


default search action
Computing, Volume 101
Volume 101, Number 1, January 2019
- Parosh Aziz Abdulla, Carole Delporte:

Special Issue on NETYS'2016. 1-2 - Achour Mostéfaoui, Michel Raynal, Matthieu Roy

:
Time-efficient read/write register in crash-prone asynchronous message-passing systems. 3-17 - Javier Olivares

, Anne-Marie Kermarrec
, Nitin Chiluka:
The out-of-core KNN awakens: the light side of computation force on large datasets. 19-38 - Gadi Taubenfeld:

Waiting in concurrent algorithms. 39-57 - Suha Orhun Mutluergil

, Serdar Tasiran:
A mechanized refinement proof of the Chase-Lev deque using a proof system. 59-74
Volume 101, Number 2, February 2019
- Rogério de Lemos

:
Special issue on dependable computing: theory and practice. 75-76 - Ilya Tuzov

, David de Andrés
, Juan Carlos Ruiz
:
Simulating the effects of logic faults in implementation-level VITAL-compliant models. 77-96 - Michael Eischer

, Tobias Distler:
Scalable Byzantine fault-tolerant state-machine replication on heterogeneous servers. 97-118 - Raul Barbosa

, Frederico Cerveira
, Luís Gonçalo, Henrique Madeira:
Emulating representative software vulnerabilities using field data. 119-138 - Yazdan Movahedi

, Michel Cukier, Ambrose Andongabo, Ilir Gashi
:
Cluster-based vulnerability assessment of operating systems and web browsers. 139-160 - Paulo Jorge Costa Nunes, Ibéria Medeiros

, José Fonseca
, Nuno Neves
, Miguel Correia
, Marco Vieira
:
An empirical study on combining diverse static analysis tools for web security vulnerabilities based on development scenarios. 161-185
Volume 101, Number 3, March 2019
- Nasrullah Sheikh

, Zekarias T. Kefato
, Alberto Montresor
:
gat2vec: representation learning for attributed graphs. 187-209 - Chao-Tung Yang

, Shuo-Tsung Chen, Jung-Chun Liu, Yi-Wei Su, Deepak Puthal, Rajiv Ranjan:
A predictive load balancing technique for software defined networked cloud services. 211-235 - Mohammad Allahbakhsh

, Saeed Arbabi, Mohammadreza Galavii, Florian Daniel
, Boualem Benatallah
:
Crowdsourcing planar facility location allocation problems. 237-261 - Mohamed Sellami

, Zakaria Maamar
, Sylvain Lefebvre
, Noura Faci:
Logs and enterprise networks for overcoming obstacles in business processes. 263-288 - Oscar Herrera-Alcántara

, Miguel González-Mendoza
:
Correction to: Inverse formulas of parameterized orthogonal wavelets. 289
Volume 101, Number 4, April 2019
- Elarbi Badidi

, Yacine Atif
, Quan Z. Sheng
, Muthucumaru Maheswaran:
On personalized cloud service provisioning for mobile users using adaptive and context-aware service composition. 291-318 - Konstantinos G. Tsiknas, Konstantinos Rantos, Christos J. Schinas, Andrew Soilemes:

Performance evaluation of TCP-BIAD in high-speed, long-distance networks. 319-337 - Jinoh Kim

, Alex Sim
, Brian Tierney, Sang C. Suh, Ikkyun Kim:
Multivariate network traffic analysis using clustered patterns. 339-361 - Saeed Sedighian Kashi

:
Area coverage of heterogeneous wireless sensor networks in support of Internet of Things demands. 363-385
Volume 101, Number 5, May 2019
- José Angel Galindo, David Benavides, Pablo Trinidad, Antonio Manuel Gutiérrez-Fernández, Antonio Ruiz-Cortés:

Automated analysis of feature models: Quo vadis? 387-433 - Phuong Luu Vo

, Nguyen Hoang Tran
:
Cooperative caching for HTTP-based adaptive streaming contents in cache-enabled radio access networks. 435-453 - Saad Saeed, Muhammad Asim

, Thar Baker
, Zakaria Maamar
:
A location-sensitive and network-aware broker for recommending Web services. 455-475 - Lingyun Zhou

, Lixin Ding, Maode Ma, Wan Tang:
An accurate partially attracted firefly algorithm. 477-493
Volume 101, Number 6, June 2019
- Kelvin Kian Loong Wong

