Computer Systems, Science & Engineering

Background and Scope

The journal is devoted to the publication of high quality papers on theoretical developments in computer systems science, and their applications in computer systems engineering.

 

Submissions

Original research papers are invited for publication. All papers will be refereed by acknowledged experts in the field, and may be (i) accepted without change, (ii) require amendment and subsequent re-refereeing, or (iii) be rejected on the grounds of either relevance or content.

The submission of a paper implies that, if accepted for publication, it will not be published elsewhere in the same form, in any language, without the prior consent of the Publisher. It is the author’s responsibility to obtain written permission to quote material that has appeared in another publication. All submissions should be accompanied by a written declaration that the paper has not been submitted for consideration elsewhere.

Papers should be submitted to the journal’s Editor-in-Chief via the online submission system.

As a last resort, papers may be sent to the address below, but we do encourage online submission as it makes the process easier and faster.

Professor T S Dillon
Editor-in-Chief, Department of Computer Science & Engineering, La Trobe University, Bundoora, Vic 3086, Australia. Email.

 

Notes for Authors

Manuscripts should be submitted to the Editor-in-Chief for publication. They will undergo a thorough refereeing process prior to acceptance. Authors may be requested to revise their papers, or the Editor may reject a paper for publication.

Manuscripts should be prepared on a computer in a common software format to help the typesetting of accepted papers. Authors should write in clear and concise English. Papers should normally be about 8000 words in length. Submission should be made through the journal’s online submission portal electronically. Authors should not use DTP software, or attempt to follow the journal’s layout style.

Figures and tables should be prepared electronically and sent in a common format like JPG or PDF. Figure labelling should be no larger that 10pt. All graphical elements should be at least 300dpi in resolution, preferably higher for line drawings and tables.

 

Arrangement of Papers
Papers should be arranged in the following order:

Title. authors, affiliation and full postal/email addresses.
A 50–100 word abstract outlining the purpose, scope and conclusions of the paper.
The text, suitably divided under decimally numbered headings.
Acknowledgements.
References (as complete as possible).
Tables.
Captions to illustrations.
Illustrations.

Tables and Figures
Tables and Figures should be numbered consecutively throughout the paper, referring to them in the text as Table 1, Figure 3, etc. Results should not be presented in both tabular and graphical forms. Electronic copies of graphics are required at 300dpi or greater, at least 8cm wide. (Author’s originals will be used during typesetting, so the quality of the author’s figures will be reflected in the quality of the typeset paper. Authors should therefore provide as good quality figures as possible.)

The minimum of descriptive text should be used on figures, with essential information relegated to the figure caption. Graph axes should have the variables labelled in full, with the abbreviation in parentheses. Scale grids should not be used in graphs unless necessary for actual measurements.

References
Indicate references to the literature in the text using one of the main citation systems (Harvard, Vancouver). Where a reference is cited more than once in the text, use the same number each time. References should be complete as far as possible, including the year of publication, the publisher and their location, full article, book and conference titles, full list of authors and their initials, and page numbers where appropriate.

Proofs
Correspondence and proofs for checking will be sent to the first named author by email unless otherwise requested. Proofs are sent via email in PDF format, and corrections should be returned within two weeks. Should proofs not be returned during this period, it will be assumed that there are no corrections. Only typesetting changes can be accepted from authors at proof checking stage.

Offprints and Reprints
Offprints can be ordered from the Publisher (minimum order 100). Offprints must be ordered when returning corrected paper proofs. Details are sent to authors with their proofs for correction, along with a Copyright Transfer form.

Copyright
Before publication, authors are requested to assign copyright to CRL Publishing Ltd. This allows CRL Publishing to sanction photocopying, and to authorize the reprinting of issues or volumes according to demand. Authors’ traditional rights will not be jeopardized by assigning Copyright in this way, as they retain the right to reuse the material following publication, and to veto third-party publication.

Co Editors-in-Chief

Prof. Tharam Dillon, La Trobe University, Australia
Prof. Elizabeth Chang, University of New South Wales, Australia

ISSN 0267 6192


 

Subscriptions

The journal is available to purchase online to individuals only. Institutions must subscribe through their usual subscription agent. The journal is available in print only, there is no downloadable online edition.

Institutional subscription rates for 2019 can be found here.


 

Contents

Volume 34 Contents

 

 

 

The contents of Volume 34 (2019) will be listed when available.

 

 

Special Issues
Vol 33 No 4 July 2018

Special issue: Future Internet

Preface
Xiulong Liu, Mianxiong Dong and Xiaobo Zhou

Reliable differentiated services optimization for network coding cooperative communication system
Anfeng Liu, Jie Min, Kaoru Ota and Ming Zhao

OpenFlow based dynamic flow scheduling with multipath for data center networks
Haisheng Yu, Heng Qi, Keqiu Li, Jianhui Zhang, Peng Xiao and Xun Wang

PPP: Prefix-based Popularity Prediction for efficient content caching in content-centric networks
Jianji Ren, Shan Zhao, Junding Sun, Ding Li, Song Wang and Zongpu Jia

Analysis and application of the spatio-temporal feature in wind power prediction
Ruiguo Yu, Zhiqiang Liu, Jianrong Wang, Mankun Zhao, Jie Gao and Mei Yu

Spectrum allocation for cognitive radio networks using the fireworks algorithm
Zhou Feng and Xue Weilian

Topic evolution analysis in social networking services: taking Sina Weibo as an example
Yuhui Wang

 

Vol 33 No 2 March 2018

Special issue: BigDataSE 2016
Heng Qi and Kequi Li

An iteration-based differentially private social network data release
Tianqing Zhu, Mengmeng Yang, Ping Xiong, Yang Xiang and Wanlei Zhou

The optimization reachability query of large scale multi-attribute constraints directed graph
Kehong Zhang and Kequi Li

Tensor-based user trajectory mining
Chen Yu, Qinmin Hong, Dezhong Yao and Hai Jin

Research on tourist routes recommendation based on the user preference drifting over time
Chunjing Xiao, Yongwei Qiao, Kewen Xia and Yuxiang Zhang

Automated and precise event detection method for big data in biomedical imaging with support vector machine
Lufeng Yuan, Erlin Yao and Guangming Tan

Effective piecewise linear skeletonization of sparse shapes
Wenyu Qu, Zhiyang Li, Junfeng Wu, Yinan Wu and Zhaobin Liu

MapReduce implementation of an improved XML keyword search algorithm
Yong Zhang, Jing Cai and Quanlin Li

Human movement detection and gait periodicity analysis via channel state information
Wenyuan Liu, Zijuan Liu, Lin Wang, Binbin Li and Nan Jing

A dynamic online protection framework for Android applications
Junfeng Xu and Linna Zhou

Online and offline scheduling schemes to maximize the weighted delivered video packets towards maritime CPSs
Tingting Yang, Hailong Feng, Chengming Yang, Ge Guo and Tieshan Li

 

Vol 32 No 6 November 2017

SPECIAL ISSUE: International Symposium on Parallel and Distributed Processing with Applications

Preface
Xiaobo Zhou and Kequi Li

A CRAHNs routing protocol based on the hops, channel number and channel capacity
Xue Weilian, Yuan Zhibo and Niu Bingxin

A practical M x N search routing in mobile opportunistic networks
Peng Liu, Jia Xu, Biao Xu, Tingting Fu, Zhen Jiang and Jie Wu

Joint correlation exploitation and network coding in two-way relaying systems
Zongliang ZhuanSun, Kequi Li, Heng Qi and Guolong Chen

Distributed state prediction based geographic routing for underwater acoustic sensor network
Lei Zhang, Gang Zhang, Bin Wu, Ting Zhao and Yang Shao

An efficient racetrack memory for L2 cache in GPGPUs
Ehsan Atoofian and Ahsan Saghir

SCS – A new non-volatile cache mechanism for SSD systems
Xiang Gao, Tianfang Xiao and Meifang Yang

Simulation of heat conduction in fluids on GPU with particle method
Darcy Qingzhi Hou, Zhe Wang, Jianwu Dang, Wenhuan Lu, Yuejin Cai and Jianguo Wei

Learning-based distributed locality sensitive hashing
Jia Shi, Zhaobin Liu, Zhiyang Li, Chang Liu and Wenyu Qu

Probabilistic energy-aware scheduling for wireless networked control systems
Qiang Lin, Guowei Wu and Jiankang Ren

Straight-line tracking control for underactuated ships based on LOS and adaptive fuzzy method
Lei Zhang, Gang Zhang, Bin Wu, Ting Zhao and Yang Shao

 

Vol 32 No 4 July 2017

Special Issue: Elastic Data Management in Cloud Systems
Guest Editors: Abdelkader Hameurlain and Riad Mokadem

On scalability of two NoSQL data stores for processing interactive social networking actions
Sumita Barahmand, Shahram Ghandeharizadeh and Jia Li

A QoS-aware approach for discovering and selecting configurable IaaS Cloud services
Jalel Eddine Hajlaoui, Mohamed Nazih Omri and Djamal Benslimane

Autoscaling scientific workflows on the cloud by combining on-demand and spot instances
David A Monge, Yisel Garf, Cristian Mateos and Carlos Carcía Garino

Experimental comparative study of NoSQL databases: HBASE versus MongoDB by YCSB
Houcine Matallah, Ghalem Belalem and Karim Bouamrane

A clustering-based sampling method for building query response time models
Jinwen Zhang and Baoning Niu

 

Vol 31 No 6 November 2016

Special issue: Cyber-Physical System-related Technologies and Applications
Guest Editors: Zheng Xu, Vijayan Sugumaran and Hui Zhang

Computer aided study of factors that influence the cooperative willingness of
water-related public organizations
Qiu Ling and Qi Linkai

The scalable vocabulary tree based model for sub-image retrieval
Quan-Dong Feng, Miao Xu and Xin Zhang

Hierarchical gradient based parameter identification for non-uniformly sampling Wiener systems
Liu Ranran, Zheng Enxing, Chang Shan, Bei Shaoyi and Zhang Lanchun

Hierarchical stochastic gradient identification for non-uniformly sampling Hammerstein systems with colored noise
Liu Ranran, Zheng Enxing, Chang Shan, Bei Shaoyi and Zhang Lanchun

Research on the effects of blasting vibration attenuation by pre-split crack with HHT method
Tao Guo, Xiang Fang, Mingshou Zhong, Huayuan Ma and Yiming Mao

Stochastic gradient identification for Hammerstein systems with non-uniformly sampling
Zheng Enxing, Liu Ranran, Jiang Yifeng, Sun Yuxia and Ni FuYin

The realization of multi agent based online trading systems based on J2EE technology
Tian Run Hu, Zhang Yan Bin and Jia Lixin

The service quality evaluation of ecologic economy systems using simulation computing
Qingyuan Zhou and Juan Luo

The state space model of remanufacturing carbon footprint for low-carbon
Cui-Xia Zhang

The system of knowledge management using web based learning and education technology
Wenshu Bao, Haiying Zhou, Wang Lu and Feng Xie

Using cross ambiguity model improves the effect of Vietnamese word segmentation
Yitong Niu, Mingming Xiong, Jianyi Guo, Cunli Mao, Yantuan Xian and Zhengtao Yu

 

Vol 30 No 6 November 2015

Special issue: ICA3PP/U-Science 2014
Weijiang Liu and Zhiyang Li

Dynamic resource allocation based on energy utility maximization using virtual machines in cloud environment
Xiaohua Jia, Jinhai Wang, Chuanhe Huang, Qin Liu, Kai He, Jing Wang and Peng Li

