Journal: J. UCS

Volume 3, Issue 9

1022 -- 0Hermann A. Maurer. Managing Editor s Column
1023 -- 1036Cunsheng Ding, Tero Laihonen, Ari Renvall. Linear Multisecret-Sharing Schemes and Error-Correcting Codes
1037 -- 1055Martti Forsell. MTAC - A Multithreaded VLIW Architecture for PRAM Simulation
1056 -- 1073Young Dae Lee, Beom Hee Lee. Genetic Trajectory Planner for a Manipulator with Acceleration Parametrization
1074 -- 1083Lutz Prechelt. Why We Need an Explicit Forum for Negative Results

Volume 3, Issue 8

835 -- 842Uwe M. Borghoff, Remo Pareschi. Information Technology for Knowledge Management
843 -- 864Wolfgang Prinz, Anja Syri. Two complementary tools for the cooperation in a ministerial environment
865 -- 898Carla Simone, Monica Divitini. Ariadne: Supporting Coordination through a Flexible Use of the Knowledge on Work Processes
899 -- 928Simon Buckingham Shum. Negotiating the Construction and Reconstruction of Organisational Memories
929 -- 954Otto Kühn, Andreas Abecker. Corporate Memories for Knowledge Management in Industrial Practice: Prospects and Challenges
955 -- 987Dietmar Rösner, Brigitte Grote, Knut Hartmann, Björn Höfling. From Natural Language Documents to Sharable Product Knowledge: A Knowledge Engineering Approach
988 -- 1006Humphrey Sorensen, Adrian O Riordan, Colm O Riordan. Profiling with the INFOrmer Text Filtering Agent
1007 -- 1021Gianni Amati, Daniela D. Aloisi, Vittorio Giannini, Flavio Ubaldini. A Framework for Filtering News and Managing Distributed Data

Volume 3, Issue 7

754 -- 755Hermann A. Maurer. Managing Editor s Column
756 -- 801Richard Banach. MONSTR II - Suspending Semantics and Independence
803 -- 812S. Manoharan. Bounds on the Performance of Work-greedy Assignment Schemes
813 -- 820Ioan Tomescu. Optimum Huffman Forests
821 -- 834Peter E. Undrill, Kostas Delibasis, George G. Cameron. Stack Filter Design Using a Distributed Parallel Implementation of Genetic Algorithms

Volume 3, Issue 6

702 -- 0Hermann A. Maurer. Managing Editor s Column
703 -- 720Marc Bernard, François Jacquenet. Free Space Modeling for Placing Rectangles without Overlapping
721 -- 729Kaoru Kurosawa, Takashi Satoh, K. Yamamoto. Highly Nonlinear t-resilient Functions
730 -- 753Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta. Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases

Volume 3, Issue 5

414 -- 415Egon Börger. JUCS Special ASM Issue, Part II - Introduction
416 -- 442Philipp W. Kutter, Alfonso Pierantonio. Montages Specifications of Realistic Programming Languages
443 -- 503Philipp W. Kutter, Alfonso Pierantonio. The Formal Specification of Oberon
504 -- 567Wolf Zimmermann, Thilo Gaul. On the Construction of Correct Compiler Back-Ends: An ASM-Approach
568 -- 602Lourdes Araujo. Correctness Proof of a Distributed Implementation of Prolog by Means of Abstract State Machines
603 -- 665Egon Börger, Luca Mearelli. Integrating ASMs into the Software Development Life Cycle
666 -- 688Luca Mearelli. Refining an ASM Specification of the Production Cell to C++ Code
689 -- 701Kirsten Winter. Model Checking for Abstract State Machines

Volume 3, Issue 4

230 -- 232Egon Börger. Ten Years of Gurevich s Abstract State Machines
233 -- 246Yuri Gurevich, Marc Spielmann. Recursive Abstract State Machines
247 -- 278Andreas Blass, Yuri Gurevich. The Linear Time Hierarchy Theorems for Abstract State Machines and RAMs
279 -- 303Scott Dexter, Patrick Doyle, Yuri Gurevich. Gurevich Abstract State Machines and Schoenhage Storage Modification Machines
304 -- 319Karl Stroetmann. The Constrained Shortest Path Problem: A Case Study in Using ASMs
320 -- 340Yuri Gurevich, Nandit Soparkar, Charles Wallace. Formalizing Database Recovery
341 -- 376Keehang Kwon. A Structured Presentation of a Closure-Based Compilation Method for a Scoping Notion in Logic Programming
377 -- 413Gerhard Schellhorn, Wolfgang Ahrendt. Reasoning about Abstract State Machines: The WAM Case Study