, Zhihua Liu, Quan Zou:
Multi-objective optimization and data analysis in informationization. 495-498 - Alireza Goli

, Erfan Babaee Tirkolaee
, Behnam Malmir, Gui-Bin Bian, Arun Kumar Sangaiah
:
A multi-objective invasive weed optimization algorithm for robust aggregate production planning under uncertain seasonal demand. 499-529 - Qunsheng Ruan, Qingfeng Wu, Yingdong Wang, Xiling Liu, Fengyu Miao:

Effective learning model of user classification based on ensemble learning algorithms. 531-545 - Erfan Babaee Tirkolaee

, Alireza Goli
, Milad Hematian
, Arun Kumar Sangaiah
, Tao Han:
Multi-objective multi-mode resource constrained project scheduling problem using Pareto-based algorithms. 547-570 - Ming Li, Changqin Huang

, Dianhui Wang, Qintai Hu, Jia Zhu
, Yong Tang:
Improved randomized learning algorithms for imbalanced and noisy educational data classification. 571-585 - Xizhe Wang, Pengze Wu, Guang Liu, Qionghao Huang

, Xiaoling Hu, Haijiao Xu
:
Learning performance prediction via convolutional GRU and explainable neural networks in e-learning environments. 587-604 - Chao Yang, Shiqian Wu

, Hongping Fang, Meng Joo Er:
Adaptive Weber-face for robust illumination face recognition. 605-619 - Xiaobo Lai

, Xiaomei Xu, Lili Lv, Zihe Huang, Jinyan Zhang, Peng Huang:
A novel non-parametric transform stereo matching method based on mutual relationship. 621-635 - Xiaodong Zhang, Yiqun Zhang, Qingmao Hu:

Deep learning based vein segmentation from susceptibility-weighted images. 637-652 - Chenchu Xu, Lin Xu, Heye Zhang

, Yanping Zhang, Xiuquan Du, Shuo Li
:
A novel machine-learning algorithm to estimate the position and size of myocardial infarction for MRI sequence. 653-665 - Weiwei Zhang

, Jinglin Zhang, Xiuquan Du, Yanping Zhang, Shuo Li
:
An end-to-end joint learning framework of artery-specific coronary calcium scoring in non-contrast cardiac CT. 667-678 - Hanfei Zhang, Yu Lu, Shiwei Ma, Shuhao Cao, Qingwei Xia, Yanyan Liu, Haiyan Zhang:

Adaptive sparse reconstruction of damage localization via Lamb waves for structure health monitoring. 679-692 - Kuo Wang

, Sumei Li
, Qing Wang, Chunping Hou:
Identification of hormone-binding proteins using a novel ensemble classifier. 693-703 - Taoying Li

, Qian Yin, Runyu Song, Mingyue Gao, Yan Chen:
Multidimensional scaling method for prediction of lysine glycation sites. 705-724
Volume 101, Number 7, July 2019
- Fatos Xhafa:

Special issue "Internet of Things (IoT)-based Services". 725-727 - Ping Zhang, Mimoza Durresi, Arjan Durresi

:
Multi-access edge computing aided mobility for privacy protection in Internet of Things. 729-742 - A. S. M. Kayes

, Wenny Rahayu, Tharam S. Dillon:
Critical situation management utilizing IoT-based data resources through dynamic contextual role modeling and activation. 743-772 - Xu An Wang

, Yudong Liu, Arun Kumar Sangaiah
, Jindan Zhang:
Improved publicly verifiable group sum evaluation over outsourced data streams in IoT setting. 773-790 - Mohammad Dahman Alshehri

, Farookh Khadeer Hussain
:
A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT). 791-818 - Flora Amato

, Giovanni Cozzolino
, Antonino Mazzeo, Francesco Moscato:
Detect and correlate information system events through verbose logging messages analysis. 819-830 - Zahoor Ali Khan, Ghazanfar Latif

, Arshad Sher
, Imran Usman, Mahmood Ashraf Khan, Manzoor Ilahi, Nadeem Javaid
:
Efficient routing for corona based underwater wireless sensor networks. 831-856 - Stig Bosmans, Siegfried Mercelis

