Journal: Comput. J.

Volume 46, Issue 6

593 -- 597Caroline Kovac. Computing in the Age of the Genome
598 -- 601Ray J. Solomonoff. The Kolmogorov Lecture* The Universal Distribution and Machine Learning
602 -- 624Vesper Owei. Development of a Conceptual Query Language: Adopting the User-Centered Methodology
625 -- 631Keqin Li. Speed-up of Parallel Processing of Divisible Loads on k-dimensional Meshes and Tori
632 -- 644Volker Heun, Ernst W. Mayr. Efficient Embeddings into Hypercube-like Topologies
645 -- 659Ing-Ray Chen, Naresh Verma. A Cost-Based Admission Control Algorithm for Digital Library Multimedia Systems Storing Heterogeneous Objects
662 -- 663Yannis Manolopoulos. Introduction to the Special Section on Spatiotemporal Databases
664 -- 679Stéphane Grumbach, Philippe Rigaux, Luc Segoufin. Handling Interpolated Data
680 -- 712José Antonio Cotelo Lema, Luca Forlizzi, Ralf Hartmut Güting, Enrico Nardelli, Markus Schneider. Algorithms for Moving Objects Databases
713 -- 725Yannis Theodoridis. Ten Benchmark Database Queries for Location-based Services

Volume 46, Issue 5

467 -- 475Sameer M. Bataineh, Ghassan E. Qanzu a. Reliable Omega Interconnected Network for Large-Scale Multiprocessor Systems
476 -- 486Siddhartha Rai, Priti Shankar. Efficient Statistical Modeling for the Compression of Tree Structured Intermediate Code
487 -- 497Shmuel Tomi Klein, Yair Wiseman. Parallel Huffman Decoding with Applications to JPEG Files
498 -- 504Alexandros V. Gerbessiotis, Constantinos J. Siniolakis. Increasing the Efficiency of Existing Sorting Algorithms by Using Randomized Wrappers
505 -- 523Daniel Yuh Chao. Extended Synchronized Choice Nets
527 -- 528Awais Rashid, Lynne Blair. Editorial: Aspect-oriented Programming and Separation of Crosscutting Concerns
529 -- 541Marcelo Sihman, Shmuel Katz. Superimpositions and Aspect-oriented Programming
542 -- 565Karl J. Lieberherr, David H. Lorenz, Johan Ovlinger. Aspectual Collaborations: Combining Modules and Aspects
566 -- 577Tony Clark, Andy Evans, Stuart Kent. Aspect-oriented Metamodelling
578 -- 589Ian S. Welch, Robert J. Stroud. Re-engineering Security as a Crosscutting Concern

Volume 46, Issue 4

340 -- 357Fabio Paternò, Carmen Santoro. Support for Reasoning about Interactive Systems through Human-Computer Interaction Designers Representations
358 -- 377Randeep Bhatia, Rakesh K. Sinha, Chung-Min Chen. A Hierarchical Technique for Constructing Efficient Declustering Schemes for Range Queries
378 -- 390Xiaohua Jia, Deying Li, Xiao-Dong Hu, Weili Wu, Ding-Zhu Du. Placement of Web-Server Proxies with Consideration of Read and Update Operations on the Internet
391 -- 400Alan Gibbons, Aris Pagourtzis, Igor Potapov, Wojciech Rytter. Coarse-Grained Parallel Transitive Closure Algorithm: Path Decomposition Technique
401 -- 420Christian Rinderknecht. An Algorithm for Validating ASN.1 (X.680) Specifications using Set Constraints
421 -- 426Aysegül Gençata, Feza Buzluca. Determining the Asynchronous Threshold Values of the Timed Token Medium Access Protocol
427 -- 448Tak-Ming Chan, Sam Kwong, Kim-Fung Man. Solving the Converter Placement Problem in WDM Ring Networks using Genetic Algorithms
449 -- 460Chang N. Zhang, Hua Li. Design of Reconfigurable VLSI Architecture for Hybrid Arithmetic in GF(2^m)

Volume 46, Issue 3

229 -- 262Sourav S. Bhowmick, Sanjay Kumar Madria, Wee Keong Ng. Representation of Web Data in A Web Warehouse
263 -- 294Mirko Viroli. A Type-Passing Approach for the Implementation of Parametric Methods in Java
295 -- 306Florentin Ipate. On the Minimality of Stream X-machines
307 -- 318Robert M. Hierons. Generating Candidates When Testing a Deterministic Implementation against a Non-deterministic Finite-state Machine
319 -- 331Panayiotis Bozanis, Alexandros Nanopoulos, Yannis Manolopoulos. LR-tree: a Logarithmic Decomposable Spatial Index Method

Volume 46, Issue 2

121 -- 122. Capsule Reviews
123 -- 145José M. Álvarez, Manuel Díaz, Luis Llopis, Ernesto Pimentel, José M. Troya. An Object-oriented Methodology for Embedded Real-time Systems
146 -- 160Giuseppe Anastasi, Alberto Bartoli. On the Structuring of Reliable Multicast Protocols for Distributed Mobile Systems
161 -- 173Jun Wu, Tei-Wei Kuo, Chih-wen Hsueh. RCPCP: A Ceiling-based Protocol for Multiple-disk Environments
174 -- 192Tei-Wei Kuo, Yen-Hsi Hou, Kam-yiu Lam. The Impacts of Write-Through Procedures and Checkpointing on Real-Time Concurrency Control
193 -- 201Hung-Yu Chien, Jinn-ke Jan. Robust and Simple Authentication Protocol
202 -- 212Carlo Blundo, Clemente Galdi. Hiding Information in Image Mosaics
213 -- 222Jixin Ma, Brian Knight. Representing The Dividing Instant

Volume 46, Issue 1

1 -- 2. Capsule Reviews
3 -- 15Giuseppe Anastasi, Marco Conti, Willy Lapenna. A Power-Saving Network Architecture for Accessing the Internet from Mobile Computers: Design, Implementation and Measurements
16 -- 35Kim Potter Kihlstrom, Louise E. Moser, P. M. Melliar-Smith. Byzantine Fault Detectors for Solving Consensus
36 -- 54Sotirios G. Ziavras, Qian Wang, Paraskevi Papathanasiou. Viable Architectures for High-Performance Computing
55 -- 75Henning Pagnia, Holger Vogt, Felix C. Gärtner. Fair Exchange
76 -- 83Frederic Paik Schoenberg, Thomas S. Ferguson, Cheng Li. Inverting Dirichlet Tessellations
84 -- 99Juan A. Carrasco. Transient Analysis of Rewarded Continuous Time Markov Models by Regenerative Randomization with Laplace Transform Inversion
100 -- 105Hsien-Wen Tseng, Chin-Chen Chang. Construction of Symmetrical Reversible Variable Length Codes Using Backtracking
106 -- 113James F. Korsh, Paul LaFollette. Loopless Generation of Schröder Trees