no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
ABE with improved auxiliary input for big data security
|
Wang, Zhiwei |
|
2017 |
89 |
C |
p. 41-50 10 p. |
article |
2 |
A data intensive heuristic approach to the two-stage streaming scheduling problem
|
Liang, Wei |
|
2017 |
89 |
C |
p. 64-79 16 p. |
article |
3 |
A multivariate framework for weighted FPT algorithms
|
Shachnai, Hadas |
|
2017 |
89 |
C |
p. 157-189 33 p. |
article |
4 |
A polynomial-time algorithm for Outerplanar Diameter Improvement
|
Cohen, Nathann |
|
2017 |
89 |
C |
p. 315-327 13 p. |
article |
5 |
Axiomatizations for downward XPath on data trees
|
Abriola, Sergio |
|
2017 |
89 |
C |
p. 209-245 37 p. |
article |
6 |
Building a fault tolerant framework with deadline guarantee in big data stream computing environments
|
Sun, Dawei |
|
2017 |
89 |
C |
p. 4-23 20 p. |
article |
7 |
CDPS: A cryptographic data publishing system
|
Li, Tong |
|
2017 |
89 |
C |
p. 80-91 12 p. |
article |
8 |
Colouring diamond-free graphs
|
Dabrowski, Konrad K. |
|
2017 |
89 |
C |
p. 410-431 22 p. |
article |
9 |
Complexity of suffix-free regular languages
|
Brzozowski, Janusz A. |
|
2017 |
89 |
C |
p. 270-287 18 p. |
article |
10 |
Computing source-to-target shortest paths for complex networks in RDBMS
|
Ahmed, Aly |
|
2017 |
89 |
C |
p. 114-129 16 p. |
article |
11 |
Decidability and universality of quasiminimal subshifts
|
Salo, Ville |
|
2017 |
89 |
C |
p. 288-314 27 p. |
article |
12 |
Differences of halting probabilities
|
Barmpalias, George |
|
2017 |
89 |
C |
p. 349-360 12 p. |
article |
13 |
Disjoint path covers with path length constraints in restricted hypercube-like graphs
|
Park, Jung-Heum |
|
2017 |
89 |
C |
p. 246-269 24 p. |
article |
14 |
Editorial Board
|
|
|
2017 |
89 |
C |
p. IFC- 1 p. |
article |
15 |
Efficient monochromatic and bichromatic probabilistic reverse top-k query processing for uncertain big data
|
Xiao, Guoqing |
|
2017 |
89 |
C |
p. 92-113 22 p. |
article |
16 |
Efficient testing and matching of deterministic regular expressions
|
Groz, B. |
|
2017 |
89 |
C |
p. 372-399 28 p. |
article |
17 |
Elasticity management of Streaming Data Analytics Flows on clouds
|
Khoshkbarforoushha, Alireza |
|
2017 |
89 |
C |
p. 24-40 17 p. |
article |
18 |
Geographic spatiotemporal big data correlation analysis via the Hilbert–Huang transformation
|
Song, Weijing |
|
2017 |
89 |
C |
p. 130-141 12 p. |
article |
19 |
Journal of Computer and System Sciences Special Issue on Theoretical and Algorithmic Foundation for Big Data
|
|
|
2017 |
89 |
C |
p. 1-3 3 p. |
article |
20 |
L p -norm Sauer–Shelah lemma for margin multi-category classifiers
|
Guermeur, Yann |
|
2017 |
89 |
C |
p. 450-473 24 p. |
article |
21 |
On the combinatorial design of data centre network topologies
|
Stewart, Iain A. |
|
2017 |
89 |
C |
p. 328-348 21 p. |
article |
22 |
Precisely deciding CSL formulas through approximate model checking for CTMCs
|
Feng, Yuan |
|
2017 |
89 |
C |
p. 361-371 11 p. |
article |
23 |
Public key encryption resilient to leakage and tampering attacks
|
Sun, Shi-Feng |
|
2017 |
89 |
C |
p. 142-156 15 p. |
article |
24 |
Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases
|
Huang, Cheng |
|
2017 |
89 |
C |
p. 51-63 13 p. |
article |
25 |
Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption
|
Huang, Kaibin |
|
2017 |
89 |
C |
p. 400-409 10 p. |
article |
26 |
The control complexity of r-Approval: From the single-peaked case to the general case
|
Yang, Yongjie |
|
2017 |
89 |
C |
p. 432-449 18 p. |
article |
27 |
Zigzag Decodable codes: Linear-time erasure codes with applications to data storage
|
Gong, Xueqing |
|
2017 |
89 |
C |
p. 190-208 19 p. |
article |