Heavy hitter identification based on adaptive sampling with mapreduce
Aiping Zhou, Guang Cheng, Xiaojun Guo, Dinh Tu Truong and Chengang Zhu

Security games for service computing applications
Xinfeng Ye

Rescheduling rework jobs on single-machine of original jobs with release times
Yandong Guo, Min Huang and Qing Wang

QoS oriented task scheduling based on generic algorithm in cloud computing
ingting Wang, Weijiang Liu, Yujie Xu and Mianxiong Dong

 

Vol 30 No 5 September 2015

Special issue: Big Data-related Technologies and Applications
Zheng Xu, Yunhuai Liu, Xiangfeng Luo and Qing Li

Artificial neural network based grid computing of e-governance scheduling for emergency management
Qingyuan Zhou and Jianjian Luo

A task distribution algorithm compatible with background control framework for parallel simulation
Qingjun Qu and Yiping Yao

Investigation on remote monitoring system for hybrid electric bulldozer
Yan Wei, Shi Songshan, Liu Zhenggang and Li Guoxiang

Design and analysis of communication scheduling applied in water inrush perception layer of mine internet of things
Jin Bao-quan, Bai Qing, Zhang Hong-juan, Wang dong and Gao Yan

Energy-efficient power allocation for MIMO two-way cognitive relay networks
Shengqing Zhang, Jiakuo Zuo, Li Zhao and Cairong Zhu

Generating associated knowledge flow in large-scale web pages based on user interaction
Shunxiang Zhang, Kui Lu, Wenjuan Liu, Xiaobo Yin and Guangli Zhu

A SoPC design of a real-time high-definition stereo matching algorithm
Xiang Zhang, HuaiXiang Zhang, Yifan Wu and Guojun Dai

The semantic analysis of knowledge map for the traffic violations from the surveillance video big data
Zheng Xu and Haiyan Chen

Robust local outlier detection with statistical parameter for big data
Jingsheng Lei, Teng Jiang, Kui Wu, Haizhou Du and Lin Zhu

Building the concept semantic space for large text database
Xiao Wei, Daniel Dajun Zeng, Wei Wu and Yeming Dai

 

Vol 30 No 1 January 2015

Special issue: New Holistic Trends in Ambient Intelligence
Editorial: Ramón Hervas and José Bravo

Goal lifecycles and ontological models for intention based assistive living within smart environments
Joseph Rafferty, Liming Chen, Chris Nugent and Jun Liu

Ontological characterization and representation of context within smart environments
Laura M McAvoy, Liming Chen, Mark P Donnelly, Chris D Nugent and Paul J McCullagh

An anomolous situation detection system for cognitive impaired people
Antonio Coronato and Giovanni Paragliola

Out of context serious games: Transversal reutilization of games across healthcare domains
Alberto L Morán, Felipe Orihuela-Espina, Victoria Meza-Kubo, Ana I Grimaldo, Cristina Ramírez-Fernández, Eloísa García-Canseco, Juan M Oropeza-Salas and Luis E Sucar

Social connector: a ubiquitous system to ease the social interaction among family community members
Diego Muñoz, Francisco J Gutierrez, Sergio F Ochoa and Nelson Baloian

A model-driven approach to service composition on the basis of the specification of BPMN choreographies
Carlos Rodríguez-Domínguez, Tomás Ruiz-López, José Luis Garrido, Manuel Noguera and Kawtar Benghazi

Web-based applications for open display networks: developers’ perspective
Constantin Taivan, Rui José and Bruno Silva

 

Vol 29 No 6 November 2014

Special Issue: Mobile Internet Technologies and Services

Editorial: Ilsun You, Fang-Yie Leu and Leonard Baroli

Modeling and analysis of mobility stochastic properties in cognitive radio networks
Jianfeng Guan, Wei Quan, Lili Wang, Changqiao Xu, Feilong Tang and Hongke Zhang

Performance evaluation of IEEE 802.11 contention control mechanisms using polygonal sequences
C Mala and B Nithya

Dual migration for mobile cloud service in 4G/LTE network
Wei Kuang Lai, Yi-Uan Chen, Tin-Yu Wu and Ya-Yin Chen

AAM -based emotion recognition using variance of facial feature points on mobile video stream
Yong-Hwan Lee, Bonam Kim and Youngseop Kim

Design and experiments of new IP traceback method based on offline analysis
Ho-Seok Kang, Tran Tin and Sung-Ryul Kim

PCNDN: Proactive caching for efficient mobility support in NDN
Ying Rao, Huachun Zhou, Deyun Gao, Hongbin Luo and Ying Liu

 

Vol 29 No. 4 July 2014

Special Issue: Multimedia Information Processing and Retrieval
Guest Editors: Kequi Li and Heng Qi

Multi-stage deep convolutional learning for people re-identification
Guan-Wen Zhang, Jien Kato, Yu Wang and Kenji Mase

Efficient shape representation and retrieval in large database
Zhiyang Li, Wenyu Qu, Yujie Xu, Junjie Cao and Zhixun Su

Implementation and evaluations of graphical password using object-based image ranking
Cuong Xuan Nguyen, Hung-Hsuan Huang and Kyoji Kawagoe

A hierarchical kernel for image classification based on layered representation
Heng Qi, Guoyu Lan and Kequi Li

Multiple graph regularization constrained nonnegative matrix factorization
Wei Jiang, Cong Wang and Yong-Qing Zhang

 

Vol 29 No. 1 January 2014

Special issue: CUBE 2012

Guest Editor
Vidyasagar Potdar

A two-phase quantitative methodology for enterprise information security risk analysis
Jaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar and Mridul Sankar Barik

Efficient spam filtering based on informative features extracted from the header fields and the URLs in the message
Aziz Qaroush, Mahdi Washaha and Ismail Khater

Diagnosis of dysarthria subtype via spectral and waveform analysis
James Carmichael

Trust evaluation in wireless ad-hoc networks using fuzzy system
Pallavi Khatri, S Tapaswi and U P Verma

Discussions on trade-offs in data aggregation in wireless sensor networks
Wuyungerile Li, Shunsuke Saruwatari, Masaki Bandai and Takashi Watanabe

Generic organization of semi-structured data
Supriya Chakraborty and Nabendu Chaki

Rate and relay diversity in temporal spectrum sharing
Ari Raptino H, Shunsuke Saruwatari, Masaki Bandai and Takashi Watanabe

Cheating detection and cheater identification in (t, n) secret sharing scheme
Zhixiao Wang, Yanxiao Liu, Wenyao Yan, Wei Wei, Junhuai Li, Deyun Zhang and Omar Alfandi

Implementing adaptive interfaces: a use model for the development of usability in interactive systems
Andrés Mejía, Reyes Juárez-Ramírez, Sergio Inzunza and Rocio Valenzuela

Decision trees to multiclass prediction for analysis of arecanut data
M Suresha, Ajit Danti and S K Narasimhamurthy

Software industry in Okinawa: is ‘domestic offshore outsourcing’ scheme feasible?
Atsushi Kato

 

Vol 28 No 6 November 2013

Special issue: 2nd International Symposium on Secure Virtual Infrastructures

Editorial
Alois Ferscha and Siani Pearson

Mechanisms for Protecting Sensitive Information in Cloud Computing
Tomer Gershoni, Miranda Mowbray and Siani Pearson

Control as a Means towards Accountable Services in the Cloud
Volkmar Lotz, Anderson Santana de Oliveira and Jakub Sendor

How to Act Without being Observed: Progressive Privacy Architecture in
Desktop-as-a-Service
D. Davide Lamanna, Flavio Bertini, Giorgia Lodi and Roberto Baldoni

An Advanced Intrusion Detection Framework for Cloud Computing
Massimo Ficco, Salvatore Venticinque and Beniamino Di Martino

Adaptability Driven by Quality of Execution in High Level Virtual Machines for Shared Cloud Environments
José Simão and Luís Veiga

Towards an Accurate Evaluation of Deduplicated Storage Systems
João Paulo, Pedro Reis, José Pereira and António Sousa

Secure Cloud Transactions
Debmalya Biswas and Krishnamurthy Vidyasankar

 

Vol 27 No 6 November 2012

Innovative Internet Technologies and Security

Editorial
Ilsun You and JinShu Su

A java card security framework: requirement analysis and enforcing techniques
Youngsang Song and Jongmoo Choi

Mobility management analysis of internet based on the splitting mechanism
Huachun, Hongke Zhang and Fei Song

A secure solution with a password recovery feature for USB flash drives
Sun-Ho Lee, Kangbin Yim and In-Yeong Lee

Personalized recommendation framework based on CBR and CSP using ontology in a ubiquitous computing environment
Hyunwoo Kim, Mye Sohn and Hyun Jung Lee

A mobile location-based with time-constraint RBAC associated database management model
Hsing-Chung Chen, Yung-Fa Huang, Shu-Hong Lee, Chi-Tung Chen and Ho-Lung Hung

ICTree: discovering the underlying connections of your rental virtual machines in the public clouds
Zhenqian Feng, Bing Bai, Baokang Zhao and Jinshu Su

Self-similar properties of malicious teletraffic
Jongsuk R Lee, Don McNickle, Krzysztof Pawlikowski and Hae-Duck J Jeong

 

Vol 27 No 5 September 2012

Special issue: Advances in Ubiquitous Computing, Wireless and Mobile Networking, and Applications

Editorial
Ilsun You, Leonard Barolli and Feilong Tang

A rate-allocation based multi-path control scheme for event-driven wireless sensor networks on constant event packet rates
Fang-Yie Leu, Fuu-Cheng Jiang, Chih-Cheng Lien, Sen-Tarng Lai and Shiuan-You Chiou

Energy-saving in wireless sensor networks considering mobile sensor nodes, single and multi events
Tao Yang, Tetsuya Oda, Gjergji Mino, Leonard Barolli, Arjan Durresi and Fatos Xhafa

Differentiated bandwidth allocation and wavelength assignment method in WDM EPON
Min-jun Kim, Yong-suk Jang, Yong-do Choi and Sung-ho Kim

Utility-based resource allocation in heterogeneous wireless environments using game theory
Yuhoing Li, Liang Yu, Tao Li, Yishan Li and Yan Shi

Grid transaction management and an efficient development kit
Feilong Tang, Ilsun You, Shui Yu, Huakang Li and Cho-Li Wang

A new iterative learning control scheme using the geometric rotation for discrete time systems
Yu Han, Naigao Jin, Guangwei Xu and Kangbin Yim

Parallelization of normal mode-WKBZ computation for ocean acoustic field
Tingting Liu, Jie Cui, Bo Wang and Gang Chen

 

Vol 27 No 3 May2012

Special issue: Computational Science and its Applications

Preface
Guest Editors: Osvaldo Gervasi, Bernady O. Apduhan, C. J. Kenneth Tan and David Taniar

Performance comparison of BATMAN and AODV protocols for source and destination moving scenarios
Elis Kulla, Masahiro Hiyama, Makoto Ikeda, Leonard Barolli, Bexhet Kamo
and Rozeta Miho

DSSH: Digital signature based secure handover for network-based mobility management
Ilsun You, Jong-Hyouk Lee and Kouichi Sakurai

Integration of traffic reduction and sleep scheduling in wireless sensor networks
Shinya Kondo, Akimitsu Kanzaki, Takahiro Hara and Shojiro Nishio

Clearance-based homotopic optimal path computation
Mahmudul Hasan, Marina L. Gavrilova and Jon G. Rokne

A methodology for modelling temporal nature of trust in trust maintenance for digital enterprise
Olivia Fachrunnisa and Farookh Khadeer Hussain

 

