290 | -- | 295 | Chris J. Mitchell, Dave Rush, Michael Walker. A Secure Messaging Architecture Implementing the X.400-1988 Security Features |
296 | -- | 307 | Aviezri S. Fraenkel, Shmuel T. Klein. Bidirectional Huffman Coding |
308 | -- | 313 | R. L. Bailey, Ravi Mukkamala. Pipelining Data Compression Algorithms |
314 | -- | 322 | Peter M. Fenwick. Performance Measurements on a 39 km Extended Ethernet |
323 | -- | 329 | Yi Pan, Rami G. Melhem. Short Circuits in Buffered Multi-Stage Interconnection Networks |
330 | -- | 336 | F. Warren Burton, Geoff P. McKeown, Victor J. Rayward-Smith. Applications of UET Scheduling Theory to the Implementation of Declarative Languages |
337 | -- | 343 | D. Alcock, D. Brown. PRAXIS: A Program for Reproducing Proforma Design Calculations |
344 | -- | 355 | Massimo Ancona, Leila De Floriani, Jitender S. Deogun. Structured Spanning Trees |
356 | -- | 364 | Ronen Feldman, Martin Charles Golumbic. Optimization Algorithms for Student Scheduling via Constraint Satisfiability |
365 | -- | 367 | Bruce K. Haddon. Cycle-Sort: A Linear Sorting Method |
368 | -- | 374 | B. John Oommen, David T. H. Ng. On Generating Random Permutations with Arbitrary Distributions |
375 | -- | 380 | H. Miyakoshi. A Literal Code Method For Minimizing Boolean Functions |
381 | -- | 0 | T. H. Merrett. Scoping is not Orthogonal to Completeness |