


default search action
The Computer Journal, Volume 41, 1998
Volume 41, Number 1, 1998
- Ana Cavalcanti, Jim Woodcock

:
A Weakest Precondition Semantics for Z. 1-15 - Michele Flammini, Jan van Leeuwen

, Alberto Marchetti-Spaccamela
:
The Complexity of Interval Routing on Random Graphs. 16-25 - Soo-Mook Moon, Kemal Ebcioglu:

The Performance Impact of Exploiting Branch ILP with Tree Representation of ILP Code. 26-44 - Giuseppe Alia, Enrico Martinelli:

Logic Design of a Fast Circuit for Iterative Additions in Redundant Hybrid. 45-51 - Ding-Ming Kwai, Behrooz Parhami:

Tight Bounds on the Diameter of Gaussian Cubes. 52-56 - Cos S. Ierotheou, Choi-Hong Lai, Charaka J. Palansuriya, Koulis A. Pericleous:

Simulation of 2-D Metal Cutting by Means of a Distributed Algorithm. 57-63
Volume 41, Number 2, 1998
- Martyn Thomas:

Myths of the Year 2000. 67-70 - Christopher B. Jones, J. Mark Ware:

Proximity Search with a Triangulated Spatial Model. 71-83 - Peter Bodorik

, Dawn N. Jutla:
Multi-View Memory Support to Operating Systems in Locking for Transaction and Database Systems. 84-97 - Bryan F. Jones, David E. Eyres, Harmen-Hinrich Sthamer:

A Strategy for Using Genetic Algorithms to Automate Branch and Fault-Based Testing. 98-107 - Akhil Kumar, Noha Adly:

HPP: A Reliable Causal Broadcast Protocol for Large-Scale Replication. 108-124 - Woei-Jiunn Tsaur, Shi-Jinn Horng:

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments. 125-133
Volume 41, Number 3, 1998
- Roberto De Prisco

, Alfredo De Santis
:
On the Data Expansion of the Huffman Compression Algorithm. 137-144 - Antonino Mazzeo, Nicola Mazzocca

, Stefano Russo, Carlo Savy, Valeria Vittorini:
Formal Specification of Concurrent Systems: A Structured Approach. 145-162 - Anton Biasizzo, Alenka Zuzek, Franc Novak:

Sequential Diagnosis with Asymmetrical Tests. 163-170 - Leqiang Bai, Hiroyuki Ebara, Hideo Nakando, Hajime Maeda:

Fault-Tolerant Broadcasting on the Arrangement Graph. 171-184 - Jamel Tayeb, Özgür Ulusoy

, Ouri Wolfson
:
A Quadtree-Based Dynamic Attribute Indexing Method. 185-200 - Alois Panholzer, Helmut Prodinger:

Towards a More Precise Analysis of an Algorithm to Generate Binary Trees: A Tutorial. 201-204
Volume 41, Number 4, 1998
- Jie Wu, Eduardo B. Fernández

, Donglai Dai:
Optimal Fault-Secure Scheduling. 207-222 - Keqin Li:

Optimizing Average Job Response Time via Decentralized Probabilistic Job Dispatching in Heterogeneous Multiple Computer Systems. 223-230 - I-Chen Wu, Loon-Been Chen:

On Detection of Bounded Global Predicates. 231-237 - Savio S. H. Tse, Francis C. M. Lau:

More on the Efficiency of Interval Routing. 238-242 - Ing-Ray Chen, Tsong-Min Chen, Chiang Lee:

Performance Evaluation of Forwarding Strategies for Location Management in Mobile Networks. 243-253 - Shun-Shii Lin, Shan-Tai Chen:

On Detecting Multiple Faults in Baseline Interconnection Networks. 254-269 - Khaled A. S. Abdel-Ghaffar:

Detecting Substitutions and Transpositions of Characters. 270-277
Volume 41, Number 5, 1998
- W. Paul Cockshott, Douglas R. McGregor, John Wilson:

High-Performance Operations Using a Compressed Database Architecture. 283-296 - Maarten van Steen

, Franz J. Hauck, Gerco Ballintijn, Andrew S. Tanenbaum
:
Algorithmic Design of the Globe Wide-Area Location Service. 297-310 - Theo P. van der Weide, Theo W. C. Huibers, Patrick van Bommel:

The Incremental Searcher Satisfaction Model for Information Retrieval. 311-318 - Stuart G. Hoggar, Lindsey Menzies:

Fractal Compression and the Jigsaw Property I. 319-336 - Roberto Baldoni, Roberto Beraldi, Ravi Prakash:

Slotted-FIFO Communcation for Asynchronous Distributed Systems. 337-349 - Robert M. Hierons

:
Adaptive Testing of a Deterministic Implementation Against a Nondeterministic Finite State Machine. 349-355
Volume 41, Number 6, 1998
- Michael Prasse, Peter Rittgen:

Why Church's Thesis Still Holds. Some Notes on Peter Wegner's Tracts on Interaction and Computability. 357-362 - Hugh Robinson, Patrick A. V. Hall, Fiona Hovenden, Janet Rachel:

Postmodern Software Development. 363-375 - Sanjay Kumar Madria:

Handling of Mutual Conflicts in Distributed Databases Using Timestamps. 376-385 - Declan P. Kelly:

ARC: A Specification Language for Communicating Systems. 386-401 - Kelvin Kam Wing Chu, Sze Kin Lam, Man Hon Wong:

An Efficient Hash-Based Algorithm for Sequence Data Searching. 402-415 - Zbigniew J. Czech:

Quasi-Perfect Hashing. 416-421 - Erkki Mäkinen:

Binary Tree Code Words as Context-Free Languages. 422-424
Volume 41, Number 7, 1998
- R. Benjamin, B. Gladman, Brian Randell:

Protecting IT Systems from Cyber Crime. 429-443 - Harold W. Thimbleby, Stuart Anderson

, Paul A. Cairns
:
A Framework for Modelling Trojans and Computer Virus Infection. 444-458 - Luc Moreau

, Wendy Hall
:
On the Expressiveness of Links in Hypertext Systems. 459-473 - Pasi Fränti, Timo Hatakka:

Context Model Automata for Text Compression. 474-485 - Stuart E. Mitchell, Andy J. Wellings, Alexander B. Romanovsky

:
Distributed Atomic Actions in Ada 95. 486-502 - Andrea Sanna

, Paolo Montuschi, Massimo Rossi:
A Flexible Algorithm for Multiprocessor Ray Tracing. 503-516
Volume 41, Number 8, 1998
- Boris G. Mirkin

:
Least-Squares Structuring, Clustering and Data Processing Issues. 518-536 - Yonghong Li, Anil K. Jain:

Classification of Text Documents. 537-546 - Valerie J. Gillet, David J. Wild, Peter Willett, John Bradshaw:

Similarity and Dissimilarity Methods for Processing Chemical Structure Databases. 547-558 - Ryuichi Oka:

Spotting Method for Classification of Real World Data. 559-565 - Lawrence J. Hubert, Phipps Arabie, Jacqueline J. Meulman:

The Representation of Symmetric Proximity Data: Dimensions and Classifications. 566-577 - Chris Fraley, Adrian E. Raftery:

How Many Clusters? Which Clustering Method? Answers Via Model-Based Cluster Analysis. 578-588 - Dian I. Witter, Michael W. Berry:

Downdating the Latent Semantic Indexing Model for Conceptual Information Retrieval. 589-601 - Chris S. Wallace:

Intrinsic Classification of Spatially Correlated Data. 602-611

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














