default search action
The Computer Journal, Volume 52, 2009
Volume 52, Number 1, January 2009
- Murat Gevrekci, Bahadir K. Gunturk, Yucel Altunbasak:
Restoration of Bayer-sampled Image Sequences. 1-14 - Michael Elad, Dmitry Datsenko:
Example-Based Regularization Deployed to Super-Resolution Reconstruction of a Single Image. 15-30 - M. Dirk Robinson, Sina Farsiu, Peyman Milanfar:
Optimal Registration Of Aliased Images Using Variable Projection With Applications To Super-Resolution. 31-42 - Hayit Greenspan:
Super-Resolution in Medical Imaging. 43-63 - Mohamed-Jalal Fadili, Jean-Luc Starck, Fionn Murtagh:
Inpainting and Zooming Using Sparse Representations. 64-79 - Priyam Chatterjee, Sujata Mukherjee, Subhasis Chaudhuri, Guna Seetharaman:
Application Of Papoulis-Gerchberg Method In Image Super-Resolution and Inpainting. 80-89 - Huanfeng Shen, Michael K. Ng, Pingxiang Li, Liangpei Zhang:
Super-Resolution Reconstruction Algorithm To MODIS Remote Sensing Images. 90-100 - Lyndsey C. Pickup, David P. Capel, Stephen J. Roberts, Andrew Zisserman:
Bayesian Methods for Image Super-Resolution. 101-113 - Jongseong Choi, Min Kyu Park, Moon Gi Kang:
High Dynamic Range Image Reconstruction with Spatial Resolution Enhancement. 114-125 - Ali Mohammad-Djafari:
Super-Resolution: A Short Review, A New Method Based on Hidden Markov Modeling of HR Image and Future Challenges. 126-141 - Filip Sroubek, Jan Flusser, Gabriel Cristóbal:
Super-Resolution and Blind Deconvolution For Rational Factors With an Application to Color Images. 142-152 - Miguel Vega, Javier Mateos, Rafael Molina, Aggelos K. Katsaggelos:
Super-Resolution of Multispectral Images. 153-167
Volume 52, Number 2, March 2009
- Fairouz Kamareddine:
Capsule Reviews. 169-170
- Chung-Ming Huang, Chung-Wei Lin, Xin-Ying Lin:
A Predictive Video-on-Demand Bandwidth Management Using the Kalman Filter over Heterogeneous Networks. 171-185 - Giuseppe Anastasi, Emilio Ancillotti, Marco Conti, Andrea Passarella:
Design and Performance Evaluation of a Transport Protocol for Ad hoc Networks. 186-209 - Abdelgadir Ibrahim, Liping Zhao:
Supporting the OSGi Service Platform with Mobility and Service Distribution in Ubiquitous Home Environments. 210-239 - Tomás Sánchez López, Daeyoung Kim, Gonzalo Huerta Cánepa, Koudjo Mawuefam Koumadi:
Integrating Wireless Sensors and RFID Tags into Energy-Efficient and Dynamic Context Networks. 240-267 - Yamin Li, Shietung Peng, Wanming Chu:
Optimal Algorithms for Finding a Trunk on a Tree Network and its Applications. 268-275
Volume 52, Number 3, May 2009
- Fairouz Kamareddine:
Capsule Reviews. 277-279
- Fei He, Xiaoyu Song, Ming Gu, Jia-Guang Sun:
Heuristic-Guided Abstraction Refinement. 280-287 - Ricardo Pereira e Silva, Evandro César Freiberger:
Metrics to Evaluate the Use of Object Oriented Frameworks. 288-304 - David J. Power, Mark Slaymaker, Andrew C. Simpson:
On Formalizing and Normalizing Role-Based Access Control Systems. 305-325 - Alex Gammerman, Volodya Vovk, Brian Burford, Ilia Nouretdinov, Zhiyuan Luo, Alexey Ya. Chervonenkis, Mike Waterfield, Rainer Cramer, Paul Tempst, Josep Villanueva, Musarat Kabir, Stephane Camuzeaux, John Timms, Usha Menon, Ian Jacobs:
Serum Proteomic Abnormality Predating Screen Detection of Ovarian Cancer. 326-333 - Florentin Ipate:
Test Selection for Hierarchical and Communicating Finite State Machines. 334-347 - Jesús Manuel Almendros-Jiménez, Luis Iribarne:
UML Modeling of User and Database Interaction. 348-367 - Jukka Teuhola:
Tournament Coding of Integer Sequences. 368-377 - Simon H. Lavington:
An Appreciation of Dina St Johnston (1930-2007) Founder of the UK's First Software House. 378-387
Volume 52, Number 4, July 2009
- Fairouz Kamareddine:
Capsule Reviews. 393-394
- Aggelos K. Katsaggelos, Rafael Molina:
Guest Editorial. 395-396
- Fabrice Saffre, Richard Tateson, José Halloy, Mark Shackleton, Jean-Louis Deneubourg:
Aggregation Dynamics in Overlay Networks and Their Implications for Self-Organized Distributed Applications. 397-412 - Anastasis A. Sofokleous, Marios C. Angelides:
Dynamic Selection of a Video Content Adaptation Strategy from a Pareto Front. 413-428 - Zhongqiang Chen, Alex Delis, Peter Wei:
A Pragmatic Methodology for Testing Intrusion Prevention Systems. 429-460 - Natarajan Meghanathan:
A Location Prediction-Based Reactive Routing Protocol to Minimize the Number of Route Discoveries and Hop Count per Path in Mobile Ad Hoc Networks. 461-482 - Yukiko Yamauchi, Toshimitsu Masuzawa, Doina Bein:
Preserving the Fault-Containment of Ring Protocols Executed on Trees. 483-498 - Kuo-Qin Yan, Shun-Sheng Wang, Shu-Ching Wang:
The Agreement Problem in Unreliable Scale-Free Networks. 499-509
- Olav Geil:
Tracey Ho and Desmond S. Lun: Network Coding: An Introduction. Cambridge University Press (2008). ISBN 9780521873109, 184 pp. 510 - Elizabeth Harrin:
John E. Gibson, William T. Scherer and William F. Gibson: How to do Systems Analysis. Wiley (2007). ISBN-13: 978-0-470-00765-5, 360 pp. 510-511
Volume 52, Number 5, August 2009
- Hong Zhu, Shing-Chi Cheung, Joseph Robert Horgan, J. Jenny Li:
Guest Editorial to the Special Issue on Automation of Software Testing. 513
- Leonard Gallagher, Jeff Offutt:
Test Sequence Generation For Integration Testing Of Component Software. 514-529 - Mengluo Ji, Ji Wang, Shuhao Li, Zhi-Chang Qi:
Automated Worst-Case Execution Time Analysis Based on Program Modes. 530-544 - Mingsong Chen, Xiaokang Qiu, Wei Xu, Linzhang Wang, Jianhua Zhao, Xuandong Li:
UML Activity Diagram-Based Automatic Test Case Generation For Java Programs. 545-556 - Aynur Abdurazik, Jeff Offutt:
Using Coupling-Based Weights for the Class Integration and Test Order Problem. 557-570 - Lijun Shan, Hong Zhu:
Generating Structurally Complex Test Cases By Data Mutation: A Case Study Of Testing An Automated Modelling Tool. 571-588 - Qian Yang, J. Jenny Li, David M. Weiss:
A Survey of Coverage-Based Testing Tools. 589-597
Volume 52, Number 6, August 2009
- Monika Kapus-Kolar:
Three Generalizations to a Generic Integrated Test Generation Method for Finite State Machines. 599-625 - Jaesung Lee, Hyuk-Jae Lee, Chanho Lee:
A Phase-Based Approach for On-Chip Bus Architecture Optimization. 626-645 - Hung-Yu Chien, Tzong-Chen Wu:
Provably Secure Password-Based Three-Party Key Exchange With Optimal Message Steps. 646-655 - Daniel Lacks, Mainak Chatterjee, Taskin Koçak:
Design and Evaluation of a Distributed Clustering Algorithm for Mobile ad hoc Networks. 656-670 - Tzu-Chi Huang, Ce-Kuen Shieh, Yu-Ben Miao:
Just-In-Time Cache for Capsule-Based Active Networks. 671-689 - Daniel Greenfield, Simon W. Moore:
Implications of Electronics Technology Trends for Algorithm Design. 690-698 - Zhongqiang Chen, Yuan Zhang, Zhongrong Chen, Alex Delis:
A Digest and Pattern Matching-Based Intrusion Detection Engine. 699-723
- Jakub Marecek:
Yves Pochet and Laurence A. Wolsey: Production Planning Using Mixed Integer Programming Springer (2006) ISBN 978-0-387-29959-4. 724-725 - Elizabeth Harrin:
Jean Tabaka: Collaboration Explained: Facilitation Skills for Software Project Leaders Addison Wesley (2006) ISBN-13 978-0321268778. 725 - Mamdouh Refaat:
Colleen McCue: Data Mining and Predictive Analytics: Intelligence Gathering and Crime Analysis Elsevier (2007) ISBN 0-7506-7796-1. 725-726
Volume 52, Number 7, October 2009
- Boris G. Mirkin, Mark Levene:
Special Issue on Profiling Expertise and Behaviour. 727-728 - Craig Macdonald, Iadh Ounis:
Searching for Expertise: Experiments with the Voting Model. 729-748 - Panagiotis Germanakos, Nikos Tsianos, Zacharias Lekkas, Constantinos Mourlas, George Samaras:
Realizing Comprehensive User Profile as the Core Element of Adaptive and Personalized Communication Environments and Systems. 749-770 - Daniela Godoy, Analía Amandi:
Interest Drifts in User Profiling: A Relevance-Based Approach and Analysis of Scenarios. 771-788 - Adriana Santarosa Vivacqua, Jonice Oliveira, Jano Moreira de Souza:
i-ProSE: Inferring User Profiles in a Scientific Context. 789-798
- Gilles Dowek, Ying Jiang:
Enumerating Proofs of Positive Formulae. 799-807 - Liang Bai, Songyang Lao, Alan F. Smeaton, Noel E. O'Connor, David A. Sadlier, David Sinclair:
Semantic Analysis of Field Sports Video using a Petri-Net of Audio-Visual Concepts. 808-823 - Dima Alhadidi, Nadia Belblidia, Mourad Debbabi, Prabir Bhattacharya:
lambda_SAOP: A Security AOP Calculus. 824-849
- Elizabeth Harrin:
Alison Phipps: Women in Science, Engineering and Technology: Three Decades of UK Initiatives Trentham Books (2008) ISBN-13 978 1 85856 402 9. 850
Volume 52, Number 8, November 2009
- Chi-Yi Lin, Szu-Chi Wang, Sy-Yen Kuo, Chi-Yuan Chen:
Increasing Service Availability in a Wireless Home Network Environment. 851-860 - Deqing Zou, Jong Hyuk Park, Tai-Hoon Kim, Xueguang Chen:
SH-CRBAC: Integrating Attribute and Status Constraints into the RBAC Model in Smart Home Systems. 861-870 - Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han, Tai-Hoon Kim:
Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile. 871-877 - Navrati Saxena, Abhishek Roy, Jitae Shin:
Near-Optimal Tracking for Residents' Comfort in Context-Aware Heterogeneous Smart Environments. 878-889 - Chih-Hsun Chou, Chang-Hsing Lee, Ya-Hui Chen:
GA-Based Keyword Selection for the Design of an Intelligent Web Document Search System. 890-901 - Ting Zhang, Zhenyong Chen, Yuanxin Ouyang, Jiuyue Hao, Zhang Xiong:
An Improved RFID-Based Locating Algorithm by Eliminating Diversity of Active Tags for Indoor Environment. 902-909 - Wenjun Liu, Tianjiang Wang, Fang Liu:
Multi-Agent Group Programming Based On Co-evolution. 910-921 - Christos Goumopoulos, Achilles Kameas:
Ambient Ecologies in Smart Homes. 922-937 - Jong-Hyouk Lee, Byung-Jin Han, Hyung-Jin Lim, Yeong-Deok Kim, Navrati Saxena, Tai-Myoung Chung:
Optimizing Access Point Allocation Using Genetic Algorithmic Approach for Smart Home Environments. 938-949 - Liang Zhou, Baoyu Zheng, Anne Wei, Benoit Geller, Jingwu Cui:
Joint Routing and Rate Control Scheme for Multi-Stream High-Definition Video Transmission over Wireless Home Networks. 950-959 - Chin-Feng Lai, Hsien-Chao Huang, Yueh-Min Huang, Han-Chieh Chao:
Design and Implementation of the DLNA Family Intercom System for Smart Homes. 960-968 - Francesco Marcelloni, Massimo Vecchio:
An Efficient Lossless Compression Algorithm for Tiny Nodes of Monitoring Wireless Sensor Networks. 969-987
- Beihong Jin, Xinchao Zhao, Zhenyue Long, Fengliang Qi, Shuang Yu:
Effective and Efficient Event Dissemination for RFID Applications. 988-1005 - Christian Huemer, Philipp Liegl, Rainer Schuster, Marco Zapletal:
B2B Services: Worksheet-Driven Development of Modeling Artifacts and Code. 1006-1026
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.