Journal: Comput. J.

Volume 54, Issue 9

1413 -- 1415Fairouz Kamareddine. Capsule Reviews
1416 -- 1426Shuo Xu, Fan Yu, Zhe Luo, Ze Ji, Duc Truong Pham, Renxi Qiu. Adaptive Bees Algorithm - Bioinspiration from Honeybee Foraging to Optimize Fuel Economy of a Semi-Track Air-Cushion Vehicle
1427 -- 1448Hugo Hernández, Christian Blum. Foundations of Antcycle: Self-synchronized Duty-cycling in Mobile Sensor Networks
1449 -- 1464Wei-Po Lee, Yu-Ting Hsiao. An Adaptive GA - PSO Approach with Gene Clustering to Infer S-system Models of Gene Regulatory Networks
1465 -- 1474Hongxing Wei, Youdong Chen, Miao Liu, Yingpeng Cai, Tianmiao Wang. Swarm Robots: From Self-assembly to Locomotion
1475 -- 1490Hanife Kebapci, Berrin A. Yanikoglu, Gözde B. Ünal. Plant Image Retrieval Using Color, Shape and Texture Features
1491 -- 1504Maria Petrou, Archontis Giannakidis. Full Tomographic Reconstruction of 2D Vector Fields using Discrete Integral Data
1505 -- 1513Gérard Sabah. Natural Language Understanding, Where Are We Going? Where Could We Go?
1514 -- 1525Stelios Timotheou. Asset-Task Assignment Algorithms in the Presence of Execution Uncertainty
1526 -- 1534Serdar Çakir, A. Enis Çetin. Mel- and Mellin-cepstral Feature Extraction Algorithms for Face Recognition
1535 -- 1546Gözde Özbal, Hilal Karaman, Ferda Nur Alpaslan. A Content-Boosted Collaborative Filtering Approach for Movie Recommendation Based on Local and Global Similarity and Missing Data Prediction
1547 -- 1559Sotiris B. Kotsiantis. Cascade Generalization with Reweighting Data for Handling Imbalanced Problems
1560 -- 0Mark Levene. Chess Metaphors, Artificial Intelligence and the Human Mind

Volume 54, Issue 8

1233 -- 1234Fairouz Kamareddine. Capsule Reviews
1235 -- 1247Constandinos X. Mavromoustakis, Helen D. Karatza. Embedded Socio-oriented Model for End-to-End Reliable Stream Schedules by Using Collaborative Outsourcing in MP2P Systems
1248 -- 1266Amirhosein Taherkordi, Frédéric Loiret, Romain Rouvoy, Frank Eliassen. A Generic Component-Based Approach for Programming, Composing and Tuning Sensor Software
1267 -- 1281In Hwan Doh, Jongmoo Choi, Donghee Lee, Sam H. Noh. An Empirical Study of Deploying Storage Class Memory into the I/O Path of Portable Systems
1282 -- 1294José Luis March, Julio Sahuquillo, Houcine Hassan, Salvador Petit, José Duato. A New Energy-Aware Dynamic Task Set Partitioning Algorithm for Soft and Hard Embedded Real-Time Systems
1295 -- 1307Ali Ahmadinia, Alireza Shahrabi. A Highly Adaptive and Efficient Router Architecture for Network-on-Chip
1308 -- 1324Minseong Kim, Andy J. Wellings. Multiprocessors and Asynchronous Event Handling in the Real-Time Specification for Java
1325 -- 1343Mohamed F. Mokbel, Robert D. Kent, Michael Wong. An Abstract Semantically Rich Compiler Collocative and Interpretative Model for OpenMP Programs
1344 -- 1371Tiziana Calamoneri. The ::::L::::(::::h::::, ::::k::::)-Labelling Problem: An Updated Survey and Annotated Bibliography
1372 -- 1381Antoine Bossard, Keiichi Kaneko, Shietung Peng. A New Node-to-Set Disjoint-Path Algorithm in Perfect Hierarchical Hypercubes
1382 -- 1397Eun-Chan Park, Minjoong Rim. Fair Coexistence MAC Protocol for Contention-Based Heterogeneous Networks
1398 -- 1411Onur Yilmaz, Orhan Dagdeviren, Kayhan Erciyes. Interference-Aware Dynamic Algorithms for Energy-Efficient Topology Control in Wireless ::::Ad Hoc:::: and Sensor Networks

