default search action
The Computer Journal, Volume 42, 1999
Volume 42, Number 1, 1999
- Lloyd Allison, David R. Powell, Trevor I. Dix:
Compression and Approximate Matching. 1-10 - Seyit Kocberber, Fazli Can, Jon M. Patton:
Optimization of Signature File Parameters for Database with Varying Record Lengths. 11-23 - Manhoi Choy:
Consistent Implementations of Replicated Objects. 24-38 - Gajanan S. Chinchwadkar, Angela Goh:
An Overview of Vertical Partitioning in Object-Oriented Databases. 39-50 - Carlo Blundo, Paolo D'Arco, Antonio Giorgio Gaggia:
A tau-Restricted Key Agreement Scheme. 51-61 - Samia Loucif, Mohamed Ould-Khaoua, Lewis M. Mackenzie:
On the Performance Merits of Bypass Channels in Hypermeshes and k-Ary n-Cubes. 62-72
Volume 42, Number 2, 1999
- Birgit Schieder, Manfred Broy:
Adapting Calculational Logic to the Undefined. 73-81 - Richard F. Paige:
Integrating a Program Design Calculus and a Subset of UML. 82-99 - Ykä Huhtala, Juha Kärkkäinen, Pasi Porkka, Hannu Toivonen:
TANE: An Efficient Algorithm for Discovering Functional and Approximate Dependencies. 100-111 - Chung-Ming Huang, Ming-Yuhe Jang:
Interactive Temporal Behaviours and Modelling for Multimedia Presentations in te WWW Environment. 112-128 - Min-Sheng Lin, Deng-Jyi Chen, Maw-Sheng Horng:
The Reliability Analysis of Distributed Computing Systems with Imperfect Nodes. 129-141 - Weng-Fai Wong:
Source Level Static Branch Prediction. 142-149
Volume 42, Number 3, 1999
- Harry W. Agius, Marios C. Angelides:
COSMOS - Content Oriented Semantic Modelling Overlay Scheme. 153-176 - Richard Bornat, Bernard Sufrin:
Animating Formal Proof at the Surface: The Jape Proof Calculator. 177-192 - Hugh E. Williams, Justin Zobel:
Compressing Integers for Fast File Access. 193-201 - Weijia Jia, Jiannong Cao, To-Yat Cheung, Xiaohua Jia:
A Multicast Protocol Based on a Single Logical Ring Using a Virtual Token and Logical Clocks. 202-220 - Kecheng Liu, Tina Ong:
A Modelling Approach for Handling Business Rules and Exceptions. 221-231 - Ahmad A. Hiasat, Hoda S. Abdel-Aty-Zohdy:
Semi-Custom VLSI Design and Implementation of a New Efficient RNS Division Algorithm. 232-240 - Neven Tomov, Euan W. Dempster, M. Howard Williams, Peter J. B. King, Albert G. Burger:
Approximate Estimation of Transaction Response Time. 241-250
Volume 42, Number 4, 1999
- Alexander Gammerman, Vladimir Vovk:
Kolmogorov Complexity: Sources, Theory and Applications. 252-255 - Ray J. Solomonoff:
Two Kinds of Probabilistic Induction. 256-259 - Jorma Rissanen:
Hypothesis Selection and Testing by the MDL Principle. 260-269 - Chris S. Wallace, David L. Dowe:
Minimum Message Length and Kolmogorov Complexity. 270-283 - Leonid A. Levin:
Robust Measures of Information. 284-286 - Tao Jiang, Ming Li, Paul M. B. Vitányi:
New Applications of the Incompressibility Method. 287-293 - Vladimir V. V'yugin:
Algorithmic Complexity and Stochastic Properties of Finite Binary Sequences. 294-317 - Vladimir Vovk, Alexander Gammerman:
Complexity Approximation Principle. 318-322 - A. Philip Dawid:
Discussion of the Papers by Rissanen and by Wallace and Dowe. 323-326 - Jorma Rissanen:
Discussion of Paper 'Minimum Message Length and Kolmogorov Complexity' by C. S. Wallace and D. L. Dowe. 327-329 - Chris S. Wallace, David L. Dowe:
Refinements of MDL and MML Coding. 330-337 - Bertrand S. Clarke:
Discussion of the Papers by Rissanen, and by Wallace and Dowe. 338-339 - Alexander Shen:
Discussion on Kolmogorov Complexity and Statistical Analysis. 340-342 - Jorma Rissanen:
Rejoinder. 343-344 - Chris S. Wallace, David L. Dowe:
Rejoinder. 345-347
Volume 42, Number 5, 1999
- Arthur H. M. ter Hofstede, Maria E. Orlowska:
On the Complexity of Some Verification Problems in Process Control Specifications. 349-359 - Norman Ramsey:
Eliminating Spurious Error Messages Using Exceptions, Polymorphism, and Higher-Order Functions. 360-372 - Mayez A. Al-Mouhamed:
Evolution-Based Scheduling of Computations and Communications on Distributed Memory Multicomputers. 373-390 - Robert W. P. Luk:
Near Optimal beta Heap. 391-399 - Tadao Takaoka:
O(1) Time Algorithms for Combinatorial Generation by Tree Traversal. 400-408 - Po-Jen Chuang, Huey-Ming Hsu:
Effective Fault Diagnosis Approaches for Multiphath Networks. 409-421 - Miroslav Bojovic, Milo Tomasevic, Jovan Djordjevic:
The Interactive Development and Testing System for a RISC-Style Processor. 422-429 - Tsong Yueh Chen, Man Fai Lau:
On the Completeness of a Test Suite Reduction Strategy. 430-440
Volume 42, Number 6, 1999
- Mohan Kumar:
Special Issue Editorial: Mobile Computing. 441 - Kevin W. Froese, Richard B. Bunt:
Cache Management for Mobile File Service. 442-454 - Cedric C. F. Fong, John C. S. Lui, Man Hon Wong:
Distributed Caching and Broadcast in a Wireless Mobile Computing Environment. 455-472 - Sajal K. Das, Sanjoy K. Sen:
Adaptive Location Prediction Strategies Based on a Hierarchical Network Model in a Cellular Mobile Environment. 473-486 - Sihui Zhou, Aruna Seneviratne, Terry Percival:
An Efficient Location Management Scheme for Hybrid Wireless Asynchronous Transfer Mode Networks. 487-500 - Ersan Kayan, Özgür Ulusoy:
An Evaluation of Real-Time Transaction Management Issues in Mobile Database Systems. 501-510 - Guan-Chi Chen, Suh-Yin Lee:
An Analytic Model for Performance Analysis of Concurrency Control Strategies in Mobile Environments. 511-521 - Kuang-Hwei Chi, Chien-Chao Tseng, Ting-Lu Huang:
A Framework for Mobile Multicast Using Dynamic Route Reconstructions. 522-533 - Timothy W. Bickmore, Andreas Girgensohn, Joseph W. Sullivan:
Web Page Filtering and Re-Authoring for Mobile Users. 534-546
Volume 42, Number 7, 1999
- Mounia Lalmas:
A Model for Representing and Retrieving Heterogeneous Structured Documents Based on Evidential Reasoning. 547-568 - Ning Zhang, Qi Shi, Madjid Merabti:
A Flexible Approach to Secure and Fair Document Exchange. 569-581 - Francesca Arcelli Fontana, Ferrante Formato, Remo Pareschi:
Computational Models for Information Reuse. 582-591 - Wanlei Zhou, Andrzej M. Goscinski:
Managing Replicated Remote Procedure Call Transactions. 592-608 - Esther Jennings:
Distributed Algorithms for Finding Central Paths in Tree Networks. 609-612 - Tatsuhiro Tsuchiya, Tohru Kikuno:
Availability Evaluation of Quorum-Based Mutual Exclusion Schemes in General Topology Networks. 613-622
Volume 42, Number 8, 1999
- Alexander B. Romanovsky:
On Structuring Cooperative and Competitive Concurrent Systems. 627-637 - Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang:
Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures. 638-649 - Martin P. Ward, Keith H. Bennett:
Recursion Removal/Introduction by Formal Transformation: An Aid to Program Development and Program Comprehension. 650-673 - Kam-yiu Lam, Chung-Leung Pang, Sang Hyuk Son, Jiannong Cao:
Resolving Executing-Committing Conflicts in Distributed Real-time Database Systems. 674-692 - Hing Leung, Tsong Yueh Chen:
A New Perspective of the Proportional Sampling Strategy. 693-698 - Voon-Yee Vee, Wen-Jing Hsu:
Applying Cilk in Provably Efficient Task Scheduling. 699-712
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.