Xiang and Wanlei Zhou
The optimization reachability query of large scale multi-attribute constraints directed graph
Kehong Zhang and Kequi Li
Tensor-based user trajectory mining
Chen Yu, Qinmin Hong, Dezhong Yao and Hai Jin
Research on tourist routes recommendation based on the user preference drifting over time
Chunjing Xiao, Yongwei Qiao, Kewen Xia and Yuxiang Zhang
Automated and precise event detection method for big data in biomedical imaging with support vector machine
Lufeng Yuan, Erlin Yao and Guangming Tan
Effective piecewise linear skeletonization of sparse shapes
Wenyu Qu, Zhiyang Li, Junfeng Wu, Yinan Wu and Zhaobin Liu
MapReduce implementation of an improved XML keyword search algorithm
Yong Zhang, Jing Cai and Quanlin Li
Human movement detection and gait periodicity analysis via channel state information
Wenyuan Liu, Zijuan Liu, Lin Wang, Binbin Li and Nan Jing
A dynamic online protection framework for Android applications
Junfeng Xu and Linna Zhou
Online and offline scheduling schemes to maximize the weighted delivered video packets towards maritime CPSs
Tingting Yang, Hailong Feng, Chengming Yang, Ge Guo and Tieshan Li
Vol 33 No 3 May 2018
A risk poker based testing model for Scrum
Siti Noor Hasanah Ghazali, Siti Salwah Salim, Irum Inayat and Siti Hafizah Ab Hamid
Sentiment analysis system in big data environment
Wint Nyein Chan and Thandar Thein
Forensic investigation through data remnants on Hadoop big data storage system
Myat Nandar Oo, Sazia Parvin and Thandar Thein
Integrating a decision tree perspective at the operational-level of BPM+
Ahmad Alomari, Alain April, Carlos Monsalve and Amjad Gawanmeh
Vol 33 No 4 July 2018
Special issue: Future Internet
Preface
Xiulong Liu, Mianxiong Dong and Xiaobo Zhou
Reliable differentiated services optimization for network coding cooperative communication system
Anfeng Liu, Jie Min, Kaoru Ota and Ming Zhao
OpenFlow based dynamic flow scheduling with multipath for data center networks
Haisheng Yu, Heng Qi, Keqiu Li, Jianhui Zhang, Peng Xiao and Xun Wang
PPP: Prefix-based Popularity Prediction for efficient content caching in content-centric networks
Jianji Ren, Shan Zhao, Junding Sun, Ding Li, Song Wang and Zongpu Jia
Analysis and application of the spatio-temporal feature in wind power prediction
Ruiguo Yu, Zhiqiang Liu, Jianrong Wang, Mankun Zhao, Jie Gao and Mei Yu
Spectrum allocation for cognitive radio networks using the fireworks algorithm
Zhou Feng and Xue Weilian
Topic evolution analysis in social networking services: taking Sina Weibo as an example
Yuhui Wang
Vol 33 No 5 September 2018
Special issue: 2017 International Conference on Applications and Techniques in Cyber Intelligence (ACTI 2017)
Editorial: Zheng Xu and Kun Gao
A description method for formalizing domain-specific modelling language
Tao Jiang
ADL-RAID: Energy-saving data layout for dynamic loads
Youxi Wu, Shengyuan Shi, Jingyu Liu and Huaizhong Zhu
Design of greenhouse temperature and humidity measuring system based on ZigBee technology
Xuejun Tian, Jianliang Li and Lihua Luo
Face detection method for public safety surveillance based on convex grouping
Jianhui Wu, Feng Huang, Wenjing Hu, Wei He, Bing Tu, Longyuan Guo and Xianfeng Ou
Lateral conflict model of training flight based on subjective factors
Kaijun Xu, Yusheng Yao and Shanshan Li
Liveness and boundedness preservations of sharing synthesis of Petri net based representation for embedded systems
Chuanliang Xia, Bin Shen, Hailin Zhang and Yigui Wang
Prediction and abnormality assertion on EMU brake pad based on multivariate integrated random walk
Hongsheng Su, Shuangshuang Wang and Dengfei Wang
A dynamic online protection framework for Android applications
Junfeng Xu and Linna Zhou
Research on K maximum dominant skyline and e-GA algorithm based on data stream environment
Wang Qi
The definition and numerical method of final value problem and arbitrary value problem
Shixiong Wang, Jianhua He, Chen Wang and Xitong Li
Evaluation of industry eco-industrialization: Case study of Shaanxi, China
Shuru Liu, Ping He and Jiqiang Dang
Research on the clustering analysis and similarity in factor space
Sha-Sha Li, Tie-Jun Cui and Jian Liu
Vol 33 No 6 November 2018
Improving support vector domain description by maximizing the distance between negative examples and the minimal sphere centres
Mohamed El Boujnouni and Mohamed Jedra
Energy aware routing algorithm in MANET using linear programming
Hany Ramanad, Ben Bella S Tawfik and Alaa El Din M Riad
A phoneme-based approach for eliminating out-of-vocabulary problem Turkish speech recognition using Hidden Markov Model
Erdem Yavuz and Vedat Topuz
Reliable approximated number system with exact bounds and three-valued logic
Reeseo Cha, Wonhong Nam and Jin-Young Choi
Index to Volume 33, 2018
Volume 32 2017
Vol 32 No 1 January 2017
Adaptive Duty Cycle (ADC) energy efficient algorithm for ZigBee networks
Wail Mardini, Yaser Khamayseh, Marwa Salayma, Muneer Bani Yassien and Hussien Mouftah
An adaptive edge detection operator for noisy images based on a total variation approach restoration
Sa’ed Abed, Mohammed H Ali and Mohammad Al-Shayeji
Soft error tolerance using HVDQ (Horizontal-Vertical-Diagonal-Queen parity method)
Sakib Ahammed, Muhammad Sheikh Sadi, Md Shamimur Rahman and Jan Jürjens
Change management technique for supporting object oriented diagrams changes
Bassam Atieh Rajabi and Sai Peck Lee
Vol 32 No 2 March 2017
Special Issue: Foundations and Practice of Security in Emerging ICT Applications
Guest Editors: Ilsun You, Sherali Zeadally and A Min Tjoa
Detecting local covert channels using process activity correlation on Android smartphones
Marcin Urbanski, Wojciech Mazurczyk, Jean-Francois Lalandey and Luca Caviglione
k-out-of-n oblivious transfer protocol with security against malicious adversaries
Xiaochao Wei, Qiuliang Xu and Yi Tang
A corrupted cloud and corrupted multi-cloud identification method for batch auditing in cloud storage services
Sooyeon Shin and Taekyoung Kwon
Enhanced TKTOFT protocol for ternary based distributed group key management in cognitive radio networks
C Mala, N Renugadevi and Hsing-Chung Chen
Security threats in M2M networks: a survey with case study
Fatima Hussain, Lilatul Ferdouse, Alagan Anpalagan, Lutful Karim and Isaac Woungang
Fast backup and recovery for web protectiuon using trigger and block hash approach
Qian He, Ning Zhang, Jinshu Su and Xiao-Song Zhang
An extensive empirical evaluation of classifier ensembles for intrusion detection task
Bayu Adhi Tama and Kyung-Hyune Rhee
Achieving a scalable and secure software defined network by identifiers separating and mapping
Mingxin Wang, Huachun Zhou and Jia Chen
Abnormal behaviour pattern mining for unknown threat detection
Chang Choi, Junho Choi and Pankoo Kim
Vol 32 No 3 May 2017
Optimal agreement under fallible mobile network
Shun-Sheng Wang and Shu-Ching Wang
An adaptive edge detection operator for noisy images based on a total variation approach restoration
Sa’ed Abed, Mohammed H Ali and Mohammad Al-Shayeji
Inspection reading techniques applied to software artifacts – a systematic review
Shouki A Ebad
Formal verification and performance evaluation of task scheduling heuristics for makespan optimization and workflow distribution in large-scale computing systems
Sardar Khaliq uz Zaman, Atta ur Rehman Khan, Saif ur Rehman Malik, Abdul Nasir Khan, Tahir Maqsood and Sajjad A Madani
A bottom-up semantic mapping approach for exploring manufacturing information resources in industry
Sara Bouzid
Vol 32 No 4 July 2017
Special Issue: Elastic Data Management in Cloud Systems
Guest Editors: Abdelkader Hameurlain and Riad Mokadem
On scalability of two NoSQL data stores for processing interactive social networking actions
Sumita Barahmand, Shahram Ghandeharizadeh and Jia Li
A QoS-aware approach for discovering and selecting configurable IaaS Cloud services
Jalel Eddine Hajlaoui, Mohamed Nazih Omri and Djamal Benslimane
Autoscaling scientific workflows on the cloud by combining on-demand and spot instances
David A Monge, Yisel Garí, Cristian Mateos and Carlos García Garino
Experimental comparative study of NoSQL databases: HBASE versus MongoDB by YCSB
Houcine Matallah, Ghalem Belalem and Karim Bouamrane
A clustering-based sampling method for building query response time models
Jinwen Zhang and Baoning Niu
Vol 32 No 5 September 2017
Design of optimal elliptic curve cryptography by using partial parallel shifting multiplier with parallel complementary
S Hemalatha, V Rajamani and V Parthasarathy
Genetic algorithm based energy-saving ATO control algorithm for CBTC
Zheng Wang, Xiangxian Chen, Hai Huang and Yue Zhang
An optimized adaptive neuro-fuzzy inference system to estimate software development effort
Seyyed Hamid Samareh Moosavi and Vahid Khatibi Bardsiri
A context-aware hierarchical approach for activity recognition based on mobile devices
Shugang Zhang, Zhiqiang Wei, Jie Nie, Lei Huang and Zhen Li
Design and analysis of control strategies for a cyber physical system
Amjad Gawanmeh, Abdullah Abu Omar and Alain April
A MapReduce-based efficient H-bucket PMR quadtree spatial index
Hari Singh and Seema Bawa
Vol 32 No 6 November 2017
SPECIAL ISSUE: International Symposium on Parallel and Distributed Processing with Applications
Preface
Xiaobo Zhou and Kequi Li
A CRAHNs routing protocol based on the hops, channel number and channel capacity
Xue Weilian, Yuan Zhibo and Niu Bingxin
A practical M x N search routing in mobile opportunistic networks
Peng Liu, Jia Xu, Biao Xu, Tingting Fu, Zhen Jiang and Jie Wu
Joint correlation exploitation and network coding in two-way relaying systems
Zongliang ZhuanSun, Kequi Li, Heng Qi and Guolong Chen
Distributed state prediction based geographic routing for underwater acoustic sensor network
Lei Zhang, Gang Zhang, Bin Wu, Ting Zhao and Yang Shao
An efficient racetrack memory for L2 cache in GPGPUs
Ehsan Atoofian and Ahsan Saghir
SCS – A new non-volatile cache mechanism for SSD systems
Xiang Gao, Tianfang Xiao and Meifang Yang
Simulation of heat conduction in fluids on GPU with particle method
Darcy Qingzhi Hou, Zhe Wang, Jianwu Dang, Wenhuan Lu, Yuejin Cai and Jianguo Wei
Learning-based distributed locality sensitive hashing
Jia Shi, Zhaobin Liu, Zhiyang Li, Chang Liu and Wenyu Qu
Probabilistic energy-aware scheduling for wireless networked control systems
Qiang Lin, Guowei Wu and Jiankang Ren
Straight-line tracking control for underactuated ships based on LOS and adaptive fuzzy method
Chengming Yang and Zaojian Zou
Index to Volume 32, 2017
Volume 31 2016
Vol 31 No 1 January 2016
Improving the quality of mobile target detection through portion of node with full duty cycle in WSNs
Yanling Hu and Anfeng Liu
Bridging the semantic gap for automatic image annotation by learning the manifold space
Mohammad Ali Zare Chahooki and Nasrollah Moghaddam Charkari
Goals and scenarios based web requirements engineering
Shailey Chawla, Sangeeta Srivastava and Punam Bedi
An enhanced dynamic detection of possible invariants based on best permutation of test cases
Hamid Alishvandi, Gholam Hosein Gouraki and Hamid Parvin
Enhancing multimedia caching algorithms for variable-bandwidth streams using adaptive and smoothing techniques
Javier Fernández Calderón, Félix García and Jesús Carretero
Vol 31 No 2 March 2016
Special issue: BDCloud 2015 and FCST 2015
Guest Editors: Zhiyang Li and Nei Kato
Long-term revenue maximization pricing scheme for cloud
Wen-Kai Huang, Chang-Dong Wang, Shao-Shu Huang, Zheng Li, Jian-Huang Lai and Ling Huang
A frequent pattern parallel mining algorithm based on distributed sliding window
Chen Bo, Duan Cheng YOng and Gao Xiue