, Joachim Denil
, Peter Hellinckx
:
Testing IoT systems using a hybrid simulation based testing approach. 857-872 - Jens de Hoog

, Arthur Janssens, Siegfried Mercelis
, Peter Hellinckx
:
Towards a distributed real-time hybrid simulator for autonomous vehicles. 873-891
Volume 101, Number 8, August 2019
- Suejb Memeti

, Sabri Pllana
, Alécio Pedro Delazari Binotto, Joanna Kolodziej, Ivona Brandic:
Using meta-heuristics and machine learning for software optimization of parallel computing systems: a systematic literature review. 893-936 - Victor Lira, Eduardo Tavares, Meuse N. Oliveira Jr., Erica Sousa, Bruno Costa e Silva Nogueira

:
Virtual network mapping considering energy consumption and availability. 937-967 - Hilal Arslan

, Murat Manguoglu:
A parallel bio-inspried shortest path algorithm. 969-988 - Jawad Ahmed, Aqsa Malik, Muhammad U. Ilyas

, Jalal S. Alowibdi:
Instance launch-time analysis of OpenStack virtualization technologies with control plane network errors. 989-1014 - Ashish Kumar Maurya

, Anil Kumar Tripathi:
ECP: a novel clustering-based technique to schedule precedence constrained tasks on multiprocessor computing systems. 1015-1039 - Yang Zhao, Mao Ren, Songquan Jiang, Guobin Zhu, Hu Xiong:

An efficient and revocable storage CP-ABE scheme in the cloud computing. 1041-1065 - A. R. Parvanak, Mohsen Jahanshahi

, Mehdi Dehghan:
A cross-layer learning automata based gateway selection method in multi-radio multi-channel wireless mesh networks. 1067-1090 - Lynda Ben Boudaoud

, Basel Solaiman, Abdelkamel Tari:
Implementation and comparison of binary thinning algorithms on GPU. 1091-1117 - Aly Megahed, Jennifer A. Pazour, Ahmed Nazeem, Samir Tata, Mohamed Mohamed:

Monitoring services in the Internet of Things: an optimization approach. 1119-1145 - Negin Samadi

, Asgarali Bouyer
:
Identifying influential spreaders based on edge ratio and neighborhood diversity measures in complex networks. 1147-1175 - Muthukumar Sumathi

, Senthilkumar Muthukrishnan, Chinnadurai Veeramani:
Dynamic behaviour of competing memes' spread with alert influence in multiplex social-networks. 1177-1197 - Lingmei Ren, Qingyang Zhang

, Weisong Shi
, Yanjun Peng:
Edge-based personal computing services: fall detection as a pilot study. 1199-1223
Volume 101, Number 9, September 2019
- Ahmed Bouajjani, Hugues Fauconnier:

Editorial, special issue of NETYS 2015. 1225-1226 - Jad Hamza

:
On the complexity of linearizability. 1227-1240 - Stéphane Devismes

, Anissa Lamani, Franck Petit
, Sébastien Tixeuil:
Optimal torus exploration by oblivious robots. 1241-1264 - Triet Dang Vo-Huu, Erik-Oliver Blass, Guevara Noubir:

EPiC: efficient privacy-preserving counting for MapReduce. 1265-1286 - Hajar El Hammouti

, Loubna Echabbi, Rachid El Azouzi
:
A fully distributed learning algorithm for power allocation in heterogeneous networks. 1287-1303 - Yahya Benkaouz, Mohammed Erradi:

Special issue on NETYS'17 selected papers. 1305 - Rezwana Reaz

, Hrishikesh B. Acharya, Ehab S. Elmallah, Jorge Arturo Cobb, Mohamed G. Gouda:
Policy expressions and the bottom-up design of computing policies. 1307-1326 - Driss Ait Omar

, M'hamed Outanoute, Mohamed Baslam
, Mohamed Fakir
, Belaid Bouikhalene:
On understanding price-QoS war for competitive market and confused consumers. 1327-1348 - Edward Talmage, Jennifer L. Welch:

Anomalies and similarities among consensus numbers of variously-relaxed queues. 1349-1368 - Chen Avin

, Louis Cohen, Mahmoud Parham
, Stefan Schmid
:
Competitive clustering of stochastic communication patterns on a ring. 1369-1390
Volume 101, Number 10, October 2019
- Yassine Ouhammou, Ladjel Bellatreche, Mirjana Ivanovic

