


default search action
The Computer Journal, Volume 42, 1999
Volume 42, Number 1, 1999
- Lloyd Allison, David R. Powell

, Trevor I. Dix:
Compression and Approximate Matching. 1-10 - Seyit Kocberber, Fazli Can, Jon M. Patton:

Optimization of Signature File Parameters for Database with Varying Record Lengths. 11-23 - Manhoi Choy:

Consistent Implementations of Replicated Objects. 24-38 - Gajanan S. Chinchwadkar, Angela Goh:

An Overview of Vertical Partitioning in Object-Oriented Databases. 39-50 - Carlo Blundo, Paolo D'Arco, Antonio Giorgio Gaggia:

A tau-Restricted Key Agreement Scheme. 51-61 - Samia Loucif

, Mohamed Ould-Khaoua, Lewis M. Mackenzie:
On the Performance Merits of Bypass Channels in Hypermeshes and k-Ary n-Cubes. 62-72
Volume 42, Number 2, 1999
- Birgit Schieder, Manfred Broy:

Adapting Calculational Logic to the Undefined. 73-81 - Richard F. Paige:

Integrating a Program Design Calculus and a Subset of UML. 82-99 - Ykä Huhtala, Juha Kärkkäinen, Pasi Porkka, Hannu Toivonen

:
TANE: An Efficient Algorithm for Discovering Functional and Approximate Dependencies. 100-111 - Chung-Ming Huang, Ming-Yuhe Jang:

Interactive Temporal Behaviours and Modelling for Multimedia Presentations in te WWW Environment. 112-128 - Min-Sheng Lin, Deng-Jyi Chen, Maw-Sheng Horng:

The Reliability Analysis of Distributed Computing Systems with Imperfect Nodes. 129-141 - Weng-Fai Wong

:
Source Level Static Branch Prediction. 142-149
Volume 42, Number 3, 1999
- Harry W. Agius, Marios C. Angelides:

COSMOS - Content Oriented Semantic Modelling Overlay Scheme. 153-176 - Richard Bornat, Bernard Sufrin:

Animating Formal Proof at the Surface: The Jape Proof Calculator. 177-192 - Hugh E. Williams, Justin Zobel:

Compressing Integers for Fast File Access. 193-201 - Weijia Jia, Jiannong Cao, To-Yat Cheung, Xiaohua Jia:

A Multicast Protocol Based on a Single Logical Ring Using a Virtual Token and Logical Clocks. 202-220 - Kecheng Liu, Tina Ong:

A Modelling Approach for Handling Business Rules and Exceptions. 221-231 - Ahmad A. Hiasat

, Hoda S. Abdel-Aty-Zohdy:
Semi-Custom VLSI Design and Implementation of a New Efficient RNS Division Algorithm. 232-240 - Neven Tomov, Euan W. Dempster, M. Howard Williams, Peter J. B. King, Albert G. Burger:

Approximate Estimation of Transaction Response Time. 241-250
Volume 42, Number 4, 1999
- Alexander Gammerman, Vladimir Vovk:

Kolmogorov Complexity: Sources, Theory and Applications. 252-255 - Ray J. Solomonoff:

Two Kinds of Probabilistic Induction. 256-259 - Jorma Rissanen:

Hypothesis Selection and Testing by the MDL Principle. 260-269 - Chris S. Wallace, David L. Dowe:

Minimum Message Length and Kolmogorov Complexity. 270-283 - Leonid A. Levin:

Robust Measures of Information. 284-286 - Tao Jiang

, Ming Li, Paul M. B. Vitányi:
New Applications of the Incompressibility Method. 287-293 - Vladimir V. V'yugin:

Algorithmic Complexity and Stochastic Properties of Finite Binary Sequences. 294-317 - Vladimir Vovk, Alexander Gammerman:

Complexity Approximation Principle. 318-322 - A. Philip Dawid

:
Discussion of the Papers by Rissanen and by Wallace and Dowe. 323-326 - Jorma Rissanen:

Discussion of Paper 'Minimum Message Length and Kolmogorov Complexity' by C. S. Wallace and D. L. Dowe. 327-329 - Chris S. Wallace, David L. Dowe:

Refinements of MDL and MML Coding. 330-337 - Bertrand S. Clarke:

Discussion of the Papers by Rissanen, and by Wallace and Dowe. 338-339 - Alexander Shen:

