Table of contents for issues of The Computer Journal

Last update: Sat Oct 22 11:24:43 MDT 2022                Valid HTML 3.2!

Volume 52, Number 1, January, 2009
Volume 53, Number 1, January, 2010
Volume 53, Number 2, February, 2010
Volume 53, Number 3, March, 2010
Volume 53, Number 4, May, 2010
Volume 53, Number 5, June, 2010
Volume 53, Number 6, July, 2010
Volume 53, Number 7, September, 2010
Volume 53, Number 8, October, 2010
Volume 53, Number 9, November, 2010
Volume 53, Number 10, December, 2010
Volume 54, Number 1, January, 2011
Volume 54, Number 2, February, 2011
Volume 54, Number 3, March, 2011
Volume 54, Number 4, April, 2011
Volume 54, Number 5, May, 2011
Volume 54, Number 6, June, 2011
Volume 54, Number 7, July, 2011
Volume 54, Number 8, August, 2011
Volume 54, Number 9, September, 2011
Volume 54, Number 10, October, 2011
Volume 54, Number 11, November, 2011
Volume 54, Number 12, November, 2011
Volume 55, Number 1, January, 2012
Volume 55, Number 2, February, 2012
Volume 55, Number 3, March, 2012
Volume 55, Number 4, April, 2012
Volume 55, Number 5, May, 2012
Volume 55, Number 6, June, 2012
Volume 55, Number 7, July, 2012
Volume 55, Number 8, August, 2012
Volume 55, Number 9, September, 2012
Volume 55, Number 10, October, 2012
Volume 55, Number 11, November, 2012
Volume 55, Number 12, December, 2012
Volume 56, Number 1, January, 2013
Volume 56, Number 2, February, 2013
Volume 56, Number 3, March, 2013
Volume 56, Number 4, April, 2013
Volume 56, Number 5, May, 2013
Volume 56, Number 6, June, 2013
Volume 56, Number 7, July, 2013
Volume 56, Number 8, August, 2013
Volume 56, Number 9, September, 2013
Volume 56, Number 10, October, 2013
Volume 56, Number 11, November, 2013
Volume 56, Number 12, December, 2013
Volume 57, Number 1, January, 2014
Volume 57, Number 2, February, 2014
Volume 57, Number 3, March, 2014
Volume 57, Number 4, April, 2014
Volume 57, Number 5, May, 2014
Volume 57, Number 6, June, 2014
Volume 57, Number 7, July, 2014
Volume 57, Number 8, August, 2014
Volume 57, Number 9, September, 2014
Volume 57, Number 10, October, 2014
Volume 57, Number 11, November, 2014
Volume 57, Number 12, December, 2014
Volume 58, Number 1, January, 2015
Volume 58, Number 2, February, 2015
Volume 58, Number 3, March, 2015
Volume 58, Number 4, April, 2015
Volume 58, Number 5, May, 2015
Volume 58, Number 6, June, 2015
Volume 58, Number 7, July, 2015
Volume 58, Number 8, August, 2015
Volume 58, Number 9, September, 2015
Volume 58, Number 10, October, 2015
Volume 58, Number 11, November, 2015
Volume 58, Number 12, December, 2015
Volume 59, Number 1, January, 2016
Volume 59, Number 2, February, 2016
Volume 59, Number 3, March, 2016
Volume 59, Number 4, April, 2016
Volume 59, Number 5, May, 2016
Volume 59, Number 6, June, 2016
Volume 59, Number 7, July, 2016
Volume 59, Number 8, August, 2016
Volume 59, Number 9, September, 2016
Volume 59, Number 10, October, 2016
Volume 59, Number 11, November, 2016
Volume 59, Number 12, December, 2016
Volume 60, Number 1, January, 2017
Volume 60, Number 2, February, 2017
Volume 60, Number 3, March, 2017
Volume 60, Number 4, March 23, 2017
Volume 60, Number 5, April 1, 2017
Volume 60, Number 6, June 1, 2017
Volume 60, Number 7, July 1, 2017
Volume 60, Number 8, August 1, 2017
Volume 60, Number 9, September 1, 2017
Volume 60, Number 10, October 1, 2017
Volume 60, Number 11, November 1, 2017
Volume 60, Number 12, December 1, 2017
Volume 61, Number 1, January 1, 2018
Volume 61, Number 2, February 1, 2018
Volume 61, Number 3, March 1, 2018
Volume 61, Number 4, April 1, 2018
Volume 61, Number 5, May 1, 2018
Volume 61, Number 6, June 1, 2018
Volume 61, Number 7, July 1, 2018
Volume 61, Number 8, August 1, 2018
Volume 61, Number 9, September 1, 2018
Volume 61, Number 10, October 1, 2018
Volume 61, Number 11, November 1, 2018
Volume 61, Number 12, December 1, 2018
Volume 62, Number 1, January 1, 2019
Volume 62, Number 2, February 1, 2019
Volume 62, Number 3, March 1, 2019
Volume 62, Number 4, April, 2019
Volume 62, Number 5, May, 2019
Volume 62, Number 6, June, 2019
Volume 62, Number 7, July, 2019
Volume 62, Number 8, August, 2019
Volume 62, Number 9, September, 2019
Volume 62, Number 10, October, 2019
Volume 62, Number 11, November, 2019
Volume 62, Number 12, December, 2019
Volume 65, Number 7, July, 2022
Volume 65, Number 10, October, 2022


The Computer Journal
Volume 52, Number 1, January, 2009

               Michael Elad and   
                Dmitry Datsenko   Example-Based Regularization Deployed to
                                  Super-Resolution Reconstruction of a
                                  Single Image . . . . . . . . . . . . . . 15--30


The Computer Journal
Volume 53, Number 1, January, 2010

                   Erol Gelenbe   Editorial  . . . . . . . . . . . . . . . 1--2
                    Yongzhi Cao   A Hierarchy of Behavioral Equivalences
                                  in the $\pi$-calculus with Noisy
                                  Channels . . . . . . . . . . . . . . . . 3--20
              Xiaowei Huang and   
                    Li Jiao and   
                     Weiming Lu   Congruence Formats for Weak Readiness
                                  Equivalence and Weak Possible Future
                                  Equivalence  . . . . . . . . . . . . . . 21--36
                Xuejun Yang and   
                    Ji Wang and   
                    Xiaodong Yi   Slicing Execution with Partial Weakest
                                  Precondition for Model Abstraction of C
                                  Programs . . . . . . . . . . . . . . . . 37--49
             Daniel Cutting and   
              Aaron Quigley and   
           Björn Landfeldt   Special Interest Messaging: a Comparison
                                  of IGM Approaches  . . . . . . . . . . . 50--68
       Patrick Erik Bradley and   
                   Norbert Paul   Using the Relational Model to Capture
                                  Topological Information of Spaces  . . . 69--89
    Wil M. P. van der Aalst and   
              Niels Lohmann and   
             Peter Massuthe and   
            Christian Stahl and   
                   Karsten Wolf   Multiparty Contracts: Agreeing and
                                  Implementing Interorganizational
                                  Processes  . . . . . . . . . . . . . . . 90--106
                   Feng Liu and   
                ChuanKun Wu and   
                      XiJun Lin   Some Extensions on Threshold Visual
                                  Cryptography Schemes . . . . . . . . . . 107--119
            A. S. M. Sajeev and   
            Sakgasit Ramingwong   Mum Effect as an Offshore Outsourcing
                                  Risk: a Study of Differences in
                                  Perceptions  . . . . . . . . . . . . . . 120--126
               Ricardo Jasinski   Book Review: Jari Nurmi,
                                  \booktitleProcessor Design ---
                                  System-on-Chip Computing for ASICs and
                                  FPGAs. Springer (2007). ISBN-13
                                  978-1-4020-5529-4. 525 pp. Hardcover . . 127

The Computer Journal
Volume 53, Number 2, February, 2010

                      Bo Hu and   
                     Bin Hu and   
           Victor Callaghan and   
                    Zongkai Lin   Combining Theory and Systems Building in
                                  Pervasive Computing  . . . . . . . . . . 129--130
                Junzhou Luo and   
               Weining Kong and   
                       Liang Ge   Implementation of Learning Path in
                                  Process Control Model  . . . . . . . . . 131--141
      F. Rivera-illingworth and   
               V. Callaghan and   
                      H. Hagras   Detection of Normal and Novel Behaviours
                                  in Ubiquitous Domestic Environments  . . 142--151
              Baopeng Zhang and   
               Yuanchun Shi and   
                       Xin Xiao   A Policy-Driven Service Composition
                                  Method for Adaptation in Pervasive
                                  Computing Environment  . . . . . . . . . 152--165
                Zheng-Yu Wu and   
                   Han-Tao Song   Ant-based Energy-aware Disjoint
                                  Multipath Routing Algorithm for MANETs   166--176
                Jinjiao Lin and   
            Chengxiang Song and   
                   Haiyang Wang   A Rule-based Method for Improving
                                  Adaptability in Pervasive Systems  . . . 177--190
               Philip Moore and   
                     Bin Hu and   
                    Jizheng Wan   Smart-Context: a Context Ontology for
                                  Pervasive Mobile Computing . . . . . . . 191--207
                  Kumaara Velan   Modelling Bidders in Sequential
                                  Automated Auctions . . . . . . . . . . . 208--218
                    Zhao Wu and   
               Naixue Xiong and   
             Jong Hyuk Park and   
               Tai-Hoon Kim and   
                       Lei Yuan   A Simulation Model Supporting Time and
                                  Non-time Metrics for Web Service
                                  Composition  . . . . . . . . . . . . . . 219--233
               Mouna Allani and   
        Beno\^\it Garbinato and   
                Fernando Pedone   Resource-Aware Multimedia Content
                                  Delivery: a Gambling Approach  . . . . . 234--248

The Computer Journal
Volume 53, Number 3, March, 2010

            Taskin Koçak   Two Decades of Random Neural Networks    249--250
              Stelios Timotheou   The Random Neural Network: a Survey  . . 251--267
              Georgia Sakellari   The Cognitive Packet Network: a Survey   268--279
                    Jian Wu and   
                   Steve Furber   A Multicast Routing Scheme for a
                                  Universal Spiking Neural Network
                                  Architecture . . . . . . . . . . . . . . 280--288
        Mustafa Badaro\uglu and   
                Ugur Halici and   
                 Isik Aybay and   
                  Cuneyt Cerkez   A Cascadable Random Neural Network Chip
                                  with Reconfigurable Topology . . . . . . 289--303
                  Fionn Murtagh   The Correspondence Analysis Platform for
                                  Uncovering Deep Structure in Data and
                                  Information  . . . . . . . . . . . . . . 304--315
         Ching-man Au Yeung and   
                  Ho-Fung Leung   A Formal Model of Ontology for Handling
                                  Fuzzy Membership and Typicality of
                                  Instances  . . . . . . . . . . . . . . . 316--341
              Ajoy K. Datta and   
        Lawrence L. Larmore and   
                Priyanka Vemula   A Self-Stabilizing $O(k)$-Time
                                  $k$-Clustering Algorithm . . . . . . . . 342--350
                Chih-Yu Lin and   
              Yu-Chee Tseng and   
                  Yung-Chih Liu   Imprecision-Tolerant Location Management
                                  for Object-Tracking Wireless Sensor
                                  Network  . . . . . . . . . . . . . . . . 351--364

The Computer Journal
Volume 53, Number 4, May, 2010

                 Marcus Nilsson   Computational Aspects of Monomial
                                  Dynamical Systems  . . . . . . . . . . . 365--369
               Vladimir Anashin   Non-Archimedean Ergodic Theory and
                                  Pseudorandom Generators  . . . . . . . . 370--392
           Patrick Erik Bradley   Mumford Dendrograms  . . . . . . . . . . 393--404
                  Fionn Murtagh   On Ultrametric Algorithmic Information   405--416
        Jenny Benois-Pineau and   
              Andrei Khrennikov   Significance Delta Reasoning with
                                  $p$-Adic Neural Networks: Application to
                                  Shot Change Detection in Video . . . . . 417--431
           Branko Dragovich and   
            Alexandra Dragovich   $p$-Adic Modelling of the Genome and the
                                  Genetic Code . . . . . . . . . . . . . . 432--442
         Anthony Karel Seda and   
                 Pascal Hitzler   Generalized Distance Functions in the
                                  Theory of Computation  . . . . . . . . . 443--464
           Behzad Akbarpour and   
         Amr T. Abdel-Hamid and   
            Sofi\`ene Tahar and   
                  John Harrison   Verifying a Synthesized Implementation
                                  of IEEE-754 Floating-Point Exponential
                                  Function using HOL . . . . . . . . . . . 465--488
                    Mark Levene   Book Review: Rokach Lior and Maimon
                                  Oded, \booktitleData Mining with
                                  Decision Trees: Theory and Applications.
                                  World Scientific (2008). ISBN-13
                                  978-981-277-171-1. 244 pp. Hardcover . . 489
                     Boran Gazi   Book Review: Krzysztof J. Cios, Witold
                                  Pedrycz, Roman W. Swiniarski and Lukasz
                                  A. Kurgan, \booktitleData Mining: A
                                  Knowledge Discovery Approach. Springer
                                  (2007). ISBN-13 978-0-387-33333-5.
                                  \pounds 55.99. 606 pp. Hardcover . . . . 489--490

The Computer Journal
Volume 53, Number 5, June, 2010

                      Anonymous   Introduction to the Special Issue on
                                  Advances in Sensing, Information
                                  Processing and Decision Making for
                                  Coalition Operations within the US/UK
                                  International Technology Alliance  . . . 491--492
             Duncan Gillies and   
             David Thornley and   
            Chatschik Bisdikian   Probabilistic Approaches to Estimating
                                  the Quality of Information in Military
                                  Sensor Networks  . . . . . . . . . . . . 493--502
            Gita Sukthankar and   
                   Katia Sycara   Analyzing Team Decision-Making in
                                  Tactical Scenarios . . . . . . . . . . . 503--512
                   Lei Chen and   
                Zijian Wang and   
         Boleslaw Szymanski and   
             Joel W. Branch and   
               Dinesh Verma and   
               Raju Damarla and   
                  John Ibbotson   Dynamic Service Execution in Sensor
                                  Networks . . . . . . . . . . . . . . . . 513--527
               Katia Sycara and   
          Timothy J. Norman and   
         Joseph A. Giampapa and   
      Martin J. Kollingbaum and   
              Chris Burnett and   
             Daniele Masato and   
             Mairi McCallum and   
               Michael H. Strub   Agent Support for Policy-Driven
                                  Collaborative Mission Planning . . . . . 528--540
               Dinesh Verma and   
                Bong Jun Ko and   
              Petros Zerfos and   
               Kang-won Lee and   
                    Ting He and   
             Matthew Duggan and   
           Kristian Stewart and   
            Ananthram Swami and   
                Nikoletta Sofra   Understanding the Quality of Monitoring
                                  for Network Management . . . . . . . . . 541--550
            Zhongqiang Chen and   
                 Yuan Zhang and   
                 Zhongrong Chen   A Categorization Framework for Common
                                  Computer Vulnerabilities and Exposures   551--580
                 H. Rahaman and   
                  J. Mathew and   
                  D. K. Pradhan   Secure Testable S-box Architecture for
                                  Cryptographic Hardware Implementation    581--591
   François Baccelli and   
    Bartlomiej Blaszczyszyn and   
          Paul Mühlethaler   Time--Space Opportunistic Routing in
                                  Wireless Ad hoc Networks: Algorithms and
                                  Performance Optimization by Stochastic
                                  Geometry . . . . . . . . . . . . . . . . 592--609
              Mathew D. Penrose   Discussant of Response to the
                                  \booktitleComputer Journal Lecture by
                                  François Baccelli . . . . . . . . . . . . 610--611
          Takis Konstantopoulos   Response to Prof. Baccelli's lecture on
                                  Modelling of Wireless Communication
                                  Networks by Stochastic Geometry  . . . . 612--614
                 Rupak Majumdar   Book Review: Paul Ammann and Jeff
                                  Offutt, \booktitleIntroduction to
                                  Software Testing. Cambridge University
                                  Press (2008). ISBN-13 978-0-521-88038-1.
                                  \pounds 32.99. 322 pp. Hardcover . . . . 615
    François Laroussinie   Book Review: Christel Baier and
                                  Joost-Pieter Katoen,
                                  \booktitlePrinciples of Model Checking.
                                  MIT Press (May 2008). ISBN-13
                                  978-0-262-02649-9. \pounds 44.95. 975
                                  pp. Hardcover  . . . . . . . . . . . . . 615--616
                Neil F. Johnson   Book Review: Frank Y. Shih,
                                  \booktitleDigital Watermarking and
                                  Steganography: Fundamentals and
                                  Techniques. CRC/Taylor & Francis (2008).
                                  ISBN-13 978-1-4200-4757-8. \pounds
                                  46.99. 180 pp. Hardcover . . . . . . . . 616--617

The Computer Journal
Volume 53, Number 6, July, 2010

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 619--622
           Chien-Liang Chen and   
              Shao-Chi Chin and   
                   Hsu-Chun Yen   Reachability Analysis of Augmented
                                  Marked Graphs via Integer Linear
                                  Programming  . . . . . . . . . . . . . . 623--633
                    Yu-Chen Kuo   General Tree $k$-Coteries to Reduce the
                                  Degradation of Quorums . . . . . . . . . 634--643
                    R. Marshall   Modeling DNA/RNA Strings Using
                                  Resistor--Capacitor (RC) Ladder Networks 644--660
                   Ro-Yu Wu and   
             Jou-Ming Chang and   
                    Yue-Li Wang   Loopless Generation of Non-regular Trees
                                  with a Prescribed Branching Sequence . . 661--666
                  Jywe-Fei Fang   The Bipancycle-Connectivity and the
                                  $m$-Pancycle-Connectivity of the $k$-ary
                                  $n$-cube . . . . . . . . . . . . . . . . 667--678
            Roberto Barbuti and   
     Nicoletta De Francesco and   
                     Luca Tesei   An Abstract Interpretation Approach for
                                  Enhancing the Java Bytecode Verifier . . 679--700
            Shmuel T. Klein and   
          Miri Kopel Ben-Nissan   On the Usefulness of Fibonacci
                                  Compression Codes  . . . . . . . . . . . 701--716
               Dae-Hwan Kim and   
                   Hyuk-Jae Lee   Fine-Grain Register Allocation and
                                  Instruction Scheduling in a Reference
                                  Flow . . . . . . . . . . . . . . . . . . 717--740
    Emilio J. Padrón and   
             Margarita Amor and   
      Montserrat Bóo and   
            Ramón Doallo   Hierarchical Radiosity for
                                  Multiresolution Systems Based on Normal
                                  Tests  . . . . . . . . . . . . . . . . . 741--752
                Iren Valova and   
               Derek Beaton and   
                Dan MacLean and   
                   John Hammond   NIPSOM: Parallel Architecture and
                                  Implementation of a Growing SOM  . . . . 753--771
                Anne Benoit and   
               Mourad Hakem and   
                    Yves Robert   Multi-criteria Scheduling of Precedence
                                  Task Graphs on Heterogeneous Platforms   772--785
                Xiaoyan Zhu and   
                Qinbao Song and   
                      Zihan Jia   A Weighted Voting-Based Associative
                                  Classification Algorithm . . . . . . . . 786--801
              Jen-Bang Feng and   
             Iuon-Chang Lin and   
               Yen-Ping Chu and   
               Shyh-Chang Tsaur   Resampling Halftone Images Using
                                  Interpolation and Error-Diffusion  . . . 802--813
        Hans Vandierendonck and   
                   Sean Rul and   
              Koen De Bosschere   Accelerating Multiple Sequence Alignment
                                  with the Cell BE Processor . . . . . . . 814--826
           Michael A. Bekos and   
           Michael Kaufmann and   
            Katerina Potika and   
              Antonios Symvonis   Area-Feature Boundary Labeling . . . . . 827--841
               Rich Picking and   
             Alexia Robinet and   
                  Vic Grout and   
                John McGinn and   
                Armando Roy and   
                Simon Ellis and   
                    Denise Oram   A Case Study Using a Methodological
                                  Approach to Developing User Interfaces
                                  for Elderly and Disabled People  . . . . 842--859
              Peter G. Harrison   Turning Back Time --- What Impact on
                                  Performance? . . . . . . . . . . . . . . 860--868
               Erol Gelenbe and   
                Stephen Gilmore   Discussants' Comments on the
                                  \booktitleComputer Journal Lecture by
                                  Peter Harrison presented at the British
                                  Computer Society on 24th February 2009   869--870
       Alessandra Di Pierro and   
               Chris Hankin and   
               Herbert Wiklicky   Program Analysis Probably Counts . . . . 871--880
             Pasquale Malacaria   Program Analysis Probably Counts:
                                  Discussant Contribution for the
                                  \booktitleComputer Journal Lecture by
                                  Chris Hankin . . . . . . . . . . . . . . 881

The Computer Journal
Volume 53, Number 7, September, 2010

                Haneul Chon and   
                    Taewhan Kim   Resource Sharing Problem of Timing
                                  Variation-Aware Task Scheduling and
                                  Binding in MPSoC . . . . . . . . . . . . 883--894
                  Liang Xia and   
                Yongxin Zhu and   
                   Jun Yang and   
                 Jingwei Ye and   
                     Zonghua Gu   Implementing a Thermal-Aware Scheduler
                                  in Linux Kernel on a Multi-Core
                                  Processor  . . . . . . . . . . . . . . . 895--903
                  Minje Jun and   
                Eui-Young Chung   Design of On-Chip Crossbar Network
                                  Topology Using Chained Edge Partitioning 904--917
           Chung-Ming Huang and   
                Jian-Wei Li and   
                   Chun-Ta Chen   Distributed Hash Table-Based
                                  Interrogating-Call Session Control
                                  Function Network in the Internet
                                  Protocol Multimedia Subsystem for
                                  Efficient Query Services . . . . . . . . 918--933
               Jongsung Kim and   
                   Seokhie Hong   Side-Channel Attack Using
                                  Meet-in-the-Middle Technique . . . . . . 934--938
             Iuon-Chang Lin and   
             Shih-Shan Tang and   
                Chung-Ming Wang   Multicast Key Management without
                                  Rekeying Processes . . . . . . . . . . . 939--950
               Jenn-Wei Lin and   
                 Ming-Feng Yang   Robust Super-Peer-Based P2P File-Sharing
                                  Systems  . . . . . . . . . . . . . . . . 951--968
             Chuan-Chi Weng and   
             Ching-Wen Chen and   
              Chang-Jung Ku and   
                Shiow-Fen Hwang   A Bandwidth-Based Power-Aware Routing
                                  Protocol with Low Route Discovery
                                  Overhead in Mobile Ad hoc Networks . . . 969--990
              Jonathan Tate and   
                      Iain Bate   Sensornet Protocol Tuning Using
                                  Principled Engineering Methods . . . . . 991--1019
            Georgios Loukas and   
            Gülay Öke   Protection Against Denial of Service
                                  Attacks: a Survey  . . . . . . . . . . . 1020--1037
                    Isi Mitrani   Management of Server Farms for
                                  Performance and Profit . . . . . . . . . 1038--1044
               Andreas Berl and   
               Erol Gelenbe and   
          Marco Di Girolamo and   
          Giovanni Giuliani and   
            Hermann De Meer and   
             Minh Quan Dang and   
             Kostas Pentikousis   Energy-Efficient Cloud Computing . . . . 1045--1051
               Erol Gelenbe and   
                     Edith Ngai   Adaptive Random Re-Routing for
                                  Differentiated QoS in Sensor Networks    1052--1061
                Tsu-Yang Wu and   
                  Yuh-Min Tseng   An ID-Based Mutual Authentication and
                                  Key Exchange Protocol for Low-Power
                                  Mobile Devices . . . . . . . . . . . . . 1062--1070
                Xiuqiang He and   
                 Zonghua Gu and   
                    Yongxin Zhu   Task Allocation and Optimization of
                                  Distributed Embedded Systems with
                                  Simulated Annealing and Geometric
                                  Programming  . . . . . . . . . . . . . . 1071--1091
                   Eyal Loz and   
 Guillermo Pineda-Villavicencio   New Benchmarks for Large-Scale Networks
                                  with Given Maximum Degree and Diameter   1092--1105
                    Denis Trcek   Security Metrics Foundations for
                                  Computer Security  . . . . . . . . . . . 1106--1112
              Morris Sloman and   
                      Emil Lupu   Engineering Policy-Based Ubiquitous
                                  Systems  . . . . . . . . . . . . . . . . 1113--1127
                   Robin Milner   Discussant of Response to the
                                  \booktitleComputer Journal Lecture by
                                  Morris Sloman  . . . . . . . . . . . . . 1128
                    Mark Levene   Social Networks: An Introduction . . . . 1129
               Elizabeth Harrin   Growing Software: Proven Strategies for
                                  Managing Software Engineers  . . . . . . 1129--1130
               Michael Elad and   
                Dmitry Datsenko   Corrigendum: ``Example-Based
                                  Regularization Deployed to
                                  Super-Resolution Reconstruction of a
                                  Single Image'' . . . . . . . . . . . . . 1131--1131

The Computer Journal
Volume 53, Number 8, October, 2010

             Sung Woo Chung and   
          Hsien-Hsin S. Lee and   
                  Woo Hyong Lee   Architecture/OS Support for Embedded
                                  Multi-core Systems . . . . . . . . . . . 1134--1135
               Fariba Sadri and   
                 Kostas Stathis   Special Issue on Artificial Societies
                                  for Ambient Intelligence Editorial
                                  Introduction . . . . . . . . . . . . . . 1136--1137
      Jurriaan van Diggelen and   
           Robbert-Jan Beun and   
         Rogier M. van Eijk and   
             Peter J. Werkhoven   Efficient Semantic Information Exchange
                                  for Ambient Intelligence . . . . . . . . 1138--1151
         Marco P. Locatelli and   
             Marco Loregian and   
               Giuseppe Vizzari   Artificial Societies in a
                                  Community-Based Approach to Ambient
                                  Intelligence . . . . . . . . . . . . . . 1152--1168
            Aitor Ibarguren and   
       Iñaki Maurtua and   
                 Basilio Sierra   Layered Architecture for Real-Time Sign
                                  Recognition  . . . . . . . . . . . . . . 1169--1183
               Krysia Broda and   
          Christopher J. Hogger   Designing Effective Policies for Minimal
                                  Agents . . . . . . . . . . . . . . . . . 1184--1209
            Fabio Patern\`o and   
             Carmen Santoro and   
                Antonio Scorcia   Ambient Intelligence for Supporting Task
                                  Continuity across Multiple Devices and
                                  Implementation Languages . . . . . . . . 1210--1228
              Patrice Caire and   
         Leendert van der Torre   Convivial Ambient Technologies:
                                  Requirements, Ontology and Design  . . . 1229--1256
           Alessandra Mileo and   
              Davide Merico and   
            Stefano Pinardi and   
                Roberto Bisiani   A Logical Approach to Home Healthcare
                                  with Intelligent Sensor-Network Support  1257--1276
                Johnsen Kho and   
            Long Tran-Thanh and   
                Alex Rogers and   
           Nicholas R. Jennings   An Agent-Based Distributed Coordination
                                  Mechanism for Wireless Visual Sensor
                                  Nodes Using Dynamic Programming  . . . . 1277--1290
                   Guang-Ho Cha   A Context-Aware Similarity Search for a
                                  Handwritten Digit Image Database . . . . 1291--1301
              Huzaifa Zafar and   
              Daniel D. Corkill   Reducing Online Model-Development Time
                                  by Agents Using Constraints Between
                                  Shared Observations  . . . . . . . . . . 1302--1314
         Mücahid Kutlu and   
Celal Cì\ugìr and   
                  Ilyas Cicekli   Generic Text Summarization for Turkish   1315--1323
Göksel Günlü and   
                 Hasan S. Bilge   Face Recognition with Discriminating
                                  $3$D DCT Coefficients  . . . . . . . . . 1324--1337
                Jakub Mare\vcek   Book Review: \booktitleHandbook of
                                  Approximation Algorithms and
                                  Metaheuristics . . . . . . . . . . . . . 1338--1339

The Computer Journal
Volume 53, Number 9, November, 2010

             N. R. Jennings and   
                  A. Rogers and   
                    S. Case and   
                R. Johnston and   
                     D. Philpot   Decentralized Data and Information
                                  Systems: Theory and Practice . . . . . . 1341--1343
         Michalis Smyrnakis and   
                David S. Leslie   Dynamic Opponent Modelling in Fictitious
                                  Play . . . . . . . . . . . . . . . . . . 1344--1359
               Erol Gelenbe and   
          Stelios Timotheou and   
                David Nicholson   Fast Distributed Near-Optimum Assignment
                                  of Assets to Tasks . . . . . . . . . . . 1360--1369
          Nicos G. Pavlidis and   
             Niall M. Adams and   
            David Nicholson and   
                  David J. Hand   Prospects for Bandit Solutions in Sensor
                                  Management . . . . . . . . . . . . . . . 1370--1383
           Nikolaos Dimakis and   
Avgoustinos Filippoupolitis and   
                   Erol Gelenbe   Distributed Building Evacuation
                                  Simulator for Smart Emergency Management 1384--1400
Christoforos Anagnostopoulos and   
             Niall M. Adams and   
                  David J. Hand   Streaming Covariance Selection with
                                  Applications to Adaptive Querying in
                                  Sensor Networks  . . . . . . . . . . . . 1401--1414
              Seung Min Lee and   
             Stephen J. Roberts   Sequential Dynamic Classification Using
                                  Latent Variable Models . . . . . . . . . 1415--1429
              Roman Garnett and   
         Michael A. Osborne and   
               Steven Reece and   
                Alex Rogers and   
             Stephen J. Roberts   Sequential Bayesian Prediction in the
                                  Presence of Changepoints and Faults  . . 1430--1446
      Sarvapali D. Ramchurn and   
       Alessandro Farinelli and   
       Kathryn S. Macarthur and   
           Nicholas R. Jennings   Decentralized Coordination in RoboCup
                                  Rescue . . . . . . . . . . . . . . . . . 1447--1461
          Archie C. Chapman and   
          Rosa Anna Micillo and   
           Ramachandra Kota and   
           Nicholas R. Jennings   Decentralized Dynamic Task Allocation
                                  Using Overlapping Potential Games  . . . 1462--1477
                  Lein Harn and   
              Wen-Jung Hsin and   
                    Changlu Lin   Efficient On-line/Off-line Signature
                                  Schemes Based on Multiple-Collision
                                  Trapdoor Hash Families . . . . . . . . . 1478--1484
          Roberto De Prisco and   
              Alfredo De Santis   Cheating Immune Threshold Visual Secret
                                  Sharing  . . . . . . . . . . . . . . . . 1485--1496
          Lélia Blin and   
         Christian Laforest and   
         Stephane Rovedakis and   
               Nicolas Thibault   Hardness Results and Heuristic for
                                  Multi-groups Interconnection . . . . . . 1497--1507
      Adenilso Simão and   
             Alexandre Petrenko   Fault Coverage-Driven Incremental Test
                                  Generation . . . . . . . . . . . . . . . 1508--1522
              Vicent Cholvi and   
   Antonio Fernández and   
     Ernesto Jiménez and   
              Pilar Manzano and   
                  Michel Raynal   A Methodological Construction of an
                                  Efficient Sequentially Consistent
                                  Distributed Shared Memory  . . . . . . . 1523--1534
            Michael Wetherfield   Personal Recollections of Programming
                                  Deuce in the Late 1950s  . . . . . . . . 1535--1549

The Computer Journal
Volume 53, Number 10, December, 2010

             You-Chiun Wang and   
            Tomoaki Ohtsuki and   
Athanasios (Thanos) Vasilakos and   
         Ashutosh Sabharwal and   
             Yuh-Shyan Chen and   
                  Yu-Chee Tseng   Algorithms, Protocols and Future
                                  Applications of Wireless Sensor Networks 1551--1552
           Orhan Dagdeviren and   
                 Kayhan Erciyes   Graph Matching-Based Distributed
                                  Clustering and Backbone Formation
                                  Algorithms for Sensor Networks . . . . . 1553--1575
       Thanassis Giannetsos and   
           Tassos Dimitriou and   
          Ioannis Krontiris and   
                Neeli R. Prasad   Arbitrary Code Injection through
                                  Self-propagating Worms in von Neumann
                                  Architecture Devices . . . . . . . . . . 1576--1593
                 Yuan Zhang and   
                 Lichun Bao and   
            Shih-Hsien Yang and   
                Max Welling and   
                          Di Wu   Localization Algorithms for Wireless
                                  Sensor Retrieval . . . . . . . . . . . . 1594--1605
                Aaron Kiely and   
                 Mingsen Xu and   
              Wen-Zhan Song and   
               Renjie Huang and   
                Behrooz Shirazi   Adaptive Linear Filtering Compression on
                                  Realtime Sensor Networks . . . . . . . . 1606--1620
                Chih-Wei Yi and   
               Peng-Jun Wan and   
                Chao-Min Su and   
                 Chen-Wei Huang   The Critical Grid Size and Transmission
                                  Radius for Local-Minimum-Free Grid
                                  Routing in Wireless Ad Hoc and Sensor
                                  Networks . . . . . . . . . . . . . . . . 1621--1631
                 Meng Zheng and   
                  Wei Liang and   
                  Haibin Yu and   
                      Yang Xiao   Cross Layer Optimization for
                                  Energy-Constrained Wireless Sensor
                                  Networks: Joint Rate Control and Routing 1632--1642
                 Long Cheng and   
                 Yimin Chen and   
               Canfeng Chen and   
                    Jian Ma and   
                    Lei Shu and   
    Athanasios V. Vasilakos and   
                   Naixue Xiong   Efficient Query-Based Data Collection
                                  for Mobile Wireless Monitoring
                                  Applications . . . . . . . . . . . . . . 1643--1657
               Jaime Lloret and   
              Sandra Sendra and   
                  Hugo Coll and   
                  Miguel Garcia   Saving Energy in Wireless Local Area
                                  Sensor Networks  . . . . . . . . . . . . 1658--1673
               Pruet Boonma and   
                 Junichi Suzuki   Moppet: a Model-Driven Performance
                                  Engineering Framework for Wireless
                                  Sensor Networks  . . . . . . . . . . . . 1674--1690
               Yu-Ying Shih and   
                    Daniel Chao   Sequence of Control in S$^3$PMR  . . . . 1691--1703
           Chung-Ming Huang and   
              Ming-Sian Lin and   
                  Lik-Hou Chang   The Design of Mobile Concurrent
                                  Multipath Transfer in Multihomed
                                  Wireless Mobile Networks . . . . . . . . 1704--1718
               Jianxin Liao and   
                      Qi Qi and   
                Xiaomin Zhu and   
                  Yufei Cao and   
                    Tonghong Li   Enhanced IMS Handoff Mechanism for QoS
                                  Support over Heterogeneous Network . . . 1719--1737
               Maria Petrou and   
        Marco Elio Tabacchi and   
                Roberta Piroddi   Networks of Concepts and Ideas . . . . . 1738--1751
                  Jon Crowcroft   Internet Failures: an Emergent Sea of
                                  Complex Systems and Critical Design
                                  Errors?  . . . . . . . . . . . . . . . . 1752--1757
                   Manfred Broy   A Logical Basis for Component-Oriented
                                  Software and Systems Engineering . . . . 1758--1782
                 Daniel Y. Chao   Fewer Monitors and More Efficient
                                  Controllability for Deadlock Control in
                                  S$^3$PGR$^2$ (Systems of Simple
                                  Sequential Processes with General
                                  Resource Requirements) . . . . . . . . . 1783--1798


The Computer Journal
Volume 54, Number 1, January, 2011

                  Qiang Liu and   
   George A. Constantinides and   
      Konstantinos Masselos and   
             Peter Y. K. Cheung   Compiling C-like Languages to FPGA
                                  Hardware: Some Novel Approaches
                                  Targeting Data Memory Organization . . . 1--10
              Mark S. Nixon and   
                 Xin U. Liu and   
            Cem Direko\=glu and   
                David J. Hurley   On Using Physical Analogies for Feature
                                  and Shape Extraction in Computer Vision  11--25
                Stefan Dantchev   Dynamic Neighbourhood Cellular Automata  26--30
          Corina C\^\irstea and   
             Alexander Kurz and   
             Dirk Pattinson and   
         Lutz Schröder and   
                     Yde Venema   Modal Logics are Coalgebraic . . . . . . 31--41
                  Glynn Winskel   Events, Causality and Symmetry . . . . . 42--57
              Andreas Bauer and   
           Jan Jürjens and   
                       Yijun Yu   Run-Time Security Traceability for
                                  Evolving Systems . . . . . . . . . . . . 58--87
                Kohei Honda and   
                 Nobuko Yoshida   A Unified Theory of Program Logics: an
                                  Approach based on the $\pi$-Calculus . . 88--107
                Heewan Park and   
                Hyun-il Lim and   
               Seokwoo Choi and   
                    Taisook Han   Detecting Common Modules in Java
                                  Packages Based on Static Object Trace
                                  Birthmark  . . . . . . . . . . . . . . . 108--124
Sebastián Basterrech and   
             Samir Mohammed and   
             Gerardo Rubino and   
                Mostafa Soliman   Levenberg--Marquardt Training Algorithms
                                  for Random Neural Networks . . . . . . . 125--135
                  David Hartley   EDSAC at 60---a Celebration of 60 Years
                                  Since the First Program Ran on the EDSAC
                                  at Cambridge . . . . . . . . . . . . . . 136--138
                   David Barron   EDSAC: a Programmer Remembers  . . . . . 139--142
                    Doron Swade   Inventing the User: EDSAC in Context . . 143--147
               D. Cavagnino and   
                A. E. Werbrouck   An Analysis of Associated Dividends in
                                  the DBM Algorithm for Division by
                                  Constants Using Multiplication . . . . . 148--156
                GuanJun Liu and   
             ChangJun Jiang and   
                 Daniel Y. Chao   A Necessary and Sufficient Condition for
                                  the Liveness of Normal Nets  . . . . . . 157--163
                  Jing Dong and   
                    Tu Peng and   
                    Yajing Zhao   On Instantiation and Integration
                                  Commutability of Design Pattern  . . . . 164--184

The Computer Journal
Volume 54, Number 2, February, 2011

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 185--186
               A. Manzalini and   
              P. H. Deussen and   
                S. Nechifor and   
                   M. Mamei and   
                 R. Minerva and   
                   C. Moiso and   
                  A. Salden and   
                 T. Wauters and   
                  F. Zambonelli   Self-optimized Cognitive Network of
                                  Networks . . . . . . . . . . . . . . . . 189--196
             Yosi Ben-Asher and   
            Sharoni Feldman and   
                  Moran Feldman   Dynamic Multipath Allocation in Ad Hoc
                                  Networks . . . . . . . . . . . . . . . . 197--212
          Giuseppe Anastasi and   
            Eleonora Borgia and   
                Marco Conti and   
                 Enrico Gregori   A Hybrid Adaptive Protocol for Reliable
                                  Data Delivery in WSNS with Multiple
                                  Mobile Sinks . . . . . . . . . . . . . . 213--229
               Oliviu Ghica and   
            Goce Trajcevski and   
          Peter Scheuermann and   
         Nikolay Valtchanov and   
                Zachary Bischof   Controlled Multi-Path Routing in Sensor
                                  Networks Using Bézier Curves  . . . . . . 230--254
                  Jywe-Fei Fang   The Edge-Fault-Tolerant Bipancyclicity
                                  of the Even $k$-ary $n$-cube . . . . . . 255--262
                David Nicholson   Defence Applications of Agent-Based
                                  Information Fusion . . . . . . . . . . . 263--273
             Thu-Ha Dao-Thi and   
       Jean-Michel Fourneau and   
                  Minh-Anh Tran   Multiple Class Symmetric G-networks with
                                  Phase Type Service Times . . . . . . . . 274--284
                Lucas Vespa and   
                  Ning Weng and   
            Ramaswamy Ramaswamy   MS-DFA: Multiple-Stride Pattern Matching
                                  for Scalable Deep Packet Inspection  . . 285--303
                 Mihaela Ulieru   Book Review: Wired for Innovation: How
                                  Information Technology is Reshaping the
                                  Economy  . . . . . . . . . . . . . . . . 304--305