Volume 3, Issue 3

147 -- 0Hermann A. Maurer. Managing Editor s Column
148 -- 171Nils Andersen. Linear Time Simulation of Invertible Non-Deterministic Stack Algorithms
172 -- 184Asat Arslanov. Difference Splittings of Recursively Enumerable Sets
185 -- 196Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk. On the Weakness of Gong s Collisionful Hash Functions
197 -- 229Lane A. Hemaspaandra, Zhigen Jiang, Jörg Rothe, Osamu Watanabe. Polynomial-Time Multi-Selectivity

Volume 3, Issue 2

69 -- 0Hermann A. Maurer. Managing Editor s Column
70 -- 85Peter M. Fenwick. Symbol Ranking Text Compression with Shannon Recodings
86 -- 119Jamaludin Omar, James M. Noras. Prototyping on the PC with Programmable Hardware
120 -- 146Jürgen F. H. Winkler. Type Compatibility for Extensible Module Types, Their Reference Parameters, and Their Pointer Types

Volume 3, Issue 12

1282 -- 0Hermann A. Maurer. Managing Editor s Column
1283 -- 1336Richard Banach. MONSTR V - Transitive Coercing Semantics and the Church-Rosser Property
1337 -- 1381Giampaolo Bella, Elvinia Riccobene. Formal Analysis of the Kerberos Authentication System
1382 -- 1414Uwe Glässer, Rene Karges. Abstract State Machine Semantics of SDL
1415 -- 0Padmanabhan Krishnan. An Asynchronous Calculus Based on the Absence of Actions

Volume 3, Issue 11

1133 -- 0Douglas S. Bridges, Cristian Calude, Michael J. Dinneen, Bakhadyr Khoussainov. Logic in Computer Science
1134 -- 1147Takahito Aoto, Yoshihito Toyama. Persistency of Confluence
1148 -- 1161Douglas S. Bridges, Wang Yuchuan. Constructive Aspects of the Dirichlet Problem
1162 -- 1166Cristian Calude, André Nies. Chaitin Omega Numbers and Strong Reducibilities
1167 -- 1179Cristian Calude, Ioan Tomescu. Optimum Extendible Prefix Codes
1180 -- 1193Elena Calude, Marjo Lipponen. Minimal Deterministic Incomplete Automata
1194 -- 1198Bruno Courcelle, Rodney G. Downey, Michael R. Fellows. A Note on the Computability of Graph Minor Obstruction Sets for Monadic Second Order Ideals
1199 -- 1206Michael J. Dinneen. Too Many Minor Order Obstructions
1207 -- 1225Ulrich Günther, Peter Hertling, Radu Nicolescu, Mark R. Titchener. Representing Variable-Length Codes in Fixed-Length T-Depletion Format in Encoders and Decoders
1226 -- 1240Peter Hertling. Surjective Functions on Computably Growing Cantor Sets
1241 -- 1249Peter Hertling, Yongge Wang. Invariance Properties of Random Sequences
1250 -- 1254Hajime Ishihara. Sequential Continuity of Linear Mappings in Constructive Mathematics
1255 -- 1265Hajime Ishihara, Bakhadyr Khoussainov. Effectiveness of the Completeness Theorem for an Intermediate Logic
1266 -- 1281Yoshihiko Murakawa, Satoshi Tojo, Susumu Kunifuji. Imperfect Information Flow of Agents Communication in Arrow Logic

Volume 3, Issue 10

1084 -- 0Hermann A. Maurer. Managing Editor s Column
1085 -- 1099Anton Cerný. Optimal Description of Automatic Paperfolding Sequences
1100 -- 1113Karel Culik II, Vladimir Valenta, Jarkko Kari. Compression of Silhouette-like Images based on WFA
1114 -- 1120Juha Honkala. On N-algebraic Parikh slender power series
1121 -- 1125Bernd Rederlechner, Jörg Keller. A Note on Correctness Proofs for Overflow Detection Logic in Adders for d-th Complement Numbers
1126 -- 1132Hermann A. Maurer. On Two Aspects of Improving Web-Based Training

Volume 3, Issue 1

1 -- 0Hermann A. Maurer. Managing Editor s Column
2 -- 22Vaclav Dvorak. Bounds on Size of Decision Diagrams
23 -- 41Evgenija D. Popova, Christian P. Ullrich. Generalizing BIAS Specifications
42 -- 68David B. Skillicorn. Structured Parallel Parallel Computation in Structured Documents