Journal: Comput. J.

Volume 50, Issue 6

629 -- 0Fairouz Kamareddine. Capsule reviews
630 -- 631Erol Gelenbe, Andrew Tilbrook, Richard Vinter. Editorial: Introduction to the Special Issue
632 -- 645Robert A. Ghanea-Hercock, Erol Gelenbe, Nicholas R. Jennings, Oliver Smith, David N. Allsopp, Alex Healing, Hakan Duman, Simon Sparks, Nishan C. Karunatillake, Perukrishnen Vytelingum. Hyperion - Next-Generation Battlespace Information Services
646 -- 659Asher Mahmood, Philip M. Tudor, William Oxford, Robert Hansford, James D. B. Nelson, Nicholas G. Kingsbury, Antonis Katartzis, Maria Petrou, Nikolaos Mitianoudis, Tania Stathaki, Alin Achim, David R. Bull, Cedric Nishan Canagarajah, Stavri G. Nikolov, Artur Loza, Nedeljko Cvejic. Applied Multi-Dimensional Fusion
660 -- 673Nikolaos Mitianoudis, Tania Stathaki. Joint Fusion and Blind Restoration For Multiple Image Scenarios With Missing Data
674 -- 693William Ng, Jack Li, Simon J. Godsill, Sze Kim Pang. Multitarget Initiation, Tracking and Termination Using Bayesian Monte Carlo Methods
694 -- 702Samuel M. Waldron, John Patrick, Phillip L. Morgan, Sophia L. King. Influencing Cognitive Strategy by Manipulating Information Access
703 -- 716Paul R. Smart, Alistair Russell, Nigel R. Shadbolt, m. c. schraefel, Les Carr. AKTiveSA: A Technical Demonstrator System For Enhanced Situation Awareness
717 -- 727Gülay Öke, Georgios Loukas. A Denial of Service Detector based on Maximum Likelihood Detection and the Random Neural Network
728 -- 738Imtiaz Ahmad, A. Shoba Das. Analysis and Detection Of Errors In Implementation Of SHA-512 Algorithms On FPGAs
739 -- 757Chung-Ming Huang, Jian Wei Li. Efficient and Provably Secure IP Multimedia Subsystem Authentication for UMTS
758 -- 0Jan Peters. Computational Intelligence: Principles, Techniques and Applications