Vol 27 Number 2 March 2012

Special issue: Service Oriented Computing and Applications
Guest Editors: Jun Shen, Soo Dong Kim and Nalini Venkatasubramanian

An ontology for e-government service integration
Farzad Sanati and Jie Lu

Optmized ontology-driven query expansion using map-reduce framework to facilitate federated queries
Neda Alipanah, Latifur Khan and Bjavani Thurisingham

Configurable analysis of sequential multi-party choreographies
Andreas Schönberger and Guido Wirtz

Improving QoS assessment over multiple attributes with asynchonous data
Hmood Al-Dossari, Jianhua Shao and Alun Preece

An improved pathfinding under multiple exits with SOA in a double-layered MANET
Jae-Suk Lee and Sung-Bong Yang

 

Vol 27 No 1 January 2012

Special Issue: Advanced Computing in Intelligent Large-Scale Distributed Systems

Preface
Guest Editors: Joanna Koodziej and Hiroaki Nishino

Agent-based computing in an augmented cloud environment
Aleksander Byrski, Roman Debski and Marek Kisiel-Dorohinicki

Data integration: the method of data mapping, matching and loading grid staging catalogue
Ejaz Ahmed, Nik Bessis, Peter Norrington and Yong Yue

Hierarchical visual motion retrieval system for distributed motion DB and its user experiments
Seiji Okajima and Yoshihiro Okada

Network formation games in non-cooperative service overlay networks
Yutaka Okaie and Tadashi Nakano

A study on the effect of mutation in genetic algorithms for mesh router placement in wireless mesh networks
Admir Barolli, Fatos Xhafa, Christian Sánchez and Makoto Takizawa

Development and evaluation of an interactive texture design method
Tsuneo Kagawa, Hiroaki Nishino and Kouichi Utsumiya

Image processing of dotted picture in QR code code of cellular phones
Toshihiko Wakahara, Noriyasu Yamamoto and Hiroki Ochi

 

Volume 33 2018

 

Vol 33 No 1 January 2018

A dynamic independent component analysis approach to fault detection with new statistics
M Teimoortashloo and A Khadi Sedigh

Probabliistic analysis of electrocardiogram (ECG) heart signal
Amjad Gawanmeh, Usman Pervez and Osman Hasan

A scheduling extension scheme of the earliest deadline first policy for hard real-time uniprocessor systems integrated on POSIX threads based on Linux
Vidblain Amaro-Ortega, Arnoldo Díaz-Ramírez, Brenda Leticia Flores-Ríos, Félix Fernando González-Navarro, Frank Werner and Larysa Burtseva

Rank-order correlation-based feature vector context transformation for learning to rank for information retrieval
Jen-Yuan Yeh

 

Vol 33 No 2 March 2018

Special issue: BigDataSE 2016
Heng Qi and Kequi Li

An iteration-based differentially private social network data release
Tianqing Zhu, Mengmeng Yang, Ping Xiong, Yang Xiang and Wanlei Zhou

The optimization reachability query of large scale multi-attribute constraints directed graph
Kehong Zhang and Kequi Li

Tensor-based user trajectory mining
Chen Yu, Qinmin Hong, Dezhong Yao and Hai Jin

Research on tourist routes recommendation based on the user preference drifting over time
Chunjing Xiao, Yongwei Qiao, Kewen Xia and Yuxiang Zhang

Automated and precise event detection method for big data in biomedical imaging with support vector machine
Lufeng Yuan, Erlin Yao and Guangming Tan

Effective piecewise linear skeletonization of sparse shapes
Wenyu Qu, Zhiyang Li, Junfeng Wu, Yinan Wu and Zhaobin Liu

MapReduce implementation of an improved XML keyword search algorithm
Yong Zhang, Jing Cai and Quanlin Li

Human movement detection and gait periodicity analysis via channel state information
Wenyuan Liu, Zijuan Liu, Lin Wang, Binbin Li and Nan Jing

A dynamic online protection framework for Android applications
Junfeng Xu and Linna Zhou

Online and offline scheduling schemes to maximize the weighted delivered video packets towards maritime CPSs
Tingting Yang, Hailong Feng, Chengming Yang, Ge Guo and Tieshan Li

 

Vol 33 No 3 May 2018

A risk poker based testing model for Scrum
Siti Noor Hasanah Ghazali, Siti Salwah Salim, Irum Inayat and Siti Hafizah Ab Hamid

Sentiment analysis system in big data environment
Wint Nyein Chan and Thandar Thein

Forensic investigation through data remnants on Hadoop big data storage system
Myat Nandar Oo, Sazia Parvin and Thandar Thein

Integrating a decision tree perspective at the operational-level of BPM+
Ahmad Alomari, Alain April, Carlos Monsalve and Amjad Gawanmeh

 

Vol 33 No 4 July 2018

Special issue: Future Internet

Preface
Xiulong Liu, Mianxiong Dong and Xiaobo Zhou

Reliable differentiated services optimization for network coding cooperative communication system
Anfeng Liu, Jie Min, Kaoru Ota and Ming Zhao

OpenFlow based dynamic flow scheduling with multipath for data center networks
Haisheng Yu, Heng Qi, Keqiu Li, Jianhui Zhang, Peng Xiao and Xun Wang

PPP: Prefix-based Popularity Prediction for efficient content caching in content-centric networks
Jianji Ren, Shan Zhao, Junding Sun, Ding Li, Song Wang and Zongpu Jia

Analysis and application of the spatio-temporal feature in wind power prediction
Ruiguo Yu, Zhiqiang Liu, Jianrong Wang, Mankun Zhao, Jie Gao and Mei Yu

Spectrum allocation for cognitive radio networks using the fireworks algorithm
Zhou Feng and Xue Weilian

Topic evolution analysis in social networking services: taking Sina Weibo as an example
Yuhui Wang

 

Vol 33 No 5 September 2018

Special issue: 2017 International Conference on Applications and Techniques in Cyber Intelligence (ACTI 2017)
Editorial: Zheng Xu and Kun Gao

A description method for formalizing domain-specific modelling language
Tao Jiang

ADL-RAID: Energy-saving data layout for dynamic loads
Youxi Wu, Shengyuan Shi, Jingyu Liu and Huaizhong Zhu

Design of greenhouse temperature and humidity measuring system based on ZigBee technology
Xuejun Tian, Jianliang Li and Lihua Luo

Face detection method for public safety surveillance based on convex grouping
Jianhui Wu, Feng Huang, Wenjing Hu, Wei He, Bing Tu, Longyuan Guo and Xianfeng Ou

Lateral conflict model of training flight based on subjective factors
Kaijun Xu, Yusheng Yao and Shanshan Li

Liveness and boundedness preservations of sharing synthesis of Petri net based representation for embedded systems
Chuanliang Xia, Bin Shen, Hailin Zhang and Yigui Wang

Prediction and abnormality assertion on EMU brake pad based on multivariate integrated random walk
Hongsheng Su, Shuangshuang Wang and Dengfei Wang

A dynamic online protection framework for Android applications
Junfeng Xu and Linna Zhou

Research on K maximum dominant skyline and e-GA algorithm based on data stream environment
Wang Qi

The definition and numerical method of final value problem and arbitrary value problem
Shixiong Wang, Jianhua He, Chen Wang and Xitong Li

Evaluation of industry eco-industrialization: Case study of Shaanxi, China
Shuru Liu, Ping He and Jiqiang Dang

Research on the clustering analysis and similarity in factor space
Sha-Sha Li, Tie-Jun Cui and Jian Liu

 

Vol 33 No 6 November 2018

Improving support vector domain description by maximizing the distance between negative examples and the minimal sphere centres
Mohamed El Boujnouni and Mohamed Jedra

Energy aware routing algorithm in MANET using linear programming
Hany Ramanad, Ben Bella S Tawfik and Alaa El Din M Riad

A phoneme-based approach for eliminating out-of-vocabulary problem Turkish speech recognition using Hidden Markov Model
Erdem Yavuz and Vedat Topuz

Reliable approximated number system with exact bounds and three-valued logic
Reeseo Cha, Wonhong Nam and Jin-Young Choi

Index to Volume 33, 2018

 

Volume 32 2017

 

 

Vol 32 No 1 January 2017

Adaptive Duty Cycle (ADC) energy efficient algorithm for ZigBee networks
Wail Mardini, Yaser Khamayseh, Marwa Salayma, Muneer Bani Yassien and Hussien Mouftah

An adaptive edge detection operator for noisy images based on a total variation approach restoration
Sa’ed Abed, Mohammed H Ali and Mohammad Al-Shayeji

Soft error tolerance using HVDQ (Horizontal-Vertical-Diagonal-Queen parity method)
Sakib Ahammed, Muhammad Sheikh Sadi, Md Shamimur Rahman and Jan Jürjens

Change management technique for supporting object oriented diagrams changes
Bassam Atieh Rajabi and Sai Peck Lee

 

Vol 32 No 2 March 2017

Special Issue: Foundations and Practice of Security in Emerging ICT Applications
Guest Editors
: Ilsun You, Sherali Zeadally and A Min Tjoa

Detecting local covert channels using process activity correlation on Android smartphones
Marcin Urbanski, Wojciech Mazurczyk, Jean-Francois Lalandey and Luca Caviglione

k-out-of-n oblivious transfer protocol with security against malicious adversaries
Xiaochao Wei, Qiuliang Xu and Yi Tang

A corrupted cloud and corrupted multi-cloud identification method for batch auditing in cloud storage services
Sooyeon Shin and Taekyoung Kwon

Enhanced TKTOFT protocol for ternary based distributed group key management in cognitive radio networks
C Mala, N Renugadevi and Hsing-Chung Chen

Security threats in M2M networks: a survey with case study
Fatima Hussain, Lilatul Ferdouse, Alagan Anpalagan, Lutful Karim and Isaac Woungang

Fast backup and recovery for web protectiuon using trigger and block hash approach
Qian He, Ning Zhang, Jinshu Su and Xiao-Song Zhang

An extensive empirical evaluation of classifier ensembles for intrusion detection task
Bayu Adhi Tama and Kyung-Hyune Rhee

Achieving a scalable and secure software defined network by identifiers separating and mapping
Mingxin Wang, Huachun Zhou and Jia Chen

Abnormal behaviour pattern mining for unknown threat detection
Chang Choi, Junho Choi and Pankoo Kim

 

Vol 32 No 3 May 2017

Optimal agreement under fallible mobile network
Shun-Sheng Wang and Shu-Ching Wang

An adaptive edge detection operator for noisy images based on a total variation approach restoration
Sa’ed Abed, Mohammed H Ali and Mohammad Al-Shayeji

Inspection reading techniques applied to software artifacts – a systematic review
Shouki A Ebad

Formal verification and performance evaluation of task scheduling heuristics for makespan optimization and workflow distribution in large-scale computing systems
Sardar Khaliq uz Zaman, Atta ur Rehman Khan, Saif ur Rehman Malik, Abdul Nasir Khan, Tahir Maqsood and Sajjad A Madani

A bottom-up semantic mapping approach for exploring manufacturing information resources in industry
Sara Bouzid

 

Vol 32 No 4 July 2017

Special Issue: Elastic Data Management in Cloud Systems
Guest Editors: Abdelkader Hameurlain and Riad Mokadem

On scalability of two NoSQL data stores for processing interactive social networking actions
Sumita Barahmand, Shahram Ghandeharizadeh and Jia Li

A QoS-aware approach for discovering and selecting configurable IaaS Cloud services
Jalel Eddine Hajlaoui, Mohamed Nazih Omri and Djamal Benslimane

Autoscaling scientific workflows on the cloud by combining on-demand and spot instances
David A Monge, Yisel Garí, Cristian Mateos and Carlos García Garino

