Journal: Comput. J.

Volume 31, Issue 6

481 -- 489Rik Maes, J. E. M. van Dijk. On the Role of Ambiguity and Incompleteness in the Design of Decision Tables and Rule-Based Systems
490 -- 495Pankaj Goyal, T. S. Narayanan. Dictionary Machine with Improved Performance
496 -- 502R. Cole, Clare Foxcroft. An Experiment in Clock Synchronisation
503 -- 509Greg O Shea. Controlling the Dependency of User Access Control Mechanisms on Correctness of User Identification
517 -- 524Martin C. Henson. Higher-Order Transformations and Type Simulations
525 -- 530John Kontos, John C. Cavouras. Knowledge Acquisition from Technical Texts Using Attribute Grammars
531 -- 539Paul A. Bailes. An Advanced Problem-Oriented Introduction to Imperative Programming with Modula-2
540 -- 544Alan Dearle, Alfred L. Brown. Safe Browsing in a Strongly Typed Persistent Environment
545 -- 549Zbigniew J. Czech. Efficient Implementation of Detection of Undefined Variables
550 -- 552Giorgio Guariso, Hannes Werthner. A Software Base For Environmental Studies
553 -- 556S. Dvorák, Branislav Durian. Merging by Decomposition Revisited
557 -- 560M. C. Er. A Smooth Reshuffling Algorithm for Solving the Bulterman s Problem
561 -- 563Francis Suraweera, J. M. Al-Anzy. Analysis of a Modified Address Calculation Sorting Algorithm
564 -- 565Jean Marcel Pallo. Some Properties of the Rotation Lattice of Binary Trees
565 -- 566Chin-Chen Chang, C. Y. Chen. A Recursive Performance Formula of the Disc Modulo Allocation Method for Binary Cartesian Product Files
567 -- 569Graham M. Megson, David J. Evans. Improved Matrix Product Computation Using Double-Pipeline Systolic Arrays
570 -- 572M. H. Rennhackkamp, Sebastiaan H. von Solms. On Using an Abstract Model of Distributed Database Concurrency Control Methods

Volume 31, Issue 5

386 -- 390Niels Bjørn-Andersen. Are Human Factors Human?
391 -- 397P. N. Le Quesne. Individual and Organisational Factors and the Design of IPSEs
398 -- 408Rudy Hirschheim, Michael Newman. Information Systems and User Resistance: Theory and Practice
409 -- 419A. P. Jagodzinski, D. D. Clarke. A Multidimensional Approach to the Measurement of Human-Computer Performance
420 -- 425Susan Harker. The Use of Prototyping and Simulation in the Development of Large-Scale Applications
426 -- 430Ken D. Eason, Susan Harker. The Supplier s Role in the Design of Products for Organisations
431 -- 436D. A. Tyldesley. Employing Usability Engineering in the Development of Office Products
437 -- 444Derrick Morris, Colin J. Theaker, R. Phillips, W. Love. Human-Computer Interface Recording
445 -- 456P. Barnard, M. Wilson, A. Maclean. Approximate Modelling of Cognitive Activity with and Expert System: A Theory-Based Strategy for Developing an Interactive Design Tool
457 -- 464Andrew Dillon, Cliff McKnight, John Richardson. Reading From Paper Versus Reading From Screen
465 -- 473David Benyon, Dianne Murray. Experience with Adaptive Interfaces
474 -- 476Jan K. Pachl. Two Livelock-Free Protocols for Slotted Rings

Volume 31, Issue 4

289 -- 295Jean-Michel Hélary, Noël Plouzeau, Michel Raynal. A Distributed Algorithm for Mutual Exclusion in an Arbitrary Network
296 -- 303G. P. Parr. Enhanced Address Resolution in a Multi-LAN Ethernet Communications System
304 -- 312Mohammed Zaki, M. M. Elboraey. Analysis of Reliability Models for Interconnecting MIMD Systems
325 -- 329Zhixi Fang, Jitender S. Deogun. Closure Properties of Certain Classes of Languages Under Generalized Morphic Replication
330 -- 335Paolo Sipala. Efficient Implementation of Binary Trees in LISP Systems
336 -- 343Levent V. Orman. Functional Database Constraints
344 -- 352O. C. Akinyokun. The Experimental Study of CODASYL Database Administration at the Secondary Storage Level
353 -- 357C. Anedda, Leonardo Felician. P-Compressed Quadtrees for Image Storing
358 -- 363R. Williams. The Goblin Quadtree
364 -- 375Caro Lucas, G. Mitra. Computer-Assisted Mathematical Programming (Modelling) System: CAMPS
376 -- 379J. Mingers. Comparing Conceptual Models and Data Flow Diagrams
379 -- 380David E. Avison, Guy Fitzgerald, A. T. Wood-Harper. Information Systems Development: A Tool Kit is not Enough

