default search action
The Computer Journal, Volume 49, 2006
Volume 49, Number 1, January 2006
- Fairouz Kamareddine:
Capsule Reviews. 1-3
- Robert M. Colomb:
Formal versus Material Ontologies for Information Systems Interoperation in the Semantic Web. 4-19
- Duncan Martin, Helen Ashman:
Atomic Hypermedia. 20-31
- Jixin Ma, Patrick J. Hayes:
Primitive Intervals versus Point-Based Intervals: Rivals or Allies? 32-41
- Gianluca Dini, Giuseppe Lettieri, Lanfranco Lopriore:
Caching and prefetching algorithms for programs with looping reference patterns. 42-61
- Nikos A. Lorentzos, José Ramon Rios Viqueira:
Relational Formalism for the Management of Spatial Data. 62-81
- Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo:
From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures. 82-96 - Stelvio Cimato, Roberto De Prisco, Alfredo De Santis:
Probabilistic Visual Cryptography Schemes. 97-107 - Alexei Vernitski:
Can Unbreakable Mean Incomputable? 108-112
- Pablo H. Ibargüengoytia, Sunil Vadera, Luis Enrique Sucar:
A Probabilistic Model for Information and Sensor Validation. 113-126
Volume 49, Number 2, March 2006
- Capsule Reviews. 133
- Fionn Murtagh:
Editorial. 134-135
- Erol Gelenbe:
Editorial: Building Adaptivity into Computer Networks. 136 - Gerardo Rubino, Martín Varela, Jean-Marie Bonnin:
Controlling Multimedia QoS in the Future Home Network Using the PSQA Metric. 137-155 - Jeremy Pitt, Lloyd Daniel Kamara, Marek J. Sergot, Alexander Artikis:
Voting in Multi-Agent Systems. 156-170 - Ricardo Lent:
Design of a MANET Testbed Management System. 171-179 - András György, György Ottucsák:
Adaptive Routing Using Expert Advice. 180-189 - Taskin Koçak:
A Hybrid Network Processor with Support for High-Speed Execution of CPN and Upper Layer IP Protocols. 190-200
- Margarita Amor, Montserrat Bóo, Emilio J. Padrón, Dirk Bartz:
Hardware Oriented Algorithms for Rendering Order-Independent Transparency. 201-210 - Kostas Bousias, Nabil Hasasneh, Chris R. Jesshope:
Instruction Level Parallelism through Microthreading - A Scalable Approach to Chip Multiprocessors. 211-233
- Cinzia Bernardeschi, Giuseppe Lettieri, Luca Martini, Paolo Masci:
Using Control Dependencies for Space-Aware Bytecode Verification. 234-248
Volume 49, Number 3, May 2006
- Fairouz Kamareddine:
Capsule Reviews. 255-257
- Mehmet Savsar, Fawaz S. Al-Anzi:
Reliability of Data Allocation on a Centralized Service Configuration with Distributed Servers. 258-267 - Alain Cournier, Stéphane Devismes, Franck Petit, Vincent Villain:
Snap-Stabilizing Depth-First Search on Arbitrary Networks. 268-280
- Apostolos N. Papadopoulos, Alexandros Nanopoulos, Yannis Manolopoulos:
Processing Distance Join Queries with Constraints. 281-296
- Moses Reuven, Yair Wiseman:
Medium-Term Scheduler as a Solution for the Thrashing Effect. 297-309
- Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai:
Unconditionally Secure Anonymous Encryption and Group Authentication. 310-321 - Javier Herranz:
Deterministic Identity-Based Signatures for Partial Aggregation. 322-330
- Karnig Derderian, Robert M. Hierons, Mark Harman, Qiang Guo:
Automated Unique Input Output Sequence Generation for Conformance Testing of FSMs. 331-344
- Per Martin-Löf:
100 years of Zermelo's axiom of choice: what was the problem with it? 345-350
- James F. Korsh:
Skarbek's Algorithm for t-Ary Trees. 351-357 - Sung Eun Bae, Tadao Takaoka:
Improved Algorithms for the K-Maximum Subarray Problem. 358-374
Volume 49, Number 4, July 2006
- Fairouz Kamareddine:
Capsule Reviews. 381-382
- Robin Milner:
Ubiquitous Computing: Shall we Understand It? 383-389 - Discussion on Robin Milner's First Computer Journal Lecture: Ubiquitous Computing: Shall We Understand It? 390-399
- Chung-Ming Huang, Ching-Hsien Tsai, Ming-Chi Tsai:
Design and Implementation of Video Streaming Hot-plug between Wired and Wireless Networks Using SCTP. 400-417 - Tsz-Yeung Wong, K. T. Law, John C. S. Lui, Man Hon Wong:
An Efficient Distributed Algorithm to Identify and Traceback DDoS Traffic. 418-442
- Barry Doyle, Stuart Bell, Alan F. Smeaton, Kealan McCusker, Noel E. O'Connor:
Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks. 443-453 - Juan Fernández, Eitan Frachtenberg, Fabrizio Petrini, José Carlos Sancho:
An Abstract Interface for System Software on Large-Scale Clusters. 454-469 - Daniel Yuh Chao:
Computation of Elementary Siphons in Petri Nets For Deadlock Control. 470-479
- Alan Bundy:
A Very Mathematical Dilemma. 480-486
- Patrick Martin, Wendy Powley, Xiaoyi Xu, Wenhu Tian:
Automated Configuration of Multiple Buffer Pools. 487-499
Volume 49, Number 5, September 2006
- Fairouz Kamareddine:
Capsule Reviews. 505-506
- Ing-Ray Chen, Bojan Cukic:
High Assurance Software Systems. 507-508 - Jinchun Xia, Carl K. Chang, Jeffrey C. Wise, Yujia Ge:
An Empirical Performance Study on PSIM. 509-526 - Guohui Li, LihChyun Shu:
Design and Evaluation of a Low-Latency Checkpointing Scheme for Mobile Computing Systems. 527-540 - Qizhi Ye, Yu Lei, David Chenho Kung:
A Blocking-based Approach to Protocol Validation. 541-553 - Engin Kirda, Christopher Krügel:
Protecting Users against Phishing Attacks. 554-561
- José Luis Sierra, Alfredo Fernández-Valmayor, Baltasar Fernández-Manjón:
A Document-Oriented Paradigm for the Construction of Content-Intensive Applications. 562-584
- Tiziana Calamoneri:
The L(h, k)-Labelling Problem: A Survey and Annotated Bibliography. 585-608
- Alexander Thomasian, Lijuan Zhang:
The Stepwise Dimensionality Increasing (SDI) Index for High-Dimensional Data. 609-618
- Apostolos Syropoulos:
Fuzzifying P Systems. 619-628
Volume 49, Number 6, November 2006
- Fairouz Kamareddine:
Capsule Reviews. 631-633
- Yi-Sheng Huang:
Design of Traffic Light Control Systems Using Statecharts. 634-649
- Frank Land:
Leo II and the Model T Ford. 650-656
- Jorma Rissanen:
The Structure Function and Distinguishable Models of Data. 657-664
- Dick den Hertog, P. B. Hulshof:
Solving Rummikub Problems by Integer Linear Programming. 665-669
- Alexander Thomasian, Lijuan Zhang:
Persistent Semi-Dynamic Ordered Partition Index. 670-684
- Samir M. Koriem:
Development, Analysis and Evaluation of Performance Models for Mobile Multi-Agent Networks. 685-709 - Vlad Rusu:
Verifying an ATM Protocol Using a Combination of Formal Techniques. 710-730
- Betül Demiröz, Haluk Rahmi Topcuoglu:
Static Task Scheduling with a Unified Objective on Time and Resource Domains. 731-743
- Carlos A. G. Assis, Edil S. T. Fernandes, Valmir Carneiro Barbosa:
Modeling the Input History of Programs for Improved Instruction-Memory Performance. 744-761
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.