Journal: Comput. J.

Volume 48, Issue 6

627 -- 629Fairouz Kamareddine. Capsule Reviews
630 -- 641J. Djordjevic, B. Nikolic, M. Mitrovic. A Memory System for Education
642 -- 645Leonid A. Levin. Aperiodic Tilings: Breaking Translational Symmetry
646 -- 648Martin Campbell-Kelly. Celebration of David Wheeler (1927-2004)
650 -- 651David W. Barron. David Wheeler: A Personal Memoir
651 -- 661Lefteris Moussiades, Athena Vakali. PDetect: A Clustering Approach for Detecting Plagiarism in Source Code Datasets
662 -- 666Charlie Daly, Jane Horgan. A Technique for Detecting Plagiarism in Computer Code
667 -- 676Fei He, Ming Gu, Xiaoyu Song, Zhiwei Tang, Guowu Yang, Lerong Cheng. Probabilistic Estimation for Routing Space
677 -- 691Dana Shapira, James A. Storer. In Place Differential File Compression
692 -- 701Li Jiao, To-Yat Cheung, Weiming Lu. Handling Synchronization Problem in Petri Net-Based System Design by Property-Preserving Transition-Reduction
702 -- 713Alexander Thomasian. Clustered RAID Arrays and Their Access Costs
714 -- 736Manuel Torres, José Samos. A Methodology to Define External Schemas in ODMG Databases
737 -- 748Sebastian Danicic, Chris Fox, Mark Harman, Robert M. Hierons, John Howroyd, Michael R. Laurence. Static Program Slicing Algorithms are Minimal for Free Liberal Program Schemas
749 -- 768Tak-Ming Chan, Kim-Fung Man, Kit-Sang Tang, Sam Kwong. A Jumping Gene Algorithm for Multiobjective Resource Management in Wideband CDMA Systems

Volume 48, Issue 5

501 -- 0Fairouz Kamareddine. Capsule Reviews
502 -- 503Marios C. Angelides. Editorial: Working with Multimedia Standards: MPEG-7, MPEG-21 and H.264
504 -- 513Hari Kalva, Borko Furht. Complexity Estimation of the H.264 Coded Video Bitstreams
514 -- 535Herbert Van de Sompel, Jeroen Bekaert, Xiaoming Liu, Lyudmila Balakireva, Thorsten Schwander. aDORe: A Modular, Standards-Based Digital Object Repository
536 -- 544William I. Grosky, Nilesh Patel, Xin Li, Farshad Fotouhi. Dynamically Emerging Semantics in an MPEG-7 Image Database
545 -- 562Harry W. Agius, Marios C. Angelides. COSMOS-7: Video-Oriented MPEG-7 Scheme for Modelling and Filtering of Semantic Content
563 -- 564Minaz J. Parmar. Review: Distributed Multimedia Database Technologies Supported by MPEG-7 and MPEG-21
563 -- 0Anastasis A. Sofokleous. Review: H.264 and MPEG-4 Video Compression: Video Coding for Next-generation Multimedia
565 -- 587Elizabeth Scott, Adrian Johnstone. Generalized Bottom Up Parsers With Reduced Stack Activity
588 -- 601Xinmin Tian, Milind Girkar, Aart J. C. Bik, Hideki Saito. Practical Compiler Techniques on Efficient Multithreaded Code Generation for OpenMP Programs
602 -- 626René Meier, Vinny Cahill. Taxonomy of Distributed Event-Based Programming Systems

Volume 48, Issue 4

381 -- 0Fionn Murtagh. Editorial
382 -- 384Fairouz Kamareddine. Capsule Reviews
385 -- 400Jane Hillston. Tuning Systems: From Composition to Performance (The Needham Lecture)
401 -- 420Mónica Pinto, Lidia Fuentes, José M. Troya. A Dynamic Component and Aspect-Oriented Platform
421 -- 436Robert M. Hierons, Mark Harman, Chris Fox. Branch-Coverage Testability Transformation for Unstructured Programs
437 -- 442Hyung-Kyu Choi, Yoo C. Chung, Soo-Mook Moon. Java Memory Allocation with Lazy Worst Fit for Small Objects
443 -- 450Santanu Chattopadhyay. Area Conscious State Assignment with Flip-Flop and Output Polarity Selection for Finite State Machine Synthesis?A Genetic Algorithm Approach
451 -- 459Lieven Eeckhout, Yue Luo, Koen De Bosschere, Lizy Kurian John. BLRL: Accurate and Efficient Warmup for Sampled Processor Simulation
460 -- 465Nikolaj A. Kuznetsov. The Science of Infocommunications (The Boole Lecture)
466 -- 479Paul O Neill, Karl Fraser, Zidong Wang, Paul Kellam, Joost N. Kok, Xiaohui Liu. Pyramidic Clustering of Large-Scale Microarray Images
480 -- 487Yuh-Min Tseng. A Robust Multi-Party Key Agreement Protocol Resistant to Malicious Participants
488 -- 497James F. Korsh. Generating T-ary Trees in Linked Representation
498 -- 0Daniel O Leary. Review: Ontologies: A Silver Bullet for Knowledge Management and Electronic Commerce
498 -- 499Yi Pan. Review: Active Services: Concepts, Architecture and Implementation