Volume 54, Issue 7

1005 -- 1009Fairouz Kamareddine. Capsule Reviews
1010 -- 1025Alex W. Stedmon, Benjamin Hasseldine, David Rice, Mark Young, Steve Markham, Michael Hancox, Edward Brickell, Joanna Noble. MotorcycleSim : An Evaluation of Rider Interaction with an Innovative Motorcycle Simulator
1026 -- 1037Petr Hnetynka, Liam Murphy, John Murphy. Comparing the Service Component Architecture and Fractal Component Model
1038 -- 1048Tatjana Kapus. Closing a System in the Dynamic Input/Output Automata Model
1049 -- 1066Ahmad Taherkhani, Ari Korhonen, Lauri Malmi. Recognizing Algorithms Using Language Constructs, Software Metrics and Roles of Variables: An Experiment with Sorting Algorithms
1067 -- 1075Paul E. Dunne. On Constructing Minimal Formulae
1076 -- 1090Alessandro Basso, Davide Cavagnino, Victor Pomponiu, Annamaria Vernone. Blind Watermarking of Color Images Using Karhunen-Loève Transform Keying
1091 -- 1118Yuqing Wu, Dirk Van Gucht, Marc Gyssens, Jan Paredaens. A Study of a Positive Fragment of Path Queries: Expressiveness, Normal Form and Minimization
1119 -- 1135Harold W. Thimbleby. Signposting in Documents
1136 -- 1147Chuen-Horng Lin, Wei-Chih Lin. Image Retrieval System Based on Adaptive Color Histogram and Texture Features
1148 -- 1165David Pinto, Paolo Rosso, Héctor Jiménez-Salazar. A Self-enriching Methodology for Clustering Narrow Domain Short Texts
1166 -- 1180Sven Hartmann, Uwe Leck, Sebastian Link. On Codd Families of Keys over Incomplete Relations
1181 -- 1187Tetsu Narumi, Kenji Yasuoka, Makoto Taiji, Francesco Zerbetto, Siegfried Höfinger. Fast Calculation of Electrostatic Potentials on the GPU or the ASIC MD-GRAPE-3
1188 -- 1204Alexandre R. J. François. An Architectural Framework for the Design, Analysis and Implementation of Interactive Systems
1205 -- 1210Yulai Xie. Some Results on Minimum Discrete Bending Energy Path in Simple Polygon
1211 -- 1220Jia Lee, Susumu Adachi, Ferdinand Peper. A Partitioned Cellular Automaton Approach for Efficient Implementation of Asynchronous Circuits
1221 -- 1231Medeni Soysal, A. Aydin Alatan. Joint Utilization of Appearance, Geometry and Chance for Scene Logo Retrieval

Volume 54, Issue 6

833 -- 835Fairouz Kamareddine. Capsule Reviews
836 -- 849Django Armstrong, Karim Djemame. Performance Issues in Clouds: An Evaluation of Virtual Image Propagation and I/O Paravirtualization
850 -- 859Erol Gelenbe, Christina Morfopoulou. A Framework for Energy-Aware Routing in Packet Networks
860 -- 874Arshad Jhumka, Matthew Leeke, Sambid Shrestha. On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy
875 -- 893Osama Younes, Nigel Thomas. An SRN Model of the IEEE 802.11 DCF MAC Protocol in Multi-Hop Ad Hoc Networks with Hidden Nodes
894 -- 904Feng Liu, Xiaoyu Song, Qingping Tan, Gang Chen. Formal Analysis of Hybrid Prefix/Carry-Select Arithmetic Systems
905 -- 919Qiang Li, Qinfen Hao, Limin Xiao, Zhoujun Li. An Integrated Approach to Automatic Management of Virtualized Resources in Cloud Environments
920 -- 930Yonghong Xiang, Iain A. Stewart. A Multipath Analysis of Biswapped Networks
931 -- 943Kalika Suksomboon, Panita Pongpaibool, Yusheng Ji, Chaodit Aswakul. PC-Nash: QoS Provisioning Framework With Path-Classification Scheme Under Nash Equilibrium
944 -- 959Mustafa K. Gurcan, Hadhrami Ab. Ghani, Jihai Zhou, Anusorn Chungtragarn. Bit Energy Consumption Minimization for Multi-path Routing in ::::Ad Hoc:::: Networks
960 -- 961Stephen A. Jarvis. UK Performance Engineering Workshop 2010
962 -- 975Jie Yu, Zhoujun Li, Peng Xiao, Chengfang Fang, Jia Xu, Ee-Chien Chang. ID Repetition in Structured P2P Networks
976 -- 987Guangyan Huang, Yanchun Zhang, Jing He, Jinli Cao. Fault Tolerance in Data Gathering Wireless Sensor Networks
988 -- 1003A. Sinan Akyurek, Elif Uysal-Biyikoglu. A Depth-optimal Low-complexity Distributed Wireless Multicast Algorithm