Discovering probabilistic frequent closed itemsets in uncertain database with tuple uncertainty
Fengjuan Chen, Wenyu Qu, Lihai Nie, Junfeng Wu and Yuanyuan Li
Taxi-taking recommendation using real-time trajectories: an online query based approach
Yifan Chen, Xiang Zhao, Jiuyang Tang, Weiming Zhang and Haichuan Shang
An optimization model of Hadoop cluster performance prediction based on Markov process
Xiaowei Zheng, Jiaxuan Li, Yong Zhang and Qingkun Liu
Clustering routing method based on social characteristic in campus DTN
En Wang, Yongjian Yang, Wenbin Liu and Fan Wang
Information security in practices: Exploring privacy and trust in computer and inernet surveillance
Shuchih Ernest Chang and Anne Yenching Liu
Towards risk evaluation algorithm of PSC ship-selecting system based on hierarchic analysis and grey integrated clustering method
Tingting Yang, Zhonghua Sun, Zhou Su, Hailong Feng and Ruilong Deng
Topological separation axioms of soft rough formal context
Li Fu and Zhen Liu
Ascending partition method for differentially private histogram publication
Yangyang Xu, Zhaobin Liu and Zhonglian Hu
Vol 31 No 3 May 2016
Estimation error-aware query optimization: an overview
Chiraz Soussi Moumen, Franck Morvan and Abdelkader Hameurlain
A practical reliable reputation based data fusion method for ad-hoc wireless sensor networks
Zhe Wei, Fang Wang and Le Sun
Neighbour unpredictability measure in multiword expression extraction
Senem Kumova Metin
A Petri Net extension for formal modelling of information systems
Sasa Kresoja, Milos Rackovic, Srdjan Skrbic and Bojana Dimic Surla
Energy efficient dual execution mode scheduling for real-time tasks with shared resources
Jun Wu
Vol 31 No 4 July 2016
Adaptive hierarchical bitmap-based index for wireless broadcast environments in an emergency
Doohee Song and Kwangjin Park
Performance evaluation comparison for detecting DNA structural break through big data analysis
Md. Sarwar Kamal, Sonia Farhana Nimmy and Sazia Parvin
Effective indexing and searching with dimensionality reduction on high-dimensional space
Seungdo Jeong, Sang-Wook Kim and Byung-Uk Choi
Exploiting flow equivalent server in transient analysis
Alessio Angius, András Horváth, Sami M Halawani, Omar Barukab, Ab Rahman Ahmad and Gianfranco Balbo
Vol 31 No 5 September 2016
XML schema matching using early dissimilarity detection approaches
Ahmad Abdullah Alqarni and Eric Pardede
Data allocation in a Heterogeneous Disk Array (HDA) with multiple RAID levels for database applications
Alexander Thomasian and Jun Xu
FPGA implementation of programmable cellular automata encryption algorithm for network communications
Petre Anghelescu
Extending visual information extraction to biomedical applications
Giuseppe Della Penna, Daniele Magazzeni and Sergio Orefice
An optimal tabu prioritization algorithm for regression testing
Khanna H Nehemiah, Angelin Gladston and A Kannan
Vol 31 No 6 November 2016
Special issue: Cyber-Physical System-related Technologies and Applications
Guest Editors: Zheng Xu, Vijayan Sugumaran and Hui Zhang
Computer aided study of factors that influence the cooperative willingness of
water-related public organizations
Qiu Ling and Qi Linkai
The scalable vocabulary tree based model for sub-image retrieval
Quan-Dong Feng, Miao Xu and Xin Zhang
Hierarchical gradient based parameter identification for non-uniformly sampling Wiener systems
Liu Ranran, Zheng Enxing, Chang Shan, Bei Shaoyi and Zhang Lanchun
Hierarchical stochastic gradient identification for non-uniformly sampling Hammerstein systems with colored noise
Liu Ranran, Zheng Enxing, Chang Shan, Bei Shaoyi and Zhang Lanchun
Research on the effects of blasting vibration attenuation by pre-split crack with HHT method
Tao Guo, Xiang Fang, Mingshou Zhong, Huayuan Ma and Yiming Mao
Stochastic gradient identification for Hammerstein systems with non-uniformly sampling
Zheng Enxing, Liu Ranran, Jiang Yifeng, Sun Yuxia and Ni FuYin
The realization of multi agent based online trading systems based on J2EE technology
Tian Run Hu, Zhang Yan Bin and Jia Lixin
The service quality evaluation of ecologic economy systems using simulation computing
Qingyuan Zhou and Juan Luo
The state space model of remanufacturing carbon footprint for low-carbon
Cui-Xia Zhang
The system of knowledge management using web based learning and education technology
Wenshu Bao, Haiying Zhou, Wang Lu and Feng Xie
Using cross ambiguity model improves the effect of Vietnamese word segmentation
Yitong Niu, Mingming Xiong, Jianyi Guo, Cunli Mao, Yantuan Xian and Zhengtao Yu
Index to Volume 31 2016
Volume 30 2015
Vol 30 No 1 January 2015
Special issue: New Holistic Trends in Ambient Intelligence
Editorial: Ramón Hervas and José Bravo
Goal lifecycles and ontological models for intention based assistive living within smart environments
Joseph Rafferty, Liming Chen, Chris Nugent and Jun Liu
Ontological characterization and representation of context within smart environments
Laura M McAvoy, Liming Chen, Mark P Donnelly, Chris D Nugent and Paul J McCullagh
An anomolous situation detection system for cognitive impaired people
Antonio Coronato and Giovanni Paragliola
Out of context serious games: Transversal reutilization of games across healthcare domains
Alberto L Morán, Felipe Orihuela-Espina, Victoria Meza-Kubo, Ana I Grimaldo, Cristina Ramírez-Fernández, Eloísa García-Canseco, Juan M Oropeza-Salas and Luis E Sucar
Social connector: a ubiquitous system to ease the social interaction among family community members
Diego Muñoz, Francisco J Gutierrez, Sergio F Ochoa and Nelson Baloian
A model-driven approach to service composition on the basis of the specification of BPMN choreographies
Carlos Rodríguez-Domínguez, Tomás Ruiz-López, José Luis Garrido, Manuel Noguera and Kawtar Benghazi
Web-based applications for open display networks: developers’ perspective
Constantin Taivan, Rui José and Bruno Silva
Vol 30 No 2 March 2015
Magio: using mobile agents to enhance parallel I/O
David E Singh, Florin Isaila, Félix García and Jesús Carretero
Integrating outlier removal into existing histogram construction methods for geographic data
Hai Tanh Mai, Jaeho Kim and Myoung Ho Kim
Parameters’ fine tuning of differential evolution algorithm
Rawaa Dawoud Al-Dabbagh, Saad Mekhilef and Mohd Sapiyan Baba
Session identification based on linked referrers and web log indexing
ChaoYong Qin and Chenhan Liao
Optimal WiMax backhauling solutions for WiFi traffic
Glaucio H S Carvalho
Vol 30 No 3 May 2015
A distance based approach for link analysis in XML information retrieval
M’hamed Mataoui and Mohamed Mezghiche
Dynamic filtering of sensor readings for approximate query processing in sensor networks
Hai Tanh Mai, Ki Yong Lee and Myoung Ho Kim
Improving application layer multicast forwarding performance by offloading multisend operations
Jijun Cao and Jinshu Su
SDD-matcher: a semantic-driven data matching framework
Yan Tang Demey and Gang Zhao
Recognition of driving postures by nonsubsampled contourlet transform and k-nearest neighbor classifier
Chihang Zhao, Jie He, Xiaoqin Zhang, Xingzhi Qi and Aiwen Chen
Set agreement and the loneliness failure detector in crash-recovery systems
Sergio Arévalo, Ernesto Jiménez, Jian Tang and Rommel Torres
Vol 30 No 4 July 2015
Harmony and bio inspired harmony search optimization algorithms for feature selection in classification
S Varadhaganapathy, V Krishnaveni, G Arumugam and R R Rajalaxmi
Fabric defect localization using line variances of the local homogeneity images
A Rebhi, S Abid and F Fnaiech
A reputation-based computing approach in trusted web service provisions
Ping Wang, Kuo-Ming Chao and Chi-Chun Lo
Bridging the semantic gap for automatic image annotation by learning the manifold space
Mohammad Ali Zare Chahooki and Nasrollah Moghaddam Charkari
Prosumer recruitment framework for prosumer community groups in smart-grid
A J Dinusha Rathnayaka, Vidyasagar M Potdar, Tharam Dillon and Omar Hussain
Vol 30 No 5 September 2015
Special issue
Big Data-related Technologies and Applications
Zheng Xu, Yunhuai Liu, Xiangfeng Luo and Qing Li
Artificial neural network based grid computing of e-governance scheduling for emergency management
Qingyuan Zhou and Jianjian Luo
A task distribution algorithm compatible with background control framework for parallel simulation
Qingjun Qu and Yiping Yao
Investigation on remote monitoring system for hybrid electric bulldozer
Yan Wei, Shi Songshan, Liu Zhenggang and Li Guoxiang
Design and analysis of communication scheduling applied in water inrush perception layer of mine internet of things
Jin Bao-quan, Bai Qing, Zhang Hong-juan, Wang dong and Gao Yan
Energy-efficient power allocation for MIMO two-way cognitive relay networks
Shengqing Zhang, Jiakuo Zuo, Li Zhao and Cairong Zhu
Generating associated knowledge flow in large-scale web pages based on user interaction
Shunxiang Zhang, Kui Lu, Wenjuan Liu, Xiaobo Yin and Guangli Zhu
A SoPC design of a real-time high-definition stereo matching algorithm
Xiang Zhang, HuaiXiang Zhang, Yifan Wu and Guojun Dai
The semantic analysis of knowledge map for the traffic violations from the surveillance video big data
Zheng Xu and Haiyan Chen
Robust local outlier detection with statistical parameter for big data
Jingsheng Lei, Teng Jiang, Kui Wu, Haizhou Du and Lin Zhu
Building the concept semantic space for large text database
Xiao Wei, Daniel Dajun Zeng, Wei Wu and Yeming Dai
Vol 30 No 6 November 2015
Special issue
ICA3PP/U-Science 2014
Weijiang Liu and Zhiyang Li
Dynamic resource allocation based on energy utility maximization using virtual machines in cloud environment
Xiaohua Jia, Jinhai Wang, Chuanhe Huang, Qin Liu, Kai He, Jing Wang and Peng Li
Heavy hitter identification based on adaptive sampling with mapreduce
Aiping Zhou, Guang Cheng, Xiaojun Guo, Dinh Tu Truong and Chengang Zhu
Security games for service computing applications
Xinfeng Ye
Rescheduling rework jobs on single-machine of original jobs with release times
Yandong Guo, Min Huang and Qing Wang
QoS oriented task scheduling based on generic algorithm in cloud computing
Tingting Wang, Weijiang Liu, Yujie Xu and Mianxiong Dong
Index to Volume 30, 2015
Volume 29 2014
Volume 29 Number 1 January 2014
Special issue: CUBE 2012
Guest Editor
Vidyasagar Potdar
A two-phase quantitative methodology for enterprise information security risk analysis
Jaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar and Mridul Sankar Barik
Efficient spam filtering based on informative features extracted from the header fields and the URLs in the message
Aziz Qaroush, Mahdi Washaha and Ismail Khater
Diagnosis of dysarthria subtype via spectral and waveform analysis
James Carmichael
Trust evaluation in wireless ad-hoc networks using fuzzy system
Pallavi Khatri, S Tapaswi and U P Verma
Discussions on trade-offs in data aggregation in wireless sensor networks
Wuyungerile Li, Shunsuke Saruwatari, Masaki Bandai and Takashi Watanabe
Generic organization of semi-structured data
Supriya Chakraborty and Nabendu Chaki
Rate and relay diversity in temporal spectrum sharing
Ari Raptino H, Shunsuke Saruwatari, Masaki Bandai and Takashi Watanabe
Cheating detection and cheater identification in (t, n) secret sharing scheme
Zhixiao Wang, Yanxiao Liu, Wenyao Yan, Wei Wei, Junhuai Li, Deyun Zhang and Omar Alfandi
Implementing adaptive interfaces: a use model for the development of usability in interactive systems
Andrés Mejía, Reyes Juárez-Ramírez, Sergio Inzunza and Rocio Valenzuela
Decision trees to multiclass prediction for analysis of arecanut data
M Suresha, Ajit Danti and S K Narasimhamurthy
Software industry in Okinawa: is ‘domestic offshore outsourcing’ scheme feasible?
