Journal: Comput. J.

Volume 36, Issue 2

107 -- 116Jürg Nievergelt, Peter Widmayer. Guard Files: Stabbing and Intersection Queries on Fat Spatial Objects
117 -- 126Michael F. Challis. Two New Techniques for Computing Extremal h-bases A::k::
128 -- 136Brian Knight. Information Loss in Temporal Knowledge Representations
137 -- 142Stephen S. Yau, Jacob V. Gore. Paradigm Lost: Discovering the Intersection of Assertion-Guided Program Construction and Constraint-Driven Reevaluation
143 -- 152Nava Pliskin, Celia T. Romm, A. S. Lee, Y. Weber. Presumed Versus Actual Organizational Culture: Managerial Implications for Implementation of Information Systems
153 -- 167M. Elizabeth C. Hull, Peter G. O Donoghue. Family Relationships between Requirements and Design Specification Methods
168 -- 176Christopher Burdorf, Jed Marti. Load Balancing Strategies for Time Warp on Multi-User Workstations
177 -- 185Vincenzo Catania, Antonio Puliafito, Lorenzo Vita. A Model for Performance Evaluation of Gracefully Degrading Systems
186 -- 194Richard J. Millar, M. Elizabeth C. Hull, J. H. Frazer. The Millar Polyhedron and its use in the Construction of Octrees
195 -- 199Alexandra Poulovassilis. A Pattern-Matching Algorithm for Functional Databases
200 -- 206Colin C. Charlton, Paul E. Dunne, K. Halewood, Paul H. Leng. An Algorithm to Generate Random Large Combinational Circuits