Discussion on Kolmogorov Complexity and Statistical Analysis. 340-342 - Jorma Rissanen:

Rejoinder. 343-344 - Chris S. Wallace, David L. Dowe:

Rejoinder. 345-347
Volume 42, Number 5, 1999
- Arthur H. M. ter Hofstede

, Maria E. Orlowska:
On the Complexity of Some Verification Problems in Process Control Specifications. 349-359 - Norman Ramsey:

Eliminating Spurious Error Messages Using Exceptions, Polymorphism, and Higher-Order Functions. 360-372 - Mayez A. Al-Mouhamed:

Evolution-Based Scheduling of Computations and Communications on Distributed Memory Multicomputers. 373-390 - Robert W. P. Luk

:
Near Optimal beta Heap. 391-399 - Tadao Takaoka:

O(1) Time Algorithms for Combinatorial Generation by Tree Traversal. 400-408 - Po-Jen Chuang, Huey-Ming Hsu:

Effective Fault Diagnosis Approaches for Multiphath Networks. 409-421 - Miroslav Bojovic, Milo Tomasevic, Jovan Djordjevic:

The Interactive Development and Testing System for a RISC-Style Processor. 422-429 - Tsong Yueh Chen

, Man Fai Lau:
On the Completeness of a Test Suite Reduction Strategy. 430-440
Volume 42, Number 6, 1999
- Mohan Kumar:

Special Issue Editorial: Mobile Computing. 441 - Kevin W. Froese, Richard B. Bunt:

Cache Management for Mobile File Service. 442-454 - Cedric C. F. Fong, John C. S. Lui, Man Hon Wong:

Distributed Caching and Broadcast in a Wireless Mobile Computing Environment. 455-472 - Sajal K. Das

, Sanjoy K. Sen:
Adaptive Location Prediction Strategies Based on a Hierarchical Network Model in a Cellular Mobile Environment. 473-486 - Sihui Zhou, Aruna Seneviratne

, Terry Percival:
An Efficient Location Management Scheme for Hybrid Wireless Asynchronous Transfer Mode Networks. 487-500 - Ersan Kayan, Özgür Ulusoy

:
An Evaluation of Real-Time Transaction Management Issues in Mobile Database Systems. 501-510 - Guan-Chi Chen, Suh-Yin Lee:

An Analytic Model for Performance Analysis of Concurrency Control Strategies in Mobile Environments. 511-521 - Kuang-Hwei Chi, Chien-Chao Tseng

, Ting-Lu Huang:
A Framework for Mobile Multicast Using Dynamic Route Reconstructions. 522-533 - Timothy W. Bickmore, Andreas Girgensohn, Joseph W. Sullivan:

Web Page Filtering and Re-Authoring for Mobile Users. 534-546
Volume 42, Number 7, 1999
- Mounia Lalmas:

A Model for Representing and Retrieving Heterogeneous Structured Documents Based on Evidential Reasoning. 547-568 - Ning Zhang, Qi Shi

, Madjid Merabti:
A Flexible Approach to Secure and Fair Document Exchange. 569-581 - Francesca Arcelli Fontana, Ferrante Formato, Remo Pareschi

:
Computational Models for Information Reuse. 582-591 - Wanlei Zhou

, Andrzej M. Goscinski:
Managing Replicated Remote Procedure Call Transactions. 592-608 - Esther Jennings:

Distributed Algorithms for Finding Central Paths in Tree Networks. 609-612 - Tatsuhiro Tsuchiya

, Tohru Kikuno:
Availability Evaluation of Quorum-Based Mutual Exclusion Schemes in General Topology Networks. 613-622
Volume 42, Number 8, 1999
- Alexander B. Romanovsky

:
On Structuring Cooperative and Competitive Concurrent Systems. 627-637 - Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang:

Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures. 638-649 - Martin P. Ward, Keith H. Bennett:

Recursion Removal/Introduction by Formal Transformation: An Aid to Program Development and Program Comprehension. 650-673 - Kam-yiu Lam, Chung-Leung Pang, Sang Hyuk Son, Jiannong Cao:

Resolving Executing-Committing Conflicts in Distributed Real-time Database Systems. 674-692 - Hing Leung, Tsong Yueh Chen

:
A New Perspective of the Proportional Sampling Strategy. 693-698 - Voon-Yee Vee, Wen-Jing Hsu:

Applying Cilk in Provably Efficient Task Scheduling. 699-712

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














