default search action
The Computer Journal, Volume 44, 2001
Volume 44, Number 1, 2001
- Michael Luck, Mark d'Inverno:
A Conceptual Framework for Agent Definition and Development. 1-20 - Giuseppe Anastasi, Alberto Bartoli, Nicoletta De Francesco, Antonella Santone:
Efficient Verification of a Multicast Protocol for Mobile Computing. 21-30 - Sijing Zhang, E. Stewart Lee, Alan Burns:
Determining the Worst-case Synchronous Message Response Time in FDDI Networks. 31-41 - Juha Puustjärvi:
Workflow Concurrency Control. 42-53 - Jason Crampton, George Loizou, Greg O'Shea:
A Logic of Access Control. 54-66
Volume 44, Number 2, 2001
- Nicholas M. Donofrio:
Turing Memorial Lecture. 67-74 - Evaggelia Pitoura, Ioannis Fudos:
Distributed Location Databases for Tracking Highly Mobile Objects. 75-91 - Roberto Baldoni, Francesco Quaglia, Michel Raynal:
Consistent Checkpointing for Transaction Systems. 92-100 - Francis C. M. Lau, Philip K. W. Cheng, Savio S. H. Tse:
An Algorithm for the 2-Median Problem on Two-Dimensional Meshes. 101-108 - Nicoletta De Francesco, Alessandro Fantechi, Stefania Gnesi, Paola Inverardi:
Finite Approximations for Model Checking Non-finite-state Processes. 109-123 - Daniel Y. Chao, Jose A. Nicdao:
Liveness for Synchronized Choice Petri Nets. 124-136 - Jason Crampton, George Loizou, Greg O'Shea:
A Logic of Access Control. 137-149
Volume 44, Number 3, 2001
- Willis H. Ware:
Introduction to Davies' paper. 151 - Donald W. Davies:
An Historical Study of the Beginnings of Packet Switching. 152-162 - Kostas Politopoulos, George F. Georgakopoulos, Panayotis Tsanakas:
Precedence Constrained Scheduling: A Case in P. 163-173 - Alan Stewart, Maurice Clint:
BSP-style Computation: a Semantic Investigation. 174-185 - Da-Qian Zhang, Kang Zhang, Jiannong Cao:
A Context-sensitive Graph Grammar Formalism for the Specification of Visual Languages. 186-200 - SangKeun Lee, Chong-Sun Hwang:
Unified Protocols of Concurrency Control and Recovery in Distributed Object-based Databases. 201-213 - Choi-Hong Lai, Cos S. Ierotheou, Charaka J. Palansuriya, Koulis A. Pericleous:
Performance Evaluation of a Distributed Algorithm for an Inverse Heat Conduction Problem. 214-220
Volume 44, Number 4, 2001
- Alexis C. Kaporis, Lefteris M. Kirousis, Evangelos Kranakis, Danny Krizanc, Yannis C. Stamatiou, Elias C. Stavropoulos:
Locating Information with Uncertainty in Fully Interconnected Networks with Applications to World Wide Web Information Retrieval. 221-229 - Howard Bowman, Jeremy W. Bryans, John Derrick:
Analysis of a Multimedia Stream using Stochastic Process Algebra. 230-245 - H. M. W. Verbeek, Twan Basten, Wil M. P. van der Aalst:
Diagnosing Workflow Processes using Woflan. 246-279 - Yuke Wang, Carl McCrosky, Xiaoyu Song:
Single-faced Boolean Functions and their Minimization. 280-291 - Limin Xiang, Kazuo Ushijima:
On O(1) Time Algorithms for Combinatorial Generation. 292-302 - Margarita Amor, Francisco Argüello, Juan López, Oscar G. Plata, Emilio L. Zapata:
A Data-Parallel Formulation for Divide and Conquer Algorithms. 303-320 - Erkki Mäkinen:
Comment on 'A Framework for Modelling Trojans and Computer Virus Infection'. 321-323 - Harold W. Thimbleby, Stuart Anderson, Paul A. Cairns:
Reply to 'Comment on "A Framework for Modelling Trojans and Computer Virus Infection"' by E. Mäkinen. 324-325 - Fred Cohen:
Reply to 'Comment on "A Framework for Modelling Trojans and Computer Virus Infection"' by E. Mäkinen. 326-327
Volume 44, Number 5, 2001
- Xiaohua Jia, Deying Li, Xiao-Dong Hu, Ding-Zhu Du:
Optimal Placement of Web Proxies for Replicated Web Servers in the Internet. 329-339 - Aline Baggio, Gerco Ballintijn, Maarten van Steen, Andrew S. Tanenbaum:
Efficient Tracking of Mobile Objects in Globe. 340-353 - San-Yuan Wang, Yu-Chee Tseng, Ching-Sung Shiu, Jang-Ping Sheu:
Balancing Traffic Load for Multi-Node Multicast in a Wormhole 2-D Torus/Mesh. 354-367 - Jehad Al-Sadi, Khaled Day, Mohamed Ould-Khaoua:
Probability-based Fault-tolerant Routing in Hypercubes. 368-373 - Guihai Chen, Francis C. M. Lau:
Layout of the Cube-connected Cycles without Long Wires. 374-383 - Jitian Xiao, Yanchun Zhang, Xiaohua Jia:
Clustering Non-uniform-sized Spatial Objects to Reduce I/O Cost for Spatial-join Processing. 384-397 - Ngoc Thanh Nguyen:
Consensus-based Timestamps in Distributed Temporal Databases. 398-409 - David E. Losada, Alvaro Barreiro:
A Logical Model for Information Retrieval based on Propositional Logic and Belief Revision. 410-424 - Robert W. P. Luk:
Compact Morphic Directed Acyclic Word Graphs. 425-434 - Ousmane Koné:
A Local Approach to the Testing of Real-time Systems. 435-447 - Carlos Canal, Lidia Fuentes, Ernesto Pimentel, José M. Troya, Antonio Vallecillo:
Extending CORBA Interfaces with Protocols. 448-462 - Gwoboa Horng:
An Efficient and Secure Protocol for Multi-party Key Establishment. 463-470
Volume 44, Number 6, 2001
- Ing-Ray Chen:
Special Issue Editorial: High Assurance Systems. 471-472 - Tadashi Dohi, Katerina Goseva-Popstojanova, Kishor S. Trivedi:
Estimating Software Rejuvenation Schedules in High-Assurance Systems. 473-485 - Steve Goddard, Kevin Jeffay:
Managing Latency and Buffer Requirements in Processing Graph Chains. 486-503 - Jeffrey J. P. Tsai, Eric Y. T. Juan:
Modeling and Verification of High-Assurance Properties of Safety-Critical Systems. 504-530 - Iain Bate, Philippa Conmy, Tim Kelly, John A. McDermid:
Use of Modern Processors in Safety-Critical Applications. 531-543 - Fabrizio Grandoni, Silvano Chiaradonna, Felicita Di Giandomenico, Andrea Bondavalli:
Evaluation of Fault-Tolerant Multiprocessor Systems for High Assurance Applications. 544-556 - Zhiwei Xu, Taghi M. Khoshgoftaar:
Software Quality Prediction for High-Assurance Network Telecommunications Systems. 557-568 - Alessandro F. Garcia, Delano M. Beder, Cecília M. F. Rubira:
A Unified Meta-Level Software Architecture for Sequential and Concurrent Exception Handling. 569-587
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.