4 | -- | 16 | Vladimir B. Balakirsky. Hashing of Databases with the Use of Metric Properties of the Hamming Space |
17 | -- | 26 | Andrew Rae, Colin J. Fidge. Information Flow Analysis for Fail-Secure Devices |
27 | -- | 29 | Hung-Yu Chien, Ren-Chiun Wang, Chou Chen Yang. Note on Robust and Simple Authentication Protocol |
30 | -- | 41 | Wei-Yi Liu, Ning Song Hong Yao. Temporal Functional Dependencies and Temporal Nodes Bayesian Networks |
42 | -- | 48 | Andrew D. McGettrick, Roger D. Boyle, Roland N. Ibbett, John Lloyd, Gillian Lovegrove, Keith Mander. Grand Challenges in Computing: Education - A Summary |
49 | -- | 52 | Tony Hoare, Robin Milner. Grand Challenges for Computing Research |
53 | -- | 71 | Chung-Ming Huang, Tz-Heng Hsu. A Resource Exchange Architecture for Peer-to-Peer File Sharing Applications |
72 | -- | 83 | Jean-Pierre Ebert, Daniel Hollos, Holger Karl, Marc Löbbers. Does Multi-Hop Communication Reduce Electromagnetic Exposure? |
84 | -- | 100 | Kam-yiu Lam, BiYu Liang, Chuanlin Zhang. On Using Handoff Statistics and Velocity for Location Management in Cellular Wireless Networks |
101 | -- | 114 | Guang-Ho Cha. The Segment-Page Indexing Method for Large Multidimensional Queries |
115 | -- | 125 | Brian J. d Auriol, Rajesh Molakaseema. A Parameterized Linear Array with a Reconfigurable Pipelined Bus System: LARPBS(p) |