107 | -- | 116 | Jürg Nievergelt, Peter Widmayer. Guard Files: Stabbing and Intersection Queries on Fat Spatial Objects |
117 | -- | 126 | Michael F. Challis. Two New Techniques for Computing Extremal h-bases A::k:: |
128 | -- | 136 | Brian Knight. Information Loss in Temporal Knowledge Representations |
137 | -- | 142 | Stephen S. Yau, Jacob V. Gore. Paradigm Lost: Discovering the Intersection of Assertion-Guided Program Construction and Constraint-Driven Reevaluation |
143 | -- | 152 | Nava Pliskin, Celia T. Romm, A. S. Lee, Y. Weber. Presumed Versus Actual Organizational Culture: Managerial Implications for Implementation of Information Systems |
153 | -- | 167 | M. Elizabeth C. Hull, Peter G. O Donoghue. Family Relationships between Requirements and Design Specification Methods |
168 | -- | 176 | Christopher Burdorf, Jed Marti. Load Balancing Strategies for Time Warp on Multi-User Workstations |
177 | -- | 185 | Vincenzo Catania, Antonio Puliafito, Lorenzo Vita. A Model for Performance Evaluation of Gracefully Degrading Systems |
186 | -- | 194 | Richard J. Millar, M. Elizabeth C. Hull, J. H. Frazer. The Millar Polyhedron and its use in the Construction of Octrees |
195 | -- | 199 | Alexandra Poulovassilis. A Pattern-Matching Algorithm for Functional Databases |
200 | -- | 206 | Colin C. Charlton, Paul E. Dunne, K. Halewood, Paul H. Leng. An Algorithm to Generate Random Large Combinational Circuits |