Volume 31, Issue 3

193 -- 200Derrick Morris, Colin J. Theaker, P. B. Whitehead. Structured Abstract Schematics
201 -- 208Fabrizio Lombardi. Analysis of Comparison-Based Diagnosable Systems Using Temporal Criteria
209 -- 219M. Gopalakrishnan, Lalit M. Patnaik. Medium Access Control Schemes for Local Area Networks with Multiple Priority Function
220 -- 228Ralph E. Griswold. Programming with Generators
229 -- 242Peter G. Harrison, Hessam Khoshnevisan. Algebraic Transformation Techniques for Functional Languages
243 -- 247F. Warren Burton. Nondeterminism with Referential Transparency in Functional Programming Languages
248 -- 252Ronald E. Prather. Comparison and Extension of Theories of Zipf and Halstead
253 -- 257David A. Bell, F. J. McErlean, P. M. Stewart, W. Arbuckle. Clustering Related Tuples in Databases
258 -- 268Kathryn S. Dawson, Lorraine M. Purgailis Parker. From Entity-Relationship Diagrams to Fourth Normal Form: A Pictorial Aid to Analysis
269 -- 275Theo P. van der Weide. Iterative Tree Traversal Using Refinements and Pointer Rotation
276 -- 278D. Richards. On the Worst-Possible Analysis of Weighted Comparison-Based Algorithms
279 -- 282S. Dvorák, Branislav Durian. Unstable Linear Time O(1) Space Merging
283 -- 284M. C. Er. A Fast Algorithm for Generating Set Partitions
285 -- 286Kazimierz Subieta, K. Anacki, Marek Missala. Overlay Clusters for C Programs

Volume 31, Issue 2

99 -- 109Malcolm P. Atkinson, Peter Buneman, Ronald Morrison. Binding and Type Checking in Database Programming Languages
110 -- 115David S. Moffat, Peter M. D. Gray. Perlog: A Prolog With Persistence and Modules
116 -- 124Liping Zhao, S. A. Roberts. An Object-Oriented Data Model for Database Modelling, Implementation and Access
125 -- 132Carol Small. The Implementation of the Exegesis System
133 -- 140M. Howard Williams, K. A. Nicholson. An Approach to Handling Incomplete Information in Databases
141 -- 146J. Bradley. Polygon Join Dependencies, Closed Co-Relationship Chains and the Connection Trap in Relational Databases
147 -- 154Julian R. Ullmann. Fast Implementation of Relational Operations Via Inverse Projections
155 -- 164Mehdi Owrang, Les L. Miller. Query Translation Based on Hypergraph Models
165 -- 174Farokh B. Bastani, S. Sitharama Iyengar, I-Ling Yen. Concurrent Maintenance of Data Structures in a Distributed Environment
175 -- 181S. Misbah Deen, Malcolm C. Taylor, P. A. Ingram, K. W. Rayner. A Distributed Directory Database System for Telecommunications
182 -- 189Kathleen Spurr. A Data Dictionary Approach to Teaching Information Systems Analysis

Volume 31, Issue 1

1 -- 8Hugo T. Jankowitz. Detecting Plagiarism in Student Pascal Programs
9 -- 11Lloyd Allison. Some Applications of Continuations
13 -- 16M. Razaz, J. L. Schonfelder. Test Procedures for Measurement of Floating-Point Characteristics of Computing Environments
17 -- 24Martin D. Davis, Elaine J. Weyuker. Metric Space- Based Test-Data Adequacy Criteria
25 -- 33Roger A. Clarke. Judicial Understanding of Information Technology: The Case of the Wombat ROMs
34 -- 40Csaba J. Egyhazy, Konstantinos P. Triantis. A Query Processing Algorithm for Distributed Relational Database Systems
41 -- 50Werner Kießling. Access Path Selection in Databases with Intelligent Disc Subsystems
51 -- 55Lawrence J. Henschen, Bob P. Weems. A Top-Down Inference Procedure for Template Dependencies
56 -- 60Wm. Randolph Franklin, Varol Akman. Adaptive Grid for Polyhedral Visibility in Object Space: An Implementation
61 -- 64M. C. Er. A Simple Algorithm for Generating Non-Regular Trees in Lexicographic Order
65 -- 70Ivan Stojmenovic, Masahiro Miyakawa. Applications of a Subset-Generating Algorithm to Base Enumeration, Knapsack and Minimal Covering Problems
71 -- 0Mirka Miller, Ivan Fris. Minimum Diameter of Diregular Digraphs of Degree 2
76 -- 82Selim M. Selim. Split Vertices in Vertex Colouring and Their Application in Developing a Solution to the Faculty Timetable Problem
83 -- 91Graham M. Megson, David J. Evans. The Unification of Systolic Differencing Algorithms