default search action
The Computer Journal, Volume 48, 2005
Volume 48, Number 1, January 2005
- Vladimir B. Balakirsky:
Hashing of Databases with the Use of Metric Properties of the Hamming Space. 4-16 - Andrew Rae, Colin J. Fidge:
Information Flow Analysis for Fail-Secure Devices. 17-26 - Hung-Yu Chien, Ren-Chiun Wang, Chou Chen Yang:
Note on Robust and Simple Authentication Protocol. 27-29 - Wei-Yi Liu, Ning Song Hong Yao:
Temporal Functional Dependencies and Temporal Nodes Bayesian Networks. 30-41 - Andrew D. McGettrick, Roger D. Boyle, Roland N. Ibbett, John Lloyd, Gillian Lovegrove, Keith Mander:
Grand Challenges in Computing: Education - A Summary. 42-48 - Tony Hoare, Robin Milner:
Grand Challenges for Computing Research. 49-52 - Chung-Ming Huang, Tz-Heng Hsu:
A Resource Exchange Architecture for Peer-to-Peer File Sharing Applications. 53-71 - Jean-Pierre Ebert, Daniel Hollos, Holger Karl, Marc Löbbers:
Does Multi-Hop Communication Reduce Electromagnetic Exposure?. 72-83 - Kam-yiu Lam, BiYu Liang, Chuanlin Zhang:
On Using Handoff Statistics and Velocity for Location Management in Cellular Wireless Networks. 84-100 - Guang-Ho Cha:
The Segment-Page Indexing Method for Large Multidimensional Queries. 101-114 - Brian J. d'Auriol, Rajesh Molakaseema:
A Parameterized Linear Array with a Reconfigurable Pipelined Bus System: LARPBS(p). 115-125
Volume 48, Number 2, March 2005
- Mercedes Gómez-Albarrán:
The Teaching and Learning of Programming: A Survey of Supporting Software Tools. 130-144 - Fred Piper:
Cyberworld Security-the Good, the Bad and the Ugly*. 145-156 - Florentin Ipate:
On the Minimality of Finite Automata and Stream X-machines for Finite Languages. 157-167 - Chin-Chen Chang, Chih-Yang Lin:
Perfect Hashing Schemes for Mining Association Rules. 168-179 - Valentin E. Brimkov, Reneta P. Barneva:
Analytical Honeycomb Geometry for Raster and Volume Graphics. 180-199 - Ghada Hany Badr, B. John Oommen:
Self-Adjusting of Ternary Search Tries Using Conditional Rotations and Randomized Heuristics. 200-219 - Antonio Corral, Michael Vassilakopoulos:
On Approximate Algorithms for Distance-Based Queries using R-trees. 220-238 - Sébastien Cantarell, Ajoy Kumar Datta, Franck Petit, Vincent Villain:
Group Mutual Exclusion in Token Rings. 239-252
Volume 48, Number 3, 2005
- Fairouz Kamareddine:
Capsule Reviews. 257-258 - K. Subramani:
A Comprehensive Framework for Specifying Clairvoyance, Constraints and Periodicity in Real-Time Scheduling. 259-272 - Guray Yilmaz, Nadia Erdogan:
DCOBE: Distributed Composite Object-Based Environment. 273-291 - Alexander Thomasian, Chunqi Han:
Affinity-Based Routing in Zoned Mirrored Disks. 292-299 - Atakan Dogan, Füsun Özgüner:
Biobjective Scheduling Algorithms for Execution Time?Reliability Trade-off in Heterogeneous Computing Systems. 300-314 - Stephanie Perkins, Derek H. Smith:
Robust Data Compression: Variable Length Codes and Burst Errors. 315-322 - Nigel Thomas:
Editorial: Grid Performability. 323-324 - Aad P. A. van Moorsel:
Grid, Management and Self-Management. 325-332 - Mohammed H. Haji, Iain Gourlay, Karim Djemame, Peter M. Dew:
A SNAP-Based Community Resource Broker Using a Three-Phase Commit Protocol: A Performance Study. 333-346 - Daniel P. Spooner, Junwei Cao, Stephen A. Jarvis, Ligang He, Graham R. Nudd:
Performance-Aware Workflow Management for Grid Computing. 347-357 - Andrew Stephen McGough, Ali Afzal, John Darlington, Nathalie Furmento, Anthony Edward Mayer, Laurie Robert Young:
Making the Grid Predictable through Reservations and Performance Modelling. 358-368 - Anne Benoit, Murray Cole, Stephen Gilmore, Jane Hillston:
Scheduling Skeleton-Based Grid Applications Using PEPA and NWS. 369-378
- Paul Hulse:
Review: Beowulf Cluster Computing with Linux, Second Edition. 379-380 - Haoyang Che:
Review: From P2P to Web Services and Grids: Peers in a Client/Server World. 379
Volume 48, Number 4, 2005
- Fionn Murtagh:
Editorial. 381 - Fairouz Kamareddine:
Capsule Reviews. 382-384 - Jane Hillston:
Tuning Systems: From Composition to Performance (The Needham Lecture). 385-400 - Mónica Pinto, Lidia Fuentes, José M. Troya:
