


default search action
Journal of Computer and System Sciences, Volume 79
Volume 79, Number 1, February 2013
- Fedor V. Fomin

, Serge Gaspers, Saket Saurabh, Stéphan Thomassé:
A linear vertex kernel for maximum internal spanning tree. 1-6 - Florin Manea, Catalin Tiseanu:

The hardness of counting full words compatible with partial words. 7-22 - Stéphane Demri, Marcin Jurdzinski

, Oded Lachish
, Ranko Lazic:
The covering and boundedness problems for branching vector addition systems. 23-38 - Klaus Jansen, Stefan Kratsch, Dániel Marx

, Ildikó Schlotter
:
Bin packing with fixed number of bins revisited. 39-49 - Bhaskar DasGupta, Devendra Desai:

On the complexity of Newman's community finding approach for biological and social networks. 50-67 - Leslie Ann Goldberg, Mark Jerrum:

Approximating the Tutte polynomial of a binary matroid and other related combinatorial polynomials. 68-78 - Manuel Bodirsky

, Víctor Dalmau
:
Datalog and constraint satisfaction with infinite templates. 79-100 - Juha Honkala:

The sequence equivalence problem for primitive D0L systems. 101-110 - Alexander Kesselman, Kirill Kogan

, Sergey Nemzer, Michael Segal
:
Space and speed tradeoffs in TCAM hierarchical packet classification. 111-121 - Longyan Gong

, Jingxin Pan, Beibei Liu, Shengmei Zhao:
A novel one-time password mutual authentication scheme on sharing renewed finite random sub-passwords. 122-130 - Peide Liu:

Some generalized dependent aggregation operators with intuitionistic linguistic numbers and their application to group decision making. 131-143 - Dániel Marx

:
Completely inapproximable monotone and antimonotone parameterized problems. 144-151 - Yongzhi Cao

, Lirong Xia
, Mingsheng Ying
:
Probabilistic automata for computing with words. 152-172
Volume 79, Number 2, March 2013
- Xiaolong Jin, Ahmed Yassin Al-Dubai

, Laurence Tianruo Yang:
Special issue: Frontiers and advance topics of computer and information technology. 173-174 - John M. Ye, Man Cao, Zening Qu, Tianzhou Chen:

Regional cache organization for NoC based many-core processors. 175-186 - Dingding Li

, Hai Jin, Xiaofei Liao, Yu Zhang, Bing Bing Zhou
:
Improving disk I/O performance in a virtualized system. 187-200 - Gang Chen, Yongwei Wu, Jie Wu, Weimin Zheng:

TopCluster: A hybrid cluster model to support dynamic deployment in Grid. 201-215 - You Li, Kaiyong Zhao, Xiaowen Chu

, Jiming Liu
:
Speeding up k-Means algorithm by GPUs. 216-229 - Ranieri Baraglia, Gabriele Capannini, Patrizio Dazzi

, Giancarlo Pagano:
A multi-criteria job scheduling framework for large computing farms. 230-244 - Lihong Zheng

, Xiangjian He
, Bijan Samali, Laurence Tianruo Yang:
An algorithm for accuracy enhancement of license plate recognition. 245-255 - Jun Ma, Long Zheng, Mianxiong Dong

, Xiangjian He
, Minyi Guo, Yuichi Yaguchi, Ryuichi Oka:
A segmentation-free method for image classification based on pixel-wise matching. 256-268 - Junfeng Xu, Keqiu Li, Geyong Min:

Asymmetric multi-path division communications in underwater acoustic networks with fading channels. 269-278 - Guojun Wang, Fengshun Yue, Qin Liu:

A secure self-destructing scheme for electronic data. 279-290 - Ranieri Baraglia, Patrizio Dazzi

, Matteo Mordacchini
, Laura Ricci
:
A peer-to-peer recommender system for self-emerging user communities based on gossip overlays. 291-308
Volume 79, Number 3, May 2013
- Alfredo Cuzzocrea

:
Theoretical and practical aspects of warehousing, querying and mining sensor and streaming data. 309-311
- Rimma V. Nehme, Karen E. Works, Chuan Lei

, Elke A. Rundensteiner, Elisa Bertino:
Multi-route query processing and optimization. 312-329 - Karen E. Works, Elke A. Rundensteiner, Emmanuel Agu:

Optimizing adaptive multi-route query processing via time-partitioned indices. 330-348 - Georgios Chatzimilioudis, Alfredo Cuzzocrea

, Dimitrios Gunopulos
, Nikos Mamoulis:
A novel distributed framework for optimizing query routing trees in wireless sensor networks via optimal operator placement. 349-368 - Mohamed Medhat Gaber