The Computer Journal
Volume 54, Number 3, March, 2011

                      A. Rogers   Agent Technologies for Sensor Networks   307--308
            Ettore Ferranti and   
                   Niki Trigoni   Practical Issues in Deploying Mobile
                                  Agents to Explore a Sensor-Instrumented
                                  Environment  . . . . . . . . . . . . . . 309--320
                  Dirk Bade and   
            Winfried Lamersdorf   An Agent-Based Event Processing
                                  Middleware for Sensor Networks and RFID
                                  Systems  . . . . . . . . . . . . . . . . 321--331
               Damla Turgut and   
      Ladislau Bölöni   Heuristic Approaches for Transmission
                                  Scheduling in Sensor Networks with
                                  Multiple Mobile Sinks  . . . . . . . . . 332--344
         Shunichiro Suenaga and   
          Nobukazu Yoshioka and   
               Shinichi Honiden   Group Migration by Mobile Agents in
                                  Wireless Sensor Networks . . . . . . . . 345--355
             Murat \cSensoy and   
                    Thao Le and   
    Wamberto W. Vasconcelos and   
          Timothy J. Norman and   
                 Alun D. Preece   Resource Determination and Allocation in
                                  Sensor Networks: a Hybrid Approach . . . 356--372
           Sherine Abdelhak and   
          Rabi S. Chaudhuri and   
          Chandra S. Gurram and   
               Soumik Ghosh and   
                  Magdy Bayoumi   Energy-Aware Distributed $QR$
                                  Decomposition on Wireless Sensor Nodes   373--391
              Daniel D. Corkill   Deploying Power-Aware, Wireless Sensor
                                  Agents . . . . . . . . . . . . . . . . . 392--405
 Edison Pignaton de Freitas and   
            Tales Heimfarth and   
     Carlos Eduardo Pereira and   
    Armando Morado Ferreira and   
  Flávio Rech Wagner and   
                   Tony Larsson   Multi-Agent Support in a Middleware for
                                  Mission-Driven Heterogeneous Sensor
                                  Networks . . . . . . . . . . . . . . . . 406--420
             Andrew Markham and   
                   Niki Trigoni   The Automatic Evolution of Distributed
                                  Controllers to Configure Sensor Network
                                  Operation  . . . . . . . . . . . . . . . 421--438
           Francesco Aiello and   
          Giancarlo Fortino and   
           Raffaele Gravina and   
              Antonio Guerrieri   A Java-Based Agent Platform for
                                  Programming Wireless Sensor Networks . . 439--454
          Meritxell Vinyals and   
  Juan A. Rodriguez-Aguilar and   
                Jesus Cerquides   A Survey on Sensor Networks from a
                                  Multiagent Perspective . . . . . . . . . 455--470
             Antony Waldock and   
                David Nicholson   A Framework for Cooperative Control
                                  Applied to a Distributed Sensor Network  471--481
           Partha Mukherjee and   
                     Sandip Sen   Comparing Reputation Schemes for
                                  Detecting Malicious Nodes in Sensor
                                  Networks . . . . . . . . . . . . . . . . 482--489
              Richard Tynan and   
              Conor Muldoon and   
             Gregory O'Hare and   
                Michael O'Grady   Coordinated Intelligent Power Management
                                  and the Heterogeneous Sensing Coverage
                                  Problem  . . . . . . . . . . . . . . . . 490--502

The Computer Journal
Volume 54, Number 4, April, 2011

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 503--504
                     Zuowen Tan   An Off-line Electronic Cash Scheme Based
                                  on Proxy Blind Signature . . . . . . . . 505--512
                 Fuchun Guo and   
                      Yi Mu and   
                   Willy Susilo   Short Signatures with a Tighter Security
                                  Reduction Without Random Oracles . . . . 513--524
                Qiong Huang and   
             Duncan S. Wong and   
                    Guomin Yang   Heterogeneous Signcryption with Key
                                  Privacy  . . . . . . . . . . . . . . . . 525--536
           Mehran S. Fallah and   
               Maryam Mouzarani   A Game-based Sybil-resistant Strategy
                                  for Reputation Systems in
                                  Self-organizing Manets . . . . . . . . . 537--548
                Biming Tian and   
                   Song Han and   
               Sazia Parvin and   
                 Jiankun Hu and   
                      Sajal Das   Self-Healing Key Distribution Schemes
                                  for Wireless Networks: a Survey  . . . . 549--569
             Prasanta Gogoi and   
        D. K. Bhattacharyya and   
                   B. Borah and   
                Jugal K. Kalita   A Survey of Outlier Detection Methods in
                                  Network Anomaly Identification . . . . . 570--588
          Ender Yüksel and   
         Hanne Riis Nielson and   
               Flemming Nielson   A Secure Key Establishment Protocol for
                                  ZigBee Wireless Sensor Networks  . . . . 589--601
                Murat Ergun and   
                Albert Levi and   
                    Erkay Savas   Increasing Resiliency in Multi-phase
                                  Wireless Sensor Networks: Generationwise
                                  Key Predistribution Approach . . . . . . 602--616
               David Taniar and   
              Maytham Safar and   
             Quoc Thai Tran and   
               Wenny Rahayu and   
                 Jong Hyuk Park   Spatial Network RNN Queries in GIS . . . 617--627
                Chien-Lung Chan   Information Security Risk Modeling Using
                                  Bayesian Index . . . . . . . . . . . . . 628--638

The Computer Journal
Volume 54, Number 5, May, 2011

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 639--640
              Jeremy T. Bradley   Computer Performance Evaluation: Preface 641--642
               Nigel Thomas and   
                     Yishi Zhao   Mean value analysis for a class of Pepa
                                  models . . . . . . . . . . . . . . . . . 643--652
           Gianfranco Balbo and   
              Marco Beccuti and   
     Massimiliano De Pierro and   
         Giuliana Franceschinis   First Passage Time Computation in Tagged
                                  GSPNs with Queue Places  . . . . . . . . 653--673
            Connie U. Smith and   
   Catalina M. Lladó and   
                Ramon Puigjaner   Model Interchange Format Specifications
                                  for Experiments, Output and Results  . . 674--690
        Abigail S. Lebrecht and   
         Nicholas J. Dingle and   
         William J. Knottenbelt   Analytical and Simulation Modelling of
                                  Zoned RAID Systems . . . . . . . . . . . 691--707
      Mehmet Serkan Apaydin and   
   Bülent Çatay and   
           Nicholas Patrick and   
                Bruce R. Donald   NVR-BIP: Nuclear Vector Replacement
                                  using Binary Integer Programming for NMR
                                  Structure-Based Assignments  . . . . . . 708--716
        Ender Sevinç and   
                  Ahmet Co\csar   An Evolutionary Genetic Algorithm for
                                  Optimization of Distributed Database
                                  Queries  . . . . . . . . . . . . . . . . 717--725
            H. Sarbazi-Azad and   
                A. Khonsari and   
                 M. Ould-Khaoua   On the Topological Properties of
                                  Grid-Based Interconnection Networks:
                                  Surface Area and Volume of Radial
                                  Spheres  . . . . . . . . . . . . . . . . 726--737
    Rìfat Benveniste and   
               Cem Ünsalan   A Color Invariant for Line Stripe-Based
                                  Range Scanners . . . . . . . . . . . . . 738--753
              Marco Bozzano and   
         Alessandro Cimatti and   
        Joost-Pieter Katoen and   
            Viet Yen Nguyen and   
                Thomas Noll and   
                   Marco Roveri   Safety, Dependability and Performance
                                  Analysis of Extended AADL Models . . . . 754--775
                 James F. Korsh   Fast Generation of $t$-ary Trees . . . . 776--785
              Ramon Bertran and   
            Marc Gonz\`alez and   
           Xavier Martorell and   
              Nacho Navarro and   
          Eduard Ayguadé   Local Memory Design Space Exploration
                                  for High-Performance Computing . . . . . 786--799
            Murat Ali Bayir and   
             Murat Demirbas and   
                    Ahmet Cosar   A Web-Based Personalized Mobility
                                  Service for Smartphone Applications  . . 800--814
              Minhaj Ahmad Khan   Data Cache Prefetching With Dynamic
                                  Adaptation . . . . . . . . . . . . . . . 815--823
                Yen-Ju Chen and   
                Jia-Jie Liu and   
                    Yue-Li Wang   An Optimal Rotation Distance Set . . . . 824--830
                    Mark Levene   Book Review: Search Engines: Information
                                  Retrieval in Practice  . . . . . . . . . 831--832

The Computer Journal
Volume 54, Number 6, June, 2011

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 833--835
           Django Armstrong and   
                  Karim Djemame   Performance Issues in Clouds: an
                                  Evaluation of Virtual Image Propagation
                                  and I/O Paravirtualization . . . . . . . 836--849
               Erol Gelenbe and   
          Christina Morfopoulou   A Framework for Energy-Aware Routing in
                                  Packet Networks  . . . . . . . . . . . . 850--859
              Arshad Jhumka and   
              Matthew Leeke and   
                Sambid Shrestha   On the Use of Fake Sources for Source
                                  Location Privacy: Trade-Offs Between
                                  Energy and Privacy . . . . . . . . . . . 860--874
               Osama Younes and   
                   Nigel Thomas   An SRN Model of the IEEE 802.11 DCF MAC
                                  Protocol in Multi-Hop Ad Hoc Networks
                                  with Hidden Nodes  . . . . . . . . . . . 875--893
                   Feng Liu and   
                Xiaoyu Song and   
               Qingping Tan and   
                      Gang Chen   Formal Analysis of Hybrid
                                  Prefix/Carry-Select Arithmetic Systems   894--904
                   Qiang Li and   
                Qin-fen Hao and   
                Li-min Xiao and   
                    Zhou-jun Li   An Integrated Approach to Automatic
                                  Management of Virtualized Resources in
                                  Cloud Environments . . . . . . . . . . . 905--919
             Yonghong Xiang and   
                Iain A. Stewart   A Multipath Analysis of Biswapped
                                  Networks . . . . . . . . . . . . . . . . 920--930
          Kalika Suksomboon and   
         Panita Pongpaibool and   
                 Yusheng Ji and   
                Chaodit Aswakul   PC-Nash: QoS Provisioning Framework With
                                  Path-Classification Scheme Under Nash
                                  Equilibrium  . . . . . . . . . . . . . . 931--943
          Mustafa K. Gurcan and   
          Hadhrami Ab Ghani and   
                 Jihai Zhou and   
           Anusorn Chungtragarn   Bit Energy Consumption Minimization for
                                  Multi-path Routing in Ad Hoc Networks    944--959
                   S. A. Jarvis   UK Performance Engineering Workshop 2010 960--961
                     Jie Yu and   
                 Zhoujun Li and   
                  Peng Xiao and   
             Chengfang Fang and   
                     Jia Xu and   
                 Ee-Chien Chang   ID Repetition in Structured P2P Networks 962--975
             Guangyan Huang and   
              Yanchun Zhang and   
                    Jing He and   
                      Jinli Cao   Fault Tolerance in Data Gathering
                                  Wireless Sensor Networks . . . . . . . . 976--987
           A. Sinan Akyurek and   
           Elif Uysal-Biyikoglu   A Depth-optimal Low-complexity
                                  Distributed Wireless Multicast Algorithm 988--1003

The Computer Journal
Volume 54, Number 7, July, 2011

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 1005--1009
            Alex W. Stedmon and   
        Benjamin Hasseldine and   
                 David Rice and   
                 Mark Young and   
              Steve Markham and   
             Michael Hancox and   
            Edward Brickell and   
                   Joanna Noble   `MotorcycleSim': an Evaluation of Rider
                                  Interaction with an Innovative
                                  Motorcycle Simulator . . . . . . . . . . 1010--1025
              Petr Hnetynka and   
                Liam Murphy and   
                    John Murphy   Comparing the Service Component
                                  Architecture and Fractal Component Model 1026--1037
                  Tatjana Kapus   Closing a System in the Dynamic
                                  Input/Output Automata Model  . . . . . . 1038--1048
           Ahmad Taherkhani and   
               Ari Korhonen and   
                    Lauri Malmi   Recognizing Algorithms Using Language
                                  Constructs, Software Metrics and Roles
                                  of Variables: an Experiment with Sorting
                                  Algorithms . . . . . . . . . . . . . . . 1049--1066
                  Paul E. Dunne   On Constructing Minimal Formulae . . . . 1067--1075
           Alessandro Basso and   
           Davide Cavagnino and   
            Victor Pomponiu and   
              Annamaria Vernone   Blind Watermarking of Color Images Using
                                  Karhunen--Lo\`eve Transform Keying . . . 1076--1090
                  Yuqing Wu and   
             Dirk Van Gucht and   
               Marc Gyssens and   
                  Jan Paredaens   A Study of a Positive Fragment of Path
                                  Queries: Expressiveness, Normal Form and
                                  Minimization . . . . . . . . . . . . . . 1091--1118
               Harold Thimbleby   Signposting in Documents . . . . . . . . 1119--1135
            Chuen-Horng Lin and   
                   Wei-Chih Lin   Image Retrieval System Based on Adaptive
                                  Color Histogram and Texture Features . . 1136--1147
                David Pinto and   
                Paolo Rosso and   
Héctor Jiménez-Salazar   A Self-enriching Methodology for
                                  Clustering Narrow Domain Short Texts . . 1148--1165
              Sven Hartmann and   
                   Uwe Leck and   
                 Sebastian Link   On Codd Families of Keys over Incomplete
                                  Relations  . . . . . . . . . . . . . . . 1166--1180
               Tetsu Narumi and   
              Kenji Yasuoka and   
               Makoto Taiji and   
         Francesco Zerbetto and   
        Siegfried Höfinger   Fast Calculation of Electrostatic
                                  Potentials on the GPU or the ASIC
                                  MD-GRAPE-3 . . . . . . . . . . . . . . . 1181--1187
Alexandre R. J. François   An Architectural Framework for the
                                  Design, Analysis and Implementation of
                                  Interactive Systems  . . . . . . . . . . 1188--1204
                      Yulai Xie   Some Results on Minimum Discrete Bending
                                  Energy Path in Simple Polygon  . . . . . 1205--1210
                    Jia Lee and   
              Susumu Adachi and   
                Ferdinand Peper   A Partitioned Cellular Automaton
                                  Approach for Efficient Implementation of
                                  Asynchronous Circuits  . . . . . . . . . 1211--1220
              Medeni Soysal and   
                A. Aydin Alatan   Joint Utilization of Appearance,
                                  Geometry and Chance for Scene Logo
                                  Retrieval  . . . . . . . . . . . . . . . 1221--1231

The Computer Journal
Volume 54, Number 8, August, 2011

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 1233--1234
Constandinos X. Mavromoustakis and   
               Helen D. Karatza   Embedded Socio-oriented Model for
                                  End-to-End Reliable Stream Schedules by
                                  Using Collaborative Outsourcing in Mp2P
                                  Systems  . . . . . . . . . . . . . . . . 1235--1247
      Amirhosein Taherkordi and   
Frédéric Loiret and   
              Romain Rouvoy and   
                 Frank Eliassen   A Generic Component-Based Approach for
                                  Programming, Composing and Tuning Sensor
                                  Software . . . . . . . . . . . . . . . . 1248--1266
                In Hwan Doh and   
               Jongmoo Choi and   
                Donghee Lee and   
                     Sam H. Noh   An Empirical Study of Deploying Storage
                                  Class Memory into the I/O Path of
                                  Portable Systems . . . . . . . . . . . . 1267--1281
     José Luis March and   
           Julio Sahuquillo and   
             Houcine Hassan and   
             Salvador Petit and   
              José Duato   A New Energy-Aware Dynamic Task Set
                                  Partitioning Algorithm for Soft and Hard
                                  Embedded Real-Time Systems . . . . . . . 1282--1294
              Ali Ahmadinia and   
               Alireza Shahrabi   A Highly Adaptive and Efficient Router
                                  Architecture for Network-on-Chip . . . . 1295--1307
               Minseong Kim and   
                  Andy Wellings   Multiprocessors and Asynchronous Event
                                  Handling in the Real-Time Specification
                                  for Java . . . . . . . . . . . . . . . . 1308--1324
         Mohammed F. Mokbel and   
             Robert D. Kent and   
                   Michael Wong   An Abstract Semantically Rich Compiler
                                  Collocative and Interpretative Model for
                                  OpenMP Programs  . . . . . . . . . . . . 1325--1343
             Tiziana Calamoneri   The $L(h, k)$-Labelling Problem: an
                                  Updated Survey and Annotated
                                  Bibliography . . . . . . . . . . . . . . 1344--1371
            Antoine Bossard and   
             Keiichi Kaneko and   
                  Shietung Peng   A New Node-to-Set Disjoint-Path
                                  Algorithm in Perfect Hierarchical
                                  Hypercubes . . . . . . . . . . . . . . . 1372--1381
              Eun-Chan Park and   
                   Minjoong Rim   Fair Coexistence MAC Protocol for
                                  Contention-Based Heterogeneous Networks  1382--1397
                Onur Yilmaz and   
           Orhan Dagdeviren and   
                 Kayhan Erciyes   Interference-Aware Dynamic Algorithms
                                  for Energy-Efficient Topology Control in
                                  Wireless Ad Hoc and Sensor Networks  . . 1398--1411

The Computer Journal
Volume 54, Number 9, September, 2011

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 1413--1415
                    Shuo Xu and   
                     Fan Yu and   
                    Zhe Luo and   
                      Ze Ji and   
            Duc Truong Pham and   
                      Renxi Qiu   Adaptive Bees Algorithm ---
                                  Bioinspiration from Honeybee Foraging to
                                  Optimize Fuel Economy of a Semi-Track
                                  Air-Cushion Vehicle  . . . . . . . . . . 1416--1426
      Hugo Hernández and   
                 Christian Blum   Foundations of \sc Antcycle:
                                  Self-synchronized Duty-cycling in Mobile
                                  Sensor Networks  . . . . . . . . . . . . 1427--1448
                 Wei-Po Lee and   
                  Yu-Ting Hsiao   An Adaptive GA--PSO Approach with Gene
                                  Clustering to Infer S-system Models of
                                  Gene Regulatory Networks . . . . . . . . 1449--1464
               Hongxing Wei and   
               Youdong Chen and   
                   Miao Liu and   
               Yingpeng Cai and   
                  Tianmiao Wang   Swarm Robots: from Self-assembly to
                                  Locomotion . . . . . . . . . . . . . . . 1465--1474
             Hanife Kebapci and   
           Berrin Yanikoglu and   
                     Gozde Unal   Plant Image Retrieval Using Color, Shape
                                  and Texture Features . . . . . . . . . . 1475--1490
               Maria Petrou and   
          Archontis Giannakidis   Full Tomographic Reconstruction of $2$D
                                  Vector Fields using Discrete Integral
                                  Data . . . . . . . . . . . . . . . . . . 1491--1504
            Gérard Sabah   Natural Language Understanding, Where
                                  Are We Going? Where Could We Go? . . . . 1505--1513
              Stelios Timotheou   Asset-Task Assignment Algorithms in the
                                  Presence of Execution Uncertainty  . . . 1514--1525
               Serdar Cakir and   
                  A. Enis Cetin   Mel- and Mellin-cepstral Feature
                                  Extraction Algorithms for Face
                                  Recognition  . . . . . . . . . . . . . . 1526--1534
      Gözde Özbal and   
       Hìlal Karaman and   
              Ferda N. Alpaslan   A Content-Boosted Collaborative
                                  Filtering Approach for Movie
                                  Recommendation Based on Local and Global
                                  Similarity and Missing Data Prediction   1535--1546
               S. B. Kotsiantis   Cascade Generalization with Reweighting
                                  Data for Handling Imbalanced Problems    1547--1559
                    Mark Levene   Chess Metaphors, Artificial Intelligence
                                  and the Human Mind . . . . . . . . . . . 1560--1560

The Computer Journal
Volume 54, Number 10, October, 2011

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 1561--1564
          Monowar H. Bhuyan and   
        D. K. Bhattacharyya and   
                   J. K. Kalita   Surveying Port Scans and Their Detection
                                  Methodologies  . . . . . . . . . . . . . 1565--1581
               Duc-Phong Le and   
                 Chao-Liang Liu   Refinements of Miller's Algorithm over
                                  Weierstrass Curves Revisited . . . . . . 1582--1591
               Salih Ergün   A Truly Random Number Generator Based on
                                  a Pulse-Excited Cross-Coupled Chaotic
                                  Oscillator . . . . . . . . . . . . . . . 1592--1602
                 Ruben Rios and   
                   Javier Lopez   Exploiting Context-Awareness to Enhance
                                  Source-Location Privacy in Wireless
                                  Sensor Networks  . . . . . . . . . . . . 1603--1615
             Hossein Homaei and   
           Hamid Reza Shahriari   Compositional Approach to Quantify the
                                  Vulnerability of Computer Systems  . . . 1616--1631
                     Kai Xi and   
                   Yan Tang and   
                     Jiankun Hu   Correlation Keystroke Verification
                                  Scheme for User Access Control in Cloud
                                  Computing Environment  . . . . . . . . . 1632--1644
                    Yong Yu and   
                      Yi Mu and   
                Guilin Wang and   
                       Ying Sun   Cryptanalysis of an Off-Line Electronic
                                  Cash Scheme Based on Proxy Blind
                                  Signature  . . . . . . . . . . . . . . . 1645--1651
       Hassan Jameel Asghar and   
             Josef Pieprzyk and   
                  Huaxiong Wang   On the Hardness of the Sum of $k$ Mins
                                  Problem  . . . . . . . . . . . . . . . . 1652--1660
                  Jun Zhang and   
                 Yang Xiang and   
                Wanlei Zhou and   
                     Lei Ye and   
                          Yi Mu   Secure Image Retrieval Based on Visual
                                  Content and Watermarking Protocol  . . . 1661--1674
                   Lan Zhou and   
         Vijay Varadharajan and   
               Michael Hitchens   Enforcing Role-Based Access Control for
                                  Secure Data Storage in the Cloud . . . . 1675--1687
                  Lein Harn and   
               Chia-Yin Lee and   
                Changlu Lin and   
                Chin-Chen Chang   Fully Deniable Message Authentication
                                  Protocols Preserving Confidentiality . . 1688--1699
                  Yini Wang and   
                  Sheng Wen and   
              Silvio Cesare and   
                Wanlei Zhou and   
                     Yang Xiang   The Microcosmic Model of Worm
                                  Propagation  . . . . . . . . . . . . . . 1700--1720
                Erika Rosas and   
              Olivier Marin and   
                Xavier Bonnaire   Corps: Building a Community of Reputable
                                  Peers in Distributed Hash Tables . . . . 1721--1735

The Computer Journal
Volume 54, Number 11, November, 2011

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 1737--1740
                Chenfeng Xu and   
               Hongsheng Xi and   
                   Fengguang Wu   Evaluation and Optimization of Kernel
                                  File Readaheads Based on Markov Decision
                                  Models . . . . . . . . . . . . . . . . . 1741--1755
              Edgar G. Daylight   Dijkstra's Rallying Cry for
                                  Generalization: the Advent of the
                                  Recursive Procedure, Late 1950s--Early
                                  1960s  . . . . . . . . . . . . . . . . . 1756--1772
             Mitzi McCarthy and   
                        Zhen He   Efficient Updates for OLAP Range Queries
                                  on Flash Memory  . . . . . . . . . . . . 1773--1789
                    Tien Van Do   Comparison of Allocation Schemes for
                                  Virtual Machines in Energy-Aware Server
                                  Farms  . . . . . . . . . . . . . . . . . 1790--1797
               Amir Kaivani and   
              Ghassem Jaberipur   Decimal CORDIC Rotation based on
                                  Selection by Rounding: Algorithm and
                                  Architecture . . . . . . . . . . . . . . 1798--1809
             Cagatay Turkay and   
                   Emre Koc and   
                 Selim Balcisoy   Integrating Information Theory in
                                  Agent-Based Crowd Simulation Behavior
                                  Models . . . . . . . . . . . . . . . . . 1810--1820
   Gabriel Rodríguez and   
María J. Martín and   
   Patricia González and   
            Juan Touriño   Analysis of Performance-impacting
                                  Factors on Checkpointing Frameworks: the
                                  CPPC Case Study  . . . . . . . . . . . . 1821--1837
                Jia-Jie Liu and   
     William Chung-Kung Yen and   
                    Yen-Ju Chen   An Optimal Algorithm for Untangling
                                  Binary Trees via Rotations . . . . . . . 1838--1844
               Ahmad Taherkhani   Using Decision Tree Classifiers in
                                  Source Code Analysis to Recognize
                                  Algorithms: an Experiment with Sorting
                                  Algorithms . . . . . . . . . . . . . . . 1845--1860
   Francisco Vázquez and   
     Ester M. Garzón and   
José Jesús Fernández   Matrix Implementation of Simultaneous
                                  Iterative Reconstruction Technique
                                  (Sirt) on GPUs . . . . . . . . . . . . . 1861--1868
             Tiziana Calamoneri   The $L(2, 1)$-Labeling Problem on
                                  Oriented Regular Grids . . . . . . . . . 1869--1875
                   Ionu\dt Popa   SE-Compression: a Generalization of
                                  Dictionary-Based Compression . . . . . . 1876--1881
                   Yang Liu and   
                    Zhen He and   
        Yi-Ping Phoebe Chen and   
                     Thi Nguyen   External Sorting on Flash Memory Via
                                  Natural Page Run Generation  . . . . . . 1882--1990
                Francisco Ortin   Type Inference to Optimize a Hybrid
                                  Statically and Dynamically Typed
                                  Language . . . . . . . . . . . . . . . . 1901--1924

The Computer Journal
Volume 54, Number 12, November, 2011

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 1925--1927
           Damianos Gavalas and   
          Grammati Pantziou and   
    Charalampos Konstantopoulos   Mobility in Wireless Sensor Networks . . 1928--1930
                Roland Kays and   
               Sameer Tilak and   
           Margaret Crofoot and   
              Tony Fountain and   
              Daniel Obando and   
           Alejandro Ortega and   
             Franz Kuemmeth and   
               Jamie Mandel and   
             George Swenson and   
             Thomas Lambert and   
                 Ben Hirsch and   
                Martin Wikelski   Tracking Animal Location and Activity
                                  with an Automated Radio Telemetry System
                                  in a Tropical Rainforest . . . . . . . . 1931--1948
           Giuseppe Cardone and   
            Antonio Corradi and   
                  Luca Foschini   Cross-Network Opportunistic Collection
                                  of Urgent Data in Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 1949--1962
               Mahdi Zareei and   
         Alireza Taghizadeh and   
            Rahmat Budiarto and   
                   Tat-Chee Wan   EMS-MAC: Energy Efficient
                                  Contention-Based Medium Access Control
                                  Protocol for Mobile Sensor Networks  . . 1963--1972
              Olof Rensfelt and   
           Frederik Hermans and   
            Per Gunningberg and   
      Lars-Åke Larzon and   
             Erik Björnemo   Repeatable Experiments with Mobile Nodes
                                  in a Relocatable WSN Testbed . . . . . . 1973--1986
             M. Emre Keskin and   
           I. Kuban Altinel and   
                Necati Aras and   
                      Cem Ersoy   Lifetime Maximization in Wireless Sensor
                                  Networks Using a Mobile Sink with
                                  Nonzero Traveling Time . . . . . . . . . 1987--1999
               Zeqiang Chen and   
                  Liping Di and   
                  Genong Yu and   
                 Nengcheng Chen   Real-Time On-Demand Motion Video Change
                                  Detection in the Sensor Web Environment  2000--2016
              Kai-Ting Yang and   
                   Ge-Ming Chiu   A Hybrid Pull-Based with Piggybacked
                                  Push Protocol for Cache Sharing  . . . . 2017--2032
             Jih-Ching Chiu and   
              Yu-Liang Chou and   
                Po-Kai Chen and   
                  Ding-Siang Su   A Unitable Computing Architecture for
                                  Chip Multiprocessors . . . . . . . . . . 2033--2052
                   Yanbo Wu and   
              Quan Z. Sheng and   
           Damith C. Ranasinghe   Facilitating Efficient Object Tracking
                                  in Large-Scale Traceability Networks . . 2053--2071


The Computer Journal
Volume 55, Number 1, January, 2012

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 1--2
             Kazuma Akamine and   
                Ken Fukuchi and   
             Akisato Kimura and   
                 Shigeru Takagi   Fully Automatic Extraction of Salient
                                  Objects from Videos in Near Real Time    3--14
            Daniel Ruijters and   
       Philippe Thévenaz   GPU Prefilter for Accurate Cubic
                                  B-spline Interpolation . . . . . . . . . 15--20
                Sangpil Lee and   
                      Won W. Ro   Accelerated Network Coding with Dynamic
                                  Stream Decomposition on Graphics
                                  Processing Unit  . . . . . . . . . . . . 21--34
                Sumeer Goel and   
              Yasser Ismail and   
                  Magdy Bayoumi   High-speed Motion Estimation
                                  Architecture for Real-time Video
                                  Transmission . . . . . . . . . . . . . . 35--46
              Ingrid Petric and   
              Bojan Cestnik and   
                Nada Lavrac and   
                 Tanja Urbancic   Outlier Detection in Cross-Context Link
                                  Discovery for Creative Literature Mining 47--61
  M. O\uguzhan Külekci and   
       Jeffrey Scott Vitter and   
                      Bojian Xu   Fast Pattern-Matching via $k$-bit
                                  Filtering Based Text Decomposition . . . 62--68
           Manuel Abellanas and   
    Antonio Leslie Bajuelos and   
               Inês Matos   Minimizing the Range for $k$-Covered
                                  Paths on Sensor Networks . . . . . . . . 69--81
               Vid Podpecan and   
            Monika Zemenova and   
                    Nada Lavrac   Orange4Ws Environment for
                                  Service-Oriented Data Mining . . . . . . 82--98
                    Dick Hamlet   Science, Mathematics, Computer Science,
                                  Software Engineering . . . . . . . . . . 99--110
      Antonio Fariña and   
            Gonzalo Navarro and   
   José R. Paramá   Boosting Text Compression with
                                  Word-Based Statistical Encoding  . . . . 111--131

The Computer Journal
Volume 55, Number 2, February, 2012

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 133--135
                   S. A. Jarvis   Editorial Performance Modelling,
                                  Benchmarking and Simulation of
                                  High-Performance Computing Systems . . . 136--137
            S. J. Pennycook and   
              S. D. Hammond and   
             G. R. Mudalige and   
               S. A. Wright and   
                   S. A. Jarvis   On the Acceleration of Wavefront
                                  Applications using Distributed Many-Core
                                  Architectures  . . . . . . . . . . . . . 138--153
                  Xingfu Wu and   
                 Valerie Taylor   Performance Characteristics of Hybrid
                                  MPI/OpenMP Implementations of NAS
                                  Parallel Benchmarks SP and BT on
                                  Large-Scale Multicore Clusters . . . . . 154--167
                M. B. Giles and   
             G. R. Mudalige and   
                  Z. Sharif and   
                 G. Markall and   
                 P. H. J. Kelly   Performance Analysis and Optimization of
                                  the OP2 Framework on Many-Core
                                  Architectures  . . . . . . . . . . . . . 168--180
              Ming-yu Hsieh and   
                Rolf Riesen and   
             Kevin Thompson and   
               William Song and   
                 Arun Rodrigues   SST: a Scalable Parallel Framework for
                                  Architecture-Level Performance, Power,
                                  Area and Thermal Simulation  . . . . . . 181--191
       Simon McIntosh-Smith and   
               Terry Wilson and   
Amaurys Ávila Ibarra and   
             Jonathan Crisp and   
            Richard B. Sessions   Benchmarking Energy Efficiency, Power
                                  Costs and Carbon Emissions on
                                  Heterogeneous Systems  . . . . . . . . . 192--205
            Sandeep Budanur and   
              Frank Mueller and   
                   Todd Gamblin   Memory Trace Compression and Replay for
                                  SPMD Systems Using Extended PRSDs  . . . 206--217
Sergio González-Valenzuela and   
               Son T. Vuong and   
             Victor C. M. Leung   Leveraging Service Discovery in MANETs
                                  with Mobile Directories  . . . . . . . . 218--231
             Dong-Heon Jung and   
              Soo-Mook Moon and   
                  Sung-Hwan Bae   Evaluation of a Java Ahead-of-Time
                                  Compiler for Embedded Systems  . . . . . 232--252

The Computer Journal
Volume 55, Number 3, March, 2012

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 253--255
              Jason J. Jung and   
            Dariusz Król   Editorial: Engineering Knowledge and
                                  Semantic Systems . . . . . . . . . . . . 256--257
             Grzegorz Kukla and   
        Przemyslaw Kazienko and   
        Piotr Bródka and   
              Tomasz Filipowski   Soclake: Social Latent Knowledge
                                  Explorator . . . . . . . . . . . . . . . 258--276
                  ZongDa Wu and   
                GuanDong Xu and   
              YanChun Zhang and   
                Peter Dolog and   
                   ChengLang Lu   An Improved Contextual Advertising
                                  Matching Approach based on Wikipedia
                                  Knowledge  . . . . . . . . . . . . . . . 277--292
             Olcay Taner Yildiz   Univariate Decision Tree Induction using
                                  Maximum Margin Classification  . . . . . 293--298
         Gerasimos Spanakis and   
            Georgios Siolas and   
           Andreas Stafylopatis   Exploiting Wikipedia Knowledge for
                                  Conceptual Hierarchical Clustering of
                                  Documents  . . . . . . . . . . . . . . . 299--312
             Mariano Rivera and   
               Oscar Dalmau and   
             Washington Mio and   
      Alonso Ramirez-Manzanares   Spatial Sampling for Image Segmentation  313--324
            Hideki Katagiri and   
           Ichiro Nishizaki and   
         Tomohiro Hayashida and   
                Takanori Kadoma   Multiobjective Evolutionary Optimization
                                  of Training and Topology of Recurrent
                                  Neural Networks for Time-Series
                                  Prediction . . . . . . . . . . . . . . . 325--336
                  Jason J. Jung   Discovering Community of Lingual
                                  Practice for Matching Multilingual Tags
                                  from Folksonomies  . . . . . . . . . . . 337--346
              Muhammad Raza and   
    Farookh Khadeer Hussain and   
           Omar Khadeer Hussain   Neural Network-Based Approach for
                                  Predicting Trust Values Based on
                                  Non-uniform Input in Mobile Applications 347--378

The Computer Journal
Volume 55, Number 4, April, 2012

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 379--381
                 Jiankun Hu and   
                 Yang Xiang and   
                    Wanlei Zhou   Advances in Network and System Security:
                                  Editorial Statement  . . . . . . . . . . 382--383
       Leonardo B. Oliveira and   
                Aman Kansal and   
 Conrado P. L. Gouvêa and   
            Diego F. Aranha and   
         Julio López and   
            Bodhi Priyantha and   
            Michel Goraczko and   
                      Feng Zhao   Secure-TWS: Authenticating Node to
                                  Multi-user Communication in Shared
                                  Sensor Networks  . . . . . . . . . . . . 384--396
       Udaya Kiran Tupakula and   
             Vijay Varadharajan   Dynamic State-Based Security
                                  Architecture for Detecting Security
                                  Attacks in Virtual Machines  . . . . . . 397--409
                    Shui Yu and   
                Wanlei Zhou and   
                 Weijia Jia and   
                     Jiankun Hu   Attacking Anonymous Web Browsing at
                                  Local Area Networks Through Browsing
                                  Dynamics . . . . . . . . . . . . . . . . 410--421
                Xiaoxun Sun and   
                   Hua Wang and   
                 Jiuyong Li and   
                  Yanchun Zhang   Satisfying Privacy Requirements Before
                                  Data Anonymization . . . . . . . . . . . 422--437
                Biming Tian and   
                   Song Han and   
               Sazia Parvin and   
                 Jiankun Hu and   
                      Sajal Das   Erratum: Self-Healing Key Distribution
                                  Schemes for Wireless Networks: a Survey  438--438
                  Hung-Yu Chien   Improved Anonymous Multi-receiver
                                  Identity-Based Encryption  . . . . . . . 439--446
              Xiangyang Luo and   
                 Fenlin Liu and   
              Chunfang Yang and   
                Shiguo Lian and   
                   Daoshun Wang   On F5 Steganography in Images  . . . . . 447--456
                Xinyi Huang and   
                      Yi Mu and   
               Willy Susilo and   
             Duncan S. Wong and   
                         Wei Wu   Certificateless Signatures: New Schemes
                                  and Security Models  . . . . . . . . . . 457--474
              Yuh-Min Tseng and   
                  Tung-Tso Tsai   Efficient Revocable ID-Based Encryption
                                  with a Public Channel  . . . . . . . . . 475--486
                   Lina Zhu and   
                    Li Feng and   
                 Zuochang Zhang   Predicting the Propagation Path of
                                  Random Worm by Subnet Infection
                                  Situation Using Fuzzy Reasoning  . . . . 487--496
             Lanfranco Lopriore   Encrypted Pointers in Protection System
                                  Design . . . . . . . . . . . . . . . . . 497--507

The Computer Journal
Volume 55, Number 5, May, 2012

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 509--511
                 Nihal Pekergin   Introduction to the Special Issue on
                                  Probability Models in Performance
                                  Analysis . . . . . . . . . . . . . . . . 512--514
                  Peter Whittle   Neural Memories and Oscillatory
                                  Operation  . . . . . . . . . . . . . . . 515--521
                 Azaria Paz and   
                Jack W. Carlyle   Chaotic Evolution via Generalized
                                  Probabilistic Automata (Probabilistic
                                  Arrays)  . . . . . . . . . . . . . . . . 522--533
           Tien Viet Nguyen and   
       François Baccelli   A Stochastic Geometry Model for
                                  Cognitive Radio Networks . . . . . . . . 534--552
              Emmanuel Hyon and   
               Alain Jean-Marie   Scheduling Services in a Queuing System
                                  with Impatience and Setup Costs  . . . . 553--563
            H. Castel-Taleb and   
           I. Ismael-Aouled and   
                    N. Pekergin   Bounding Aggregations for Transient and
                                  Stationary Performance Analysis of
                                  Subnetworks  . . . . . . . . . . . . . . 564--576
             Thu-Ha Dao-Thi and   
       Jean-Michel Fourneau and   
                  Minh-Anh Tran   Erratum: Multiple Class Symmetric
                                  G-networks with Phase Type Service Times 577--577
       Mehmet Hakan Karaata and   
            Ozgur Sinanoglu and   
                 Bader AlBdaiwi   An Optimal Inherently Stabilizing
                                  $2$-Neighborhood Crash Resilient
                                  Protocol for Secure and Reliable Routing
                                  in Hypercube Networks  . . . . . . . . . 578--589
        Jakub Stárka and   
             Martin Svoboda and   
                 Jan Sochna and   
       Jirí Schejbal and   
Irena Mlýnková and   
          David Bednárek   Analyzer: a Complex System for Data
                                  Analysis . . . . . . . . . . . . . . . . 590--615
           Supriya Aggarwal and   
                   Kavita Khare   Design Techniques Targeting
                                  Low-Area-Power-Delay Product in
                                  Hyperbolic CORDIC Algorithm  . . . . . . 616--628
        Samuel Antão and   
         Jean-Claude Bajard and   
                   Leonel Sousa   RNS-Based Elliptic Curve Point
                                  Multiplication for Massive Parallel
                                  Architectures  . . . . . . . . . . . . . 629--647

