Database Management, Information Storage and Retrieval, Data Mining and Knowledge Discovery, Computational Science and Engineering, Mathematical Applications in Computer Science, Communications Engineering; Networks
Journal of Biomedical Semantics encompasses all aspects of semantic resources and their use in data integration, mining, modeling, interpretation and exploitation in biomedical research.
Journal of Cloud Computing: Advances, Systems and Applications (JoCCASA) is a peer-reviewed open access journal published under the brand SpringerOpen. It publishes research spanning all aspects of Cloud Computing. Principally focused on core elements, including Cloud applications, Cloud systems and the advances that will lead to the Clouds of the future, the journal will also present review and survey papers that offer up new insights, and lay the foundations for further exploratory and experimental work.
The journal disseminates research that imparts advanced theoretical grounding and practical application of Clouds and related systems, as enabled by combinations of internet-based software, development stacks and database availability, and virtualized hardware for storing, processing, analysis and visualizing data. Coverage will examine Clouds alongside such other paradigms as Peer to Peer (P2P) computing, Cluster computing and Grid computing. Coverage extends to issues of management, governance, trust and privacy, and interoperability of Clouds.The JOURNAL OF COMMUNICATIONS AND NETWORKS is published six times per year, and is committed to publishing high-quality papers that advance the state-of-the-art and practical applications of communications and information networks. Theoretical research contributions presenting new techniques, concepts, or analyses, applied contributions reporting on experiences and experiments, and tutorial expositions of permanent reference value are welcome. The subjects covered by this journal include all topics in communication theory and techniques, communication systems, and information networks.
Journal of Computer Networks and Communications is a peer-reviewed, open access journal that publishes original research and review articles in all areas of computer networks and communications.
The Journal of Computer and System Sciences publishes original research papers in computer science and related subjects in system science, with attention to the relevant mathematical theory. Applications-oriented papers may also be accepted.Research areas include traditional subjects such as:• Theory of algorithms and computability• Formal languages• Automata theoryContemporary subjects such as:• Complexity theory• Algorithmic Complexity• Parallel & distributed computing• Computer networks• Neural networks• Computational learning theory• Database theory & practice• Computer modeling of complex systemsBenefits to authorsWe also provide many author benefits, such as free PDFs, a liberal copyright policy, special discounts on Elsevier publications and much more. Please click here for more information on our author services.Please see our Guide for Authors for information on article submission. If you require any further information or help, please visit our support pages: http://support.elsevier.com
The Journal of Computer and System Sciences International is the leading scientific journal of the Russian Academy of Sciences in all areas of control theory and systems. The journal features papers on the theory and methods of control as well as papers devoted to the study, design, modeling, development, and application of new control systems. Papers reflect contemporary research and development in the field, with particular attention given to computer methods and technologies. In addition to research articles, the journal publishes proceedings of international scientific conferences and provides reviews by top experts from Russia and abroad on current and emerging problems in the field of control.
The Journal of Computer-Mediated Communication (JCMC) is a web-based, peer-reviewed scholarly journal. Its focus is social science research on computer-mediated communication via the Internet, the World Wide Web, and wireless technologies. Within that general purview, the journal is broadly interdisciplinary, publishing work by scholars in communication, business, education, political science, sociology, media studies, information science, and other disciplines. Acceptable formats for submission include original research articles, meta-analyses of prior research, synthesizing literature surveys, and proposals for special issues. JCMC is available online only. JCMC is one of the oldest web-based Internet studies journals in existence, having been published quarterly continuously since June 1995. The journal was started by Margaret McLaughlin and Sheizaf Rafaeli in response to the growth of CMC scholarship in the early- to mid-1990s. The founding editors had the vision to make JCMC an open-access, online journal. This, combined with high quality standards, proved to be a recipe for success: today JCMC is widely read and cited by CMC scholars around the world. In 2004, JCMC became an official journal of the International Communication Association. JCMC Electronic Office - click here to submit or review a paper for the journal.
The Journal of Cryptographic Engineering is an archival journal publishing high-quality scientific articles presenting methods, techniques, tools, implementations, and applications of research in cryptographic engineering, including cryptographic hardware, cryptographic embedded systems, and embedded security. JCEN aims to serve the academic and corporate R&D community interested in cryptographic hardware and embedded security by offering a focused journal drawing together archival papers that are presently scattered across various journals. The Journal of Cryptographic Engineering will cover the research areas summarized below. Cryptographic Hardware: Hardware architectures for public-key cryptography and secret-key cryptography: special-purpose hardware for cryptanalysis: cryptographic processors and co-processors: hardware accelerators for security protocols (security processors, network processors, etc.): true and pseudorandom number generators: Physically Unclonable Functions (PUFs). Cryptographic Software for Embedded Systems: Efficient software implementations of cryptography for embedded processors: efficient and secure implementations of cryptography using multiprocessor cores: cryptographic libraries: cryptographic algorithms targeting embedded devices. Attacks Against Implementations and Countermeasures Against These Attacks: Side channel attacks and countermeasures: faults and fault models for cryptographic devices: fault attacks and countermeasures: hardware tamper resistance: Trojan hardware. Tools and Methodologies: Computer aided cryptographic engineering: methodologies and environments for fair comparison of hardware and software efficiency of cryptographic algorithms, architectures, and implementations: partial and run-time reconfiguration of cryptographic systems: reliability and fault, tolerance in cryptography and cryptanalysis: architectures for trusted computing. Applications and Implementation Environments: Cryptography in wireless applications (mobile phone, WLANs, etc.): cryptography for pervasive computing (RFID, sensor networks, etc.): FPGA design security: hardware IP protection and anti-counterfeiting techniques: reconfigurable hardware for cryptography: smart card processors, systems, and applications: security in commercial consumer applications (pay-TV, automotive, etc.): secure storage devices (memories, disks, etc.): technologies and hardware for content protection: security for embedded software and systems.