Home | Computer Systems Science & Engineering | Engineering Intelligent Systems | Books
 
   
Aims and Scope
Subscriptions
   
Paper Submissions
Notes For Authors
   
Forthcoming Papers
Special Issues
   
Vol 32 2017
Vol 31 2016
Vol 30 2015
Vol 29 2014
Vol 28 2013
Vol 27 2012
Vol 26 2011
Vol 25 2010
Vol 24 2009
Vol 23 2008
Vol 22 2007
Vol 21 2006
Vol 20 2005
Vol 19 2004
Vol 18 2003
   
Books for Review
   
   
   
   
   
   

Vol 32 2017

Vol 32 No 1 January 2017

Adaptive Duty Cycle (ADC) energy efficient algorithm for ZigBee networks
Wail Mardini, Yaser Khamayseh, Marwa Salayma, Muneer Bani Yassien and Hussien Mouftah

An adaptive edge detection operator for noisy images based on a total variation approach restoration
Sa’ed Abed, Mohammed H Ali and Mohammad Al-Shayeji

Soft error tolerance using HVDQ (Horizontal-Vertical-Diagonal-Queen parity method)
Sakib Ahammed, Muhammad Sheikh Sadi, Md Shamimur Rahman and Jan Jürjens

Change management technique for supporting object oriented diagrams changes
Bassam Atieh Rajabi and Sai Peck Lee



Vol 32 No 2 March 2017
Special Issue: Foundations and Practice of Security in Emerging ICT Applications
Guest Editors
: Ilsun You, Sherali Zeadally and A Min Tjoa

Detecting local covert channels using process activity correlation on Android smartphones
Marcin Urbanski, Wojciech Mazurczyk, Jean-Francois Lalandey and Luca Caviglione

k-out-of-n oblivious transfer protocol with security against malicious adversaries
Xiaochao Wei, Qiuliang Xu and Yi Tang

A corrupted cloud and corrupted multi-cloud identification method for batch auditing in cloud storage services
Sooyeon Shin and Taekyoung Kwon

Enhanced TKTOFT protocol for ternary based distributed group key management in cognitive radio networks
C Mala, N Renugadevi and Hsing-Chung Chen

Security threats in M2M networks: a survey with case study
Fatima Hussain, Lilatul Ferdouse, Alagan Anpalagan, Lutful Karim and Isaac Woungang

Fast backup and recovery for web protectiuon using trigger and block hash approach
Qian He, Ning Zhang, Jinshu Su and Xiao-Song Zhang

An extensive empirical evaluation of classifier ensembles for intrusion detection task
Bayu Adhi Tama and Kyung-Hyune Rhee

Achieving a scalable and secure software defined network by identifiers separating and mapping
Mingxin Wang, Huachun Zhou and Jia Chen

Abnormal behaviour pattern mining for unknown threat detection
Chang Choi, Junho Choi and Pankoo Kim



Vol 32 No 3 May 2017
Optimal agreement under fallible mobile network
Shun-Sheng Wang and Shu-Ching Wang

An adaptive edge detection operator for noisy images based on a total variation approach restoration
Sa’ed Abed, Mohammed H Ali and Mohammad Al-Shayeji

Inspection reading techniques applied to software artifacts – a systematic review
Shouki A Ebad

Formal verification and performance evaluation of task scheduling heuristics for makespan optimization and workflow distribution in large-scale computing systems
Sardar Khaliq uz Zaman, Atta ur Rehman Khan, Saif ur Rehman Malik, Abdul Nasir Khan, Tahir Maqsood and Sajjad A Madani

A bottom-up semantic mapping approach for exploring manufacturing information resources in industry
Sara Bouzid



Vol 32 No 4 July 2017
Special Issue: Elastic Data Management in Cloud Systems
Guest Editors: Abdelkader Hameurlain and Riad Mokadem

On scalability of two NoSQL data stores for processing interactive social networking actions
Sumita Barahmand, Shahram Ghandeharizadeh and Jia Li

A QoS-aware approach for discovering and selecting configurable IaaS Cloud services
Jalel Eddine Hajlaoui, Mohamed Nazih Omri and Djamal Benslimane

Autoscaling scientific workflows on the cloud by combining on-demand and spot instances
David A Monge, Yisel Garí, Cristian Mateos and Carlos García Garino

Experimental comparative study of NoSQL databases: HBASE versus MongoDB by YCSB
Houcine Matallah, Ghalem Belalem and Karim Bouamrane

A clustering-based sampling method for building query response time models
Jinwen Zhang and Baoning Niu

A bimonthly research journal devoted to theoretical developments in computer systems science and their applications in computer systems engineering.

Co Editors-in-Chief

Prof. Tharam Dillon, La Trobe University, Australia

Prof. Elizabeth Chang, Curtin University of Technology, Australia

ISSN 0267 6192

9 Priory Business Park, Wistow Road, Kibworth Beauchamp, Leicester, LE8 0RX | Tel: +44 116 279 2299 | Fax: +44 116 279 2277
E-mail: admin@crlpublishing.co.uk