Experimental comparative study of NoSQL databases: HBASE versus MongoDB by YCSB
Houcine Matallah, Ghalem Belalem and Karim Bouamrane

A clustering-based sampling method for building query response time models
Jinwen Zhang and Baoning Niu

 

Vol 32 No 5 September 2017

Design of optimal elliptic curve cryptography by using partial parallel shifting multiplier with parallel complementary
S Hemalatha, V Rajamani and V Parthasarathy

Genetic algorithm based energy-saving ATO control algorithm for CBTC
Zheng Wang, Xiangxian Chen, Hai Huang and Yue Zhang

An optimized adaptive neuro-fuzzy inference system to estimate software development effort
Seyyed Hamid Samareh Moosavi and Vahid Khatibi Bardsiri

A context-aware hierarchical approach for activity recognition based on mobile devices
Shugang Zhang, Zhiqiang Wei, Jie Nie, Lei Huang and Zhen Li

Design and analysis of control strategies for a cyber physical system
Amjad Gawanmeh, Abdullah Abu Omar and Alain April

A MapReduce-based efficient H-bucket PMR quadtree spatial index
Hari Singh and Seema Bawa

 

Vol 32 No 6 November 2017

SPECIAL ISSUE: International Symposium on Parallel and Distributed Processing with Applications

Preface
Xiaobo Zhou and Kequi Li

A CRAHNs routing protocol based on the hops, channel number and channel capacity
Xue Weilian, Yuan Zhibo and Niu Bingxin

A practical M x N search routing in mobile opportunistic networks
Peng Liu, Jia Xu, Biao Xu, Tingting Fu, Zhen Jiang and Jie Wu

Joint correlation exploitation and network coding in two-way relaying systems
Zongliang ZhuanSun, Kequi Li, Heng Qi and Guolong Chen

Distributed state prediction based geographic routing for underwater acoustic sensor network
Lei Zhang, Gang Zhang, Bin Wu, Ting Zhao and Yang Shao

An efficient racetrack memory for L2 cache in GPGPUs
Ehsan Atoofian and Ahsan Saghir

SCS – A new non-volatile cache mechanism for SSD systems
Xiang Gao, Tianfang Xiao and Meifang Yang

Simulation of heat conduction in fluids on GPU with particle method
Darcy Qingzhi Hou, Zhe Wang, Jianwu Dang, Wenhuan Lu, Yuejin Cai and Jianguo Wei

Learning-based distributed locality sensitive hashing
Jia Shi, Zhaobin Liu, Zhiyang Li, Chang Liu and Wenyu Qu

Probabilistic energy-aware scheduling for wireless networked control systems
Qiang Lin, Guowei Wu and Jiankang Ren

Straight-line tracking control for underactuated ships based on LOS and adaptive fuzzy method
Chengming Yang and Zaojian Zou

Index to Volume 32, 2017

Volume 31 2016
Vol 31 No 1 January 2016

Improving the quality of mobile target detection through portion of node with full duty cycle in WSNs
Yanling Hu and Anfeng Liu

Bridging the semantic gap for automatic image annotation by learning the manifold space
Mohammad Ali Zare Chahooki and Nasrollah Moghaddam Charkari

Goals and scenarios based web requirements engineering
Shailey Chawla, Sangeeta Srivastava and Punam Bedi

An enhanced dynamic detection of possible invariants based on best permutation of test cases
Hamid Alishvandi, Gholam Hosein Gouraki and Hamid Parvin

Enhancing multimedia caching algorithms for variable-bandwidth streams using adaptive and smoothing techniques
Javier Fernández Calderón, Félix García and Jesús Carretero

 

Vol 31 No 2 March 2016

Special issue: BDCloud 2015 and FCST 2015
Guest Editors: Zhiyang Li and Nei Kato

Long-term revenue maximization pricing scheme for cloud
Wen-Kai Huang, Chang-Dong Wang, Shao-Shu Huang, Zheng Li, Jian-Huang Lai and Ling Huang

A frequent pattern parallel mining algorithm based on distributed sliding window
Chen Bo, Duan Cheng YOng and Gao Xiue

Discovering probabilistic frequent closed itemsets in uncertain database with tuple uncertainty
Fengjuan Chen, Wenyu Qu, Lihai Nie, Junfeng Wu and Yuanyuan Li

Taxi-taking recommendation using real-time trajectories: an online query based approach
Yifan Chen, Xiang Zhao, Jiuyang Tang, Weiming Zhang and Haichuan Shang

An optimization model of Hadoop cluster performance prediction based on Markov process
Xiaowei Zheng, Jiaxuan Li, Yong Zhang and Qingkun Liu

Clustering routing method based on social characteristic in campus DTN
En Wang, Yongjian Yang, Wenbin Liu and Fan Wang

Information security in practices: Exploring privacy and trust in computer and inernet surveillance
Shuchih Ernest Chang and Anne Yenching Liu

Towards risk evaluation algorithm of PSC ship-selecting system based on hierarchic analysis and grey integrated clustering method
Tingting Yang, Zhonghua Sun, Zhou Su, Hailong Feng and Ruilong Deng

Topological separation axioms of soft rough formal context
Li Fu and Zhen Liu

Ascending partition method for differentially private histogram publication
Yangyang Xu, Zhaobin Liu and Zhonglian Hu

 

Vol 31 No 3 May 2016

Estimation error-aware query optimization: an overview
Chiraz Soussi Moumen, Franck Morvan and Abdelkader Hameurlain

A practical reliable reputation based data fusion method for ad-hoc wireless sensor networks
Zhe Wei, Fang Wang and Le Sun

Neighbour unpredictability measure in multiword expression extraction
Senem Kumova Metin

A Petri Net extension for formal modelling of information systems
Sasa Kresoja, Milos Rackovic, Srdjan Skrbic and Bojana Dimic Surla

Energy efficient dual execution mode scheduling for real-time tasks with shared resources
Jun Wu

 

Vol 31 No 4 July 2016

Adaptive hierarchical bitmap-based index for wireless broadcast environments in an emergency
Doohee Song and Kwangjin Park

Performance evaluation comparison for detecting DNA structural break through big data analysis
Md. Sarwar Kamal, Sonia Farhana Nimmy and Sazia Parvin

Effective indexing and searching with dimensionality reduction on high-dimensional space
Seungdo Jeong, Sang-Wook Kim and Byung-Uk Choi

Exploiting flow equivalent server in transient analysis
Alessio Angius, András Horváth, Sami M Halawani, Omar Barukab, Ab Rahman Ahmad and Gianfranco Balbo

Vol 31 No 5 September 2016

XML schema matching using early dissimilarity detection approaches
Ahmad Abdullah Alqarni and Eric Pardede

Data allocation in a Heterogeneous Disk Array (HDA) with multiple RAID levels for database applications
Alexander Thomasian and Jun Xu

FPGA implementation of programmable cellular automata encryption algorithm for network communications
Petre Anghelescu

Extending visual information extraction to biomedical applications
Giuseppe Della Penna, Daniele Magazzeni and Sergio Orefice

An optimal tabu prioritization algorithm for regression testing
Khanna H Nehemiah, Angelin Gladston and A Kannan

 

Vol 31 No 6 November 2016

Special issue: Cyber-Physical System-related Technologies and Applications
Guest Editors: Zheng Xu, Vijayan Sugumaran and Hui Zhang

Computer aided study of factors that influence the cooperative willingness of
water-related public organizations
Qiu Ling and Qi Linkai

The scalable vocabulary tree based model for sub-image retrieval
Quan-Dong Feng, Miao Xu and Xin Zhang

Hierarchical gradient based parameter identification for non-uniformly sampling Wiener systems
Liu Ranran, Zheng Enxing, Chang Shan, Bei Shaoyi and Zhang Lanchun

Hierarchical stochastic gradient identification for non-uniformly sampling Hammerstein systems with colored noise
Liu Ranran, Zheng Enxing, Chang Shan, Bei Shaoyi and Zhang Lanchun

Research on the effects of blasting vibration attenuation by pre-split crack with HHT method
Tao Guo, Xiang Fang, Mingshou Zhong, Huayuan Ma and Yiming Mao

Stochastic gradient identification for Hammerstein systems with non-uniformly sampling
Zheng Enxing, Liu Ranran, Jiang Yifeng, Sun Yuxia and Ni FuYin

The realization of multi agent based online trading systems based on J2EE technology
Tian Run Hu, Zhang Yan Bin and Jia Lixin

The service quality evaluation of ecologic economy systems using simulation computing
Qingyuan Zhou and Juan Luo

The state space model of remanufacturing carbon footprint for low-carbon
Cui-Xia Zhang

The system of knowledge management using web based learning and education technology
Wenshu Bao, Haiying Zhou, Wang Lu and Feng Xie

Using cross ambiguity model improves the effect of Vietnamese word segmentation
Yitong Niu, Mingming Xiong, Jianyi Guo, Cunli Mao, Yantuan Xian and Zhengtao Yu

Index to Volume 31 2016

Volume 30 2015
Vol 30 No 1 January 2015

Special issue: New Holistic Trends in Ambient Intelligence

Editorial: Ramón Hervas and José Bravo

Goal lifecycles and ontological models for intention based assistive living within smart environments
Joseph Rafferty, Liming Chen, Chris Nugent and Jun Liu

Ontological characterization and representation of context within smart environments
Laura M McAvoy, Liming Chen, Mark P Donnelly, Chris D Nugent and Paul J McCullagh

An anomolous situation detection system for cognitive impaired people
Antonio Coronato and Giovanni Paragliola

Out of context serious games: Transversal reutilization of games across healthcare domains
Alberto L Morán, Felipe Orihuela-Espina, Victoria Meza-Kubo, Ana I Grimaldo, Cristina Ramírez-Fernández, Eloísa García-Canseco, Juan M Oropeza-Salas and Luis E Sucar

Social connector: a ubiquitous system to ease the social interaction among family community members
Diego Muñoz, Francisco J Gutierrez, Sergio F Ochoa and Nelson Baloian

A model-driven approach to service composition on the basis of the specification of BPMN choreographies
Carlos Rodríguez-Domínguez, Tomás Ruiz-López, José Luis Garrido, Manuel Noguera and Kawtar Benghazi

Web-based applications for open display networks: developers’ perspective
Constantin Taivan, Rui José and Bruno Silva

 

Vol 30 No 2 March 2015

Magio: using mobile agents to enhance parallel I/O
David E Singh, Florin Isaila, Félix García and Jesús Carretero

Integrating outlier removal into existing histogram construction methods for geographic data
Hai Tanh Mai, Jaeho Kim and Myoung Ho Kim

Parameters’ fine tuning of differential evolution algorithm
Rawaa Dawoud Al-Dabbagh, Saad Mekhilef and Mohd Sapiyan Baba

Session identification based on linked referrers and web log indexing
ChaoYong Qin and Chenhan Liao

Optimal WiMax backhauling solutions for WiFi traffic
Glaucio H S Carvalho

 

Vol 30 No 3 May 2015

A distance based approach for link analysis in XML information retrieval
M’hamed Mataoui and Mohamed Mezghiche

Dynamic filtering of sensor readings for approximate query processing in sensor networks
Hai Tanh Mai, Ki Yong Lee and Myoung Ho Kim

Improving application layer multicast forwarding performance by offloading multisend operations
Jijun Cao and Jinshu Su

SDD-matcher: a semantic-driven data matching framework
Yan Tang Demey and Gang Zhao