The Computer Journal
Volume 55, Number 6, June, 2012

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 649--650
         Wojciech Mazurczyk and   
         Krzysztof Szczypiorski   Toward Effective and Reliable Digital
                                  Forensics  . . . . . . . . . . . . . . . 651--652
            Jacques M. Bahi and   
Jean-François Couchot and   
              Christophe Guyeux   Steganography: a Class of Secure and
                                  Robust Algorithms  . . . . . . . . . . . 653--666
           Gaurav Bhatnagar and   
          Q. M. Jonathan Wu and   
          Balasubramanian Raman   Image and Video Encryption based on Dual
                                  Space-Filling Curves . . . . . . . . . . 667--685
              Xiaofeng Wang and   
              Nanning Zheng and   
                 Jianru Xue and   
                     Zhenli Liu   A Novel Image Signature Method for
                                  Content Authentication . . . . . . . . . 686--701
                   Hui Tian and   
                 Hong Jiang and   
                    Ke Zhou and   
                       Dan Feng   Transparency-Orientated Encoding
                                  Strategies for Voice-over-IP
                                  Steganography  . . . . . . . . . . . . . 702--716
              Chunfang Yang and   
                 Fenlin Liu and   
                Shiguo Lian and   
              Xiangyang Luo and   
                   Daoshun Wang   Weighted Stego-Image Steganalysis of
                                  Messages Hidden into Each Bit Plane  . . 717--727
          Ronaldo M. Salles and   
          Donato A. Marino, Jr.   Strategies and Metric for Resilience in
                                  Computer Networks  . . . . . . . . . . . 728--739
       João V. Gomes and   
  Pedro R. M. Inácio and   
            Manuela Pereira and   
     Mário M. Freire and   
              Paulo P. Monteiro   Exploring Behavioral Patterns Through
                                  Entropy in Multimedia Peer-to-Peer
                                  Traffic  . . . . . . . . . . . . . . . . 740--755
             Chao-Hsien Lee and   
           Chung-Ming Huang and   
            Chia-Ching Yang and   
                Tai-Hsiang Wang   CO-SVC-MDC-Based Cooperative Video
                                  Streaming Over Vehicular Networks  . . . 756--768
            Antoine Bossard and   
                 Keiichi Kaneko   The Set-to-Set Disjoint-Path Problem in
                                  Perfect Hierarchical Hypercubes  . . . . 769--775

The Computer Journal
Volume 55, Number 7, July, 2012

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 777--778
                Simon Lavington   A Synopsis of the Book \booktitleAlan
                                  Turing and his Contemporaries: Building
                                  the World's First Computers  . . . . . . 779--787
                     P. Whittle   A Natural Channel Coding for the Finite
                                  and Infinite Time Axes . . . . . . . . . 788--798
               Peter J. Denning   Reflections on a Symposium on
                                  Computation  . . . . . . . . . . . . . . 799--802
           Peter J. Denning and   
                   Peter Wegner   Introduction to What is Computation  . . 803--804
               Peter J. Denning   Opening Statement: What is Computation?  805--810
                   Peter Wegner   The Evolution of Computation . . . . . . 811--813
                 John S. Conery   Computation is Symbol Manipulation . . . 814--816
              Dennis J. Frailey   Computation is Process . . . . . . . . . 817--819
             Paul S. Rosenbloom   Computing and Computation  . . . . . . . 820--824
                  Ruzena Bajcsy   Computation and Information  . . . . . . 825--825
                     Dave Bacon   Computation and Fundamental Physics  . . 826--829
                  Lance Fortnow   The Enduring Legacy of the Turing
                                  Machine  . . . . . . . . . . . . . . . . 830--831
                  Alfred V. Aho   Computation and Computational Thinking   832--835
                   Joseph Traub   What is the Right Computational Model
                                  for Continuous Scientific Problems?  . . 836--837
               Jeffrey P. Buzen   Computation, Uncertainty and Risk  . . . 838--847
                   Erol Gelenbe   Natural Computation  . . . . . . . . . . 848--851
               Melanie Mitchell   Biological Computation . . . . . . . . . 852--855
                   Paolo Rocchi   What is Information: Beyond the Jungle
                                  of Information Theories  . . . . . . . . 856--860
               Peter A. Freeman   Consideration of the Question ``What Is
                                  Computation'' Considered Harmful . . . . 861--862
               Peter J. Denning   Closing Statement: What Have We Said
                                  About Computation? . . . . . . . . . . . 863--865
              Jane Hillston and   
           Mirco Tribastone and   
                Stephen Gilmore   Stochastic Process Algebras: from
                                  Individuals to Populations . . . . . . . 866--881
          Jeremy T. Bradley and   
               Nigel Thomas and   
          Richard A. Hayden and   
                 Anton Stefanek   Invited Response to Computer Journal
                                  Lecture by Prof. Jane Hillston . . . . . 882--886
                     Jinhai Cai   Robust Filtering-Based Thinning
                                  Algorithm for Pattern Recognition  . . . 887--896
                    Jie Lin and   
                    Don Adjeroh   All-Against-All Circular Pattern
                                  Matching . . . . . . . . . . . . . . . . 897--906

The Computer Journal
Volume 55, Number 8, August, 2012

               Bharat Jayaraman   Special Issue on Security and
                                  Performance of Networks and Clouds:
                                  Guest Editor's Introduction  . . . . . . 907--908
             Rachit Agarwal and   
             Abhik Banerjee and   
           Vincent Gauthier and   
             Monique Becker and   
              Chai Kiat Yeo and   
                    Bu Sung Lee   Achieving Small-World Properties using
                                  Bio-Inspired Techniques in Wireless
                                  Networks . . . . . . . . . . . . . . . . 909--931
                    Yan Sun and   
            Qiangfeng Jiang and   
                 Mukesh Singhal   A Hill-Area-Restricted Geographic
                                  Routing Protocol for Mobile Ad Hoc and
                                  Sensor Networks  . . . . . . . . . . . . 932--949
        Omer H. Abdelrahman and   
                   Erol Gelenbe   Packet Delay and Energy Consumption in
                                  Non-homogeneous Networks . . . . . . . . 950--964
                Hongfang Yu and   
               Vishal Anand and   
                  Chunming Qiao   Virtual Infrastructure Design for
                                  Surviving Physical Link Failures . . . . 965--978
       Antonio Muñoz and   
            Javier Gonzalez and   
            Antonio Maña   A Performance-Oriented Monitoring System
                                  for Security Properties in Cloud
                                  Computing Applications . . . . . . . . . 979--994
               Timothy Wood and   
         K. K. Ramakrishnan and   
            Prashant Shenoy and   
          Jacobus Van der Merwe   Enterprise-Ready Virtual Cloud Pools:
                                  Vision, Opportunities and Challenges . . 995--1004
Shivsubramani Krishnamoorthy and   
            Preeti Bhargava and   
                Matthew Mah and   
                 Ashok Agrawala   Representing and Managing the Context of
                                  a Situation  . . . . . . . . . . . . . . 1005--1019

The Computer Journal
Volume 55, Number 9, September, 2012

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 1021--1022
                Mark Burgin and   
                Eugene Eberbach   Evolutionary Automata: Expressiveness
                                  and Convergence of Evolutionary
                                  Computation  . . . . . . . . . . . . . . 1023--1029
                  Yang Wang and   
                     Lin Wu and   
               Xiaodi Huang and   
                     Xuemin Lin   Human Action Recognition from Video
                                  Sequences by Enforcing Tri-view
                                  Constraints  . . . . . . . . . . . . . . 1030--1040
              Iyad F. Jafar and   
          Khalid A. Darabkh and   
             Ghazi M. Al-Sukkar   A Rule-Based Fuzzy Inference System for
                                  Adaptive Image Contrast Enhancement  . . 1041--1057
               Jianping Gou and   
                   Zhang Yi and   
                     Lan Du and   
                  Taisong Xiong   A Local Mean-Based $k$-Nearest Centroid
                                  Neighbor Classifier  . . . . . . . . . . 1058--1071
       Alex Pappachen James and   
                Sima Dimitrijev   Nearest Neighbor Classifier Based on
                                  Nearest Feature Decisions  . . . . . . . 1072--1087
                Zhang Zhang and   
                  Jun Cheng and   
                     Jun Li and   
                   Wei Bian and   
                    Dacheng Tao   Segment-Based Features for Time Series
                                  Classification . . . . . . . . . . . . . 1088--1102
                     Kui Yu and   
                 Xindong Wu and   
                   Wei Ding and   
                       Hao Wang   Exploring Causal Relationships with
                                  Streaming Features . . . . . . . . . . . 1103--1117
                    I-Ching Hsu   Semantic Tag-based Profile Framework for
                                  Social Tagging Systems . . . . . . . . . 1118--1129
             Paul Conilione and   
                   Dianhui Wang   Fuzzy Approach for Semantic Face Image
                                  Retrieval  . . . . . . . . . . . . . . . 1130--1145

The Computer Journal
Volume 55, Number 10, October, 2012

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 1147--1147
               Manoj Thomas and   
               Gurpreet Dhillon   Interpreting Deep Structures of
                                  Information Systems Security . . . . . . 1148--1156
                     Wei Wu and   
                      Yi Mu and   
               Willy Susilo and   
                Xinyi Huang and   
                          Li Xu   A Provably Secure Construction of
                                  Certificate-Based Encryption from
                                  Certificateless Encryption . . . . . . . 1157--1168
              Yu-Fang Chung and   
                     Zhen-Yu Wu   Casting Ballots over Internet Connection
                                  Against Bribery and Coercion . . . . . . 1169--1179
                   Chang Xu and   
                 Zhoujun Li and   
                      Yi Mu and   
                    Hua Guo and   
                        Tao Guo   Affiliation-Hiding Authenticated
                                  Asymmetric Group Key Agreement . . . . . 1180--1191
                   Lin Ding and   
                       Jie Guan   Cryptanalysis of Loiss Stream Cipher . . 1192--1201
               Jinguang Han and   
               Willy Susilo and   
                      Yi Mu and   
                        Jun Yan   Attribute-Based Oblivious Access Control 1202--1215
                  Derek Pao and   
                      Xing Wang   Multi-Stride String Searching for
                                  High-Speed Content Inspection  . . . . . 1216--1231
                 Hyejin Son and   
               Taeyoon Kang and   
               Hwangnam Kim and   
              Jong-Bae Park and   
                  Jae Hyung Roh   A Fair and Secure Bandwidth Allocation
                                  for Ami Mesh Network in Smart Grid . . . 1232--1243
Nimalaprakasan Skandhakumar and   
                 Jason Reid and   
                  Ed Dawson and   
          Robin Drogemuller and   
                   Farzad Salim   An Authorization Framework using
                                  Building Information Models  . . . . . . 1244--1264
       João V. Gomes and   
  Pedro R. M. Inácio and   
            Manuela Pereira and   
     Mário M. Freire and   
              Paulo P. Monteiro   Corrigendum: Exploring Behavioral
                                  Patterns Through Entropy in Multimedia
                                  Peer-to-Peer Traffic . . . . . . . . . . 1265--1265
             Paul S. Rosenbloom   Erratum: Computing and Computation . . . 1266--1266

The Computer Journal
Volume 55, Number 11, November, 2012

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 1267--1269
                 Haitao Dan and   
              Robert M. Hierons   Controllability Problems in MSC-Based
                                  Testing  . . . . . . . . . . . . . . . . 1270--1287
               Suraj Pandey and   
                 Rajkumar Buyya   Scheduling Workflow Applications Based
                                  on Multi-source Parallel Data Retrieval
                                  in Distributed Computing Networks  . . . 1288--1308
          Winfried K. Grassmann   A Computer Built with Relays and a
                                  Mechanical Memory, and Algol . . . . . . 1309--1316
         Tayfun Kucukyilmaz and   
                   Ata Turk and   
                 Cevdet Aykanat   A Parallel Framework for In-Memory
                                  Construction of Term-Partitioned
                                  Inverted Indexes . . . . . . . . . . . . 1317--1330
                 Doohwan Oh and   
                      Won W. Ro   Multi-Threading and Suffix Grouping on
                                  Massive Multiple Pattern Matching
                                  Algorithm  . . . . . . . . . . . . . . . 1331--1346
            Shmuel T. Klein and   
                   Dana Shapira   The String-to-Dictionary Matching
                                  Problem  . . . . . . . . . . . . . . . . 1347--1356
                 Mina Memar and   
             Mahmood Deypir and   
   Mohammad Hadi Sadreddini and   
      Seyyed Mostafa Fakhrahmad   An Efficient Frequent Itemset Mining
                                  Method over High-speed Data Streams  . . 1357--1366
              Hyungjung Seo and   
                 Jaewon Seo and   
                    Taewhan Kim   Algorithms for Combined Inter- and
                                  Intra-Task Dynamic Voltage Scaling . . . 1367--1382
                   Jie Ding and   
                  Jane Hillston   Numerically Representing Stochastic
                                  Process Algebra Models . . . . . . . . . 1383--1397
          Matthias Weidlich and   
              Remco Dijkman and   
                  Mathias Weske   Behaviour Equivalence and Compatibility
                                  of Business Process Models with Complex
                                  Correspondences  . . . . . . . . . . . . 1398--1418

The Computer Journal
Volume 55, Number 12, December, 2012

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 1419--1419
       Mohamed Adel Serhani and   
       Abdelghani Benharref and   
              Elarbi Badidi and   
                  Salah Bouktif   Scalable Federated Broker Management for
                                  Selection of Web Services  . . . . . . . 1420--1439
            Antoine Bossard and   
                 Keiichi Kaneko   Node-to-Set Disjoint-Path Routing in
                                  Hierarchical Cubic Networks  . . . . . . 1440--1446
              Oguzhan Erdem and   
Cüneyt F. Bazlamaçci   High-performance IP Lookup Engine with
                                  Compact Clustered Trie Search  . . . . . 1447--1466
             Chuan-Gang Liu and   
             Chih-Hung Chao and   
              Chih-Wen Leou and   
                  Jung-Shian Li   Iterative Key Distribution Based on Mad
                                  Neighborhood in Underwater Mobile Sensor
                                  Networks . . . . . . . . . . . . . . . . 1467--1485
                   Dan Wang and   
                Xiaowei Han and   
                  Hong Yang and   
                     Binbin Hao   On Global Adaptive Synchronization in
                                  Weighted Complex Networks  . . . . . . . 1486--1491
                  Debraj De and   
              Wen-Zhan Song and   
               Shaojie Tang and   
                     Diane Cook   EAR: an Energy and Activity-Aware
                                  Routing Protocol for Wireless Sensor
                                  Networks in Smart Environments . . . . . 1492--1506
       Fabíola Greve and   
                Pierre Sens and   
            Luciana Arantes and   
         Véronique Simon   Eventually Strong Failure Detector with
                                  Unknown Membership . . . . . . . . . . . 1507--1524
                Ozgur Sinanoglu   Fault Model Independent, Maximal
                                  Compaction of Test Responses in the
                                  Presence of Unknown Response Bits  . . . 1525--1537


The Computer Journal
Volume 56, Number 1, January, 2013

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 1--1
               Jan Bergstra and   
                Jens Blanck and   
               Faron Moller and   
                    Stan Wainer   Guest Editorial  . . . . . . . . . . . . 2--2
            Jan A. Bergstra and   
                Inge Bethke and   
                    Alban Ponse   Cancellation Meadows: a Generic Basis
                                  Theorem and Some Applications  . . . . . 3--14
              Nick D. James and   
                 Jeffery Zucker   A Class of Contracting Stream Operators  15--33
               Maciej Gazda and   
                    Wan Fokkink   Turning GSOS Rules into Equations for
                                  Linear Time-Branching Time Semantics . . 34--44
                    Jens Blanck   Interval Domains and Computable
                                  Sequences: a Case Study of Domain
                                  Reductions . . . . . . . . . . . . . . . 45--52
           Bernhard Möller   Modal Knowledge and Game Semirings . . . 53--69
          Zoran \Dbaruri\'c and   
             Dragan Ga\vsevi\'c   A Source Code Similarity System for
                                  Plagiarism Detection . . . . . . . . . . 70--86
    Estefanía Serral and   
             Pedro Valderas and   
              Vicente Pelechano   Context-Adaptive Coordination of
                                  Pervasive Services by Interpreting
                                  Models during Runtime  . . . . . . . . . 87--114
                 Thi Nguyen and   
                    Zhen He and   
            Yi-Ping Phoebe Chen   S$^e$TPR$^*$-tree: Efficient Buffering
                                  for Spatiotemporal Indexes Via Shared
                                  Execution  . . . . . . . . . . . . . . . 115--137

The Computer Journal
Volume 56, Number 2, February, 2013

                     Irfan Awan   Editorial: Performance Engineering of
                                  Communication Systems and Applications   139--140
               S. A. Wright and   
              S. D. Hammond and   
            S. J. Pennycook and   
                 R. F. Bird and   
              J. A. Herdman and   
                  I. Miller and   
                 A. Vadgama and   
                A. Bhalerao and   
                   S. A. Jarvis   Parallel File System Analysis Through
                                  Application I/O Tracing  . . . . . . . . 141--155
             O. F. J. Perks and   
          D. A. Beckingsale and   
              S. D. Hammond and   
                  I. Miller and   
              J. A. Herdman and   
                 A. Vadgama and   
             A. H. Bhalerao and   
                      L. He and   
                   S. A. Jarvis   Towards Automated Memory Model
                                  Generation Via Event Tracing . . . . . . 156--174
           Malik Jahan Khan and   
        Mian Muhammad Awais and   
                 Shafay Shamail   A Randomized Partitioning Approach for
                                  CBR-Based Autonomic Systems to Improve
                                  Retrieval Performance  . . . . . . . . . 175--183
Constandinos X. Mavromoustakis and   
               Helen D. Karatza   Performance Evaluation of Opportunistic
                                  Resource-Sharing Scheme Using Socially
                                  Oriented Outsourcing in Wireless Devices 184--197
              Ramon Bertran and   
            Marc Gonz\`alez and   
           Xavier Martorell and   
              Nacho Navarro and   
          Eduard Ayguadé   Counter-Based Power Modeling Methods:
                                  Top-Down vs. Bottom-Up . . . . . . . . . 198--213
               Sabela Ramos and   
       Guillermo L. Taboada and   
 Roberto R. Expósito and   
        Juan Touriño and   
            Ramón Doallo   Design of Scalable Java Communication
                                  Middleware for Multi-Core Systems  . . . 214--228
                     Yi Xie and   
                      J. Hu and   
                    S. Tang and   
                       X. Huang   A Forward--Backward Algorithm for Nested
                                  Hidden semi-Markov Model and Application
                                  to Network Traffic . . . . . . . . . . . 229--238
               Pingshan Liu and   
               Guimin Huang and   
            Shengzhong Feng and   
                   Jianping Fan   Event-Driven High-Priority First Data
                                  Scheduling Scheme for P2P VoD Streaming  239--257
               Hongbing Fan and   
                Yu-Liang Wu and   
               Ray C. C. Cheung   Design Automation Framework for
                                  Reconfigurable Interconnection Networks  258--269

The Computer Journal
Volume 56, Number 3, March, 2013

                Einoshin Suzuki   Special Issue on Discovery Science:
                                  Guest Editor's Introduction  . . . . . . 271--273
           Tobias Girschick and   
        Ulrich Rückert and   
                  Stefan Kramer   Adapted Transfer of Distance Measures
                                  for Quantitative Structure-Activity
                                  Relationships and Data-Driven Selection
                                  of Source Datasets . . . . . . . . . . . 274--288
              Laura Langohr and   
             Vid Podpe\vcan and   
                Marko Petek and   
             Igor Mozeti\vc and   
            Kristina Gruden and   
              Nada Lavra\vc and   
                 Hannu Toivonen   Contrasting Subgroup Discovery . . . . . 289--303
          An\vze Vavpeti\vc and   
                  Nada Lavra\vc   Semantic Subgroup Discovery Systems and
                                  Workflows in the SDM-Toolkit . . . . . . 304--320
               Miha Gr\vcar and   
                 Nejc Trdin and   
                  Nada Lavra\vc   A Methodology for Mining
                                  Document-Enriched Heterogeneous
                                  Information Networks . . . . . . . . . . 321--335
             Dongsheng Duan and   
                   Yuhua Li and   
                 Ruixuan Li and   
               Zhengding Lu and   
                     Aiming Wen   MEI: Mutual Enhanced Infinite
                                  Community-Topic Model for Analyzing
                                  Text-Augmented Social Networks . . . . . 336--354
            Hiromichi Nagao and   
           Tomoyuki Higuchi and   
              Satoshi Miura and   
                  Daisuke Inazu   Time-Series Modeling of Tide Gauge
                                  Records for Monitoring of the Crustal
                                  Activities Related to Oceanic Trench
                                  Earthquakes Around Japan . . . . . . . . 355--364
          Nina Gierasimczuk and   
                  Dick de Jongh   On the Complexity of Conclusive Update   365--377
                 Jiuyong Li and   
                  Jixue Liu and   
             Hannu Toivonen and   
                  Jianming Yong   Effective Pruning for the Discovery of
                                  Conditional Functional Dependencies  . . 378--392
               S. R. Kannan and   
             S. Ramthilagam and   
                    R. Devi and   
                 Yueh-Min Huang   Novel Quadratic Fuzzy $c$-Means
                                  Algorithms for Effective Data Clustering
                                  Problems . . . . . . . . . . . . . . . . 393--406

The Computer Journal
Volume 56, Number 4, April, 2013

               Tsz Hon Yuen and   
              Joseph K. Liu and   
                  Man Ho Au and   
               Willy Susilo and   
                  Jianying Zhou   Efficient Linkable and/or Threshold Ring
                                  Signature Without Random Oracles . . . . 407--421
         G. Vache Marconato and   
          M. Kaâniche and   
                   V. Nicomette   A Vulnerability Life Cycle-Based
                                  Security Modeling and Evaluation
                                  Approach . . . . . . . . . . . . . . . . 422--439
                 H. Janicke and   
                     A. Cau and   
                   F. Siewe and   
                       H. Zedan   Dynamic Access Control Policies:
                                  Specification and Verification . . . . . 440--463
               Mingwu Zhang and   
                    Bo Yang and   
                Tsuyoshi Takagi   Bounded Leakage-Resilient Functional
                                  Encryption with Hidden Vector Predicate  464--477
             Lanfranco Lopriore   Protection Structures in Multithreaded
                                  Systems  . . . . . . . . . . . . . . . . 478--496
              Joonsang Baek and   
              Quang Hieu Vu and   
          Abdulhadi Shoufan and   
               Andrew Jones and   
                 Duncan S. Wong   Stateful Public-Key Encryption Schemes
                                  Forward-Secure Against State Exposure    497--507
              Gianluca Dini and   
                   Marco Tiloca   HISS: a HIghly Scalable Scheme for Group
                                  Rekeying . . . . . . . . . . . . . . . . 508--525

The Computer Journal
Volume 56, Number 5, May, 2013

            Marios C. Angelides   Editorial: MPEG Applications and
                                  Services . . . . . . . . . . . . . . . . 527--528
               Luis Herranz and   
José María Martínez   Combining MPEG Tools to Generate Video
                                  Summaries Adapted to the Terminal and
                                  Network  . . . . . . . . . . . . . . . . 529--553
                   R. Iqbal and   
           S. Shirmohammadi and   
                      B. Hariri   Modeling and Evaluation of a
                                  Metadata-Based Adaptive P2P
                                  Video-Streaming System . . . . . . . . . 554--572
Martín López-Nores and   
Yolanda Blanco-Fernández and   
   José Juan Pazos-Arias   Cloud-Based Personalization of New
                                  Advertising and e-Commerce Models for
                                  Video Consumption  . . . . . . . . . . . 573--592
                Harry Agius and   
        Marios C. Angelides and   
            Damon Daylamani Zad   MC 2: a Framework and Service for MPEG-7
                                  Content-Modelling Communities  . . . . . 593--616
               Anish Mittal and   
           Anush K. Moorthy and   
                  Alan C. Bovik   Visually Lossless H.264 Compression of
                                  Natural Videos . . . . . . . . . . . . . 617--627
               D. C. Gibbon and   
                     Z. Liu and   
                   A. Basso and   
                   B. Shahraray   Automated Content Metadata Extraction
                                  Services Based on MPEG Standards . . . . 628--645
           Benjamin J. Ford and   
                 Haiping Xu and   
                    Iren Valova   A Real-Time Self-Adaptive Classifier for
                                  Identifying Suspicious Bidders in Online
                                  Auctions . . . . . . . . . . . . . . . . 646--663
                Martin Richards   How BCPL Evolved from CPL  . . . . . . . 664--670

The Computer Journal
Volume 56, Number 6, June, 2013

                     John Lloyd   Special Issue on Dependable Software
                                  Systems: Associate Editor's Introduction 671--673
              Matthew Leeke and   
              Arshad Jhumka and   
           Sarabjot Singh Anand   Towards the Design of Efficient Error
                                  Detection Mechanisms for Transient Data
                                  Errors . . . . . . . . . . . . . . . . . 674--692
             Miguel Correia and   
        Nuno Ferreira Neves and   
                Paulo Verissimo   BFT-TO: Intrusion Tolerance with Less
                                  Replicas . . . . . . . . . . . . . . . . 693--715
               Wenbing Zhao and   
        P. M. Melliar-Smith and   
                    L. E. Moser   Low Latency Fault Tolerance System . . . 716--740
               Ian J. Hayes and   
                 Alan Burns and   
             Brijesh Dongol and   
                 Cliff B. Jones   Comparing Degrees of Non-Determinism in
                                  Expression Evaluation  . . . . . . . . . 741--755
           Ra'ed Al-Dujaily and   
               Terrence Mak and   
                Kai-Pui Lam and   
                    Fei Xia and   
              Alex Yakovlev and   
                  Chi-Sang Poon   Dynamic On-Chip Thermal Optimization for
                                  Three-Dimensional Networks-On-Chip . . . 756--770
                Jinpyo Hong and   
                   Hwangnam Kim   A Dual Mobility Model with User
                                  Profiling: Decoupling User Mobile
                                  Patterns from Association Patterns . . . 771--784
             Xiaoling Zhang and   
                   Jianguo Qian   $ L(p, q) $-Labeling and Integer Flow on
                                  Planar Graphs  . . . . . . . . . . . . . 785--792

The Computer Journal
Volume 56, Number 7, July, 2013

José Raúl Romero and   
   Juan Ignacio Jaén and   
             Antonio Vallecillo   A Tool for the Model-Based Specification
                                  of Open Distributed Systems  . . . . . . 793--818
           Manuel Abellanas and   
Jose M. Díaz-Báñez and   
 Pablo Pérez-Lantero and   
             Inmaculada Ventura   Locating a Communication Path in a
                                  Competitive Scenario . . . . . . . . . . 819--826
               S. S. Ili\'c and   
                  P. Spalevi\'c   Using Wavelet Packets for Selectivity
                                  Estimation . . . . . . . . . . . . . . . 827--842
              M. Bóo and   
                    M. Amor and   
               R. Concheiro and   
                     M. Doggett   Efficient Adaptive and Dynamic Mesh
                                  Refinement Based on a Non-recursive
                                  Strategy . . . . . . . . . . . . . . . . 843--851
        O\uguzcan Dobrucali and   
                 Billur Barshan   Novel Compression Algorithm Based on
                                  Sparse Sampling of $3$-D Laser Range
                                  Scans  . . . . . . . . . . . . . . . . . 852--870
                Eddie Cheng and   
                     Ke Qiu and   
                  Zhizhang Shen   A Generating Function Approach to the
                                  Edge Surface Area of the Arrangement
                                  Graphs . . . . . . . . . . . . . . . . . 871--881
         Tiziana Calamoneri and   
            Dario Frascaria and   
              Blerina Sinaimeri   All Graphs with at Most Seven Vertices
                                  are Pairwise Compatibility Graphs  . . . 882--886
             E. N. Argyriou and   
                M. A. Bekos and   
                    A. Symvonis   Maximizing the Total Resolution of
                                  Graphs . . . . . . . . . . . . . . . . . 887--900
             Sajjad Mahmood and   
                    Richard Lai   RE-UML: a Component-Based System
                                  Requirements Analysis Language . . . . . 901--922

The Computer Journal
Volume 56, Number 8, August, 2013

                   Min Chen and   
             Victor C. M. Leung   Green Mobile Networking and
                                  Communications . . . . . . . . . . . . . 923--925
                   Wei Gong and   
                  Kebin Liu and   
                  Xiaoxu Li and   
                   Xin Miao and   
                       Tong Zhu   Quality of Interaction for Sensor
                                  Network Energy-Efficient Management  . . 926--937
              Daqiang Zhang and   
                Zhijun Yang and   
        Vaskar Raychoudhury and   
                   Zhe Chen and   
                   Jaime Lloret   An Energy-Efficient Routing Protocol
                                  Using Movement Trends in Vehicular Ad
                                  hoc Networks . . . . . . . . . . . . . . 938--946
                  Jiafu Wan and   
                  Hehua Yan and   
                      Di Li and   
               Keliang Zhou and   
                        Lu Zeng   Cyber-Physical Systems for Optimal
                                  Energy Management Scheme of Autonomous
                                  Electric Vehicle . . . . . . . . . . . . 947--956
                    Kai Lin and   
               Xiaofei Wang and   
                 Limei Peng and   
                       Xuan Zhu   Energy-Efficient $K$-Cover Problem in
                                  Hybrid Sensor Networks . . . . . . . . . 957--967
               Jiaojiao Liu and   
                  Yige Wang and   
                       Gang Wei   Distributed Topology Control Based on
                                  Coalition Formation Game in Wireless
                                  Networks . . . . . . . . . . . . . . . . 968--976
                 Yichao Jin and   
               Yonggang Wen and   
               Qinghua Chen and   
                     Zuqing Zhu   An Empirical Investigation of the Impact
                                  of Server Virtualization on Energy
                                  Efficiency for Green Data Center . . . . 977--990
               Xiaofei Liao and   
                    Hai Jin and   
                     Jia Yu and   
                    Dingding Li   A Performance Optimization Mechanism for
                                  SSD in Virtualized Environment . . . . . 991--1000
                    Lei Lei and   
                  Jing Zhao and   
             Zhangdui Zhong and   
                      Kan Zheng   Flow-Level Analysis of Energy Efficiency
                                  Performance for Device-to-Device
                                  Communications in OFDM Cellular Networks 1001--1009
                 Jing Zhang and   
                    Xi Yang and   
                     Qi Yao and   
                  Xiaohu Ge and   
                   Minho Jo and   
                   Guoqiang Mao   Cooperative Energy Efficiency Modeling
                                  and Performance Analysis in Co-Channel
                                  Interference Cellular Networks . . . . . 1010--1019
               Wei-Ting Cho and   
               Ying-Xun Lai and   
              Chin-Feng Lai and   
                 Yueh-Min Huang   Appliance-Aware Activity Recognition
                                  Mechanism for IoT Energy Management
                                  System . . . . . . . . . . . . . . . . . 1020--1033
                     Yi Sun and   
                   Yang Guo and   
                  Yuming Ge and   
                    Shan Lu and   
                 Jihua Zhou and   
                Eryk Dutkiewicz   Improving the Transmission Efficiency by
                                  Considering Non-Cooperation in Ad Hoc
                                  Networks . . . . . . . . . . . . . . . . 1034--1042

The Computer Journal
Volume 56, Number 9, September, 2013

          Douglas Mota Dias and   
Marco Aurélio C. Pacheco   Quantum-Inspired Linear Genetic
                                  Programming as a Knowledge Management
                                  System . . . . . . . . . . . . . . . . . 1043--1062
               Jianping Gou and   
                       Zhang Yi   Locality-Based Discriminant Neighborhood
                                  Embedding  . . . . . . . . . . . . . . . 1063--1082
            Jamshaid Ashraf and   
       Omar Khadeer Hussain and   
        Farookh Khadeer Hussain   A Framework for Measuring Ontology Usage
                                  on the Web . . . . . . . . . . . . . . . 1083--1101
               Fasheng Wang and   
                      Mingyu Lu   Efficient Visual Tracking via
                                  Hamiltonian Monte Carlo Markov Chain . . 1102--1112
   Eakasit Pacharawongsakda and   
         Thanaruk Theeramunkong   Multi-Label Classification Using
                                  Dependent and Independent Dual Space
                                  Reduction  . . . . . . . . . . . . . . . 1113--1135
          Erwan Le Martelot and   
                   Chris Hankin   Fast Multi-Scale Detection of Relevant
                                  Communities in Large-Scale Networks  . . 1136--1150

The Computer Journal
Volume 56, Number 10, October, 2013

            Young-Sik Jeong and   
            Damien Sauveron and   
                 Jong Hyuk Park   Advanced Security Technologies and
                                  Services for Future Computing
                                  Environments . . . . . . . . . . . . . . 1151--1153
               Guangjie Han and   
              Jinfang Jiang and   
                    Lei Shu and   
             Mohsen Guizani and   
                 Shojiro Nishio   A Two-Step Secure Localization for
                                  Wireless Sensor Networks . . . . . . . . 1154--1166
              Yao-Hsin Chou and   
              Shuo-Mao Chen and   
                Yu-Ting Lin and   
              Chi-Yuan Chen and   
                 Han-Chieh Chao   Using GHZ-State for Multiparty Quantum
                                  Secret Sharing Without Code Table  . . . 1167--1175
                  Bin Zhang and   
                Jiahai Yang and   
                Jianping Wu and   
                      Ziyu Wang   MBST: Detecting Packet-Level Traffic
                                  Anomalies by Feature Stability . . . . . 1176--1188
             Jong-Hyouk Lee and   
                  Thierry Ernst   IPv6 Security Issues in Cooperative
                                  Intelligent Transportation Systems . . . 1189--1197
   Andreu Pere Isern-Dey\`a and   
         Arnau Vives-Guasch and   
     Maci\`a Mut-Puigserver and   
Magdalena Payeras-Capell\`a and   
          Jordi Castell\`a-Roca   A Secure Automatic Fare Collection
                                  System for Time-Based or Distance-Based
                                  Services with Revocable Anonymity for
                                  Users  . . . . . . . . . . . . . . . . . 1198--1215
      Aikaterini Mitrokotsa and   
          Pedro Peris-Lopez and   
      Christos Dimitrakakis and   
                 Serge Vaudenay   On Selecting the Nonce Length in
                                  Distance-Bounding Protocols  . . . . . . 1216--1227
              Yinghui Zhang and   
              Xiaofeng Chen and   
                         Hui Li   Key-Evolving Hierarchical ID-Based
                                  Signcryption . . . . . . . . . . . . . . 1228--1248
                 Yuanju Gan and   
                 Lihua Wang and   
               Licheng Wang and   
                   Ping Pan and   
                    Yixian Yang   Efficient Construction of CCA-Secure
                                  Threshold PKE Based on Hashed
                                  Diffie--Hellman Assumption . . . . . . . 1249--1257
          Gerard Draper-Gil and   
Josep-Lluís Ferrer-Gomila and   
     M. Francisca Hinarejos and   
                  Jianying Zhou   An Asynchronous Optimistic Protocol for
                                  Atomic Multi-Two-Party Contract Signing  1258--1267

The Computer Journal
Volume 56, Number 11, November, 2013

                    Wei Sun and   
                    Tao Wen and   
                       Quan Guo   Improving the Start-up Performance of
                                  the TFRC Protocol  . . . . . . . . . . . 1269--1278
                Massimo Melucci   Deriving a Quantum Information Retrieval
                                  Basis  . . . . . . . . . . . . . . . . . 1279--1291
             Chwan-Yi Shiah and   
                  Yun-Sheng Yen   Compression of Chinese Document Images
                                  by Complex Shape Matching  . . . . . . . 1292--1304
              Robert M. Hierons   Implementation Relations for Testing
                                  Through Asynchronous Channels  . . . . . 1305--1319
                   Mircea Merca   Binary Diagrams for Storing Ascending
                                  Compositions . . . . . . . . . . . . . . 1320--1327
               Bingyue Peng and   
                  Junjie Wu and   
                   Hua Yuan and   
                Qingwei Guo and   
                    Dacheng Tao   ANEEC: a Quasi-Automatic System for
                                  Massive Named Entity Extraction and
                                  Categorization . . . . . . . . . . . . . 1328--1346
               Baolei Cheng and   
                 Jianxi Fan and   
                Xiaohua Jia and   
               Shukui Zhang and   
                   Bangrui Chen   Constructive Algorithm of Independent
                                  Spanning Trees on Möbius Cubes  . . . . . 1347--1362
              Ioannis Dimitriou   Analysis of a Priority Retrial Queue
                                  with Dependent Vacation Scheme and
                                  Application to Power Saving in Wireless
                                  Communication Systems  . . . . . . . . . 1363--1380
      Stephen T. Hedetniemi and   
            David P. Jacobs and   
                  K. E. Kennedy   Linear-Time Self-Stabilizing Algorithms
                                  for Disjoint Independent Sets  . . . . . 1381--1387
                   Ro-Yu Wu and   
             Jou-Ming Chang and   
               An-Hang Chen and   
                 Chun-Liang Liu   Ranking and Unranking $t$-ary Trees in a
                                  Gray-Code Order  . . . . . . . . . . . . 1388--1395

The Computer Journal
Volume 56, Number 12, December, 2013

                 Jacob Beal and   
              Stefan Dulman and   
             Olivier Michel and   
                Antoine Spicher   Editorial  . . . . . . . . . . . . . . . 1397--1398
Avgoustinos Filippoupolitis and   
               Gokce Gorbil and   
                   Erol Gelenbe   Spatial Computers for Emergency Support  1399--1416
       Muhammad Jafar Sadeq and   
               Matt Duckham and   
             Michael F. Worboys   Decentralized Detection of Topological
                                  Events in Evolving Spatial Regions . . . 1417--1431
                  Alan Both and   
               Matt Duckham and   
              Patrick Laube and   
                   Tim Wark and   
                  Jeremy Yeoman   Decentralized Monitoring of Moving
                                  Objects in a Transportation Network
                                  Augmented with Checkpoints . . . . . . . 1432--1449
            David H. Ackley and   
           Daniel C. Cannon and   
              Lance R. Williams   A Movable Architecture for Robust
                                  Spatial Computing  . . . . . . . . . . . 1450--1468
                Qingzhi Liu and   
            Andrei Pruteanu and   
                  Stefan Dulman   Gradient-Based Distance Estimation for
                                  Spatial Computers  . . . . . . . . . . . 1469--1499
                 Jacob Beal and   
                Kyle Usbeck and   
                    Brett Benyo   On the Evaluation of Space--Time
                                  Functions  . . . . . . . . . . . . . . . 1500--1517
           D. Rincón and   
     A. Agustí-Torra and   
               J. F. Botero and   
                 F. Raspall and   
                 D. Remondo and   
              X. Hesselbach and   
                 M. T. Beck and   
                 H. de Meer and   
             F. Niedermeier and   
                    G. Giuliani   A Novel Collaboration Paradigm for
                                  Reducing Energy Consumption and Carbon
                                  Dioxide Emissions in Data Centres  . . . 1518--1536


