default search action
Journal of Computer and System Sciences, Volume 81
Volume 81, Number 1, February 2015
- Jia Hu, Seetharami Seelam, Laurent Lefèvre:
Introduction to special issue on High Performance Computing Architectures and Systems. 1-2 - Xiaofei Liao, Hai Jin, Shizhan Yu, Yu Zhang:
A novel memory allocation scheme for memory energy reduction in virtualization environment. 3-15 - Hervé Paulino, Eduardo Marques:
Heterogeneous programming with Single Operation Multiple Data. 16-37 - Seren Soner, Can C. Özturan:
Integer programming based heterogeneous CPU-GPU cluster schedulers for SLURM resource manager. 38-56 - Jianliang Ma, Licheng Yu, John M. Ye, Tianzhou Chen:
MCMG simulator: A unified simulation framework for CPU and graphic GPU. 57-71 - Imen Chakroun, Nouredine Melab:
Towards a heterogeneous and adaptive parallel Branch-and-Bound algorithm. 72-84 - Hussain Al-Aqrabi, Lu Liu, Richard Hill, Nick Antonopoulos:
Cloud BI: Future of business intelligence in the Cloud. 85-96 - Mustafa Bani Khalaf, Ahmed Yassin Al-Dubai, Geyong Min:
New efficient velocity-aware probabilistic route discovery schemes for high mobility Ad hoc networks. 97-109 - Jianjiang Wang, Xiaomin Zhu, Laurence T. Yang, Jianghan Zhu, Manhao Ma:
Towards dynamic real-time scheduling for multiple earth observation satellites. 110-124 - Minghui Zheng, Yang Xiang, Hui-Hua Zhou:
A strong provably secure IBE scheme without bilinear map. 125-131 - Wei Li, Demetres D. Kouvatsos, Rod J. Fretwell:
Towards time domain invariant QoS measures for queues with correlated traffic. 132-144 - Yuwei Xu, Jeremiah D. Deng, Mariusz Nowostawski, Martin K. Purvis:
Optimized routing for video streaming in multi-hop wireless networks using analytical capacity estimation. 145-157
- Petra Berenbrink, Colin Cooper, Tom Friedetzky, Tobias Friedrich, Thomas Sauerwald:
Randomized diffusion for indivisible loads. 159-185 - Eun Jung Kim, Christophe Paul, Geevarghese Philip:
A single-exponential FPT algorithm for the K4-minor cover problem. 186-207 - Yanhui Zhai, Deyu Li, Kaishe Qu:
Decision implication canonical basis: a logical perspective. 208-218 - Andrea Clementi, Riccardo Silvestri:
Parsimonious flooding in geometric random-walks. 219-233 - Evangelos Bampas, Davide Bilò, Guido Drovandi, Luciano Gualà, Ralf Klasing, Guido Proietti:
Network verification via routing table queries. 234-248 - Juha Kortelainen:
On simple generators of recursively enumerable languages. 249-257 - Christel Baier, Marcus Daum, Benjamin Engel, Hermann Härtig, Joachim Klein, Sascha Klüppelholz, Steffen Märcker, Hendrik Tews, Marcus Völp:
Locks: Picking key methods for a scalable quantitative analysis. 258-287 - Tomás Brázdil, Stefan Kiefer, Antonín Kucera, Ivana Hutarová Vareková:
Runtime analysis of probabilistic programs with unbounded recursion. 288-310 - Xi Chen, Martin E. Dyer, Leslie Ann Goldberg, Mark Jerrum, Pinyan Lu, Colin McQuillan, David Richerby:
The complexity of approximating conservative counting CSPs. 311-329 - Leslie Ann Goldberg, Mark Jerrum, Colin McQuillan:
Approximating the partition function of planar two-state spin systems. 330-358
Volume 81, Number 2, March 2015
- Daowen Qiu, Lvzhou Li, Paulo Mateus, Amílcar Sernadas:
Exponentially more concise quantum recognition of non-RMM regular languages. 359-375 - Xuechong Guan:
Two Cartesian closed categories of information algebras. 376-382 - Alberto Lafuente, Mikel Larrea, Iratxe Soraluze Arriola, Roberto Cortiñas:
Communication-optimal eventually perfect failure detection in partially synchronous systems. 383-397 - Minati De, Subhas C. Nandy, Sasanka Roy:
