default search action
Computing, Volume 101
Volume 101, Number 1, January 2019
- Parosh Aziz Abdulla, Carole Delporte:
Special Issue on NETYS'2016. 1-2 - Achour Mostéfaoui, Michel Raynal, Matthieu Roy:
Time-efficient read/write register in crash-prone asynchronous message-passing systems. 3-17 - Javier Olivares, Anne-Marie Kermarrec, Nitin Chiluka:
The out-of-core KNN awakens: the light side of computation force on large datasets. 19-38 - Gadi Taubenfeld:
Waiting in concurrent algorithms. 39-57 - Suha Orhun Mutluergil, Serdar Tasiran:
A mechanized refinement proof of the Chase-Lev deque using a proof system. 59-74
Volume 101, Number 2, February 2019
- Rogério de Lemos:
Special issue on dependable computing: theory and practice. 75-76 - Ilya Tuzov, David de Andrés, Juan Carlos Ruiz:
Simulating the effects of logic faults in implementation-level VITAL-compliant models. 77-96 - Michael Eischer, Tobias Distler:
Scalable Byzantine fault-tolerant state-machine replication on heterogeneous servers. 97-118 - Raul Barbosa, Frederico Cerveira, Luís Gonçalo, Henrique Madeira:
Emulating representative software vulnerabilities using field data. 119-138 - Yazdan Movahedi, Michel Cukier, Ambrose Andongabo, Ilir Gashi:
Cluster-based vulnerability assessment of operating systems and web browsers. 139-160 - Paulo Jorge Costa Nunes, Ibéria Medeiros, José Fonseca, Nuno Neves, Miguel Correia, Marco Vieira:
An empirical study on combining diverse static analysis tools for web security vulnerabilities based on development scenarios. 161-185
Volume 101, Number 3, March 2019
- Nasrullah Sheikh, Zekarias T. Kefato, Alberto Montresor:
gat2vec: representation learning for attributed graphs. 187-209 - Chao-Tung Yang, Shuo-Tsung Chen, Jung-Chun Liu, Yi-Wei Su, Deepak Puthal, Rajiv Ranjan:
A predictive load balancing technique for software defined networked cloud services. 211-235 - Mohammad Allahbakhsh, Saeed Arbabi, Mohammadreza Galavii, Florian Daniel, Boualem Benatallah:
Crowdsourcing planar facility location allocation problems. 237-261 - Mohamed Sellami, Zakaria Maamar, Sylvain Lefebvre, Noura Faci:
Logs and enterprise networks for overcoming obstacles in business processes. 263-288 - Oscar Herrera-Alcántara, Miguel González-Mendoza:
Correction to: Inverse formulas of parameterized orthogonal wavelets. 289
Volume 101, Number 4, April 2019
- Elarbi Badidi, Yacine Atif, Quan Z. Sheng, Muthucumaru Maheswaran:
On personalized cloud service provisioning for mobile users using adaptive and context-aware service composition. 291-318 - Konstantinos G. Tsiknas, Konstantinos Rantos, Christos J. Schinas, Andrew Soilemes:
Performance evaluation of TCP-BIAD in high-speed, long-distance networks. 319-337 - Jinoh Kim, Alex Sim, Brian Tierney, Sang C. Suh, Ikkyun Kim:
Multivariate network traffic analysis using clustered patterns. 339-361 - Saeed Sedighian Kashi:
Area coverage of heterogeneous wireless sensor networks in support of Internet of Things demands. 363-385
Volume 101, Number 5, May 2019
- José Angel Galindo, David Benavides, Pablo Trinidad, Antonio Manuel Gutiérrez-Fernández, Antonio Ruiz-Cortés:
Automated analysis of feature models: Quo vadis? 387-433 - Phuong Luu Vo, Nguyen Hoang Tran:
Cooperative caching for HTTP-based adaptive streaming contents in cache-enabled radio access networks. 435-453 - Saad Saeed, Muhammad Asim, Thar Baker, Zakaria Maamar:
A location-sensitive and network-aware broker for recommending Web services. 455-475 - Lingyun Zhou, Lixin Ding, Maode Ma, Wan Tang:
An accurate partially attracted firefly algorithm. 477-493
Volume 101, Number 6, June 2019