Volume 54, Issue 5

639 -- 640Fairouz Kamareddine. Capsule Reviews
641 -- 642Jeremy T. Bradley. Computer Performance Evaluation: Preface
643 -- 652Nigel Thomas, Yishi Zhao. Mean value analysis for a class of PEPA models
653 -- 673Gianfranco Balbo, Marco Beccuti, Massimiliano De Pierro, Giuliana Franceschinis. First Passage Time Computation in Tagged GSPNs with Queue Places
674 -- 690Connie U. Smith, Catalina M. Lladó, Ramón Puigjaner. Model Interchange Format Specifications for Experiments, Output and Results
691 -- 707Abigail S. Lebrecht, Nicholas J. Dingle, William J. Knottenbelt. Analytical and Simulation Modelling of Zoned RAID Systems
708 -- 716Mehmet Serkan Apaydin, Bülent Çatay, Nicholas Patrick, Bruce Randall Donald. NVR-BIP: Nuclear Vector Replacement using Binary Integer Programming for NMR Structure-Based Assignments
717 -- 725Ender Sevinç, Ahmet Cosar. An Evolutionary Genetic Algorithm for Optimization of Distributed Database Queries
726 -- 737Hamid Sarbazi-Azad, Ahmad Khonsari, Mohamed Ould-Khaoua. On the Topological Properties of Grid-Based Interconnection Networks: Surface Area and Volume of Radial Spheres
738 -- 753Rifat Benveniste, Cem Ünsalan. A Color Invariant for Line Stripe-Based Range Scanners
754 -- 775Marco Bozzano, Alessandro Cimatti, Joost-Pieter Katoen, Viet Yen Nguyen, Thomas Noll, Marco Roveri. Safety, Dependability and Performance Analysis of Extended AADL Models
776 -- 785James F. Korsh. Fast Generation of ::::t::::-ary Trees
786 -- 799Ramon Bertran, Marc González, Xavier Martorell, Nacho Navarro, Eduard Ayguadé. Local Memory Design Space Exploration for High-Performance Computing
800 -- 814Murat Ali Bayir, Murat Demirbas, Ahmet Cosar. A Web-Based Personalized Mobility Service for Smartphone Applications
815 -- 823Minhaj Ahmad Khan. Data Cache Prefetching With Dynamic Adaptation
824 -- 830Yen-Ju Chen, Jia Jie Liu, Yue-Li Wang. An Optimal Rotation Distance Set

Volume 54, Issue 4

503 -- 504Fairouz Kamareddine. Capsule Reviews
505 -- 512Zuowen Tan. An Off-line Electronic Cash Scheme Based on Proxy Blind Signature
513 -- 524Fuchun Guo, Yi Mu, Willy Susilo. Short Signatures with a Tighter Security Reduction Without Random Oracles
525 -- 536Qiong Huang, Duncan S. Wong, Guomin Yang. Heterogeneous Signcryption with Key Privacy
537 -- 548Mehran S. Fallah, Maryam Mouzarani. A Game-based Sybil-resistant Strategy for Reputation Systems in Self-organizing MANETs
549 -- 569Biming Tian, Song Han, Sazia Parvin, Jiankun Hu, Sajal K. Das. Self-Healing Key Distribution Schemes for Wireless Networks: A Survey
570 -- 588Prasanta Gogoi, D. K. Bhattacharyya, Bhogeswar Borah, Jugal K. Kalita. A Survey of Outlier Detection Methods in Network Anomaly Identification
589 -- 601Ender Yüksel, Hanne Riis Nielson, Flemming Nielson. A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks
602 -- 616Murat Ergun, Albert Levi, Erkay Savas. Increasing Resiliency in Multi-phase Wireless Sensor Networks: Generationwise Key Predistribution Approach
617 -- 627David Taniar, Maytham Safar, Quoc Thai Tran, J. Wenny Rahayu, Jong Hyuk Park. Spatial Network RNN Queries in GIS
628 -- 638Chien-Lung Chan. Information Security Risk Modeling Using Bayesian Index