Recognition of driving postures by nonsubsampled contourlet transform and k-nearest neighbor classifier
Chihang Zhao, Jie He, Xiaoqin Zhang, Xingzhi Qi and Aiwen Chen

Set agreement and the loneliness failure detector in crash-recovery systems
Sergio Arévalo, Ernesto Jiménez, Jian Tang and Rommel Torres

 

Vol 30 No 4 July 2015

Harmony and bio inspired harmony search optimization algorithms for feature selection in classification
S Varadhaganapathy, V Krishnaveni, G Arumugam and R R Rajalaxmi

Fabric defect localization using line variances of the local homogeneity images
A Rebhi, S Abid and F Fnaiech

A reputation-based computing approach in trusted web service provisions
Ping Wang, Kuo-Ming Chao and Chi-Chun Lo

Bridging the semantic gap for automatic image annotation by learning the manifold space
Mohammad Ali Zare Chahooki and Nasrollah Moghaddam Charkari

Prosumer recruitment framework for prosumer community groups in smart-grid
A J Dinusha Rathnayaka, Vidyasagar M Potdar, Tharam Dillon and Omar Hussain

 

Vol 30 No 5 September 2015

Special issue
Big Data-related Technologies and Applications
Zheng Xu, Yunhuai Liu, Xiangfeng Luo and Qing Li

Artificial neural network based grid computing of e-governance scheduling for emergency management
Qingyuan Zhou and Jianjian Luo

A task distribution algorithm compatible with background control framework for parallel simulation
Qingjun Qu and Yiping Yao

Investigation on remote monitoring system for hybrid electric bulldozer
Yan Wei, Shi Songshan, Liu Zhenggang and Li Guoxiang

Design and analysis of communication scheduling applied in water inrush perception layer of mine internet of things
Jin Bao-quan, Bai Qing, Zhang Hong-juan, Wang dong and Gao Yan

Energy-efficient power allocation for MIMO two-way cognitive relay networks
Shengqing Zhang, Jiakuo Zuo, Li Zhao and Cairong Zhu

Generating associated knowledge flow in large-scale web pages based on user interaction
Shunxiang Zhang, Kui Lu, Wenjuan Liu, Xiaobo Yin and Guangli Zhu

A SoPC design of a real-time high-definition stereo matching algorithm
Xiang Zhang, HuaiXiang Zhang, Yifan Wu and Guojun Dai

The semantic analysis of knowledge map for the traffic violations from the surveillance video big data
Zheng Xu and Haiyan Chen

Robust local outlier detection with statistical parameter for big data
Jingsheng Lei, Teng Jiang, Kui Wu, Haizhou Du and Lin Zhu

Building the concept semantic space for large text database
Xiao Wei, Daniel Dajun Zeng, Wei Wu and Yeming Dai

 

Vol 30 No 6 November 2015

Special issue
ICA3PP/U-Science 2014
Weijiang Liu and Zhiyang Li

Dynamic resource allocation based on energy utility maximization using virtual machines in cloud environment
Xiaohua Jia, Jinhai Wang, Chuanhe Huang, Qin Liu, Kai He, Jing Wang and Peng Li

Heavy hitter identification based on adaptive sampling with mapreduce
Aiping Zhou, Guang Cheng, Xiaojun Guo, Dinh Tu Truong and Chengang Zhu

Security games for service computing applications
Xinfeng Ye

Rescheduling rework jobs on single-machine of original jobs with release times
Yandong Guo, Min Huang and Qing Wang

QoS oriented task scheduling based on generic algorithm in cloud computing
Tingting Wang, Weijiang Liu, Yujie Xu and Mianxiong Dong

Index to Volume 30, 2015

Volume 29 2014
Volume 29 Number 1 January 2014

Special issue: CUBE 2012
Guest Editor
Vidyasagar Potdar

A two-phase quantitative methodology for enterprise information security risk analysis
Jaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar and Mridul Sankar Barik

Efficient spam filtering based on informative features extracted from the header fields and the URLs in the message
Aziz Qaroush, Mahdi Washaha and Ismail Khater

Diagnosis of dysarthria subtype via spectral and waveform analysis
James Carmichael

Trust evaluation in wireless ad-hoc networks using fuzzy system
Pallavi Khatri, S Tapaswi and U P Verma

Discussions on trade-offs in data aggregation in wireless sensor networks
Wuyungerile Li, Shunsuke Saruwatari, Masaki Bandai and Takashi Watanabe

Generic organization of semi-structured data
Supriya Chakraborty and Nabendu Chaki

Rate and relay diversity in temporal spectrum sharing
Ari Raptino H, Shunsuke Saruwatari, Masaki Bandai and Takashi Watanabe

Cheating detection and cheater identification in (t, n) secret sharing scheme
Zhixiao Wang, Yanxiao Liu, Wenyao Yan, Wei Wei, Junhuai Li, Deyun Zhang and Omar Alfandi

Implementing adaptive interfaces: a use model for the development of usability in interactive systems
Andrés Mejía, Reyes Juárez-Ramírez, Sergio Inzunza and Rocio Valenzuela

Decision trees to multiclass prediction for analysis of arecanut data
M Suresha, Ajit Danti and S K Narasimhamurthy

Software industry in Okinawa: is ‘domestic offshore outsourcing’ scheme feasible?
Atsushi Kato

 

Volume 29 Number 2 March 2014

“LogN+1” and “LogN” model: a binary tree based multi-level cache system for multi-core processors
Muhamman Ali Ismail, Shahid H. Mirza and Talat Altaf

A fuzzy logic based framework for assessing the maturity level of Indian small scale software organizations
A. M. Kalpana, K. Tamizarasu and A. Ebenezer Jeyakumar

Scalable hierarchical scheduling for malleable parallel jobs on multiprocessor-based systems
Yangjie Cao, Hongyang Sun, Depei Qian and Weiguo Wu

Routing protocols for mobile sensor networks: a comparative study
Shahzad Ali, Sajjad A. Madani, Atta ur Rehman Khan and Imran Ali Khan

Volume 29 Number 3 May 2014

A novel reversible design for double edge triggered flip-flops and new designs of reversible sequential circuits
Marian Zomorodi Moghadam, Keivan Navi and Mahmood Kalemati

A fast fusion technique for fingerprint and iris spatial descriptors in multimodal biometric systems
Carmelo Militello, Vincenzo Conti, Filippo Sorbello and Salvatore Vitabile

Design of a fuzzy-labview-based mechanical ventilator
Hasan Guler and Fikret Ata

A systematic review in the decision analysis of selecting an IT outsourcing supplier
Lucas Grossi and Jose A Calvo-Manzano

A highly robust approach to face authentication based on trace-fuzzy ART combination
Rerkchai Fooprateepsiri and Pichet Mareo

 

Volume 29 Number 4 July 2014

SPECIAL ISSUE: Multimedia Information Processing and Retrieval
Guest Editors: Kequi Li and Heng Qi

Preface
Kequi Li and Heng Qi

Multi-stage deep convolutional learning for people re-identification
Guan-Wen Zhang, Jien Kato, Yu Wang and Kenji Mase

Efficient shape representation and retrieval in large database
Zhiyang Li, Wenyu Qu, Yujie Xu, Junjie Cao and Zhixun Su

Implementation and evaluations of graphical password using object-based image ranking
Cuong Xuan Nguyen, Hung-Hsuan Huang and Kyoji Kawagoe

A hierarchical kernel for image classification based on layered representation
Heng Qi, Guoyu Lan and Kequi Li

Multiple graph regularization constrained nonnegative matrix factorization
Wei Jiang, Cong Wang and Yong-Qing Zhang

 

Volume 29 Number 5 September 2014

A bi-dimensional QoS model for SOA and real-time middleware
Marisol García-Valls, Pablo Basanta-Val, Marga Marcos and Elisabet Estévez

A survey on computing prime implicants and implicates in classical and non-classical logics
Manoj K Raut and Arindama Singh

Interactive discovery of association rules over data streams
Se Jung Shin and Won Suk Lee

Application of digital image processing in the determination of mass of the diamonds
R Anitha and K Duraiswamy

DNA computation algorithm for recyclable waste paper sorting
Mohammad Osiur Rahman, Aini Hussain, Edgar Scavino, M A Hannan and Hassan Basri

 

Volume 29 Number 6 November 2014

SPECIAL ISSUE: MOBILE INTERNET TECHNOLOGIES AND SERVICES

Editorial: Ilsun You, Fang-Yie Leu and Leonard Baroli

Modeling and analysis of mobility stochastic properties in cognitive radio networks
Jianfeng Guan, Wei Quan, Lili Wang, Changqiao Xu, Feilong Tang and Hongke Zhang

Performance evaluation of IEEE 802.11 contention control mechanisms using polygonal sequences
C Mala and B Nithya

Dual migration for mobile cloud service in 4G/LTE network
Wei Kuang Lai, Yi-Uan Chen, Tin-Yu Wu and Ya-Yin Chen

AAM -based emotion recognition using variance of facial feature points on mobile video stream
Yong-Hwan Lee, Bonam Kim and Youngseop Kim

Design and experiments of new IP traceback method based on offline analysis
Ho-Seok Kang, Tran Tin and Sung-Ryul Kim

PCNDN: Proactive caching for efficient mobility support in NDN
Ying Rao, Huachun Zhou, Deyun Gao, Hongbin Luo and Ying Liu

Volume 28 2013
Volume 28 Number 1 January 2013

Integrated and interactive software solution for knowledge-based supply network design
Nenad Stefanovic and Dusan Stefanovic

Collective Classification for Packed Executable Identification
Xabier Ugarte-Pedrero, Igor Santos, Carlos Laorden, Borja Sanz and Pablo G. Bringas

An Empirical Evaluation for Feature Selection Methods in Phishing Email Classification
Mahmoud Khonji, Andrew Jones and Youssef Iraqi

Comparing commercial IP reputation databases to open-source IP reputation algorithms
Jernej Porenta and Mojca Ciglaric

 

Volume 28 Number 2 March 2013

B2B magics: a mobile agent-based internet commerce system for B2B e-commerce
Lei Ye and Henry C B Chan

A list of features that a graphical XML query language should support
K Bekiropoulos, E Keramopoulos, O Beza and P Mouratidis

RFID mutual authentication protocols for tags and readers with and without a server
Song Han, Tharam Dillon, Vidy Potdar and Elizabeth Chang

One-dimensional spatial join processing using a DOT-based index structure
Jun-Im Won, Hyun Back, Jee-Hee Yoon, Sanghyun Park and Sang-Wook Kim

Improved storage system performance by disk scheduling
Alexander Thomasian

 

Volume 28 Number 3 May 2013

Algorithmic bipanpath connectivity of the hypercube
Jywe-Fei Fang and Chien-Hung Huang

Emergency vehicle preemption system based on global positioning system (GPS), A-star (A*) algorithm and FPGA
Mohd Yamani Idna Idris, Moraali Sivalingam, Emran Mohd Tamil, Zaidi Razak and Noorzaily Mohamed Noor

A hypervisor based platform to support real-time safety critical embedded java applications
Apolinar Gonzalez, Walter Mata, Alfons Crespo, Miguel Masmano, José Félix and Alvaro Aburto

A business-to-business e-commerce system using software agents and RFID
Lei Ye, Adam S K Ho, Solomon K S Leung and Henry C B Chan

Priority-based scheduling for dependent processes using random selection of resource holders
Tarek Helmy

A web cluster architectural proposal for balancing storage capacity and reliability
by using partial replication
J Daniel Garcia, Jesus Carretero, Javier Garcia, Luis Miguel Sanchez and Felix Garcia

 

Volume 28 Number 4 July 2013

An algorithm for merging two classification trees for test case generation
P. Prema, B. Ramadoss and S. R. Balasundaram

Analysis and modeling of multivalued attributes in entity relationship modeling: an approach for improved database design
Vimala S., Khanna Nehemiah H., Saranya G. and Kannan A.

