Journal: Comput. J.

Volume 50, Issue 6

629 -- 0Fairouz Kamareddine. Capsule reviews
630 -- 631Erol Gelenbe, Andrew Tilbrook, Richard Vinter. Editorial: Introduction to the Special Issue
632 -- 645Robert A. Ghanea-Hercock, Erol Gelenbe, Nicholas R. Jennings, Oliver Smith, David N. Allsopp, Alex Healing, Hakan Duman, Simon Sparks, Nishan C. Karunatillake, Perukrishnen Vytelingum. Hyperion - Next-Generation Battlespace Information Services
646 -- 659Asher Mahmood, Philip M. Tudor, William Oxford, Robert Hansford, James D. B. Nelson, Nicholas G. Kingsbury, Antonis Katartzis, Maria Petrou, Nikolaos Mitianoudis, Tania Stathaki, Alin Achim, David R. Bull, Cedric Nishan Canagarajah, Stavri G. Nikolov, Artur Loza, Nedeljko Cvejic. Applied Multi-Dimensional Fusion
660 -- 673Nikolaos Mitianoudis, Tania Stathaki. Joint Fusion and Blind Restoration For Multiple Image Scenarios With Missing Data
674 -- 693William Ng, Jack Li, Simon J. Godsill, Sze Kim Pang. Multitarget Initiation, Tracking and Termination Using Bayesian Monte Carlo Methods
694 -- 702Samuel M. Waldron, John Patrick, Phillip L. Morgan, Sophia L. King. Influencing Cognitive Strategy by Manipulating Information Access
703 -- 716Paul R. Smart, Alistair Russell, Nigel R. Shadbolt, m. c. schraefel, Les Carr. AKTiveSA: A Technical Demonstrator System For Enhanced Situation Awareness
717 -- 727Gülay Öke, Georgios Loukas. A Denial of Service Detector based on Maximum Likelihood Detection and the Random Neural Network
728 -- 738Imtiaz Ahmad, A. Shoba Das. Analysis and Detection Of Errors In Implementation Of SHA-512 Algorithms On FPGAs
739 -- 757Chung-Ming Huang, Jian Wei Li. Efficient and Provably Secure IP Multimedia Subsystem Authentication for UMTS
758 -- 0Jan Peters. Computational Intelligence: Principles, Techniques and Applications

Volume 50, Issue 5

501 -- 504Fairouz Kamareddine. Capsule Reviews
505 -- 521Dan C. Marinescu, Gabriela M. Marinescu. The Boole Lecture Quantum Information: A Glimpse at the Strange and Intriguing Future of Information
522 -- 534Mehran S. Fallah, Ahmad R. Sharafat. Service Availability in Concurrent Systems - Part I: A Theory of Hierarchical Services of Interacting Processes
535 -- 554Mehran S. Fallah, Ahmad R. Sharafat. Service Availability in Concurrent Systems - Part II: Analysis and Case Studies Using HSIP
555 -- 566Der-Chiang Li, Fengming M. Chang. An In-Out Combined Dynamic Weighted Round-Robin Method for Network Load Balancing
567 -- 573Mark Levene, Judit Bar-Ilan. Comparing Typical Opening Move Choices Made by Humans and Chess Engines
574 -- 580Asep Juarna, Vincent Vajnovszki. Some Generalizations of a Simion-Schmidt Bijection
581 -- 588Haydeh Ahrabian, Abbas Nowzari-Dalini. Parallel Generation of ::::t::::-Ary Trees in A-order
589 -- 590Qiang Tang. On The Security of a Group Key Agreement Protocol
591 -- 601Kim-Kwang Raymond Choo. A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model
602 -- 615Ren-Junn Hwang, Sheng-Hua Shiau. Provably Efficient Authenticated Key Agreement Protocol for Multi-Servers
616 -- 628Jaesung Lee, Hyuk-Jae Lee, Chanho Lee. A High-Speed Link Layer Architecture for Low Latency and Memory Cost Reduction

Volume 50, Issue 4

373 -- 374Fairouz Kamareddine. Capsule Reviews
377 -- 0Ruqian Lu, Zhi-Hua Zhou. Guest Editorial to the Special Issue on Advances of Artificial Intelligence and Knowledge Engineering in China
378 -- 390Wei Li. R-Calculus: An Inference System for Belief Revision
391 -- 402Sanjiang Li, Bernhard Nebel. Qualitative Spatial Representation and Reasoning: A Hierarchical Approach
403 -- 420Kaile Su, Abdul Sattar, Xiangyu Luo. Model Checking Temporal Logics of Knowledge Via OBDDs
421 -- 434Hongli Liang, Jue Wang, Yiyu Yao. User-Oriented Feature Selection for Machine Learning
435 -- 443Shan-Tai Chen, Shun-Shii Lin, Li-Te Huang. A Two-Phase Optimization Algorithm For Mastermind
444 -- 459Roberto Baldoni, Roberto Beraldi, Leonardo Querzoni, Antonino Virgillito. Efficient Publish/Subscribe Through a Self-Organizing Broker Overlay and its Application to SIENA
460 -- 472Amit Thawani, Srividya Gopalan, V. Sridhar, Krithi Ramamritham. Context-aware Timely Information Delivery in Mobile Environments
473 -- 477Vladimir Yanovski, Israel A. Wagner, Alfred M. Bruckstein. A Linear-Time Constant-Space Algorithm for the Boundary Fill Problem
478 -- 499Emilio Ancillotti, Raffaele Bruno, Marco Conti, Enrico Gregori, Antonio Pinizzotto. A Layer-2 Framework for Interconnecting ::::Ad Hoc:::: Networks to Fixed Internet: Test-bed Implementation and Experimental Evaluation
500 -- 0Antonio Izquierdo Manzanares. Professional Pen Testing for Web Applications - Programmer to Programmer Series (P2P)

