Journal: Comput. J.

Volume 27, Issue 1

3 -- 7Maurice V. Wilkes. Security Management and Protection - A Personal Approach
8 -- 17William A. Gale, Roger Koenker. Pricing Interactive Computer Services
18 -- 26Ivor P. Page. Analysis of a Cyclic Placement Scheme
27 -- 36Peter G. Harrison. The Distribution of Cycle Times in Tree-Like Networks of Queues
42 -- 46L. V. Atkinson. Jumping About and Getting into a State
47 -- 56David M. Harland. User-Defined Types in a Polymorphic Language
57 -- 61Adarsh K. Arora, C. Robert Carlson. Normalization Could be Useful
62 -- 66N. Parimala, Naveen Prakash, Narasimha Bolloju. Concurrency Control in Admin
67 -- 71K. T. Fung. A. Reorganization Model Based on the Database Entropy Concept
72 -- 79C. M. Reeves. Complexity Analyses of Event Set Algorithms
80 -- 82M. C. Er. The Colour Towers of Hanoi: A Generalization
83 -- 84Chingmin Jim Lo. Unifying Multiple Semantic Intentions for a Syntactic Construct
84 -- 85R. J. Macmillan, James H. Davenport. Factoring Medium-Sized Integers
86 -- 87Gael N. Buckley, Abraham Silberschatz. On the Heterogeneous Guard Locking Protocol
87 -- 89Tamir Agmon, Israel Borovits. Dynamic and Uncertainty Considerations in the Selection and the Acquisition of An Information System: An Adoption of A Break-Even Analysis to Investment Decisions