The Computer Journal
Volume 57, Number 1, January, 2014

    Reinaldo A. Vallejos C. and   
José M. Martínez V.   A Fast Transformation of Markov Chains
                                  and Their Respective Steady-State
                                  Probability Distributions  . . . . . . . 1--11
           Artem Polyvyanyy and   
Luciano García-Bañuelos and   
               Dirk Fahland and   
                  Mathias Weske   Maximal Structuring of Acyclic Process
                                  Models . . . . . . . . . . . . . . . . . 12--35
               Juan de Lara and   
              Esther Guerra and   
                 Ruth Cobos and   
           Jaime Moreno-Llorena   Extending Deep Meta-Modelling for
                                  Practical Model-Driven Engineering . . . 36--58
            Arnold L. Rosenberg   Region Management by Finite-State Robots 59--72
          Michel A. Reniers and   
                Rob Schoren and   
             Tim A. C. Willemse   Results on Embeddings Between
                                  State-Based and Event-Based Systems  . . 73--92
           Jinn-Shyong Yang and   
                 Jou-Ming Chang   Optimal Independent Spanning Trees on
                                  Cartesian Product of Hybrid Graphs . . . 93--99
          Iván Cores and   
   Gabriel Rodríguez and   
   Patricia González and   
  María J. Martín   Failure Avoidance in MPI Applications
                                  Using an Application-Level Approach  . . 100--114
                Yongjian Li and   
                 Naiju Zeng and   
         William N. N. Hung and   
                    Xiaoyu Song   Combining Symmetry Reduction with
                                  Generalized Symbolic Trajectory
                                  Evaluation . . . . . . . . . . . . . . . 115--128
               K. Subramani and   
              James Worthington   On Certifying Instances of
                                  Zero-Clairvoyant Scheduling  . . . . . . 129--137
                 Alev Mutlu and   
                   Pinar Senkul   Improving Hit Ratio of ILP-based Concept
                                  Discovery System with Memoization  . . . 138--153
                 Kewen Liao and   
                      Hong Shen   LP-Based Approximation Algorithms for
                                  Reliable Resource Allocation . . . . . . 154--164
          Oana Agrigoroaiei and   
                Gabriel Ciobanu   Rewriting Systems Over Indexed Multisets 165--179

The Computer Journal
Volume 57, Number 2, February, 2014

               Jongsung Kim and   
                    Bo Hong and   
             Naveen Chilamkurti   Advanced Computer Technologies and
                                  Applications in Grid and Cloud Computing 181--182
                Haibin Zhai and   
             Albert K. Wong and   
                  Hai Jiang and   
                     Yi Sun and   
                     Jun Li and   
                  Zhongcheng Li   A Node-Link-Based P2P Cache Deployment
                                  Algorithm in ISP Networks  . . . . . . . 183--194
               Ahmed Sallam and   
                       Kenli Li   A Multi-objective Virtual Machine
                                  Migration Policy in Cloud Systems  . . . 195--204
                 Aun Irtaza and   
            M. Arfan Jaffar and   
         Muhammad Tariq Mahmood   Semantic Image Retrieval in a Grid
                                  Computing Environment Using Support
                                  Vector Machines  . . . . . . . . . . . . 205--216
             Hong-Chang Lee and   
              Jong-Eun Park and   
                 Myung-Joon Lee   C3ware: a Middleware Supporting
                                  Collaborative Services over Cloud
                                  Storage  . . . . . . . . . . . . . . . . 217--224
                    Lin Yao and   
                  Guowei Wu and   
               Jiankang Ren and   
                 Yanwei Zhu and   
                        Ying Li   Guaranteeing Fault-Tolerant Requirement
                                  Load Balancing Scheme Based on VM
                                  Migration  . . . . . . . . . . . . . . . 225--232
             Joon-Sang Park and   
             Seung Jun Baek and   
                      Kyogu Lee   A Highly Parallelized Decoder for Random
                                  Network Coding leveraging GPGPU  . . . . 233--240
               Ayad Ibrahim and   
                    Hai Jin and   
              Ali A. Yassin and   
                 Deqing Zou and   
                        Peng Xu   Towards Efficient Yet Privacy-Preserving
                                  Approximate Search in Cloud Computing    241--254
              Hong-Yi Chang and   
                Hsin-Che Lu and   
              Yu-Huei Huang and   
               Yuan-Wei Lin and   
                  Yih-Jou Tzang   Novel Auction Mechanism with Factor
                                  Distribution Rule for Cloud Resource
                                  Allocation . . . . . . . . . . . . . . . 255--262
              Yong Tae Park and   
            Pranesh Sthapit and   
                 Jae-Young Pyun   Energy Efficient Data Fragmentation for
                                  Ubiquitous Computing . . . . . . . . . . 263--272
                Juan Caubet and   
 Carlos Gañán and   
              Oscar Esparza and   
       Jose L. Muñoz and   
     Jorge Mata-Díaz and   
                   Juanjo Alins   Certificate Revocation List Distribution
                                  System for the KAD Network . . . . . . . 273--280
               Neeraj Kumar and   
         Naveen Chilamkurti and   
           Sherali Zeadally and   
                Young-Sik Jeong   Achieving Quality of Service (QoS) Using
                                  Resource Allocation and Adaptive
                                  Scheduling in Cloud Computing with Grid
                                  Support  . . . . . . . . . . . . . . . . 281--290
                Zhipiao Liu and   
            Shangguang Wang and   
                   Qibo Sun and   
                    Hua Zou and   
                  Fangchun Yang   Cost-Aware Cloud Service Request
                                  Scheduling for SaaS Providers  . . . . . 291--301
                 Hwamin Lee and   
                   Doosoon Park   A Grid Service-Based Virtual Screening
                                  System . . . . . . . . . . . . . . . . . 302--307
           Tien-Dung Nguyen and   
             An Thuy Nguyen and   
            Man Doan Nguyen and   
             Mui Van Nguyen and   
                    Eui-Nam Huh   An Improvement of Resource Allocation
                                  for Migration Process in Cloud
                                  Environment  . . . . . . . . . . . . . . 308--318
                    D. Piso and   
                 J. D. Bruguera   Obtaining Accurate Error Expressions and
                                  Bounds for Floating-Point Multiplicative
                                  Algorithms . . . . . . . . . . . . . . . 319--331
            Antoine Bossard and   
                 Keiichi Kaneko   Set-to-Set Disjoint Paths Routing in
                                  Hierarchical Cubic Networks  . . . . . . 332--337

The Computer Journal
Volume 57, Number 3, March, 2014

              Hyun-Chul Kim and   
                Jaewook Lee and   
                     Daewon Lee   Transductive Gaussian Processes with
                                  Applications to Object Pose Estimation   339--346
               Fabrizio Riguzzi   Speeding Up Inference for Probabilistic
                                  Logic Programs . . . . . . . . . . . . . 347--363
                 Linjia Sun and   
              Xiaohui Liang and   
                   Qinping Zhao   Recursive Templates Segmentation and
                                  Exemplars Matching for Human Parsing . . 364--377
           Beaux P. Sharifi and   
            David I. Inouye and   
                Jugal K. Kalita   Summarization of Twitter Microblogs  . . 378--402
              Rachel Chasin and   
             Daryl Woodward and   
              Jeremy Witmer and   
                   Jugal Kalita   Extracting and Displaying Temporal and
                                  Geospatial Entities from Articles on
                                  Historical Events  . . . . . . . . . . . 403--426
                John Reeder and   
          Michael Georgiopoulos   Generative Neural Networks for
                                  Multi-task Life-Long Learning  . . . . . 427--450
          Pitipong Chanloha and   
     Jatuporn Chinrungrueng and   
              Wipawee Usaha and   
                Chaodit Aswakul   Cell Transmission Model-Based Multiagent
                                  Q-Learning for Network-Scale Signal
                                  Control With Transit Priority  . . . . . 451--468
               Ahmed Kheiri and   
               Ender Özcan   Constructing Constrained-Version of
                                  Magic Squares Using Selection
                                  Hyper-heuristics . . . . . . . . . . . . 469--479

The Computer Journal
Volume 57, Number 4, April, 2014

                 Fuchun Guo and   
                      Yi Mu and   
               Willy Susilo and   
             Vijay Varadharajan   Server-Aided Signature Verification for
                                  Lightweight Devices  . . . . . . . . . . 481--493
            Salman Niksefat and   
           Babak Sadeghiyan and   
            Payman Mohassel and   
                Saeed Sadeghian   ZIDS: a Privacy-Preserving Intrusion
                                  Detection System Using Secure Two-Party
                                  Computation Protocols  . . . . . . . . . 494--509
Juan Manuel González Nieto and   
               Mark Manulis and   
                   Dongdong Sun   Forward-Secure Hierarchical Predicate
                                  Encryption . . . . . . . . . . . . . . . 510--536
          Monowar H. Bhuyan and   
              H. J. Kashyap and   
        D. K. Bhattacharyya and   
                   J. K. Kalita   Detecting Distributed Denial of Service
                                  Attacks: Methods, Tools and Future
                                  Directions . . . . . . . . . . . . . . . 537--556
                    Tao Han and   
              Weiming Zhang and   
                  Chao Wang and   
                 Nenghai Yu and   
                     Yuefei Zhu   Adaptive $ \pm 1 $ Steganography in
                                  Extended Noisy Region  . . . . . . . . . 557--566
               Shengke Zeng and   
                 Shaoquan Jiang   A New Framework for Conditionally
                                  Anonymous Ring Signature . . . . . . . . 567--578
               Jinguang Han and   
               Willy Susilo and   
                      Yi Mu and   
                        Jun Yan   Attribute-Based Data Transfer with
                                  Filtering Scheme in Cloud Computing  . . 579--591
                 Limin Shen and   
                Futai Zhang and   
                     Yinxia Sun   Efficient Revocable Certificateless
                                  Encryption Secure in the Standard Model  592--601
             Prasanta Gogoi and   
        D. K. Bhattacharyya and   
                   B. Borah and   
                Jugal K. Kalita   MLH-IDS: a Multi-Level Hybrid Intrusion
                                  Detection Method . . . . . . . . . . . . 602--623
       Faezeh Sadat Babamir and   
                    Ali Norouzi   Achieving Key Privacy and Invisibility
                                  for Unattended Wireless Sensor Networks
                                  in Healthcare  . . . . . . . . . . . . . 624--635
                    Huaqun Wang   Insecurity of `Improved Anonymous
                                  Multi-Receiver Identity-Based
                                  Encryption'  . . . . . . . . . . . . . . 636--638

The Computer Journal
Volume 57, Number 5, May, 2014

               Joshua Amavi and   
    Béatrice Bouchou and   
                   Agata Savary   On Correcting XML Documents with Respect
                                  to a Schema  . . . . . . . . . . . . . . 639--674
Rekai González-Alberquilla and   
    Fernando Emmanuel Frati and   
         Luis Piñuel and   
              Karin Strauss and   
                      Luis Ceze   Data Race Detection with Minimal
                                  Hardware Support . . . . . . . . . . . . 675--692
            Victor Khomenko and   
                  Andrey Mokhov   Direct Construction of Complete Merged
                                  Processes  . . . . . . . . . . . . . . . 693--707
                   Chao Zhu and   
                  Qiang Zhu and   
                Calisto Zuzarte   Optimization of Monotonic Linear
                                  Progressive Queries Based on Dynamic
                                  Materialized Views . . . . . . . . . . . 708--730
              Kuei-Hao Chen and   
          Guan-Shieng Huang and   
          Richard Chia-Tung Lee   Bit-Parallel Algorithms for Exact
                                  Circular String Matching . . . . . . . . 731--743
                  Lijun Lun and   
                    Xin Chi and   
                         Hui Xu   The Relationship between Forward Slicing
                                  and Backward Slicing for Software
                                  Architecture . . . . . . . . . . . . . . 744--758
            Patrick Graydon and   
                      Iain Bate   Realistic Safety Cases for the Timing of
                                  Systems  . . . . . . . . . . . . . . . . 759--774
                  Rada Chirkova   Combined-Semantics Equivalence and
                                  Minimization of Conjunctive Queries  . . 775--795

The Computer Journal
Volume 57, Number 6, June, 2014

      Juan A. Rodriguez-Aguilar   Special Issue on Optimization in
                                  Multi-Agent Systems: Guest Editor's
                                  Introduction . . . . . . . . . . . . . . 797--798
            Jesus Cerquides and   
       Alessandro Farinelli and   
             Pedro Meseguer and   
          Sarvapali D. Ramchurn   A Tutorial on Optimization for
                                  Multi-Agent Systems  . . . . . . . . . . 799--824
                 Sejoon Lim and   
                    Daniela Rus   Congestion-Aware Multi-Agent Path
                                  Planning: Distributed Algorithm and
                                  Applications . . . . . . . . . . . . . . 825--839
               Hala Mostafa and   
                 Partha Pal and   
                 Patrick Hurley   Message Passing for Distributed
                                  QoS-Security Tradeoffs . . . . . . . . . 840--855
          Meritxell Vinyals and   
       Kathryn S. Macarthur and   
       Alessandro Farinelli and   
      Sarvapali D. Ramchurn and   
           Nicholas R. Jennings   A Message-Passing Approach to
                                  Decentralized Parallel Machine
                                  Scheduling . . . . . . . . . . . . . . . 856--874
          Archie C. Chapman and   
            David S. Leslie and   
                Alex Rogers and   
           Nicholas R. Jennings   Learning in Unknown Reward Games:
                                  Application to Sensor Networks . . . . . 875--892
                 Jason Tsai and   
            Thanh H. Nguyen and   
            Nicholas Weller and   
                   Milind Tambe   Game-Theoretic Target Selection in
                                  Contagion-Based Domains  . . . . . . . . 893--905
         Christian Bessiere and   
                Ismel Brito and   
         Patricia Gutierrez and   
                 Pedro Meseguer   Global Constraints in Distributed
                                  Constraint Satisfaction and Optimization 906--923
              Faisal Iradat and   
             Sergey Andreev and   
               Sayeed Ghani and   
            Syed Irfan Nabi and   
                   Waseem Arain   Revisiting Assumptions in Backoff
                                  Process Modeling and Queueing Analysis
                                  of Wireless Local Area Networks (WLANs)  924--938
               Shih-Chang Huang   D$^2$PS: Direction and Distance
                                  Positioning System in Wireless Networks  939--951

The Computer Journal
Volume 57, Number 7, July, 2014

                  Shan Ling and   
                   Weidong Chen   Node-to-Set Disjoint Paths in Biswapped
                                  Networks . . . . . . . . . . . . . . . . 953--967
              Gloria Ortega and   
   Francisco Vázquez and   
   Inmaculada García and   
         Ester M. Garzón   FastSpMM: an Efficient Library for
                                  Sparse Matrix Matrix Product on GPUs . . 968--979
          Sushanta Karmakar and   
          A. Chandrakanth Reddy   An Improved Algorithm for Distributed
                                  Trigger Counting in Ring . . . . . . . . 980--986
                 Haitao Dan and   
              Robert M. Hierons   The Oracle Problem When Testing from
                                  MSCs . . . . . . . . . . . . . . . . . . 987--1001
            Anthony Danalis and   
             Piotr Luszczek and   
              Gabriel Marin and   
          Jeffrey S. Vetter and   
                  Jack Dongarra   BlackjackBench: Portable Hardware
                                  Characterization with Automated Results'
                                  Analysis . . . . . . . . . . . . . . . . 1002--1016
               Pablo Llopis and   
         Javier Garcia Blas and   
              Florin Isaila and   
                Jesus Carretero   Survey of Energy-Efficient and
                                  Power-Proportional Storage Systems . . . 1017--1032
                   Hui Kong and   
                Xiaoyu Song and   
                   Dong Han and   
                    Ming Gu and   
                   Jiaguang Sun   A New Barrier Certificate for Safety
                                  Verification of Hybrid Systems . . . . . 1033--1045
                Frank Zeyda and   
  Lalkhumsanga Lalkhumsanga and   
             Ana Cavalcanti and   
                  Andy Wellings   Circus Models for Safety-Critical Java
                                  Programs . . . . . . . . . . . . . . . . 1046--1091
               Jiufeng Zhou and   
                  Lixin Han and   
                   Yuan Yao and   
               Xiaoqin Zeng and   
                        Feng Xu   A Parallel Approach to Link Sign
                                  Prediction in Large-Scale Online Social
                                  Networks . . . . . . . . . . . . . . . . 1092--1104
                 Janardan Misra   A Calculus of Incomplete Fusions . . . . 1105--1116

The Computer Journal
Volume 57, Number 8, August, 2014

             Dilek Demirbas and   
              Ismail Akturk and   
               Ozcan Ozturk and   
      U\ugur Güdükbay   Application-Specific Heterogeneous
                                  Network-on-Chip Design . . . . . . . . . 1117--1131
                Arta Babaee and   
                    Moez Draief   Distributed Multivalued Consensus  . . . 1132--1140
                 Libo Huang and   
               Zhiying Wang and   
                  Nong Xiao and   
                      Qiang Dou   Efficient Utilization of SIMD Engines
                                  for General-Purpose Processors . . . . . 1141--1154
              David Poulain and   
             Joanna Tomasik and   
       Marc-Antoine Weisser and   
                Dominique Barth   A Packing Problem Approach to Lightpath
                                  Assignment in an Optical Ring  . . . . . 1155--1166
               Waheed Yasin and   
            Hamidah Ibrahim and   
            Nur Izura Udzir and   
    Nor Asilah Wati Abdul Hamid   An Overview of Media Streams Caching in
                                  Peer-to-Peer Systems . . . . . . . . . . 1167--1177
                    Yan Cui and   
               Yingxin Wang and   
                    Yu Chen and   
                   Yuanchun Shi   Mitigating Resource Contention on
                                  Multicore Systems via Scheduling . . . . 1178--1194
             Wassim Ramadan and   
                 Eugen Dedu and   
               Julien Bourgeois   Oscillation-Free Video Adaptation at
                                  Application Layer on Server Side and
                                  Experiments Using DCCP . . . . . . . . . 1195--1210
               Pingshan Liu and   
            Shengzhong Feng and   
               Guimin Huang and   
                   Jianping Fan   Bandwidth-Availability-Based Replication
                                  Strategy for P2P VoD Systems . . . . . . 1211--1229
                  A. Ouqour and   
                 Y. Jabrane and   
             B. Ait Es Said and   
                 A. Ait Ouahman   PAPR Reduction in OFDM via Active
                                  Constellation Extension--Projection Onto
                                  Convex Sets Combined with Particle Swarm
                                  Optimization . . . . . . . . . . . . . . 1230--1237
                Marjan Radi and   
            Behnam Dezfouli and   
    Kamalrulnizam Abu Bakar and   
           Shukor Abd Razak and   
                     Malrey Lee   Network Initialization in Low-Power
                                  Wireless Networks: a Comprehensive Study 1238--1261
Chathuranga Widanapathirana and   
             Jonathan C. Li and   
        Milosh V. Ivanovich and   
        Paul G. Fitzpatrick and   
       Y. Ahmet \cSekercio\uglu   Adaptive Statistical Signatures of
                                  Network Soft-Failures in User Devices    1262--1278

The Computer Journal
Volume 57, Number 9, September, 2014

                Guandong Xu and   
                Aoying Zhou and   
                  Nitin Agarwal   Special Issue on Social Computing and
                                  its Applications . . . . . . . . . . . . 1279--1280
                   Ming Gao and   
                Cheqing Jin and   
               Weining Qian and   
                   Xueqing Gong   Real-time and Personalized Search over a
                                  Microblogging System . . . . . . . . . . 1281--1295
       Micha\l K. Szczerbak and   
    François Toutain and   
          Ahmed Bouabdallah and   
              Jean-Marie Bonnin   KRAMER: New Social Medium Based on
                                  Collaborative Recognition of Important
                                  Situations . . . . . . . . . . . . . . . 1296--1317
                Hongbo Chen and   
                 Jungang Xu and   
                         Ben He   Automated Essay Scoring by Capturing
                                  Relative Writing Quality . . . . . . . . 1318--1330
               Jianshan Sun and   
                    Jian Ma and   
                Zhiying Liu and   
                     Yajun Miao   Leveraging Content and Connections for
                                  Scientific Article Recommendation in
                                  Social Computing Contexts  . . . . . . . 1331--1342
                  Zhiang Wu and   
                    Jie Cao and   
                  Junjie Wu and   
               Youquan Wang and   
                   Chunyang Liu   Detecting Genuine Communities from
                                  Large-Scale Social Networks: a
                                  Pattern-Based Method . . . . . . . . . . 1343--1357
                   Longbing Cao   Non-IIDness Learning in Behavioral and
                                  Social Data  . . . . . . . . . . . . . . 1358--1370
     Mostafa Haghir Chehreghani   An Efficient Algorithm for Approximate
                                  Betweenness Centrality Computation . . . 1371--1382
           Abraham Varghese and   
        Kannan Balakrishnan and   
        Reji Rajan Varghese and   
                 Joseph S. Paul   Content-Based Image Retrieval of Axial
                                  Brain Slices Using a Novel LBP with a
                                  Ternary Encoding . . . . . . . . . . . . 1383--1394
                 Huiyu Zhou and   
                Kotaro Hirasawa   Traffic Density Prediction with
                                  Time-Related Data Mining using Genetic
                                  Network Programming  . . . . . . . . . . 1395--1414
                 Haoran Xie and   
                    Qing Li and   
                 Xudong Mao and   
                Xiaodong Li and   
                     Yi Cai and   
                   Qianru Zheng   Mining Latent User Community for
                                  Tag-Based and Content-Based Search in
                                  Social Media . . . . . . . . . . . . . . 1415--1430
                 Qibin Duan and   
             Dirk P. Kroese and   
               Tim Brereton and   
               Aaron Spettl and   
                 Volker Schmidt   Inverting Laguerre Tessellations . . . . 1431--1440

The Computer Journal
Volume 57, Number 10, October, 2014

            Chin-Chen Chang and   
                Ting-Fang Cheng   A Secure Diverse Ticket-Sale System in a
                                  Distributed Cloud Environment  . . . . . 1441--1459
Lourdes López-García and   
    Luis J. Dominguez Perez and   
Francisco Rodríguez-Henríquez   A Pairing-Based Blind Signature E-Voting
                                  Scheme . . . . . . . . . . . . . . . . . 1460--1471
                    Hui Cui and   
                      Yi Mu and   
                      Man Ho Au   Signcryption Secure Against Linear
                                  Related-Key Attacks  . . . . . . . . . . 1472--1483
          Duygu Karao\uglan and   
                    Albert Levi   A Survey on the Development of Security
                                  Mechanisms for Body Area Networks  . . . 1484--1512
                   Long Ngo and   
                 Colin Boyd and   
     Juan González Nieto   Automated Proofs for Computational
                                  Indistinguishability . . . . . . . . . . 1513--1536
                    Yu Chen and   
             Zongyang Zhang and   
                Dongdai Lin and   
                     Zhenfu Cao   CCA-Secure IB--KEM from Identity-Based
                                  Extractable Hash Proof System  . . . . . 1537--1556
             Ren-Junn Hwang and   
                   Yu-Kai Hsiao   Anonymous Routing Protocol Based on Weil
                                  Pairing for Wireless Mesh Networks . . . 1557--1569
                 Shaoquan Jiang   On Unconditional $ \mu $-Security of
                                  Private Key Encryption . . . . . . . . . 1570--1579
                   Chang Xu and   
                    Hua Guo and   
                 Zhoujun Li and   
                          Yi Mu   Affiliation-Hiding Authenticated
                                  Asymmetric Group Key Agreement Based on
                                  Short Signature  . . . . . . . . . . . . 1580--1590

The Computer Journal
Volume 57, Number 11, November, 2014

            Joaquim Gabarro and   
                Maria Serna and   
                   Alan Stewart   Analysing Web-Orchestrations Under
                                  Stress Using Uncertainty Profiles  . . . 1591--1615
         Tiziana Calamoneri and   
          Antonio Frangioni and   
              Blerina Sinaimeri   Pairwise Compatibility Graphs of
                                  Caterpillars . . . . . . . . . . . . . . 1616--1623
              Daniel Lemire and   
                     Owen Kaser   Strongly Universal String Hashing is
                                  Fast . . . . . . . . . . . . . . . . . . 1624--1638
               Chia-Lin Lee and   
                  Tzong-Jye Liu   A Self-Stabilizing Distance-$2$ Edge
                                  Coloring Algorithm . . . . . . . . . . . 1639--1648
             Billur Barshan and   
        Murat Cihan Yüksek   Recognizing Daily and Sports Activities
                                  in Two Open Source Machine Learning
                                  Environments Using Body-Worn Sensor
                                  Units  . . . . . . . . . . . . . . . . . 1649--1667
        Antonio L. Bajuelos and   
               Sergey Bereg and   
                Mafalda Martins   Guarding Orthogonal Galleries with
                                  Rectangular Rooms  . . . . . . . . . . . 1668--1673
                   Rui Zhou and   
               Chengfei Liu and   
                 Jianxin Li and   
                 Junhu Wang and   
                  Jeffrey Xu Yu   Evaluating Irredundant Maximal Contained
                                  Rewritings for XPath Queries on Views    1674--1692
          Peter G. Harrison and   
                   Andrea Marin   Product-Forms in Multi-Way
                                  Synchronizations . . . . . . . . . . . . 1693--1710
              Sheau-Ru Tong and   
                    Yuan-Tse Yu   Adaptation of Near-Perfect Packet-Level
                                  FEC Interleaving in Mobile Media
                                  Streaming  . . . . . . . . . . . . . . . 1711--1722
               Qingting Wei and   
                Jihong Guan and   
              Shuigeng Zhou and   
                       Xin Wang   A New and Effective Approach to GML
                                  Documents Compression  . . . . . . . . . 1723--1740
                David Novak and   
                   Pavel Zezula   Performance Study of Independent Anchor
                                  Spaces for Similarity Searching  . . . . 1741--1755
                    Xu Yang and   
                 Deyuan Guo and   
                      Hu He and   
               Haijing Tang and   
                   Yanjun Zhang   An Implementation of Message-Passing
                                  Interface over VxWorks for Real-Time
                                  Embedded Multi-Core Systems  . . . . . . 1756--1764

The Computer Journal
Volume 57, Number 12, December, 2014

               Raed Al-Zubi and   
              Mohammed Hawa and   
            Ghazi Al-Sukkar and   
              Khalid A. Darabkh   Markov-Based Distributed Approach for
                                  Mitigating Self-Coexistence Problem in
                                  IEEE 802.22 WRANs  . . . . . . . . . . . 1765--1775
              Hong-Yi Chang and   
              Chih-Chun Lai and   
                   Yuan-Wei Lin   A Fast SVC-Based Channel-Recommendation
                                  System for an IPTV on a Cloud and P2P
                                  Hybrid Platform  . . . . . . . . . . . . 1776--1789
            Sain Saginbekov and   
                  Arshad Jhumka   Towards Efficient Stabilizing Code
                                  Dissemination in Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 1790--1816
               Hwangnam Kim and   
                Hwantae Kim and   
               Wonkyun Park and   
                     Mungyu Bae   Disabling Misbehavior with Traffic
                                  Constraints in WLANs . . . . . . . . . . 1817--1833
               Heejung Yang and   
                 Chin-Wan Chung   Efficient Iceberg Query Processing in
                                  Sensor Networks  . . . . . . . . . . . . 1834--1851
           Orhan Dagdeviren and   
         Vahid Khalilpour Akram   An Energy-Efficient Distributed Cut
                                  Vertex Detection Algorithm for Wireless
                                  Sensor Networks  . . . . . . . . . . . . 1852--1869
              Marco Beccuti and   
     Giuliana Franceschinis and   
    Daniele Codetta-Raiteri and   
                   Serge Haddad   Computing Optimal Repair Strategies by
                                  Means of NdRFT Modeling and Analysis . . 1870--1892
                  Prem Nath and   
               Chiranjeev Kumar   Mobility Management Scheme for Fixed
                                  Mobility Pattern Mobile Users in IPv4
                                  Networks . . . . . . . . . . . . . . . . 1893--1911
          V. S. Felix Enigo and   
                V. Ramachandran   Enhancing the Scalability of Non-Spatial
                                  Concurrent Queries in Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 1912--1924


The Computer Journal
Volume 58, Number 1, January, 2015

             Nikolay Grozev and   
                 Rajkumar Buyya   Performance Modelling and Simulation of
                                  Three-Tier Applications in Cloud and
                                  Multi-Cloud Environments . . . . . . . . 1--22
              Marco Beccuti and   
             Chiara Fornari and   
     Giuliana Franceschinis and   
           Sami M. Halawani and   
              Omar Ba-Rukab and   
            Ab Rahman Ahmad and   
               Gianfranco Balbo   From Symmetric Nets to Differential
                                  Equations exploiting Model Symmetries    23--39
                Shenlu Wang and   
      Muhammad Aamir Cheema and   
                     Xuemin Lin   Efficiently Monitoring Reverse
                                  $k$-Nearest Neighbors in Spatial
                                  Networks . . . . . . . . . . . . . . . . 40--56
           Gianfranco Balbo and   
         Maria Grazia Vigliotti   On the Analysis of a M/M/1 Queue with
                                  Bulk Services  . . . . . . . . . . . . . 57--74
                       Zhe Chen   Control Systems on Automata and Grammars 75--94
            James Pallister and   
            Simon J. Hollis and   
                 Jeremy Bennett   Identifying Compiler Options to Minimize
                                  Energy Consumption for Embedded
                                  Platforms  . . . . . . . . . . . . . . . 95--109
                  Yang Wang and   
                     Hua Li and   
                     Menglan Hu   Reusing Garbage Data for Efficient
                                  Workflow Computation . . . . . . . . . . 110--125
                 James G. Dowty   SMML Estimators for $1$-Dimensional
                                  Continuous Data  . . . . . . . . . . . . 126--133
              Michal Klempa and   
               Michal Kozak and   
        Mário Mikula and   
             Robert Smetana and   
               Jakub Starka and   
            Michal \vSvirec and   
       Matej Vitásek and   
    Martin Ne\vcaský and   
Irena Holubova (Mlýnková)   jInfer: a Framework for XML Schema
                                  Inference  . . . . . . . . . . . . . . . 134--156
           Albert Corominas and   
Alberto García-Villoria and   
                  Rafael Pastor   Technical Note: Relating to the
                                  Parameter Values Given by Nelder and
                                  Mead in their Algorithm  . . . . . . . . 157--159
    Antonio Leslie Bajuelos and   
           Santiago Canales and   
  Gregorio Hernández and   
            Mafalda Martins and   
               Inês Matos   Some Results on Open-Edge and Open
                                  Mobile Guarding of Polygons and
                                  Triangulations . . . . . . . . . . . . . 160--171

The Computer Journal
Volume 58, Number 2, February, 2015

               Omar Alsaleh and   
                 Bella Bose and   
                Bechir Hamdaoui   One-to-Many Node-Disjoint Paths Routing
                                  in Dense Gaussian Networks . . . . . . . 173--187
           Chung-Ming Huang and   
             Yih-Chung Chen and   
                  Shih-Yang Lin   Packet Scheduling and Congestion Control
                                  Schemes for Multipath Datagram
                                  Congestion Control Protocol  . . . . . . 188--203
            O\uguzhan Erdem and   
                Aydin Carus and   
                       Hoang Le   Value-Coded Trie Structure for
                                  High-Performance IPv6 Lookup . . . . . . 204--214
               P. Cappanera and   
                    A. Lori and   
                    G. Stea and   
                     G. Vaglini   On the Schedulability of
                                  Deadline-Constrained Traffic in TDMA
                                  Wireless Mesh Networks . . . . . . . . . 215--233
                 Sami Habib and   
     Paulvanna N. Marimuthu and   
                    Naser Zaeri   Carbon-aware Enterprise Network through
                                  Redesign . . . . . . . . . . . . . . . . 234--245
                     Sen Su and   
              Qingjia Huang and   
                    Jian Li and   
                Xiang Cheng and   
                    Peng Xu and   
                     Kai Shuang   Enhanced Energy-Efficient Scheduling for
                                  Parallel Tasks Using Partial Optimal
                                  Slacking . . . . . . . . . . . . . . . . 246--257
                 S. A. Abid and   
             Mazliza Othman and   
                 Nadir Shah and   
                 Mazhar Ali and   
                     A. R. Khan   3D-RP: a DHT-Based Routing Protocol for
                                  MANETs . . . . . . . . . . . . . . . . . 258--279
                 Islam Elgedawy   CRESCENT: a Reliable Framework for
                                  Durable Composite Web Services
                                  Management . . . . . . . . . . . . . . . 280--299
            Mostafa Rezvani and   
      Mohammad Kazem Akbari and   
                  Bahman Javadi   Resource Allocation in Cloud Computing
                                  Environments Based on Integer Linear
                                  Programming  . . . . . . . . . . . . . . 300--314
             Chien-Fu Cheng and   
                Hsien-Chun Liao   A Malicious-Resilient Protocol for
                                  Consistent Scheduling Problem in the
                                  Cloud Computing Environment  . . . . . . 315--330
               Mirka Miller and   
           R. Sundara Rajan and   
               N. Parthiban and   
                Indra Rajasingh   Minimum Linear Arrangement of Incomplete
                                  Hypercubes . . . . . . . . . . . . . . . 331--337
           Shih-Chang Huang and   
                  Hong-Yi Chang   A Bidirectional Route Repair Method for
                                  Wireless Mobile Ad Hoc Networks  . . . . 338--353

The Computer Journal
Volume 58, Number 3, March, 2015

                Slim Kallel and   
             Mohamed Jmaiel and   
                  Sumitra Reddy   Enabling Technologies: Infrastructure
                                  for Collaborative Enterprises  . . . . . 355--355
            Wassim Derguech and   
                 Sami Bhiri and   
            Souleiman Hasan and   
                   Edward Curry   Using Formal Concept Analysis for
                                  Organizing and Discovering Sensor
                                  Capabilities . . . . . . . . . . . . . . 356--367
             Zahra Movahedi and   
              Walid Gaaloul and   
                 Sami Bhiri and   
                   Bruno Defude   Assisting Sensor-Based Application
                                  Design and Instantiation Using Activity
                                  Recommendation . . . . . . . . . . . . . 368--384
     Afef Jmal Maâlej and   
                   Moez Krichen   Study on the Limitations of WS-BPEL
                                  Compositions Under Load Conditions . . . 385--402
                Ines Houidi and   
               Wajdi Louati and   
               Djamal Zeghlache   Exact Multi-Objective Virtual Network
                                  Embedding in Cloud Environments  . . . . 403--415
            Ryszard Janicki and   
         Mohammad Hadi Soudkhah   On Classification with Pairwise
                                  Comparisons, Support Vector Machines and
                                  Feature Domain Overlapping . . . . . . . 416--431
María Arsuaga-Ríos and   
Miguel A. Vega-Rodríguez   Multiobjective Small-World Optimization
                                  for Energy Saving in Grid Environments   432--447
                 Ajay Kumar and   
               Anil Kumar Verma   An Improved Algorithm for the
                                  Metamorphosis of Semi-Extended Regular
                                  Expressions to Deterministic Finite
                                  Automata . . . . . . . . . . . . . . . . 448--456
                     Lei Du and   
                Qinbao Song and   
                    Lei Zhu and   
                    Xiaoyan Zhu   A Selective Detector Ensemble for
                                  Concept Drift Detection  . . . . . . . . 457--471
       Omar Khadeer Hussain and   
             Zia-ur- Rahman and   
    Farookh Khadeer Hussain and   
               Jaipal Singh and   
        Naeem Khalid Janjua and   
                Elizabeth Chang   A User-Based Early Warning Service
                                  Management Framework in Cloud Computing  472--496
                 Jianxin Li and   
               Chengfei Liu and   
                   Rui Zhou and   
                  Jeffrey Xu Yu   Query-Driven Frequent Co-Occurring Term
                                  Computation over Relational Data Using
                                  MapReduce  . . . . . . . . . . . . . . . 497--513

The Computer Journal
Volume 58, Number 4, April, 2015

                  Zhiyong Zhang   Security, Trust and Risk in Multimedia
                                  Social Networks  . . . . . . . . . . . . 515--517
      Constantinos Patsakis and   
      Athanasios Zigomitros and   
     Achilleas Papageorgiou and   
                 Agusti Solanas   Privacy and Security for Multimedia
                                  Content shared on OSNs: Issues and
                                  Countermeasures  . . . . . . . . . . . . 518--535
                    Hui Zhu and   
                Cheng Huang and   
                         Hui Li   Information Diffusion Model Based on
                                  Privacy Setting in Online Social
                                  Networking Services  . . . . . . . . . . 536--548
                   Hong Zhu and   
               Shengli Tian and   
                  Kevin Lü   Privacy-Preserving Data Publication with
                                  Features of Independent $ \ell
                                  $-Diversity  . . . . . . . . . . . . . . 549--571
                WeiTao Song and   
                         Bin Hu   Approach to Detecting Type-Flaw Attacks
                                  Based on Extended Strand Spaces  . . . . 572--587
                   Bin Yang and   
               Xingming Sun and   
                Xianyi Chen and   
              Jianjun Zhang and   
                          Xu Li   Exposing Photographic Splicing by
                                  Detecting the Inconsistencies in Shadows 588--600
              Ayesha Kanwal and   
               Rahat Masood and   
      Muhammad Awais Shibli and   
                   Rafia Mumtaz   Taxonomy for Trust Models in Cloud
                                  Computing  . . . . . . . . . . . . . . . 601--626
                 Qingqi Pei and   
                 Dingyu Yan and   
                 Lichuan Ma and   
                      Zi Li and   
                      Yang Liao   A Strong and Weak Ties Feedback-Based
                                  Trust Model in Multimedia Social
                                  Networks . . . . . . . . . . . . . . . . 627--643
                  Zhen Yang and   
                Kaiming Gao and   
                 Kefeng Fan and   
                     Yingxu Lai   Sensational Headline Identification By
                                  Normalized Cross Entropy-Based Metric    644--655
                    Hui Lin and   
                     Jia Hu and   
                Jianfeng Ma and   
                      Li Xu and   
                        Li Yang   CRM: a New Dynamic Cross-Layer
                                  Reputation Computation Model in Wireless
                                  Networks . . . . . . . . . . . . . . . . 656--667
              Zhiyong Zhang and   
                  Kanliang Wang   A Formal Analytic Approach to Credible
                                  Potential Path and Mining Algorithms for
                                  Multimedia Social Networks . . . . . . . 668--678
               V. Natarajan and   
                Shina Sheen and   
                      R. Anitha   Multilevel Analysis to Detect Covert
                                  Social Botnet in Multimedia Social
                                  Networks . . . . . . . . . . . . . . . . 679--687
                  Guowei Wu and   
                Zuosong Liu and   
                    Lin Yao and   
                  Jing Deng and   
                       Jie Wang   A Trust Routing for Multimedia Social
                                  Networks . . . . . . . . . . . . . . . . 688--699
                 Danmei Niu and   
                 Lanlan Rui and   
                Cheng Zhong and   
                    Xuesong Qiu   A Composition and Recovery Strategy for
                                  Mobile Social Network Service in
                                  Disaster . . . . . . . . . . . . . . . . 700--708
               Volkmar Lotz and   
         Francesco Di Cerbo and   
              Michele Bezzi and   
       Samuel Paul Kaluvuri and   
           Antonino Sabetta and   
                  Slim Trabelsi   Security Certification for Service-Based
                                  Business Ecosystems  . . . . . . . . . . 709--723
                 Qiang Tang and   
                     Hua Ma and   
                  Xiaofeng Chen   Extend the Concept of Public Key
                                  Encryption with Delegated Search . . . . 724--734
               Mingwu Zhang and   
               Chunzhi Wang and   
            Tsuyoshi Takagi and   
                          Yi Mu   Functional Encryption Resilient to
                                  Hard-to-Invert Leakage . . . . . . . . . 735--749
              Yuh-Min Tseng and   
              Tung-Tso Tsai and   
                 Sen-Shan Huang   Leakage-Free ID-Based Signature  . . . . 750--757
     M. Francisca Hinarejos and   
   Andreu Pere Isern-Dey\`a and   
Josep-Lluís Ferrer-Gomila and   
    Magdalena Payeras-Capell\`a   MC-2D: an Efficient and Scalable
                                  Multicoupon Scheme . . . . . . . . . . . 758--778
              Ying-Kai Tang and   
         Sherman S. M. Chow and   
                  Joseph K. Liu   Comments on `Efficient Revocable
                                  Certificateless Encryption Secure in the
                                  Standard Model'  . . . . . . . . . . . . 779--781
             Lanfranco Lopriore   Password Capabilities Revisited  . . . . 782--791
                      Ke Gu and   
                 Weijia Jia and   
                  Chunlin Jiang   Efficient Identity-Based Proxy Signature
                                  in the Standard Model  . . . . . . . . . 792--807
               Debasish Das and   
               Utpal Sharma and   
            D. K. Bhattacharyya   Detection of Cross-Site Scripting Attack
                                  under Multiple Scenarios . . . . . . . . 808--822
                  Xinyu Fan and   
                Guomin Yang and   
                      Yi Mu and   
                        Yong Yu   On Indistinguishability in Remote Data
                                  Integrity Checking . . . . . . . . . . . 823--830
Alptekin Küpçü   Official Arbitration with Secure Cloud
                                  Storage Application  . . . . . . . . . . 831--852
                   Jiguo Li and   
                Huiyun Teng and   
                Xinyi Huang and   
               Yichen Zhang and   
                  Jianying Zhou   A Forward-Secure Certificate-Based
                                  Signature Scheme . . . . . . . . . . . . 853--866
                    Yong Yu and   
                  Man Ho Au and   
                      Yi Mu and   
               Willy Susilo and   
                        Huai Wu   Secure Delegation of Signing Power from
                                  Factorization  . . . . . . . . . . . . . 867--877
                  Hai L. Vu and   
            Kenneth K. Khaw and   
                Tsong Yueh Chen   A New Approach for Network Vulnerability
                                  Analysis . . . . . . . . . . . . . . . . 878--891
        Stavros N. Shiaeles and   
                 Maria Papadaki   FHSD: an Improved IP Spoof Detection
                                  Method for Web DDoS Attacks  . . . . . . 892--903
                 Huacui Liu and   
                    Chenhui Jin   Lower Bounds of Differential and Linear
                                  Active $S$-boxes for $3$D-like Structure 904--921
                    Yu-Chi Chen   SPEKS: Secure Server-Designation Public
                                  Key Encryption with Keyword Search
                                  against Keyword Guessing Attacks . . . . 922--933
              Cheng-Chi Lee and   
                   Yan-Ming Lai   Toward a Secure Single Sign-On Mechanism
                                  for Distributed Computer Networks  . . . 934--943
             Franco Frattolillo   Watermarking Protocols: Problems,
                                  Challenges and a Possible Solution . . . 944--960
      Abdulah Abdulah Zadeh and   
                 Howard M. Heys   Application of Simple Power Analysis to
                                  Stream Ciphers Constructed Using
                                  Feedback Shift Registers . . . . . . . . 961--972
         Haider Salim Hmood and   
                 Zhitang Li and   
    Hasan Khalaf Abdulwahid and   
                     Yang Zhang   Adaptive Caching Approach to Prevent DNS
                                  Cache Poisoning Attack . . . . . . . . . 973--985
                     Sha Ma and   
               Mingwu Zhang and   
                Qiong Huang and   
                        Bo Yang   Public Key Encryption with Delegated
                                  Equality Test in a Multi-User Setting    986--1002
                     Qiang Tang   From Ephemerizer to Timed-Ephemerizer:
                                  Achieve Assured Lifecycle Enforcement
                                  for Sensitive Data . . . . . . . . . . . 1003--1020
    Maryam Rajabzadeh Asaar and   
       Mahmoud Salmasizadeh and   
                   Willy Susilo   An Identity-Based Multi-Proxy
                                  Multi-Signature Scheme Without Bilinear
                                  Pairings and its Variants  . . . . . . . 1021--1039

