3 | -- | 15 | Alan Burns, John A. McDermid, John E. Dobson. On the Meaning of Safety and Security |
16 | -- | 20 | J.-J. Hwang, B.-M. Shao, P. C. Wang. A New Access Control Method Using Prime Factorisation |
21 | -- | 29 | Mike Burmester, Yvo Desmedt, Thomas Beth. Efficient Zero-Knowledge Identification Schemes for Smart Cards |
30 | -- | 40 | Rogério de Lemos, Amer Saeed, Tom Anderson. A Train Set as a Case Study for the Requirements Analysis of Safety-Critical Systems |
41 | -- | 44 | Brian A. Wichmann. A Note on the Use of Floating Point in Critical Systems |
45 | -- | 51 | Myoung-Ho Kim, Sakti Pramanik. Optimizing Database Accesses for Parallel Processing of Multikey Range Searches |
52 | -- | 61 | Ian F. Akyildiz. Performance Analysis of a Multiprocessor System Model with Process Communication |
62 | -- | 70 | Richard G. Börn, James R. Kenevan. Theoretical Performance-Based Cost-Effectiveness of Multicomputers |
71 | -- | 80 | H. Shen. Self-Adjusting Mapping: A Heuristic Mapping Algorithm for Mapping Parallel Programs on to Transputer Networks |
81 | -- | 87 | D. Kaur. Hierarchical Hypernet for Pipelining |
88 | -- | 90 | M. Vassallo, Anthony Ralston. Algorithms for De Bruijn Sequences - A Case Study in the Empirical Analysis of Algorithms |
91 | -- | 92 | Appie van de Liefvoort. An Iterative Algorithm for the Reve s Puzzle (Short Note) |