Atsushi Kato
Volume 29 Number 2 March 2014
“LogN+1” and “LogN” model: a binary tree based multi-level cache system for multi-core processors
Muhamman Ali Ismail, Shahid H. Mirza and Talat Altaf
A fuzzy logic based framework for assessing the maturity level of Indian small scale software organizations
A. M. Kalpana, K. Tamizarasu and A. Ebenezer Jeyakumar
Scalable hierarchical scheduling for malleable parallel jobs on multiprocessor-based systems
Yangjie Cao, Hongyang Sun, Depei Qian and Weiguo Wu
Routing protocols for mobile sensor networks: a comparative study
Shahzad Ali, Sajjad A. Madani, Atta ur Rehman Khan and Imran Ali Khan
Volume 29 Number 3 May 2014
A novel reversible design for double edge triggered flip-flops and new designs of reversible sequential circuits
Marian Zomorodi Moghadam, Keivan Navi and Mahmood Kalemati
A fast fusion technique for fingerprint and iris spatial descriptors in multimodal biometric systems
Carmelo Militello, Vincenzo Conti, Filippo Sorbello and Salvatore Vitabile
Design of a fuzzy-labview-based mechanical ventilator
Hasan Guler and Fikret Ata
A systematic review in the decision analysis of selecting an IT outsourcing supplier
Lucas Grossi and Jose A Calvo-Manzano
A highly robust approach to face authentication based on trace-fuzzy ART combination
Rerkchai Fooprateepsiri and Pichet Mareo
Volume 29 Number 4 July 2014
SPECIAL ISSUE: Multimedia Information Processing and Retrieval
Guest Editors: Kequi Li and Heng Qi
Preface
Kequi Li and Heng Qi
Multi-stage deep convolutional learning for people re-identification
Guan-Wen Zhang, Jien Kato, Yu Wang and Kenji Mase
Efficient shape representation and retrieval in large database
Zhiyang Li, Wenyu Qu, Yujie Xu, Junjie Cao and Zhixun Su
Implementation and evaluations of graphical password using object-based image ranking
Cuong Xuan Nguyen, Hung-Hsuan Huang and Kyoji Kawagoe
A hierarchical kernel for image classification based on layered representation
Heng Qi, Guoyu Lan and Kequi Li
Multiple graph regularization constrained nonnegative matrix factorization
Wei Jiang, Cong Wang and Yong-Qing Zhang
Volume 29 Number 5 September 2014
A bi-dimensional QoS model for SOA and real-time middleware
Marisol García-Valls, Pablo Basanta-Val, Marga Marcos and Elisabet Estévez
A survey on computing prime implicants and implicates in classical and non-classical logics
Manoj K Raut and Arindama Singh
Interactive discovery of association rules over data streams
Se Jung Shin and Won Suk Lee
Application of digital image processing in the determination of mass of the diamonds
R Anitha and K Duraiswamy
DNA computation algorithm for recyclable waste paper sorting
Mohammad Osiur Rahman, Aini Hussain, Edgar Scavino, M A Hannan and Hassan Basri
Volume 29 Number 6 November 2014
SPECIAL ISSUE: MOBILE INTERNET TECHNOLOGIES AND SERVICES
Editorial: Ilsun You, Fang-Yie Leu and Leonard Baroli
Modeling and analysis of mobility stochastic properties in cognitive radio networks
Jianfeng Guan, Wei Quan, Lili Wang, Changqiao Xu, Feilong Tang and Hongke Zhang
Performance evaluation of IEEE 802.11 contention control mechanisms using polygonal sequences
C Mala and B Nithya
Dual migration for mobile cloud service in 4G/LTE network
Wei Kuang Lai, Yi-Uan Chen, Tin-Yu Wu and Ya-Yin Chen
AAM -based emotion recognition using variance of facial feature points on mobile video stream
Yong-Hwan Lee, Bonam Kim and Youngseop Kim
Design and experiments of new IP traceback method based on offline analysis
Ho-Seok Kang, Tran Tin and Sung-Ryul Kim
PCNDN: Proactive caching for efficient mobility support in NDN
Ying Rao, Huachun Zhou, Deyun Gao, Hongbin Luo and Ying Liu
Volume 28 2013
Volume 28 Number 1 January 2013
Integrated and interactive software solution for knowledge-based supply network design
Nenad Stefanovic and Dusan Stefanovic
Collective Classification for Packed Executable Identification
Xabier Ugarte-Pedrero, Igor Santos, Carlos Laorden, Borja Sanz and Pablo G. Bringas
An Empirical Evaluation for Feature Selection Methods in Phishing Email Classification
Mahmoud Khonji, Andrew Jones and Youssef Iraqi
Comparing commercial IP reputation databases to open-source IP reputation algorithms
Jernej Porenta and Mojca Ciglaric
Volume 28 Number 2 March 2013
B2B magics: a mobile agent-based internet commerce system for B2B e-commerce
Lei Ye and Henry C B Chan
A list of features that a graphical XML query language should support
K Bekiropoulos, E Keramopoulos, O Beza and P Mouratidis
RFID mutual authentication protocols for tags and readers with and without a server
Song Han, Tharam Dillon, Vidy Potdar and Elizabeth Chang
One-dimensional spatial join processing using a DOT-based index structure
Jun-Im Won, Hyun Back, Jee-Hee Yoon, Sanghyun Park and Sang-Wook Kim
Improved storage system performance by disk scheduling
Alexander Thomasian
Volume 28 Number 3 May 2013
Algorithmic bipanpath connectivity of the hypercube
Jywe-Fei Fang and Chien-Hung Huang
Emergency vehicle preemption system based on global positioning system (GPS), A-star (A*) algorithm and FPGA
Mohd Yamani Idna Idris, Moraali Sivalingam, Emran Mohd Tamil, Zaidi Razak and Noorzaily Mohamed Noor
A hypervisor based platform to support real-time safety critical embedded java applications
Apolinar Gonzalez, Walter Mata, Alfons Crespo, Miguel Masmano, José Félix and Alvaro Aburto
A business-to-business e-commerce system using software agents and RFID
Lei Ye, Adam S K Ho, Solomon K S Leung and Henry C B Chan
Priority-based scheduling for dependent processes using random selection of resource holders
Tarek Helmy
A web cluster architectural proposal for balancing storage capacity and reliability
by using partial replication
J Daniel Garcia, Jesus Carretero, Javier Garcia, Luis Miguel Sanchez and Felix Garcia
Volume 28 Number 4 July 2013
An algorithm for merging two classification trees for test case generation
P. Prema, B. Ramadoss and S. R. Balasundaram
Analysis and modeling of multivalued attributes in entity relationship modeling: an approach for improved database design
Vimala S., Khanna Nehemiah H., Saranya G. and Kannan A.