Volume 54, Issue 3

307 -- 308A. Rogers. Agent Technologies for Sensor Networks
309 -- 320Ettore Ferranti, Niki Trigoni. Practical Issues in Deploying Mobile Agents to Explore a Sensor-Instrumented Environment
321 -- 331Dirk Bade, Winfried Lamersdorf. An Agent-Based Event Processing Middleware for Sensor Networks and RFID Systems
332 -- 344Damla Turgut, Ladislau Bölöni. Heuristic Approaches for Transmission Scheduling in Sensor Networks with Multiple Mobile Sinks
345 -- 355Shunichiro Suenaga, Nobukazu Yoshioka, Shinichi Honiden. Group Migration by Mobile Agents in Wireless Sensor Networks
356 -- 372Murat Sensoy, Thao Le, Wamberto Weber Vasconcelos, Timothy J. Norman, Alun D. Preece. Resource Determination and Allocation in Sensor Networks: A Hybrid Approach
373 -- 391Sherine Abdelhak, Rabi S. Chaudhuri, Chandra Sekhar Gurram, Soumik Ghosh, Magdy Bayoumi. Energy-Aware Distributed QR Decomposition on Wireless Sensor Nodes
392 -- 405Daniel D. Corkill. Deploying Power-Aware, Wireless Sensor Agents
406 -- 420Edison Pignaton de Freitas, Tales Heimfarth, Carlos Eduardo Pereira, Armando Morado Ferreira, Flávio Rech Wagner, Tony Larsson. Multi-Agent Support in a Middleware for Mission-Driven Heterogeneous Sensor Networks
421 -- 438Andrew Markham, Niki Trigoni. The Automatic Evolution of Distributed Controllers to Configure Sensor Network Operation
439 -- 454Francesco Aiello, Giancarlo Fortino, Raffaele Gravina, Antonio Guerrieri. A Java-Based Agent Platform for Programming Wireless Sensor Networks
455 -- 470Meritxell Vinyals, Juan A. Rodríguez-Aguilar, Jesús Cerquides. A Survey on Sensor Networks from a Multiagent Perspective
471 -- 481Antony Waldock, David Nicholson. A Framework for Cooperative Control Applied to a Distributed Sensor Network
482 -- 489Partha Mukherjee, Sandip Sen. Comparing Reputation Schemes for Detecting Malicious Nodes in Sensor Networks
490 -- 502Richard Tynan, Conor Muldoon, Gregory M. P. O Hare, Michael J. O Grady. Coordinated Intelligent Power Management and the Heterogeneous Sensing Coverage Problem

Volume 54, Issue 2

185 -- 186Fairouz Kamareddine. Capsule Reviews
189 -- 196Antonio Manzalini, Peter H. Deussen, S. Nechifor, Marco Mamei, Roberto Minerva, Corrado Moiso, A. Salden, T. Wauters, Franco Zambonelli. Self-optimized Cognitive Network of Networks
197 -- 212Yosi Ben-Asher, Sharoni Feldman, Moran Feldman. Dynamic Multipath Allocation in Ad Hoc Networks
213 -- 229Giuseppe Anastasi, Eleonora Borgia, Marco Conti, Enrico Gregori. A Hybrid Adaptive Protocol for Reliable Data Delivery in WSNs with Multiple Mobile Sinks
230 -- 254Oliviu Ghica, Goce Trajcevski, Peter Scheuermann, Nikolay Valtchanov, Zachary S. Bischof. Controlled Multi-Path Routing in Sensor Networks Using Bezier Curves
255 -- 262Jywe-Fei Fang. The Edge-Fault-Tolerant Bipancyclicity of the Even ::::k::::-ary ::::n::::-cube
263 -- 273David Nicholson. Defence Applications of Agent-Based Information Fusion
274 -- 284Thu-Ha Dao-Thi, Jean-Michel Fourneau, Minh-Anh Tran. Multiple Class Symmetric G-networks with Phase Type Service Times
285 -- 303Lucas Vespa, Ning Weng, Ramaswamy Ramaswamy. MS-DFA: Multiple-Stride Pattern Matching for Scalable Deep Packet Inspection
304 -- 305Mihaela Ulieru. WIRED for Innovation: How Information Technology is Reshaping the Economy

