Home | Computer Systems Science & Engineering | Engineering Intelligent Systems | Books
 
   
Aims and Scope
Subscriptions
   
Paper Submissions
Notes For Authors
   
Forthcoming Papers
Special Issues
   
Vol 32 2017
Vol 31 2016
Vol 30 2015
Vol 29 2014
Vol 28 2013
Vol 27 2012
Vol 26 2011
Vol 25 2010
Vol 24 2009
Vol 23 2008
Vol 22 2007
Vol 21 2006
Vol 20 2005
Vol 19 2004
Vol 18 2003
   
Books for Review
   
   
   
   
   
   

Vol 25 2010

Vol 25 No 1 January 2010

Enhancing Levenshtein distance algorithm for assessing behavioral trust
Luci Pirmez, Luiz F R C Carmo and Luiz F H Bacellar

Transactional risk-based decision making system in e-business interactions
Pmar Khadeer Hussain, Tharam Dillon, Elizabeth Chang and Farookh Hussain

A heuristic multi-path routing scheme for online traffic in MPLS networks
Seung-Joon Seok, Bongsoo You, Sungwan Youm, Kyung-Hoe Kim and Chul-Hee Kang

TCP trunking for bandwidth management of aggregate traffic
H T Kung and S Y Wang

Towards a person-centric identity management infrastructure (IMI)
V Poursakidis and C Nikolaou

Performance analysis of message-passing libraries on high-speed clusters
Guillermo L Taboada, Juan Touriño and Ramón Doallo



Vol 25 No 2 March 2010

Special issue: Frontiers in Complex, Intelligent and Software Intensive Systems
Edited by Fatsos Xhafa, David Taniar and Leonard Barolli

Electromagnetic Fields Diffracted by Two Horizontal edges with Arbitrary Angle for Different and Same Heights
Jiro Iwashige and Leonard Barolli

Simulation of Soliton Propagation in Slab Waveguide by Frequency Dependent FDTD Method
Hiroshi Maeda

Decision Model for a System to Start Communicating with a Human
Makoto Murakami, Motoi Yamagiwa and Minoru Uehara

A Purpose-based Synchronization Protocol for Secure Information Flow Control
Tomoya Enokido and Makoto Takizawa

An embedded IRIS recognizer for portable and mobile devices
C. Militello, V. Conti, F. Sorbello and S. Vitabile

Scheduling Algorithms for Concurrently Streaming Multimedia Objects in P2P Overlay Networks
Alireza Goudarzinemati, Tomoya Enokido and Makoto Takizawa

Knowledge Discovery for the Linguistic Atlas of Sicily Project
Antonio Gentile, Roberto Pirrone and Giuseppe Russo

A reconstruction method for Ultrasonic deterioration image by the combination of Constructive Solid Geometry and Strongly Typed Genetic Programming
Motoi Yamagiwa, Minoru Uehara and Makoto Murakami

Mining Hierarchical Negative Association Rules
David Taniar, Wenny Rahayu, Vincent Lee and Olena Daly



Vol 25 No 3 May 2010

Special issue: Mobile Data Management: Models, Methodologies and Services
Frank Morovan and Abdelkader Hameurlain

A new distributed grid scheme and k-NN query processing for mobile objects in spatial networks
Young-Chang Kim and Jae-Woo Chang

LookAhead continuous KNN mobile query processing
Geng Zhao, Kefeng Xuan, David Taniar and Bala Srinivasan

A motion-aware safe period-based framework for spatial alarm processing
Bhuvan Bamba, Ling Liu and Philip S. Yu

A hybrid ZigBee/Bluetooth approach to mobile semantic grids
Michele Ruta, Floriano Scioscia, Tommaso Di Noia and Eugenio Di Sciascio

Mobile multimedia management for Virtual Campfire – the German excellence research cluster UMIC
Yiwei Cao, Ralf Klamma and Matthias Jarke



Vol 25 No 4 July 2010

Special issue: Open Source Certification
Ernesto Damiani, Luis Barbosa, Peter T. Breuer and Claudio A. Ardagna

Certification of open-source software: A role for formal methods?
Luis S. Barbosa, Antonio Cerone, Alexander K. Petrenko and Siraj A. Shaikh

OpenHMI-tester: an open and cross-platform architecture for GUI testing and certification
Pedro Luis Mateo Navarro, Gregorio Martínez Pêrez and Diego Sevilla Ruiz

Trustworthiness of the FLOSS development process
Etiel Petrinja and Giancarlo Succi

Empirical analysis of the bug fixing process in open source projects
Chiara Francalanci and Francesco Merlo



Vol 25 No 5 September 2010

Group undeniable signatures with convertibility
Yuh-Dauh Lyuu and Ming-Luen Wu

Message authentication code algorithm for IP-SEC
V. Lakshmi Praba and G. Arumugam

A cache coherence protocol for distributed memory platforms
Rodolfo Sumoza and Jose Aguilar Castro

MBR-safe piecewise aggregate approximation for time-series subsequence matching
Yang-Sae Moon and Jinho Kim

A list of features that a graphical xml query language should support
K. Bekiropoulos, E. Keramopoulos, O. Beza and P. Mouratidis

Component criticality analysis to minimize soft errors risk
Muhammad Sheikh Sadi, D. G.Myers, Cesar Ortega Sanchez and Jan Jurjens



Vol 25 No 6 November 2010

Special issue: Selected topics on Wireless Sensor Networks
Kai Lin and Kequi Li

A compromise-resilient pair-wise rekeying protocol in hierarchical wireless sensor networks
Song Guo and An-Ni Shen

Characterizing the scaling capacity for multiple access wireless sensor networks
Guangcheng Qin, Panlong Yang, Guihai Chen and Deke Guo

Efficient and adaptive transmission algorithms for underwater acoustic networks
Zhongwen Guo, Yuan Feng, Lu Hong, Ying Guo and Meng Yang

An energy efficient packet aggregation scheme for wireless sensor networks
Junfeng Xu, Kequi Li, Yanming Shen and Geyong Min

Multi-category web object extraction based on relation schema
Xiaowu Chen, Yongtao Ma and Qinping Zhao

A bimonthly research journal devoted to theoretical developments in computer systems science and their applications in computer systems engineering.

Co Editors-in-Chief

Prof. Tharam Dillon, La Trobe University, Australia

Prof. Elizabeth Chang, Curtin University of Technology, Australia

ISSN 0267 6192

9 Priory Business Park, Wistow Road, Kibworth Beauchamp, Leicester, LE8 0RX | Tel: +44 116 279 2299 | Fax: +44 116 279 2277
E-mail: admin@crlpublishing.co.uk