Resource management for mobile operating systems based on the active object model
Marisol García-Valls, Alfons Crespo and Joan Vila
Integration of traffic reduction and sleep scheduling for energy-efficient data gathering in wireless sensor networks
Shinya Kondo, Akimitsu Kanzaki, Takahiro Hara and Shojiro Nishio
An exploratory study of package metrics as change size indicators in evolving
object-oriented software
Mahmoud O. Elish
Term expansion on the categorization of summarized documents
Wen-Feng Hsiao and Te-Min Chang
Volume 28 Number 5 September 2013
Session identification based on linked referrers and web log indexing
ChaoYong Qin and Chenhan Liao
Prosumer recruitment framework for prosumer community groups in smart-grid
A. J. Dinusha Rathnayaka, Vidyasagar M. Potdar, Tharam Dillon, Omar Hussain and Samitha Kuruppu
Discovering semantic associations between web services based on the electrostatic force theory
Kun Yue, Wei-Yi Liu, Wen-Hua Qian and Xiao-Feng Wang
A bi-dimensional QoS model for SOA and real-time middleware
Marisol García-Valls, Pablo Basanta-Val, Marga Marcos and Elisabet Estévez
Application of digital image processing in the determination of mass of the diamonds
R. Anitha and K. Duraiswamy
Enhancing multimedia caching algorothms for variable-bandwidth streams using adaptive and smoothing techniques
Javier Fernández, Alejandro Calderón, Félix García and Jesús Carretero
Volume 28 Number 6 November 2013
Special issue: 2nd International Symposium on Secure Virtual Infrastructures
Editorial
Alois Ferscha and Siani Pearson
Mechanisms for Protecting Sensitive Information in Cloud Computing
Tomer Gershoni, Miranda Mowbray and Siani Pearson
Control as a Means towards Accountable Services in the Cloud
Volkmar Lotz, Anderson Santana de Oliveira and Jakub Sendor
How to Act Without being Observed: Progressive Privacy Architecture in Desktop-as-a-Service
D. Davide Lamanna, Flavio Bertini, Giorgia Lodi and Roberto Baldoni
An Advanced Intrusion Detection Framework for Cloud Computing
Massimo Ficco, Salvatore Venticinque and Beniamino Di Martino
Adaptability Driven by Quality of Execution in High Level Virtual Machines for Shared Cloud Environments
José Simão and Luís Veiga
Towards an Accurate Evaluation of Deduplicated Storage Systems
João Paulo, Pedro Reis, José Pereira and António Sousa
Secure Cloud Transactions
Debmalya Biswas and Krishnamurthy Vidyasankar
Index to Volume 28, 2013
Volume 27 2012
Volume 27 Number 1 January 2012
Special Issue: Advanced Computing in Intelligent Large-scale Distributed Systems
Preface
Guest Editors: Joanna Koodziej and Hiroaki Nishino
Agent-based computing in an augmented cloud environment
Aleksander Byrski, Roman Debski and Marek Kisiel-Dorohinicki
Data integration: the method of data mapping, matching and loading grid staging catalogue
Ejaz Ahmed, Nik Bessis, Peter Norrington and Yong Yue
Hierarchical visual motion retrieval system for distributed motion DB and its user experiments
Seiji Okajima and Yoshihiro Okada
Network formation games in non-cooperative service overlay networks
Yutaka Okaie and Tadashi Nakano
A study on the effect of mutation in genetic algorithms for mesh router placement in wireless mesh networks
Admir Barolli, Fatos Xhafa, Christian Sánchez and Makoto Takizawa
Development and evaluation of an interactive texture design method
Tsuneo Kagawa, Hiroaki Nishino and Kouichi Utsumiya
Image processing of dotted picture in QR code code of cellular phones
Toshihiko Wakahara, Noriyasu Yamamoto and Hiroki Ochi
Volume 27 Number 2 March 2012
Special issue: Service Oriented Computing and Applications
Guest Editors: Jun Shen, Soo Dong Kim and Nalini Venkatasubramanian
An ontology for e-government service integration
Farzad Sanati and Jie Lu
Optmized ontology-driven query expansion using map-reduce framework to facilitate federated queries
Neda Alipanah, Latifur Khan and Bjavani Thurisingham
Configurable analysis of sequential multi-party choreographies
Andreas Schönberger and Guido Wirtz
Improving QoS assessment over multiple attributes with asynchonous data
Hmood Al-Dossari, Jianhua Shao and Alun Preece
An improved pathfinding under multiple exits with SOA in a double-layered MANET
Jae-Suk Lee and Sung-Bong Yang
Volume 27 Number 3 May 2012
Special issue: Computational Science and its Applications
Preface
Guest Editors: Osvaldo Gervasi, Bernady O. Apduhan, C. J. Kenneth Tan and David Taniar
Performance comparison of BATMAN and AODV protocols for source and destination moving scenarios
Elis Kulla, Masahiro Hiyama, Makoto Ikeda, Leonard Barolli, Bexhet Kamo
and Rozeta Miho
DSSH: Digital signature based secure handover for network-based mobility management
Ilsun You, Jong-Hyouk Lee and Kouichi Sakurai
Integration of traffic reduction and sleep scheduling in wireless sensor networks
Shinya Kondo, Akimitsu Kanzaki, Takahiro Hara and Shojiro Nishio
Clearance-based homotopic optimal path computation
Mahmudul Hasan, Marina L. Gavrilova and Jon G. Rokne
A methodology for modelling temporal nature of trust in trust maintenance for
digital enterprise
Olivia Fachrunnisa and Farookh Khadeer Hussain
Volume 27 Number 4 July 2012
Resource allocation for query processing in grid systems: a survey
Deniz Cokuslu, Abdelkader Hemeurlain and Kayhan Erciyes
Inlining with traces in Java programs
Bory J. Bradel and Tarek S. Abdelrahman
ESGIA: Extensible service based grid information aggregator
D. Surendran, T. Purusothaman, R. A. Balachandar and G. Kousalya
A framework for scalable autonomous P2P resource discovery for the grid implementation
Hesham A. Ali, Mofreh M. Salem and Ahmed A. Hamza
Volume 27 Number 5 September 2012
Special issue: Advances in Ubiquitous Computing, Wireless and Mobile Networking, and Applications
Editorial
Ilsun You, Leonard Barolli and Feilong Tang
A rate-allocation based multi-path control scheme for event-driven wireless sensor networks on constant event packet rates
Fang-Yie Leu, Fuu-Cheng Jiang, Chih-Cheng Lien, Sen-Tarng Lai and Shiuan-You Chiou
Energy-saving in wireless sensor networks considering mobile sensor nodes, single and multi events
Tao Yang, Tetsuya Oda, Gjergji Mino, Leonard Barolli, Arjan Durresi and Fatos Xhafa
Differentiated bandwidth allocation and wavelength assignment method in WDM EPON
Min-jun Kim, Yong-suk Jang, Yong-do Choi and Sung-ho Kim
Utility-based resource allocation in heterogeneous wireless environments using game theory
Yuhoing Li, Liang Yu, Tao Li, Yishan Li and Yan Shi
Grid transaction management and an efficient development kit
Feilong Tang, Ilsun You, Shui Yu, Huakang Li and Cho-Li Wang
A new iterative learning control scheme using the geometric rotation for discrete time systems
Yu Han, Naigao Jin, Guangwei Xu and Kangbin Yim
Parallelization of normal mode-WKBZ computation for ocean acoustic field
Tingting Liu, Jie Cui, Bo Wang and Gang Chen
Volume 27 Number 6 November 2012
Innovative Internet Technologies and Security
Editorial
Ilsun You and JinShu Su
A java card security framework: requirement analysis and enforcing techniques
Youngsang Song and Jongmoo Choi
Mobility management analysis of internet based on the splitting mechanism
Huachun, Hongke Zhang and Fei Song
A secure solution with a password recovery feature for USB flash drives
Sun-Ho Lee, Kangbin Yim and In-Yeong Lee
Personalized recommendation framework based on CBR and CSP using ontology in a ubiquitous computing environment
Hyunwoo Kim, Mye Sohn and Hyun Jung Lee
A mobile location-based with time-constraint RBAC associated database management model
Hsing-Chung Chen, Yung-Fa Huang, Shu-Hong Lee, Chi-Tung Chen and Ho-Lung Hung
ICTree: discovering the underlying connections of your rental virtual machines in the public clouds
Zhenqian Feng, Bing Bai, Baokang Zhao and Jinshu Su
Self-similar properties of malicious teletraffic
Jongsuk R Lee, Don McNickle, Krzysztof Pawlikowski and Hae-Duck J Jeong
Volume 26 2011
Vol 26 No 1 January 2011
A mobile agent-based routing algorithm and some theoretical analysis
Baoshu Xu, Wenyu Qu and Wanlei Zhou
A cache coherence protocol for distributed memory platforms
Rodolfo Sumoza and Jose Aguilar Castro
A structural view definition for RDF data
Eun-Sun Cho and Manpyo Hong
In-car speech enhancement based on ensemble empirical mode decomposition
Xiangxian Chen, Hai Huang and Jiafang Zhang
Designing attacks for SMTP servers
Ercan Bulus
New approach towards event monitoring through IP surveillance technology using 4G mobile devices
Prashant M Dolia and Ashwin R Dobariya
Evaluating the effectiveness of VSM model and topic segmentation in retrieving arabic documents
Fouzi Harrag, Aboubekeur Hamdi-Cherif, Abdul Malik S Al-Salman and Eyas El-Qawasmeh
Vol 26 No 2 March 2011
Enhancing Levenshtein distance algorithm for assessing behavioral trust
Danielle Costa, Luci Pirmez, Luiz F R C Carmo and Luiz F H Bacellar
Characterisation of web spambots using self organising maps
Pedram Hayati, Vidyasagar Potdar, Alex Talevski and Kevin Chai
Increasing generalization accuracy by using multivariate statistical method
Ali Mirza Mahmood and Mrithyumjaya Rao Kuppa
Modeling service interaction patterns
Gang Xue, Tony Chen, Gang He and Shaowen Yao
Categorizing received email to improve delivery
Eyas El-Qawasmeh
The significance of user-defined identifiers in Java source code authorship identification
Georgia Frantzeskou, Stephen G MacDonell, Efstathios Stamatatos, Stelios Georgiou and Stefanos Gritzalis
Automatic keyword extraction from documents based on multiple content-based measures
Kun Yue, Wei-Yi Liu and Li-Ping Zhou
Vol 26 No 3 May 2011
Special issue – Research in e-science: current status and future direction
Guest Editors: Yi Sun, Lizhe Wang, Wei Jie and ChengFu
Incremental building association link network
Zheng Xu, Xiangfeng Luo and Lizhe Wang
Auto-scaled ISL tracking for region based control infrastructure and applications in video surveillance
Peng Zhang, Sabu Emmanuel, Yanning Zhang and Cheng Fu
Energy-efficient beaconless real-time routing protocol for wireless sensor networks
Guoli Wang and Chao Huang
Dynamic fuzzy neural network for the intelligent control of a humanoid robot
Zhe Tang, Meng Joo Er and Fang Qi
A grid infrastructure for hybrid simulations
Dan Chen, Lizhe Wang, Congcong Bian and Xuguang Zhang
A feature-based detection and tracking system for gaze and smiling behaviours