The Computer Journal
Volume 58, Number 5, May, 2015

            Gabriel Ciobanu and   
                  Maciej Koutny   PerTiMo: a Model of Spatial Migration
                                  with Safe Access Permissions . . . . . . 1041--1060
                    Jie Lin and   
                  Yue Jiang and   
                    Don Adjeroh   Circular Pattern Discovery . . . . . . . 1061--1073
                Jia-Jie Liu and   
                Yue-Li Wang and   
                   Yu-Shan Chiu   Constrained Longest Common Subsequences
                                  with Run-Length-Encoded Strings  . . . . 1074--1084
          Emilio Di Giacomo and   
              Walter Didimo and   
                Luca Grilli and   
            Giuseppe Liotta and   
       Salvatore Agostino Romeo   Heuristics for the Maximum $2$-Layer RAC
                                  Subgraph Problem . . . . . . . . . . . . 1085--1098
                Ahmad Sabri and   
             Vincent Vajnovszki   Two Reflected Gray Code-Based Orders on
                                  Some Restricted Growth Sequences . . . . 1099--1111
               Chia Shin Ou and   
               Chin Lung Lu and   
                   R. C. T. Lee   A Systematical and Parallel Approach to
                                  Solve Problems Involving Special
                                  Properties of Bit-Vectors  . . . . . . . 1112--1121
                Amy Affleck and   
             Aneesh Krishna and   
         Narasimaha R. Achuthan   Non-Functional Requirements Framework: a
                                  Mathematical Programming Approach  . . . 1122--1139
            Florentin Ipate and   
            Alin Stefanescu and   
                    Ionut Dinca   Model Learning and Test Generation Using
                                  Cover Automata . . . . . . . . . . . . . 1140--1159
              Antonio Badia and   
                  Daniel Lemire   Functional Dependencies with null
                                  Markers  . . . . . . . . . . . . . . . . 1160--1168
      Petr Procházka and   
                      Jan Holub   Compression of a Set of Files with
                                  Natural Language Content . . . . . . . . 1169--1185
               Joel Fuentes and   
          Pablo Sáez and   
  Gilberto Gutiérrez and   
              Isaac D. Scherson   A Method to Find Functional Dependencies
                                  Through Refutations and Duality of
                                  Hypergraphs  . . . . . . . . . . . . . . 1186--1198
               Chang-Ai Sun and   
                 Yimeng Zai and   
                       Huai Liu   Evaluating and Comparing Fault-Based
                                  Testing Strategies for General Boolean
                                  Specifications: a Series of Experiments  1199--1213
                Behrooz Parhami   Digital Arithmetic in Nature:
                                  Continuous-Digit RNS . . . . . . . . . . 1214--1223

The Computer Journal
Volume 58, Number 6, June, 2015

             Zhangbing Zhou and   
             Huansheng Ning and   
                Meikang Qiu and   
              Habib F. Rashvand   Editorial: Green Energy Management and
                                  Smart Grid . . . . . . . . . . . . . . . 1225--1226
                 Jianxin Li and   
                 Jieyu Zhao and   
                      Yi Li and   
                    Lei Cui and   
                      Bo Li and   
                     Lu Liu and   
             John Panneerselvam   iMIG: Toward an Adaptive Live Migration
                                  Method for KVM Virtual Machines  . . . . 1227--1242
                  Kehua Guo and   
                  Biao Tian and   
                     Jianhua Ma   AMPS: an Adaptive Message Push Strategy
                                  for the Energy Efficiency Optimization
                                  in Mobile Terminals  . . . . . . . . . . 1243--1253
                  Liyun Zuo and   
               Shoubin Dong and   
              Chunsheng Zhu and   
                    Lei Shu and   
                   Guangjie Han   A Cloud Resource Evaluation Model Based
                                  on Entropy Optimization and Ant Colony
                                  Clustering . . . . . . . . . . . . . . . 1254--1266
              Jianhui Zhang and   
                     Zhi Li and   
                   Feng Xia and   
               Shaojie Tang and   
                Xingfa Shen and   
                       Bei Zhao   Cooperative Scheduling for Adaptive Duty
                                  Cycling in Asynchronous Sensor Networks  1267--1279
               Guangjie Han and   
                     Xun Li and   
              Jinfang Jiang and   
                    Lei Shu and   
                   Jaime Lloret   Intrusion Detection Algorithm Based on
                                  Neighbor Information Against Sinkhole
                                  Attack in Wireless Sensor Networks . . . 1280--1292
               Zhiyong Feng and   
                     Bo Lan and   
                 Zhen Zhang and   
                   Shizhan Chen   A Study of Semantic Web Services Network 1293--1305
                 Xiang Wang and   
                    Ying Lu and   
                   Yi Zhang and   
                  Zexi Zhao and   
              Tongsheng Xia and   
                     Limin Xiao   Power Optimization in Logic Synthesis
                                  for Mixed Polarity Reed--Muller Logic
                                  Circuits . . . . . . . . . . . . . . . . 1306--1313
         Domen Zupan\vci\vc and   
            Mitja Lu\vstrek and   
                  Matja\vz Gams   Multi-Agent Architecture for Control of
                                  Heating and Cooling in a Residential
                                  Space  . . . . . . . . . . . . . . . . . 1314--1329
                Linghe Kong and   
              Xiao-Yang Liu and   
                 Meixia Tao and   
                 Min-You Wu and   
                      Yu Gu and   
                 Long Cheng and   
                    Jianwei Niu   Resource-Efficient Data Gathering in
                                  Sensor Networks for Environment
                                  Reconstruction . . . . . . . . . . . . . 1330--1343
                    Jin Liu and   
                    Juan Li and   
              Xiaoguang Niu and   
                Xiaohui Cui and   
                   Yunchuan Sun   GreenOCR: an Energy-Efficient Optimal
                                  Clustering Routing Protocol  . . . . . . 1344--1359
              Yongzhao Zhan and   
                   Shan Dai and   
                 Qirong Mao and   
                     Lu Liu and   
                      Wei Sheng   A Video Semantic Analysis Method Based
                                  on Kernel Discriminative Sparse
                                  Representation and Weighted KNN  . . . . 1360--1372
                      He Li and   
             Mianxiong Dong and   
               Xiaofei Liao and   
                        Hai Jin   Deduplication-Based Energy Efficient
                                  Storage System in Cloud Environment  . . 1373--1383
               Hamed Javidi and   
                Maziar Goudarzi   TABEMS: Tariff-Aware Building Energy
                                  Management System for Sustainability
                                  through Better Use of Electricity  . . . 1384--1398
               Xiaolan Tang and   
                   Juhua Pu and   
                   Yang Gao and   
                     Yu Xie and   
                    Zhang Xiong   GPS-Based Replica Deletion Scheme with
                                  Anti-Packet Distribution for Vehicular
                                  Networks . . . . . . . . . . . . . . . . 1399--1415
          Antonio Frangioni and   
                Laura Galli and   
                  Giovanni Stea   Optimal Joint Path Computation and Rate
                                  Allocation for Real-time Traffic . . . . 1416--1430
              Andrew Larkin and   
          David E. Williams and   
              Molly L. Kile and   
               William M. Baird   Developing a Smartphone Software Package
                                  for Predicting Atmospheric Pollutant
                                  Concentrations at Mobile Locations . . . 1431--1442
Nizam Ayyìldìz and   
     Ece Güran Schmidt and   
        Hasan Cengiz Güran   S-DIRECT: Scalable and Dynamically
                                  Reconfigurable TCAM Architecture for
                                  High-Speed IP Lookup . . . . . . . . . . 1443--1455
               Pavel Rajmic and   
        Jirí Ho\vsek and   
               Michal Fusek and   
             Sergey Andreev and   
    Július Stecík   Simplified Probabilistic Modelling and
                                  Analysis of Enhanced Distributed
                                  Coordination Access in IEEE 802.11 . . . 1456--1468
              Sang-Yeon Kim and   
              Dong-Wan Choi and   
                 Chin-Wan Chung   Finding a Friendly Community in Social
                                  Networks Considering Bad Relationships   1469--1481
            Hamid Saadatfar and   
            Hossein Deldari and   
            Mahmoud Naghibzadeh   Improving the Scheduler's Energy Saving
                                  Capability by Noting both Job and
                                  Resource Characteristics . . . . . . . . 1482--1493

The Computer Journal
Volume 58, Number 7, July, 2015

               Viliam Simko and   
               David Hauzar and   
              Petr Hnetynka and   
                Tomas Bures and   
               Frantisek Plasil   Formal Verification of Annotated Textual
                                  Use-Cases  . . . . . . . . . . . . . . . 1495--1529
              Achal Kaushik and   
          Deo Prakash Vidyarthi   A Green Energy Model for Resource
                                  Allocation in Computational Grid . . . . 1530--1547
               H. Ahmadifar and   
                   G. Jaberipur   A New Residue Number System with
                                  $5$-Moduli Set: $ 2^{2 q}$, $ 2^q \pm
                                  3$, $ 2^q \pm 1$ . . . . . . . . . . . . 1548--1565
         Edem Kwedzo Bankas and   
        Kazeem Alagbe Gbolagade   New MRC Adder-Based Reverse Converter
                                  for the Moduli Set $ 2^n $, $ 2^{2 n +
                                  1} - 1 $, $ 2^{2 n + 2} - 1 $  . . . . . 1566--1572
                   Qian Mao and   
           K. Bharanitharan and   
                Chin-Chen Chang   A Proxy User Authentication Protocol
                                  Using Source-Based Image Morphing  . . . 1573--1584
               Yi-wen Zhang and   
                   Rui-feng Guo   Low-Power Scheduling Algorithms for
                                  Sporadic Task with Shared Resources in
                                  Hard Real-Time Systems . . . . . . . . . 1585--1597
             Chao-Liang Liu and   
              Wang-Jui Tsai and   
              Ting-Yi Chang and   
            Chun-Cheng Peng and   
               Peng-Shiang Wong   Meaningful Share Generation for $ (2,
                                  2)$-Multiple Visual Secret Sharing
                                  Scheme Without Pixel Expansion . . . . . 1598--1606
              Abdelkrim Abdelli   Improving the State Space Computation of
                                  the Time Stream Petri Nets Model . . . . 1607--1627
                  Yang Wang and   
                        Wei Shi   Dataflow-Based Scheduling for Scientific
                                  Workflows in HPC with Storage
                                  Constraints  . . . . . . . . . . . . . . 1628--1644
            Murat Yesilyurt and   
            Yildiray Yalman and   
               A. Turan Ozcerit   A Robust Watermarking Method for MPEG-4
                                  Based on Kurtosis  . . . . . . . . . . . 1645--1655
         Alexandre Petrenko and   
                 Adenilso Simao   Generalizing the DS-Methods for Testing
                                  Non-Deterministic FSMs . . . . . . . . . 1656--1672
          Niko Beerenwinkel and   
            Stefano Beretta and   
            Paola Bonizzoni and   
             Riccardo Dondi and   
                    Yuri Pirola   Covering Pairs in Directed Acyclic
                                  Graphs . . . . . . . . . . . . . . . . . 1673--1686

The Computer Journal
Volume 58, Number 8, August, 2015

              Quan Z. Sheng and   
        Elhadi M. Shakshuki and   
                        Jian Yu   Ambient and Context-Aware Services for
                                  the Future Web . . . . . . . . . . . . . 1687--1688
            Khalid Elgazzar and   
       Sharief M. A. Oteafy and   
           Walid M. Ibrahim and   
            Hossam S. Hassanein   A Resilient P2P Architecture for Mobile
                                  Resource Sharing . . . . . . . . . . . . 1689--1700
             Zahoor A. Khan and   
      Shyamala C. Sivakumar and   
        William J. Phillips and   
                 Bill Robertson   QPRR: QoS-Aware Peering Routing Protocol
                                  for Reliability Sensitive Data in Body
                                  Area Network Communication . . . . . . . 1701--1716
           Alireza Nafarieh and   
         Shyamala Sivakumar and   
          William Robertson and   
               William Phillips   SLA-Based Time-Aware Provisioning
                                  Mechanisms in Shared Mesh Protected
                                  Optical Networks . . . . . . . . . . . . 1717--1731
            Heiko Desruelle and   
                   Frank Gielen   Context-Driven Progressive Enhancement
                                  of Mobile Web Applications: a
                                  Multicriteria Decision-Making Approach   1732--1746
                 Yanling Hu and   
                     Anfeng Liu   An Efficient Heuristic Subtraction
                                  Deployment Strategy to Guarantee Quality
                                  of Event Detection for WSNs  . . . . . . 1747--1762
       David Diez Hernandez and   
       Jaime Garcia-Reinoso and   
                     Ivan Vidal   SFP: Statistical Filtering Policy for
                                  Caching in Content-Centric Networking    1763--1775
                    Xing Su and   
               Minjie Zhang and   
                       Quan Bai   Dynamic Task Allocation for
                                  Heterogeneous Agents in Disaster
                                  Environments Under Time, Space and
                                  Communication Constraints  . . . . . . . 1776--1791
                 Xiuchao Wu and   
           Kenneth N. Brown and   
              Cormac J. Sreenan   Contact Probing Mechanisms for
                                  Opportunistic Sensor Data Collection . . 1792--1810
                   Ping Xie and   
            Jianzhong Huang and   
                  Qiang Cao and   
                   Xiao Qin and   
                 Changsheng Xie   A New Non-MDS RAID-6 Code to Support
                                  Fast Reconstruction and Balanced I/Os    1811--1825
               Guangjun Qin and   
                 Mingfa Zhu and   
                 Limin Xiao and   
                        Li Ruan   Lessen Interflow Interference Using
                                  Virtual Channels Partitioning  . . . . . 1826--1841
       Jaime Garcia-Reinoso and   
                 Ivan Vidal and   
                 David Diez and   
              Daniel Corujo and   
                  Rui L. Aguiar   Analysis and Enhancements to
                                  Probabilistic Caching in Content-Centric
                                  Networking . . . . . . . . . . . . . . . 1842--1856
               Ahmed Kheiri and   
                    Ender Ozcan   Corrigendum: Constructing
                                  Constrained-Version of Magic Squares
                                  Using Selection Hyper-heuristics . . . . 1857--1857

The Computer Journal
Volume 58, Number 9, September, 2015

                Neil Y. Yen and   
          Uyen Trang Nguyen and   
                 Jong Hyuk Park   Mining Social Media for Knowledge
                                  Discovery  . . . . . . . . . . . . . . . 1859--1860
             Thomas Steiner and   
             Ruben Verborgh and   
            Joaquim Gabarro and   
               Erik Mannens and   
               Rik Van de Walle   Clustering Media Items Stemming from
                                  Multiple Social Networks . . . . . . . . 1861--1875
                Weiwei Yuan and   
               Donghai Guan and   
              Sungyoung Lee and   
                       Jin Wang   Skeleton Searching Strategy for
                                  Recommender Searching Mechanism of
                                  Trust-Aware Recommender Systems  . . . . 1876--1883
                Yongkoo Han and   
                Kisung Park and   
               Donghai Guan and   
               Sajal Halder and   
                  Young-Koo Lee   Topological Similarity-Based Feature
                                  Selection for Graph Classification . . . 1884--1893
                 Lihua Zhou and   
                  Kevin Lü   Detecting Communities with Different
                                  Sizes for Social Network Analysis  . . . 1894--1908
                      Wu He and   
                    Gongjun Yan   Mining Blogs And Forums To Understand
                                  the Use of Social Media in Customer
                                  Co-creation  . . . . . . . . . . . . . . 1909--1920
                  Chen Yang and   
                    Jian Ma and   
             Thushari Silva and   
                Xiaoyan Liu and   
                 Zhongsheng Hua   A Multilevel Information Mining Approach
                                  for Expert Recommendation in Online
                                  Scientific Communities . . . . . . . . . 1921--1936
          Lida Ghahremanlou and   
            Wanita Sherchan and   
                  James A. Thom   Geotagging Twitter Messages in Crisis
                                  Management . . . . . . . . . . . . . . . 1937--1954
Seyed Mohammadhadi Daneshmand and   
                Amin Javari and   
       Seyed Ebrahim Abtahi and   
                   Mahdi Jalili   A Time-Aware Recommender System Based on
                                  Dependency Network of Items  . . . . . . 1955--1966
        Naeem Khalid Janjua and   
       Omar Khadeer Hussain and   
    Farookh Khadeer Hussain and   
                Elizabeth Chang   Philosophical and Logic-Based
                                  Argumentation-Driven Reasoning
                                  Approaches and their Realization on the
                                  WWW: a Survey  . . . . . . . . . . . . . 1967--1999
R. Rodríguez-Rodríguez and   
                  F. Castro and   
                  D. Chaver and   
    R. Gonzalez-Alberquilla and   
           L. Piñuel and   
                      F. Tirado   Write-Aware Replacement Policies for
                                  PCM-Based Systems  . . . . . . . . . . . 2000--2025
       Muhammad Ashad Kabir and   
                    Jun Han and   
                    Jian Yu and   
                    Alan Colman   Inferring User Situations from
                                  Interaction Events in Social Media . . . 2026--2043
               Hiren Mewada and   
                Rahul Patel and   
                Suprava Patnaik   A Novel Structure Tensor Modulated
                                  Chan--Vese Model for Texture Image
                                  Segmentation . . . . . . . . . . . . . . 2044--2060
                     Yi Liu and   
                 Xiongzi Ge and   
              Xiaoxia Huang and   
                 David H. C. Du   MOLAR: a Cost-Efficient,
                                  High-Performance SSD-Based Hybrid
                                  Storage Cache  . . . . . . . . . . . . . 2061--2078
           Sadegh Aliakbary and   
               Jafar Habibi and   
                   Ali Movaghar   Feature Extraction from Degree
                                  Distribution for Comparison and Analysis
                                  of Complex Networks  . . . . . . . . . . 2079--2091
   Mehmet Al\.I Abbaso\uglu and   
            Bu\ugra Ged\.Ik and   
        Hakan Ferhatosmano\uglu   Aggregate Profile Clustering for
                                  Streaming Analytics  . . . . . . . . . . 2092--2108
                 Yanmin Zhu and   
                   Yin Wang and   
              George Forman and   
                       Hong Wei   Mining Large-Scale GPS Streams for
                                  Connectivity Refinement of Road Maps . . 2109--2119
                     Lin Wu and   
               Xiaodi Huang and   
              John Shepherd and   
                      Yang Wang   Multi-Query Augmentation-Based Web
                                  Landmark Photo Retrieval . . . . . . . . 2120--2134
               Minaz Parmar and   
            Marios C. Angelides   MAC-REALM: a Video Content Feature
                                  Extraction and Modelling Framework . . . 2135--2171
  Álvaro Rubio-Largo and   
Miguel A. Vega-Rodríguez and   
David L. González-Álvarez   A Parallel Multiobjective Approach based
                                  on Honey Bees for Traffic Grooming in
                                  Optical Networks . . . . . . . . . . . . 2171--2191

The Computer Journal
Volume 58, Number 10, October, 2015

            David G. Rosado and   
             Nadira Lammari and   
               Jan Jürjens   Special Issue on Secure Information
                                  Systems Engineering  . . . . . . . . . . 2193--2194
             Maryam Sepehri and   
             Stelvio Cimato and   
                Ernesto Damiani   Privacy-Preserving Query Processing by
                                  Multi-Party Computation  . . . . . . . . 2195--2212
          Evangelia Kavakli and   
       Christos Kalloniatis and   
      Haralambos Mouratidis and   
             Stefanos Gritzalis   Privacy as an Integral Part of the
                                  Implementation of Cloud Solutions  . . . 2213--2224
             D. Marudhadevi and   
     V. Neelaya Dhatchayani and   
           V. S. Shankar Sriram   A Trust Evaluation Model for Cloud
                                  Computing Using Service Level Agreement  2225--2232
              Oscar Rebollo and   
             Daniel Mellado and   
       Eduardo Fernandez-Medina   ISGcloud: a Security Governance
                                  Framework for Cloud Computing  . . . . . 2233--2254
          Thomas Quirchmayr and   
                 Mark Strembeck   A Discussion of Communication Schemes
                                  for Process Execution Histories to
                                  Enforce Entailment Constraints in
                                  Process-Driven SOAs  . . . . . . . . . . 2255--2279
            Katarzyna Mazur and   
        Bogdan Ksiezopolski and   
              Zbigniew Kotulski   The Robust Measurement Method for
                                  Security Metrics Generation  . . . . . . 2280--2296
          Takeshi Takahashi and   
              Youki Kadobayashi   Reference Ontology for Cybersecurity
                                  Operational Information  . . . . . . . . 2297--2312
Ricardo J. Rodríguez and   
      José Merseguer and   
                Simona Bernardi   Modelling Security of Critical
                                  Infrastructures: a Survivability
                                  Assessment . . . . . . . . . . . . . . . 2313--2327
            Jose Fran. Ruiz and   
        Antonio Maña and   
                Carsten Rudolph   An Integrated Security and Systems
                                  Engineering Process and Modelling
                                  Framework  . . . . . . . . . . . . . . . 2328--2350
              Carlos Blanco and   
Eduardo Fernández-Medina and   
                  Juan Trujillo   Modernizing Secure OLAP Applications
                                  with a Model-Driven Approach . . . . . . 2351--2367
               Kazim Yumbul and   
                  Erkay Sava\cs   Enhancing an Embedded Processor Core for
                                  Efficient and Isolated Execution of
                                  Cryptographic Algorithms . . . . . . . . 2368--2387
             Udaya Tupakula and   
             Vijay Varadharajan   Trust Enhanced Security for Tenant
                                  Transactions in the Cloud Environment    2388--2403
              Kenneth Radke and   
                 Colin Boyd and   
        Juan Gonzalez Nieto and   
                 Harry Bartlett   CHURNs: Freshness Assurance for Humans   2404--2425
              Chunfeng Lian and   
               Liaojun Pang and   
                    Jimin Liang   Generalized Random Grid-Based Visual
                                  Secret Sharing for General Access
                                  Structures . . . . . . . . . . . . . . . 2426--2442
                  Xing Wang and   
                 Nga Lam Or and   
                   Ziyan Lu and   
                      Derek Pao   Hardware Accelerator to Detect
                                  Multi-Segment Virus Patterns . . . . . . 2443--2460
             Chanying Huang and   
               Hwaseong Lee and   
               Hyoseung Kim and   
                  Dong Hoon Lee   mvSERS: a Secure Emergency Response
                                  Solution for Mobile Healthcare in
                                  Vehicular Environments . . . . . . . . . 2461--2475
          Grazielle Vernize and   
André Luiz Pires Guedes and   
      Luiz Carlos Pessoa Albini   Malicious Nodes Identification for
                                  Complex Network Based on Local Views . . 2476--2491
              Jianghong Wei and   
                 Wenfen Liu and   
                     Xuexian Hu   Forward-Secure Threshold Attribute-Based
                                  Signature Scheme . . . . . . . . . . . . 2492--2506
                  Debiao He and   
               Mingwu Zhang and   
                      Baowen Xu   Insecurity of an Efficient
                                  Identity-Based Proxy Signature in the
                                  Standard Model . . . . . . . . . . . . . 2507--2508
                   Chang Xu and   
               Liehuang Zhu and   
                 Zhoujun Li and   
                      Feng Wang   One-Round Affiliation-Hiding
                                  Authenticated Asymmetric Group Key
                                  Agreement with Semi-trusted Group
                                  Authority  . . . . . . . . . . . . . . . 2509--2519
               Shi-Feng Sun and   
                    Dawu Gu and   
                  Zhengan Huang   Fully Secure Wicked Identity-Based
                                  Encryption Against Key Leakage Attacks   2520--2536
               Zoran Djuric and   
                 Dragan Gasevic   FEIPS: a Secure Fair-Exchange Payment
                                  System for Internet Transactions . . . . 2537--2556
             Lanfranco Lopriore   Password Management: Distribution,
                                  Review and Revocation  . . . . . . . . . 2557--2566
        Amir Jalaly Bidgoly and   
            Behrouz Tork Ladani   Modelling and Quantitative Verification
                                  of Reputation Systems Against Malicious
                                  Attackers  . . . . . . . . . . . . . . . 2567--2582
                  Wien Hong and   
               Gwoboa Horng and   
              Chih-Wei Shiu and   
             Tung-Shou Chen and   
                    Yu-Chi Chen   Reversible Steganographic Method Using
                                  Complexity Control and Human Visual
                                  System . . . . . . . . . . . . . . . . . 2583--2594
                Dong Lai Fu and   
             Xin Guang Peng and   
                     Yu Li Yang   Trusted Validation for Geolocation of
                                  Cloud Data . . . . . . . . . . . . . . . 2595--2607
                Shahid Alam and   
                Issa Traore and   
             Ibrahim Sogukpinar   Annotated Control Flow Graph for
                                  Metamorphic Malware Detection  . . . . . 2608--2621
            Md Saiful Islam and   
                   Naif Alajlan   Model-based Alignment of Heartbeat
                                  Morphology for Enhancing Human
                                  Recognition Capability . . . . . . . . . 2622--2635
           Sk Hafizul Islam and   
                       Fagen Li   Leakage-Free and Provably Secure
                                  Certificateless Signcryption Scheme
                                  Using Bilinear Pairings  . . . . . . . . 2636--2648
            Pericle Perazzo and   
            Pavel Skvortsov and   
                  Gianluca Dini   On Designing Resilient Location-Privacy
                                  Obfuscators  . . . . . . . . . . . . . . 2649--2664
                  Yang Wang and   
               Willy Susilo and   
                      Man Ho Au   Revisiting Security Against the
                                  Arbitrator in Optimistic Fair Exchange   2665--2676
                   Lin Ding and   
                Chenhui Jin and   
                   Jie Guan and   
               Shaowu Zhang and   
                   Ting Cui and   
                   Dong Han and   
                       Wei Zhao   Cryptanalysis of WG Family of Stream
                                  Ciphers  . . . . . . . . . . . . . . . . 2677--2685
               Kaibin Huang and   
                 Raylin Tso and   
                Yu-Chi Chen and   
       Sk Md Mizanur Rahman and   
             Ahmad Almogren and   
                    Atif Alamri   PKE-AET: Public Key Encryption with
                                  Authorized Equality Test . . . . . . . . 2686--2697
      Nuttapong Attrapadung and   
                Keita Emura and   
           Goichiro Hanaoka and   
                   Yusuke Sakai   Revocable Group Signature with
                                  Constant-Size Revocation List  . . . . . 2698--2715
              Erkay Sava\cs and   
            Cemal Yìlmaz   A Generic Method for the Analysis of a
                                  Class of Cache Attacks: a Case Study for
                                  AES  . . . . . . . . . . . . . . . . . . 2716--2737
             Mayana Pereira and   
             Rafael Dowsley and   
  Anderson C. A. Nascimento and   
               Goichiro Hanaoka   Public-Key Encryption Schemes with
                                  Bounded CCA Security and Optimal
                                  Ciphertext Length Based on the CDH and
                                  HDH Assumptions  . . . . . . . . . . . . 2738--2746
                    Wei Gao and   
                Guilin Wang and   
                 Xueli Wang and   
                     Kefei Chen   Generic Construction of
                                  Certificate-Based Encryption from
                                  Certificateless Encryption Revisited . . 2747--2757
André Ricardo Abed Grégio and   
         Vitor Monte Afonso and   
Dario Simões Fernandes Filho and   
 Paulo Lício de Geus and   
                     Mario Jino   Toward a Taxonomy of Malware Behaviors   2758--2777
               Kaitai Liang and   
               Willy Susilo and   
              Joseph K. Liu and   
                 Duncan S. Wong   Efficient and Fully CCA Secure
                                  Conditional Proxy Re-Encryption from
                                  Hierarchical Identity-Based Encryption   2778--2792

The Computer Journal
Volume 58, Number 11, November, 2015

           Nina Yevtushenko and   
            Khaled El-Fakih and   
              Tiziano Villa and   
              Jie-Hong R. Jiang   Deriving Compositionally Deadlock-Free
                                  Components over Synchronous Automata
                                  Compositions . . . . . . . . . . . . . . 2793--2803
                 Ahmet Kara and   
Halit O\uguztüzün and   
              M. Nedim Alpdemir   A Methodology for Resolution Mapping for
                                  Cross-Resolution Simulation using
                                  Event-B  . . . . . . . . . . . . . . . . 2804--2823
              Weiqiang Kong and   
                 Leyuan Liu and   
              Takahiro Ando and   
             Hirokazu Yatsu and   
             Kenji Hisazumi and   
                   Akira Fukuda   Facilitating Multicore Bounded Model
                                  Checking with Stateless Explicit-State
                                  Exploration  . . . . . . . . . . . . . . 2824--2840
             Xiaowang Zhang and   
            Jan Van den Bussche   On the Power of SPARQL in Expressing
                                  Navigational Queries . . . . . . . . . . 2841--2851
               Sung-In Jang and   
              Su-Kyung Yoon and   
                Kihyun Park and   
                 Gi-Ho Park and   
                   Shin-Dug Kim   Data Classification Management with its
                                  Interfacing Structure for Hybrid SLC/MLC
                                  PRAM Main Memory . . . . . . . . . . . . 2852--2863
                Shaowei Cai and   
                  Chuan Luo and   
                       Kaile Su   Improving WalkSAT By Effective
                                  Tie-Breaking and Efficient
                                  Implementation . . . . . . . . . . . . . 2864--2875
         Pablo Muñoz and   
           David F. Barrero and   
       María D. R-Moreno   A Statistically Rigorous Analysis of
                                  $2$D Path-Planning Algorithms  . . . . . 2876--2891
          Gauthier van den Hove   On the Origin of Recursive Procedures    2892--2899
              Paolo Arcaini and   
          Angelo Gargantini and   
              Elvinia Riccobene   How to Optimize the Use of SAT and SMT
                                  Solvers for Test Generation of Boolean
                                  Expressions  . . . . . . . . . . . . . . 2900--2920
                   Frank Gurski   Linear Programming Formulations for
                                  Computing Graph Layout Parameters  . . . 2921--2927
                 Shiyu Yang and   
      Muhammad Aamir Cheema and   
                     Xuemin Lin   Impact Set: Computing Influence Using
                                  Query Logs . . . . . . . . . . . . . . . 2928--2943
                    Xi Wang and   
         Alejandro Erickson and   
                 Jianxi Fan and   
                    Xiaohua Jia   Hamiltonian Properties of DCell Networks 2944--2955
            Giorgos Stoilos and   
             Tassos Venetis and   
                 Giorgos Stamou   A Fuzzy Extension to the OWL 2 RL
                                  Ontology Language  . . . . . . . . . . . 2956--2971
           Jinn-Shyong Yang and   
              Sih-Syuan Luo and   
                 Jou-Ming Chang   Pruning Longer Branches of Independent
                                  Spanning Trees on Folded Hyper-Stars . . 2972--2981
            Thomas Roelleke and   
      Andreas Kaltenbrunner and   
            Ricardo Baeza-Yates   Harmony Assumptions in Information
                                  Retrieval and Social Networks  . . . . . 2982--2999
             A. S. M. Kayes and   
                    Jun Han and   
                    Alan Colman   OntCAAC: an Ontology-Based Approach to
                                  Context-Aware Access Control for
                                  Software Services  . . . . . . . . . . . 3000--3034
                  Hao Zheng and   
               Xiaoshe Dong and   
              Zhengdong Zhu and   
                 Baoke Chen and   
                Yizhi Zhang and   
                  Xingjun Zhang   Research on Algorithms to Capture
                                  Drivers' Write Operations  . . . . . . . 3035--3056
           Jorge F. Fabeiro and   
              Diego Andrade and   
        Basilio B. Fraguela and   
            Ramón Doallo   Automatic Generation of Optimized OpenCL
                                  Codes Using OCLoptimizer . . . . . . . . 3057--3073
              Shenwei Huang and   
            Matthew Johnson and   
           Daniël Paulusma   Narrowing the Complexity Gap for
                                  Colouring $ (C_s, P_t) $-Free Graphs . . 3074--3088
          Robert M. Hierons and   
        Uraz Cengiz Türker   Incomplete Distinguishing Sequences for
                                  Finite State Machines  . . . . . . . . . 3089--3113
               Yinglei Song and   
                Chunmei Liu and   
                   Yongzhong Li   A New Parameterized Algorithm for
                                  Predicting the Secondary Structure of
                                  RNA Sequences Including Pseudoknots  . . 3114--3125
          Emilio Di Giacomo and   
              Walter Didimo and   
            Giuseppe Liotta and   
                Henk Meijer and   
             Stephen K. Wismath   Planar and Quasi-Planar Simultaneous
                                  Geometric Embedding  . . . . . . . . . . 3126--3140
           Outi Sievi-Korte and   
              Kai Koskimies and   
             Erkki Mäkinen   Techniques for Genetic Software
                                  Architecture Design  . . . . . . . . . . 3141--3170
László Lengyel and   
Tamás Mészáros and   
       Márk Asztalos and   
         Péter Boros and   
  Attila Máté and   
 Gábor Madács and   
  Péter Hudák and   
Kristóf Kovács and   
       András Tresch and   
                  Hassan Charaf   Quality Assured Model-Driven
                                  Requirements Engineering and Software
                                  Development  . . . . . . . . . . . . . . 3171--3186
                     Kun Ma and   
                 Fusen Dong and   
                        Bo Yang   Large-Scale Schema-Free Data
                                  Deduplication Approach with Adaptive
                                  Sliding Window Using MapReduce . . . . . 3187--3201
       Amir Vahid Dastjerdi and   
                 Rajkumar Buyya   An Autonomous Time-Dependent SLA
                                  Negotiation Strategy for Cloud Computing 3202--3216

The Computer Journal
Volume 58, Number 12, December, 2015

      Sérgio Esteves and   
             Paulo Ferreira and   
              Luís Veiga   $ C^3 P $: a Re-Configurable Framework
                                  to Design Cycle-sharing Computing Cloud
                                  Platforms  . . . . . . . . . . . . . . . 3217--3241
                   Yuhao Yi and   
             Zhongzhi Zhang and   
                   Yuan Lin and   
                  Guanrong Chen   Small-World Topology Can Significantly
                                  Improve the Performance of Noisy
                                  Consensus in a Complex Network . . . . . 3242--3254
                  Huajun He and   
                  Yang Zhao and   
                   Jinfu Wu and   
                        Ye Tian   Cost-Aware Capacity Provisioning for
                                  Internet Video Streaming CDNs  . . . . . 3255--3270
           R. Sundara Rajan and   
                Paul Manuel and   
            Indra Rajasingh and   
               N. Parthiban and   
                   Mirka Miller   A Lower Bound for Dilation of an
                                  Embedding  . . . . . . . . . . . . . . . 3271--3278
               Yonggang Che and   
                 Chuanfu Xu and   
               Jianbin Fang and   
              Yongxian Wang and   
                  Zhenghua Wang   Realistic Performance Characterization
                                  of CFD Applications on Intel Many
                                  Integrated Core Architecture . . . . . . 3279--3294
                   Wei Zhou and   
                   Tao Jing and   
                    Yan Huo and   
                   Jin Qian and   
                        Zhen Li   Double Auction for Joint Channel and
                                  Power Allocation in Cognitive Radio
                                  Networks . . . . . . . . . . . . . . . . 3295--3305
           Chun-Chieh Huang and   
                    Ren-Song Ko   A Study on Maximizing the Parallelism of
                                  Macroscopically Derived Routing
                                  Algorithms for WSNs  . . . . . . . . . . 3306--3324