Resource management for mobile operating systems based on the active object model
Marisol García-Valls, Alfons Crespo and Joan Vila

Integration of traffic reduction and sleep scheduling for energy-efficient data gathering in wireless sensor networks
Shinya Kondo, Akimitsu Kanzaki, Takahiro Hara and Shojiro Nishio

An exploratory study of package metrics as change size indicators in evolving
object-oriented software
Mahmoud O. Elish

Term expansion on the categorization of summarized documents
Wen-Feng Hsiao and Te-Min Chang

 

Volume 28 Number 5 September 2013

Session identification based on linked referrers and web log indexing
ChaoYong Qin and Chenhan Liao

Prosumer recruitment framework for prosumer community groups in smart-grid
A. J. Dinusha Rathnayaka, Vidyasagar M. Potdar, Tharam Dillon, Omar Hussain and Samitha Kuruppu

Discovering semantic associations between web services based on the electrostatic force theory
Kun Yue, Wei-Yi Liu, Wen-Hua Qian and Xiao-Feng Wang

A bi-dimensional QoS model for SOA and real-time middleware
Marisol García-Valls, Pablo Basanta-Val, Marga Marcos and Elisabet Estévez

Application of digital image processing in the determination of mass of the diamonds
R. Anitha and K. Duraiswamy

Enhancing multimedia caching algorothms for variable-bandwidth streams using adaptive and smoothing techniques
Javier Fernández, Alejandro Calderón, Félix García and Jesús Carretero

 

Volume 28 Number 6 November 2013

Special issue: 2nd International Symposium on Secure Virtual Infrastructures

Editorial
Alois Ferscha and Siani Pearson

Mechanisms for Protecting Sensitive Information in Cloud Computing
Tomer Gershoni, Miranda Mowbray and Siani Pearson

Control as a Means towards Accountable Services in the Cloud
Volkmar Lotz, Anderson Santana de Oliveira and Jakub Sendor

How to Act Without being Observed: Progressive Privacy Architecture in Desktop-as-a-Service
D. Davide Lamanna, Flavio Bertini, Giorgia Lodi and Roberto Baldoni

An Advanced Intrusion Detection Framework for Cloud Computing
Massimo Ficco, Salvatore Venticinque and Beniamino Di Martino

Adaptability Driven by Quality of Execution in High Level Virtual Machines for Shared Cloud Environments
José Simão and Luís Veiga

Towards an Accurate Evaluation of Deduplicated Storage Systems
João Paulo, Pedro Reis, José Pereira and António Sousa

Secure Cloud Transactions
Debmalya Biswas and Krishnamurthy Vidyasankar

Index to Volume 28, 2013

Volume 27 2012
Volume 27 Number 1 January 2012

Special Issue: Advanced Computing in Intelligent Large-scale Distributed Systems

Preface
Guest Editors: Joanna Koodziej and Hiroaki Nishino

Agent-based computing in an augmented cloud environment
Aleksander Byrski, Roman Debski and Marek Kisiel-Dorohinicki

Data integration: the method of data mapping, matching and loading grid staging catalogue
Ejaz Ahmed, Nik Bessis, Peter Norrington and Yong Yue

Hierarchical visual motion retrieval system for distributed motion DB and its user experiments
Seiji Okajima and Yoshihiro Okada

Network formation games in non-cooperative service overlay networks
Yutaka Okaie and Tadashi Nakano

A study on the effect of mutation in genetic algorithms for mesh router placement in wireless mesh networks
Admir Barolli, Fatos Xhafa, Christian Sánchez and Makoto Takizawa

Development and evaluation of an interactive texture design method
Tsuneo Kagawa, Hiroaki Nishino and Kouichi Utsumiya

Image processing of dotted picture in QR code code of cellular phones
Toshihiko Wakahara, Noriyasu Yamamoto and Hiroki Ochi

 

Volume 27 Number 2 March 2012

Special issue: Service Oriented Computing and Applications
Guest Editors: Jun Shen, Soo Dong Kim and Nalini Venkatasubramanian

An ontology for e-government service integration
Farzad Sanati and Jie Lu

Optmized ontology-driven query expansion using map-reduce framework to facilitate federated queries
Neda Alipanah, Latifur Khan and Bjavani Thurisingham

Configurable analysis of sequential multi-party choreographies
Andreas Schönberger and Guido Wirtz

Improving QoS assessment over multiple attributes with asynchonous data
Hmood Al-Dossari, Jianhua Shao and Alun Preece

An improved pathfinding under multiple exits with SOA in a double-layered MANET
Jae-Suk Lee and Sung-Bong Yang

 

Volume 27 Number 3 May 2012

Special issue: Computational Science and its Applications

Preface
Guest Editors: Osvaldo Gervasi, Bernady O. Apduhan, C. J. Kenneth Tan and David Taniar

Performance comparison of BATMAN and AODV protocols for source and destination moving scenarios
Elis Kulla, Masahiro Hiyama, Makoto Ikeda, Leonard Barolli, Bexhet Kamo
and Rozeta Miho

DSSH: Digital signature based secure handover for network-based mobility management
Ilsun You, Jong-Hyouk Lee and Kouichi Sakurai

Integration of traffic reduction and sleep scheduling in wireless sensor networks
Shinya Kondo, Akimitsu Kanzaki, Takahiro Hara and Shojiro Nishio

Clearance-based homotopic optimal path computation
Mahmudul Hasan, Marina L. Gavrilova and Jon G. Rokne

A methodology for modelling temporal nature of trust in trust maintenance for
digital enterprise
Olivia Fachrunnisa and Farookh Khadeer Hussain

 

Volume 27 Number 4 July 2012

Resource allocation for query processing in grid systems: a survey
Deniz Cokuslu, Abdelkader Hemeurlain and Kayhan Erciyes

Inlining with traces in Java programs
Bory J. Bradel and Tarek S. Abdelrahman

ESGIA: Extensible service based grid information aggregator
D. Surendran, T. Purusothaman, R. A. Balachandar and G. Kousalya

A framework for scalable autonomous P2P resource discovery for the grid implementation
Hesham A. Ali, Mofreh M. Salem and Ahmed A. Hamza

 

Volume 27 Number 5 September 2012

Special issue: Advances in Ubiquitous Computing, Wireless and Mobile Networking, and Applications

Editorial
Ilsun You, Leonard Barolli and Feilong Tang

A rate-allocation based multi-path control scheme for event-driven wireless sensor networks on constant event packet rates
Fang-Yie Leu, Fuu-Cheng Jiang, Chih-Cheng Lien, Sen-Tarng Lai and Shiuan-You Chiou

Energy-saving in wireless sensor networks considering mobile sensor nodes, single and multi events
Tao Yang, Tetsuya Oda, Gjergji Mino, Leonard Barolli, Arjan Durresi and Fatos Xhafa

Differentiated bandwidth allocation and wavelength assignment method in WDM EPON
Min-jun Kim, Yong-suk Jang, Yong-do Choi and Sung-ho Kim

Utility-based resource allocation in heterogeneous wireless environments using game theory
Yuhoing Li, Liang Yu, Tao Li, Yishan Li and Yan Shi

Grid transaction management and an efficient development kit
Feilong Tang, Ilsun You, Shui Yu, Huakang Li and Cho-Li Wang

A new iterative learning control scheme using the geometric rotation for discrete time systems
Yu Han, Naigao Jin, Guangwei Xu and Kangbin Yim

Parallelization of normal mode-WKBZ computation for ocean acoustic field
Tingting Liu, Jie Cui, Bo Wang and Gang Chen

 

Volume 27 Number 6 November 2012

Innovative Internet Technologies and Security

Editorial
Ilsun You and JinShu Su

A java card security framework: requirement analysis and enforcing techniques
Youngsang Song and Jongmoo Choi

Mobility management analysis of internet based on the splitting mechanism
Huachun, Hongke Zhang and Fei Song

A secure solution with a password recovery feature for USB flash drives
Sun-Ho Lee, Kangbin Yim and In-Yeong Lee

Personalized recommendation framework based on CBR and CSP using ontology in a ubiquitous computing environment
Hyunwoo Kim, Mye Sohn and Hyun Jung Lee

A mobile location-based with time-constraint RBAC associated database management model
Hsing-Chung Chen, Yung-Fa Huang, Shu-Hong Lee, Chi-Tung Chen and Ho-Lung Hung

ICTree: discovering the underlying connections of your rental virtual machines in the public clouds
Zhenqian Feng, Bing Bai, Baokang Zhao and Jinshu Su

Self-similar properties of malicious teletraffic
Jongsuk R Lee, Don McNickle, Krzysztof Pawlikowski and Hae-Duck J Jeong

Volume 26 2011
Vol 26 No 1 January 2011

A mobile agent-based routing algorithm and some theoretical analysis
Baoshu Xu, Wenyu Qu and Wanlei Zhou

A cache coherence protocol for distributed memory platforms
Rodolfo Sumoza and Jose Aguilar Castro

A structural view definition for RDF data
Eun-Sun Cho and Manpyo Hong

In-car speech enhancement based on ensemble empirical mode decomposition
Xiangxian Chen, Hai Huang and Jiafang Zhang

Designing attacks for SMTP servers
Ercan Bulus

New approach towards event monitoring through IP surveillance technology using 4G mobile devices
Prashant M Dolia and Ashwin R Dobariya

Evaluating the effectiveness of VSM model and topic segmentation in retrieving arabic documents
Fouzi Harrag, Aboubekeur Hamdi-Cherif, Abdul Malik S Al-Salman and Eyas El-Qawasmeh

 

Vol 26 No 2 March 2011

Enhancing Levenshtein distance algorithm for assessing behavioral trust
Danielle Costa, Luci Pirmez, Luiz F R C Carmo and Luiz F H Bacellar

Characterisation of web spambots using self organising maps
Pedram Hayati, Vidyasagar Potdar, Alex Talevski and Kevin Chai

Increasing generalization accuracy by using multivariate statistical method
Ali Mirza Mahmood and Mrithyumjaya Rao Kuppa

Modeling service interaction patterns
Gang Xue, Tony Chen, Gang He and Shaowen Yao

Categorizing received email to improve delivery
Eyas El-Qawasmeh

The significance of user-defined identifiers in Java source code authorship identification
Georgia Frantzeskou, Stephen G MacDonell, Efstathios Stamatatos, Stelios Georgiou and Stefanos Gritzalis

Automatic keyword extraction from documents based on multiple content-based measures
Kun Yue, Wei-Yi Liu and Li-Ping Zhou

 

Vol 26 No 3 May 2011

Special issue – Research in e-science: current status and future direction
Guest Editors: Yi Sun, Lizhe Wang, Wei Jie and ChengFu

Incremental building association link network
Zheng Xu, Xiangfeng Luo and Lizhe Wang

Auto-scaled ISL tracking for region based control infrastructure and applications in video surveillance
Peng Zhang, Sabu Emmanuel, Yanning Zhang and Cheng Fu

Energy-efficient beaconless real-time routing protocol for wireless sensor networks
Guoli Wang and Chao Huang

Dynamic fuzzy neural network for the intelligent control of a humanoid robot
Zhe Tang, Meng Joo Er and Fang Qi

A grid infrastructure for hybrid simulations
Dan Chen, Lizhe Wang, Congcong Bian and Xuguang Zhang

A feature-based detection and tracking system for gaze and smiling behaviours
Jungying Chen, Dan Chen and Oliver Lemon

