


default search action
The Computer Journal, Volume 52, 2009
Volume 52, Number 1, January 2009
- Murat Gevrekci, Bahadir K. Gunturk
, Yucel Altunbasak:
Restoration of Bayer-sampled Image Sequences. 1-14 - Michael Elad, Dmitry Datsenko:
Example-Based Regularization Deployed to Super-Resolution Reconstruction of a Single Image. 15-30 - M. Dirk Robinson, Sina Farsiu
, Peyman Milanfar:
Optimal Registration Of Aliased Images Using Variable Projection With Applications To Super-Resolution. 31-42 - Hayit Greenspan:
Super-Resolution in Medical Imaging. 43-63 - Mohamed-Jalal Fadili, Jean-Luc Starck
, Fionn Murtagh:
Inpainting and Zooming Using Sparse Representations. 64-79 - Priyam Chatterjee, Sujata Mukherjee, Subhasis Chaudhuri, Guna Seetharaman:
Application Of Papoulis-Gerchberg Method In Image Super-Resolution and Inpainting. 80-89 - Huanfeng Shen, Michael K. Ng
, Pingxiang Li, Liangpei Zhang:
Super-Resolution Reconstruction Algorithm To MODIS Remote Sensing Images. 90-100 - Lyndsey C. Pickup, David P. Capel, Stephen J. Roberts, Andrew Zisserman:
Bayesian Methods for Image Super-Resolution. 101-113 - Jongseong Choi, Min Kyu Park, Moon Gi Kang:
High Dynamic Range Image Reconstruction with Spatial Resolution Enhancement. 114-125 - Ali Mohammad-Djafari
:
Super-Resolution: A Short Review, A New Method Based on Hidden Markov Modeling of HR Image and Future Challenges. 126-141 - Filip Sroubek
, Jan Flusser
, Gabriel Cristóbal
:
Super-Resolution and Blind Deconvolution For Rational Factors With an Application to Color Images. 142-152 - Miguel Vega
, Javier Mateos
, Rafael Molina
, Aggelos K. Katsaggelos
:
Super-Resolution of Multispectral Images. 153-167
Volume 52, Number 2, March 2009
- Fairouz Kamareddine:
Capsule Reviews. 169-170
- Chung-Ming Huang, Chung-Wei Lin, Xin-Ying Lin:
A Predictive Video-on-Demand Bandwidth Management Using the Kalman Filter over Heterogeneous Networks. 171-185 - Giuseppe Anastasi, Emilio Ancillotti, Marco Conti
, Andrea Passarella
:
Design and Performance Evaluation of a Transport Protocol for Ad hoc Networks. 186-209 - Abdelgadir Ibrahim, Liping Zhao
:
Supporting the OSGi Service Platform with Mobility and Service Distribution in Ubiquitous Home Environments. 210-239 - Tomás Sánchez López, Daeyoung Kim, Gonzalo Huerta Cánepa, Koudjo Mawuefam Koumadi:
Integrating Wireless Sensors and RFID Tags into Energy-Efficient and Dynamic Context Networks. 240-267 - Yamin Li, Shietung Peng, Wanming Chu:
Optimal Algorithms for Finding a Trunk on a Tree Network and its Applications. 268-275
Volume 52, Number 3, May 2009
- Fairouz Kamareddine:
Capsule Reviews. 277-279
- Fei He, Xiaoyu Song, Ming Gu, Jia-Guang Sun:
Heuristic-Guided Abstraction Refinement. 280-287 - Ricardo Pereira e Silva, Evandro César Freiberger:
Metrics to Evaluate the Use of Object Oriented Frameworks. 288-304 - David J. Power, Mark Slaymaker
, Andrew C. Simpson
:
On Formalizing and Normalizing Role-Based Access Control Systems. 305-325 - Alex Gammerman
, Volodya Vovk, Brian Burford, Ilia Nouretdinov, Zhiyuan Luo, Alexey Ya. Chervonenkis, Mike Waterfield, Rainer Cramer
, Paul Tempst, Josep Villanueva, Musarat Kabir, Stephane Camuzeaux
, John Timms
, Usha Menon
, Ian Jacobs:
Serum Proteomic Abnormality Predating Screen Detection of Ovarian Cancer. 326-333 - Florentin Ipate:
Test Selection for Hierarchical and Communicating Finite State Machines. 334-347 - Jesús Manuel Almendros-Jiménez
, Luis Iribarne
:
UML Modeling of User and Database Interaction. 348-367 - Jukka Teuhola:
Tournament Coding of Integer Sequences. 368-377 - Simon H. Lavington:
An Appreciation of Dina St Johnston (1930-2007) Founder of the UK's First Software House. 378-387
Volume 52, Number 4, July 2009
- Fairouz Kamareddine:
Capsule Reviews. 393-394
- Aggelos K. Katsaggelos
, Rafael Molina
:
Guest Editorial. 395-396
- Fabrice Saffre
, Richard Tateson, José Halloy
, Mark Shackleton, Jean-Louis Deneubourg:
Aggregation Dynamics in Overlay Networks and Their Implications for Self-Organized Distributed Applications. 397-412 - Anastasis A. Sofokleous, Marios C. Angelides:
Dynamic Selection of a Video Content Adaptation Strategy from a Pareto Front. 413-428 - Zhongqiang Chen, Alex Delis, Peter Wei:
A Pragmatic Methodology for Testing Intrusion Prevention Systems. 429-460 - Natarajan Meghanathan
:
A Location Prediction-Based Reactive Routing Protocol to Minimize the Number of Route Discoveries and Hop Count per Path in Mobile Ad Hoc Networks. 461-482 - Yukiko Yamauchi, Toshimitsu Masuzawa, Doina Bein:
Preserving the Fault-Containment of Ring Protocols Executed on Trees. 483-498 - Kuo-Qin Yan, Shun-Sheng Wang, Shu-Ching Wang:
The Agreement Problem in Unreliable Scale-Free Networks. 499-509
- Olav Geil
:
Tracey Ho and Desmond S. Lun: Network Coding: An Introduction. Cambridge University Press (2008). ISBN 9780521873109, 184 pp. 510 - Elizabeth Harrin:
John E. Gibson, William T. Scherer and William F. Gibson: How to do Systems Analysis. Wiley (2007). ISBN-13: 978-0-470-00765-5, 360 pp. 510-511
Volume 52, Number 5, August 2009
- Hong Zhu, Shing-Chi Cheung
, Joseph Robert Horgan, J. Jenny Li:
Guest Editorial to the Special Issue on Automation of Software Testing. 513
- Leonard Gallagher, Jeff Offutt:
Test Sequence Generation For Integration Testing Of Component Software. 514-529 - Mengluo Ji, Ji Wang, Shuhao Li, Zhi-Chang Qi:
Automated Worst-Case Execution Time Analysis Based on Program Modes. 530-544 - Mingsong Chen, Xiaokang Qiu
, Wei Xu, Linzhang Wang, Jianhua Zhao, Xuandong Li:
UML Activity Diagram-Based Automatic Test Case Generation For Java Programs. 545-556 - Aynur Abdurazik, Jeff Offutt:
Using Coupling-Based Weights for the Class Integration and Test Order Problem. 557-570 - Lijun Shan, Hong Zhu:
Generating Structurally Complex Test Cases By Data Mutation: A Case Study Of Testing An Automated Modelling Tool. 571-588 - Qian Yang, J. Jenny Li, David M. Weiss:
A Survey of Coverage-Based Testing Tools. 589-597
Volume 52, Number 6, August 2009
- Monika Kapus-Kolar:
Three Generalizations to a Generic Integrated Test Generation Method for Finite State Machines. 599-625 - Jaesung Lee, Hyuk-Jae Lee, Chanho Lee:
A Phase-Based Approach for On-Chip Bus Architecture Optimization. 626-645 - Hung-Yu Chien, Tzong-Chen Wu:
Provably Secure Password-Based Three-Party Key Exchange With Optimal Message Steps. 646-655 - Daniel Lacks, Mainak Chatterjee, Taskin Koçak:
Design and Evaluation of a Distributed Clustering Algorithm for Mobile ad hoc Networks. 656-670 - Tzu-Chi Huang, Ce-Kuen Shieh, Yu-Ben Miao:
Just-In-Time Cache for Capsule-Based Active Networks. 671-689 - Daniel Greenfield, Simon W. Moore
:
Implications of Electronics Technology Trends for Algorithm Design. 690-698 - Zhongqiang Chen, Yuan Zhang, Zhongrong Chen, Alex Delis:
A Digest and Pattern Matching-Based Intrusion Detection Engine. 699-723
- Jakub Marecek:
Yves Pochet and Laurence A. Wolsey: Production Planning Using Mixed Integer Programming Springer (2006) ISBN 978-0-387-29959-4. 724-725 - Elizabeth Harrin:
Jean Tabaka: Collaboration Explained: Facilitation Skills for Software Project Leaders Addison Wesley (2006) ISBN-13 978-0321268778. 725 - Mamdouh Refaat:
Colleen McCue: Data Mining and Predictive Analytics: Intelligence Gathering and Crime Analysis Elsevier (2007) ISBN 0-7506-7796-1. 725-726
Volume 52, Number 7, October 2009
- Boris G. Mirkin
, Mark Levene:
Special Issue on Profiling Expertise and Behaviour. 727-728 - Craig Macdonald, Iadh Ounis
:
Searching for Expertise: Experiments with the Voting Model. 729-748 - Panagiotis Germanakos, Nikos Tsianos, Zacharias Lekkas
, Constantinos Mourlas, George Samaras:
Realizing Comprehensive User Profile as the Core Element of Adaptive and Personalized Communication Environments and Systems. 749-770 - Daniela Godoy
, Analía Amandi
:
Interest Drifts in User Profiling: A Relevance-Based Approach and Analysis of Scenarios. 771-788 - Adriana Santarosa Vivacqua, Jonice Oliveira
, Jano Moreira de Souza:
i-ProSE: Inferring User Profiles in a Scientific Context. 789-798
- Gilles Dowek
, Ying Jiang:
Enumerating Proofs of Positive Formulae. 799-807 - Liang Bai, Songyang Lao, Alan F. Smeaton
, Noel E. O'Connor, David A. Sadlier, David Sinclair:
Semantic Analysis of Field Sports Video using a Petri-Net of Audio-Visual Concepts. 808-823 - Dima Alhadidi, Nadia Belblidia, Mourad Debbabi
, Prabir Bhattacharya:
lambda_SAOP: A Security AOP Calculus. 824-849
- Elizabeth Harrin:
Alison Phipps: Women in Science, Engineering and Technology: Three Decades of UK Initiatives Trentham Books (2008) ISBN-13 978 1 85856 402 9. 850
Volume 52, Number 8, November 2009
- Chi-Yi Lin, Szu-Chi Wang, Sy-Yen Kuo
, Chi-Yuan Chen:
Increasing Service Availability in a Wireless Home Network Environment. 851-860 - Deqing Zou, Jong Hyuk Park, Tai-Hoon Kim, Xueguang Chen:
SH-CRBAC: Integrating Attribute and Status Constraints into the RBAC Model in Smart Home Systems. 861-870 - Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han, Tai-Hoon Kim:
Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile. 871-877 - Navrati Saxena, Abhishek Roy, Jitae Shin:
Near-Optimal Tracking for Residents' Comfort in Context-Aware Heterogeneous Smart Environments. 878-889 - Chih-Hsun Chou, Chang-Hsing Lee
, Ya-Hui Chen:
GA-Based Keyword Selection for the Design of an Intelligent Web Document Search System. 890-901 - Ting Zhang, Zhenyong Chen, Yuanxin Ouyang, Jiuyue Hao, Zhang Xiong:
An Improved RFID-Based Locating Algorithm by Eliminating Diversity of Active Tags for Indoor Environment. 902-909 - Wenjun Liu, Tianjiang Wang, Fang Liu:
Multi-Agent Group Programming Based On Co-evolution. 910-921 - Christos Goumopoulos, Achilles Kameas:
Ambient Ecologies in Smart Homes. 922-937 - Jong-Hyouk Lee, Byung-Jin Han, Hyung-Jin Lim, Yeong-Deok Kim, Navrati Saxena, Tai-Myoung Chung:
Optimizing Access Point Allocation Using Genetic Algorithmic Approach for Smart Home Environments. 938-949 - Liang Zhou, Baoyu Zheng, Anne Wei, Benoit Geller
, Jingwu Cui:
Joint Routing and Rate Control Scheme for Multi-Stream High-Definition Video Transmission over Wireless Home Networks. 950-959 - Chin-Feng Lai
, Hsien-Chao Huang, Yueh-Min Huang, Han-Chieh Chao
:
Design and Implementation of the DLNA Family Intercom System for Smart Homes. 960-968 - Francesco Marcelloni
, Massimo Vecchio
:
An Efficient Lossless Compression Algorithm for Tiny Nodes of Monitoring Wireless Sensor Networks. 969-987
- Beihong Jin, Xinchao Zhao, Zhenyue Long, Fengliang Qi, Shuang Yu:
Effective and Efficient Event Dissemination for RFID Applications. 988-1005 - Christian Huemer
, Philipp Liegl, Rainer Schuster, Marco Zapletal:
B2B Services: Worksheet-Driven Development of Modeling Artifacts and Code. 1006-1026

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.