Journal: Comput. J.

Volume 51, Issue 6

609 -- 611Fairouz Kamareddine. Capsule Reviews
612 -- 614Fionn Murtagh. Editorial
615 -- 629Alexander Thomasian, Jun Xu. Reliability and Performance of Mirrored Disk Organizations
630 -- 649M. Hassaballah, Saleh Omran, Youssef B. Mahdy. A Review of SIMD Multimedia Extensions and their Usage in Scientific and Engineering Applications
650 -- 661Paul A. Cairns, Harold W. Thimbleby. Affordance and Symmetry in User Interfaces
662 -- 676Qiang Zhu, Brahim Medjahed, Anshuman Sharma, Henry Huang. The Collective Index: A Technique for Efficient Processing of Progressive Queries
677 -- 687Yu-Chen Kuo, Po-Yao Wu. The Availability of Complemental ::::k::::-Coteries
688 -- 699Emmanuel M. Tadjouddine. Vertex-ordering Algorithms for Automatic Differentiation of Computer Codes
700 -- 709Jacqueline E. Rice. An Introduction to Reversible Latches
710 -- 722Ching-Nung Yang, Chung-Chun Wang, Tse-Shih Chen. Visual Cryptography Schemes with Reversing
723 -- 730Erol Gelenbe, Stelios Timotheou. Synchronized Interactions in Spiked Neuronal Networks
731 -- 734Peter G. Harrison, Taskin Koçak, Erol Gelenbe. Discussant Contributions for the ::::Computer Journal Lecture:::: by Erol Gelenbe
735 -- 740Steve Furber. The Future of Computer Technology and its Implications for the Computer Industry
741 -- 742Peter Y. K. Cheung, Alexandre Yakovlev. Comments on the BCS Lecture The Future of Computer Technology and its Implications for the Computer Industry by Professor Steve Furber
743 -- 0Adil Baykasoglu. Evolutionary Computation for Modeling and Optimization
743 -- 744Elizabeth Harrin. Universal Usability: Designing Computer Interfaces for Diverse Users
744 -- 0Kim-Kwang Raymond Choo. Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition
745 -- 0Juan A. Carrasco. Corrigendum: Transient Analysis of Rewarded Continuous Time Markov Models by Regenerative Randomization with Laplace Transform Inversion