The Computer Journal
Volume 59, Number 1, January, 2016

            Rodrigo Andrade and   
      Márcio Ribeiro and   
      Henrique Rebêlo and   
                Paulo Borba and   
            Vaidas Gasiunas and   
                  Lucas Satabin   Assessing Idioms for a Flexible Feature
                                  Binding Time . . . . . . . . . . . . . . 1--32
              Robert M. Hierons   A More Precise Implementation Relation
                                  for Distributed Testing  . . . . . . . . 33--46
                 Li Chunlin and   
                      Li LaYuan   Context-Aware Integrated Scheme for
                                  Mobile Cloud Service Allocation  . . . . 47--63
      K. Hemant Kumar Reddy and   
             Diptendu Sinha Roy   DPPACS: a Novel Data Partitioning and
                                  Placement Aware Computation Scheduling
                                  Scheme for Data-Intensive Cloud
                                  Applications . . . . . . . . . . . . . . 64--82
                Shay Gueron and   
                   Vlad Krasnov   Fast Quicksort Implementation Using AVX
                                  Instructions . . . . . . . . . . . . . . 83--90
                 Sulin Song and   
               Shuming Zhou and   
                     Xiaoyan Li   Conditional Diagnosability of Burnt
                                  Pancake Networks Under the PMC Model . . 91--105
     Zaharije Radivojevi\'c and   
       Milo\vs Cvetanovi\'c and   
            Sa\vsa Stojanovi\'c   Comparison of Binary Procedures: a Set
                                  of Techniques for Evading Compiler
                                  Transformations  . . . . . . . . . . . . 106--118
                   Jie Zhao and   
               Rongcai Zhao and   
                     Jinchen Xu   Code Generation for Distributed-Memory
                                  Architectures  . . . . . . . . . . . . . 119--132
              Carla Binucci and   
                  Walter Didimo   Computing Quasi-Upward Planar Drawings
                                  of Mixed Graphs  . . . . . . . . . . . . 133--150
              Zhendong Shao and   
              Igor Averbakh and   
                Sandi Klav\vzar   Labeling Dot-Cartesian and
                                  Dot-Lexicographic Product Graphs with a
                                  Condition at Distance Two  . . . . . . . 151--158

The Computer Journal
Volume 59, Number 2, February, 2016

                   You Wang and   
                         Jun Bi   Software-Defined Mobility Support in IP
                                  Networks . . . . . . . . . . . . . . . . 159--177
               Abdul Hameed and   
                Adnan Noor Mian   Towards Better Traffic Localization of
                                  Virtual LANs Using Genetic Algorithm . . 178--191
                  J. Araujo and   
                 F. Giroire and   
               J. Moulierac and   
                     Y. Liu and   
                R. Modrzejewski   Energy Efficient Content Distribution    192--207
      Sareh Fotuhi Piraghaj and   
       Rodrigo N. Calheiros and   
               Jeffrey Chan and   
       Amir Vahid Dastjerdi and   
                 Rajkumar Buyya   Virtual Machine Customization and Task
                                  Mapping Architecture for Efficient
                                  Allocation of Cloud Data Center
                                  Resources  . . . . . . . . . . . . . . . 208--224
          Lélia Blin and   
       Maria Potop-Butucaru and   
  Stéphane Rovedakis and   
       Sébastien Tixeuil   A New Self-Stabilizing Minimum Spanning
                                  Tree Construction with Loop-Free
                                  Property . . . . . . . . . . . . . . . . 225--243
      Mahmood Naderan-Tahan and   
             Hamid Sarbazi-Azad   Why Does Data Prefetching Not Work for
                                  Modern Workloads?  . . . . . . . . . . . 244--259
              Md. Abu Layek and   
            TaeChoong Chung and   
                    Eui-Nam Huh   Adaptive Desktop Delivery Scheme for
                                  Provisioning Quality of Experience in
                                  Cloud Desktop as a Service . . . . . . . 260--274
                    J. Bahi and   
                W. Elghazel and   
                  C. Guyeux and   
                  M. Haddad and   
                   M. Hakem and   
                K. Medjaher and   
                    N. Zerhouni   Resiliency in Distributed Sensor
                                  Networks for Prognostics and Health
                                  Management of the Monitoring Targets . . 275--284

The Computer Journal
Volume 59, Number 3, March, 2016

                Surya Nepal and   
                   Suraj Pandey   Guest Editorial: Cloud Computing and
                                  Scientific Applications (CCSA) --- Big
                                  Data Analysis in the Cloud . . . . . . . 285--286
 Roberto R. Expósito and   
       Guillermo L. Taboada and   
               Sabela Ramos and   
        Juan Touriño and   
            Ramón Doallo   Performance Evaluation of Data-Intensive
                                  Computing Applications on a Public IaaS
                                  Cloud  . . . . . . . . . . . . . . . . . 287--307
                Sami Yangui and   
                     Samir Tata   An OCCI Compliant Model for PaaS
                                  Resources Description and Provisioning   308--324
                   Liang Li and   
                Endong Wang and   
               Xiaoshe Dong and   
                  Zhengdong Zhu   The Optimization of Memory Access
                                  Congestion for MapReduce Applications on
                                  Manycore Systems . . . . . . . . . . . . 325--337
           Christian Napoli and   
        Giuseppe Pappalardo and   
        Emiliano Tramontana and   
              Gaetano Zappal\`a   A Cloud-Distributed GPU Architecture for
                                  Pattern Identification in Segmented
                                  Detectors Big-Data Surveys . . . . . . . 338--352
                    T. Veni and   
            S. Mary Saira Bhanu   MDedup++: Exploiting Temporal and
                                  Spatial Page-Sharing Behaviors for
                                  Memory Deduplication Enhancement . . . . 353--370
      Sérgio Esteves and   
              Luís Veiga   WaaS: Workflow-as-a-Service for the
                                  Cloud with Scheduling of Continuous and
                                  Data-Intensive Workflows . . . . . . . . 371--383
David L. González-Álvarez and   
Miguel A. Vega-Rodríguez and   
      Álvaro Rubio-Largo   A Comparative Study of Different Motif
                                  Occurrence Models Applied to a Hybrid
                                  Multiobjective Shuffle Frog Leaping
                                  Algorithm  . . . . . . . . . . . . . . . 384--402
                   Yan Kong and   
               Minjie Zhang and   
                      Dayong Ye   An Auction-Based Approach for Group Task
                                  Allocation in an Open Network
                                  Environment  . . . . . . . . . . . . . . 403--422
              Iyad F. Jafar and   
          Khalid A. Darabkh and   
            Raed T. Al-Zubi and   
             Rami A. Al Na'mneh   Efficient Reversible Data Hiding Using
                                  Multiple Predictors  . . . . . . . . . . 423--438

The Computer Journal
Volume 59, Number 4, April, 2016

               Wuqiang Shen and   
                   Shaohua Tang   RGB, a Mixed Multivariate Signature
                                  Scheme . . . . . . . . . . . . . . . . . 439--451
                Leyou Zhang and   
                      Yi Mu and   
                        Qing Wu   Compact Anonymous Hierarchical
                                  Identity-Based Encryption with Constant
                                  Size Private Keys  . . . . . . . . . . . 452--461
            Simeon Veloudis and   
                 Nimal Nissanke   A Novel Permission Hierarchy for RBAC
                                  for Dealing with SoD in MAC Models . . . 462--492
               Mingwu Zhang and   
                          Yi Mu   Token-Leakage Tolerant and Vector
                                  Obfuscated IPE and Application in
                                  Privacy-Preserving Two-Party
                                  Point/Polynomial Evaluations . . . . . . 493--507
              Joonsang Baek and   
             Duncan S. Wong and   
                     Jin Li and   
                      Man Ho Au   Efficient Generic Construction of
                                  CCA-Secure Identity-Based Encryption
                                  from Randomness Extraction . . . . . . . 508--521
                  Peng Zhou and   
                Xiaojing Gu and   
              Rocky K. C. Chang   Harvesting File Download Exploits in the
                                  Web: a Hacker's View . . . . . . . . . . 522--540
                  Xinran Li and   
               Chen-Hui Jin and   
                    Fang-Wei Fu   Improved Results of Impossible
                                  Differential Cryptanalysis on Reduced
                                  FOX  . . . . . . . . . . . . . . . . . . 541--548
              Guo-Qiang Liu and   
                   Chen-Hui Jin   Linear Cryptanalysis of PRESENT-like
                                  Ciphers with Secret Permutation  . . . . 549--558
                Jiannan Wei and   
                Guomin Yang and   
                      Yi Mu and   
                   Kaitai Liang   Anonymous Proxy Signature with
                                  Hierarchical Traceability  . . . . . . . 559--569
                Emma Osborn and   
                 Andrew Simpson   On Safety and Security Requirements in
                                  Emerging Ubiquitous Computing Models . . 570--591
                  Hung-Yu Chien   A Generic Approach to Improving
                                  Diffie--Hellman Key Agreement Efficiency
                                  for Thin Clients . . . . . . . . . . . . 592--601

The Computer Journal
Volume 59, Number 5, May, 2016

                Josh Chopin and   
                 Hamid Laga and   
           Stanley J. Miklavcic   The Influence of Object Shape on the
                                  Convergence of Active Contour Models for
                                  Image Segmentation . . . . . . . . . . . 603--615
                Jia-Jie Liu and   
               Cheng-Ju Hsu and   
                 Chien-Hung Lin   Computing Global Secure Set on Trees . . 616--629
             Riku Saikkonen and   
        Eljas Soisalon-Soininen   Cache-Sensitive Memory Layout for
                                  Dynamic Binary Trees . . . . . . . . . . 630--649
        Konrad K. Dabrowski and   
           Daniël Paulusma   Clique-Width of Graph Classes Defined by
                                  Two Forbidden Induced Subgraphs  . . . . 650--666
          Natarajan Meghanathan   Maximal Assortative Matching and Maximal
                                  Dissortative Matching for Complex
                                  Network Graphs . . . . . . . . . . . . . 667--684
                Ju-Hee Choi and   
                     Gi-Ho Park   Demand-Aware NVM Capacity Management
                                  Policy for Hybrid Cache Architecture . . 685--700
               Jia-Chun Lin and   
               Fang-Yie Leu and   
                 Ying-ping Chen   Impacts of Task Re-Execution Policy on
                                  MapReduce Jobs . . . . . . . . . . . . . 701--714
                  Zheng Hao and   
               Dong Xiaoshe and   
              Zhu Zhengdong and   
                 Chen Baoke and   
                 Bai Xiuxiu and   
              Zhang Xingjun and   
                    Wang Endong   Improving the Reliability of the
                                  Operating System Inside a VM . . . . . . 715--740
                  Tao Zhang and   
                   He Jiang and   
                  Xiapu Luo and   
               Alvin T. S. Chan   A Literature Review of Research in Bug
                                  Resolution: Tasks, Challenges and Future
                                  Directions . . . . . . . . . . . . . . . 741--773

The Computer Journal
Volume 59, Number 6, June, 2016

         Bernabe Dorronsoro and   
              Sergio Nesmachnow   Parallel Soft Computing Techniques in
                                  High-Performance Computing Systems . . . 775--776
             Francisco Luna and   
          Gustavo R. Zavala and   
           Antonio J. Nebro and   
            Juan J. Durillo and   
        Carlos A. Coello Coello   Distributed Multi-Objective
                                  Metaheuristics for Real-World Structural
                                  Optimization Problems  . . . . . . . . . 777--792
                   Misun Yu and   
                   Doo-Hwan Bae   SimpleLock$^+$: Fast and Accurate Hybrid
                                  Data Race Detection  . . . . . . . . . . 793--809
               Nadia Nedjah and   
Rogério de Moraes Calazan and   
       Luiza de Macedo Mourelle   Particle, Dimension and
                                  Cooperation-Oriented PSO Parallelization
                                  Strategies for Efficient High-Dimension
                                  Problem Optimizations on Graphics
                                  Processing Units . . . . . . . . . . . . 810--835
         Guillermo Vigueras and   
          Juan M. Orduña   On the Use of GPU for Accelerating
                                  Communication-Aware Mapping Techniques   836--847
              Jianliang Gao and   
                   Ping Liu and   
                Xuedan Kang and   
                Lixia Zhang and   
                   Jianxin Wang   PRS: Parallel Relaxation Simulation for
                                  Massive Graphs . . . . . . . . . . . . . 848--860
                  Zhuo Wang and   
               Tingting Hou and   
                 Dawei Song and   
                    Zhun Li and   
                    Tianqi Kong   Detecting Review Spammer Groups via
                                  Bipartite Graph Projection . . . . . . . 861--874
               Chris Gorman and   
                    Iren Valova   GORMANN: Gravitationally Organized
                                  Related Mapping Artificial Neural
                                  Network  . . . . . . . . . . . . . . . . 875--888
               D. Thenmozhi and   
          Chandrabose Aravindan   An Automatic and Clause-Based Approach
                                  to Learn Relations for Ontologies  . . . 889--907
                  Mert Ozer and   
               Ilkcan Keles and   
              Hakki Toroslu and   
              Pinar Karagoz and   
                  Hasan Davulcu   Predicting the Location and Time of
                                  Mobile Phone Users by Using Sequential
                                  Pattern Mining Techniques  . . . . . . . 908--922
      Sangeeta Bhattacharya and   
                  S. Selvakumar   Multi-Measure Multi-Weight Ranking
                                  Approach for the Identification of the
                                  Network Features for the Detection of
                                  DoS and Probe Attacks  . . . . . . . . . 923--943

The Computer Journal
Volume 59, Number 7, July, 2016

              Joseph K. Liu and   
               Sze Ling Yeo and   
                Wun-She Yap and   
         Sherman S. M. Chow and   
             Duncan S. Wong and   
                   Willy Susilo   Faulty Instantiations of Threshold Ring
                                  Signature from Threshold
                                  Proof-of-Knowledge Protocol  . . . . . . 945--954
                 Peng Jiang and   
                      Yi Mu and   
                 Fuchun Guo and   
               Xiaofen Wang and   
                    Qiaoyan Wen   Online/Offline Ciphertext Retrieval on
                                  Resource Constrained Devices . . . . . . 955--969
                Chunpeng Ge and   
               Willy Susilo and   
              Jiandong Wang and   
               Zhiqiu Huang and   
                Liming Fang and   
                    Yongjun Ren   A Key-Policy Attribute-Based Proxy
                                  Re-Encryption Without Random Oracles . . 970--982
                   Zhen Liu and   
                 Duncan S. Wong   Practical Attribute-Based Encryption:
                                  Traitor Tracing, Revocation and Large
                                  Universe . . . . . . . . . . . . . . . . 983--1004
        Amir Jalaly Bidgoly and   
            Behrouz Tork Ladani   Modeling and Quantitative Verification
                                  of Trust Systems Against Malicious
                                  Attackers  . . . . . . . . . . . . . . . 1005--1027
                   Jiguo Li and   
                 Haiting Du and   
                   Yichen Zhang   Certificate-Based Key-Insulated
                                  Signature in the Standard Model  . . . . 1028--1039
              Joseph K. Liu and   
               Willy Susilo and   
               Tsz Hon Yuen and   
                  Man Ho Au and   
                Junbin Fang and   
               Zoe L. Jiang and   
                  Jianying Zhou   Efficient Privacy-Preserving Charging
                                  Station Reservation System for Electric
                                  Vehicles . . . . . . . . . . . . . . . . 1040--1053
                Kunpeng Bai and   
                    Chuankun Wu   An AES-Like Cipher and Its White-Box
                                  Implementation . . . . . . . . . . . . . 1054--1065
                   Jiguo Li and   
                Meilin Teng and   
               Yichen Zhang and   
                      Qihong Yu   A Leakage-Resilient CCA-Secure
                                  Identity-Based Encryption Scheme . . . . 1066--1075
Mario Diego Munoz-Hernandez and   
    Miguel Morales-Sandoval and   
     Jose Juan Garcia-Hernandez   An End-to-End Security Approach for
                                  Digital Document Management  . . . . . . 1076--1090
                   Haibo Yi and   
                   Shaohua Tang   Very Small FPGA Processor for
                                  Multivariate Signatures  . . . . . . . . 1091--1101
                   Haibo Yi and   
               Shaohua Tang and   
                   Ranga Vemuri   Fast Inversions in Small Finite Fields
                                  by Using Binary Trees  . . . . . . . . . 1102--1112

The Computer Journal
Volume 59, Number 8, August, 2016

                 Xiang Zhao and   
                 Yifan Chen and   
                 Chuan Xiao and   
         Yoshiharu Ishikawa and   
                   Jiuyang Tang   Frequent Subgraph Mining Based on Pregel 1113--1128
     Jorge Francisco Cutigi and   
             Adenilso Simao and   
             Simone R. S. Souza   Reducing FSM-Based Test Suites with
                                  Guaranteed Fault Coverage  . . . . . . . 1129--1143
     Pablo Pérez-Lantero   Area and Perimeter of the Convex Hull of
                                  Stochastic Points  . . . . . . . . . . . 1144--1154
                 Hairong Yu and   
                  Guohui Li and   
                 Jianjun Li and   
                   Lihchyun Shu   DO$_{\rm cyclical}$: a Latency-Resistant
                                  Cyclic Multi-Threading Approach for
                                  Automatic Program Parallelization  . . . 1155--1173
            Indra Rajasingh and   
                Paul Manuel and   
               N. Parthiban and   
          D. Azubha Jemilet and   
               R. Sundara Rajan   Transmission in Butterfly Networks . . . 1174--1179
          Zbyn\vek K\vrivka and   
           Alexander Meduna and   
                     Petr Zemek   Phrase-Structure Grammars: Normal Forms
                                  and Reduction  . . . . . . . . . . . . . 1180--1185
          Robert M. Hierons and   
        Uraz Cengiz Türker   Distinguishing Sequences for Distributed
                                  Testing: Adaptive Distinguishing
                                  Sequences  . . . . . . . . . . . . . . . 1186--1206
                 Huilin Liu and   
                  Chen Chen and   
               JunChang Xin and   
                   Liyuan Zhang   Searching the Informative Subgraph Based
                                  on the PeakGraph Model . . . . . . . . . 1207--1219
                    Hui Cui and   
                 Robert H. Deng   Revocable and Decentralized
                                  Attribute-Based Encryption . . . . . . . 1220--1235
               Weifeng Wang and   
                        Li Jiao   Trace Abstraction Refinement for Solving
                                  Horn Clauses . . . . . . . . . . . . . . 1236--1251
            Fabrizio Luccio and   
               Bernard Mans and   
             Luke Mathieson and   
                    Linda Pagli   Complete Balancing via Rotation  . . . . 1252--1263
     Rolando Trujillo-Rasua and   
                 Ismael G. Yero   Characterizing $1$-Metric
                                  Antidimensional Trees and Unicyclic
                                  Graphs . . . . . . . . . . . . . . . . . 1264--1273

The Computer Journal
Volume 59, Number 9, September, 2016

            Arambam Neelima and   
               Kh Manglem Singh   Perceptual Hash Function based on
                                  Scale-Invariant Feature Transform and
                                  Singular Value Decomposition . . . . . . 1275--1281
                         Wei Ni   Minimized Error Propagation Location
                                  Method Based on Error Estimation . . . . 1282--1288
               D. Thenmozhi and   
          Chandrabose Aravindan   Paraphrase Identification by Using
                                  Clause-Based Similarity Features and
                                  Machine Translation Metrics  . . . . . . 1289--1302
  Alok Kumar Singh Kushwaha and   
              Rajeev Srivastava   Maritime Object Segmentation Using
                                  Dynamic Background Modeling and Shadow
                                  Suppression  . . . . . . . . . . . . . . 1303--1329
         Willian Valmorbida and   
Jorge Luis Victória Barbosa and   
Débora Nice Ferrari Barbosa and   
        Sandro José Rigo   U-Library: an Intelligent Model for
                                  Ubiquitous Library Support . . . . . . . 1330--1344
             Billur Barshan and   
                   Aras Yurtman   Investigating Inter-Subject and
                                  Inter-Activity Variations in Activity
                                  Recognition Using Wearable Motion
                                  Sensors  . . . . . . . . . . . . . . . . 1345--1362
    Konstantinos Tsakalozos and   
         Spiros Evangelatos and   
            Fotis Psallidas and   
           Marcos R. Vieira and   
        Vassilis J. Tsotras and   
                     Alex Delis   DiVA: Using Application-Specific
                                  Policies to `Dive' into Vector
                                  Approximations . . . . . . . . . . . . . 1363--1382
             Sunita Garhwal and   
                     Ram Jiwari   Parallel Fuzzy Regular Expression and
                                  its Conversion to Epsilon-Free Fuzzy
                                  Automaton  . . . . . . . . . . . . . . . 1383--1391
                Ohoud Nafea and   
             Sanaa Ghouzali and   
               Wadood Abdul and   
               Emad-ul-Haq Qazi   Hybrid Multi-Biometric Template
                                  Protection Using Watermarking  . . . . . 1392--1407
                Yair Neuman and   
                   Yochai Cohen   A Novel Methodology for Automatically
                                  Measuring Psychological Dimensions in
                                  Textual Data . . . . . . . . . . . . . . 1408--1414
Nilson Donizete Guerin, Jr. and   
     Flavio de Barros Vidal and   
             Bruno Macchiavello   Text-dependent User Verification of
                                  Handwritten Words and Signatures on
                                  Mobile Devices . . . . . . . . . . . . . 1415--1425
   Ümit Ekmekçi and   
     Zehra Çataltepe and   
Güvenç Güngör and   
                Demir Can Kahya   EigenBots for the Okey Social Board Game 1426--1432

The Computer Journal
Volume 59, Number 10, October, 2016

Pilar González-Férez and   
               Juan Piernas and   
                    Toni Cortes   Improving I/O Performance Through an
                                  In-Kernel Disk Simulator . . . . . . . . 1433--1452
                 Lois Orosa and   
         Javier D. Bruguera and   
                Elisardo Antelo   Asymmetric Allocation in a Shared
                                  Flexible Signature Module for Multicore
                                  Processors . . . . . . . . . . . . . . . 1453--1469
                    Rui Hou and   
                  Jigang Wu and   
                 Yawen Chen and   
                    Haibo Zhang   Note on Edge-Colored Graphs for Networks
                                  with Homogeneous Faults  . . . . . . . . 1470--1478
                 A. S. Kang and   
                       Renu Vig   Comparative Performance Evaluation of
                                  Modified Prototype Filter Bank
                                  Multicarrier Cognitive Radio Under
                                  Constraints of $ L_p $, K, N and D . . . 1479--1491
           Yung-Ting Chuang and   
        P. M. Melliar-Smith and   
            Louise E. Moser and   
    Isaií Michel Lombera   Statistical Estimation and Dynamic
                                  Adaptation Algorithms for the iTrust
                                  Publication, Search and Retrieval System 1492--1510
               Hongzhi Zhao and   
                       Yuan Xue   RSD Fault Block Model for Highly
                                  Efficient Fault-Tolerant Manhattan
                                  Routing Algorithms in $2$D Mesh  . . . . 1511--1526
                L. Sivagami and   
         J. Martin Leo Manickam   Cluster-Based MAC Protocol for Collision
                                  Avoidance and TDMA Scheduling in
                                  Underwater Wireless Sensor Networks  . . 1527--1535
                  Yili Gong and   
                  Chuang Hu and   
                  Yanyan Xu and   
                    Wenjie Wang   A Distributed File System with Variable
                                  Sized Objects for Enhanced Random Writes 1536--1550
                I. S. Akila and   
                  R. Venkatesan   A Fuzzy Based Energy-aware Clustering
                                  Architecture for Cooperative
                                  Communication in WSN . . . . . . . . . . 1551--1562
                   Xiang Hu and   
                    Li Jiao and   
                      Zhijia Li   Modelling and Performance Analysis of
                                  IEEE 802.11 DCF Using Coloured Petri
                                  Nets . . . . . . . . . . . . . . . . . . 1563--1580

The Computer Journal
Volume 59, Number 11, November, 2016

             Magdy M. Fadel and   
           Ali I. El-Desoky and   
            Amira Y. Haikel and   
                 Labib M. Labib   A Low-Storage Precise IP Traceback
                                  Technique Based on Packet Marking and
                                  Logging  . . . . . . . . . . . . . . . . 1581--1592
                   Lan Zhou and   
         Vijay Varadharajan and   
                    K. Gopinath   A Secure Role-Based Cloud Storage System
                                  For Encrypted Patient-Centric Health
                                  Records  . . . . . . . . . . . . . . . . 1593--1611
     Mohannad J. Alhanahnah and   
              Arshad Jhumka and   
                  Sahel Alouneh   A Multidimension Taxonomy of Insider
                                  Threats in Cloud Computing . . . . . . . 1612--1622
          Fatemeh Imanimehr and   
               Mehran S. Fallah   How Powerful Are Run-Time Monitors with
                                  Static Information?  . . . . . . . . . . 1623--1636
               Shi-Feng Sun and   
              Joseph K. Liu and   
                      Yu Yu and   
                Baodong Qin and   
                        Dawu Gu   RKA-Secure Public Key Encryptions
                                  Against Efficiently Invertible Functions 1637--1658
                  Yanli Ren and   
                  Ning Ding and   
              Xinpeng Zhang and   
                 Haining Lu and   
                        Dawu Gu   Identity-Based Encryption with
                                  Verifiable Outsourced Revocation . . . . 1659--1668
               Junqing Gong and   
               Xiaolei Dong and   
                 Zhenfu Cao and   
                       Jie Chen   Almost-Tight Identity Based Encryption
                                  Against Selective Opening Attack . . . . 1669--1688
              Hyung Tae Lee and   
                   San Ling and   
               Jae Hong Seo and   
                  Huaxiong Wang   CCA2 Attack and Modification of Huang et
                                  al.'s Public Key Encryption with
                                  Authorized Equality Test . . . . . . . . 1689--1694
               Jiangshan Yu and   
             Vincent Cheval and   
                      Mark Ryan   DTKI: a New Formalized PKI with
                                  Verifiable Trusted Parties . . . . . . . 1695--1713
              Jianghong Wei and   
                Xinyi Huang and   
                 Wenfen Liu and   
                     Xuexian Hu   Practical Attribute-based Signature:
                                  Traceability and Revocability  . . . . . 1714--1734
                Byungho Min and   
             Vijay Varadharajan   Rethinking Software Component Security:
                                  Software Component Level Integrity and
                                  Cross Verification . . . . . . . . . . . 1735--1748

The Computer Journal
Volume 59, Number 12, December, 2016

              Minhaj Ahmad Khan   A Transformation For Optimizing
                                  String-Matching Algorithms For Long
                                  Patterns . . . . . . . . . . . . . . . . 1749--1759
            Walayat Hussain and   
    Farookh Khadeer Hussain and   
       Omar Khadeer Hussain and   
                Elizabeth Chang   Provider-Based Optimized Personalized
                                  Viable SLA (OPV-SLA) Framework to
                                  Prevent SLA Violation  . . . . . . . . . 1760--1783
              Mariem Mefteh and   
            Nadia Bouassida and   
      Hanêne Ben-Abdallah   Mining Feature Models from Functional
                                  Requirements . . . . . . . . . . . . . . 1784--1804
            Khaled El-Fakih and   
               Nina Yevtushenko   Test Translation for Embedded Finite
                                  State Machine Components . . . . . . . . 1805--1816
        Farah A\"\it-Salaht and   
          Hind Castel-Taleb and   
       Jean-Michel Fourneau and   
                 Nihal Pekergin   Performance Analysis of a Queue by
                                  Combining Stochastic Bounds, Real
                                  Traffic Traces and Histograms  . . . . . 1817--1830
                P. Angelini and   
                    G. Da Lozzo   SEFE = C-Planarity?  . . . . . . . . . . 1831--1838
               Shiying Wang and   
               Zhenhua Wang and   
               Mujiangshan Wang   The $2$-Extra Connectivity and $2$-Extra
                                  Diagnosability of Bubble-Sort Star Graph
                                  Networks . . . . . . . . . . . . . . . . 1839--1856
                  Liang Bao and   
                   Fen Zhao and   
              Mengqing Shen and   
                   Yutao Qi and   
                      Ping Chen   An Orthogonal Genetic Algorithm for
                                  QoS-Aware Service Composition  . . . . . 1857--1871
            Simone Brognoli and   
        Gianfranco Lamperti and   
               Michele Scandale   Incremental Determinization of Expanding
                                  Automata . . . . . . . . . . . . . . . . 1872--1899
            Sandi Klav\vzar and   
                Paul Manuel and   
        M. J. Nadjafi-Arani and   
           R. Sundara Rajan and   
          Cyriac Grigorious and   
                 Sudeep Stephen   Average Distance in Interconnection
                                  Networks via Reduction Theorems for
                                  Vertex-Weighted Graphs . . . . . . . . . 1900--1910


The Computer Journal
Volume 60, Number 1, January, 2017

               Weidong Chen and   
                      Shan Ling   Node-Pancyclic Properties of Biswapped
                                  Networks Based on Cycles in Their Factor
                                  Networks . . . . . . . . . . . . . . . . 1--12
                Shuo-I Wang and   
                  Fu-Hsing Wang   Independent Spanning Trees in
                                  RTCC-Pyramids  . . . . . . . . . . . . . 13--26
                    Jian Yu and   
                    Jun Han and   
         Jean-Guy Schneider and   
               Cameron Hine and   
                 Steve Versteeg   A Petri-Net-Based Virtual Deployment
                                  Testing Environment for Enterprise
                                  Software Systems . . . . . . . . . . . . 27--44
               Aimal Rextin and   
                  Patrick Healy   Dynamic Upward Planarity Testing of
                                  Single Source Embedded Digraphs  . . . . 45--59
                 J. C. Saez and   
                   A. Pousa and   
R. Rodriíguez-Rodriíguez and   
                  F. Castro and   
               M. Prieto-Matias   PMCTrack: Delivering Performance
                                  Monitoring Counter Support to the OS
                                  Scheduler  . . . . . . . . . . . . . . . 60--85
     Alejandro Pérez and   
           Pablo Sánchez   On the Use of C# Partial Classes for the
                                  Implementation of Software Product Lines 86--109
          Robert M. Hierons and   
        Uraz Cengiz Türker   Distinguishing Sequences for Distributed
                                  Testing: Preset Distinguishing Sequences 110--125
             Maryam Shoaran and   
                     Alex Thomo   Editorial: Zero-Knowledge-Private
                                  Counting of Group Triangles in Social
                                  Networks . . . . . . . . . . . . . . . . 126--134
          Emilio Di Giacomo and   
              Walter Didimo and   
            Giuseppe Liotta and   
          Fabrizio Montecchiani   Area-Thickness Trade-Offs for
                                  Straight-Line Drawings of Planar Graphs  135--142
               Chang-ai Sun and   
                    Lin Pan and   
              Qiaoling Wang and   
                   Huai Liu and   
                  Xiangyu Zhang   An Empirical Study on Mutation Testing
                                  of WS-BPEL Programs  . . . . . . . . . . 143--158

The Computer Journal
Volume 60, Number 2, February, 2017

                    Yali Lv and   
             Cheng-Kuan Lin and   
                     Jianxi Fan   Hamiltonian Cycle and Path Embeddings in
                                  $k$-Ary $n$-Cubes Based on Structure
                                  Faults . . . . . . . . . . . . . . . . . 60
          Cyriac Grigorious and   
             Sudeep Stephen and   
              Bharati Rajan and   
                   Mirka Miller   On the Partition Dimension of Circulant
                                  Graphs . . . . . . . . . . . . . . . . . 60
Seyyed Amir Ali Ghafourian Ghahramani and   
  Ali Mohammad Afshin Hemmatyar   A Graph-based Performance Analysis of
                                  the 802.11p MAC Protocol for Safety
                                  Communications in Highway Vehicular Ad
                                  Hoc Networks . . . . . . . . . . . . . . 60
         Keyvan RahimiZadeh and   
            Morteza AnaLoui and   
              Peyman Kabiri and   
                  Bahman Javadi   Workload-Aware Placement of Multi-Tier
                                  Applications in Virtualized Datacenters  60
             Joshua Higgins and   
             Violeta Holmes and   
                  Colin Venters   Autonomous Discovery and Management in
                                  Virtual Container Clusters . . . . . . . 60
              Yen-Hung Chen and   
             Yuan-Cheng Lai and   
             Ching-Neng Lai and   
                    Yang-Chi Li   A Group Bandwidth Reservation Scheme to
                                  Enhance the Driver's Safety in Vehicles
                                  and Transport Environment  . . . . . . . 60
                   Tong Liu and   
                 Yanmin Zhu and   
                 Hongzi Zhu and   
                   Jiadi Yu and   
              Yuanyuan Yang and   
                         Fan Ye   Online Pricing for Efficient Renewable
                                  Energy Sharing in a Sustainable
                                  Microgrid  . . . . . . . . . . . . . . . 60

The Computer Journal
Volume 60, Number 3, March, 2017

           Sebastian Maneth and   
        Alexandra Poulovassilis   Data Science . . . . . . . . . . . . . . 60
                   Yang Cao and   
                 Wenfei Fan and   
                       Shuai Ma   Virtual Network Mapping in Cloud
                                  Computing: a Graph Pattern Matching
                                  Approach . . . . . . . . . . . . . . . . 60
                 Lena Wiese and   
                  Tim Waage and   
             Ferdinand Bollwein   A Replication Scheme for Multiple
                                  Fragmentations with Overlapping
                                  Fragments  . . . . . . . . . . . . . . . 60
             Andreas Weiler and   
       Michael Grossniklaus and   
                 Marc H. Scholl   Editorial: Survey and Experimental
                                  Analysis of Event Detection Techniques
                                  for Twitter  . . . . . . . . . . . . . . 60
                     Yu Liu and   
                  Peter McBrien   Transactional and Incremental Type
                                  Inference from Data Updates  . . . . . . 60
           Reem Q. Al Fayez and   
                       Mike Joy   Using Linked Data for Integrating
                                  Educational Medical Web Databases Based
                                  on BioMedical Ontologies . . . . . . . . 60
            Eleni Tsalapati and   
            Giorgos Stoilos and   
       Alexandros Chortaras and   
             Giorgos Stamou and   
                George Koletsos   Query Rewriting Under Ontology Change    60
                Adnan Idris and   
                 Asifullah Khan   Churn Prediction System for Telecom
                                  using Filter--Wrapper and Ensemble
                                  Classification . . . . . . . . . . . . . 60
             Alireza Nazemi and   
               Ozra Ghezelsofla   A Dual Neural Network Scheme for Solving
                                  the Assignment Problem . . . . . . . . . 60
    Prabavathy Balasundaram and   
                Chitra Babu and   
                   Subha Devi M   Improving Read Throughput of
                                  Deduplicated Cloud Storage using
                                  Frequent Pattern-Based Prefetching
                                  Technique  . . . . . . . . . . . . . . . 60

The Computer Journal
Volume 60, Number 4, March 23, 2017

                Tomasz Hyla and   
                  Jerzy Peja\'s   A Hess-Like Signature Scheme Based on
                                  Implicit and Explicit Certificates . . . 457--475
      Jeremy Maitin-Shepard and   
             Mehdi Tibouchi and   
                Diego F. Aranha   Elliptic Curve Multiset Hash . . . . . . 476--490
                 Xi-Jun Lin and   
                    Lin Sun and   
                 Haipeng Qu and   
                Xiaoshuai Zhang   Editorial: On the Security of the First
                                  Leakage-Free Certificateless
                                  Signcryption Scheme  . . . . . . . . . . 491--496
                 Shaoquan Jiang   Bounds for Message Authentication with
                                  Distortion . . . . . . . . . . . . . . . 497--506
                   Jing Liu and   
                  Yunyun Wu and   
               Xuezheng Liu and   
              Yunchun Zhang and   
                   Gang Xue and   
                   Wei Zhou and   
                    Shaowen Yao   On the (In)Security of Recent Group Key
                                  Distribution Protocols . . . . . . . . . 507--526
              Kenneth Radke and   
                     Colin Boyd   Security Proofs for Protocols Involving
                                  Humans . . . . . . . . . . . . . . . . . 527--540
                Leyou Zhang and   
              Jingxia Zhang and   
                          Yi Mu   Novel Leakage-Resilient Attribute-Based
                                  Encryption from Hash Proof System  . . . 541--554
       Emi\.n \.Islam Tatli and   
               Bedi\.rhan Urgun   WIVET --- Benchmarking Coverage
                                  Qualities of Web Crawlers  . . . . . . . 555--572
            Muhammet Yildiz and   
         Berrin Yaniko\uglu and   
          Alisher Kholmatov and   
                Alper Kanak and   
              Umut Uluda\ug and   
                Hakan Erdo\ugan   Biometric Layering with Fingerprints:
                                  Template Security and Privacy Through
                                  Multi-Biometric Template Fusion  . . . . 573--587
                  Man Ho Au and   
              Joseph K. Liu and   
              Zhenfei Zhang and   
               Willy Susilo and   
                     Jin Li and   
                  Jianying Zhou   Anonymous Announcement System (AAS) for
                                  Electric Vehicle in VANETs . . . . . . . 588--599
                 Yujue Wang and   
                   HweeHwa Pang   Probabilistic Public Key Encryption for
                                  Controlled Equijoin in Relational
                                  Databases  . . . . . . . . . . . . . . . 600--612
                  Wentan Yi and   
              Shaozhen Chen and   
                      Yuchen Li   Zero-correlation Linear Cryptanalysis of
                                  SAFER Block Cipher Family Using the
                                  Undisturbed Bits . . . . . . . . . . . . 613--624

The Computer Journal
Volume 60, Number 5, April 1, 2017

                   Xiang Xu and   
               Shuming Zhou and   
                    Jinqiang Li   Reliability of Complete Cubic Networks
                                  under the Condition of $g$-Good-Neighbor 625--635
              Ornela Dardha and   
              Daniele Gorla and   
                Daniele Varacca   Semantic Subtyping for Objects and
                                  Classes  . . . . . . . . . . . . . . . . 636--656
            Stefan Edelkamp and   
                Amr Elmasry and   
               Jyrki Katajainen   Heap Construction --- 50 Years Later . . 657--674
                   Wang Lin and   
                     Min Wu and   
             Zhengfeng Yang and   
                  Zhenbing Zeng   Verification for Non-polynomial Hybrid
                                  Systems Using Rational Invariants  . . . 675--689
                    Yu Yang and   
                 Hongbo Liu and   
                   Hua Wang and   
               Ansheng Deng and   
                 Colton Magnant   On Algorithms for Enumerating Subtrees
                                  of Hexagonal and Phenylene Chains  . . . 690--710
            Akinori Kawachi and   
             Yoshio Okamoto and   
             Keisuke Tanaka and   
                 Kenji Yasunaga   General Constructions of Rational Secret
                                  Sharing with Expected Constant-Round
                                  Reconstruction . . . . . . . . . . . . . 711--728
             Wiktor B. Daszczuk   Communication and Resource Deadlock
                                  Analysis Using IMDS Formalism and Model
                                  Checking . . . . . . . . . . . . . . . . 729--750
                 Cheng Zhou and   
               Zhonghai Yin and   
                   Youqian Feng   Events Algebra of Triggers . . . . . . . 751--760
                Seungbum Jo and   
            Stelios Joannou and   
          Daisuke Okanohara and   
               Rajeev Raman and   
            Srinivasa Rao Satti   Compressed Bit vectors Based on
                                  Variable-to-Fixed Encodings  . . . . . . 761--775