, Alberto Abelló:
Model and data engineering for advanced data-intensive systems and applications. 1391-1395 - Simin Cai

, Barbara Gallina, Dag Nyström, Cristina Seceleanu
:
Data aggregation processes: a survey, a taxonomy, and design guidelines. 1397-1429 - Panos Vassiliadis

, Michail-Romanos Kolozoff, Maria Zerva, Apostolos V. Zarras:
Schema evolution and foreign keys: a study on usage, heartbeat of change and relationship of foreign keys to table activity. 1431-1456 - Li Yan, Ping Zhao, Zongmin Ma

:
Indexing temporal RDF graph. 1457-1488 - Sara Qassimi

, El Hassan Abdelwahed
:
The role of collaborative tagging and ontologies in emerging semantic of web resources. 1489-1511 - Milos Savic, Vladimir Kurbalija

, Zoran Bosnic, Mirjana Ivanovic
:
Feature selection based on community detection in feature correlation networks. 1513-1538 - George Roumelis, Athanasios Fevgas, Michael Vassilakopoulos

, Antonio Corral
, Panayiotis Bozanis, Yannis Manolopoulos:
Bulk-loading and bulk-insertion algorithms for xBR+-trees in Solid State Drives. 1539-1563
Volume 101, Number 11, November 2019
- Xiaoxiang Song, Yan Guo, Ning Li, Peng Qian:

A novel approach for missing data prediction in coevolving time series. 1565-1584 - Boni García

, Micael Gallego
, Francisco Gortázar, Antonia Bertolino
:
Understanding and estimating quality of experience in WebRTC applications. 1585-1607 - Ajay Kumar

, Seema Bawa:
Generalized Ant Colony Optimizer: swarm-based meta-heuristic algorithm for cloud services execution. 1609-1632 - Rashmi Chaudhry, Shashikala Tapaswi:

Bio-inspired energy conserving adaptive power and rate control in MANET. 1633-1659 - Aneta Poniszewska-Maranda

, Daniel Kaczmarek, Natalia Kryvinska
, Fatos Xhafa
:
Studying usability of AI in the IoT systems/paradigm through embedding NN techniques into mobile smart service system. 1661-1685 - Kostas Kolomvatsos:

A distributed, proactive intelligent scheme for securing quality in large scale data processing. 1687-1710 - Kamal Berahmand, Asgarali Bouyer

, Negin Samadi
:
A new local and multidimensional ranking measure to detect spreaders in social networks. 1711-1733 - Fulvio Corno

, Luigi De Russis
, Teodoro Montanaro
:
XDN: cross-device framework for custom notifications management. 1735-1761
Volume 101, Number 12, December 2019
- Sankar Mukherjee, Daya Sagar Gupta

, G. P. Biswas:
An efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using lattice. 1763-1788 - Julio Mendonca

, Ermeson C. Andrade
, Ricardo M. F. Lima:
Assessing mobile applications performance and energy consumption through experiments and Stochastic models. 1789-1811 - Georgios Sakellariou

, Anastasios Gounaris:
Homomorphically encrypted k-means on cloud-hosted servers with low client-side load. 1813-1836 - Jun Gao, Yi Lu Murphey, Honghui Zhu:

Personalized detection of lane changing behavior using multisensor data fusion. 1837-1860 - Dong-Oh Kim

, Hong-Yeon Kim, Young-Kyun Kim, Jeong-Joon Kim
:
Efficient techniques of parallel recovery for erasure-coding-based distributed file systems. 1861-1884 - Andreas Kosmatopoulos

, Anastasios Gounaris, Kostas Tsichlas:
Hinode: implementing a vertex-centric modelling approach to maintaining historical graph data. 1885-1908 - Luise Pufahl

, Mathias Weske
:
Batch activity: enhancing business process modeling and enactment with batch processing. 1909-1933 - Enver Ever

, Purav Shah
, Leonardo Mostarda, Fredrick A. Omondi, Orhan Gemikonakli
:
On the performance, availability and energy consumption modelling of clustered IoT systems. 1935-1970 - Jun Jiang, Liangcai Zeng, Bin Chen, Yang Lu, Wei Xiong:

An accurate and flexible technique for camera calibration. 1971-1988

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