Jungying Chen, Dan Chen and Oliver Lemon
Metamodel-driven SOA for collaborative e-science application
Tianyi Zang, Radu Calinescu and Marta Kwiatkowska
Vol 26 No 4 July 2011
Fast k-NN search using pre-computed l-NN sets
Sanghyun Yoo, Ki Yong Lee and Myoung Ho Kim
Evaluation of XPath queries with preducates: an Eulerian cycle theory based sequencing approach
Yun Shen and Ling Feng
Assessing usability readiness of collaborative projects
Görkem Çetyn and Mehmet Göktürk
Distributed multidimensional clustering based on spatial correlation in wireless sensor networks
Haengrae Cho
The implementation of the customized, parallel architecture for a fast word-match program
Ernest Jamro, Pawel Russek, Agnieszka Dabrowska-Boruch, Maciej Wielgosz
and Mazimierz Wiatr
Performance analysis of a resource aggregator in a grid of grids environment
D Surendran, T Purusothaman and R A Baclachandar
An approach for model driven testing: framework, metamodels and tools
Helaine Sousa, Denivaldo Lopes, Zair Abdelouahab, Daniela Barreiro Claro and Slimane Hammoudi
Vol 26 No 5 September 2011
Special issue: FCST 2010
Guest Editor: Professor Kequi Li
Affordance of ubiquitous learning through cloud computing
Xin Bai, Michael B Smith and Rathika Rajaravivarma
MT-BTRIMER: A master-slave multi-threaded dynamic binary translator
Xuping Tu, Hai Jin, Zhibin Yu, Jie Chen, Yabin Hu and Xie Xia
DBMISD-D: A distributed algorithm for constructing and maintaining high stability application-layer multicast tree
Jijun Cao, Jinshu Su, Jing Xie and Feng Chen
LimeVI: A platform for virtual cluster live migration over WAN
Xiaohui Wei, Hongliang Li, Qingnan Guo, Na Jiang and Liang Hu
Metadata changes in large file systems: a metadata querying perspective
Likun Liu, Cheng Chen, Yongwei Wu and Guangwen Yang
A novel method for estimating flow length distributions from double-sampled flow statistics
Weijiang Liu, Wenyu Qu, Zhaobin Liu and Kequi Li
HyperMonitor: A lightweight multi-platform monitor based on hardware virtualization
Jing Xiao and Min Zhu
Vol 26 No 6 November 2011
Special Issue: Real-Time Systems
Guest Editor: Yunmook Nah
On the road to real-time OSGi: extending OSGi with an admission control protocol
T. Richardson and A. J. Wellings
OASIS: an architecture for dynamic instrumentation of enterprise distributed real-time and embedded systems
James Hill, Hunt Sutherlandy, Paul Staudingery, Thomas Silveriaz, Douglas C.Schmidtx, John Slabyz and Nikita Visnevskiy
Early, time-approximate modeling of multi-OS linux platforms in a systemC co-simulation environment
H. Posadas, E. Villar, Dominique Ragot and Marcos Martinez
Modeling time-triggered real-time control systems using executable time-triggered model (E-TTM) and systemC-AMS
Jon Perez, Roman Obermaisser, Carlos F. Nicolas and Iban Ayestaran
A MDE-based optimisation process for real-time systems: optimizing systems at the architecture-level using the real DSL and library of transformation and heuristics
Olivier Gilles and Jerome Hugues
Code transformations to prevent timing anomalies
Albrecht Kadlec, Raimund Kirner and Peter Puschner
RTOS support for execution of parallelized hard real-time tasks on the MERASA multi-core processor
Julian Wolf, Mike Gerdes, Florian Kluge, Sascha Uhrig, Jörg Mische, Stefan Metzlaff, Christine Rochange, Hugues Cassé, Pascal Sainrat and Theo Ungerer
A software infrastructure for dependable embedded systems
Hiromasa Shimada, Alexandre Courbot, Yuki Kinebuchi and Tatsuo Nakajima
Model-driven runtime resource predictions for advanced mechatronic systems with dynamic data structures
Stefan Henkler, Simon Oberthür, Holger Giese and Andreas Seibel
Implementing and evaluating the AHS organic middleware
Alexander von Renteln and Uwe Brinkschulte
Volume 25 2010
Vol 25 No 1 January 2010
Enhancing Levenshtein distance algorithm for assessing behavioral trust
Luci Pirmez, Luiz F R C Carmo and Luiz F H Bacellar
Transactional risk-based decision making system in e-business interactions
Pmar Khadeer Hussain, Tharam Dillon, Elizabeth Chang and Farookh Hussain
A heuristic multi-path routing scheme for online traffic in MPLS networks
Seung-Joon Seok, Bongsoo You, Sungwan Youm, Kyung-Hoe Kim and Chul-Hee Kang
TCP trunking for bandwidth management of aggregate traffic
H T Kung and S Y Wang
Towards a person-centric identity management infrastructure (IMI)
V Poursakidis and C Nikolaou
Performance analysis of message-passing libraries on high-speed clusters
Guillermo L Taboada, Juan Touriño and Ramón Doallo
Vol 25 No 2 March 2010
Special issue: Frontiers in Complex, Intelligent and Software Intensive Systems
Edited by Fatsos Xhafa, David Taniar and Leonard Barolli
Electromagnetic Fields Diffracted by Two Horizontal edges with Arbitrary Angle for Different and Same Heights
Jiro Iwashige and Leonard Barolli
Simulation of Soliton Propagation in Slab Waveguide by Frequency Dependent FDTD Method
Hiroshi Maeda
Decision Model for a System to Start Communicating with a Human
Makoto Murakami, Motoi Yamagiwa and Minoru Uehara
A Purpose-based Synchronization Protocol for Secure Information Flow Control
Tomoya Enokido and Makoto Takizawa
An embedded IRIS recognizer for portable and mobile devices
C. Militello, V. Conti, F. Sorbello and S. Vitabile
Scheduling Algorithms for Concurrently Streaming Multimedia Objects in P2P Overlay Networks
Alireza Goudarzinemati, Tomoya Enokido and Makoto Takizawa
Knowledge Discovery for the Linguistic Atlas of Sicily Project
Antonio Gentile, Roberto Pirrone and Giuseppe Russo
Mining Hierarchical Negative Association Rules
David Taniar, Wenny Rahayu, Vincent Lee and Olena Daly
Vol 25 No 3 May 2010
Special issue: Mobile Data Management: Models, Methodologies and Services
Frank Morovan and Abdelkader Hameurlain
A new distributed grid scheme and k-NN query processing for mobile objects in spatial networks
Young-Chang Kim and Jae-Woo Chang
LookAhead continuous KNN mobile query processing
Geng Zhao, Kefeng Xuan, David Taniar and Bala Srinivasan
A motion-aware safe period-based framework for spatial alarm processing
Bhuvan Bamba, Ling Liu and Philip S. Yu
A hybrid ZigBee/Bluetooth approach to mobile semantic grids
Michele Ruta, Floriano Scioscia, Tommaso Di Noia and Eugenio Di Sciascio
Mobile multimedia management for Virtual Campfire – the German excellence research cluster UMIC
Yiwei Cao, Ralf Klamma and Matthias Jarke
Vol 25 No 4 July 2010
Special issue: Open Source Certification
Ernesto Damiani, Luis Barbosa, Peter T. Breuer and Claudio A. Ardagna
Certification of open-source software: A role for formal methods?
Luis S. Barbosa, Antonio Cerone, Alexander K. Petrenko and Siraj A. Shaikh
OpenHMI-tester: an open and cross-platform architecture for GUI testing and certification
Pedro Luis Mateo Navarro, Gregorio Martínez Pêrez and Diego Sevilla Ruiz
Trustworthiness of the FLOSS development process
Etiel Petrinja and Giancarlo Succi
Empirical analysis of the bug fixing process in open source projects
Chiara Francalanci and Francesco Merlo
Vol 25 No 5 September 2010
Group undeniable signatures with convertibility
Yuh-Dauh Lyuu and Ming-Luen Wu
Message authentication code algorithm for IP-SEC
V. Lakshmi Praba and G. Arumugam
A cache coherence protocol for distributed memory platforms
Rodolfo Sumoza and Jose Aguilar Castro
MBR-safe piecewise aggregate approximation for time-series subsequence matching
Yang-Sae Moon and Jinho Kim
A list of features that a graphical xml query language should support
K. Bekiropoulos, E. Keramopoulos, O. Beza and P. Mouratidis
Component criticality analysis to minimize soft errors risk
Muhammad Sheikh Sadi, D. G.Myers, Cesar Ortega Sanchez and Jan Jurjens
Vol 25 No 6 November 2010
Special issue: Selected topics on Wireless Sensor Networks
Kai Lin and Kequi Li
A compromise-resilient pair-wise rekeying protocol in hierarchical wireless sensor networks
Song Guo and An-Ni Shen
Characterizing the scaling capacity for multiple access wireless sensor networks
Guangcheng Qin, Panlong Yang, Guihai Chen and Deke Guo
Efficient and adaptive transmission algorithms for underwater acoustic networks
Zhongwen Guo, Yuan Feng, Lu Hong, Ying Guo and Meng Yang
An energy efficient packet aggregation scheme for wireless sensor networks
Junfeng Xu, Kequi Li, Yanming Shen and Geyong Min
Multi-category web object extraction based on relation schema
Xiaowu Chen, Yongtao Ma and Qinping Zhao
Volume 24 2009
Vol 24 No 1 January 2009
Special issue
Automated control systems for the safety integrity levels 3 and 4
Wolfgang A Halang
Hybrid approaches for derivation of tight service time bounds of distributed emdedded computing systems
K H (Kane) Kim and Chansik Im
Object and process migration in .NET
Peter Tröger and Andreas Polze
Achieving high reliable and timely task execution in mobile embedded applications
Stefan Schemmer and Edgar Nett
Vol 24 No 2 March 2009
A compact feature representation and feature re-weighting in content-based image retrieval
Gita Das and Sid Ray
Modified quad tree network with architectural analysis (M_QUAD)
Sandeep Kumar, P K Bansal and Seema Bawa
Design and implementation of a secure social network system
Ryan Layfield, Bhavani Thuraisingham, Laatifur Khan and Murat Kantarcioglu
A multiagents system for planning and management of the production factors
José Aguilar, Jorge Chacal and César Bravo
Analytic effectiveness evaluation of techniques for natural language sotware requirements testability
Giuseppe Lami
Efficient stream subsequence matching algorithms for handheld devices on streaming time-series data
Yang-Sae Moon and Woong-Kee Loh
Vol 24 No 3 May 2009
Special issue: Network and Parallel Computing
Kequi Li, Yanming Shen and Minyi Guo
An instruction folding solution for a Java processor
Tan Yiyu, Yau Chihang, Anthony S Fong and Yang Xiaojian
Restoration design in IP over reconfigurable WDM networks
Angela L Chiu, Gagan Choudhury, Robert Doverspike and Guangzhi Li
Propagation of active worms: A survey
Yang Xiang, Xiang Fan and Wen Tao Zhu
A novel data transmission scheme for mobile sensor network
Liu Weidong, Lin Chuang and Wang Jirong
An optimal lifetime-adaptive method for wireless sensor networks
Wenyu Qu, Masaru Kitsuregawa, Yanming Shen and Takashi Nanya
Approximation algorithms for inner-node weighted minimum
spanning trees
Chao Peng, Yasuo Tan, Naixue Xiong, Laurence T Yang and Hong Zhu
