Journal: Comput. J.

Volume 44, Issue 6

471 -- 472Ing-Ray Chen. Special Issue Editorial: High Assurance Systems
473 -- 485Tadashi Dohi, Katerina Goseva-Popstojanova, Kishor S. Trivedi. Estimating Software Rejuvenation Schedules in High-Assurance Systems
486 -- 503Steve Goddard, Kevin Jeffay. Managing Latency and Buffer Requirements in Processing Graph Chains
504 -- 530Jeffrey J. P. Tsai, Eric Y. T. Juan. Modeling and Verification of High-Assurance Properties of Safety-Critical Systems
531 -- 543Iain Bate, Philippa Conmy, Tim Kelly, John A. McDermid. Use of Modern Processors in Safety-Critical Applications
544 -- 556Fabrizio Grandoni 0002, Silvano Chiaradonna, Felicita Di Giandomenico, Andrea Bondavalli. Evaluation of Fault-Tolerant Multiprocessor Systems for High Assurance Applications
557 -- 568Zhiwei Xu, Taghi M. Khoshgoftaar. Software Quality Prediction for High-Assurance Network Telecommunications Systems
569 -- 587Alessandro F. Garcia, Delano M. Beder, Cecília M. F. Rubira. A Unified Meta-Level Software Architecture for Sequential and Concurrent Exception Handling

Volume 44, Issue 5

329 -- 339Xiaohua Jia, Deying Li, Xiao-Dong Hu, Ding-Zhu Du. Optimal Placement of Web Proxies for Replicated Web Servers in the Internet
340 -- 353Aline Baggio, Gerco Ballintijn, Maarten van Steen, Andrew S. Tanenbaum. Efficient Tracking of Mobile Objects in Globe
354 -- 367San-Yuan Wang, Yu-Chee Tseng, Ching-Sung Shiu, Jang-Ping Sheu. Balancing Traffic Load for Multi-Node Multicast in a Wormhole 2-D Torus/Mesh
368 -- 373Jehad Al-Sadi, Khaled Day, Mohamed Ould-Khaoua. Probability-based Fault-tolerant Routing in Hypercubes
374 -- 383Guihai Chen, Francis C. M. Lau. Layout of the Cube-connected Cycles without Long Wires
384 -- 397Jitian Xiao, Yanchun Zhang, Xiaohua Jia. Clustering Non-uniform-sized Spatial Objects to Reduce I/O Cost for Spatial-join Processing
398 -- 409Ngoc Thanh Nguyen. Consensus-based Timestamps in Distributed Temporal Databases
410 -- 424David E. Losada, Alvaro Barreiro. A Logical Model for Information Retrieval based on Propositional Logic and Belief Revision
425 -- 434Robert W. P. Luk. Compact Morphic Directed Acyclic Word Graphs
435 -- 447Ousmane Koné. A Local Approach to the Testing of Real-time Systems
448 -- 462Carlos Canal, Lidia Fuentes, Ernesto Pimentel, José M. Troya, Antonio Vallecillo. Extending CORBA Interfaces with Protocols
463 -- 470Gwoboa Horng. An Efficient and Secure Protocol for Multi-party Key Establishment

Volume 44, Issue 4

221 -- 229Alexis C. Kaporis, Lefteris M. Kirousis, Evangelos Kranakis, Danny Krizanc, Yannis C. Stamatiou, Elias C. Stavropoulos. Locating Information with Uncertainty in Fully Interconnected Networks with Applications to World Wide Web Information Retrieval
230 -- 245Howard Bowman, Jeremy Bryans, John Derrick. Analysis of a Multimedia Stream using Stochastic Process Algebra
246 -- 279H. M. W. (Eric) Verbeek, Twan Basten, Wil M. P. van der Aalst. Diagnosing Workflow Processes using Woflan
280 -- 291Yuke Wang, Carl McCrosky, Xiaoyu Song. Single-faced Boolean Functions and their Minimization
292 -- 302Limin Xiang, Kazuo Ushijima. On O(1) Time Algorithms for Combinatorial Generation
303 -- 320Margarita Amor, Francisco Argüello, Juan López, Oscar G. Plata, Emilio L. Zapata. A Data-Parallel Formulation for Divide and Conquer Algorithms
321 -- 323Erkki Mäkinen. Comment on A Framework for Modelling Trojans and Computer Virus Infection
324 -- 325Harold W. Thimbleby, Stuart Anderson, Paul A. Cairns. Reply to Comment on "A Framework for Modelling Trojans and Computer Virus Infection" by E. Mäkinen
326 -- 327Fred Cohen. Reply to Comment on "A Framework for Modelling Trojans and Computer Virus Infection" by E. Mäkinen

Volume 44, Issue 3

151 -- 0Willis H. Ware. Introduction to Davies paper
152 -- 162Donald W. Davies. An Historical Study of the Beginnings of Packet Switching
163 -- 173Kostas Politopoulos, George F. Georgakopoulos, Panayotis Tsanakas. Precedence Constrained Scheduling: A Case in P
174 -- 185Alan Stewart, Maurice Clint. BSP-style Computation: a Semantic Investigation
186 -- 200Da-Qian Zhang, Kang Zhang, Jiannong Cao. A Context-sensitive Graph Grammar Formalism for the Specification of Visual Languages
201 -- 213SangKeun Lee, Chong-Sun Hwang. Unified Protocols of Concurrency Control and Recovery in Distributed Object-based Databases
214 -- 220C.-H. Lai, Cos S. Ierotheou, C. J. Palansuriya, K. A. Pericleous. Performance Evaluation of a Distributed Algorithm for an Inverse Heat Conduction Problem

Volume 44, Issue 2

67 -- 74Nicholas M. Donofrio. Turing Memorial Lecture
75 -- 91Evaggelia Pitoura, Ioannis Fudos. Distributed Location Databases for Tracking Highly Mobile Objects
92 -- 100Roberto Baldoni, Francesco Quaglia, Michel Raynal. Consistent Checkpointing for Transaction Systems
101 -- 108Francis C. M. Lau, Philip K. W. Cheng, Savio S. H. Tse. An Algorithm for the 2-Median Problem on Two-Dimensional Meshes
109 -- 123Nicoletta De Francesco, Alessandro Fantechi, Stefania Gnesi, Paola Inverardi. Finite Approximations for Model Checking Non-finite-state Processes
124 -- 136Daniel Y. Chao, Jose A. Nicdao. Liveness for Synchronized Choice Petri Nets
137 -- 149Jason Crampton, George Loizou, Greg O Shea. A Logic of Access Control

Volume 44, Issue 1

1 -- 20Michael Luck, Mark d Inverno. A Conceptual Framework for Agent Definition and Development
21 -- 30Giuseppe Anastasi, Alberto Bartoli, Nicoletta De Francesco, Antonella Santone. Efficient Verification of a Multicast Protocol for Mobile Computing
31 -- 41Sijing Zhang, E. Stewart Lee, Alan Burns. Determining the Worst-case Synchronous Message Response Time in FDDI Networks
42 -- 53Juha Puustjärvi. Workflow Concurrency Control
54 -- 66Jason Crampton, George Loizou, Greg O Shea. A Logic of Access Control