Volume 50, Issue 3

251 -- 253Fairouz Kamareddine. Capsule Reviews
254 -- 260Tony Hoare. The Ideal of Program Correctness: ::::Third Computer Journal:::: Lecture
274 -- 280Chris Mairs. Inclusion and Exclusion in the Digital World: ::::Turing Lecture 2006::::
281 -- 293Ing-Ray Chen, Weiping He, Baoshan Gu. Proxy-based Regional Registration for Integrated Mobility and Service Management in Mobile IP Systems
294 -- 314H. M. W. Verbeek, Wil M. P. van der Aalst, Arthur H. M. ter Hofstede. Verifying Workflows with Cancellation Regions and OR-joins: An Approach Based on Relaxed Soundness and Invariants
315 -- 331Monika Kapus-Kolar. Testing as Collecting of Evidence: An Integrated Approach to Test Generation for Finite State Machines
332 -- 340Doina Bein, Ajoy Kumar Datta, Mehmet Hakan Karaata. An Optimal Snap-Stabilizing Multi-Wave Algorithm
341 -- 347Tzong-Jye Liu, Chia-Lin Lee. State-Optimal Alternator for Uniform Synchronous Rings
348 -- 356George F. Georgakopoulos, Kostas Politopoulos. MAX-DENSITY Revisited: a Generalization and a More Efficient Algorithm
357 -- 368William Chung-Kung Yen. Edge-Orienting on Split, Planar and Treelike Graphs
369 -- 370Peter Grünwald. Christopher S. Wallace ::::Statistical and Inductive Inference by Minimum Message Length.:::: Springer (2005), ISBN 038723795X 432 pp, Hardbound
371 -- 372Jorge Martínez Gil. Thinking on the Web: Berners-Lee, Gödel and Turing
371 -- 0Mark Levene. Artificial Intelligence for Games. Series in Interactive 3D Technology

Volume 50, Issue 2

131 -- 133Fairouz Kamareddine. Capsule Reviews
134 -- 150Roland Rüdiger. Quantum Programming Languages: An Introductory Overview
151 -- 163Alexander Gammerman, Vladimir Vovk. Hedging Predictions in Machine Learning: The Second ::::Computer Journal:::: Lecture
164 -- 172. Discussion on ::::Hedging Predictions in Machine Learning:::: by A. Gammerman and V. Vovk
173 -- 177Alexander Gammerman, Vladimir Vovk. ::::Rejoinder:::: Hedging Predictions in Machine Learning
178 -- 185A. Bakalis, Costas S. Iliopoulos, Christos Makris, Spyros Sioutas, Evangelos Theodoridis, Athanasios K. Tsakalidis, Kostas Tsichlas. Locating Maximal Multirepeats in Multiple Strings Under Various Constraints
186 -- 196Abdelrahman Amer, B. John Oommen. A Novel Framework for Self-Organizing Lists in Environments with Locality of Reference: Lists-on-Lists
197 -- 203Doina Bein, Ajoy Kumar Datta, Vincent Villain. Self-Stabilizing Local Routing in Ad Hoc Networks
204 -- 216Sheng-Tzong Cheng, Ming-Hung Tao. A Scheduling-Based Medium Access Control Protocol for Supporting Multi-class Services in Wireless Networks
217 -- 231Alexander Thomasian, Gang Fu, Spencer W. Ng. Analysis of Rebuild Processing in RAID5 Disk Arrays
232 -- 247W. Paul Cockshott, Greg Michaelson. Are There New Models of Computation? Reply to Wegner and Eberbach
248 -- 0Ricardo P. Jasinski. Fault-Tolerance Techniques for SRAM-Based FPGAs
249 -- 0Carlos Caldeira. The Microsoft Data Warehouse Toolkit
249 -- 250Marino Segnan. Web Data Management Practices - Emerging Techniques and Technologies

Volume 50, Issue 1

1 -- 3Fairouz Kamareddine. Capsule Reviews
4 -- 6. Editorial on the Occasion of Volume 50 of ::::The Computer Journal::::
7 -- 40Zhongqiang Chen, Zhongrong Chen, Alex Delis. An Inline Detection and Prevention Framework for Distributed Denial of Service Attacks
41 -- 52Yuh-Min Tseng. A secure authenticated group key agreement protocol for resource-limited mobile devices
53 -- 67Rachid Guerraoui, Michel Raynal. The Alpha of Indulgent Consensus
68 -- 80Kil Hong Joo, Won Suk Lee. An Adaptive Materialization Method for Globally Optimized Query Evaluation in a Hierarchical Mediator System
81 -- 92Hooman Nikmehr, Braden Phillips, Cheng-Chew Lim. A Fast Radix-4 Floating-Point Divider with Quotient Digit Selection by Comparison Multiples
93 -- 115Ralf Gitzel, Ingo Ott, Martin Schader. Ontological Extension to the MOF Metamodel as a Basis for Code Generation
116 -- 128Jesús Manuel Almendros-Jiménez, Luis Iribarne. Describing Use-Case Relationships with Sequence Diagrams