Journal: Comput. J.

Volume 39, Issue 9

731 -- 740Peter M. Fenwick. The Burrows-Wheeler Transform for Block Sorting Text Compression: Principles and Improvements
741 -- 750Kristina L. Verco, Michael J. Wise. Plagiarism à la Mode: A Comparison of Automated Systems for Detecting Suspected Plagiarism
751 -- 756Mahes Visvalingam, Dominic A. Varley, Chris Wright. A Cognitive Approach to Road Recognition with Novel Feature Indicators
757 -- 766Ing-Ray Chen, Chi-Ming Chen. Threshold-Based Admission Control Policies for Multimedia Servers
767 -- 779Ing-Ray Chen, Ding-Chau Wang. Analysis of Replicated Data with Repair Dependency
780 -- 792Jordi Tubella, Antonio González, E. Elias. The Multipath Architecture for Prolog Programs
793 -- 799Patrick van Bommel, Paul J. M. Frederiks, Theo P. van der Weide. Object-Oriented Modelling Based on Logbooks
800 -- 807Jixin Ma, Brian Knight. A Reified Temporal Logic
808 -- 811Graham M. Seed, Doug E. R. Clark, Jonathan R. Corney, R. Tuttle, Gordon Little. Object-Oriented Graph-Based Geometric Feature Recognition

Volume 39, Issue 8

647 -- 662Antonio Puliafito, Salvatore Riccobene, Marco Scarpa. Evaluation of Performability Parameters in Client-Server Environments
663 -- 674Goran L. Djordjevic, Milorad B. Tosic. A Compile-Time Scheduling Heuristic for Multiprocessor Architectures
675 -- 687Joan M. Morrissey, W. T. Bealor. Minimizing Data Transfers in Distributed Query Processing: A Comparative Study and Evaluation
688 -- 691Xindong Wu. A Bayesian Discretizer for Real-Valued Attributes
692 -- 700Behrooz Parhami. Parallel Threshold Voting
701 -- 712Emil Sekerinski, Kaisa Sere. A Theory of Prioritizing Composition
713 -- 722Shietung Peng, Stanislav Sedukhin. Array Processors Design for Division-free Linear System Solving

Volume 39, Issue 7

561 -- 565John M. Taylor. Forward with Foresight
566 -- 576Cristina Cifuentes, Anne Fitzgerald. Australian Recommendations on Computer Software Protection
577 -- 597Jukka Paakki, Airi Salminen, Jussi Koskinen. Automated Hypertext Support for Software Maintenance
598 -- 618M. P. Ward. Program Analysis by Formal Transformation
619 -- 625Tsong Yueh Chen, Yuen-Tak Yu. Constraints for Safe Partition Testing Strategies
626 -- 629Qian-Ping Gu, Shietung Peng. Optimal Algorithms for Node-to-Node Fault Tolerant Routing in Hypercubes
630 -- 642Jon Agar. The Provision of Digital Computers to British Universities up to the Flowers Report (1966)

Volume 39, Issue 6

455 -- 470John A. Mariani, Tom Rodden. Cooperative Information Sharing: Developing a Shared Object Service
471 -- 482David B. Skillicorn. Using Distributed Hypermedia for Collaborative Learning in Universities
483 -- 495Jonathan M. Nash, Peter M. Dew, Martin E. Dyer. A Scalable Shared Queue on a Distributed Memory Machine
496 -- 510Oliver E. Theel, Brett D. Fleisch. The Boundary-Restricted Coherence Protocol for Scalable and Highly Available Distributed Shared Memory Systems
511 -- 524Chung-Ming Huang, Ye-In Chang, Duen-Tay Huang. Reverse Protocol Verification: Concept, Algorithm and Application
525 -- 540Yen-Min Huang, Chinya V. Ravishankar. URPC: A Toolkit for Prototyping Remote Procedure Calls
541 -- 546Panayiotis Bozanis, Nectarios Kitsios, Christos Makris, Athanasios K. Tsakalidis. Red-Blue Intersection Reporting for Objects of Non-Constant Size
547 -- 554Bohdan S. Majewski, Nicholas C. Wormald, George Havas, Zbigniew J. Czech. A Family of Perfect Hashing Methods

