default search action
The Computer Journal, Volume 50, 2007
Volume 50, Number 1, January 2007
- Fairouz Kamareddine:
Capsule Reviews. 1-3 - Editorial on the Occasion of Volume 50 of The Computer Journal. 4-6
- Zhongqiang Chen, Zhongrong Chen, Alex Delis:
An Inline Detection and Prevention Framework for Distributed Denial of Service Attacks. 7-40 - Yuh-Min Tseng:
A secure authenticated group key agreement protocol for resource-limited mobile devices. 41-52
- Rachid Guerraoui, Michel Raynal:
The Alpha of Indulgent Consensus. 53-67
- Kil Hong Joo, Won Suk Lee:
An Adaptive Materialization Method for Globally Optimized Query Evaluation in a Hierarchical Mediator System. 68-80
- Hooman Nikmehr, Braden Phillips, Cheng-Chew Lim:
A Fast Radix-4 Floating-Point Divider with Quotient Digit Selection by Comparison Multiples. 81-92
- Ralf Gitzel, Ingo Ott, Martin Schader:
Ontological Extension to the MOF Metamodel as a Basis for Code Generation. 93-115 - Jesús Manuel Almendros-Jiménez, Luis Iribarne:
Describing Use-Case Relationships with Sequence Diagrams. 116-128
Volume 50, Number 2, March 2007
- Fairouz Kamareddine:
Capsule Reviews. 131-133
- Roland Rüdiger:
Quantum Programming Languages: An Introductory Overview. 134-150
- Alexander Gammerman, Vladimir Vovk:
Hedging Predictions in Machine Learning: The Second Computer Journal Lecture. 151-163 - Discussion on Hedging Predictions in Machine Learning by A. Gammerman and V. Vovk. 164-172
- Alexander Gammerman, Vladimir Vovk:
Rejoinder Hedging Predictions in Machine Learning. 173-177
- A. Bakalis, Costas S. Iliopoulos, Christos Makris, Spyros Sioutas, Evangelos Theodoridis, Athanasios K. Tsakalidis, Kostas Tsichlas:
Locating Maximal Multirepeats in Multiple Strings Under Various Constraints. 178-185 - Abdelrahman Amer, B. John Oommen:
A Novel Framework for Self-Organizing Lists in Environments with Locality of Reference: Lists-on-Lists. 186-196
- Doina Bein, Ajoy Kumar Datta, Vincent Villain:
Self-Stabilizing Local Routing in Ad Hoc Networks. 197-203 - Sheng-Tzong Cheng, Ming-Hung Tao:
A Scheduling-Based Medium Access Control Protocol for Supporting Multi-class Services in Wireless Networks. 204-216
- Alexander Thomasian, Gang Fu, Spencer W. Ng:
Analysis of Rebuild Processing in RAID5 Disk Arrays. 217-231
- W. Paul Cockshott, Greg Michaelson:
Are There New Models of Computation? Reply to Wegner and Eberbach. 232-247
- Ricardo P. Jasinski:
Fault-Tolerance Techniques for SRAM-Based FPGAs. 248 - Carlos Caldeira:
The Microsoft Data Warehouse Toolkit. 249 - Marino Segnan:
Web Data Management Practices - Emerging Techniques and Technologies. 249-250
Volume 50, Number 3, May 2007
- Fairouz Kamareddine:
Capsule Reviews. 251-253
- Tony Hoare:
The Ideal of Program Correctness: Third Computer Journal Lecture. 254-260 - Discussion on The Ideal of Program Correctness by Tony Hoare. 261-268
- Discussion on The Ideal of Program Correctness: Responses from Tony Hoare. 269-273
- Chris Mairs:
Inclusion and Exclusion in the Digital World: Turing Lecture 2006. 274-280
- Ing-Ray Chen, Weiping He, Baoshan Gu:
Proxy-based Regional Registration for Integrated Mobility and Service Management in Mobile IP Systems. 281-293
- H. M. W. Verbeek, Wil M. P. van der Aalst, Arthur H. M. ter Hofstede:
Verifying Workflows with Cancellation Regions and OR-joins: An Approach Based on Relaxed Soundness and Invariants. 294-314
- Monika Kapus-Kolar:
Testing as Collecting of Evidence: An Integrated Approach to Test Generation for Finite State Machines. 315-331
- Doina Bein, Ajoy Kumar Datta, Mehmet Hakan Karaata:
An Optimal Snap-Stabilizing Multi-Wave Algorithm. 332-340 - Tzong-Jye Liu, Chia-Lin Lee:
State-Optimal Alternator for Uniform Synchronous Rings. 341-347
- George F. Georgakopoulos, Kostas Politopoulos:
MAX-DENSITY Revisited: a Generalization and a More Efficient Algorithm. 348-356 - William Chung-Kung Yen:
Edge-Orienting on Split, Planar and Treelike Graphs. 357-368
- Peter Grünwald:
Christopher S. Wallace Statistical and Inductive Inference by Minimum Message Length. Springer (2005), ISBN 038723795X 432 pp, Hardbound. 369-370 - Mark Levene:
Artificial Intelligence for Games. Series in Interactive 3D Technology. 371 - Jorge Martínez Gil:
Thinking on the Web: Berners-Lee, Gödel and Turing. 371-372
Volume 50, Number 4, July 2007
- Fairouz Kamareddine:
Capsule Reviews. 373-374
- Karen Spärck Jones (1935-2007): Professor (emeritus) of Computers and Information, University of Cambridge. 375-376
- Ruqian Lu, Zhi-Hua Zhou:
Guest Editorial to the Special Issue on Advances of Artificial Intelligence and Knowledge Engineering in China. 377 - Wei Li:
R-Calculus: An Inference System for Belief Revision. 378-390 - Sanjiang Li, Bernhard Nebel:
Qualitative Spatial Representation and Reasoning: A Hierarchical Approach. 391-402 - Kaile Su, Abdul Sattar, Xiangyu Luo:
Model Checking Temporal Logics of Knowledge Via OBDDs. 403-420 - Hongli Liang, Jue Wang, Yiyu Yao:
User-Oriented Feature Selection for Machine Learning. 421-434
- Shan-Tai Chen, Shun-Shii Lin, Li-Te Huang:
A Two-Phase Optimization Algorithm For Mastermind. 435-443
- Roberto Baldoni, Roberto Beraldi, Leonardo Querzoni, Antonino Virgillito:
Efficient Publish/Subscribe Through a Self-Organizing Broker Overlay and its Application to SIENA. 444-459
- Amit Thawani, Srividya Gopalan, V. Sridhar, Krithi Ramamritham:
Context-aware Timely Information Delivery in Mobile Environments. 460-472
- Vladimir Yanovski, Israel A. Wagner, Alfred M. Bruckstein:
A Linear-Time Constant-Space Algorithm for the Boundary Fill Problem. 473-477
- Emilio Ancillotti, Raffaele Bruno, Marco Conti, Enrico Gregori, Antonio Pinizzotto:
A Layer-2 Framework for Interconnecting Ad Hoc Networks to Fixed Internet: Test-bed Implementation and Experimental Evaluation. 478-499
- Antonio Izquierdo Manzanares:
Professional Pen Testing for Web Applications - Programmer to Programmer Series (P2P). 500
Volume 50, Number 5, September 2007
- Fairouz Kamareddine:
Capsule Reviews. 501-504
- Dan C. Marinescu, Gabriela M. Marinescu:
The Boole Lecture Quantum Information: A Glimpse at the Strange and Intriguing Future of Information. 505-521
- Mehran S. Fallah, Ahmad R. Sharafat:
Service Availability in Concurrent Systems - Part I: A Theory of Hierarchical Services of Interacting Processes. 522-534 - Mehran S. Fallah, Ahmad R. Sharafat:
Service Availability in Concurrent Systems - Part II: Analysis and Case Studies Using HSIP. 535-554 - Der-Chiang Li, Fengming M. Chang:
An In-Out Combined Dynamic Weighted Round-Robin Method for Network Load Balancing. 555-566
- Mark Levene, Judit Bar-Ilan:
Comparing Typical Opening Move Choices Made by Humans and Chess Engines. 567-573
- Asep Juarna, Vincent Vajnovszki:
Some Generalizations of a Simion-Schmidt Bijection. 574-580 - Haydeh Ahrabian, Abbas Nowzari-Dalini:
Parallel Generation of t-Ary Trees in A-order. 581-588
- Qiang Tang:
On The Security of a Group Key Agreement Protocol. 589-590 - Kim-Kwang Raymond Choo:
A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model. 591-601 - Ren-Junn Hwang, Sheng-Hua Shiau:
Provably Efficient Authenticated Key Agreement Protocol for Multi-Servers. 602-615
- Jaesung Lee, Hyuk-Jae Lee, Chanho Lee:
A High-Speed Link Layer Architecture for Low Latency and Memory Cost Reduction. 616-628
Volume 50, Number 6, November 2007
- Fairouz Kamareddine:
Capsule reviews. 629
- Erol Gelenbe, Andrew Tilbrook, Richard Vinter:
Editorial: Introduction to the Special Issue. 630-631 - Robert A. Ghanea-Hercock, Erol Gelenbe, Nicholas R. Jennings, Oliver Smith, David N. Allsopp, Alex Healing, Hakan Duman, Simon Sparks, Nishan C. Karunatillake, Perukrishnen Vytelingum:
Hyperion - Next-Generation Battlespace Information Services. 632-645 - Asher Mahmood, Philip M. Tudor, William Oxford, Robert Hansford, James D. B. Nelson, Nicholas G. Kingsbury, Antonis Katartzis, Maria Petrou, Nikolaos Mitianoudis, Tania Stathaki, Alin Achim, David R. Bull, Cedric Nishan Canagarajah, Stavri G. Nikolov, Artur Loza, Nedeljko Cvejic:
Applied Multi-Dimensional Fusion. 646-659 - Nikolaos Mitianoudis, Tania Stathaki:
Joint Fusion and Blind Restoration For Multiple Image Scenarios With Missing Data. 660-673 - William Ng, Jack Li, Simon J. Godsill, Sze Kim Pang:
Multitarget Initiation, Tracking and Termination Using Bayesian Monte Carlo Methods. 674-693 - Samuel M. Waldron, John Patrick, Phillip L. Morgan, Sophia L. King:
Influencing Cognitive Strategy by Manipulating Information Access. 694-702 - Paul R. Smart, Alistair Russell, Nigel R. Shadbolt, m. c. schraefel, Les Carr:
AKTiveSA: A Technical Demonstrator System For Enhanced Situation Awareness. 703-716 - Gülay Öke, Georgios Loukas:
A Denial of Service Detector based on Maximum Likelihood Detection and the Random Neural Network. 717-727
- Imtiaz Ahmad, A. Shoba Das:
Analysis and Detection Of Errors In Implementation Of SHA-512 Algorithms On FPGAs. 728-738 - Chung-Ming Huang, Jian-Wei Li:
Efficient and Provably Secure IP Multimedia Subsystem Authentication for UMTS. 739-757
- Jan Peters:
Computational Intelligence: Principles, Techniques and Applications. 758
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.