Journal: Comput. J.

Volume 33, Issue 4

290 -- 295Chris J. Mitchell, Dave Rush, Michael Walker. A Secure Messaging Architecture Implementing the X.400-1988 Security Features
296 -- 307Aviezri S. Fraenkel, Shmuel T. Klein. Bidirectional Huffman Coding
308 -- 313R. L. Bailey, Ravi Mukkamala. Pipelining Data Compression Algorithms
314 -- 322Peter M. Fenwick. Performance Measurements on a 39 km Extended Ethernet
323 -- 329Yi Pan, Rami G. Melhem. Short Circuits in Buffered Multi-Stage Interconnection Networks
330 -- 336F. Warren Burton, Geoff P. McKeown, Victor J. Rayward-Smith. Applications of UET Scheduling Theory to the Implementation of Declarative Languages
337 -- 343D. Alcock, D. Brown. PRAXIS: A Program for Reproducing Proforma Design Calculations
344 -- 355Massimo Ancona, Leila De Floriani, Jitender S. Deogun. Structured Spanning Trees
356 -- 364Ronen Feldman, Martin Charles Golumbic. Optimization Algorithms for Student Scheduling via Constraint Satisfiability
365 -- 367Bruce K. Haddon. Cycle-Sort: A Linear Sorting Method
368 -- 374B. John Oommen, David T. H. Ng. On Generating Random Permutations with Arbitrary Distributions
375 -- 380H. Miyakoshi. A Literal Code Method For Minimizing Boolean Functions
381 -- 0T. H. Merrett. Scoping is not Orthogonal to Completeness