


default search action
The Computer Journal, Volume 45, 2002
Volume 45, Number 1, 2002
- Faron Moller

:
Formal Methods in Computation. 1 - Howard Barringer, Donal Fellows

, Graham Gough, Alan R. Williams:
Rainbow: Development, Simulation and Analysis Tools for Asynchronous Micropipeline Hardware Design. 2-11 - Doug A. Edwards, Andrew Bardsley:

Balsa: An Asynchronous Hardware Synthesis Language. 12-18 - Stephen B. Furber

:
Validating the AMULET Microprocessors. 19-26 - Michael J. C. Gordon:

Relating Event and Trace Semantics of Hardware Description Languages. 27-36 - Michael Norrish, Konrad Slind:

A Thread of HOL Development. 37-45 - Susan Older, Shiu-Kai Chin:

Formal Methods for Assuring Security of Protocols. 46-54 - Muffy Calder

, Savi Maharaj, Carron Shankland
:
A Modal Logic for Full LOTOS based on Symbolic Transition Systems. 55-61 - Chris M. N. Tofts:

Traffic Modelling and Probabilistic Process Abstraction. 62-67 - Chung-Ming Huang, Yu-Chang Chao:

Differentiated Information Presentations for Heterogeneous I/O Devices using a Single Mark-up Language Approach. 72-87 - Ali M. Shatnawi

, M. Omair Ahmad, M. N. S. Swamy:
Optimal Scheduling of Digital Signal Processing Data-flow Graphs using Shortest-path Algorithms. 88-100 - Shih-Lin Wu

, Yu-Chee Tseng, Chih-Yu Lin, Jang-Ping Sheu:
A Multi-channel MAC Protocol with Power Control for Multi-hop Mobile Ad Hoc Networks. 101-110 - Xudong He, Yi Deng:

A Framework for Developing and Analyzing Software Architecture Specifications in SAM. 111-128
Volume 45, Number 2, 2002
- Xiao Jun Chen, Hasan Ural:

Construction of Deadlock-free Designs of Communication Protocols from Observation. 162-173 - Tien-Tai Pan, Shun-Shii Lin:

Constant-time Algorithms for Minimum Spanning Tree and Related Problems on Processor Array with Reconfigurable Bus Systems. 174-186 - Fairouz Kamareddine, Alejandro Ríos:

Pure Type Systems with de Bruijn Indices. 187-201 - N. Parimala:

Explicit Operation Specification for Component Databases. 202-212 - Alan Gibbons, Ida Pu, Muthu Muthukrishnan:

Exact Analyses of a Simple Heuristic Employed in Array Compression. 213-220 - Alexey Stakhov:

Brousentsov's Ternary Principle, Bergman's Number System and Ternary Mirror-symmetrical Arithmetic. 221-236 - Vladimir B. Balakirsky:

A New Coding Algorithm for TreesVladimir B. Balakirsky. 237-242 - Vladimir B. Balakirsky:

Block Codes for Asynchronous Data Transmission Designed from Binary Trees. 243-248 - Stefan Conrad, Wilhelm Hasselbring, Anne E. James, Dalen Kambur, Ralf-Detlef Kutsche, Philippe Thiran:

Report on the EFIS 2001 Workshop. 249-251
Volume 45, Number 3, 2002
- Fionn Murtagh:

Statistics and Trends. 259 - Gábor Huszerl

, István Majzik
, András Pataricza
, Konstantinos Kosmidis, Mario Dal Cin:
Quantitative Analysis of UML Statechart Models of Dependable Systems. 260-277 - Zhenglin Liu, Chongyang Xu:

An Analytical Model for the Performance of the DOCSIS CATV Network. 278-284 - G. E. Farr, Chris S. Wallace:

The Complexity of Strict Minimum Message Length Inference. 285-292 - Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng

, Hideki Imai:
A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks. 293-303 - Ing-Ray Chen, Baoshan Gu:

A Comparative Cost Analysis of Degradable Location Management Algorithms in Wireless Networks. 304-319 - Theo Ungerer, Borut Robic, Jurij Silc:

Multithreaded Processors. 320-348 - Jie Wu:

A Fault-tolerant Adaptive and Minimal Routing Scheme in $n$-D Meshes. 349-363 - James F. Korsh, Paul LaFollette:

Loopless Generation of Trees with Specified Degrees. 364-372
Volume 45, Number 4, 2002
- Hazem Turki El Khatib, M. Howard Williams, David H. Marwick, Lachlan M. MacKinnon:

Using a Distributed Approach to Retrieve and Integrate Information from Heterogeneous Distributed Databases. 381-394 - Daeyoung Kim, Yann-Hang Lee:

Periodic and Aperiodic Task Scheduling in Strongly Partitioned Integrated Real-time Systems. 395-409 - Victor C. S. Lee

, Kwok-Wa Lam, Sang Hyuk Son:
Concurrency Control Using Timestamp Ordering in Broadcast Environments. 410-422 - Alan Roberts, Antonios Symvonis

, David R. Wood
:
Lower Bounds for One-to-one Packet Routing on Trees using Hot-Potato Algorithms. 423-435 - Yang Jun, Greg Michaelson, Philip W. Trinder:

Explaining Polymorphic Types. 436-452 - Constantinos Papadopoulos:

An Extended Temporal Logic for CSCW. 453-472
Volume 45, Number 5, 2002
- Janne Skyt, Christian S. Jensen

:
Persistent Views-A Mechanism for Managing Ageing Data. 481-493 - B. John Oommen

, Luís G. Rueda:
The Efficiency of Histogram-like Techniques for Database Query Optimization. 494-510 - Victoria S. Uren

, Thomas R. Addis:
How Weak Categorizers Based Upon Different Principles Strengthen Performance. 511-524 - Irina Kozatchok, Samuel Pierre:

User Tracking and Mobility Management Algorithm for Wireless Networks. 525-539 - Wei Jie

, Wentong Cai
, Stephen John Turner
:
POEMS: A Parallel Object-oriented Environment for Multi-computer Systems. 540-560 - Peter Sanders:

Randomized Receiver Initiated Load-balancing Algorithms for Tree-shaped Computations. 561-573
Volume 45, Number 6, 2002
- Anna Formica

, Michele Missikoff:
Concept Similarity in SymOntos: An Enterprise Ontology Management Tool. 583-594 - Paolo Bellavista

, Antonio Corradi
, Cesare Stefanelli:
Java for On-line Distributed Monitoring of Heterogeneous Systems and Services. 595-607 - Jonathan J. Cook:

Reverse Execution of Java Bytecode. 608-619 - John Aycock, R. Nigel Horspool:

Practical Earley Parsing. 620-630 - John W. Raymond, Eleanor J. Gardiner, Peter Willett:

RASCAL: Calculation of Graph Similarity using Maximum Common Edge Subgraphs. 631-644 - Mark C. Little, Santosh K. Shrivastava, Neil A. Speirs:

Using Bloom Filters to Speed-up Name Lookup in Distributed Systems. 645-652 - Jarmo Siltaneva, Erkki Mäkinen

:
A Comparison of Random Binary Tree Generators. 653-660 - Masayuki Abe, Masayuki Kanda:

A Key Escrow Scheme with Time-Limited Monitoring for One-way Communication Masayuki Abe and Masayuki Kanda. 661-671 - Wen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw:

A Verifiable Multi-Authority Secret Election Allowing Abstention from Voting. 672-682

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














