Journal: Comput. J.

Volume 37, Issue 9

735 -- 744Richard A. Sharman. Speech Recognition in the Office: How the Technology Supports Dictation
745 -- 752Graham A. Stephen, Paul Mather. What is SP?
753 -- 763Sunil Vadera, Farid Meziane. From English to Formal Specifications
764 -- 778Kamyar Jambor-Sadeghi, Mohammad A. Ketabchi, Junjie Chue, M. Ghiassi. A Systematic Approach to Corrective Maintenance
779 -- 794Ying Hao, Jyh-Charn Liu, Junguk L. Kim. An All-Sharing Load-Balancing Scheme on the COMA/CD Network and its Analysis
795 -- 813Martin P. Ward. Reverse Engineering through Formal Transformation: Knuths Polynomial Addition Algorithm

Volume 37, Issue 8

653 -- 668Steve Benford, John Bowers, Lennart E. Fahlén, John A. Mariani, Tom Rodden. Supporting Cooperative Work in Virtual Environments
669 -- 682Danny Chiang Choon Poo, Shwu-Yi Lee. An Object-Oriented Systems Modelling Method based on the Jackson Approach
683 -- 690Helen E. Thomson, Pam J. Mayhew. The Software Process: A Perspective on Improvement
691 -- 697Ken Tindell, Alan Burns. Fixed Priority Scheduling of Hard Real-time Multi-media Disk Traffic
698 -- 710Chung-Ming Huang, Jenq-Muh Hsu. An Incremental Protocol Verification Method
711 -- 714W. Ken Jackson, F. Warren Burton. A Definite and Unfoldable, Partially Deterministic Language
715 -- 719Jiang-Hsing Chu, Gary D. Knott. An Analysis of Spiral Hashing

Volume 37, Issue 7

561 -- 575J. A. Bakker. A Semantic Approach to Enforce Correctness of Data Distribution Schemes
576 -- 587Mostafa A. Bassiouni, Amar Mukherjee, Mark J. Llewellyn. Design and Implementation of Extended Boolean and Comparison Operators for Time-Oriented Query Languages
588 -- 597Brian Knight, Jixin Ma. A Temporal Database Model Supporting Relative and Absolute Time
598 -- 609B. John Oommen, David T. H. Ng. A New Technique for Enhancing Linked-List Data Retrieval: Reorganize Data Using Artificially synthesized Queries
610 -- 620Lanfranco Lopriore. Stack Cache Memory for Block-Structured Programs
621 -- 628Noureddine Belkhatir, Walcélio L. Melo. Supporting Software Development Processes in Adele 2
629 -- 640I. McFarlane, S. G. Hoggar. Optimal Drivers for the Random Iteration Algorithm
641 -- 643Joseph L. Ganley, Lenwood S. Heath. Optimal and Random Partitions of Random Graphs

Volume 37, Issue 6

477 -- 486Vinny Cahill, Roland Balter, David Harper, Neville Harris, Xavier Rousset de Pina, Pedro Sousa. The Comandos Distributed Application Platform
487 -- 498Paul Taylor, Vinny Cahill, Michael Mock. Combining Object-oriented Systems and Open Transaction Processing
499 -- 508Brendan Tangney, Andrew Condon, Vinny Cahill, Neville Harris. Requirements for Parallel Programming in Object-oriented Distributed Systems
509 -- 518Gerrit Kerber, Helmut Meitner, Friedemann Reim. The Comandos Toolset for Distributed Systems Management
519 -- 530Roland Balter, Serge Lacourte, Michel Riveill. The Guide Language
531 -- 541Pedro Sousa, Andre Zuquete, Nuno Neves, José Alves Marques. Orthogonal Persistence in a Heterogeneous Distributed Object-Oriented Environment

Volume 37, Issue 5

357 -- 366Ian Sommerville, Richard Bentley, Tom Rodden, Peter Sawyer. Cooperative Systems Design
367 -- 376P. A. Firby, D. J. Stone. Analysis of the Structure and Resolution of a Graphics Device
377 -- 384Christophe Poix, Robert Laurini. A Geometric Reasoning Tool Based on a Successive Improvement Approach
385 -- 398A. N. Clark. Pattern Recognition of Noisy Sequences of Behavioural Events using Functional Combinators
399 -- 406Per Brinch Hansen. Interference Control in SuperPascal - A Block-Structured Parallel Language
407 -- 421Manuel Díaz, Ernesto Pimentel, José M. Troya. DROL: A Distributed and Real-Time Object-Oriented Logic Environment
422 -- 428Marie Rose Low, Bruce Christianson. Self Authenticating Proxies
429 -- 436Jonathan Giddy, Reihaneh Safavi-Naini. Automated Cryptanalysis of Transposition Ciphers
437 -- 448Greg O Shea. On the Specification, Validation and Verification of Security in Access Control Systems
449 -- 462Nancy G. Kinnersley, William M. Kinnersley. An Efficient Polynomial-Time Algorithm for Three-track Gate Matrix Layout
463 -- 0A. A. K. Majumdar. A Note on the Iterative Algorithm for the Reve s Puzzle