Volume 39, Issue 5

361 -- 373Andy J. Wellings, Alan Burns. Programming Replicated Systems in Ada 95
374 -- 385Yasemin Turkan, Özgür Ulusoy. An Efficient Memory Management Algorithm for Client-Server Database Management Systems
386 -- 407Maarten M. Fokkinga. Expressions That Talk About Themselves
386 -- 407J. P. Geschiere, W. H. F. J. Körver. A Practical Development Process for Parallel Large-Scale Applications and its Underlying Formal Framework
413 -- 416Tadao Takaoka. A Left-to-Right Preprocessing Computation for the Boyer-Moore String Matching Algorithm
417 -- 426Wen-Jing Hsu, Moon-Jung Chung, Zejun Hu. Gaussian Networks for Scalable Distributed Systems
427 -- 439Lucas Chi Kwong Hui, Charles U. Martel. Randomized Competitive Algorithms for Successful and Unsuccessful Search
439 -- 448Nectarios Koziris, George K. Papakonstantinou, Panayotis Tsanakas. Optimal Time and Efficient Space Free Scheduling For Nested Loops

Volume 39, Issue 4

255 -- 274Arthur H. M. ter Hofstede, Henderik Alex Proper, Theo P. van der Weide. Query Formulation as an Information Retrieval Problem
275 -- 290Anthony N. Godwin. Building a Semantic Description for a Data Modelling Language
291 -- 302Jim Grundy. Transformational Hierarchical Reasoning
303 -- 324Howard Barringer, Graham Gough, Brian Monahan, Alan Williams. A Process Algebra Foundation for Reasoning about Core ELLA
325 -- 330Robert M. Hierons. Extending Test Sequence Overlap by Invertibility
331 -- 345Hu-Jun Wang, Jian Li. Bandwidth Analysis for A Class of Bus-Based Systems
331 -- 345Haifeng Qian, Jie Wu. Enhanced Fibonacci Cubes
353 -- 356Tamás D. Gedeon. The Cyclic Towers of Hanoi: An Iterative Solution Produced by Transformation

Volume 39, Issue 3

173 -- 183Carlo Meghini. Logical Image Modelling and Retrieval
184 -- 202Si Pan, R. Geoff Dromey. Re-engineering Loops
203 -- 214Si Pan, R. Geoff Dromey. A Formal Basis for Removing Goto Statements
215 -- 231Arthur H. M. ter Hofstede, E. Lippe, Paul J. M. Frederiks. Conceptual Data Modelling from a Categorical Perspective
232 -- 240Mohamed Ould-Khaoua, Lewis M. Mackenzie, Reza Sotudeh. Comparative Evaluation of Hypermesh and Multi-stage Interconnection Networks
241 -- 250Behrooz Parhami. Extreme-Value Search and General Selection Algorithms for Fully Parallel Associative Memories

Volume 39, Issue 2

97 -- 113Linda C. van der Gaag. Bayesian Belief Networks: Odds and Ends
114 -- 123Mark Levene. Maintaining Consistency of Imprecise Relations
124 -- 132Hossein Saiedian, Thomas Spencer. An Efficient Algorithm to Compute the Candidate Keys of a Relational Database Schema
133 -- 139Evangelos Kranakis, Danny Krizanc, S. S. Ravi. On Multi-Label Linear Interval Routing Schemes
140 -- 144Yi Pan, Mounir Hamdi, Gurdip Singh. Selection on k-Dimensional Meshes with Multiple Broadcasting
145 -- 168Stephen Fitzpatrick, Maurice Clint, Terence J. Harmer, Peter Kilpatrick. The Tailoring of Abstract Functional Specifications of Numerical Algorithms for Sparse Data Structures through Automated Program Derivation and Transformation

Volume 39, Issue 10

819 -- 836Rob Ingram, Steve Benford. The Application of Legibility Techniques to Enhance Information Visualizations
844 -- 853Ning Zhang, Qi Shi. Achieving Non-Repudiation of Receipt
854 -- 867A. Bruce McDonald, Taieb Znati. ARP versus ES-IS: Performance Evaluation of Neighbour-Greeting Protocols
868 -- 875Janos J. Sarbo. Building Sub-Knowledge Bases Using Concept Lattices
876 -- 889Manuel Díaz, Bartolomé Rubio, José M. Troya. Distributed Programming with a Logic Channel Based Coordination Model

Volume 39, Issue 1

1 -- 13David Jeff Jackson, Wagdy Mahmoud. Parallel Pipelined Fractal Image Compression using Quadtree Recomposition
14 -- 19Qian-Ping Gu, Shietung Peng. An Efficient Algorithm for Node-to-Node Routing in Hypercubes with Faulty Clusters
20 -- 35Vincenzo Loia, Michel Quaggetto. The OPLA System: Designing Complex Systems in an Object-Oriented Logic Programming Framework
36 -- 33Chandra N. Sekharan, John G. Del Greco, Sailesh Rathi. Space-Time Trade-offs in the Relative Unranking of Binary Trees
45 -- 51T. S. Naryanan. A Class of Semi-X Tree-Based Dictionary Machines
52 -- 92Egon Börger, Igor Durdanovic. Correctness of Compiling Occam to Transputer Code