Prune-and-search with limited workspace. 398-414 - Ilkka Törmä:
A uniquely ergodic cellular automaton. 415-442 - Simone Bova, Hubie Chen:
The complexity of equivalence, entailment, and minimization in existential positive logic. 443-457 - Rafael Trapani Possignolo, Cíntia Borges Margi, Paulo S. L. M. Barreto:
Quantum-assisted QD-CFS signatures. 458-467 - Juha Honkala:
Products of matrices and recursively enumerable sets. 468-472 - Petr Sosík, Ludek Cienciala:
A limitation of cell division in tissue P systems by PSPACE. 473-484
Volume 81, Number 3, May 2015
- Quan Z. Sheng, Elhadi M. Shakshuki:
Ambient and context-aware services. 485-486 - Nabil Sahli, Nafaâ Jabeur, Mohamad Badra:
Agent-based framework for sensor-to-sensor personalization. 487-495 - Mohamed Amine Abid, Abdelfettah Belghith, Khalil Drira:
SARP: A dynamically readjustable period size proactive routing protocol for MANETs. 496-515 - Tayseer Alkhdour, Elhadi M. Shakshuki, Uthman A. Baroudi, Shokri Z. Selim:
A cross layer optimization modeling for a periodic WSN application. 516-532 - Jian Yu, Quan Z. Sheng, Joshua K. Y. Swee, Jun Han, Chengfei Liu, Talal H. Noor:
Model-driven development of adaptive web service processes with aspects and rules. 533-552 - Tyler J. Gunn, John Anderson:
Dynamic heterogeneous team formation for robotic urban search and rescue. 553-567 - Luk Knapen, Irith Ben-Arroyo Hartman, Daniel Keren, Ansar-Ul-Haque Yasar, Sungjin Cho, Tom Bellemans, Davy Janssens, Geert Wets:
Scalability issues in optimal assignment for carpooling. 568-584 - Yoann Lebrun, Emmanuel Adam, René Mandiau, Christophe Kolski:
A model for managing interactions between tangible and virtual agents on an RFID interactive tabletop: Case study in traffic simulation. 585-598 - Liang Huai Yang, Yanzhu Zhao, Yulei Fan, Yihua Zhu, Jian Yu:
Peak power modeling for join algorithms in DBMS. 599-614
Volume 81, Number 4, June 2015
- Qi Shi, Ning Zhang, Madjid Merabti:
Fair signature exchange via delegation on ubiquitous networks. 615-631 - Gábor Erdélyi, Michael R. Fellows, Jörg Rothe, Lena Schend:
Control complexity in Bucklin and fallback voting: A theoretical analysis. 632-660 - Gábor Erdélyi, Michael R. Fellows, Jörg Rothe, Lena Schend:
Control complexity in Bucklin and fallback voting: An experimental analysis. 661-670 - Eric J. Schwabe, Ian M. Sutherland:
Optimizing large data transfers in parity-declustered data layouts. 671-691 - Noga Alon, Hagit Attiya, Shlomi Dolev, Swan Dubois, Maria Potop-Butucaru, Sébastien Tixeuil:
Practically stabilizing SWMR atomic memory in message-passing systems. 692-701 - Mark Jerrum, Kitty Meeks:
The parameterised complexity of counting connected subgraphs and graph motifs. 702-716 - Xun Zhou, Jing He, Guangyan Huang, Yanchun Zhang:
SVD-based incremental approaches for recommender systems. 717-733 - Lijuan Wang, Jun Shen, Junzhou Luo:
Facilitating an ant colony algorithm for multi-objective data-intensive service provision. 734-746 - Henning Fernau, Pinar Heggernes, Yngve Villanger:
A multi-parameter analysis of hard problems on deterministic finite automata. 747-765 - Robert Bredereck, Jiehua Chen, Sepp Hartung, Christian Komusiewicz, Rolf Niedermeier, Ondrej Suchý:
On explaining integer vectors by few homogeneous segments. 766-782 - Jianghua Zhong, Dongdai Lin:
A new linearization method for nonlinear feedback shift registers. 783-796
Volume 81, Number 5, August 2015
- Dirk Pattinson, Lutz Schröder:
From the Editors. 797-798 - Samson Abramsky, Jonathan A. Zvesper:
From Lawvere to Brandenburger-Keisler: Interactive forms of diagonalization and self-reference. 799-812 - Jirí Adámek, Stefan Milius, Lawrence S. Moss, Henning Urbat:
On finitary functors and their presentations. 813-833 - Giorgio Bacci, Marino Miculan:
Structural operational semantics for continuous state stochastic transition systems. 834-858 - Bart Jacobs, Alexandra Silva, Ana Sokolova:
Trace semantics via determinization. 859-879 - Johannes Marti, Yde Venema:
Lax extensions of coalgebra functors and their logic. 880-900 - Pawel Sobocinski:
Relational presheaves, change of base and weak simulation. 901-910 - Joost Winter, Marcello M. Bonsangue, Jan J. M. M. Rutten:
Context-free coalgebras. 911-939
Volume 81, Number 6, September 2015
- Anne E. James:
Optimisation, security, privacy and trust in e-business systems. 941-942
- Goodhead Tomvie Abraham, Anne E. James, Norlaily Yaacob:
Priority-grouping method for parallel multi-scheduling in Grid. 943-957 - Ahmad A. Al-Daraiseh, Eyas El-Qawasmeh, Nazaraf Shah:
Multi-agent system for energy consumption optimisation in higher education institutions. 958-965 - Chen-Fang Tsai:
Dynamic grey platform for efficient forecasting management. 966-980
- Waleed Bul'ajoul, Anne E. James, Mandeep Pannu:
Improving network intrusion detection system performance through quality of service configuration and parallel technology. 981-999 - Fran Casino, Josep Domingo-Ferrer, Constantinos Patsakis, Domenec Puig, Agusti Solanas:
A k-anonymous approach to privacy preserving collaborative filtering. 1000-1011 - Ping Wang, Yu-Shih Wang:
Malware behavioural detection and vaccine development by using a support vector model classifier. 1012-1026 - Shan Chang, Li Lu, Xiaoqiang Liu, Hui Song, Qingsong Yao:
Vulnerability aware graphs for RFID protocol security benchmarking. 1027-1041 - Neeraj Kumar, Rahat Iqbal, Sudip Misra, Joel J. P. C. Rodrigues:
An intelligent approach for building a secure decentralized public key infrastructure in VANET. 1042-1058
Volume 81, Number 7, November 2015
- Javier Ignacio Almarza, Santiago Figueira:
Normality in non-integer bases and polynomial time randomness. 1059-1087
- John Augustine, Gopal Pandurangan, Peter Robinson, Eli Upfal:
Distributed agreement in dynamic peer-to-peer networks. 1088-1109 - Qusai Shambour, Jie Lu:
An effective recommender system by unifying user and item trust information for B2B applications. 1110-1126 - David A. Cohen, Martin C. Cooper, Guillaume Escamocher, Stanislav Zivný:
Variable and value elimination in binary constraint satisfaction via forbidden patterns. 1127-1143 - Lvzhou Li, Yuan Feng:
On hybrid models of quantum finite automata. 1144-1158 - Jhih-Hong Ye, Biing-Feng Wang:
On the minmax regret path median problem on trees. 1159-1170 - John Fearnley, Doron A. Peled, Sven Schewe:
Synthesis of succinct systems. 1171-1193 - Susanne Albers, Antonios Antoniadis, Gero Greiner:
On multi-processor speed scaling with migration. 1194-1209 - Cristina G. Fernandes, Maya Jakobine Stein:
Geodesic stability for memoryless binary long-lived consensus. 1210-1220 - Atle Refsdal, Ragnhild Kobro Runde, Ketil Stølen:
Stepwise refinement of sequence diagrams with soft real-time constraints. 1221-1251 - Sylvain Salvati:
MIX is a 2-MCFL and the word problem in Z2 is captured by the IO and the OI hierarchies. 1252-1277 - Leonid Libkin, Tony Tan, Domagoj Vrgoc:
Regular expressions for data words. 1278-1297 - Florin Manea, Mike Müller, Dirk Nowotka:
Cubic patterns with permutations. 1298-1310 - Christer Bäckström, Peter Jonsson, Sebastian Ordyniak, Stefan Szeider:
A complete parameterized complexity analysis of bounded planning. 1311-1332 - Pierluigi Crescenzi, Daniel Gildea, Andrea Marino, Gianluca Rossi, Giorgio Satta:
Synchronous context-free grammars and optimal linear parsing strategies. 1333-1356 - Gábor Ivanyos, Marek Karpinski, Youming Qiao, Miklos Santha:
Generalized Wong sequences and their applications to Edmonds' problems. 1373-1386 - George Barmpalias, Rodney G. Downey, Michael McInerney:
Integer valued betting strategies and Turing degrees. 1387-1412
- Tianrong Lin:
Corrigendum to "Another approach to the equivalence of measure-many one-way quantum infinite automata and its application" [J. Comput. Syst. Sci. 78(3) (2012) 807-821]. 1413
Volume 81, Number 8, December 2015
- Tomoya Enokido, Leonard Barolli, Makoto Takizawa:
Journal of Computer and System Sciences Special Issue on Reliability and Optimization for Wireless Networking and Cloud Computing. 1415-1416 - Fatos Xhafa, Christian Sánchez, Admir Barolli, Makoto Takizawa:
Solving mesh router nodes placement problem in Wireless Mesh Networks by Tabu Search algorithm. 1417-1428 - Marcelo Luiz Brocardo, Issa Traoré, Isaac Woungang:
Authorship verification of e-mail and tweet messages applied for continuous authentication. 1429-1440 - Shigenari Nakamura, Dilawaer Duolikun, Makoto Takizawa:
Read-abortion (RA) based synchronization protocols to prevent illegal information flow. 1441-1451 - José Luis Hernández Ramos, María Victoria Moreno Cano, Jorge Bernal Bernabé, Dan García-Carrillo, Antonio F. Skarmeta:
SAFIR: Secure access framework for IoT-enabled services on smart buildings. 1452-1463 - Arcangelo Castiglione, Francesco Palmieri, Ugo Fiore, Aniello Castiglione, Alfredo De Santis:
Modeling energy-efficient secure communications in multi-mode wireless mobile devices. 1464-1478 - Amin M. Khan, Ümit Cavus Büyüksahin, Felix Freitag:
Incentive-based resource assignment and regulation for collaborative cloud services in community networks. 1479-1495 - Admir Barolli, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa, Vincenzo Loia:
Node placement for wireless mesh networks: Analysis of WMN-GA system simulation results for different parameters and distributions. 1496-1507 - David Taniar, J. Wenny Rahayu:
A taxonomy for region queries in spatial databases. 1508-1531 - Jin Li, Xiaofeng Chen, Fatos Xhafa, Leonard Barolli:
Secure deduplication storage systems supporting keyword search. 1532-1541
- Ricardo Garibay-Martínez, Geoffrey Nelissen, Luis Lino Ferreira, Luís Miguel Pinho:
Task partitioning and priority assignment for distributed hard real-time systems. 1542-1555 - Laurent Bulteau, Guillaume Fertin, Irena Rusu:
Pancake Flipping is hard. 1556-1574 - Laurent Bienvenu, Rodney G. Downey, André Nies, Wolfgang Merkle:
Solovay functions and their applications in algorithmic randomness. 1575-1591 - Verónica Becher, Olivier Carton, Pablo Ariel Heiber:
Normality and automata. 1592-1613 - Gábor Horváth, Chrystopher L. Nehaniv:
Length of polynomials over finite groups. 1614-1622 - Laurent Boyer, Martin Delacourt, Victor Poupet, Mathieu Sablik, Guillaume Theyssier:
μ-Limit sets of cellular automata from a computational complexity perspective. 1623-1647 - Emmanuel Jeandel, Pascal Vanier:
Hardness of conjugacy, embedding and factorization of multidimensional subshifts. 1648-1664 - Marek Karpinski, Michael Lampis, Richard Schmied:
New inapproximability bounds for TSP. 1665-1677 - Radim Belohlávek, Martin Trnecka:
From-below approximations in Boolean matrix factorization: Geometry and new algorithm. 1678-1697 - Steven Fortune:
Equivalence and generalization in a layered network model. 1698-1714 - Dariusz Dereniowski, Wieslaw Kubiak, Yori Zwols:
The complexity of minimum-length path decompositions. 1715-1747
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.