A context quality management infrastructure for complex ubiquitous environment
Siliang Tang, Jianhua Yang and Zhaohui Wu
On the design of P2P video streaming with layered coding
Yanming Shen and Kequi Li
Vol 24 No 4 July 2009
A novel approach to achieve real-time TCM (traditional Chinese medecine) telemedicine through the use of ontology and clinical intelligence discovery
Jackei H K Wong, Allan K Y Wong, Tharam Dillon and Wilfred W K Lin
Matchmaking framework for visualization web services
Gao Shu and Dingfang Chen
A SIM-based electronic transaction authentication system
Manzur Ashraf, Syed Mahfuzul Aziz, M Lutful Kabir and Biswajit K Dey
Low power TLB structure by using dynamic searching algorithm
Jung-Hoon Lee
Efficient stream subsequence matching algorithms for handheld devices on streaming time-series data
Yang-Sae Moon and Woong-Kee Loh
Vol 24 No 5 September 2009
Special issue: Advanced Topics on Grid, Cluster and P2P Computing
Keqin Li and Geyong Min
Performance analysis and tuning for clusters with ccNUMA nodes for scientific coputing – a case study
Abdullah Kayi, Edward Kornkven, Tarek El-Ghazawi, Samy Al-Bazhra and Gregory B Newby
Exploiting object structure in hardware transactional memory
Behram Khan, Matthew Horsnell, Ian Rogers, Mikel Luján, Andrew Dinn and Ian Watson
Improving the capability of the SLA workflow broker with parallel processing technology
Dang Ming Quan, Jörn Altmann and Laurence T Yang
A parallel information retrieval method for e-commerce
Wenyu Qu, Wanlei Zhou and Masaru Kitsuregawa
A parallel shortest path algorithm based on graph-partitioning and iterative correcting
Yuxin Tang, Yunquan Zhang and Hu Chen
A secure and scalable video conference system based on peer-assisted content delivery networks
Hao Yin, ChangLai Du, Chao Ren, Zhijia Chen, Heyong Min
and Chuang Lin
Adjacency cache: an efficient P2P web cache indexing and lookup system
John Casey and Wanlei Zhou
Vol 24 No 6 November 2009
Facial feature extraction in frontal views using activeshape models
A Chatterjee, M Goel, N Raghuvanshi, P Gupta and S G Dhande
Discrere time modelling in software reliability engineering—a unified approach
Omar Shatnawi
Scalable text classification as a tool for personalization
Ioannis Antonellis, Christos Bouras and Vassilis Poulopoulos
The modified alternating fractal renewal process for modelling peer to peer traffic
Kiarash Mizanian, Mehdi Vasef and Morteza Analoui
Approach on complex neural-genetic algorithm modeling for isomorphism identification in conceptual design of mechanism
Yang Ping and Liao Ningbo
Volume 23 2008
Vol 23 No 1 January 2008
Pairing-based public-key encryption schemes with backward-and-forward security
Song Han, Elizabeth Chang and Tharam Dillon
Adaptive two-stage QoS provisioning schemes for CDMA networks
Jin-Long Wang and Chen-Hsing Chen
Onto-agent methodology for design of ontology-based multi-agent systems
Maja Hadzic and Elizabeth Chang
Subsequence matching under time warping in time-series databases: observation, optimization, and performance results
Sang-Wook Kim and Miyoung Shin
An improved C-means clustering algorithm
Dechang Pi, Chuhua Xian and Xiaolin Qin
Vol 23 No 2 March 2008
Special Issue: Data Management in Grid and P2P Systems
Editorial
Abdelkader Hameurlain
PARIS: A peer-to-peer architecture for large-scale semantic data sharing
C Comito, S Patarin and D Talia
Answering XPath queries with search predicates in structured P2P networks
W He and L Fegaras
PWSMS: A Peer-to-peer web service management system for data sharing in collaborative environments
M Barhamgi, D Benslimane and A M Ouksel
Integrating and querying astronomical data on the e-GrOV data grid
G Vargas-Solar, J-L Zechinelli-Martini and V Cuevas-Vicenttín
Priority based list scheduling for sabotage-tolerance with deadline tasks in desktop grids
H-S Kim, C-S Hwang, S-K Lee, S-J Choi and J-M Gil
Vol 23 No 3 May 2008
Special Issue: Network Attacks and Defense Systems
Wanlei Zhou, Yang Xiang and Minyi Guo
A secure mutual authentication scheme with key agreement using smart card from bilinear pairings
Duc-Liem Vo and Kwangjo Kim
A hybrid model against TCP SYN and reflection DDoS attacks
Udaya Kiran Tupakula and Vijay Varadharajan
A cross-authentication model and implementation
Zhongwen Li, Qiong Chen and Yang Xiang
Variable-length signatures for intrusion detection
Zhuowei Li, Amitabha Das, Jianying Zhou and Jagdish C Patra
Request-driven role mapping framework for secure interoperation in multi-domain environments
Ruixuan Li, Zhuo Tang, Zhengding Lu and Jinwei Hu
Anomaly detection for web server based on smooth support vector machine
Shi-Jinn Horng, Pingzhi Fan, Ming-Yang Su, Yuan-Hsin Chen, Cheng-Ling Lee and Shao-Wei Lan
EV-C2C-PAKE: An improved client-to-client password-authenticated key exchange protocol
Zhu Hongfeng, Liu Tianhua and Liu Jie
Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks
Chua-Ta Li, Min-Shiang Hwang and Yen-Ping Chu
Vol 23 No 4 July 2008
Real-coded genetic algorithm applied to optimal placement of capacitor banks for unbalanced distribution systems with meshed/ radial configurations
R Hooshmand and M Ataei
State of the art of data mining of tree structured information
Henry Tan, Fedja Hadzic, Tharam S Dillon and Elizabeth Chang
Interaction cases: generalized use cases in ambient systems
Bent Bruun Kristensen
Adaptive selection of tuples over data streams for efficient load shedding
Joong Hyuk Chang
Modeling and verification of distributed real-time systems using periodic finite state machines
R Obermaisser, C El-Salloum, B Huber and H Kopetz
Pairing-based public-key encryption schemes with backward-and-forward security
Song Han, Elizabeth Chang and Tharam Dillon
Vol 23 No 5 September 2008
Special issue: Engineering Fault Tolerant Systems
Nicolas Guelfi, Henry Muccini, Patrizio Pelliccione and Alexander Romanovsky
On the development of standards based carrier grade platforms
Francis Tam
Model driven development of railway systems using diversity
Michele Banci, Stefania Gnesi, Alessandro Fantechi and Giovanni Lombardi
Deploying fault tolerant web service compositions
Nuno Laranjeiro and Marco Vieira
Formal analysis of BPEL workflows with compensation by model checking
Máté Kovács, Dániel Varró and László Gönczy
Vol 23 No 5 November 2008
Cryptanalysis of elliptic curve cryptosystem on smart card access control with threshold scheme
Chien-Lung Hsu
Eight key issues for an effective reuse-based requirements process
Ambrosio Toval, Begoña Moros, Joaquín Nicolás and Joaquín Lasheras
Optimal capacitor allocation in distribution systems using genetic algorithm
S P Singh, C Kistanna and A R Rao
Restricted independent domination problems on graphs
William Chung-Kung Yen
On the characteristics of information dissemination paths in vehicular ad hoc networks on the move
S Y Wang and C L Chou
Volume 22 2007
Volume 22 Nos 1-2 January-March 2007
Throughput and delay analysis of interrupt-driven kernels under Poisson and bursty traffic
K Salah and K Elbadawi
A framework for automated image annotation
L Wang, L Khan and B Thuraisingham
Integer factorization for RSA cryptosystem under a PVM environment
C-L Wu, D-C Lou and S-Y Chen
SBASS: Segment based approach for subsequence searches in sequence databases
S Park, S-W Kim and W W Chu
An efficient cache replacement algorithm for multimedia object caching
K Li, T Nanya, H Shen, F Chin and W Zhang
SDITPM: A novel transfer policy model to facilitate object mobility that shortens service roundtrip time by load balancing over the internet
Jason C T Lo, ASllan K Y Wong and Wilfred W K Lin
Solving approximate similarity queries
Tran Khanh Dang
Automatic construction of a decision tree for the analysis of traffic load in computer networks
John G Vlachogiannis
Volume 22 No 3 May 2007
Special issue
Real time software architecture
Doohyun Kim and Arif Ghafoor
Design and implementation of a high performance architecture for providing digital time stamping services to mobile devices
A Cilardo, D Cotroneo, C di Flora, A Mazzeo, L Romano and S Russo
A cluster-based TMO-structured scalable approach for location information systems
Y Nah, K H (Kane) Kim, T Wang and M H Kim
Parallel transmission model for real-time multi-source streaming of multimedia data in scalable networks
S Itaya and M Takizawa
Time-triggered and message-triggered object framework and global time-based synchronization for real-time multimedia streaming
M H Kim, E H Jo, D-J Kim and J-G Kim
A dynamically reconfigurable Voice User Interace (VUI) framework
and platform
A Talevski, E Chang and T S Dillon
Software infrastructures for building ubiquitous computing environments
T Nakajima, E Tokunaga, H Ishikawa, D Ueno, K Fujinami, M Sugaya and S Oikawa
A QoS framework for multimedia applications in mobile ad hoc networks
W Sheikh, B Shafiq, S Baqai, R A Paul, M F Khan and H Ghafoor
Volume 22 No 4 July 2007
Model checking bidding behaviors in internet concurrent auctions
Haiping Xu and Yi-Tsung Cheng
Obligation nets: a rigorous object-oriented technique for modeling the behavioural semantics of information systems
Kinh Nguyen and Tharam Dillon
A genetic algorithm with fuzzy selection and local search for multicast routing problem on the QoS constraint
Rung-Ching Chen and Cheun-Chieh Liao
InOrder: enhancing Google via stigmergic query refinement
Garrett Camp and Mihaela Ulieru
Volume 22 No 5 September 2007
Special issue: TrustBus 2006
Simone Fischer-Hübner, Steven Furnell and Costas Lambrinoudakis
Building the information assurance community of purpose
Jeremy Ward
Towards a person-centric identity management infrastructure (IMI)
V. Poursalidis and C. Nikolaou
On the effects of authentication and authorisation infrastructures on e-commerce activities
Christian Schläger and Thomas Nowey
Cluster-based analysis and recommendation of sellers in online auctions
Mikolaj Morzy
A framework for modelling restricted delegation of rights in the SECTET
Muhammad Alam, Michael Hafner, Ruth Breu and Stefan Untherthiner
An MDA appproach to develop secure business processes through a UML 2.0 extension
Alfonso Rodríguez, Eduardo Fernández-Medina and Mario Piattini
Volume 22 No 6 November 2007
A traffic-based routing algorithm by using mobile agents
Wenyu Qu, Masaru Kitsuregawa, Hai Zhuge, Hong Shen and Yinwei Jin
