Journal: Comput. J.

Volume 48, Issue 1

4 -- 16Vladimir B. Balakirsky. Hashing of Databases with the Use of Metric Properties of the Hamming Space
17 -- 26Andrew Rae, Colin J. Fidge. Information Flow Analysis for Fail-Secure Devices
27 -- 29Hung-Yu Chien, Ren-Chiun Wang, Chou Chen Yang. Note on Robust and Simple Authentication Protocol
30 -- 41Wei-Yi Liu, Ning Song Hong Yao. Temporal Functional Dependencies and Temporal Nodes Bayesian Networks
42 -- 48Andrew D. McGettrick, Roger D. Boyle, Roland N. Ibbett, John Lloyd, Gillian Lovegrove, Keith Mander. Grand Challenges in Computing: Education - A Summary
49 -- 52Tony Hoare, Robin Milner. Grand Challenges for Computing Research
53 -- 71Chung-Ming Huang, Tz-Heng Hsu. A Resource Exchange Architecture for Peer-to-Peer File Sharing Applications
72 -- 83Jean-Pierre Ebert, Daniel Hollos, Holger Karl, Marc Löbbers. Does Multi-Hop Communication Reduce Electromagnetic Exposure?
84 -- 100Kam-yiu Lam, BiYu Liang, Chuanlin Zhang. On Using Handoff Statistics and Velocity for Location Management in Cellular Wireless Networks
101 -- 114Guang-Ho Cha. The Segment-Page Indexing Method for Large Multidimensional Queries
115 -- 125Brian J. d Auriol, Rajesh Molakaseema. A Parameterized Linear Array with a Reconfigurable Pipelined Bus System: LARPBS(p)