Journal: Comput. J.

Volume 35, Issue 1

3 -- 15Alan Burns, John A. McDermid, John E. Dobson. On the Meaning of Safety and Security
16 -- 20J.-J. Hwang, B.-M. Shao, P. C. Wang. A New Access Control Method Using Prime Factorisation
21 -- 29Mike Burmester, Yvo Desmedt, Thomas Beth. Efficient Zero-Knowledge Identification Schemes for Smart Cards
30 -- 40Rogério de Lemos, Amer Saeed, Tom Anderson. A Train Set as a Case Study for the Requirements Analysis of Safety-Critical Systems
41 -- 44Brian A. Wichmann. A Note on the Use of Floating Point in Critical Systems
45 -- 51Myoung-Ho Kim, Sakti Pramanik. Optimizing Database Accesses for Parallel Processing of Multikey Range Searches
52 -- 61Ian F. Akyildiz. Performance Analysis of a Multiprocessor System Model with Process Communication
62 -- 70Richard G. Börn, James R. Kenevan. Theoretical Performance-Based Cost-Effectiveness of Multicomputers
71 -- 80H. Shen. Self-Adjusting Mapping: A Heuristic Mapping Algorithm for Mapping Parallel Programs on to Transputer Networks
81 -- 87D. Kaur. Hierarchical Hypernet for Pipelining
88 -- 90M. Vassallo, Anthony Ralston. Algorithms for De Bruijn Sequences - A Case Study in the Empirical Analysis of Algorithms
91 -- 92Appie van de Liefvoort. An Iterative Algorithm for the Reve s Puzzle (Short Note)