Metamodel-driven SOA for collaborative e-science application
Tianyi Zang, Radu Calinescu and Marta Kwiatkowska

 

Vol 26 No 4 July 2011

Fast k-NN search using pre-computed l-NN sets
Sanghyun Yoo, Ki Yong Lee and Myoung Ho Kim

Evaluation of XPath queries with preducates: an Eulerian cycle theory based sequencing approach
Yun Shen and Ling Feng

Assessing usability readiness of collaborative projects
Görkem Çetyn and Mehmet Göktürk

Distributed multidimensional clustering based on spatial correlation in wireless sensor networks
Haengrae Cho

The implementation of the customized, parallel architecture for a fast word-match program
Ernest Jamro, Pawel Russek, Agnieszka Dabrowska-Boruch, Maciej Wielgosz
and Mazimierz Wiatr

Performance analysis of a resource aggregator in a grid of grids environment
D Surendran, T Purusothaman and R A Baclachandar

An approach for model driven testing: framework, metamodels and tools
Helaine Sousa, Denivaldo Lopes, Zair Abdelouahab, Daniela Barreiro Claro and Slimane Hammoudi

 

Vol 26 No 5 September 2011

Special issue: FCST 2010
Guest Editor: Professor Kequi Li

Affordance of ubiquitous learning through cloud computing
Xin Bai, Michael B Smith and Rathika Rajaravivarma

MT-BTRIMER: A master-slave multi-threaded dynamic binary translator
Xuping Tu, Hai Jin, Zhibin Yu, Jie Chen, Yabin Hu and Xie Xia

DBMISD-D: A distributed algorithm for constructing and maintaining high stability application-layer multicast tree
Jijun Cao, Jinshu Su, Jing Xie and Feng Chen

LimeVI: A platform for virtual cluster live migration over WAN
Xiaohui Wei, Hongliang Li, Qingnan Guo, Na Jiang and Liang Hu

Metadata changes in large file systems: a metadata querying perspective
Likun Liu, Cheng Chen, Yongwei Wu and Guangwen Yang

A novel method for estimating flow length distributions from double-sampled flow statistics
Weijiang Liu, Wenyu Qu, Zhaobin Liu and Kequi Li

HyperMonitor: A lightweight multi-platform monitor based on hardware virtualization
Jing Xiao and Min Zhu

 

Vol 26 No 6 November 2011

Special Issue: Real-Time Systems
Guest Editor: Yunmook Nah

On the road to real-time OSGi: extending OSGi with an admission control protocol
T. Richardson and A. J. Wellings

OASIS: an architecture for dynamic instrumentation of enterprise distributed real-time and embedded systems
James Hill, Hunt Sutherlandy, Paul Staudingery, Thomas Silveriaz, Douglas C.Schmidtx, John Slabyz and Nikita Visnevskiy

Early, time-approximate modeling of multi-OS linux platforms in a systemC co-simulation environment
H. Posadas, E. Villar, Dominique Ragot and Marcos Martinez

Modeling time-triggered real-time control systems using executable time-triggered model (E-TTM) and systemC-AMS
Jon Perez, Roman Obermaisser, Carlos F. Nicolas and Iban Ayestaran

A MDE-based optimisation process for real-time systems: optimizing systems at the architecture-level using the real DSL and library of transformation and heuristics
Olivier Gilles and Jerome Hugues

Code transformations to prevent timing anomalies
Albrecht Kadlec, Raimund Kirner and Peter Puschner

RTOS support for execution of parallelized hard real-time tasks on the MERASA multi-core processor
Julian Wolf, Mike Gerdes, Florian Kluge, Sascha Uhrig, Jörg Mische, Stefan Metzlaff, Christine Rochange, Hugues Cassé, Pascal Sainrat and Theo Ungerer

A software infrastructure for dependable embedded systems
Hiromasa Shimada, Alexandre Courbot, Yuki Kinebuchi and Tatsuo Nakajima

Model-driven runtime resource predictions for advanced mechatronic systems with dynamic data structures
Stefan Henkler, Simon Oberthür, Holger Giese and Andreas Seibel

Implementing and evaluating the AHS organic middleware
Alexander von Renteln and Uwe Brinkschulte

Volume 25 2010
Vol 25 No 1 January 2010

Enhancing Levenshtein distance algorithm for assessing behavioral trust
Luci Pirmez, Luiz F R C Carmo and Luiz F H Bacellar

Transactional risk-based decision making system in e-business interactions
Pmar Khadeer Hussain, Tharam Dillon, Elizabeth Chang and Farookh Hussain

A heuristic multi-path routing scheme for online traffic in MPLS networks
Seung-Joon Seok, Bongsoo You, Sungwan Youm, Kyung-Hoe Kim and Chul-Hee Kang

TCP trunking for bandwidth management of aggregate traffic
H T Kung and S Y Wang

Towards a person-centric identity management infrastructure (IMI)
V Poursakidis and C Nikolaou

Performance analysis of message-passing libraries on high-speed clusters
Guillermo L Taboada, Juan Touriño and Ramón Doallo

 

Vol 25 No 2 March 2010

Special issue: Frontiers in Complex, Intelligent and Software Intensive Systems
Edited by Fatsos Xhafa, David Taniar and Leonard Barolli

Electromagnetic Fields Diffracted by Two Horizontal edges with Arbitrary Angle for Different and Same Heights
Jiro Iwashige and Leonard Barolli

Simulation of Soliton Propagation in Slab Waveguide by Frequency Dependent FDTD Method
Hiroshi Maeda

Decision Model for a System to Start Communicating with a Human
Makoto Murakami, Motoi Yamagiwa and Minoru Uehara

A Purpose-based Synchronization Protocol for Secure Information Flow Control
Tomoya Enokido and Makoto Takizawa

An embedded IRIS recognizer for portable and mobile devices
C. Militello, V. Conti, F. Sorbello and S. Vitabile

Scheduling Algorithms for Concurrently Streaming Multimedia Objects in P2P Overlay Networks
Alireza Goudarzinemati, Tomoya Enokido and Makoto Takizawa

Knowledge Discovery for the Linguistic Atlas of Sicily Project
Antonio Gentile, Roberto Pirrone and Giuseppe Russo

A reconstruction method for Ultrasonic deterioration image by the combination of Constructive Solid Geometry and Strongly Typed Genetic Programming
Motoi Yamagiwa, Minoru Uehara and Makoto Murakami

Mining Hierarchical Negative Association Rules
David Taniar, Wenny Rahayu, Vincent Lee and Olena Daly

 

Vol 25 No 3 May 2010

Special issue: Mobile Data Management: Models, Methodologies and Services
Frank Morovan and Abdelkader Hameurlain

A new distributed grid scheme and k-NN query processing for mobile objects in spatial networks
Young-Chang Kim and Jae-Woo Chang

LookAhead continuous KNN mobile query processing
Geng Zhao, Kefeng Xuan, David Taniar and Bala Srinivasan

A motion-aware safe period-based framework for spatial alarm processing
Bhuvan Bamba, Ling Liu and Philip S. Yu

A hybrid ZigBee/Bluetooth approach to mobile semantic grids
Michele Ruta, Floriano Scioscia, Tommaso Di Noia and Eugenio Di Sciascio

Mobile multimedia management for Virtual Campfire – the German excellence research cluster UMIC
Yiwei Cao, Ralf Klamma and Matthias Jarke

 

Vol 25 No 4 July 2010

Special issue: Open Source Certification
Ernesto Damiani, Luis Barbosa, Peter T. Breuer and Claudio A. Ardagna

Certification of open-source software: A role for formal methods?
Luis S. Barbosa, Antonio Cerone, Alexander K. Petrenko and Siraj A. Shaikh

OpenHMI-tester: an open and cross-platform architecture for GUI testing and certification
Pedro Luis Mateo Navarro, Gregorio Martínez Pêrez and Diego Sevilla Ruiz

Trustworthiness of the FLOSS development process
Etiel Petrinja and Giancarlo Succi

Empirical analysis of the bug fixing process in open source projects
Chiara Francalanci and Francesco Merlo

 

Vol 25 No 5 September 2010

Group undeniable signatures with convertibility
Yuh-Dauh Lyuu and Ming-Luen Wu

Message authentication code algorithm for IP-SEC
V. Lakshmi Praba and G. Arumugam

A cache coherence protocol for distributed memory platforms
Rodolfo Sumoza and Jose Aguilar Castro

MBR-safe piecewise aggregate approximation for time-series subsequence matching
Yang-Sae Moon and Jinho Kim

A list of features that a graphical xml query language should support
K. Bekiropoulos, E. Keramopoulos, O. Beza and P. Mouratidis

Component criticality analysis to minimize soft errors risk
Muhammad Sheikh Sadi, D. G.Myers, Cesar Ortega Sanchez and Jan Jurjens

 

Vol 25 No 6 November 2010

Special issue: Selected topics on Wireless Sensor Networks
Kai Lin and Kequi Li

A compromise-resilient pair-wise rekeying protocol in hierarchical wireless sensor networks
Song Guo and An-Ni Shen

Characterizing the scaling capacity for multiple access wireless sensor networks
Guangcheng Qin, Panlong Yang, Guihai Chen and Deke Guo

Efficient and adaptive transmission algorithms for underwater acoustic networks
Zhongwen Guo, Yuan Feng, Lu Hong, Ying Guo and Meng Yang

An energy efficient packet aggregation scheme for wireless sensor networks
Junfeng Xu, Kequi Li, Yanming Shen and Geyong Min

Multi-category web object extraction based on relation schema
Xiaowu Chen, Yongtao Ma and Qinping Zhao

Volume 24 2009
Vol 24 No 1 January 2009

Special issue
Automated control systems for the safety integrity levels 3 and 4
Wolfgang A Halang

Hybrid approaches for derivation of tight service time bounds of distributed emdedded computing systems
K H (Kane) Kim and Chansik Im

Object and process migration in .NET
Peter Tröger and Andreas Polze

Achieving high reliable and timely task execution in mobile embedded applications
Stefan Schemmer and Edgar Nett

 

Vol 24 No 2 March 2009

A compact feature representation and feature re-weighting in content-based image retrieval
Gita Das and Sid Ray

Modified quad tree network with architectural analysis (M_QUAD)
Sandeep Kumar, P K Bansal and Seema Bawa

Design and implementation of a secure social network system
Ryan Layfield, Bhavani Thuraisingham, Laatifur Khan and Murat Kantarcioglu

A multiagents system for planning and management of the production factors
José Aguilar, Jorge Chacal and César Bravo

Analytic effectiveness evaluation of techniques for natural language sotware requirements testability
Giuseppe Lami

Efficient stream subsequence matching algorithms for handheld devices on streaming time-series data
Yang-Sae Moon and Woong-Kee Loh

 

Vol 24 No 3 May 2009

Special issue: Network and Parallel Computing
Kequi Li, Yanming Shen and Minyi Guo

An instruction folding solution for a Java processor
Tan Yiyu, Yau Chihang, Anthony S Fong and Yang Xiaojian

Restoration design in IP over reconfigurable WDM networks
Angela L Chiu, Gagan Choudhury, Robert Doverspike and Guangzhi Li

Propagation of active worms: A survey
Yang Xiang, Xiang Fan and Wen Tao Zhu

A novel data transmission scheme for mobile sensor network
Liu Weidong, Lin Chuang and Wang Jirong

An optimal lifetime-adaptive method for wireless sensor networks
Wenyu Qu, Masaru Kitsuregawa, Yanming Shen and Takashi Nanya