The Computer Journal
Volume 60, Number 6, June 1, 2017

                     Wei Wu and   
                Jiguang Wan and   
                  Ling Zhan and   
                 Jibin Wang and   
                 Changsheng Xie   DROP: a New RAID Architecture for
                                  Enhancing Shared RAID Performance  . . . 777--790
                 Qiufen Xia and   
                Weifa Liang and   
                     Zichuan Xu   Data Locality-Aware Big Data Query
                                  Evaluation in Distributed Clouds . . . . 791--809
                 Xiaoyin Li and   
               Lianshan Yan and   
                    Wei Pan and   
                        Bin Luo   Secure and Robust DV-Hop Localization
                                  Based on the Vector Refinement Feedback
                                  Method for Wireless Sensor Networks  . . 810--821
            Meng-Shu Chiang and   
           Chung-Ming Huang and   
               Duy-Tuan Dao and   
                 Binh-Chau Pham   GB-PMIPv6: a Group-Based Handover
                                  Control Scheme for PMIPv6 Using the
                                  `Hitch on' Concept . . . . . . . . . . . 822--834
               Ramzi Saifan and   
                 Iyad Jafar and   
                Ghazi Al Sukkar   Optimized Cooperative Spectrum Sensing
                                  Algorithms in Cognitive Radio Networks   835--849
                   Jia Peng and   
                 Yanmin Zhu and   
               Qingwen Zhao and   
                 Hongzi Zhu and   
                   Jian Cao and   
               Guangtao Xue and   
                          Bo Li   Fair Energy-Efficient Sensing Task
                                  Allocation in Participatory Sensing with
                                  Smartphones  . . . . . . . . . . . . . . 850--865
      Parisa Jalili Marandi and   
                Marco Primi and   
            Nicolas Schiper and   
                Fernando Pedone   Ring Paxos: High-Throughput Atomic
                                  Broadcast  . . . . . . . . . . . . . . . 866--882
         Ihsan Mert Ozcelik and   
          Ibrahim Korpeoglu and   
                 Ashok Agrawala   Energy Efficient IP-Connectivity with
                                  IEEE 802.11 for Home M2M Networks  . . . 883--897
                  Chen Ying and   
                  Hao Huang and   
            Ajay Gopinathan and   
                    Zongpeng Li   A Prior-Free Spectrum Auction for
                                  Approximate Revenue Maximization . . . . 898--910
                  Fan Zhang and   
                   Tao Jing and   
                    Yan Huo and   
                   Kaiwei Jiang   Throughput Optimization for Energy
                                  Harvesting Cognitive Radio Networks with
                                  Save-Then-Transmit Protocol  . . . . . . 911--924
                 Li Chunlin and   
                   Zhou Min and   
                    Luo Youlong   Efficient Load-Balancing Aware Cloud
                                  Resource Scheduling for Mobile User  . . 925--939

The Computer Journal
Volume 60, Number 7, July 1, 2017

                Susan Lomax and   
                   Sunil Vadera   A Cost-Sensitive Decision Tree Learning
                                  Algorithm Based on a Multi-Armed Bandit
                                  Framework  . . . . . . . . . . . . . . . 941--956
                  Lin Zheng and   
                   Fuxi Zhu and   
            Alshahrani Mohammed   Attribute and Global Boosting: a Rating
                                  Prediction Method in Context-Aware
                                  Recommendation . . . . . . . . . . . . . 957--968
            Salma Ben Jemaa and   
            Mohamed Hammami and   
            Hanene Ben-Abdallah   Finger Surfaces Recognition Using Rank
                                  Level Fusion . . . . . . . . . . . . . . 969--985
               S. Thayammal and   
                    D. Selvathi   Edge Preserved Multispectral Image
                                  Compression Using Extended Shearlet
                                  Transform  . . . . . . . . . . . . . . . 986--994
           Karam Abdulahhad and   
      Jean-Pierre Chevallet and   
               Catherine Berrut   Logics, Lattices and Probability: The
                                  Missing Links to Information Retrieval   995--1018
                  Long Chen and   
             Joemon M. Jose and   
                  Haitao Yu and   
                     Fajie Yuan   A Hybrid Approach for Question Retrieval
                                  in Community Question Answerin . . . . . 1019--1031
               Zhiping Peng and   
                      Bo Xu and   
       Antonio Marcel Gates and   
                 Delong Cui and   
                     Weiwei Lin   A Study of a Multi-Agent Organizational
                                  Framework with Virtual Machine Clusters
                                  as the Unit of Granularity in Cloud
                                  Computing  . . . . . . . . . . . . . . . 1032--1043
           Joshua Goncalves and   
                 Aneesh Krishna   Incorporating Change Management Within
                                  Dynamic Requirements-Based Model-Driven
                                  Agent Development  . . . . . . . . . . . 1044--1077
              Jianbin Huang and   
                    Yu Zhou and   
                Xiaolin Jia and   
                       Heli Sun   A Novel Social Event Organization
                                  Approach for Diverse User Choices  . . . 1078--1095
             Angelo Furfaro and   
      Maria Carmela Groccia and   
                Simona E. Rombo   $2$D Motif Basis Applied to the
                                  Classification of Digital Images . . . . 1096--1109

The Computer Journal
Volume 60, Number 8, August 1, 2017

               Shuling Wang and   
           Flemming Nielson and   
         Hanne Riis Nielson and   
                    Naijun Zhan   Modelling and Verifying Communication
                                  Failure of Hybrid Systems in HCSP  . . . 1111--1130
              Hailong Zhang and   
                   Yongbin Zhou   Mahalanobis Distance Similarity Measure
                                  Based Higher Order Optimal Distinguisher 1131--1144
                 Zheng Yang and   
                  Junyu Lai and   
                   Chao Liu and   
                Wanping Liu and   
                  Shuangqing Li   Simpler Generic Constructions for
                                  Strongly Secure One-round Key Exchange
                                  from Weaker Assumptions  . . . . . . . . 1145--1160
                Yanwei Zhou and   
                        Bo Yang   Continuous Leakage-Resilient Public-Key
                                  Encryption Scheme with CCA Security  . . 1161--1172
             Guglielmo Cola and   
             Marco Avvenuti and   
                Alessio Vecchio   Real-Time Identification Using Gait
                                  Pattern Analysis on a Standalone
                                  Wearable Accelerometer . . . . . . . . . 1173--1186
                 Huifang Yu and   
                        Bo Yang   Pairing-Free and Secure Certificateless
                                  Signcryption Scheme  . . . . . . . . . . 1187--1196
                   Haibo Yi and   
                     Weijian Li   On the Importance of Checking
                                  Multivariate Public Key Cryptography for
                                  Side-Channel Attacks: The Case of enTTS
                                  Scheme . . . . . . . . . . . . . . . . . 1197--1209
                Junwei Zhou and   
                   Hui Duan and   
               Kaitai Liang and   
                   Qiao Yan and   
                   Fei Chen and   
              F. Richard Yu and   
                 Jieming Wu and   
                  Jianyong Chen   Securing Outsourced Data in the
                                  Multi-Authority Cloud with Fine-Grained
                                  Access Control and Efficient Attribute
                                  Revocation . . . . . . . . . . . . . . . 1210--1222
            Shabnam Seradji and   
               Mehran S. Fallah   A Bayesian Game of Whitewashing in
                                  Reputation Systems . . . . . . . . . . . 1223--1237
               Gamze Tillem and   
              Erkay Sava\cs and   
                     Kamer Kaya   A New Method for Computational Private
                                  Information Retrieval  . . . . . . . . . 1238--1250
                   Yang Liu and   
                 Andrew Simpson   AdSelector: a Privacy-Preserving
                                  Advertisement Selection Mechanism for
                                  Mobile Devices . . . . . . . . . . . . . 1251--1270

The Computer Journal
Volume 60, Number 9, September 1, 2017

        Sergio L. S. Mergen and   
             Viviane P. Moreira   DuelMerge: Merging with Fewer Moves  . . 1271--1278
  Gregorio Hernández and   
                Mafalda Martins   Remote Monitoring by Edges and Faces of
                                  Maximal Outerplanar Graphs . . . . . . . 1279--1288
                    Wei Gao and   
         Mohammad Reza Farahani   Generalization Bounds and Uniform Bounds
                                  for Multi-Dividing Ontology Algorithms
                                  with Convex Ontology Loss Function . . . 1289--1299
               Jose Quiroga and   
                Francisco Ortin   SSA Transformations to Facilitate Type
                                  Inference in Dynamically Typed Code  . . 1300--1315
           Fahimeh Ramezani and   
                     Jie Lu and   
               Javid Taheri and   
               Albert Y. Zomaya   A Multi-Objective Load Balancing System
                                  for Cloud Environments . . . . . . . . . 1316--1337
                      Hu He and   
                    Xu Yang and   
                   Yanjun Zhang   On Improving Performance and Energy
                                  Efficiency for Register-File Connected
                                  Clustered VLIW Architectures for
                                  Embedded System Usage  . . . . . . . . . 1338--1352
               Chuanli Zhao and   
              Chou-Jung Hsu and   
               Win-Chin Lin and   
              Wen-Hsiang Wu and   
                   Chin-Chia Wu   An Investigation of Single-Machine
                                  Due-Window Assignment with
                                  Time-Dependent Processing Times and a
                                  Controllable Rate-Modifying Activity . . 1353--1362
  Lucas Bueno Ruas Oliveira and   
               Elena Leroux and   
     Katia Romero Felizardo and   
             Flavio Oquendo and   
            Elisa Yumi Nakagawa   ArchSORS: a Software Process for
                                  Designing Software Architectures of
                                  Service-Oriented Robotic Systems . . . . 1363--1381
              Jianbin Huang and   
               Xiaojing Sun and   
                    Yu Zhou and   
                       Heli Sun   A Team Formation Model with Personnel
                                  Work Hours and Project Workload
                                  Quantified . . . . . . . . . . . . . . . 1382--1394
         Nieves R. Brisaboa and   
      Guillermo de Bernardo and   
  Gilberto Gutiérrez and   
           Miguel R. Luaces and   
   José R. Paramá   Efficiently Querying Vector and Raster
                                  Data . . . . . . . . . . . . . . . . . . 1395--1413

The Computer Journal
Volume 60, Number 10, October 1, 2017

                      Anonymous   Special Issue on Software-Defined
                                  Wireless Networks  . . . . . . . . . . . 1415--1416
                   Xiao Liu and   
                 Anfeng Liu and   
              Qingyong Deng and   
                     Haolin Liu   Large-Scale Programming Code
                                  Dissemination for Software-Defined
                                  Wireless Networks  . . . . . . . . . . . 1417--1442
             Yaser Jararweh and   
          Mohammad Alsmirat and   
          Mahmoud Al-Ayyoub and   
          Elhadj Benkhelifa and   
              Ala' Darabseh and   
                 Brij Gupta and   
                   Ahmad Doulat   Software-Defined System Support for
                                  Enabling Ubiquitous Mobile Edge
                                  Computing  . . . . . . . . . . . . . . . 1443--1457
      Ramon dos Reis Fontes and   
           Mohamed Mahfoudi and   
              Walid Dabbous and   
           Thierry Turletti and   
           Christian Rothenberg   How Far Can We Go? Towards Realistic
                                  Software-Defined Wireless Networking
                                  Experiments  . . . . . . . . . . . . . . 1458--1471
                 Shichao Li and   
                   Gang Zhu and   
                   Siyu Lin and   
                  Chao Shen and   
                   Qian Gao and   
               Weiliang Xie and   
                    Xiaoyu Qiao   Ultra Dense Cells Management and
                                  Resource Allocation in Green
                                  Software-Defined Wireless Networks . . . 1472--1481
       Seyed Hamed Rastegar and   
           Aliazam Abbasfar and   
            Vahid Shah-Mansouri   Latency-Aware Sum-Rate Maximization for
                                  5G Software-Defined Radio Access
                                  Networks . . . . . . . . . . . . . . . . 1482--1497
                   Tao Song and   
                 Yuchen Liu and   
                Yiding Wang and   
                   Ruhui Ma and   
                 Alei Liang and   
                Zhengwei Qi and   
                   Haibing Guan   Ashman: a Bandwidth Fragmentation-Based
                                  Dynamic Flow Scheduling for Data Center
                                  Networks . . . . . . . . . . . . . . . . 1498--1509
            Ahmed Abdelaziz and   
               Ang Tan Fong and   
              Abdullah Gani and   
               Suleman Khan and   
              Faiz Alotaibi and   
          Muhammad Khurram Khan   On Software-Defined Wireless Network
                                  (SDWN) Network Virtualization:
                                  Challenges and Open Issues . . . . . . . 1510--1519
         Michael Rademacher and   
                 Karl Jonas and   
           Florian Siebertz and   
                Adam Rzyska and   
          Moritz Schlebusch and   
                  Markus Kessel   Software-Defined Wireless Mesh
                                  Networking: Current Status and
                                  Challenges . . . . . . . . . . . . . . . 1520--1535
                Shaohua Wan and   
                      Yin Zhang   Coverage Hole Bypassing in Wireless
                                  Sensor Networks  . . . . . . . . . . . . 1536--1544

The Computer Journal
Volume 60, Number 11, November 1, 2017

              Jianbin Huang and   
                      Ze Lv and   
                    Yu Zhou and   
                      He Li and   
                   Heli Sun and   
                         others   Forming Grouped Teams with Efficient
                                  Collaboration in Social Networks . . . . 1545--1560
             Saurav Acharya and   
              Byung Suk Lee and   
                     Paul Hines   Causal Prediction of Top-$k$ Event Types
                                  Over Real-Time Event Streams . . . . . . 1561--1581
                  Lein Harn and   
                 Ching-Fang Hsu   A Practical Hybrid Group Key
                                  Establishment for Secure Group
                                  Communications . . . . . . . . . . . . . 1582--1589
                Emna Fendri and   
              Mayssa Frikha and   
                Mohamed Hammami   Adaptive Person Re-identification Based
                                  on Visible Salient Body Parts in Large
                                  Camera Network . . . . . . . . . . . . . 1590--1608
                 Hai-Xia Xu and   
                   Wei Zhou and   
               Yao-Nan Wang and   
                   Wei Wang and   
                         Yan Mo   Matrix Separation Based on LMaFit-Seed   1609--1618
           Tung Doan Nguyen and   
                       Quan Bai   Enhance Trust Management in Composite
                                  Services with Indirect Ratings . . . . . 1619--1632
       Shervan Fekri-Ershad and   
             Farshad Tajeripour   Impulse-Noise Resistant Color-Texture
                                  Classification Approach Using Hybrid
                                  Color Local Binary Patterns and
                                  Kullback--Leibler Divergence . . . . . . 1633--1648
           H. M. W. Verbeek and   
     W. M. P. van der Aalst and   
                  J. Munoz-Gama   Divide and Conquer: a Tool Framework for
                                  Supporting Decomposed Discovery in
                                  Process Mining . . . . . . . . . . . . . 1649--1674
             Ming-Hung Wang and   
     Alex Chuan-Hsien Chang and   
               Kuan-Ta Chen and   
                 Chin-Laung Lei   Estimating Ideological Scores of
                                  Facebook Pages: an Empirical Study in
                                  Taiwan . . . . . . . . . . . . . . . . . 1675--1686
               XiaoHong Han and   
                  Yan Qiang and   
                       Yuan Lan   A Bird Flock Gravitational Search
                                  Algorithm Based on the Collective
                                  Response of Birds  . . . . . . . . . . . 1687--1716
                Lidia Fotia and   
           Fabrizio Messina and   
            Domenico Rosaci and   
    Giuseppe M. L. Sarné   Using Local Trust for Forming Cohesive
                                  Social Structures in Virtual Communities 1717--1727

The Computer Journal
Volume 60, Number 12, December 1, 2017

                    Yang Lu and   
                   Jiguo Li and   
                      Jian Shen   Weakness and Improvement of a
                                  Certificate-Based Key-Insulated
                                  Signature in the Standard Model  . . . . 1729--1744
            El-Sayed M. El-Alfy   Detection of Phishing Websites Based on
                                  Probabilistic Neural Networks and
                                  $K$-Medoids Clustering . . . . . . . . . 1745--1759
         Abderrahim Ait Wakrime   Satisfiability-Based Privacy-Aware Cloud
                                  Computing  . . . . . . . . . . . . . . . 1760--1769
       Jayashree Pougajendy and   
       Arun Raj Kumar Parthiban   Detection of SIP-Based Denial of Service
                                  Attack Using Dual Cost Formulation of
                                  Support Vector Machine . . . . . . . . . 1770--1784
                    Ying Wu and   
              Jinyong Chang and   
                    Rui Xue and   
                      Rui Zhang   Homomorphic MAC from Algebraic One-Way
                                  Functions for Network Coding with Small
                                  Key Size . . . . . . . . . . . . . . . . 1785--1800
                Damien Vergnaud   Comment on `Attribute-Based Signatures
                                  for Supporting Anonymous Certification'
                                  by N. Kaaniche and M. Laurent (ESORICS
                                  2016)  . . . . . . . . . . . . . . . . . 1801--1808
              Jianchang Lai and   
                      Yi Mu and   
                 Fuchun Guo and   
                   Rongmao Chen   Fully Privacy-Preserving ID-Based
                                  Broadcast Encryption with Authorization  1809--1821
                         Sha Ma   Authorized Equi-join for Multiple Data
                                  Contributors in the PKC-Based Setting    1822--1838
                 Howard M. Heys   Statistical Cipher Feedback of Stream
                                  Ciphers  . . . . . . . . . . . . . . . . 1839--1851
               Xiaofang Xia and   
                  Wei Liang and   
                  Yang Xiao and   
                     Meng Zheng   Difference-Comparison-based Malicious
                                  Meter Inspection in Neighborhood Area
                                  Networks in Smart Grid . . . . . . . . . 1852--1870
                 Weiran Liu and   
                   Xiao Liu and   
                Jianwei Liu and   
                    Qianhong Wu   Auditing Revocable Privacy-Preserving
                                  Access Control for EHRs in Clouds  . . . 1871--1888
            Xavier Bonnaire and   
       Rudyar Cortés and   
             Fabrice Kordon and   
                  Olivier Marin   ASCENT: a Provably Terminating
                                  Decentralized Logging Service  . . . . . 1889--1911
                Dario Fiore and   
María Isabel González Vasco and   
               Claudio Soriente   Partitioned Group Password-Based
                                  Authenticated Key Exchange . . . . . . . 1912--1922


The Computer Journal
Volume 61, Number 1, January 1, 2018

                   Xin-ju Zhang   Multi-state System Reliability Analysis
                                  Based on Fuzzy Colored Petri Nets  . . . 1--13
               Chin-Chia Wu and   
             Shang-Chia Liu and   
               Chuanli Zhao and   
             Sheng-Zhi Wang and   
                   Win-Chin Lin   A Multi-Machine Order Scheduling with
                                  Learning Using the Genetic Algorithm and
                                  Particle Swarm Optimization  . . . . . . 14--31
        Jurairat Phuttharak and   
                   Seng W. Loke   LogicCrowd: Crowd-Powered Logic
                                  Programming Based Mobile Applications    32--46
                 Ji-Bo Wang and   
                         Lin Li   Machine Scheduling with Deteriorating
                                  Jobs and Modifying Maintenance
                                  Activities . . . . . . . . . . . . . . . 47--53
              Hon-Chan Chen and   
             Tzu-Liang Kung and   
                  Lih-Hsing Hsu   An Augmented Pancyclicity Problem of
                                  Crossed Cubes  . . . . . . . . . . . . . 54--62
                Nidhi Kalra and   
                     Ajay Kumar   Deterministic Deep Pushdown Transducer
                                  and its Parallel Version . . . . . . . . 63--73
                 J. C. Saez and   
                   A. Pousa and   
            A. E. de Giusti and   
               M. Prieto-Matias   On the Interplay Between Throughput,
                                  Fairness and Energy Efficiency on
                                  Asymmetric Multicore Processors  . . . . 74--94
            Nisha Chaurasia and   
         Shashikala Tapaswi and   
                    Joydip Dhar   A Resource Efficient Expectation
                                  Maximization Clustering Approach for
                                  Cloud  . . . . . . . . . . . . . . . . . 95--104
               Zhenyou Wang and   
                Cuntao Xiao and   
                Xianwei Lin and   
                   Yuan-Yuan Lu   Single Machine Total Absolute
                                  Differences Penalties Minimization
                                  Scheduling with a Deteriorating and
                                  Resource-Dependent Maintenance Activity  105--110
             Wojciech Mu\la and   
                Nathan Kurz and   
                  Daniel Lemire   Faster Population Counts Using AVX2
                                  Instructions . . . . . . . . . . . . . . 111--120
             Jou-Ming Chang and   
           Jinn-Shyong Yang and   
            Shyue-Ming Tang and   
                   Kung-Jui Pai   The Wide Diameters of Regular
                                  Hyper-Stars and Folded Hyper-Stars . . . 121--128
                 Xiaoyan Li and   
                 Jianxi Fan and   
             Cheng-Kuan Lin and   
                    Xiaohua Jia   Diagnosability Evaluation of the Data
                                  Center Network DCell . . . . . . . . . . 129--143
              Xiaodong Meng and   
                  Minyi Guo and   
                   Jingyu Zhang   An Efficient Graph Query Framework with
                                  Structural Recursion . . . . . . . . . . 144--157
              Jianbin Huang and   
               Xiaojing Sun and   
                    Yu Zhou and   
                       Heli Sun   Corrigendum: A Team Formation Model with
                                  Personnel Work Hours and Project
                                  Workload Quantified  . . . . . . . . . . 158--158

The Computer Journal
Volume 61, Number 2, February 1, 2018

          Saurabh K. Pandey and   
               Mukesh A. Zaveri   Quasi Random Deployment and Localization
                                  in Layered Framework for the Internet of
                                  Things . . . . . . . . . . . . . . . . . 159--179
              Xiaolin Chang and   
                Tianju Wang and   
Ricardo J. Rodríguez and   
                Zhenjiang Zhang   Modeling and Analysis of High
                                  Availability Techniques in a Virtualized
                                  System . . . . . . . . . . . . . . . . . 180--198
          Natarajan Meghanathan   Complex Network Analysis-Based Graph
                                  Theoretic Metrics to Determine Stable
                                  Data Gathering Trees for Mobile Sensor
                                  Networks . . . . . . . . . . . . . . . . 199--222
                 I Karthiga and   
                Sharmila Sankar   Providing Secret Authentication in
                                  Clustered Security Architecture for
                                  Cloud-Based WBAN . . . . . . . . . . . . 223--232
          Tahani H. Hussain and   
     Paulvanna N. Marimuthu and   
                  Sami J. Habib   Exploration of Storage Architectures for
                                  Enterprise Network . . . . . . . . . . . 233--247
           S. Sarathambekai and   
                K. Umamaheswari   Multi-Objective Optimization Techniques
                                  for Task Scheduling Problem in
                                  Distributed Systems  . . . . . . . . . . 248--263
             Bang Chul Jung and   
               Jae Sook Yoo and   
                   Woongsup Lee   A Practical Physical-Layer Network
                                  Coding with Spatial Modulation in
                                  Two-Way Relay Networks . . . . . . . . . 264--272
                  Jigang Wu and   
                  Long Chen and   
                    Xu Wang and   
              Guiyuan Jiang and   
               Siew-kei Lam and   
        Thambipillai Srikanthan   Algorithms for Replica Placement and
                                  Update in Tree Network . . . . . . . . . 273--287
                    Lin Lyu and   
                Shengli Liu and   
                      Shuai Han   Public-Key Encryption with Tight
                                  Simulation-Based Selective-Opening
                                  Security . . . . . . . . . . . . . . . . 288--318

The Computer Journal
Volume 61, Number 3, March 1, 2018

               Mona Taghavi and   
             Jamal Bentahar and   
           Kaveh Bakhtiyari and   
                 Chihab Hanachi   New Insights Towards Developing
                                  Recommender Systems  . . . . . . . . . . 319--348
            Iqbal H. Sarker and   
                Alan Colman and   
       Muhammad Ashad Kabir and   
                        Jun Han   Individualized Time-Series Segmentation
                                  for Mining Mobile Phone User Behavior    349--368
        Prashant Srivastava and   
                   Ashish Khare   Content-Based Image Retrieval using
                                  Local Binary Curvelet Co-occurrence
                                  Pattern --- A Multiresolution Technique  369--385
             Vasilis Kolias and   
    Ioannis Anagnostopoulos and   
               Sherali Zeadally   Structural analysis and classification
                                  of search interfaces for the deep web    386--398
             Jeremy Barnett and   
               Philip Treleaven   Algorithmic Dispute Resolution --- The
                                  Automation of Professional Dispute
                                  Resolution Using AI and Blockchain
                                  Technologies . . . . . . . . . . . . . . 399--408
                  Zhou Shao and   
      Muhammad Aamir Cheema and   
                   David Taniar   Trip Planning Queries in Indoor Venues   409--426
      Chitra M. Subramanian and   
             Aneesh Krishna and   
                 Arshinder Kaur   Game Theory-Based Requirements Analysis
                                  in the $ i^* $ Framework . . . . . . . . 427--446
             Meng-Jia Zhang and   
                 Kang Zhang and   
                     Jie Li and   
                       Yi-Na Li   Visual Exploration of $3$D Geospatial
                                  Networks in a Virtual Reality
                                  Environment  . . . . . . . . . . . . . . 447--458
                Hazem Hiary and   
             Rawan Zaghloul and   
           Moh'd Belal Al-Zoubi   Single-Image Shadow Detection using
                                  Quaternion Cues  . . . . . . . . . . . . 459--468

The Computer Journal
Volume 61, Number 4, April 1, 2018

             Jianhong Zhang and   
                       Jian Mao   On the Security of a Pairing-Free
                                  Certificateless Signcryption Scheme  . . 469--471
                Emma Osborn and   
                 Andrew Simpson   Risk and the Small-Scale Cyber Security
                                  Decision Making Dialogue --- a UK Case
                                  Study  . . . . . . . . . . . . . . . . . 472--495
                  Haiqin Wu and   
              Liangmin Wang and   
                 Shunrong Jiang   Secure Top-$k$ Preference Query for
                                  Location-based Services in
                                  Crowd-outsourcing Environments . . . . . 496--511
      Tran Viet Xuan Phuong and   
                Guomin Yang and   
                   Willy Susilo   Criteria-Based Encryption  . . . . . . . 512--525
               Yanping Shen and   
             Kangfeng Zheng and   
                 Chunhua Wu and   
               Mingwu Zhang and   
                 Xinxin Niu and   
                    Yixian Yang   An Ensemble Method based on Selection
                                  Using Bat Algorithm for Intrusion
                                  Detection  . . . . . . . . . . . . . . . 526--538
                 Xi-Jun Lin and   
                    Lin Sun and   
                 Haipeng Qu and   
                   Dongxiao Liu   Cryptanalysis of A Pairing-Free
                                  Certificateless Signcryption Scheme  . . 539--544
                Siyuan Chen and   
                  Peng Zeng and   
     Kim-Kwang Raymond Choo and   
                   Xiaolei Dong   Efficient Ring Signature and Group
                                  Signature Schemes Based on $q$-ary
                                  Identification Protocols . . . . . . . . 545--560
                   Qiqi Lai and   
                    Bo Yang and   
                    Yong Yu and   
                  Yuan Chen and   
                       Jian Bai   Novel Smooth Hash Proof Systems Based on
                                  Lattices . . . . . . . . . . . . . . . . 561--574
                 Husen Wang and   
                     Qiang Tang   Efficient Homomorphic Integer Polynomial
                                  Evaluation Based on GSW FHE  . . . . . . 575--585
                Yanwei Zhou and   
                    Bo Yang and   
                          Yi Mu   Continuous Leakage-Resilient
                                  Identity-Based Encryption without Random
                                  Oracles  . . . . . . . . . . . . . . . . 586--600
       Kamalkumar R. Macwan and   
               Sankita J. Patel   $k$-NMF Anonymization in Social Network
                                  Data Publishing  . . . . . . . . . . . . 601--613
            Kaushal A. Shah and   
              Devesh C. Jinwala   Privacy Preserving, Verifiable and
                                  Resilient Data Aggregation in Grid-Based
                                  Networks . . . . . . . . . . . . . . . . 614--628

The Computer Journal
Volume 61, Number 5, May 1, 2018

             Shuanglong Kan and   
                   Zhiqiu Huang   Partial Order Reduction for the full
                                  Class of State/Event Linear Temporal
                                  Logic  . . . . . . . . . . . . . . . . . 629--644
          Lalit Mohan Goyal and   
           M. M. Sufyan Beg and   
                   Tanvir Ahmad   An Efficient Framework for Mining
                                  Association Rules in the Distributed
                                  Databases  . . . . . . . . . . . . . . . 645--657
                Liangze Yin and   
                   Wei Dong and   
                     Fei He and   
                        Ji Wang   A True-Concurrency Encoding for BMC of
                                  Compositional Systems  . . . . . . . . . 658--671
                 Mei-Mei Gu and   
               Rong-Xia Hao and   
              Yan-Quan Feng and   
                      Ai-Mei Yu   The $3$-extra Connectivity and Faulty
                                  Diagnosability . . . . . . . . . . . . . 672--686
         Edans F. O. Sandes and   
       George L. M. Teodoro and   
  Maria Emilia M. T. Walter and   
           Xavier Martorell and   
             Eduard Ayguade and   
             Alba C. M. A. Melo   Formalization of Block Pruning: Reducing
                                  the Number of Cells Computed in Exact
                                  Biological Sequence Comparison
                                  Algorithms . . . . . . . . . . . . . . . 687--713
                 Liqiong Xu and   
               Shuming Zhou and   
               Guanqin Lian and   
                      Zuwen Luo   A Kind of Conditional Connectivity of
                                  Cayley Graphs Generated by $2$-trees . . 714--721
                Mosong Zhou and   
               Xiaoshe Dong and   
                  Heng Chen and   
                  Xingjun Zhang   A Runtime Available Resource Capacity
                                  Evaluation Model Based on the Concept of
                                  Similar Tasks  . . . . . . . . . . . . . 722--744
                      Yi Qi and   
                    Huan Li and   
                 Zhongzhi Zhang   Extended Corona Product as an Exactly
                                  Tractable Model for Weighted
                                  Heterogeneous Networks . . . . . . . . . 745--760
               Shiying Wang and   
              Guozhen Zhang and   
                       Kai Feng   Edge Fault Tolerance of Cartesian
                                  Product Graphs on Super Restricted Edge
                                  Connectivity . . . . . . . . . . . . . . 761--772
           Andrea Farruggia and   
               Travis Gagie and   
            Gonzalo Navarro and   
           Simon J. Puglisi and   
             Jouni Sirén   Relative Suffix Trees  . . . . . . . . . 773--788

The Computer Journal
Volume 61, Number 6, June 1, 2018

                   Dan Feng and   
                   Ma Yajie and   
              Zhou Fengxing and   
               Wang Xiaomao and   
                         He Kai   A Safety Message Broadcast Strategy in
                                  Hybrid Vehicular Network Environment . . 789--797
                   Tua A. Tamba   On Handelman's Representation of Network
                                  Utility Maximization . . . . . . . . . . 798--807
          Giuseppe Lettieri and   
          Vincenzo Maffione and   
                    Luigi Rizzo   A Study of I/O Performance of Virtual
                                  Machines . . . . . . . . . . . . . . . . 808--831
              Atul Tripathi and   
                Isha Pathak and   
          Deo Prakash Vidyarthi   Energy Efficient VM Placement for
                                  Effective Resource Utilization using
                                  Modified Binary PSO  . . . . . . . . . . 832--846
            Jyotshana Kanti and   
             Geetam Singh Tomar   Solution of sensing failure problem: an
                                  improved two-stage detector  . . . . . . 847--855
R. Rodríguez-Rodríguez and   
             J. Díaz and   
                  F. Castro and   
    P. Ibáñez and   
                  D. Chaver and   
           V. Viñals and   
                 J. C. Saez and   
           M. Prieto-Matias and   
           L. Piñuel and   
                 T. Monreal and   
          J. M. Llabería   Reuse Detector: Improving the Management
                                  of STT-RAM SLLCs . . . . . . . . . . . . 856--880
       Nileshkumar R. Patel and   
                  Shishir Kumar   Energy-Efficient Approach for Effective
                                  Estimation of Delimited Node Position
                                  with Limited References  . . . . . . . . 881--895
                   Ping Xie and   
            Jianzhong Huang and   
                   Xiao Qin and   
                 Changsheng Xie   SmartRec: Fast Recovery from Single
                                  Failures in Heterogeneous RAID-Coded
                                  Storage Systems  . . . . . . . . . . . . 896--911
Francisco José Esteban and   
          David Díaz and   
     Pilar Hernández and   
     Juan Antonio Caballero and   
             Gabriel Dorado and   
           Sergio Gálvez   MC64-Cluster: Many-Core CPU Cluster
                                  Architecture and Performance Analysis in
                                  B-Tree Searches  . . . . . . . . . . . . 912--925
           Thompson Stephan and   
               K. Suresh Joseph   Particle Swarm Optimization-Based Energy
                                  Efficient Channel Assignment Technique
                                  for Clustered Cognitive Radio Sensor
                                  Networks . . . . . . . . . . . . . . . . 926--936
                   Tong Liu and   
                 Yanmin Zhu and   
                   Ting Wen and   
                       Jiadi Yu   Location Privacy-Preserving Method for
                                  Auction-Based Incentive Mechanisms in
                                  Mobile Crowd Sensing . . . . . . . . . . 937--948

The Computer Journal
Volume 61, Number 7, July 1, 2018

                  Chao Tong and   
                  Xiang Yin and   
                     Jun Li and   
                 Tongyu Zhu and   
                   Renli Lv and   
                  Liang Sun and   
        Joel J. P. C. Rodrigues   A shilling attack detector based on
                                  convolutional neural network for
                                  collaborative recommender system in
                                  social aware network . . . . . . . . . . 949--958
               Jieren Cheng and   
                Jinghe Zhou and   
                  Qiang Liu and   
              Xiangyan Tang and   
                   Yanxiang Guo   A DDoS Detection Method for Socially
                                  Aware Networking Based on Forecasting
                                  Fusion Feature Sequence  . . . . . . . . 959--970
                 Noor Ullah and   
              Xiangjie Kong and   
              Liangtian Wan and   
              Honglong Chen and   
                 Zhibo Wang and   
                       Feng Xia   A Social Utility-Based Dissemination
                                  Scheme for Emergency Warning Messages in
                                  Vehicular Social Networks  . . . . . . . 971--986
                 Jiaqi Wang and   
                  Yunyao Lu and   
               Xiaojie Wang and   
                  Jing Dong and   
                      Xiping Hu   SAR: a Social-Aware Route Recommendation
                                  System for Intelligent Transportation    987--997
 Mostafa Haghir Chehreghani and   
               Albert Bifet and   
               Talel Abdessalem   Discriminative Distance-Based Network
                                  Indices with Application to Link
                                  Prediction . . . . . . . . . . . . . . . 998--1014
                Xiaogang Fu and   
                   Jianyong Sun   Reference-Inspired Many-Objective
                                  Evolutionary Algorithm Based on
                                  Decomposition  . . . . . . . . . . . . . 1015--1037
                 Alexey Stakhov   Mission-Critical Systems, Paradox of
                                  Hamming Code, Row Hammer Effect, `Trojan
                                  Horse' of the Binary System and Numeral
                                  Systems with Irrational Bases  . . . . . 1038--1063
               Yonghong Hou and   
                    Lin Xue and   
                    Shuo Li and   
                   Jiaming Xing   User-Experience-Oriented Fuzzy Logic
                                  Controller for Adaptive Streaming  . . . 1064--1074
            Wassim Derguech and   
                 Sami Bhiri and   
                   Edward Curry   Using Ontologies for Business Capability
                                  modelling: Describing What Services and
                                  Processes Achieve  . . . . . . . . . . . 1075--1098
           C. Harriet Linda and   
                G. Wiselin Jiji   Hierarchical Approach to Detect
                                  Fractures in CT DICOM Images . . . . . . 1099--1108

The Computer Journal
Volume 61, Number 8, August 1, 2018

              Khalifa Toumi and   
             Mohamed Aouadi and   
             Ana R. Cavalli and   
            Wissam Mallouli and   
      Jordi Puiggal Allepuz and   
           Pol Valletb Montfort   A Framework for Testing and Monitoring
                                  Security Policies: Application to an
                                  Electronic Voting System . . . . . . . . 1109--1122
                  Rong Wang and   
                    Yan Zhu and   
             Tung-Shou Chen and   
                Chin-Chen Chang   An Authentication Method Based on the
                                  Turtle Shell Algorithm for
                                  Privacy-Preserving Data Mining . . . . . 1123--1132
              Haijiang Wang and   
               Xiaolei Dong and   
                 Zhenfu Cao and   
                     Dongmei Li   Secure and Efficient Attribute-Based
                                  Encryption with Keyword Search . . . . . 1133--1142
           Gunikhan Sonowal and   
                K. S. Kuppusamy   SmiDCA: an Anti-Smishing Model with
                                  Machine Learning Approach  . . . . . . . 1143--1157
                 Rongjia Li and   
                    Chenhui Jin   Meet-in-the-Middle Attacks on
                                  Reduced-Round QARMA-64/128 . . . . . . . 1158--1165
             Xiaojuan Zhang and   
                Xiutao Feng and   
                    Dongdai Lin   Fault Attack on ACORN v3 . . . . . . . . 1166--1179
             Amir Daneshgar and   
            Fahimeh Mohebbipoor   A Secure Self-Synchronized Stream Cipher 1180--1201
                Baoguo Yuan and   
               Junfeng Wang and   
               Zhiyang Fang and   
                          Li Qi   A New Software Birthmark based on Weight
                                  Sequences of Dynamic Control Flow Graph
                                  for Plagiarism Detection . . . . . . . . 1202--1215
               Jianye Huang and   
                Qiong Huang and   
                   Willy Susilo   Leakage-Resilient Dual-Form Signatures   1216--1227
               Dianyan Xiao and   
                        Yang Yu   Klepto for Ring-LWE Encryption . . . . . 1228--1239
              Jianchang Lai and   
                      Yi Mu and   
                 Fuchun Guo and   
                 Peng Jiang and   
                         Sha Ma   Identity-Based Broadcast Encryption for
                                  Inner Products . . . . . . . . . . . . . 1240--1251
                     Ya Liu and   
                 Anren Yang and   
                     Bo Dai and   
                     Wei Li and   
               Zhiqiang Liu and   
                    Dawu Gu and   
                  Zhiqiang Zeng   Improved Meet-in-the Middle Attacks on
                                  Reduced-Round TWINE-128  . . . . . . . . 1252--1258
                Baodong Qin and   
               Qinglan Zhao and   
                     Dong Zheng   Bounded Revocable and Outsourceable ABE
                                  for Secure Data Sharing  . . . . . . . . 1259--1268