Volume 54, Issue 12

1925 -- 1927Fairouz Kamareddine. Capsule Reviews
1928 -- 1930Damianos Gavalas, Grammati E. Pantziou, Charalampos Konstantopoulos. Mobility in Wireless Sensor Networks
1931 -- 1948Roland Kays, Sameer Tilak, Margaret Crofoot, Tony Fountain, Daniel Obando, Alejandro Ortega, Franz Kuemmeth, Jamie Mandel, George Swenson, Thomas Lambert, Ben Hirsch, Martin Wikelski. Tracking Animal Location and Activity with an Automated Radio Telemetry System in a Tropical Rainforest
1949 -- 1962Giuseppe Cardone, Antonio Corradi, Luca Foschini. Cross-Network Opportunistic Collection of Urgent Data in Wireless Sensor Networks
1963 -- 1972Mahdi Zareei, Alireza Taghizadeh, Rahmat Budiarto, Tat Chee Wan. EMS-MAC: Energy Efficient Contention-Based Medium Access Control Protocol for Mobile Sensor Networks
1973 -- 1986Olof Rensfelt, Frederik Hermans, Per Gunningberg, Lars-Åke Larzon, Erik Björnemo. Repeatable Experiments with Mobile Nodes in a Relocatable WSN Testbed
1987 -- 1999M. Emre Keskin, I. Kuban Altinel, Necati Aras, Cem Ersoy. Lifetime Maximization in Wireless Sensor Networks Using a Mobile Sink with Nonzero Traveling Time
2000 -- 2016Zeqiang Chen, Liping Di, Genong Yu, Nengcheng Chen. Real-Time On-Demand Motion Video Change Detection in the Sensor Web Environment
2017 -- 2032Kai-Ting Yang, Ge-Ming Chiu. A Hybrid Pull-Based with Piggybacked Push Protocol for Cache Sharing
2033 -- 2052Jih-Ching Chiu, Yu-Liang Chou, Po-Kai Chen, Ding-Siang Su. A Unitable Computing Architecture for Chip Multiprocessors
2053 -- 2071Yanbo Wu, Quan Z. Sheng, Damith Chinthana Ranasinghe. Facilitating Efficient Object Tracking in Large-Scale Traceability Networks

Volume 54, Issue 11

1737 -- 1740Fairouz Kamareddine. Capsule Reviews
1741 -- 1755Chenfeng Xu, Hongsheng Xi, Fengguang Wu. Evaluation and Optimization of Kernel File Readaheads Based on Markov Decision Models
1756 -- 1772Edgar G. Daylight. Dijkstra's Rallying Cry for Generalization: The Advent of the Recursive Procedure, Late 1950s-Early 1960s
1773 -- 1789Mitzi McCarthy, Zhen He. Efficient Updates for OLAP Range Queries on Flash Memory
1790 -- 1797Tien Van Do. Comparison of Allocation Schemes for Virtual Machines in Energy-Aware Server Farms
1798 -- 1809Amir Kaivani, Ghassem Jaberipur. Decimal CORDIC Rotation based on Selection by Rounding: Algorithm and Architecture
1810 -- 1820Cagatay Turkay, Emre Koc, Selim Balcisoy. Integrating Information Theory in Agent-Based Crowd Simulation Behavior Models
1821 -- 1837Gabriel Rodríguez, María J. Martín, Patricia González, Juan Touriño. Analysis of Performance-impacting Factors on Checkpointing Frameworks: The CPPC Case Study
1838 -- 1844Jia Jie Liu, William Chung-Kung Yen, Yen-Ju Chen. An Optimal Algorithm for Untangling Binary Trees via Rotations
1845 -- 1860Ahmad Taherkhani. Using Decision Tree Classifiers in Source Code Analysis to Recognize Algorithms: An Experiment with Sorting Algorithms
1861 -- 1868Francisco Vázquez, Ester M. Garzón, José-Jesús Fernández. Matrix Implementation of Simultaneous Iterative Reconstruction Technique (SIRT) on GPUs
1869 -- 1875Tiziana Calamoneri. L(2, 1)-Labeling Problem on Oriented Regular Grids
1876 -- 1881Ionut Popa. SE-Compression: A Generalization of Dictionary-Based Compression
1882 -- 1990Yang Liu, Zhen He, Yi-Ping Phoebe Chen, Thi Nguyen. External Sorting on Flash Memory Via Natural Page Run Generation
1901 -- 1924Francisco Ortin. Type Inference to Optimize a Hybrid Statically and Dynamically Typed Language

