Journal of Cloud Computing: Advances, Systems and Applications (JoCCASA) is a peer-reviewed open access journal published under the brand SpringerOpen. It publishes research spanning all aspects of Cloud Computing. Principally focused on core elements, including Cloud applications, Cloud systems and the advances that will lead to the Clouds of the future, the journal will also present review and survey papers that offer up new insights, and lay the foundations for further exploratory and experimental work.
The journal disseminates research that imparts advanced theoretical grounding and practical application of Clouds and related systems, as enabled by combinations of internet-based software, development stacks and database availability, and virtualized hardware for storing, processing, analysis and visualizing data. Coverage will examine Clouds alongside such other paradigms as Peer to Peer (P2P) computing, Cluster computing and Grid computing. Coverage extends to issues of management, governance, trust and privacy, and interoperability of Clouds.The JOURNAL OF COMMUNICATIONS AND NETWORKS is published six times per year, and is committed to publishing high-quality papers that advance the state-of-the-art and practical applications of communications and information networks. Theoretical research contributions presenting new techniques, concepts, or analyses, applied contributions reporting on experiences and experiments, and tutorial expositions of permanent reference value are welcome. The subjects covered by this journal include all topics in communication theory and techniques, communication systems, and information networks.
Journal of Computer Networks and Communications is a peer-reviewed, open access journal that publishes original research and review articles in all areas of computer networks and communications.
The Journal of Computer and System Sciences publishes original research papers in computer science and related subjects in system science, with attention to the relevant mathematical theory. Applications-oriented papers may also be accepted.Research areas include traditional subjects such as:• Theory of algorithms and computability• Formal languages• Automata theoryContemporary subjects such as:• Complexity theory• Algorithmic Complexity• Parallel & distributed computing• Computer networks• Neural networks• Computational learning theory• Database theory & practice• Computer modeling of complex systemsBenefits to authorsWe also provide many author benefits, such as free PDFs, a liberal copyright policy, special discounts on Elsevier publications and much more. Please click here for more information on our author services.Please see our Guide for Authors for information on article submission. If you require any further information or help, please visit our support pages: http://support.elsevier.com
The Journal of Computer and System Sciences International is the leading scientific journal of the Russian Academy of Sciences in all areas of control theory and systems. The journal features papers on the theory and methods of control as well as papers devoted to the study, design, modeling, development, and application of new control systems. Papers reflect contemporary research and development in the field, with particular attention given to computer methods and technologies. In addition to research articles, the journal publishes proceedings of international scientific conferences and provides reviews by top experts from Russia and abroad on current and emerging problems in the field of control.
The Journal of Computer-Mediated Communication (JCMC) is a web-based, peer-reviewed scholarly journal. Its focus is social science research on computer-mediated communication via the Internet, the World Wide Web, and wireless technologies. Within that general purview, the journal is broadly interdisciplinary, publishing work by scholars in communication, business, education, political science, sociology, media studies, information science, and other disciplines. Acceptable formats for submission include original research articles, meta-analyses of prior research, synthesizing literature surveys, and proposals for special issues. JCMC is available online only. JCMC is one of the oldest web-based Internet studies journals in existence, having been published quarterly continuously since June 1995. The journal was started by Margaret McLaughlin and Sheizaf Rafaeli in response to the growth of CMC scholarship in the early- to mid-1990s. The founding editors had the vision to make JCMC an open-access, online journal. This, combined with high quality standards, proved to be a recipe for success: today JCMC is widely read and cited by CMC scholars around the world. In 2004, JCMC became an official journal of the International Communication Association. JCMC Electronic Office - click here to submit or review a paper for the journal.
The Journal of Cryptographic Engineering is an archival journal publishing high-quality scientific articles presenting methods, techniques, tools, implementations, and applications of research in cryptographic engineering, including cryptographic hardware, cryptographic embedded systems, and embedded security. JCEN aims to serve the academic and corporate R&D community interested in cryptographic hardware and embedded security by offering a focused journal drawing together archival papers that are presently scattered across various journals. The Journal of Cryptographic Engineering will cover the research areas summarized below. Cryptographic Hardware: Hardware architectures for public-key cryptography and secret-key cryptography: special-purpose hardware for cryptanalysis: cryptographic processors and co-processors: hardware accelerators for security protocols (security processors, network processors, etc.): true and pseudorandom number generators: Physically Unclonable Functions (PUFs). Cryptographic Software for Embedded Systems: Efficient software implementations of cryptography for embedded processors: efficient and secure implementations of cryptography using multiprocessor cores: cryptographic libraries: cryptographic algorithms targeting embedded devices. Attacks Against Implementations and Countermeasures Against These Attacks: Side channel attacks and countermeasures: faults and fault models for cryptographic devices: fault attacks and countermeasures: hardware tamper resistance: Trojan hardware. Tools and Methodologies: Computer aided cryptographic engineering: methodologies and environments for fair comparison of hardware and software efficiency of cryptographic algorithms, architectures, and implementations: partial and run-time reconfiguration of cryptographic systems: reliability and fault, tolerance in cryptography and cryptanalysis: architectures for trusted computing. Applications and Implementation Environments: Cryptography in wireless applications (mobile phone, WLANs, etc.): cryptography for pervasive computing (RFID, sensor networks, etc.): FPGA design security: hardware IP protection and anti-counterfeiting techniques: reconfigurable hardware for cryptography: smart card processors, systems, and applications: security in commercial consumer applications (pay-TV, automotive, etc.): secure storage devices (memories, disks, etc.): technologies and hardware for content protection: security for embedded software and systems.
The Journal of Grid Computing explores an emerging technology that enables large-scale resource sharing problem solving within distributed, loosely coordinated groups sometimes termed 'virtual organizations'. Coverage includes protocols, security, scaling and more. Although the advantages of this technology for classes of applications have been acknowledged, research in a variety of disciplines is needed to broaden the applicability and scope of the current body of knowledge. This journal fills the need, covering such topics as protocols, middleware, and services, security, discovery, sharing, scaling, and more. Discussion extends to advanced technologies for collaborative work, information sharing and problem solving.
The Journal of Heuristics provides a forum for advancing the state-of-the-art in the theory and practical application of techniques for solving problems approximately that cannot be solved exactly. It fosters the development, understanding, and practical use of heuristic solution techniques for solving business, engineering, and societal problems. It considers the importance of theoretical, empirical, and experimental work related to the development of heuristics. The journal presents practical applications, theoretical developments, decision analysis models that consider issues of rational decision making with limited information, artificial intelligence-based heuristics applied to a wide variety of problems, learning paradigms, and computational experimentation. Officially cited as: J Heuristics
The Journal of High Speed Networks is an international archival journal, active since 1992, providing a publication vehicle for covering a large number of topics of interest in the high performance networking and communication area. Its audience includes researchers, managers as well as network designers and operators. The main goal will be to provide timely dissemination of information and scientific knowledge. The journal will publish contributed papers on novel research, survey and position papers on topics of current interest, technical notes, and short communications to report progress on long-term projects. Submissions to the Journal will be refereed consistently with the review process of leading technical journals, based on originality, significance, quality, and clarity. Papers, written entirely in English, must contain original work not published or under revision elsewhere.
The international editorial board of
Current
JIKM is a refereed journal published quarterly by World Scientific and dedicated to the exchange of the latest research and practical information in the field of information processing and knowledge management. The journal publishes original research and case studies by academic, business and government contributors on all aspects of information processing, information management, knowledge management, tools, techniques and technologies, knowledge creation and sharing, best practices, policies and guideline.