, Shonali Krishnaswamy, Brett Gillick, Hasnain AlTaiar, Nicholas Nicoloudis, Jonathan Liono, Arkady B. Zaslavsky:
Interactive self-adaptive clutter-aware visualisation for mobile data mining. 369-382 - Lu-An Tang, Xiao Yu, Sangkyum Kim, Quanquan Gu, Jiawei Han, Alice Leung, Thomas La Porta:

Trustworthiness analysis of sensor data in cyber-physical systems. 383-401
Volume 79, Number 4, June 2013
- Hamid Sarbazi-Azad, Nader Bagherzadeh

:
Multicore computing systems: Architecture, programming tools, and applications. 403-405
- Morteza Mohaqeqi, Mehdi Kargahi:

Utility accrual object distribution in MPSoC real-time embedded systems. 406-420 - Chifeng Wang, Wen-Hsiang Hu, Nader Bagherzadeh

:
Scalable load balancing congestion-aware Network-on-Chip router architecture. 421-439 - Amir-Mohammad Rahmani, Pasi Liljeberg, Juha Plosila

, Hannu Tenhunen
:
Developing a power-efficient and low-cost 3D NoC using smart GALS-based vertical channels. 440-456 - Aminollah Mahabadi, S. M. Zahedi, Ahmad Khonsari

:
Reliable energy-aware application mapping and voltage-frequency island partitioning for GALS-based NoC. 457-474 - Masoumeh Ebrahimi, Masoud Daneshtalab

, Pasi Liljeberg, Juha Plosila
, Hannu Tenhunen
:
Cluster-based topologies for 3D Networks-on-Chip using advanced inter-layer bus architecture. 475-491 - Mohammad Arjomand, S. Hamid Amiri, Hamid Sarbazi-Azad:

Efficient genetic based topological mapping using analytical models for on-chip networks. 492-513
Volume 79, Number 5, August 2013
- Guojun Wang, Jianhua Ma, Xiaolin Andy Li, Athanasios V. Vasilakos

:
Special issue of JCSS on UbiSafe computing and communications. 515-517 - Meikang Qiu, Lei Zhang, Zhong Ming, Zhi Chen, Xiao Qin

, Laurence T. Yang:
Security-aware optimization for ubiquitous computing systems with SEAT graph approach. 518-529 - Chaitanya Belwal, Albert M. K. Cheng

, Bo Liu:
Feasibility interval for the transactional event handlers of P-FRP. 530-541 - Xuyun Zhang

, Chang Liu, Surya Nepal
, Jinjun Chen:
An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud. 542-555 - Zheng Yan

, Yu Chen, Yue Shen:
A practical reputation system for pervasive social chatting. 556-572 - Jun Zhang

, Yang Xiang
, Wanlei Zhou
, Yu Wang
:
Unsupervised traffic classification using flow statistical properties and IP packet payload. 573-585 - Sancheng Peng, Guojun Wang, Shui Yu

:
Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones. 586-595 - Xing Su, Minjie Zhang

, Yi Mu, Quan Bai
:
A robust trust model for service-oriented systems. 596-608
- Jianxin Wang, Yongjie Yang

, Jiong Guo, Jianer Chen:
Planar graph vertex partition for linear problem kernels. 609-621 - Dominik D. Freydenberger

, Daniel Reidenbach:
Inferring descriptive generalisations of formal languages. 622-639 - Krishnendu Chatterjee, Luca de Alfaro, Thomas A. Henzinger:

Strategy improvement for concurrent reachability and turn-based stochastic safety games. 640-657 - Hamed M. K. Alazemi, Anton Cerný:

Several extensions of the Parikh matrix L-morphism. 658-668 - Nai-Wen Chang

, Sun-Yuan Hsieh:
{2,3}-Extraconnectivities of hypercube-like networks. 669-688 - Stéphane Demri:

On selective unboundedness of VASS. 689-713 - Olivier Bournez

, Daniel Silva Graça
, Emmanuel Hainry
:
Computation with perturbed dynamical systems. 714-724 - Rohit Khandekar, Guy Kortsarz, Zeev Nutov:

On some network design problems with degree constraints. 725-736
Volume 79, Number 6, September 2013
- Pablo Barceló:

Editor's foreword. 737-738
- Serge Abiteboul, Balder ten Cate, Yannis Katsis:

On the equivalence of distributed systems with queries and communication. 739-762 - Marcelo Arenas, Jorge Pérez, Juan L. Reutter

, Cristian Riveros
:
The language of plain SO-tgds: Composition, inversion and structural properties. 763-784 - Mikolaj Bojanczyk, Leszek Aleksander Kolodziejczyk, Filip Murlak

:
Solutions in XML data exchange. 785-815 - Diego Calvanese

, Giuseppe De Giacomo, Maurizio Lenzerini
, Moshe Y. Vardi:
On simplification of schema mappings. 816-834 - Evgeny Kharlamov, Dmitriy Zheleznyakov, Diego Calvanese

