Journal: Comput. J.

Volume 49, Issue 6

631 -- 633Fairouz Kamareddine. Capsule Reviews
634 -- 649Yi-Sheng Huang. Design of Traffic Light Control Systems Using Statecharts
650 -- 656Frank Land. Leo II and the Model T Ford
657 -- 664Jorma Rissanen. The Structure Function and Distinguishable Models of Data
665 -- 669Dick den Hertog, P. B. Hulshof. Solving Rummikub Problems by Integer Linear Programming
670 -- 684Alexander Thomasian, Lijuan Zhang. Persistent Semi-Dynamic Ordered Partition Index
685 -- 709Samir M. Koriem. Development, Analysis and Evaluation of Performance Models for Mobile Multi-Agent Networks
710 -- 730Vlad Rusu. Verifying an ATM Protocol Using a Combination of Formal Techniques
731 -- 743Betül Demiröz, Haluk Rahmi Topcuoglu. Static Task Scheduling with a Unified Objective on Time and Resource Domains
744 -- 761Carlos A. G. Assis, Edil S. Tavares Fernandes, Valmir C. Barbosa. Modeling the Input History of Programs for Improved Instruction-Memory Performance

Volume 49, Issue 5

505 -- 506Fairouz Kamareddine. Capsule Reviews
507 -- 508Ing-Ray Chen, Bojan Cukic. High Assurance Software Systems
509 -- 526Jinchun Xia, Carl K. Chang, Jeffrey C. Wise, Yujia Ge. An Empirical Performance Study on PSIM
527 -- 540Guohui Li, LihChyun Shu. Design and Evaluation of a Low-Latency Checkpointing Scheme for Mobile Computing Systems
541 -- 553Qizhi Ye, Yu Lei, David Chenho Kung. A Blocking-based Approach to Protocol Validation
554 -- 561Engin Kirda, Christopher Krügel. Protecting Users against Phishing Attacks
562 -- 584José Luis Sierra, Alfredo Fernández-Valmayor, Baltasar Fernández-Manjón. A Document-Oriented Paradigm for the Construction of Content-Intensive Applications
585 -- 608Tiziana Calamoneri. The ::::L::::(::::h, k::::)-Labelling Problem: A Survey and Annotated Bibliography
609 -- 618Alexander Thomasian, Lijuan Zhang. The Stepwise Dimensionality Increasing (SDI) Index for High-Dimensional Data
619 -- 628Apostolos Syropoulos. Fuzzifying P Systems

Volume 49, Issue 4

381 -- 382Fairouz Kamareddine. Capsule Reviews
383 -- 389Robin Milner. Ubiquitous Computing: Shall we Understand It?
400 -- 417Chung-Ming Huang, Ching-Hsien Tsai, Ming-Chi Tsai. Design and Implementation of Video Streaming Hot-plug between Wired and Wireless Networks Using SCTP
418 -- 442T. Y. Wong, K. T. Law, John C. S. Lui, Man Hon Wong. An Efficient Distributed Algorithm to Identify and Traceback DDoS Traffic
443 -- 453Barry Doyle, Stuart Bell, Alan F. Smeaton, Kealan McCusker, Noel E. O Connor. Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks
454 -- 469Juan Fernández, Eitan Frachtenberg, Fabrizio Petrini, José Carlos Sancho. An Abstract Interface for System Software on Large-Scale Clusters
470 -- 479Daniel Yuh Chao. Computation of Elementary Siphons in Petri Nets For Deadlock Control
480 -- 486Alan Bundy. A Very Mathematical Dilemma
487 -- 499Patrick Martin, Wendy Powley, Xiaoyi Xu, Wenhu Tian. Automated Configuration of Multiple Buffer Pools

Volume 49, Issue 3

255 -- 257Fairouz Kamareddine. Capsule Reviews
258 -- 267Mehmet Savsar, Fawaz S. Al-Anzi. Reliability of Data Allocation on a Centralized Service Configuration with Distributed Servers
268 -- 280Alain Cournier, Stéphane Devismes, Franck Petit, Vincent Villain. Snap-Stabilizing Depth-First Search on Arbitrary Networks
281 -- 296Apostolos N. Papadopoulos, Alexandros Nanopoulos, Yannis Manolopoulos. Processing Distance Join Queries with Constraints
297 -- 309Moses Reuven, Yair Wiseman. Medium-Term Scheduler as a Solution for the Thrashing Effect
310 -- 321Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai. Unconditionally Secure Anonymous Encryption and Group Authentication
322 -- 330Javier Herranz. Deterministic Identity-Based Signatures for Partial Aggregation
331 -- 344Karnig Derderian, Robert M. Hierons, Mark Harman, Qiang Guo. Automated Unique Input Output Sequence Generation for Conformance Testing of FSMs
345 -- 350Per Martin-Löf. 100 years of Zermelo s axiom of choice: what was the problem with it?
351 -- 357James F. Korsh. Skarbek s Algorithm for ::::t::::-Ary Trees
358 -- 374Sung Eun Bae, Tadao Takaoka. Improved Algorithms for the ::::K::::-Maximum Subarray Problem

Volume 49, Issue 2

133 -- 0. Capsule Reviews
134 -- 135Fionn Murtagh. Editorial
136 -- 0Erol Gelenbe. Editorial: Building Adaptivity into Computer Networks
137 -- 155Gerardo Rubino, Martín Varela, Jean-Marie Bonnin. Controlling Multimedia QoS in the Future Home Network Using the PSQA Metric
156 -- 170Jeremy Pitt, Lloyd Kamara, Marek J. Sergot, Alexander Artikis. Voting in Multi-Agent Systems
171 -- 179Ricardo Lent. Design of a MANET Testbed Management System
180 -- 189András György, György Ottucsák. Adaptive Routing Using Expert Advice
190 -- 200Taskin Koçak. A Hybrid Network Processor with Support for High-Speed Execution of CPN and Upper Layer IP Protocols
201 -- 210Margarita Amor, Montserrat Bóo, Emilio J. Padrón, Dirk Bartz. Hardware Oriented Algorithms for Rendering Order-Independent Transparency
211 -- 233Kostas Bousias, Nabil Hasasneh, Chris R. Jesshope. Instruction Level Parallelism through Microthreading - A Scalable Approach to Chip Multiprocessors
234 -- 248Cinzia Bernardeschi, Giuseppe Lettieri, Luca Martini, Paolo Masci. Using Control Dependencies for Space-Aware Bytecode Verification

Volume 49, Issue 1

1 -- 3Fairouz Kamareddine. Capsule Reviews
4 -- 19Robert M. Colomb. Formal versus Material Ontologies for Information Systems Interoperation in the Semantic Web
20 -- 31Duncan Martin, Helen Ashman. Atomic Hypermedia
32 -- 41Jixin Ma, Patrick J. Hayes. Primitive Intervals versus Point-Based Intervals: Rivals or Allies?
42 -- 61Gianluca Dini, Giuseppe Lettieri, Lanfranco Lopriore. Caching and prefetching algorithms for programs with looping reference patterns
62 -- 81Nikos A. Lorentzos, Jose Ramon Rios Viqueira. Relational Formalism for the Management of Spatial Data
82 -- 96Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo. From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures
97 -- 107Stelvio Cimato, Roberto De Prisco, Alfredo De Santis. Probabilistic Visual Cryptography Schemes
108 -- 112Alexei Vernitski. Can Unbreakable Mean Incomputable?
113 -- 126Pablo H. Ibargüengoytia, Sunil Vadera, Luis Enrique Sucar. A Probabilistic Model for Information and Sensor Validation