Volume 37, Issue 4

233 -- 242Søren Christensen, Yoram Hirshfeld, Faron Moller. Decidable Subsets of CCS
243 -- 258Jan A. Bergstra, Inge Bethke, Alban Ponse. Process Algebra with Iteration and Nesting
259 -- 268Wan Fokkink, Hans Zantema. Basic Process Algebra with Iteration: Completeness of its Equational Axioms
269 -- 278Sjouke Mauw, Michel A. Reniers. An Algebraic Semantics of Basic Message Sequence Charts
279 -- 288Henri Korver. A Theory for Simulators
289 -- 307Marc Bezem, Jan Friso Groote. A Correctness Proof of a One-Bit Sliding Window Protocol in µCRL
308 -- 332Pasi Fränti, Olli Nevalainen, Timo Kaukoranta. Compression of Digital Images by Block Truncation Coding: A Survey
333 -- 345Wentong Cai, Stephen John Turner. An Approach to the Run-Time Monitoring of Parallel Programs

Volume 37, Issue 3

153 -- 163Mik Lamming, Peter Brown, Kathleen Carter, Margery Eldridge, Mike Flynn, Gifford Louie, Peter Robinson, Abigail Sellen. Drawability of Complete Graphs Using a Minimal Slope Set
164 -- 176Nikos A. Lorentzos, Alexandra Poulovassilis, Carol Small. Implementation of Update Operations for Interval Relations
177 -- 187Doug Goldson. A Symbolic Calculator for Non-Strict Functional Programs
188 -- 198Kisenchand Ranai, Koon-Seng Lim, Robert H. Deng. Simulating a Multimedia FDDI Backbone Network
199 -- 205Yuliang Zheng, Thomas Hardjono, Jennifer Seberry. Reusing Shares in Secret Sharing Schemes
206 -- 218Mounir Hamdi, Richard W. Hall. An Efficient Class of Interconnection Networks for Parallel Computations
219 -- 222Benjamin Arazi. On Primality Testing using Purely Divisionless Operations

Volume 37, Issue 2

79 -- 82Alan Bundy, Hector MacQueen. The New Software Copyright Law
83 -- 87Ian H. Witten, Timothy C. Bell, Alistair Moffat, Craig G. Nevill-Manning, Tony C. Smith, Harold W. Thimbleby. Semantic and Generative Models for Lossy Text Compression
88 -- 95Nenad Marovac. Link Associated Computation in HyperNet
96 -- 113Victoria Stavridou. Formal Methods and VLSI Engineering Practice
114 -- 123Jixin Ma, Brian Knight. A General Temporal Theory
124 -- 128Dharmavani Bhagavathi, C. E. Grosch, Stephan Olariu. A Greedy Hypercube-Labeling Algorithm
129 -- 138Kwok-bun Yue, R. T. Jacob. An Optimal Algorithm for Reducing Edge-Solvable Mutual Exclusion Graphs
139 -- 142Greg A. Wade, Jiang-Hsing Chu. Drawability of Complete Graphs Using a Minimal Slope Set

Volume 37, Issue 10

829 -- 839John W. Patterson, Philip J. Willis. Computer Assisted Animation: 2D or not 2D?
840 -- 846C.-H. Lai. Diakoptics, Domain Decomposition and Parallel Computing
847 -- 857Jixin Ma, Brian Knight, Miltos Pedritis. A Revised Theory of Action and Time Based on Intervals and Points
858 -- 872Daniel K. C. Chan, Philip W. Trinder, Ray Welland. Evaluating Object-Oriented Query Languages
873 -- 887Sridhar Seshadri, Doron Rotem, Arie Segev. Optimal Arrangements of Cartridges in Carousel Type Mass Storage Systems
888 -- 906Graham Berrisford, M. Burrows. Reconciling OO with Turing Machines
907 -- 0Ferruccio Barsi, Maria Cristina Pinotti. Time Optimal Mixed Radix Conversion for Residue Number Applications

Volume 37, Issue 1

1 -- 2Jürg Nievergelt, Michael Freeston. Special Issue Editorial: Other Objects, or: What is unique about Spatial Data?
3 -- 15Dominic A. Varley, Mahes Visvalingam. Road Extraction and Topographic Data Validation Using Area Topology
16 -- 25Oliver Günther, Johannes Lamberts. Object-oriented Techniques for the Management of Geographic and Environmental Data
35 -- 42Peter Schorn. Degeneracy in Geometric Computation and the Perturbation Approach
36 -- 34Michael F. Worboys. A Unified Model for Spatial and Temporal Information
43 -- 57Christopher B. Jones, David B. Kidner, J. Mark Ware. The Implicit Triangulated Irregular Network and Multiscale Spatial Databases
58 -- 66James Bradley. A Complete L-system Specification for Generating an Exact Self-affine Growth-Decay Function with a Random Walk Scaling Property
67 -- 76Daniel Y. Chao, MengChu Zhou, David T. Wang. Extending the Knitting Technique to Petri Net Synthesis of Automated Manufacturing Systems