Modeling and verification of distributed real-time systems using periodic finite state machines
R. Obermaisser, C. El-Salloum, B. Huber and H. Kopetz
A formal method for synthesising components of shared resource systems
K. S. Cheung
Behavior description for complex flexible manufacturing system based on decomposition of petri net
Qingtian Zeng and Hua Duan
n-Gram/2L-approximation: a two-level n-gram inverted index structure for approximate string matching
Min-Soo Kim, Kyu-Young Whang and Jae-Gil Lee
Index to Volume 22, 2007
Special Issues
Vol 34 No 4 July 2019
Special Issue: Applications and Techniques in Cyber Intelligence
Guest Editor: Zheng Xu
An upper bound of task loads in a deadline-d all busy period for multiprocessor global EDF real-time systems
Fengxiang Zhang
Intelligent power compensation system based on adaptive sliding mode control using soft computing and automation
Qidan Zhu and Zhibo Yang
Construction of an onternational digital sharing platform of Dongba manuscripts and Dongba hieroglyphs
Xu Xiaoli, Li Dong, Jiang Zhanglei, Li Ning, Wu Guoxin, Wang Hongjun, Zhang Xu and Bai Feng
Mechanism design and mechanical analysis of multi-suction sliding cleaning robot used in glass curtain wall
Jianxun Deng, Jing Chen and Dingcheng Wang
Modeling and simulation of entrepreneur individual based on dynamic and complex system computing
Xueling Nie, Xinlu Zou and Dishi Zhu
Optimization of the dynamic measure of spillover effect based on knowledge graph
Rui Hua, Yongwen Bao, Shengan Chen and Ziyin Zhuang
Ordering method and empirical study on multiple factor sensitivity of group social attitudes based on entropy theory
Qin He, Shuang Dong and Yaxin Cheng
Personalised product recommendation model based on user interest
Jitao Zhang
R&D investment enhance the financial performance of company driven by big data computing and analysis
Erna Qi and Min Deng
Resource management in cloud computing with optimal pricing policies
Haiyang Zhang, Guolong Chen and Xianwei Li
Vol 33 No 4 July 2018
Special issue: Future Internet
Preface
Xiulong Liu, Mianxiong Dong and Xiaobo Zhou
Reliable differentiated services optimization for network coding cooperative communication system
Anfeng Liu, Jie Min, Kaoru Ota and Ming Zhao
OpenFlow based dynamic flow scheduling with multipath for data center networks
Haisheng Yu, Heng Qi, Keqiu Li, Jianhui Zhang, Peng Xiao and Xun Wang
PPP: Prefix-based Popularity Prediction for efficient content caching in content-centric networks
Jianji Ren, Shan Zhao, Junding Sun, Ding Li, Song Wang and Zongpu Jia
Analysis and application of the spatio-temporal feature in wind power prediction
Ruiguo Yu, Zhiqiang Liu, Jianrong Wang, Mankun Zhao, Jie Gao and Mei Yu
Spectrum allocation for cognitive radio networks using the fireworks algorithm
Zhou Feng and Xue Weilian
Topic evolution analysis in social networking services: taking Sina Weibo as an example
Yuhui Wang
Vol 33 No 2 March 2018
Special issue: BigDataSE 2016
Heng Qi and Kequi Li
An iteration-based differentially private social network data release
Tianqing Zhu, Mengmeng Yang, Ping Xiong, Yang Xiang and Wanlei Zhou
The optimization reachability query of large scale multi-attribute constraints directed graph
Kehong Zhang and Kequi Li
Tensor-based user trajectory mining
Chen Yu, Qinmin Hong, Dezhong Yao and Hai Jin
Research on tourist routes recommendation based on the user preference drifting over time
Chunjing Xiao, Yongwei Qiao, Kewen Xia and Yuxiang Zhang
Automated and precise event detection method for big data in biomedical imaging with support vector machine
Lufeng Yuan, Erlin Yao and Guangming Tan
Effective piecewise linear skeletonization of sparse shapes
Wenyu Qu, Zhiyang Li, Junfeng Wu, Yinan Wu and Zhaobin Liu
MapReduce implementation of an improved XML keyword search algorithm
Yong Zhang, Jing Cai and Quanlin Li
Human movement detection and gait periodicity analysis via channel state information
Wenyuan Liu, Zijuan Liu, Lin Wang, Binbin Li and Nan Jing
A dynamic online protection framework for Android applications
Junfeng Xu and Linna Zhou
Online and offline scheduling schemes to maximize the weighted delivered video packets towards maritime CPSs
Tingting Yang, Hailong Feng, Chengming Yang, Ge Guo and Tieshan Li
Vol 32 No 6 November 2017
SPECIAL ISSUE: International Symposium on Parallel and Distributed Processing with Applications
Preface
Xiaobo Zhou and Kequi Li
A CRAHNs routing protocol based on the hops, channel number and channel capacity
Xue Weilian, Yuan Zhibo and Niu Bingxin
A practical M x N search routing in mobile opportunistic networks
Peng Liu, Jia Xu, Biao Xu, Tingting Fu, Zhen Jiang and Jie Wu
Joint correlation exploitation and network coding in two-way relaying systems
Zongliang ZhuanSun, Kequi Li, Heng Qi and Guolong Chen
Distributed state prediction based geographic routing for underwater acoustic sensor network
Lei Zhang, Gang Zhang, Bin Wu, Ting Zhao and Yang Shao
An efficient racetrack memory for L2 cache in GPGPUs
Ehsan Atoofian and Ahsan Saghir
SCS – A new non-volatile cache mechanism for SSD systems
Xiang Gao, Tianfang Xiao and Meifang Yang
Simulation of heat conduction in fluids on GPU with particle method
Darcy Qingzhi Hou, Zhe Wang, Jianwu Dang, Wenhuan Lu, Yuejin Cai and Jianguo Wei
Learning-based distributed locality sensitive hashing
Jia Shi, Zhaobin Liu, Zhiyang Li, Chang Liu and Wenyu Qu
Probabilistic energy-aware scheduling for wireless networked control systems
Qiang Lin, Guowei Wu and Jiankang Ren
Straight-line tracking control for underactuated ships based on LOS and adaptive fuzzy method
Lei Zhang, Gang Zhang, Bin Wu, Ting Zhao and Yang Shao
Vol 32 No 4 July 2017
Special Issue: Elastic Data Management in Cloud Systems
Guest Editors: Abdelkader Hameurlain and Riad Mokadem
On scalability of two NoSQL data stores for processing interactive social networking actions
Sumita Barahmand, Shahram Ghandeharizadeh and Jia Li
A QoS-aware approach for discovering and selecting configurable IaaS Cloud services
Jalel Eddine Hajlaoui, Mohamed Nazih Omri and Djamal Benslimane
Autoscaling scientific workflows on the cloud by combining on-demand and spot instances
David A Monge, Yisel Garf, Cristian Mateos and Carlos Carcía Garino
Experimental comparative study of NoSQL databases: HBASE versus MongoDB by YCSB
Houcine Matallah, Ghalem Belalem and Karim Bouamrane
A clustering-based sampling method for building query response time models
Jinwen Zhang and Baoning Niu
Vol 31 No 6 November 2016
Special issue: Cyber-Physical System-related Technologies and Applications
Guest Editors: Zheng Xu, Vijayan Sugumaran and Hui Zhang
Computer aided study of factors that influence the cooperative willingness of
water-related public organizations
Qiu Ling and Qi Linkai
The scalable vocabulary tree based model for sub-image retrieval
Quan-Dong Feng, Miao Xu and Xin Zhang
Hierarchical gradient based parameter identification for non-uniformly sampling Wiener systems
Liu Ranran, Zheng Enxing, Chang Shan, Bei Shaoyi and Zhang Lanchun
Hierarchical stochastic gradient identification for non-uniformly sampling Hammerstein systems with colored noise
Liu Ranran, Zheng Enxing, Chang Shan, Bei Shaoyi and Zhang Lanchun
Research on the effects of blasting vibration attenuation by pre-split crack with HHT method
Tao Guo, Xiang Fang, Mingshou Zhong, Huayuan Ma and Yiming Mao
Stochastic gradient identification for Hammerstein systems with non-uniformly sampling
Zheng Enxing, Liu Ranran, Jiang Yifeng, Sun Yuxia and Ni FuYin
The realization of multi agent based online trading systems based on J2EE technology
Tian Run Hu, Zhang Yan Bin and Jia Lixin
The service quality evaluation of ecologic economy systems using simulation computing
Qingyuan Zhou and Juan Luo
The state space model of remanufacturing carbon footprint for low-carbon
Cui-Xia Zhang
The system of knowledge management using web based learning and education technology
Wenshu Bao, Haiying Zhou, Wang Lu and Feng Xie
Using cross ambiguity model improves the effect of Vietnamese word segmentation
Yitong Niu, Mingming Xiong, Jianyi Guo, Cunli Mao, Yantuan Xian and Zhengtao Yu
Vol 30 No 6 November 2015
Special issue: ICA3PP/U-Science 2014
Weijiang Liu and Zhiyang Li
Dynamic resource allocation based on energy utility maximization using virtual machines in cloud environment
Xiaohua Jia, Jinhai Wang, Chuanhe Huang, Qin Liu, Kai He, Jing Wang and Peng Li
Heavy hitter identification based on adaptive sampling with mapreduce
Aiping Zhou, Guang Cheng, Xiaojun Guo, Dinh Tu Truong and Chengang Zhu
Security games for service computing applications
Xinfeng Ye
Rescheduling rework jobs on single-machine of original jobs with release times
Yandong Guo, Min Huang and Qing Wang
QoS oriented task scheduling based on generic algorithm in cloud computing
ingting Wang, Weijiang Liu, Yujie Xu and Mianxiong Dong
Vol 30 No 5 September 2015
Special issue: Big Data-related Technologies and Applications
Zheng Xu, Yunhuai Liu, Xiangfeng Luo and Qing Li
Artificial neural network based grid computing of e-governance scheduling for emergency management
Qingyuan Zhou and Jianjian Luo
A task distribution algorithm compatible with background control framework for parallel simulation
Qingjun Qu and Yiping Yao
Investigation on remote monitoring system for hybrid electric bulldozer
Yan Wei, Shi Songshan, Liu Zhenggang and Li Guoxiang
Design and analysis of communication scheduling applied in water inrush perception layer of mine internet of things
Jin Bao-quan, Bai Qing, Zhang Hong-juan, Wang dong and Gao Yan
Energy-efficient power allocation for MIMO two-way cognitive relay networks
Shengqing Zhang, Jiakuo Zuo, Li Zhao and Cairong Zhu
Generating associated knowledge flow in large-scale web pages based on user interaction
Shunxiang Zhang, Kui Lu, Wenjuan Liu, Xiaobo Yin and Guangli Zhu
A SoPC design of a real-time high-definition stereo matching algorithm
Xiang Zhang, HuaiXiang Zhang, Yifan Wu and Guojun Dai
The semantic analysis of knowledge map for the traffic violations from the surveillance video big data
Zheng Xu and Haiyan Chen
Robust local outlier detection with statistical parameter for big data
Jingsheng Lei, Teng Jiang, Kui Wu, Haizhou Du and Lin Zhu
Building the concept semantic space for large text database
Xiao Wei, Daniel Dajun Zeng, Wei Wu and Yeming Dai
Vol 30 No 1 January 2015