Volume 54, Issue 10

1561 -- 1564Fairouz Kamareddine. Capsule Reviews
1565 -- 1581Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita. Surveying Port Scans and Their Detection Methodologies
1582 -- 1591Duc-Phong Le, Chao-Liang Liu. Refinements of Miller's Algorithm over Weierstrass Curves Revisited
1592 -- 1602Salih Ergün. A Truly Random Number Generator Based on a Pulse-Excited Cross-Coupled Chaotic Oscillator
1603 -- 1615Ruben Rios, Javier Lopez. Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks
1616 -- 1631Hossein Homaei, Hamid Reza Shahriari. Compositional Approach to Quantify the Vulnerability of Computer Systems
1632 -- 1644Kai Xi, Yan Tang, Jiankun Hu. Correlation Keystroke Verification Scheme for User Access Control in Cloud Computing Environment
1645 -- 1651Yong Yu, Yi Mu, Guilin Wang, Ying Sun. Cryptanalysis of an Off-Line Electronic Cash Scheme Based on Proxy Blind Signature
1652 -- 1660Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wang. k Mins Problem
1661 -- 1674Jun Zhang, Yang Xiang, Wanlei Zhou, Lei Ye, Yi Mu. Secure Image Retrieval Based on Visual Content and Watermarking Protocol
1675 -- 1687Lan Zhou, Vijay Varadharajan, Michael Hitchens. Enforcing Role-Based Access Control for Secure Data Storage in the Cloud
1688 -- 1699Lein Harn, Chia-Yin Lee, Changlu Lin, Chin-Chen Chang. Fully Deniable Message Authentication Protocols Preserving Confidentiality
1700 -- 1720Yini Wang, Sheng Wen, Silvio Cesare, Wanlei Zhou, Yang Xiang. The Microcosmic Model of Worm Propagation
1721 -- 1735Erika Rosas, Olivier Marin, Xavier Bonnaire. CORPS: Building a Community of Reputable PeerS in Distributed Hash Tables

Volume 54, Issue 1

1 -- 10Qiang Liu, George A. Constantinides, Konstantinos Masselos, Peter Y. K. Cheung. Compiling C-like Languages to FPGA Hardware: Some Novel Approaches Targeting Data Memory Organization
11 -- 25Mark S. Nixon, Xin U. Liu, Cem Direkoglu, David J. Hurley. On Using Physical Analogies for Feature and Shape Extraction in Computer Vision
26 -- 30Stefan S. Dantchev. Dynamic Neighbourhood Cellular Automata
31 -- 41Corina Cîrstea, Alexander Kurz, Dirk Pattinson, Lutz Schröder, Yde Venema. Modal Logics are Coalgebraic
42 -- 57Glynn Winskel. Events, Causality and Symmetry
58 -- 87Andreas Bauer 0002, Jan Jürjens, Yijun Yu. Run-Time Security Traceability for Evolving Systems
88 -- 107Kohei Honda, Nobuko Yoshida. A Unified Theory of Program Logics: An Approach based on the π-Calculus
108 -- 124Heewan Park, Hyun-il Lim, Seokwoo Choi, Taisook Han. Detecting Common Modules in Java Packages Based on Static Object Trace Birthmark
125 -- 135Sebastián Basterrech, Samir Mohamed, Gerardo Rubino, Mostafa Soliman. Levenberg - Marquardt Training Algorithms for Random Neural Networks
136 -- 138David Hartley. EDSAC at 60 - A Celebration of 60 Years Since the First Program Ran on the EDSAC at Cambridge
139 -- 142David Barron. EDSAC: A Programmer Remembers
143 -- 147Doron Swade. Inventing the User: EDSAC in Context
148 -- 156Davide Cavagnino, Albert Werbrouck. An Analysis of Associated Dividends in the DBM Algorithm for Division by Constants Using Multiplication
157 -- 163GuanJun Liu, Changjun Jiang, Daniel Y. Chao. A Necessary and Sufficient Condition for the Liveness of Normal Nets
164 -- 184Jing Dong, Tu Peng, Yajing Zhao. On Instantiation and Integration Commutability of Design Pattern