The Computer Journal
Volume 61, Number 9, September 1, 2018

             Bei-yang Zhang and   
             Xie-dong Zhang and   
                  Zhi-hua Zhang   Nested-Stacking Genetic Algorithm for
                                  the Optimal Placement of Sensors in
                                  Bridge . . . . . . . . . . . . . . . . . 1269--1283
                 Jialei Liu and   
            Shangguang Wang and   
                    Ao Zhou and   
                   Xiang Xu and   
        Sathish A. P. Kumar and   
                  Fangchun Yang   Towards Bandwidth Guaranteed Virtual
                                  Cluster Reallocation in the Cloud  . . . 1284--1295
                   Zhi Chen and   
              Xiaolin Chang and   
                   Zhen Han and   
                         Lin Li   Survivability Modeling and Analysis of
                                  Cloud Service in Distributed Data
                                  Centers  . . . . . . . . . . . . . . . . 1296--1305
            Walayat Hussain and   
    Farookh Khadeer Hussain and   
               Omar Hussain and   
             Ravindra Bagia and   
                Elizabeth Chang   Risk-based framework for SLA violation
                                  abatement from the cloud service
                                  provider's perspective . . . . . . . . . 1306--1322
                   Jian Jin and   
                        Ping Ji   Scheduling jobs with resource-dependent
                                  ready times and processing times
                                  depending on their starting times and
                                  positions  . . . . . . . . . . . . . . . 1323--1328
                 Ji-Bo Wang and   
                Xin-Na Geng and   
                     Lu Liu and   
              Jian-Jun Wang and   
                   Yuan-Yuan Lu   Single Machine CON/SLK Due Date
                                  Assignment Scheduling with Controllable
                                  Processing Time and Job-dependent
                                  Learning Effects . . . . . . . . . . . . 1329--1337
               Shufeng Kong and   
                Sanjiang Li and   
                Michael Sioutis   Exploring Directional Path-Consistency
                                  for Solving Constraint Networks  . . . . 1338--1350
                Simone Faro and   
                 Arianna Pavone   An Efficient Skip-Search Approach to
                                  Swap Matching  . . . . . . . . . . . . . 1351--1360
Nurul Liyana Mohamad Zulkufli and   
             Sherzod Turaev and   
  Mohd Izzuddin Mohd Tamrin and   
               Azeddine Messikh   Watson--Crick Context-Free Grammars:
                                  Grammar Simplifications and a Parsing
                                  Algorithm  . . . . . . . . . . . . . . . 1361--1373
               Andrea Pinna and   
            Roberto Tonelli and   
         Matteo Orrú and   
               Michele Marchesi   A Petri Nets Model for Blockchain
                                  Analysis . . . . . . . . . . . . . . . . 1374--1388
    Samuel Tweneboah-Koduah and   
            William J. Buchanan   Security Risk Assessment of Critical
                                  Infrastructure Systems: a Comparative
                                  Study  . . . . . . . . . . . . . . . . . 1389--1406
       Pedro Álvarez and   
    Sergio Hernández and   
               Javier Fabra and   
        Joaquín Ezpeleta   Cost-driven provisioning and execution
                                  of a computing-intensive service on the
                                  Amazon EC2 . . . . . . . . . . . . . . . 1407--1421
                 Ji-Bo Wang and   
                     Lu Liu and   
              Jian-Jun Wang and   
                         Lin Li   Makespan minimization scheduling with
                                  ready times, group technology and
                                  shortening job processing times  . . . . 1422--1428

The Computer Journal
Volume 61, Number 10, October 1, 2018

  Leonildo J. M. de Azevedo and   
   Júlio C. Estrella and   
        Luis H. V. Nakamura and   
          Marcos J. Santana and   
       Regina H. C. Santana and   
Cláudio F. Motta Toledo and   
           Bruno G. Batista and   
        Stephan Reiff-Marganiec   Optimized Service Level Agreement
                                  Establishment in Cloud Computing . . . . 1429--1442
                Zhenni Feng and   
                 Yanmin Zhu and   
                    Hui Cai and   
                     Pingyi Luo   Optimal Distributed Auction for Mobile
                                  Crowd Sensing  . . . . . . . . . . . . . 1443--1459
                 Yunus Ozen and   
                Cuneyt Bayilmis   urgMAC: a New Traffic and QoS-aware
                                  Cross-Layer MAC protocol for Wireless
                                  Multimedia Sensor Networks . . . . . . . 1460--1467
                 Soumya Das and   
               Tamaghna Acharya   Faulty Node Detection in HMM-Based
                                  Cooperative Spectrum Sensing For
                                  Cognitive Radio Networks . . . . . . . . 1468--1478
       Reza Entezari-Maleki and   
          Kishor S. Trivedi and   
               Leonel Sousa and   
                   Ali Movaghar   Performability-Based Workflow Scheduling
                                  in Grids . . . . . . . . . . . . . . . . 1479--1495
              Maroua Meddeb and   
              Amine Dhraief and   
       Abdelfettah Belghith and   
            Thierry Monteil and   
               Khalil Drira and   
                  Saad AlAhmadi   Cache Freshness in Named Data Networking
                                  for the Internet of Things . . . . . . . 1496--1511
           Margarida Mamede and   
José Legatheaux Martins and   
              João Horta   BOUQUET --- Aggregating Network Paths in
                                  Trees to Reduce Data-Plane Forwarding
                                  State  . . . . . . . . . . . . . . . . . 1512--1522
          N. Gobalakrishnan and   
                        C. Arun   A New Multi-Objective Optimal
                                  Programming Model for Task Scheduling
                                  using Genetic Gray Wolf Optimization in
                                  Cloud Computing  . . . . . . . . . . . . 1523--1536
Frédéric Giroire and   
               Nicolas Huin and   
           Joanna Moulierac and   
               Truong Khoa Phan   Energy-Aware Routing in Software-Defined
                                  Network using Compression  . . . . . . . 1537--1556
Anubis Graciela de Moraes Rossetto and   
 Cláudio F. R. Geyer and   
            Luciana Arantes and   
                    Pierre Sens   Impact FD: an Unreliable Failure
                                  Detector Based on Process Relevance and
                                  Confidence in the System . . . . . . . . 1557--1576
                  S. Renuga and   
        S. S. K. Jagatheeshwari   Efficient Privacy-Preserving Data
                                  Sanitization over Cloud Using Optimal
                                  GSA Algorithm  . . . . . . . . . . . . . 1577--1588

The Computer Journal
Volume 61, Number 11, November 1, 2018

            Himangshu Sarma and   
              Robert Porzel and   
           Jan D. Smeddinck and   
              Rainer Malaka and   
            Arun Baran Samaddar   A Text to Animation System for Physical
                                  Exercises  . . . . . . . . . . . . . . . 1589--1604
                 Qirong Mao and   
               Feifei Zhang and   
              Liangjun Wang and   
                 Sidian Luo and   
                      Ming Dong   Cascaded Multi-level Transformed
                                  Dirichlet Process for Multi-pose Facial
                                  Expression Recognition . . . . . . . . . 1605--1619
               Ammar Sohail and   
      Muhammad Aamir Cheema and   
                   David Taniar   Social-Aware Spatial Top-k and Skyline
                                  Queries  . . . . . . . . . . . . . . . . 1620--1638
           Md Mosaddek Khan and   
            Long Tran-Thanh and   
      Sarvapali D. Ramchurn and   
           Nicholas R. Jennings   Speeding Up GDL-Based Message Passing
                                  Algorithms for Large-Scale DCOPs . . . . 1639--1666
                  Sunny Rai and   
         Shampa Chakraverty and   
          Devendra K. Tayal and   
                   Yash Kukreti   A Study on Impact of Context on Metaphor
                                  Detection  . . . . . . . . . . . . . . . 1667--1682
            Chandra Prakash and   
               Rajesh Kumar and   
                  Namita Mittal   Optimized Clustering Techniques for Gait
                                  Profiling in Children with Cerebral
                                  Palsy for Rehabilitation . . . . . . . . 1683--1694
               Zhenjun Tang and   
               Ziqing Huang and   
                   Heng Yao and   
             Xianquan Zhang and   
                    Lv Chen and   
                   Chunqiang Yu   Perceptual Image Hashing with Weighted
                                  DWT Features for Reduced-Reference Image
                                  Quality Assessment . . . . . . . . . . . 1695--1709
              Zhi-Fang Yang and   
              Chih-Ting Kuo and   
                     Te-Hsi Kuo   Authorization Identification by
                                  Watermarking in Log-polar Coordinate
                                  System . . . . . . . . . . . . . . . . . 1710--1723
              Zhi-jie Liang and   
             Sheng-bin Liao and   
                  Bing-zhang Hu   $3$D Convolutional Neural Networks for
                                  Dynamic Sign Language Recognition  . . . 1724--1736
              H. Hassanpour and   
               N. Nowrozian and   
         M. M. AlyanNezhadi and   
                   N. Samadiani   Image Zooming Using a Multi-layer Neural
                                  Network  . . . . . . . . . . . . . . . . 1737--1748

The Computer Journal
Volume 61, Number 12, December 1, 2018

            David W. Archer and   
               Dan Bogdanov and   
             Yehuda Lindell and   
                 Liina Kamm and   
               Kurt Nielsen and   
      Jakob Illeborg Pagter and   
             Nigel P. Smart and   
              Rebecca N. Wright   From Keys to Databases --- Real-World
                                  Applications of Secure Multi-Party
                                  Computation  . . . . . . . . . . . . . . 1749--1771
                Eunsung Lee and   
                   Sang Woo Kim   Non-interactive Conditional Proxy
                                  Re-Signature in the Standard Model . . . 1772--1782
               Tingting Lin and   
                 Hailun Yan and   
                 Xuejia Lai and   
                Yixin Zhong and   
                        Yin Jia   Security Evaluation and Improvement of a
                                  White-Box SMS4 Implementation Based on
                                  Affine Equivalence Algorithm . . . . . . 1783--1790
                 Xi-Jun Lin and   
                    Lin Sun and   
                 Haipeng Qu and   
                   Dongxiao Liu   On the Security of Secure
                                  Server-Designation Public Key Encryption
                                  with Keyword Search  . . . . . . . . . . 1791--1793
                 Yunhua Wen and   
                Shengli Liu and   
                  Ziyuan Hu and   
                      Shuai Han   Computational Robust Fuzzy Extractor . . 1794--1805
                     Yi Dou and   
           Henry C. B. Chan and   
                      Man Ho Au   Order-Hiding Range Query over Encrypted
                                  Data without Search Pattern Leakage  . . 1806--1824
                  Shuai Han and   
                Shengli Liu and   
                    Lin Lyu and   
                        Dawu Gu   Tightly Secure Encryption Schemes
                                  against Related-Key Attacks  . . . . . . 1825--1844
                  Biao Wang and   
               Xueqing Wang and   
                    Rui Xue and   
                    Xinyi Huang   Matrix FHE and Its Application in
                                  Optimizing Bootstrapping . . . . . . . . 1845--1861
           Yung-Ting Chuang and   
                     Yi-Fan Lee   Defense Mechanism for Malicious and
                                  Selective Forwarding Attacks in Large
                                  and Mobile Wireless Networks . . . . . . 1862--1879
                 Jinhui Liu and   
                    Yong Yu and   
                    Bo Yang and   
                Jianwei Jia and   
                Shijia Wang and   
                   Houzhen Wang   Structural Key Recovery of Simple Matrix
                                  Encryption Scheme Family . . . . . . . . 1880--1896
                Qingwen Guo and   
                Qiong Huang and   
                    Guomin Yang   Authorized Function Homomorphic
                                  Signature  . . . . . . . . . . . . . . . 1897--1908


The Computer Journal
Volume 62, Number 1, January 1, 2019

               Nazmun Naher and   
                 Tanzima Hashem   Think Ahead: Enabling Continuous Sharing
                                  of Location Data in Real-Time with
                                  Privacy Guarantee  . . . . . . . . . . . 1--19
            Shmuel T. Klein and   
                   Dana Shapira   Context Sensitive Rewriting Codes for
                                  Flash Memory . . . . . . . . . . . . . . 20--29
          Zbyn\vek K\vrivka and   
     Ji\vrí Ku\vcera and   
               Alexander Meduna   Jumping Pure Grammars  . . . . . . . . . 30--41
             Chengcheng Mou and   
              Shaoping Chen and   
                    Yi-Cheng Tu   A Comparative Study of Dual-Tree
                                  Algorithms for Computing Spatial
                                  Distance Histograms  . . . . . . . . . . 42--62
                   Yuan Lin and   
                 Zhongzhi Zhang   Non-Backtracking Centrality Based Random
                                  Walk on Networks . . . . . . . . . . . . 63--80
                 Weiwei Liu and   
                Chong Jiang and   
                 Ji-Bo Wang and   
                   Yuan-Yuan Lu   Single-machine scheduling with
                                  simultaneous considerations of resource
                                  allocation and deteriorating jobs  . . . 81--89
                    Yu Tian and   
                    Ming Xu and   
                Chong Jiang and   
                 Ji-Bo Wang and   
                 Xiao-Yuan Wang   No-wait resource allocation flowshop
                                  scheduling with learning effect under
                                  limited cost availability  . . . . . . . 90--96
Abel Cabrera Martínez and   
Frank A. Hernández Mira and   
José M. Sigarreta Almira and   
                 Ismael G. Yero   On Computational and Combinatorial
                                  Properties of the Total Co-independent
                                  Domination Number of Graphs  . . . . . . 97--108
  Vanderson Hafemann Fragal and   
             Adenilso Simao and   
      Mohammad Reza Mousavi and   
             Uraz Cengiz Turker   Extending HSI Test Generation Method for
                                  Software Product Lines . . . . . . . . . 109--129
              Dong-Yuh Yang and   
                    Yi-Chun Cho   Analysis of the $N$-policy GI/M/1/K
                                  Queueing Systems with Working Breakdowns
                                  and Repairs  . . . . . . . . . . . . . . 130--143
                Shu-Li Zhao and   
                   Rong-Xia Hao   The Generalized Three-Connectivity of
                                  Two Kinds of Cayley Graphs . . . . . . . 144--149
                   Bing Zhu and   
            Kenneth W. Shum and   
                         Hui Li   On the Duality and File Size Hierarchy
                                  of Fractional Repetition Codes . . . . . 150--160

The Computer Journal
Volume 62, Number 2, February 1, 2019

    Bruno Guazzelli Batista and   
      Bruno Tardiole Kuehne and   
Dionisio Machado Leite Filho and   
    Maycon Leone Maciel Peixoto   Security Overhead on a Service with
                                  Automatic Resource Management: a
                                  Performance Analysis . . . . . . . . . . 161--173
         Salman Taherizadeh and   
               Vlado Stankovski   Dynamic Multi-level Auto-scaling Rules
                                  for Containerized Applications . . . . . 174--197
            Yeim-Kuan Chang and   
                  Han-Chen Chen   Fast Packet Classification using
                                  Recursive Endpoint-Cutting and Bucket
                                  Compression on FPGA  . . . . . . . . . . 198--214
                  Fan Zhang and   
                   Tao Jing and   
                    Yan Huo and   
                   Kaiwei Jiang   Joint Optimization of Spectrum Sensing
                                  and Transmit Power in Energy Harvesting
                                  Cognitive Radio Sensor Networks  . . . . 215--230
            Matthieu Barjon and   
           Arnaud Casteigts and   
            Serge Chaumette and   
             Colette Johnen and   
               Yessin M. Neggaz   Maintaining a Distributed Spanning
                                  Forest in Highly Dynamic Networks  . . . 231--246
            Jianzhong Huang and   
               Panping Zhou and   
                   Xiao Qin and   
                Yanqun Wang and   
                 Changsheng Xie   Optimizing Erasure-Coded Data Archival
                                  for Replica-Based Storage Clusters . . . 247--262
           C. BrijilalRuban and   
                 B. Paramasivan   Cluster-Based Secure Communication and
                                  Certificate Revocation Scheme for VANET  263--275
              Neetesh Kumar and   
          Deo Prakash Vidyarthi   A Hybrid Heuristic for Load-Balanced
                                  Scheduling of Heterogeneous Workload on
                                  Heterogeneous Systems  . . . . . . . . . 276--291
               Ahmad Hiasat and   
                   Leonel Sousa   On the Design of RNS Inter-Modulo
                                  Processing Units for the
                                  Arithmetic-Friendly Moduli Sets $ 2^{n +
                                  k} $, $ 2^n - 1 $, $ 2^{n + 1} - 1 $ . . 292--300
                Xinjian Luo and   
               Xiaofeng Gao and   
                    Guihai Chen   Accelerate Data Retrieval by
                                  Multi-Dimensional Indexing in
                                  Switch-Centric Data Centers  . . . . . . 301--320

The Computer Journal
Volume 62, Number 3, March 1, 2019

Jesús M. Almendros-Jiménez and   
Antonio Becerra-Terón and   
                  Manuel Torres   Integrating and Querying OpenStreetMap
                                  and Linked Geo Open Data . . . . . . . . 321--345
             Raphael Angulu and   
            Jules R. Tapamo and   
             Aderemi O. Adewumi   Age-Group Estimation Using Feature and
                                  Decision Level Fusion  . . . . . . . . . 346--358
                  Ximing Li and   
                  Ang Zhang and   
               Changchun Li and   
                Lantian Guo and   
               Wenting Wang and   
                  Jihong Ouyang   Relational Biterm Topic Model:
                                  Short-Text Topic Modeling using Word
                                  Embeddings . . . . . . . . . . . . . . . 359--372
              Chris J. Mitchell   Security issues in a group key
                                  establishment protocol . . . . . . . . . 373--376
          Asieh Ghanbarpour and   
                  Hassan Naderi   A Model-based Keyword Search Approach
                                  for Detecting Top-$k$ Effective Answers  377--393
            Michael Scriney and   
           Suzanne McCarthy and   
            Andrew McCarren and   
           Paolo Cappellari and   
                  Mark Roantree   Automating Data Mart Construction from
                                  Semi-structured Data Sources . . . . . . 394--413
         Hafiz Tayyeb Javed and   
             Mirza Omer Beg and   
              Hasan Mujtaba and   
              Hammad Majeed and   
                  Muhammad Asim   Fairness in Real-Time Energy Pricing for
                                  Smart Grid Using Unsupervised Learning   414--429
                  Weihua Li and   
                   Quan Bai and   
                   Minjie Zhang   A Multi-agent System for Modelling
                                  Preference-Based Complex Influence
                                  Diffusion in Social Networks . . . . . . 430--447
               Zeynep Engin and   
               Philip Treleaven   Algorithmic Government: Automating
                                  Public Services and Supporting Civil
                                  Servants in using Data Science
                                  Technologies . . . . . . . . . . . . . . 448--460
             Sandra Sampaio and   
         Mashael Aljubairah and   
        Hapsoro Adi Permana and   
                  Pedro Sampaio   A Conceptual Approach for Supporting
                                  Traffic Data Wrangling Tasks . . . . . . 461--480

The Computer Journal
Volume 62, Number 4, April, 2019

                 Gaoli Wang and   
                 Zhenfu Cao and   
                   Xiaolei Dong   Improved Fault-Tolerant Aggregate
                                  Signatures . . . . . . . . . . . . . . . 481--489
                    Hui Guo and   
             Zhenfeng Zhang and   
                    Jing Xu and   
                      Ningyu An   Non-transferable Proxy Re-encryption . . 490--506
        Fatemeh Rezaeibagha and   
                          Yi Mu   Efficient Micropayment of Cryptocurrency
                                  from Blockchains . . . . . . . . . . . . 507--517
             Van Tuyen Dang and   
           Truong Thu Huong and   
           Nguyen Huu Thanh and   
              Pham Ngoc Nam and   
          Nguyen Ngoc Thanh and   
                  Alan Marshall   SDN-Based SYN Proxy --- A Solution to
                                  Enhance Performance of Attack Mitigation
                                  Under TCP SYN Flood  . . . . . . . . . . 518--534
                 Rongjia Li and   
                Chenhui Jin and   
                       Ruya Fan   Improved Integral Distinguishers on
                                  Compression Function of GOST R Hash
                                  Function . . . . . . . . . . . . . . . . 535--544
                Kwangsu Lee and   
              Dong Hoon Lee and   
             Jong Hwan Park and   
                      Moti Yung   CCA Security for Self-Updatable
                                  Encryption: Protecting Cloud Data When
                                  Clients Read/Write Ciphertexts . . . . . 545--562
                  Ming Zeng and   
                  Kai Zhang and   
               Haifeng Qian and   
              Xiaofeng Chen and   
                       Jie Chen   A Searchable Asymmetric Encryption
                                  Scheme with Support for Boolean Queries
                                  for Cloud Applications . . . . . . . . . 563--578
                Hongyun Cai and   
                    Fuzhi Zhang   An Unsupervised Method for Detecting
                                  Shilling Attacks in Recommender Systems
                                  by Mining Item Relationship and
                                  Identifying Target Items . . . . . . . . 579--597
   Muhammed Ali Bingöl and   
         Osman Biçer and   
         Mehmet Sabir Kiraz and   
                    Albert Levi   An Efficient 2-Party Private Function
                                  Evaluation Protocol Based on Half Gates  598--613
                Keita Emura and   
              Hayato Kimura and   
         Toshihiro Ohigashi and   
                 Tatsuya Suzuki   Privacy-Preserving Aggregation of
                                  Time-Series Data with Public
                                  Verifiability from Simple Assumptions
                                  and Its Implementations  . . . . . . . . 614--630
                    Yi Zhao and   
                    Yong Yu and   
                        Bo Yang   Leakage Resilient CCA Security in
                                  Stronger Model: Branch Hidden ABO-LTFs
                                  and Their Applications . . . . . . . . . 631--640

The Computer Journal
Volume 62, Number 5, May, 2019

            Mahmoud Darwich and   
        Mohsen Amini Salehi and   
                Ege Beyazit and   
                  Magdy Bayoumi   Cost-Efficient Cloud-Based Video
                                  Streaming Through Measuring Hotness  . . 641--656
                 Mira Gonen and   
               Dana Shapira and   
                James A. Storer   Edit Distance with Multiple Block
                                  Operations . . . . . . . . . . . . . . . 657--669
             A. S. M. Kayes and   
                    Jun Han and   
               Wenny Rahayu and   
              Tharam Dillon and   
            Md Saiful Islam and   
                    Alan Colman   A Policy Model and Framework for
                                  Context-Aware Access Control to
                                  Information Resources  . . . . . . . . . 670--705
                Shuang Zhao and   
                   Jixiang Meng   Arc Fault Tolerance of Maximally
                                  Arc-Connected Networks Modeled By
                                  Digraphs . . . . . . . . . . . . . . . . 706--714
               Shiying Wang and   
               Mujiangshan Wang   The strong connectivity of bubble-sort
                                  star graphs  . . . . . . . . . . . . . . 715--729
              Alkida Balliu and   
              Pierre Fraigniaud   Certification of Compact Low-Stretch
                                  Routing Schemes  . . . . . . . . . . . . 730--746
                 Yafei Zhai and   
                  Limei Lin and   
                      Li Xu and   
               Xinxin Zhang and   
                    Yanze Huang   The Conditional Diagnosability with
                                  $g$-Good-Neighbor of Exchanged
                                  Hypercubes . . . . . . . . . . . . . . . 747--756
            Khaled El-Fakih and   
           Nina Yevtushenko and   
                     Ayat Saleh   Incremental and Heuristic Approaches for
                                  Deriving Adaptive Distinguishing Test
                                  Cases for Non-deterministic Finite-State
                                  Machines . . . . . . . . . . . . . . . . 757--768
                      Yi Qi and   
                   Yuhao Yi and   
                 Zhongzhi Zhang   Topological and Spectral Properties of
                                  Small-World Hierarchical Graphs  . . . . 769--784
                 Chunlin Li and   
                Jingpan Bai and   
                Shaofeng Du and   
             Chunguang Yang and   
                    Youlong Luo   Combining Tag Correlation and
                                  Interactive Behaviors for Community
                                  Discovery  . . . . . . . . . . . . . . . 785--800

The Computer Journal
Volume 62, Number 6, June, 2019

                Zina Nakhla and   
            Kaouther Nouira and   
                Ahmed Ferchichi   Prescription Adverse Drug Events System
                                  (PrescADE) Based on Ontology and
                                  Internet of Things . . . . . . . . . . . 801--805
                    Ian C. Pyle   Software for the Linesman Radar Data
                                  Processing System  . . . . . . . . . . . 806--819
               Faisal Ahmed and   
          Corentin Kervadec and   
         Yannick Le Moullec and   
               Gert Tamberg and   
                     Paul Annus   Autonomous Wireless Sensor Networks:
                                  Implementation of Transient Computing
                                  and Energy Prediction for Improved Node
                                  Performance and Link Quality . . . . . . 820--837
             Muhammad Usman and   
     Aris Cahyadi Risdianto and   
                 Jungsu Han and   
                    Jongwon Kim   Interactive Visualization of SDN-Enabled
                                  Multisite Cloud Playgrounds Leveraging
                                  SmartX MultiView Visibility Framework    838--854
         Ab Shaqoor Nengroo and   
                K. S. Kuppusamy   `Advertisements or adverse-tisements?'
                                  --- An accessibility barrier for persons
                                  with visual impairments  . . . . . . . . 855--868
            Jianzhong Huang and   
                    Jie Xia and   
                   Xiao Qin and   
                  Qiang Cao and   
                 Changsheng Xie   Optimization of Small Updates for
                                  Erasure-Coded In-memory Stores . . . . . 869--883
  Christine Niyizamwiyitira and   
                  Lars Lundberg   A Utilization-Based Schedulability Test
                                  of Real-Time Systems Running on a
                                  Multiprocessor Virtual Machine . . . . . 884--904
                    Xing Su and   
               Minjie Zhang and   
                       Quan Bai   Two Mathematical Programming-Based
                                  Approaches for Wireless Mobile Robot
                                  Deployment in Disaster Environments  . . 905--918
          Lamiaa F. Ibrahim and   
           Hesham A. Salman and   
               Sara Y. Sery and   
                      Zaki Taha   Using Clustering Techniques to Plan
                                  Indoor Femtocell Base Stations Layout in
                                  Multi-floors . . . . . . . . . . . . . . 919--930
         Manju C. Thayammal and   
                  M. Mary Linda   Utility-Based Optimal Resource
                                  Allocation in LTE-A Networks by Hybrid
                                  ACO-TS with MFA Scheme . . . . . . . . . 931--942
Francesc D. Muñoz-Escoí and   
Rubén de Juan-Marín and   
José-Ramón García-Escrivá and   
J. R. González de Mendívil and   
José M. Bernabéu-Aubán   CAP Theorem: Revision of Its Related
                                  Consistency Models . . . . . . . . . . . 943--960

The Computer Journal
Volume 62, Number 7, July, 2019

          Lida Ghahremanlou and   
      Abdel-Rahman H. Tawil and   
               Paul Kearney and   
             Hossein Nevisi and   
                   Xia Zhao and   
                   Ali Abdallah   A Survey of Open Data Platforms in Six
                                  UK Smart City Initiatives  . . . . . . . 961--976
                 Saber Amri and   
                 Hela Ltifi and   
                Mounir Ben Ayed   A Predictive Visual Analytics Evaluation
                                  Approach Based on Adaptive Neuro-Fuzzy
                                  Inference System . . . . . . . . . . . . 977--1000
        Ibrahim Furkan Ince and   
           Yusuf Sait Erdem and   
                Faruk Bulut and   
               Md Haidar Sharif   A Low-Cost Pupil Center Localization
                                  Algorithm Based on Maximized Integral
                                  Voting of Circular Hollow Kernels  . . . 1001--1015
                 Xuezhi Yan and   
                   Ruige Li and   
               Xiaoying Sun and   
                    Guohong Liu   Effects of Touch Force Profiles and
                                  Waveforms of Electrostatic Tactile
                                  Feedback on Touchscreen Pan Operation    1016--1035
                  M. Dhivya and   
                 M. Renuka Devi   Detection of Structural Defects in
                                  Fabric Parts Using a Novel Edge
                                  Detection Method . . . . . . . . . . . . 1036--1043
                Alex Bogatu and   
            Norman W. Paton and   
     Alvaro A. A. Fernandes and   
                 Martin Koehler   Towards Automatic Data Format
                                  Transformations: Data Wrangling at Scale 1044--1060
             Alireza Nazemi and   
             Marziyeh Mortezaee   A Novel Collaborate Neural Dynamic
                                  System Model for Solving a Class of
                                  Min-uMax Optimization Problems with an
                                  Application in Portfolio Management  . . 1061--1085

The Computer Journal
Volume 62, Number 8, August, 2019

                 Xi-Jun Lin and   
                    Lin Sun and   
                 Haipeng Qu and   
                    He-Qun Xian   Cryptanalysis of a Compact Anonymous
                                  HIBE with Constant Size Private Keys . . 1087--1091
                Yanwei Zhou and   
                    Bo Yang and   
                Hongxia Hou and   
                 Lina Zhang and   
                   Tao Wang and   
                    Mingxiao Hu   Continuous Leakage-Resilient
                                  Identity-Based Encryption with Tight
                                  Security . . . . . . . . . . . . . . . . 1092--1105
          Jordan S. Queiroz and   
             Eduardo L. Feitosa   A Web Browser Fingerprinting Method
                                  Based on the Web Audio API . . . . . . . 1106--1120
                  Qian Wang and   
                    Chenhui Jin   A Method to Bound the Number of Active
                                  S-Boxes for a Kind of AES-Like Structure 1121--1131
                Jiahui Chen and   
                   Jie Ling and   
              Jianting Ning and   
                    Jintai Ding   Identity-Based Signature Schemes for
                                  Multivariate Public Key Cryptosystems    1132--1147
                Nanyuan Cao and   
                 Zhenfu Cao and   
                   Zhen Liu and   
               Xiaolei Dong and   
                  Xiaopeng Zhao   All-But-Many Lossy Trapdoor Functions
                                  under Decisional RSA Subgroup Assumption
                                  and Application  . . . . . . . . . . . . 1148--1157
                 Hanqiu Liu and   
                    Chenhui Jin   An Improvement of the CS Attack to DSC
                                  Cipher . . . . . . . . . . . . . . . . . 1158--1165
                 Yuzhao Cui and   
                Qiong Huang and   
               Jianye Huang and   
                  Hongbo Li and   
                    Guomin Yang   Ciphertext-Policy Attribute-Based
                                  Encrypted Data Equality Test and
                                  Classification . . . . . . . . . . . . . 1166--1177
           Parvin Rastegari and   
               Willy Susilo and   
            Mohammad Dakhlalian   Efficient Certificateless Signcryption
                                  in the Standard Model: Revisiting Luo
                                  and Wan's Scheme from Wireless Personal
                                  Communications (2018)  . . . . . . . . . 1178--1193
            Thierry Mefenza and   
                Damien Vergnaud   Cryptanalysis of Server-Aided RSA
                                  Protocols with Private-Key Splitting . . 1194--1213
               Jinguang Han and   
                Maoxuan Bei and   
                 Liqun Chen and   
                 Yang Xiang and   
                    Jie Cao and   
                 Fuchun Guo and   
                    Weizhi Meng   Attribute-Based Information Flow Control 1214--1231
              Jinyong Chang and   
               Genqing Bian and   
                  Yanyan Ji and   
                      Maozhi Xu   On the KDM--CCA Security from Partial
                                  Trapdoor One-Way Family in the Random
                                  Oracle Model . . . . . . . . . . . . . . 1232--1245

The Computer Journal
Volume 62, Number 9, September, 2019

          Natarajan Meghanathan   Centrality and Partial Correlation
                                  Coefficient-Based Assortativity Analysis
                                  of Real-World Networks . . . . . . . . . 1247--1264
                 Kenji Yasunaga   Error Correction by Structural
                                  Simplicity: Correcting Samplable
                                  Additive Errors  . . . . . . . . . . . . 1265--1276
                Shu-Li Zhao and   
               Rong-Xia Hao and   
                      Lidong Wu   The Generalized Connectivity of $ (n,
                                  k)$-Bubble-Sort Graphs . . . . . . . . . 1277--1283
             Khalil Mohamed and   
           Ayman El Shenawy and   
                      Hany Harb   A Hybrid Decentralized Coordinated
                                  Approach for Multi-Robot Exploration
                                  Task . . . . . . . . . . . . . . . . . . 1284--1300
               Jinyong Wang and   
                    Xiaoping Mi   Open Source Software Reliability Model
                                  with the Decreasing Trend of Fault
                                  Detection Rate . . . . . . . . . . . . . 1301--1312
                    Yuxing Yang   Characterizations of Minimum Structure-
                                  and Substructure-Cuts of Hypercubes  . . 1313--1321
                   Zhiwu Xu and   
                    Ping Lu and   
                   Haiming Chen   Towards an Effective Syntax and a
                                  Generator for Deterministic Standard
                                  Regular Expressions  . . . . . . . . . . 1322--1341
                Tangliu Wen and   
                   Lan Song and   
                       Zhen You   Proving Linearizability Using Reduction  1342--1364
                 Ying Jiang and   
                   Jian Liu and   
               Gilles Dowek and   
                    Kailiang Ji   Towards Combining Model Checking and
                                  Proof Checking . . . . . . . . . . . . . 1365--1402

The Computer Journal
Volume 62, Number 10, October, 2019

           Saurabh K Pandey and   
                Mukesh A Zaveri   DoA-Based Event Localization Using
                                  Uniform Concentric Circular Array in the
                                  IoT Environment  . . . . . . . . . . . . 1403--1425
              Islam Elleuch and   
               Achraf Makni and   
                  Rafik Bouaziz   Cooperative Overtaking Assistance System
                                  Based on V2V Communications and RTDB . . 1426--1449
                Zikai Zhang and   
                  Jigang Wu and   
                  Long Chen and   
              Guiyuan Jiang and   
                   Siew-Kei Lam   Collaborative Task Offloading with
                                  Computation Result Reusing for Mobile
                                  Edge Computing . . . . . . . . . . . . . 1450--1462
               Guijuan Wang and   
             Cheng-Kuan Lin and   
               Baolei Cheng and   
                 Jianxi Fan and   
                     Weibei Fan   Structure Fault-Tolerance of the
                                  Generalized Hypercube  . . . . . . . . . 1463--1476
             Hisham M Almasaeid   Maximizing Achievable Transmission Time
                                  in Cognitive Radio Networks Under
                                  Sensor-Aided Crowdsourced Spectrum
                                  Sensing  . . . . . . . . . . . . . . . . 1477--1489
                    Hui Cai and   
                 Yanmin Zhu and   
                     Jie Li and   
                       Jiadi Yu   Double Auction for a Data Trading Market
                                  with Preferences and Conflicts of
                                  Interest . . . . . . . . . . . . . . . . 1490--1504
          Mohamed A Bayoumi and   
              Tarek M Salem and   
                 Samir M Koriem   Improving the Mechanism of Detecting and
                                  Measuring Holes in Ad hoc Wireless
                                  Sensor Network . . . . . . . . . . . . . 1505--1514
                Jianhua Fan and   
                  Tao Liang and   
             Tongxiang Wang and   
                    Jianwei Liu   Identification and Localization of the
                                  Jammer in Wireless Sensor Networks . . . 1515--1527
  Moresh Madhukar Mukhedkar and   
                  Uttam Kolekar   Trust-Based Secure Routing in Mobile Ad
                                  Hoc Network Using Hybrid Optimization
                                  Algorithm  . . . . . . . . . . . . . . . 1528--1545

The Computer Journal
Volume 62, Number 11, November, 2019

                 Sarah Alhumoud   Twitter Analysis for Intelligent
                                  Transportation . . . . . . . . . . . . . 1547--1556
          Sreenithya Sumesh and   
             Aneesh Krishna and   
          Chitra M. Subramanian   Game Theory-Based Reasoning of Opposing
                                  Non-functional Requirements using
                                  Inter-actor Dependencies . . . . . . . . 1557--1583
              Vasile Palade and   
                J. Gerard Wolff   A Roadmap for the Development of the `SP
                                  Machine' for Artificial Intelligence . . 1584--1604
             Muhammad Adnan and   
             Muhammad Afzal and   
            Khadim Hussain Asif   Ontology-Oriented Software Effort
                                  Estimation System for E-commerce
                                  Applications Based on Extreme
                                  Programming and Scrum Methodologies  . . 1605--1624
              Jianbin Huang and   
              Qingquan Bian and   
                   Heli Sun and   
                Yaming Yang and   
                        Yu Zhou   Parameter-free Community Detection
                                  through Distance Dynamic Synchronization 1625--1638
            Manashee Kalita and   
        Themrichon Tuithung and   
            Swanirbhar Majumder   A New Steganography Method Using Integer
                                  Wavelet Transform and Least Significant
                                  Bit Substitution . . . . . . . . . . . . 1639--1655
                 N. Shankar and   
            S. Sathish Babu and   
                 C. Viswanathan   Femur Bone Volumetric Estimation for
                                  Osteoporosis Classification Using
                                  Optimization-Based Deep Belief Network
                                  in X-Ray Images  . . . . . . . . . . . . 1656--1670
      Roger Santos Ferreira and   
         Denilson Alves Pereira   BigFeel --- A Distributed Processing
                                  Environment for the Integration of
                                  Sentiment Analysis Methods . . . . . . . 1671--1683
               Ond\vrej Zamazal   Machine Learning Support for EU Funding
                                  Project Categorization . . . . . . . . . 1684--1694
             R. Vijayarajan and   
              P. Gnanasivam and   
                 R. Avudaiammal   Bio-Key Based AES for Personalized Image
                                  Cryptography . . . . . . . . . . . . . . 1695--1705

The Computer Journal
Volume 62, Number 12, December, 2019

                 Nghi Huynh and   
              Marc Frappier and   
               Herman Pooda and   
                Amel Mammar and   
           Régine Laleau   SGAC: a Multi-Layered Access Control
                                  Model with Conflict Resolution Strategy  1707--1733
               Binlin Cheng and   
                 Jinjun Liu and   
                Jiejie Chen and   
                Shudong Shi and   
                  Xufu Peng and   
              Xingwen Zhang and   
                    Haiqing Hai   MoG: Behavior-Obfuscation Resistance
                                  Malware Detection  . . . . . . . . . . . 1734--1747
                  Yang Chen and   
                  Wenmin Li and   
                    Fei Gao and   
                    Wei Yin and   
               Kaitai Liang and   
                  Hua Zhang and   
                    Qiaoyan Wen   Efficient Attribute-Based Data Sharing
                                  Scheme with Hidden Access Structures . . 1748--1760
                     Ya Liu and   
                  Yifan Shi and   
                    Dawu Gu and   
              Zhiqiang Zeng and   
                Fengyu Zhao and   
                     Wei Li and   
               Zhiqiang Liu and   
                       Yang Bao   Improved Meet-in-the-Middle Attacks on
                                  Reduced-Round Kiasu-BC and Joltik-BC . . 1761--1776
               Zhen-Hui Han and   
              Xing-Shu Chen and   
               Xue-Mei Zeng and   
                     Yi Zhu and   
                  Ming-Yong Yin   Detecting Proxy User Based on
                                  Communication Behavior Portrait  . . . . 1777--1792
             Jianghua Zhong and   
                    Dongdai Lin   On Equivalence of Cascade Connections of
                                  Two Nonlinear Feedback Shift Registers   1793--1804
                  Lele Chen and   
                 Gaoli Wang and   
                   GuoYan Zhang   MILP-based Related-Key Rectangle Attack
                                  and Its Application to GIFT, Khudra,
                                  MIBS . . . . . . . . . . . . . . . . . . 1805--1821
    Venkatraman Subbarayalu and   
               B Surendiran and   
               P Arun Raj Kumar   Hybrid Network Intrusion Detection
                                  System for Smart Environments Based on
                                  Internet of Things . . . . . . . . . . . 1822--1839
                 Haibo Hong and   
               Licheng Wang and   
                   Jun Shao and   
                Jianhua Yan and   
               Haseeb Ahmad and   
                  Guiyi Wei and   
                  Mande Xie and   
                    Yixian Yang   A Miniature CCA Public Key Encryption
                                  Scheme Based on Non-abelian
                                  Factorization Problem in Finite Groups
                                  of Lie Type  . . . . . . . . . . . . . . 1840--1848
                   San Ling and   
                Khoa Nguyen and   
              Huaxiong Wang and   
                 Juanyang Zhang   Server-Aided Revocable Predicate
                                  Encryption: Formalization and
                                  Lattice-Based Instantiation  . . . . . . 1849--1862


The Computer Journal
Volume 65, Number 7, July, 2022

               Yonghong Hou and   
                    Lin Xue and   
                    Shuo Li and   
                   Jiaming Xing   Corrigendum: User-Experience-Oriented
                                  Fuzzy Logic Controller for Adaptive
                                  Streaming  . . . . . . . . . . . . . . . 1937--1937

The Computer Journal
Volume 65, Number 10, October, 2022

               Binlin Cheng and   
                 Jinjun Liu and   
                Chen Jiejie and   
                Shi Shudong and   
                  Peng Xufu and   
              Zhang Xingwen and   
                    Haiqing Hai   Erratum to: MoG: Behavior-Obfuscation
                                  Resistance Malware Detection . . . . . . 2846--2846