:
Capturing model-based ontology evolution at the instance level: The case of DL-Lite. 835-872 - Ting Deng

, Wenfei Fan
, Leonid Libkin
, Yinghui Wu:
On the aggregation problem for synthesized Web services. 873-891 - Dominik D. Freydenberger

, Nicole Schweikardt:
Expressiveness and static analysis of extended conjunctive regular path queries. 892-909 - Wouter Gelade, Tomasz Idziaszek, Wim Martens, Frank Neven

, Jan Paredaens:
Simplifying XML Schema: Single-type approximations of regular tree languages. 910-936 - Michael Meier

, Michael Schmidt, Fang Wei, Georg Lausen:
Semantic query optimization in the presence of types. 937-957 - Dany Maslowski, Jef Wijsen

:
A dichotomy in the complexity of counting database repairs. 958-983 - Reinhard Pichler, Sebastian Skritek

:
Tractable counting of the answers to conjunctive queries. 984-1001
Volume 79, Number 7, November 2013
- Tomoya Enokido, Leonard Barolli, Makoto Takizawa

:
Special issue on intelligent and innovative information systems. 1003-1004 - Joseph Kee-Yin Ng

, Kam-yiu Lam
, Quan Jia Cheng, Kevin Chin Yiu Shum:
An effective signal strength-based wireless location estimation system for tracking indoor mobile users. 1005-1016 - David Taniar

, J. Wenny Rahayu:
A taxonomy for nearest neighbour queries in spatial databases. 1017-1039 - Anhar Fazal, Farookh Khadeer Hussain, Tharam S. Dillon:

An innovative approach for automatically grading spelling in essays using rubric-based scoring. 1040-1056 - Rubén Casado, Muhammad Younas, Javier Tuya

:
Multi-dimensional criteria for testing web services transactions. 1057-1076 - Minoru Uehara:

Advanced orthogonal RAID based on virtual disks. 1077-1085 - Fatos Xhafa

, Xavier Herrero, Admir Barolli, Leonard Barolli, Makoto Takizawa
:
Evaluation of struggle strategy in Genetic Algorithms for ground stations scheduling problem. 1086-1100 - Akio Koyama, Hiroyuki Suzuki:

Real object-oriented communication method for ad hoc networks. 1101-1112 - Nils Müllner, Oliver E. Theel, Martin Fränzle

:
Combining decomposition and reduction for state space analysis of a self-stabilizing system. 1113-1125
- Mark McCann, Nicholas Pippenger:

Fault tolerance in cellular automata at low fault rates. 1126-1143 - Lavinia Egidi

, Giovanni Manzini
:
Better spaced seeds using Quadratic Residues. 1144-1155 - Uéverton dos Santos Souza

, Fábio Protti
, Maise Dantas da Silva:
Revisiting the complexity of and/or graph solution. 1156-1163 - Dariusz R. Kowalski, Andrzej Pelc:

Leader election in ad hoc radio networks: A keen ear helps. 1164-1180 - Yuan Feng

, Nengkun Yu
, Mingsheng Ying
:
Model checking quantum Markov chains. 1181-1198
Volume 79, Number 8, December 2013
- Yanming Shen, Keqiu Li, Weisong Shi:

Advanced topics on cloud computing. 1199 - Wei Wu, Jianying Zhou

, Yang Xiang
, Li Xu:
How to achieve non-repudiation of origin with privacy protection in cloud computing. 1200-1213 - Xuanhua Shi, Hongbo Jiang, Ligang He, Hai Jin, Chonggang Wang, Bo Yu, Xueguang Chen:

Developing an optimized application hosting framework in Clouds. 1214-1229 - Yongqiang Gao, Haibing Guan, Zhengwei Qi, Yang Hou, Liang Liu:

A multi-objective ant colony system algorithm for virtual machine placement in cloud computing. 1230-1242 - Waseem Ahmed, Yong Wei Wu:

A survey on reliability in distributed systems. 1243-1255 - Xingfu Wu

, Valerie E. Taylor:
Performance modeling of hybrid MPI/OpenMP scientific applications on large-scale multicore supercomputers. 1256-1268
- Iain A. Stewart

:
Multiswapped networks and their topological and algorithmic properties. 1269-1286 - Zoltán Ádám Mann, Aniko Szajko:

Average-case complexity of backtrack search for coloring sparse random graphs. 1287-1301 - Michael Benedikt

, Gabriele Puppis
, Cristian Riveros
:
Bounded repairability of word languages. 1302-1321 - Krishnaram Kenthapadi, Nina Mishra, Kobbi Nissim

:
Denials leak information: Simulatable auditing. 1322-1340 - Miguel Caballer

, Carlos de Alfonso
, Fernando Alvarruiz
, Germán Moltó
:
EC3: Elastic Cloud Computing Cluster. 1341-1351

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














