default search action
The Computer Journal, Volume 61
Volume 61, Number 1, January 2018
Original Articles
- Xinju Zhang:
Multi-state System Reliability Analysis Based on Fuzzy Colored Petri Nets. 1-13 - Chin-Chia Wu, Shang-Chia Liu, Chuanli Zhao, Sheng-Zhi Wang, Win-Chin Lin:
A Multi-Machine Order Scheduling with Learning Using the Genetic Algorithm and Particle Swarm Optimization. 14-31 - Jurairat Phuttharak, Seng W. Loke:
LogicCrowd: Crowd-Powered Logic Programming Based Mobile Applications. 32-46 - Ji-Bo Wang, Lin Li:
Machine Scheduling with Deteriorating Jobs and Modifying Maintenance Activities. 47-53 - Hon-Chan Chen, Tzu-Liang Kung, Lih-Hsing Hsu:
An Augmented Pancyclicity Problem of Crossed Cubes. 54-62 - Nidhi Kalra, Ajay Kumar:
Deterministic Deep Pushdown Transducer and its Parallel Version. 63-73 - Juan Carlos Saez, Adrian Pousa, Armando De Giusti, Manuel Prieto:
On the Interplay Between Throughput, Fairness and Energy Efficiency on Asymmetric Multicore Processors. 74-94 - Nisha Chaurasia, Shashikala Tapaswi, Joydip Dhar:
A Resource Efficient Expectation Maximization Clustering Approach for Cloud. 95-104 - Zhenyou Wang, Cuntao Xiao, Xianwei Lin, Yuan-Yuan Lu:
Single Machine Total Absolute Differences Penalties Minimization Scheduling with a Deteriorating and Resource-Dependent Maintenance Activity. 105-110 - Wojciech Mula, Nathan Kurz, Daniel Lemire:
Faster Population Counts Using AVX2 Instructions. 111-120 - Jou-Ming Chang, Jinn-Shyong Yang, Shyue-Ming Tang, Kung-Jui Pai:
The Wide Diameters of Regular Hyper-Stars and Folded Hyper-Stars. 121-128 - Xiaoyan Li, Jianxi Fan, Cheng-Kuan Lin, Xiaohua Jia:
Diagnosability Evaluation of the Data Center Network DCell. 129-143 - Xiaodong Meng, Minyi Guo, Jingyu Zhang:
An Efficient Graph Query Framework with Structural Recursion. 144-157 - Jianbin Huang, Xiaojing Sun, Yu Zhou, Heli Sun:
Corrigendum: A Team Formation Model with Personnel Work Hours and Project Workload Quantified. 158
Volume 61, Number 2, February 2018
Original Articles
- Saurabh K. Pandey, Mukesh A. Zaveri:
Quasi Random Deployment and Localization in Layered Framework for the Internet of Things. 159-179 - Xiaolin Chang, Tianju Wang, Ricardo J. Rodríguez, Zhenjiang Zhang:
Modeling and Analysis of High Availability Techniques in a Virtualized System. 180-198 - Natarajan Meghanathan:
Complex Network Analysis-Based Graph Theoretic Metrics to Determine Stable Data Gathering Trees for Mobile Sensor Networks. 199-222 - I Karthiga, Sharmila Sankar:
Providing Secret Authentication in Clustered Security Architecture for Cloud-Based WBAN. 223-232 - Tahani Hussain, Paulvanna Nayaki Marimuthu, Sami J. Habib:
Exploration of Storage Architectures for Enterprise Network. 233-247 - Subramaniam Sarathambekai, Kandaswamy Umamaheswari:
Multi-Objective Optimization Techniques for Task Scheduling Problem in Distributed Systems. 248-263 - Bang Chul Jung, Jae Sook Yoo, Woongsup Lee:
A Practical Physical-Layer Network Coding with Spatial Modulation in Two-Way Relay Networks. 264-272 - Jigang Wu, Long Chen, Xu Wang, Guiyuan Jiang, Siew-Kei Lam, Thambipillai Srikanthan:
Algorithms for Replica Placement and Update in Tree Network. 273-287 - Lin Lyu, Shengli Liu, Shuai Han:
Public-Key Encryption with Tight Simulation-Based Selective-Opening Security. 288-318
Volume 61, Number 3, March 2018
- Mona Taghavi, Jamal Bentahar, Kaveh Bakhtiyari, Chihab Hanachi:
New Insights Towards Developing Recommender Systems. 319-348 - Iqbal H. Sarker, Alan Colman, Muhammad Ashad Kabir, Jun Han:
Individualized Time-Series Segmentation for Mining Mobile Phone User Behavior. 349-368 - Prashant K. Srivastava, Ashish Khare:
Content-Based Image Retrieval using Local Binary Curvelet Co-occurrence Pattern - A Multiresolution Technique. 369-385 - Vasilis Kolias, Ioannis Anagnostopoulos, Sherali Zeadally:
Structural analysis and classification of search interfaces for the deep web. 386-398 - Jeremy Barnett, Philip C. Treleaven:
Algorithmic Dispute Resolution - The Automation of Professional Dispute Resolution Using AI and Blockchain Technologies. 399-408 - Zhou Shao, Muhammad Aamir Cheema, David Taniar:
Trip Planning Queries in Indoor Venues. 409-426 - Chitra M. Subramanian, Aneesh Krishna, Arshinder Kaur:
Game Theory-Based Requirements Analysis in the i* Framework. 427-446 - Meng-Jia Zhang, Kang Zhang, Jie Li, Yi-Na Li:
Visual Exploration of 3D Geospatial Networks in a Virtual Reality Environment. 447-458 - Hazem Hiary, Rawan Zaghloul, Moh'd Belal Al-Zoubi:
Single-Image Shadow Detection using Quaternion Cues. 459-468
Volume 61, Number 4, April 2018
Original Articles
- Jianhong Zhang, Jian Mao:
On the Security of a Pairing-Free Certificateless Signcryption Scheme. 469-471 - Emma Osborn, Andrew Simpson:
Risk and the Small-Scale Cyber Security Decision Making Dialogue - a UK Case Study. 472-495 - Haiqin Wu, Liangmin Wang, Shunrong Jiang:
Secure Top-k Preference Query for Location-based Services in Crowd-outsourcing Environments. 496-511 - Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo:
Criteria-Based Encryption. 512-525 - Yanping Shen, Kangfeng Zheng, Chunhua Wu, Mingwu Zhang, Xinxin Niu, Yixian Yang:
An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection. 526-538 - Xi Jun Lin, Lin Sun, Haipeng Qu, Dongxiao Liu:
Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme. 539-544 - Siyuan Chen, Peng Zeng, Kim-Kwang Raymond Choo, Xiaolei Dong:
Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols. 545-560 - Qiqi Lai, Bo Yang, Yong Yu, Yuan Chen, Jian Bai:
Novel Smooth Hash Proof Systems Based on Lattices. 561-574 - Husen Wang, Qiang Tang:
Efficient Homomorphic Integer Polynomial Evaluation Based on GSW FHE. 575-585 - Yanwei Zhou, Bo Yang, Yi Mu:
Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles. 586-600 - Kamalkumar R. Macwan, Sankita J. Patel:
k-NMF Anonymization in Social Network Data Publishing. 601-613 - Kaushal A. Shah, Devesh C. Jinwala:
Privacy Preserving, Verifiable and Resilient Data Aggregation in Grid-Based Networks. 614-628
Volume 61, Number 5, May 2018
Original Articles
- Shuanglong Kan, Zhiqiu Huang:
Partial Order Reduction for the full Class of State/Event Linear Temporal Logic. 629-644 - Lalit Mohan Goyal, M. M. Sufyan Beg, Tanvir Ahmad:
An Efficient Framework for Mining Association Rules in the Distributed Databases. 645-657 - Liangze Yin, Wei Dong, Fei He, Ji Wang:
A True-Concurrency Encoding for BMC of Compositional Systems. 658-671 - Mei-Mei Gu, Rong-Xia Hao, Yan-Quan Feng, Ai-Mei Yu:
The 3-extra Connectivity and Faulty Diagnosability. 672-686 - Edans Flavius de Oliveira Sandes, George Luiz Medeiros Teodoro, Maria Emília M. T. Walter, Xavier Martorell, Eduard Ayguadé, Alba Cristina Magalhaes Alves de Melo:
Formalization of Block Pruning: Reducing the Number of Cells Computed in Exact Biological Sequence Comparison Algorithms. 687-713 - Liqiong Xu, Shuming Zhou, Guanqin Lian, Zuwen Luo:
A Kind of Conditional Connectivity of Cayley Graphs Generated by 2-trees. 714-721 - Mosong Zhou, Xiaoshe Dong, Heng Chen, Xingjun Zhang:
A Runtime Available Resource Capacity Evaluation Model Based on the Concept of Similar Tasks. 722-744 - Yi Qi, Huan Li, Zhongzhi Zhang:
Extended Corona Product as an Exactly Tractable Model for Weighted Heterogeneous Networks. 745-760 - Shiying Wang, Guozhen Zhang, Kai Feng:
Edge Fault Tolerance of Cartesian Product Graphs on Super Restricted Edge Connectivity. 761-772 - Andrea Farruggia, Travis Gagie, Gonzalo Navarro, Simon J. Puglisi, Jouni Sirén:
Relative Suffix Trees. 773-788
Volume 61, Number 6, June 2018
Original Articles
- Feng Dan, Yajie Ma, Fengxing Zhou, Xiaomao Wang, Kai He:
A Safety Message Broadcast Strategy in Hybrid Vehicular Network Environment. 789-797 - Tua Agustinus Tamba:
On Handelman's Representation of Network Utility Maximization. 798-807 - Giuseppe Lettieri, Vincenzo Maffione, Luigi Rizzo:
A Study of I/O Performance of Virtual Machines. 808-831 - Atul Tripathi, Isha Pathak, Deo Prakash Vidyarthi:
Energy Efficient VM Placement for Effective Resource Utilization using Modified Binary PSO. 832-846 - Jyotshana Kanti, Geetam Singh Tomar:
Solution of sensing failure problem: an improved two-stage detector. 847-855 - Roberto Rodríguez-Rodríguez, Javier Díaz, Fernando Castro, Pablo Ibáñez, Daniel Chaver, Víctor Viñals, Juan Carlos Saez, Manuel Prieto-Matías, Luis Piñuel, Teresa Monreal Arnal, José María Llabería:
Reuse Detector: Improving the Management of STT-RAM SLLCs. 856-880 - Nileshkumar R. Patel, Shishir Kumar:
Energy-Efficient Approach for Effective Estimation of Delimited Node Position with Limited References. 881-895 - Ping Xie, Jianzhong Huang, Xiao Qin, Changsheng Xie:
SmartRec: Fast Recovery from Single Failures in Heterogeneous RAID-Coded Storage Systems. 896-911 - Francisco José Esteban, David Díaz, Pilar Hernández, Juan Antonio Caballero, Gabriel Dorado, Sergio Gálvez:
MC64-Cluster: Many-Core CPU Cluster Architecture and Performance Analysis in B-Tree Searches. 912-925 - Thompson Stephan, K. Suresh Joseph:
Particle Swarm Optimization-Based Energy Efficient Channel Assignment Technique for Clustered Cognitive Radio Sensor Networks. 926-936 - Tong Liu, Yanmin Zhu, Ting Wen, Jiadi Yu:
Location Privacy-Preserving Method for Auction-Based Incentive Mechanisms in Mobile Crowd Sensing. 937-948
Volume 61, Number 7, July 2018
Special Issue on Socially Aware Networking
- Chao Tong, Xiang Yin, Jun Li, Tongyu Zhu, Renli Lv, Liang Sun, Joel J. P. C. Rodrigues:
A shilling attack detector based on convolutional neural network for collaborative recommender system in social aware network. 949-958 - Jieren Cheng, Jinghe Zhou, Qiang Liu, Xiangyan Tang, Yanxiang Guo:
A DDoS Detection Method for Socially Aware Networking Based on Forecasting Fusion Feature Sequence. 959-970 - Noor Ullah, Xiangjie Kong, Liangtian Wan, Honglong Chen, Zhibo Wang, Feng Xia:
A Social Utility-Based Dissemination Scheme for Emergency Warning Messages in Vehicular Social Networks. 971-986 - Jiaqi Wang, Yunyao Lu, Xiaojie Wang, Jing Dong, Xiping Hu:
SAR: A Social-Aware Route Recommendation System for Intelligent Transportation. 987-997 - Mostafa Haghir Chehreghani, Albert Bifet, Talel Abdessalem:
Discriminative Distance-Based Network Indices with Application to Link Prediction. 998-1014
- Xiaogang Fu, Jianyong Sun:
Reference-Inspired Many-Objective Evolutionary Algorithm Based on Decomposition. 1015-1037 - Alexey Stakhov:
Mission-Critical Systems, Paradox of Hamming Code, Row Hammer Effect, 'Trojan Horse' of the Binary System and Numeral Systems with Irrational Bases. 1038-1063 - Yonghong Hou, Lin Xue, Shuo Li, Jiaming Xing:
User-Experience-Oriented Fuzzy Logic Controller for Adaptive Streaming. 1064-1074 - Wassim Derguech, Sami Bhiri, Edward Curry:
Using Ontologies for Business Capability modelling: Describing What Services and Processes Achieve. 1075-1098 - C. Harriet Linda, G. Wiselin Jiji:
Hierarchical Approach to Detect Fractures in CT DICOM Images. 1099-1108
Volume 61, Number 8, August 2018
Original Articles
- Khalifa Toumi, Mohamed H. E. Aouadi, Ana R. Cavalli, Wissam Mallouli, Jordi Puiggalí Allepuz, Pol Valletb Montfort:
A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System. 1109-1122 - Rong Wang, Yan Zhu, Tung-Shou Chen, Chin-Chen Chang:
An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining. 1123-1132 - Haijiang Wang, Xiaolei Dong, Zhenfu Cao, Dongmei Li:
Secure and Efficient Attribute-Based Encryption with Keyword Search. 1133-1142 - Gunikhan Sonowal, K. S. Kuppusamy:
SmiDCA: An Anti-Smishing Model with Machine Learning Approach. 1143-1157 - Rongjia Li, Chenhui Jin:
Meet-in-the-Middle Attacks on Reduced-Round QARMA-64/128. 1158-1165 - Xiaojuan Zhang, Xiutao Feng, Dongdai Lin:
Fault Attack on ACORN v3. 1166-1179 - Amir Daneshgar, Fahimeh Mohebbipoor:
A Secure Self-Synchronized Stream Cipher. 1180-1201 - Baoguo Yuan, Junfeng Wang, Zhiyang Fang, Li Qi:
A New Software Birthmark based on Weight Sequences of Dynamic Control Flow Graph for Plagiarism Detection. 1202-1215 - Jianye Huang, Qiong Huang, Willy Susilo:
Leakage-Resilient Dual-Form Signatures. 1216-1227 - Dianyan Xiao, Yang Yu:
Klepto for Ring-LWE Encryption. 1228-1239 - Jianchang Lai, Yi Mu, Fuchun Guo, Peng Jiang, Sha Ma:
Identity-Based Broadcast Encryption for Inner Products. 1240-1251 - Ya Liu, Anren Yang, Bo Dai, Wei Li, Zhiqiang Liu, Dawu Gu, Zhiqiang Zeng:
Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128. 1252-1258 - Baodong Qin, Qinglan Zhao, Dong Zheng:
Bounded Revocable and Outsourceable ABE for Secure Data Sharing. 1259-1268
Volume 61, Number 9, September 2018
Original Articles
- Beiyang Zhang, Xiedong Zhang, Zhihua Zhang:
Nested-Stacking Genetic Algorithm for the Optimal Placement of Sensors in Bridge. 1269-1283 - Jialei Liu, Shangguang Wang, Ao Zhou, Xiang Xu, Sathish A. P. Kumar, Fangchun Yang:
Towards Bandwidth Guaranteed Virtual Cluster Reallocation in the Cloud. 1284-1295 - Zhi Chen, Xiaolin Chang, Zhen Han, Lin Li:
Survivability Modeling and Analysis of Cloud Service in Distributed Data Centers. 1296-1305 - Walayat Hussain, Farookh Khadeer Hussain, Omar Hussain, Ravindra Bagia, Elizabeth Chang:
Risk-based framework for SLA violation abatement from the cloud service provider's perspective. 1306-1322 - Jian Jin, Ping Ji:
Scheduling jobs with resource-dependent ready times and processing times depending on their starting times and positions. 1323-1328 - Ji-Bo Wang, Xin-Na Geng, Lu Liu, Jian-Jun Wang, Yuan-Yuan Lu:
Single Machine CON/SLK Due Date Assignment Scheduling with Controllable Processing Time and Job-dependent Learning Effects. 1329-1337 - Shufeng Kong, Sanjiang Li, Michael Sioutis:
Exploring Directional Path-Consistency for Solving Constraint Networks. 1338-1350 - Simone Faro, Arianna Pavone:
An Efficient Skip-Search Approach to Swap Matching. 1351-1360 - Nurul Liyana Mohamad Zulkufli, Sherzod Turaev, Mohd Izzuddin Bin Mohd Tamrin, Azeddine Messikh:
Watson-Crick Context-Free Grammars: Grammar Simplifications and a Parsing Algorithm. 1361-1373 - Andrea Pinna, Roberto Tonelli, Matteo Orrù, Michele Marchesi:
A Petri Nets Model for Blockchain Analysis. 1374-1388 - Samuel Tweneboah-Koduah, William J. Buchanan:
Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. 1389-1406 - Pedro Álvarez, Sergio Hernández, Javier Fabra, Joaquín Ezpeleta:
Cost-driven provisioning and execution of a computing-intensive service on the Amazon EC2. 1407-1421 - Ji-Bo Wang, Lu Liu, Jian-Jun Wang, Lin Li:
Makespan minimization scheduling with ready times, group technology and shortening job processing times. 1422-1428
Volume 61, Number 10, October 2018
Original Articles
- Leonildo José de Melo de Azevedo, Júlio Cezar Estrella, Luis Hideo Vasconcelos Nakamura, Marcos José Santana, Regina H. C. Santana, Claudio Fabiano Motta Toledo, Bruno G. Batista, Stephan Reiff-Marganiec:
Optimized Service Level Agreement Establishment in Cloud Computing. 1429-1442 - Zhenni Feng, Yanmin Zhu, Hui Cai, Pingyi Luo:
Optimal Distributed Auction for Mobile Crowd Sensing. 1443-1459 - Yunus Ozen, Cüneyt Bayilmis:
urgMAC: A New Traffic and QoS-aware Cross-Layer MAC protocol for Wireless Multimedia Sensor Networks. 1460-1467 - Soumya Das, Tamaghna Acharya:
Faulty Node Detection in HMM-Based Cooperative Spectrum Sensing For Cognitive Radio Networks. 1468-1478 - Reza Entezari-Maleki, Kishor S. Trivedi, Leonel Sousa, Ali Movaghar:
Performability-Based Workflow Scheduling in Grids. 1479-1495 - Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil, Khalil Drira, Saad Al-Ahmadi:
Cache Freshness in Named Data Networking for the Internet of Things. 1496-1511 - Margarida Mamede, José Legatheaux Martins, João Horta:
BOUQUET - Aggregating Network Paths in Trees to Reduce Data-Plane Forwarding State. 1512-1522 - Gobalakrishnan Natesan, C. Arun:
A New Multi-Objective Optimal Programming Model for Task Scheduling using Genetic Gray Wolf Optimization in Cloud Computing. 1523-1536 - Frédéric Giroire, Nicolas Huin, Joanna Moulierac, Truong Khoa Phan:
Energy-Aware Routing in Software-Defined Network using Compression. 1537-1556 - Anubis Graciela de Moraes Rossetto, Cláudio F. R. Geyer, Luciana Arantes, Pierre Sens:
Impact FD: An Unreliable Failure Detector Based on Process Relevance and Confidence in the System. 1557-1576 - S. Renuga, S. S. K. Jagatheeshwari:
Efficient Privacy-Preserving Data Sanitization over Cloud Using Optimal GSA Algorithm. 1577-1588
Volume 61, Number 11, November 2018
Original Articles
- Himangshu Sarma, Robert Porzel, Jan D. Smeddinck, Rainer Malaka, Arun B. Samaddar:
A Text to Animation System for Physical Exercises. 1589-1604 - Qirong Mao, Feifei Zhang, Liangjun Wang, Sidian Luo, Ming Dong:
Cascaded Multi-level Transformed Dirichlet Process for Multi-pose Facial Expression Recognition. 1605-1619 - Ammar Sohail, Muhammad Aamir Cheema, David Taniar:
Social-Aware Spatial Top-k and Skyline Queries. 1620-1638 - Md. Mosaddek Khan, Long Tran-Thanh, Sarvapali D. Ramchurn, Nicholas R. Jennings:
Speeding Up GDL-Based Message Passing Algorithms for Large-Scale DCOPs. 1639-1666 - Sunny Rai, Shampa Chakraverty, Devendra K. Tayal, Yash Kukreti:
A Study on Impact of Context on Metaphor Detection. 1667-1682 - Chandra Prakash, Rajesh Kumar, Namita Mittal:
Optimized Clustering Techniques for Gait Profiling in Children with Cerebral Palsy for Rehabilitation. 1683-1694 - Zhenjun Tang, Ziqing Huang, Heng Yao, Xianquan Zhang, Lv Chen, Chunqiang Yu:
Perceptual Image Hashing with Weighted DWT Features for Reduced-Reference Image Quality Assessment. 1695-1709 - Zhi-Fang Yang, Chih-Ting Kuo, Te-Hsi Kuo:
Authorization Identification by Watermarking in Log-polar Coordinate System. 1710-1723 - Zhi-jie Liang, Sheng-bin Liao, Bing-zhang Hu:
3D Convolutional Neural Networks for Dynamic Sign Language Recognition. 1724-1736 - Hamid Hassanpour, N. Nowrozian, Mohammad Mahdi AlyanNezhadi, Najmeh Samadiani:
Image Zooming Using a Multi-layer Neural Network. 1737-1748
Volume 61, Number 12, December 2018
Invited Paper
- David W. Archer, Dan Bogdanov, Yehuda Lindell, Liina Kamm, Kurt Nielsen, Jakob Illeborg Pagter, Nigel P. Smart, Rebecca N. Wright:
From Keys to Databases - Real-World Applications of Secure Multi-Party Computation. 1749-1771
- Eunsung Lee, Sang Woo Kim:
Non-interactive Conditional Proxy Re-Signature in the Standard Model. 1772-1782 - Tingting Lin, Hailun Yan, Xuejia Lai, Yixin Zhong, Yin Jia:
Security Evaluation and Improvement of a White-Box SMS4 Implementation Based on Affine Equivalence Algorithm. 1783-1790 - Xi Jun Lin, Lin Sun, Haipeng Qu, Dongxiao Liu:
On the Security of Secure Server-Designation Public Key Encryption with Keyword Search. 1791-1793 - Yunhua Wen, Shengli Liu, Ziyuan Hu, Shuai Han:
Computational Robust Fuzzy Extractor. 1794-1805 - Yi Dou, Henry C. B. Chan, Man Ho Au:
Order-Hiding Range Query over Encrypted Data without Search Pattern Leakage. 1806-1824 - Shuai Han, Shengli Liu, Lin Lyu, Dawu Gu:
Tightly Secure Encryption Schemes against Related-Key Attacks. 1825-1844 - Biao Wang, Xueqing Wang, Rui Xue, Xinyi Huang:
Matrix FHE and Its Application in Optimizing Bootstrapping. 1845-1861 - Yung-Ting Chuang, Yi-Fan Lee:
Defense Mechanism for Malicious and Selective Forwarding Attacks in Large and Mobile Wireless Networks. 1862-1879 - Jinhui Liu, Yong Yu, Bo Yang, Jianwei Jia, Shijia Wang, Houzhen Wang:
Structural Key Recovery of Simple Matrix Encryption Scheme Family. 1880-1896 - Qingwen Guo, Qiong Huang, Guomin Yang:
Authorized Function Homomorphic Signature. 1897-1908
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.