- Kelvin Kian Loong Wong, Zhihua Liu, Quan Zou:
Multi-objective optimization and data analysis in informationization. 495-498 - Alireza Goli, Erfan Babaee Tirkolaee, Behnam Malmir, Gui-Bin Bian, Arun Kumar Sangaiah:
A multi-objective invasive weed optimization algorithm for robust aggregate production planning under uncertain seasonal demand. 499-529 - Qunsheng Ruan, Qingfeng Wu, Yingdong Wang, Xiling Liu, Fengyu Miao:
Effective learning model of user classification based on ensemble learning algorithms. 531-545 - Erfan Babaee Tirkolaee, Alireza Goli, Milad Hematian, Arun Kumar Sangaiah, Tao Han:
Multi-objective multi-mode resource constrained project scheduling problem using Pareto-based algorithms. 547-570 - Ming Li, Changqin Huang, Dianhui Wang, Qintai Hu, Jia Zhu, Yong Tang:
Improved randomized learning algorithms for imbalanced and noisy educational data classification. 571-585 - Xizhe Wang, Pengze Wu, Guang Liu, Qionghao Huang, Xiaoling Hu, Haijiao Xu:
Learning performance prediction via convolutional GRU and explainable neural networks in e-learning environments. 587-604 - Chao Yang, Shiqian Wu, Hongping Fang, Meng Joo Er:
Adaptive Weber-face for robust illumination face recognition. 605-619 - Xiaobo Lai, Xiaomei Xu, Lili Lv, Zihe Huang, Jinyan Zhang, Peng Huang:
A novel non-parametric transform stereo matching method based on mutual relationship. 621-635 - Xiaodong Zhang, Yiqun Zhang, Qingmao Hu:
Deep learning based vein segmentation from susceptibility-weighted images. 637-652 - Chenchu Xu, Lin Xu, Heye Zhang, Yanping Zhang, Xiuquan Du, Shuo Li:
A novel machine-learning algorithm to estimate the position and size of myocardial infarction for MRI sequence. 653-665 - Weiwei Zhang, Jinglin Zhang, Xiuquan Du, Yanping Zhang, Shuo Li:
An end-to-end joint learning framework of artery-specific coronary calcium scoring in non-contrast cardiac CT. 667-678 - Hanfei Zhang, Yu Lu, Shiwei Ma, Shuhao Cao, Qingwei Xia, Yanyan Liu, Haiyan Zhang:
Adaptive sparse reconstruction of damage localization via Lamb waves for structure health monitoring. 679-692 - Kuo Wang, Sumei Li, Qing Wang, Chunping Hou:
Identification of hormone-binding proteins using a novel ensemble classifier. 693-703 - Taoying Li, Qian Yin, Runyu Song, Mingyue Gao, Yan Chen:
Multidimensional scaling method for prediction of lysine glycation sites. 705-724
Volume 101, Number 7, July 2019
- Fatos Xhafa:
Special issue "Internet of Things (IoT)-based Services". 725-727 - Ping Zhang, Mimoza Durresi, Arjan Durresi:
Multi-access edge computing aided mobility for privacy protection in Internet of Things. 729-742 - A. S. M. Kayes, Wenny Rahayu, Tharam S. Dillon:
Critical situation management utilizing IoT-based data resources through dynamic contextual role modeling and activation. 743-772 - Xu An Wang, Yudong Liu, Arun Kumar Sangaiah, Jindan Zhang:
Improved publicly verifiable group sum evaluation over outsourced data streams in IoT setting. 773-790 - Mohammad Dahman Alshehri, Farookh Khadeer Hussain:
A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT). 791-818 - Flora Amato, Giovanni Cozzolino, Antonino Mazzeo, Francesco Moscato:
Detect and correlate information system events through verbose logging messages analysis. 819-830 - Zahoor Ali Khan, Ghazanfar Latif, Arshad Sher, Imran Usman, Mahmood Ashraf Khan, Manzoor Ilahi, Nadeem Javaid:
Efficient routing for corona based underwater wireless sensor networks. 831-856 - Stig Bosmans, Siegfried Mercelis, Joachim Denil, Peter Hellinckx:
Testing IoT systems using a hybrid simulation based testing approach. 857-872 - Jens de Hoog, Arthur Janssens, Siegfried Mercelis, Peter Hellinckx:
Towards a distributed real-time hybrid simulator for autonomous vehicles. 873-891
Volume 101, Number 8, August 2019
- Suejb Memeti, Sabri Pllana, Alécio Pedro Delazari Binotto, Joanna Kolodziej, Ivona Brandic:
Using meta-heuristics and machine learning for software optimization of parallel computing systems: a systematic literature review. 893-936 - Victor Lira, Eduardo Tavares, Meuse N. Oliveira Jr., Erica Sousa, Bruno Costa e Silva Nogueira:
Virtual network mapping considering energy consumption and availability. 937-967 - Hilal Arslan, Murat Manguoglu:
A parallel bio-inspried shortest path algorithm. 969-988 - Jawad Ahmed, Aqsa Malik, Muhammad U. Ilyas, Jalal S. Alowibdi:
Instance launch-time analysis of OpenStack virtualization technologies with control plane network errors. 989-1014 - Ashish Kumar Maurya, Anil Kumar Tripathi:
ECP: a novel clustering-based technique to schedule precedence constrained tasks on multiprocessor computing systems. 1015-1039 - Yang Zhao, Mao Ren, Songquan Jiang, Guobin Zhu, Hu Xiong:
An efficient and revocable storage CP-ABE scheme in the cloud computing. 1041-1065 - A. R. Parvanak, Mohsen Jahanshahi, Mehdi Dehghan:
A cross-layer learning automata based gateway selection method in multi-radio multi-channel wireless mesh networks. 1067-1090 - Lynda Ben Boudaoud, Basel Solaiman, Abdelkamel Tari:
Implementation and comparison of binary thinning algorithms on GPU. 1091-1117 - Aly Megahed, Jennifer A. Pazour, Ahmed Nazeem, Samir Tata, Mohamed Mohamed:
Monitoring services in the Internet of Things: an optimization approach. 1119-1145 - Negin Samadi, Asgarali Bouyer:
Identifying influential spreaders based on edge ratio and neighborhood diversity measures in complex networks. 1147-1175 - Muthukumar Sumathi, Senthilkumar Muthukrishnan, Chinnadurai Veeramani:
Dynamic behaviour of competing memes' spread with alert influence in multiplex social-networks. 1177-1197 - Lingmei Ren, Qingyang Zhang, Weisong Shi, Yanjun Peng:
Edge-based personal computing services: fall detection as a pilot study. 1199-1223
Volume 101, Number 9, September 2019
- Ahmed Bouajjani, Hugues Fauconnier:
Editorial, special issue of NETYS 2015. 1225-1226 - Jad Hamza:
On the complexity of linearizability. 1227-1240 - Stéphane Devismes, Anissa Lamani, Franck Petit, Sébastien Tixeuil:
Optimal torus exploration by oblivious robots. 1241-1264 - Triet Dang Vo-Huu, Erik-Oliver Blass, Guevara Noubir:
EPiC: efficient privacy-preserving counting for MapReduce. 1265-1286 - Hajar El Hammouti, Loubna Echabbi, Rachid El Azouzi:
A fully distributed learning algorithm for power allocation in heterogeneous networks. 1287-1303 - Yahya Benkaouz, Mohammed Erradi:
Special issue on NETYS'17 selected papers. 1305 - Rezwana Reaz, Hrishikesh B. Acharya, Ehab S. Elmallah, Jorge Arturo Cobb, Mohamed G. Gouda:
Policy expressions and the bottom-up design of computing policies. 1307-1326 - Driss Ait Omar, M'hamed Outanoute, Mohamed Baslam, Mohamed Fakir, Belaid Bouikhalene:
On understanding price-QoS war for competitive market and confused consumers. 1327-1348 - Edward Talmage, Jennifer L. Welch:
Anomalies and similarities among consensus numbers of variously-relaxed queues. 1349-1368 - Chen Avin, Louis Cohen, Mahmoud Parham, Stefan Schmid:
Competitive clustering of stochastic communication patterns on a ring. 1369-1390
Volume 101, Number 10, October 2019
- Yassine Ouhammou, Ladjel Bellatreche, Mirjana Ivanovic, Alberto Abelló:
Model and data engineering for advanced data-intensive systems and applications. 1391-1395 - Simin Cai, Barbara Gallina, Dag Nyström, Cristina Seceleanu:
Data aggregation processes: a survey, a taxonomy, and design guidelines. 1397-1429 - Panos Vassiliadis, Michail-Romanos Kolozoff, Maria Zerva, Apostolos V. Zarras:
Schema evolution and foreign keys: a study on usage, heartbeat of change and relationship of foreign keys to table activity. 1431-1456 - Li Yan, Ping Zhao, Zongmin Ma:
Indexing temporal RDF graph. 1457-1488 - Sara Qassimi, El Hassan Abdelwahed:
The role of collaborative tagging and ontologies in emerging semantic of web resources. 1489-1511 - Milos Savic, Vladimir Kurbalija, Zoran Bosnic, Mirjana Ivanovic:
Feature selection based on community detection in feature correlation networks. 1513-1538 - George Roumelis, Athanasios Fevgas, Michael Vassilakopoulos, Antonio Corral, Panayiotis Bozanis, Yannis Manolopoulos:
Bulk-loading and bulk-insertion algorithms for xBR+-trees in Solid State Drives. 1539-1563
Volume 101, Number 11, November 2019
- Xiaoxiang Song, Yan Guo, Ning Li, Peng Qian:
A novel approach for missing data prediction in coevolving time series. 1565-1584 - Boni García, Micael Gallego, Francisco Gortázar, Antonia Bertolino:
Understanding and estimating quality of experience in WebRTC applications. 1585-1607 - Ajay Kumar, Seema Bawa:
Generalized Ant Colony Optimizer: swarm-based meta-heuristic algorithm for cloud services execution. 1609-1632 - Rashmi Chaudhry, Shashikala Tapaswi:
Bio-inspired energy conserving adaptive power and rate control in MANET. 1633-1659 - Aneta Poniszewska-Maranda, Daniel Kaczmarek, Natalia Kryvinska, Fatos Xhafa:
Studying usability of AI in the IoT systems/paradigm through embedding NN techniques into mobile smart service system. 1661-1685 - Kostas Kolomvatsos:
A distributed, proactive intelligent scheme for securing quality in large scale data processing. 1687-1710 - Kamal Berahmand, Asgarali Bouyer, Negin Samadi:
A new local and multidimensional ranking measure to detect spreaders in social networks. 1711-1733 - Fulvio Corno, Luigi De Russis, Teodoro Montanaro:
XDN: cross-device framework for custom notifications management. 1735-1761
Volume 101, Number 12, December 2019
- Sankar Mukherjee, Daya Sagar Gupta, G. P. Biswas:
An efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using lattice. 1763-1788 - Julio Mendonca, Ermeson C. Andrade, Ricardo M. F. Lima:
Assessing mobile applications performance and energy consumption through experiments and Stochastic models. 1789-1811 - Georgios Sakellariou, Anastasios Gounaris:
Homomorphically encrypted k-means on cloud-hosted servers with low client-side load. 1813-1836 - Jun Gao, Yi Lu Murphey, Honghui Zhu:
Personalized detection of lane changing behavior using multisensor data fusion. 1837-1860 - Dong-Oh Kim, Hong-Yeon Kim, Young-Kyun Kim, Jeong-Joon Kim:
Efficient techniques of parallel recovery for erasure-coding-based distributed file systems. 1861-1884 - Andreas Kosmatopoulos, Anastasios Gounaris, Kostas Tsichlas:
Hinode: implementing a vertex-centric modelling approach to maintaining historical graph data. 1885-1908 - Luise Pufahl, Mathias Weske:
Batch activity: enhancing business process modeling and enactment with batch processing. 1909-1933 - Enver Ever, Purav Shah, Leonardo Mostarda, Fredrick A. Omondi, Orhan Gemikonakli:
On the performance, availability and energy consumption modelling of clustered IoT systems. 1935-1970 - Jun Jiang, Liangcai Zeng, Bin Chen, Yang Lu, Wei Xiong:
An accurate and flexible technique for camera calibration. 1971-1988
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.