A Dynamic Component and Aspect-Oriented Platform. 401-420 - Robert M. Hierons, Mark Harman, Chris Fox:
Branch-Coverage Testability Transformation for Unstructured Programs. 421-436 - Hyung-Kyu Choi, Yoo C. Chung, Soo-Mook Moon:
Java Memory Allocation with Lazy Worst Fit for Small Objects. 437-442 - Santanu Chattopadhyay:
Area Conscious State Assignment with Flip-Flop and Output Polarity Selection for Finite State Machine Synthesis?A Genetic Algorithm Approach. 443-450 - Lieven Eeckhout, Yue Luo, Koen De Bosschere, Lizy Kurian John:
BLRL: Accurate and Efficient Warmup for Sampled Processor Simulation. 451-459 - Paul O'Neill, Karl Fraser, Zidong Wang, Paul Kellam, Joost N. Kok, Xiaohui Liu:
Pyramidic Clustering of Large-Scale Microarray Images. 466-479 - Yuh-Min Tseng:
A Robust Multi-Party Key Agreement Protocol Resistant to Malicious Participants. 480-487 - James F. Korsh:
Generating T-ary Trees in Linked Representation. 488-497 - Nikolaj A. Kuznetsov:
The Science of Infocommunications (The Boole Lecture). 460-465
- Daniel E. O'Leary:
Review: Ontologies: A Silver Bullet for Knowledge Management and Electronic Commerce. 498 - Yi Pan:
Review: Active Services: Concepts, Architecture and Implementation. 498-499 - J. Sethuraman:
Review: Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS. 499-500
Volume 48, Number 5, 2005
- Fairouz Kamareddine:
Capsule Reviews. 501
- Marios C. Angelides:
Editorial: Working with Multimedia Standards: MPEG-7, MPEG-21 and H.264. 502-503
- Hari Kalva, Borko Furht:
Complexity Estimation of the H.264 Coded Video Bitstreams. 504-513 - Herbert Van de Sompel, Jeroen Bekaert, Xiaoming Liu, Lyudmila Balakireva, Thorsten Schwander:
aDORe: A Modular, Standards-Based Digital Object Repository. 514-535 - William I. Grosky, Nilesh V. Patel, Xin Li, Farshad Fotouhi:
Dynamically Emerging Semantics in an MPEG-7 Image Database. 536-544 - Harry W. Agius, Marios C. Angelides:
COSMOS-7: Video-Oriented MPEG-7 Scheme for Modelling and Filtering of Semantic Content. 545-562
- Anastasis A. Sofokleous:
Review: H.264 and MPEG-4 Video Compression: Video Coding for Next-generation Multimedia. 563 - Minaz J. Parmar:
Review: Distributed Multimedia Database Technologies Supported by MPEG-7 and MPEG-21. 563-564
- Elizabeth Scott, Adrian Johnstone:
Generalized Bottom Up Parsers With Reduced Stack Activity. 565-587 - Xinmin Tian, Milind Girkar, Aart J. C. Bik, Hideki Saito:
Practical Compiler Techniques on Efficient Multithreaded Code Generation for OpenMP Programs. 588-601
- René Meier, Vinny Cahill:
Taxonomy of Distributed Event-Based Programming Systems. 602-626
Volume 48, Number 6, November 2005
- Fairouz Kamareddine:
Capsule Reviews. 627-629
- Jovan Djordjevic, Bosko Nikolic, M. Mitrovic:
A Memory System for Education. 630-641
- Leonid A. Levin:
Aperiodic Tilings: Breaking Translational Symmetry. 642-645
- Martin Campbell-Kelly:
Celebration of David Wheeler (1927-2004). 646-648 - David W. Barron:
David Wheeler: A Personal Memoir. 650-651
- Lefteris Moussiades, Athena Vakali:
PDetect: A Clustering Approach for Detecting Plagiarism in Source Code Datasets. 651-661 - Charlie Daly, Jane Horgan:
A Technique for Detecting Plagiarism in Computer Code. 662-666
- Fei He, Ming Gu, Xiaoyu Song, Zhiwei Tang, Guowu Yang, Lerong Cheng:
Probabilistic Estimation for Routing Space. 667-676
- Dana Shapira, James A. Storer:
In Place Differential File Compression. 677-691
- Li Jiao, To-Yat Cheung, Weiming Lu:
Handling Synchronization Problem in Petri Net-Based System Design by Property-Preserving Transition-Reduction. 692-701
- Alexander Thomasian:
Clustered RAID Arrays and Their Access Costs. 702-713
- Manuel Torres, José Samos:
A Methodology to Define External Schemas in ODMG Databases. 714-736
- Sebastian Danicic, Chris Fox, Mark Harman, Robert M. Hierons, John Howroyd, Michael R. Laurence:
Static Program Slicing Algorithms are Minimal for Free Liberal Program Schemas. 737-748
- Tak-Ming Chan, Kim-Fung Man, Kit-Sang Tang, Sam Kwong:
A Jumping Gene Algorithm for Multiobjective Resource Management in Wideband CDMA Systems. 749-768
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.