Approximation algorithms for inner-node weighted minimum
spanning trees
Chao Peng, Yasuo Tan, Naixue Xiong, Laurence T Yang and Hong Zhu

A context quality management infrastructure for complex ubiquitous environment
Siliang Tang, Jianhua Yang and Zhaohui Wu

On the design of P2P video streaming with layered coding
Yanming Shen and Kequi Li

 

Vol 24 No 4 July 2009

A novel approach to achieve real-time TCM (traditional Chinese medecine) telemedicine through the use of ontology and clinical intelligence discovery
Jackei H K Wong, Allan K Y Wong, Tharam Dillon and Wilfred W K Lin

Matchmaking framework for visualization web services
Gao Shu and Dingfang Chen

A SIM-based electronic transaction authentication system
Manzur Ashraf, Syed Mahfuzul Aziz, M Lutful Kabir and Biswajit K Dey

Low power TLB structure by using dynamic searching algorithm
Jung-Hoon Lee

Efficient stream subsequence matching algorithms for handheld devices on streaming time-series data
Yang-Sae Moon and Woong-Kee Loh

 

Vol 24 No 5 September 2009

Special issue: Advanced Topics on Grid, Cluster and P2P Computing
Keqin Li and Geyong Min

Performance analysis and tuning for clusters with ccNUMA nodes for scientific coputing – a case study
Abdullah Kayi, Edward Kornkven, Tarek El-Ghazawi, Samy Al-Bazhra and Gregory B Newby

Exploiting object structure in hardware transactional memory
Behram Khan, Matthew Horsnell, Ian Rogers, Mikel Luján, Andrew Dinn and Ian Watson

Improving the capability of the SLA workflow broker with parallel processing technology
Dang Ming Quan, Jörn Altmann and Laurence T Yang

A parallel information retrieval method for e-commerce
Wenyu Qu, Wanlei Zhou and Masaru Kitsuregawa

A parallel shortest path algorithm based on graph-partitioning and iterative correcting
Yuxin Tang, Yunquan Zhang and Hu Chen

A secure and scalable video conference system based on peer-assisted content delivery networks
Hao Yin, ChangLai Du, Chao Ren, Zhijia Chen, Heyong Min
and Chuang Lin

Adjacency cache: an efficient P2P web cache indexing and lookup system
John Casey and Wanlei Zhou

 

Vol 24 No 6 November 2009

Facial feature extraction in frontal views using activeshape models
A Chatterjee, M Goel, N Raghuvanshi, P Gupta and S G Dhande

Discrere time modelling in software reliability engineering—a unified approach
Omar Shatnawi

Scalable text classification as a tool for personalization
Ioannis Antonellis, Christos Bouras and Vassilis Poulopoulos

The modified alternating fractal renewal process for modelling peer to peer traffic
Kiarash Mizanian, Mehdi Vasef and Morteza Analoui

Approach on complex neural-genetic algorithm modeling for isomorphism identification in conceptual design of mechanism
Yang Ping and Liao Ningbo

Volume 23 2008
Vol 23 No 1 January 2008

Pairing-based public-key encryption schemes with backward-and-forward security
Song Han, Elizabeth Chang and Tharam Dillon

Adaptive two-stage QoS provisioning schemes for CDMA networks
Jin-Long Wang and Chen-Hsing Chen

Onto-agent methodology for design of ontology-based multi-agent systems
Maja Hadzic and Elizabeth Chang

Subsequence matching under time warping in time-series databases: observation, optimization, and performance results
Sang-Wook Kim and Miyoung Shin

An improved C-means clustering algorithm
Dechang Pi, Chuhua Xian and Xiaolin Qin

 

Vol 23 No 2 March 2008

Special Issue: Data Management in Grid and P2P Systems

Editorial
Abdelkader Hameurlain

PARIS: A peer-to-peer architecture for large-scale semantic data sharing
C Comito, S Patarin and D Talia

Answering XPath queries with search predicates in structured P2P networks
W He and L Fegaras

PWSMS: A Peer-to-peer web service management system for data sharing in collaborative environments
M Barhamgi, D Benslimane and A M Ouksel

Integrating and querying astronomical data on the e-GrOV data grid
G Vargas-Solar, J-L Zechinelli-Martini and V Cuevas-Vicenttín

Priority based list scheduling for sabotage-tolerance with deadline tasks in desktop grids
H-S Kim, C-S Hwang, S-K Lee, S-J Choi and J-M Gil

 

Vol 23 No 3 May 2008

Special Issue: Network Attacks and Defense Systems
Wanlei Zhou, Yang Xiang and Minyi Guo

A secure mutual authentication scheme with key agreement using smart card from bilinear pairings
Duc-Liem Vo and Kwangjo Kim

A hybrid model against TCP SYN and reflection DDoS attacks
Udaya Kiran Tupakula and Vijay Varadharajan

A cross-authentication model and implementation
Zhongwen Li, Qiong Chen and Yang Xiang

Variable-length signatures for intrusion detection
Zhuowei Li, Amitabha Das, Jianying Zhou and Jagdish C Patra

Request-driven role mapping framework for secure interoperation in multi-domain environments
Ruixuan Li, Zhuo Tang, Zhengding Lu and Jinwei Hu

Anomaly detection for web server based on smooth support vector machine
Shi-Jinn Horng, Pingzhi Fan, Ming-Yang Su, Yuan-Hsin Chen, Cheng-Ling Lee and Shao-Wei Lan

EV-C2C-PAKE: An improved client-to-client password-authenticated key exchange protocol
Zhu Hongfeng, Liu Tianhua and Liu Jie

Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks
Chua-Ta Li, Min-Shiang Hwang and Yen-Ping Chu

 

Vol 23 No 4 July 2008

Real-coded genetic algorithm applied to optimal placement of capacitor banks for unbalanced distribution systems with meshed/ radial configurations
R Hooshmand and M Ataei

State of the art of data mining of tree structured information
Henry Tan, Fedja Hadzic, Tharam S Dillon and Elizabeth Chang

Interaction cases: generalized use cases in ambient systems
Bent Bruun Kristensen

Adaptive selection of tuples over data streams for efficient load shedding
Joong Hyuk Chang

Modeling and verification of distributed real-time systems using periodic finite state machines
R Obermaisser, C El-Salloum, B Huber and H Kopetz

Pairing-based public-key encryption schemes with backward-and-forward security
Song Han, Elizabeth Chang and Tharam Dillon

 

Vol 23 No 5 September 2008

Special issue: Engineering Fault Tolerant Systems
Nicolas Guelfi, Henry Muccini, Patrizio Pelliccione and Alexander Romanovsky

On the development of standards based carrier grade platforms
Francis Tam

Model driven development of railway systems using diversity
Michele Banci, Stefania Gnesi, Alessandro Fantechi and Giovanni Lombardi

Deploying fault tolerant web service compositions
Nuno Laranjeiro and Marco Vieira

Formal analysis of BPEL workflows with compensation by model checking
Máté Kovács, Dániel Varró and László Gönczy

 

Vol 23 No 5 November 2008

Cryptanalysis of elliptic curve cryptosystem on smart card access control with threshold scheme
Chien-Lung Hsu

Eight key issues for an effective reuse-based requirements process
Ambrosio Toval, Begoña Moros, Joaquín Nicolás and Joaquín Lasheras

Optimal capacitor allocation in distribution systems using genetic algorithm
S P Singh, C Kistanna and A R Rao

Restricted independent domination problems on graphs
William Chung-Kung Yen

On the characteristics of information dissemination paths in vehicular ad hoc networks on the move
S Y Wang and C L Chou

Volume 22 2007
Volume 22 Nos 1-2 January-March 2007

Throughput and delay analysis of interrupt-driven kernels under Poisson and bursty traffic
K Salah and K Elbadawi

A framework for automated image annotation
L Wang, L Khan and B Thuraisingham

Integer factorization for RSA cryptosystem under a PVM environment
C-L Wu, D-C Lou and S-Y Chen

SBASS: Segment based approach for subsequence searches in sequence databases
S Park, S-W Kim and W W Chu

An efficient cache replacement algorithm for multimedia object caching
K Li, T Nanya, H Shen, F Chin and W Zhang

SDITPM: A novel transfer policy model to facilitate object mobility that shortens service roundtrip time by load balancing over the internet
Jason C T Lo, ASllan K Y Wong and Wilfred W K Lin

Solving approximate similarity queries
Tran Khanh Dang

Automatic construction of a decision tree for the analysis of traffic load in computer networks
John G Vlachogiannis

 

Volume 22 No 3 May 2007

Special issue
Real time software architecture
Doohyun Kim and Arif Ghafoor

Design and implementation of a high performance architecture for providing digital time stamping services to mobile devices
A Cilardo, D Cotroneo, C di Flora, A Mazzeo, L Romano and S Russo

A cluster-based TMO-structured scalable approach for location information systems
Y Nah, K H (Kane) Kim, T Wang and M H Kim

Parallel transmission model for real-time multi-source streaming of multimedia data in scalable networks
S Itaya and M Takizawa

Time-triggered and message-triggered object framework and global time-based synchronization for real-time multimedia streaming
M H Kim, E H Jo, D-J Kim and J-G Kim

A dynamically reconfigurable Voice User Interace (VUI) framework
and platform
A Talevski, E Chang and T S Dillon

Software infrastructures for building ubiquitous computing environments
T Nakajima, E Tokunaga, H Ishikawa, D Ueno, K Fujinami, M Sugaya and S Oikawa

A QoS framework for multimedia applications in mobile ad hoc networks
W Sheikh, B Shafiq, S Baqai, R A Paul, M F Khan and H Ghafoor

 

Volume 22 No 4 July 2007

Model checking bidding behaviors in internet concurrent auctions
Haiping Xu and Yi-Tsung Cheng

Obligation nets: a rigorous object-oriented technique for modeling the behavioural semantics of information systems
Kinh Nguyen and Tharam Dillon

A genetic algorithm with fuzzy selection and local search for multicast routing problem on the QoS constraint
Rung-Ching Chen and Cheun-Chieh Liao

InOrder: enhancing Google via stigmergic query refinement
Garrett Camp and Mihaela Ulieru

 

Volume 22 No 5 September 2007

Special issue: TrustBus 2006
Simone Fischer-Hübner, Steven Furnell and Costas Lambrinoudakis

Building the information assurance community of purpose
Jeremy Ward

Towards a person-centric identity management infrastructure (IMI)
V. Poursalidis and C. Nikolaou

On the effects of authentication and authorisation infrastructures on e-commerce activities
Christian Schläger and Thomas Nowey

Cluster-based analysis and recommendation of sellers in online auctions
Mikolaj Morzy

A framework for modelling restricted delegation of rights in the SECTET
Muhammad Alam, Michael Hafner, Ruth Breu and Stefan Untherthiner

An MDA appproach to develop secure business processes through a UML 2.0 extension
Alfonso Rodríguez, Eduardo Fernández-Medina and Mario Piattini

 

Volume 22 No 6 November 2007

A traffic-based routing algorithm by using mobile agents
Wenyu Qu, Masaru Kitsuregawa, Hai Zhuge, Hong Shen and Yinwei Jin

Modeling and verification of distributed real-time systems using periodic finite state machines
R. Obermaisser, C. El-Salloum, B. Huber and H. Kopetz

A formal method for synthesising components of shared resource systems
K. S. Cheung

Behavior description for complex flexible manufacturing system based on decomposition of petri net
Qingtian Zeng and Hua Duan

n-Gram/2L-approximation: a two-level n-gram inverted index structure for approximate string matching
Min-Soo Kim, Kyu-Young Whang and Jae-Gil Lee

Index to Volume 22, 2007