Special issue: New Holistic Trends in Ambient Intelligence
Editorial: Ramón Hervas and José Bravo
Goal lifecycles and ontological models for intention based assistive living within smart environments
Joseph Rafferty, Liming Chen, Chris Nugent and Jun Liu
Ontological characterization and representation of context within smart environments
Laura M McAvoy, Liming Chen, Mark P Donnelly, Chris D Nugent and Paul J McCullagh
An anomolous situation detection system for cognitive impaired people
Antonio Coronato and Giovanni Paragliola
Out of context serious games: Transversal reutilization of games across healthcare domains
Alberto L Morán, Felipe Orihuela-Espina, Victoria Meza-Kubo, Ana I Grimaldo, Cristina Ramírez-Fernández, Eloísa García-Canseco, Juan M Oropeza-Salas and Luis E Sucar
Social connector: a ubiquitous system to ease the social interaction among family community members
Diego Muñoz, Francisco J Gutierrez, Sergio F Ochoa and Nelson Baloian
A model-driven approach to service composition on the basis of the specification of BPMN choreographies
Carlos Rodríguez-Domínguez, Tomás Ruiz-López, José Luis Garrido, Manuel Noguera and Kawtar Benghazi
Web-based applications for open display networks: developers’ perspective
Constantin Taivan, Rui José and Bruno Silva
Vol 29 No 6 November 2014
Special Issue: Mobile Internet Technologies and Services
Editorial: Ilsun You, Fang-Yie Leu and Leonard Baroli
Modeling and analysis of mobility stochastic properties in cognitive radio networks
Jianfeng Guan, Wei Quan, Lili Wang, Changqiao Xu, Feilong Tang and Hongke Zhang
Performance evaluation of IEEE 802.11 contention control mechanisms using polygonal sequences
C Mala and B Nithya
Dual migration for mobile cloud service in 4G/LTE network
Wei Kuang Lai, Yi-Uan Chen, Tin-Yu Wu and Ya-Yin Chen
AAM -based emotion recognition using variance of facial feature points on mobile video stream
Yong-Hwan Lee, Bonam Kim and Youngseop Kim
Design and experiments of new IP traceback method based on offline analysis
Ho-Seok Kang, Tran Tin and Sung-Ryul Kim
PCNDN: Proactive caching for efficient mobility support in NDN
Ying Rao, Huachun Zhou, Deyun Gao, Hongbin Luo and Ying Liu
Vol 29 No. 4 July 2014
Special Issue: Multimedia Information Processing and Retrieval
Guest Editors: Kequi Li and Heng Qi
Multi-stage deep convolutional learning for people re-identification
Guan-Wen Zhang, Jien Kato, Yu Wang and Kenji Mase
Efficient shape representation and retrieval in large database
Zhiyang Li, Wenyu Qu, Yujie Xu, Junjie Cao and Zhixun Su
Implementation and evaluations of graphical password using object-based image ranking
Cuong Xuan Nguyen, Hung-Hsuan Huang and Kyoji Kawagoe
A hierarchical kernel for image classification based on layered representation
Heng Qi, Guoyu Lan and Kequi Li
Multiple graph regularization constrained nonnegative matrix factorization
Wei Jiang, Cong Wang and Yong-Qing Zhang
Vol 29 No. 1 January 2014
Special issue: CUBE 2012
Guest Editor
Vidyasagar Potdar
A two-phase quantitative methodology for enterprise information security risk analysis
Jaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar and Mridul Sankar Barik
Efficient spam filtering based on informative features extracted from the header fields and the URLs in the message
Aziz Qaroush, Mahdi Washaha and Ismail Khater
Diagnosis of dysarthria subtype via spectral and waveform analysis
James Carmichael
Trust evaluation in wireless ad-hoc networks using fuzzy system
Pallavi Khatri, S Tapaswi and U P Verma
Discussions on trade-offs in data aggregation in wireless sensor networks
Wuyungerile Li, Shunsuke Saruwatari, Masaki Bandai and Takashi Watanabe
Generic organization of semi-structured data
Supriya Chakraborty and Nabendu Chaki
Rate and relay diversity in temporal spectrum sharing
Ari Raptino H, Shunsuke Saruwatari, Masaki Bandai and Takashi Watanabe
Cheating detection and cheater identification in (t, n) secret sharing scheme
Zhixiao Wang, Yanxiao Liu, Wenyao Yan, Wei Wei, Junhuai Li, Deyun Zhang and Omar Alfandi
Implementing adaptive interfaces: a use model for the development of usability in interactive systems
Andrés Mejía, Reyes Juárez-Ramírez, Sergio Inzunza and Rocio Valenzuela
Decision trees to multiclass prediction for analysis of arecanut data
M Suresha, Ajit Danti and S K Narasimhamurthy
Software industry in Okinawa: is ‘domestic offshore outsourcing’ scheme feasible?
Atsushi Kato
Vol 28 No 6 November 2013
Special issue: 2nd International Symposium on Secure Virtual Infrastructures
Editorial
Alois Ferscha and Siani Pearson
Mechanisms for Protecting Sensitive Information in Cloud Computing
Tomer Gershoni, Miranda Mowbray and Siani Pearson
Control as a Means towards Accountable Services in the Cloud
Volkmar Lotz, Anderson Santana de Oliveira and Jakub Sendor
How to Act Without being Observed: Progressive Privacy Architecture in
Desktop-as-a-Service
D. Davide Lamanna, Flavio Bertini, Giorgia Lodi and Roberto Baldoni
An Advanced Intrusion Detection Framework for Cloud Computing
Massimo Ficco, Salvatore Venticinque and Beniamino Di Martino
Adaptability Driven by Quality of Execution in High Level Virtual Machines for Shared Cloud Environments
José Simão and Luís Veiga
Towards an Accurate Evaluation of Deduplicated Storage Systems
João Paulo, Pedro Reis, José Pereira and António Sousa
Secure Cloud Transactions
Debmalya Biswas and Krishnamurthy Vidyasankar
Vol 27 No 6 November 2012
Innovative Internet Technologies and Security
Editorial
Ilsun You and JinShu Su
A java card security framework: requirement analysis and enforcing techniques
Youngsang Song and Jongmoo Choi
Mobility management analysis of internet based on the splitting mechanism
Huachun, Hongke Zhang and Fei Song
A secure solution with a password recovery feature for USB flash drives
Sun-Ho Lee, Kangbin Yim and In-Yeong Lee
Personalized recommendation framework based on CBR and CSP using ontology in a ubiquitous computing environment
Hyunwoo Kim, Mye Sohn and Hyun Jung Lee
A mobile location-based with time-constraint RBAC associated database management model
Hsing-Chung Chen, Yung-Fa Huang, Shu-Hong Lee, Chi-Tung Chen and Ho-Lung Hung
ICTree: discovering the underlying connections of your rental virtual machines in the public clouds
Zhenqian Feng, Bing Bai, Baokang Zhao and Jinshu Su
Self-similar properties of malicious teletraffic
Jongsuk R Lee, Don McNickle, Krzysztof Pawlikowski and Hae-Duck J Jeong
Vol 27 No 5 September 2012
Special issue: Advances in Ubiquitous Computing, Wireless and Mobile Networking, and Applications
Editorial
Ilsun You, Leonard Barolli and Feilong Tang
A rate-allocation based multi-path control scheme for event-driven wireless sensor networks on constant event packet rates
Fang-Yie Leu, Fuu-Cheng Jiang, Chih-Cheng Lien, Sen-Tarng Lai and Shiuan-You Chiou
Energy-saving in wireless sensor networks considering mobile sensor nodes, single and multi events
Tao Yang, Tetsuya Oda, Gjergji Mino, Leonard Barolli, Arjan Durresi and Fatos Xhafa
Differentiated bandwidth allocation and wavelength assignment method in WDM EPON
Min-jun Kim, Yong-suk Jang, Yong-do Choi and Sung-ho Kim
Utility-based resource allocation in heterogeneous wireless environments using game theory
Yuhoing Li, Liang Yu, Tao Li, Yishan Li and Yan Shi
Grid transaction management and an efficient development kit
Feilong Tang, Ilsun You, Shui Yu, Huakang Li and Cho-Li Wang
A new iterative learning control scheme using the geometric rotation for discrete time systems
Yu Han, Naigao Jin, Guangwei Xu and Kangbin Yim
Parallelization of normal mode-WKBZ computation for ocean acoustic field
Tingting Liu, Jie Cui, Bo Wang and Gang Chen
Vol 27 No 3 May2012
Special issue: Computational Science and its Applications
Preface
Guest Editors: Osvaldo Gervasi, Bernady O. Apduhan, C. J. Kenneth Tan and David Taniar
Performance comparison of BATMAN and AODV protocols for source and destination moving scenarios
Elis Kulla, Masahiro Hiyama, Makoto Ikeda, Leonard Barolli, Bexhet Kamo
and Rozeta Miho
DSSH: Digital signature based secure handover for network-based mobility management
Ilsun You, Jong-Hyouk Lee and Kouichi Sakurai
Integration of traffic reduction and sleep scheduling in wireless sensor networks
Shinya Kondo, Akimitsu Kanzaki, Takahiro Hara and Shojiro Nishio
Clearance-based homotopic optimal path computation
Mahmudul Hasan, Marina L. Gavrilova and Jon G. Rokne
A methodology for modelling temporal nature of trust in trust maintenance for digital enterprise
Olivia Fachrunnisa and Farookh Khadeer Hussain
Vol 27 Number 2 March 2012
Special issue: Service Oriented Computing and Applications
Guest Editors: Jun Shen, Soo Dong Kim and Nalini Venkatasubramanian
An ontology for e-government service integration
Farzad Sanati and Jie Lu
Optmized ontology-driven query expansion using map-reduce framework to facilitate federated queries
Neda Alipanah, Latifur Khan and Bjavani Thurisingham
Configurable analysis of sequential multi-party choreographies
Andreas Schönberger and Guido Wirtz
Improving QoS assessment over multiple attributes with asynchonous data
Hmood Al-Dossari, Jianhua Shao and Alun Preece
An improved pathfinding under multiple exits with SOA in a double-layered MANET
Jae-Suk Lee and Sung-Bong Yang
Vol 27 No 1 January 2012
Special Issue: Advanced Computing in Intelligent Large-Scale Distributed Systems
Preface
Guest Editors: Joanna Koodziej and Hiroaki Nishino
Agent-based computing in an augmented cloud environment
Aleksander Byrski, Roman Debski and Marek Kisiel-Dorohinicki
Data integration: the method of data mapping, matching and loading grid staging catalogue
Ejaz Ahmed, Nik Bessis, Peter Norrington and Yong Yue
Hierarchical visual motion retrieval system for distributed motion DB and its user experiments
Seiji Okajima and Yoshihiro Okada
Network formation games in non-cooperative service overlay networks
Yutaka Okaie and Tadashi Nakano
A study on the effect of mutation in genetic algorithms for mesh router placement in wireless mesh networks
Admir Barolli, Fatos Xhafa, Christian Sánchez and Makoto Takizawa
Development and evaluation of an interactive texture design method
Tsuneo Kagawa, Hiroaki Nishino and Kouichi Utsumiya
Image processing of dotted picture in QR code code of cellular phones
Toshihiko Wakahara, Noriyasu Yamamoto and Hiroki Ochi