Volume 48, Issue 3

257 -- 258Fairouz Kamareddine. Capsule Reviews
259 -- 272K. Subramani. A Comprehensive Framework for Specifying Clairvoyance, Constraints and Periodicity in Real-Time Scheduling
273 -- 291Guray Yilmaz, Nadia Erdogan. DCOBE: Distributed Composite Object-Based Environment
292 -- 299Alexander Thomasian, Chunqi Han. Affinity-Based Routing in Zoned Mirrored Disks
300 -- 314Atakan Dogan, Füsun Özgüner. Biobjective Scheduling Algorithms for Execution Time?Reliability Trade-off in Heterogeneous Computing Systems
315 -- 322Stephanie Perkins, Derek H. Smith. Robust Data Compression: Variable Length Codes and Burst Errors
323 -- 324Nigel Thomas. Editorial: Grid Performability
325 -- 332Aad P. A. van Moorsel. Grid, Management and Self-Management
333 -- 346Mohammed H. Haji, Iain Gourlay, Karim Djemame, Peter M. Dew. A SNAP-Based Community Resource Broker Using a Three-Phase Commit Protocol: A Performance Study
347 -- 357Daniel P. Spooner, Junwei Cao, Stephen A. Jarvis, Ligang He, Graham R. Nudd. Performance-Aware Workflow Management for Grid Computing
358 -- 368Andrew Stephen McGough, Ali Afzal, John Darlington, Nathalie Furmento, Anthony Mayer, Laurie Young. Making the Grid Predictable through Reservations and Performance Modelling
369 -- 378Anne Benoit, Murray Cole, Stephen Gilmore, Jane Hillston. Scheduling Skeleton-Based Grid Applications Using PEPA and NWS
379 -- 0Haoyang Che. Review: From P2P to Web Services and Grids: Peers in a Client/Server World
379 -- 380Paul Hulse. Review: Beowulf Cluster Computing with Linux, Second Edition

Volume 48, Issue 2

130 -- 144Mercedes Gómez-Albarrán. The Teaching and Learning of Programming: A Survey of Supporting Software Tools
145 -- 156Fred Piper. Cyberworld Security-the Good, the Bad and the Ugly*
157 -- 167Florentin Ipate. On the Minimality of Finite Automata and Stream X-machines for Finite Languages
168 -- 179Chin-Chen Chang, Chih-Yang Lin. Perfect Hashing Schemes for Mining Association Rules
180 -- 199Valentin E. Brimkov, Reneta P. Barneva. Analytical Honeycomb Geometry for Raster and Volume Graphics
200 -- 219Ghada Hany Badr, B. John Oommen. Self-Adjusting of Ternary Search Tries Using Conditional Rotations and Randomized Heuristics
220 -- 238Antonio Corral, Michael Vassilakopoulos. On Approximate Algorithms for Distance-Based Queries using R-trees
239 -- 252Sébastien Cantarell, Ajoy Kumar Datta, Franck Petit, Vincent Villain. Group Mutual Exclusion in Token Rings

Volume 48, Issue 1

4 -- 16Vladimir B. Balakirsky. Hashing of Databases with the Use of Metric Properties of the Hamming Space
17 -- 26Andrew Rae, Colin J. Fidge. Information Flow Analysis for Fail-Secure Devices
27 -- 29Hung-Yu Chien, Ren-Chiun Wang, Chou Chen Yang. Note on Robust and Simple Authentication Protocol
30 -- 41Wei-Yi Liu, Ning Song Hong Yao. Temporal Functional Dependencies and Temporal Nodes Bayesian Networks
42 -- 48Andrew D. McGettrick, Roger D. Boyle, Roland N. Ibbett, John Lloyd, Gillian Lovegrove, Keith Mander. Grand Challenges in Computing: Education - A Summary
49 -- 52Tony Hoare, Robin Milner. Grand Challenges for Computing Research
53 -- 71Chung-Ming Huang, Tz-Heng Hsu. A Resource Exchange Architecture for Peer-to-Peer File Sharing Applications
72 -- 83Jean-Pierre Ebert, Daniel Hollos, Holger Karl, Marc Löbbers. Does Multi-Hop Communication Reduce Electromagnetic Exposure?
84 -- 100Kam-yiu Lam, BiYu Liang, Chuanlin Zhang. On Using Handoff Statistics and Velocity for Location Management in Cellular Wireless Networks
101 -- 114Guang-Ho Cha. The Segment-Page Indexing Method for Large Multidimensional Queries
115 -- 125Brian J. d Auriol, Rajesh Molakaseema. A Parameterized Linear Array with a Reconfigurable Pipelined Bus System: LARPBS(p)