


default search action
The Computer Journal, Volume 49, 2006
Volume 49, Number 1, January 2006
- Fairouz Kamareddine:

Capsule Reviews. 1-3
- Robert M. Colomb:

Formal versus Material Ontologies for Information Systems Interoperation in the Semantic Web. 4-19
- Duncan Martin, Helen Ashman:

Atomic Hypermedia. 20-31
- Jixin Ma

, Patrick J. Hayes
:
Primitive Intervals versus Point-Based Intervals: Rivals or Allies? 32-41
- Gianluca Dini

, Giuseppe Lettieri
, Lanfranco Lopriore:
Caching and prefetching algorithms for programs with looping reference patterns. 42-61
- Nikos A. Lorentzos, José Ramon Rios Viqueira

:
Relational Formalism for the Management of Spatial Data. 62-81
- Miguel Correia

, Nuno Ferreira Neves
, Paulo Veríssimo
:
From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures. 82-96 - Stelvio Cimato

, Roberto De Prisco
, Alfredo De Santis
:
Probabilistic Visual Cryptography Schemes. 97-107 - Alexei Vernitski:

Can Unbreakable Mean Incomputable? 108-112
- Pablo H. Ibargüengoytia, Sunil Vadera, Luis Enrique Sucar

:
A Probabilistic Model for Information and Sensor Validation. 113-126
Volume 49, Number 2, March 2006
- Capsule Reviews. 133

- Fionn Murtagh:

Editorial. 134-135
- Erol Gelenbe

:
Editorial: Building Adaptivity into Computer Networks. 136 - Gerardo Rubino, Martín Varela, Jean-Marie Bonnin:

Controlling Multimedia QoS in the Future Home Network Using the PSQA Metric. 137-155 - Jeremy Pitt, Lloyd Daniel Kamara, Marek J. Sergot, Alexander Artikis

:
Voting in Multi-Agent Systems. 156-170 - Ricardo Lent

:
Design of a MANET Testbed Management System. 171-179 - András György

, György Ottucsák:
Adaptive Routing Using Expert Advice. 180-189 - Taskin Koçak

:
A Hybrid Network Processor with Support for High-Speed Execution of CPN and Upper Layer IP Protocols. 190-200
- Margarita Amor, Montserrat Bóo, Emilio J. Padrón

, Dirk Bartz:
Hardware Oriented Algorithms for Rendering Order-Independent Transparency. 201-210 - Kostas Bousias, Nabil Hasasneh, Chris R. Jesshope:

Instruction Level Parallelism through Microthreading - A Scalable Approach to Chip Multiprocessors. 211-233
- Cinzia Bernardeschi

, Giuseppe Lettieri
, Luca Martini, Paolo Masci
:
Using Control Dependencies for Space-Aware Bytecode Verification. 234-248
Volume 49, Number 3, May 2006
- Fairouz Kamareddine:

Capsule Reviews. 255-257
- Mehmet Savsar, Fawaz S. Al-Anzi

:
Reliability of Data Allocation on a Centralized Service Configuration with Distributed Servers. 258-267 - Alain Cournier, Stéphane Devismes

, Franck Petit
, Vincent Villain:
Snap-Stabilizing Depth-First Search on Arbitrary Networks. 268-280
- Apostolos N. Papadopoulos, Alexandros Nanopoulos, Yannis Manolopoulos:

Processing Distance Join Queries with Constraints. 281-296
- Moses Reuven, Yair Wiseman:

Medium-Term Scheduler as a Solution for the Thrashing Effect. 297-309
- Goichiro Hanaoka

, Junji Shikata, Yumiko Hanaoka, Hideki Imai:
Unconditionally Secure Anonymous Encryption and Group Authentication. 310-321 - Javier Herranz

:
Deterministic Identity-Based Signatures for Partial Aggregation. 322-330
- Karnig Derderian, Robert M. Hierons

, Mark Harman
, Qiang Guo:
Automated Unique Input Output Sequence Generation for Conformance Testing of FSMs. 331-344
- Per Martin-Löf:

100 years of Zermelo's axiom of choice: what was the problem with it? 345-350
- James F. Korsh:

Skarbek's Algorithm for t-Ary Trees. 351-357 - Sung Eun Bae, Tadao Takaoka:

Improved Algorithms for the K-Maximum Subarray Problem. 358-374
Volume 49, Number 4, July 2006
- Fairouz Kamareddine:

Capsule Reviews. 381-382
- Robin Milner:

Ubiquitous Computing: Shall we Understand It? 383-389 - Discussion on Robin Milner's First Computer Journal Lecture: Ubiquitous Computing: Shall We Understand It? 390-399

- Chung-Ming Huang, Ching-Hsien Tsai, Ming-Chi Tsai:

Design and Implementation of Video Streaming Hot-plug between Wired and Wireless Networks Using SCTP. 400-417 - Tsz-Yeung Wong, K. T. Law, John C. S. Lui, Man Hon Wong:

An Efficient Distributed Algorithm to Identify and Traceback DDoS Traffic. 418-442
- Barry Doyle, Stuart Bell, Alan F. Smeaton

, Kealan McCusker, Noel E. O'Connor
:
Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks. 443-453 - Juan Fernández, Eitan Frachtenberg

, Fabrizio Petrini, José Carlos Sancho
:
An Abstract Interface for System Software on Large-Scale Clusters. 454-469 - Daniel Yuh Chao:

Computation of Elementary Siphons in Petri Nets For Deadlock Control. 470-479
- Alan Bundy:

A Very Mathematical Dilemma. 480-486
- Patrick Martin, Wendy Powley, Xiaoyi Xu, Wenhu Tian:

Automated Configuration of Multiple Buffer Pools. 487-499
Volume 49, Number 5, September 2006
- Fairouz Kamareddine:

Capsule Reviews. 505-506
- Ing-Ray Chen, Bojan Cukic

:
High Assurance Software Systems. 507-508 - Jinchun Xia, Carl K. Chang, Jeffrey C. Wise, Yujia Ge:

An Empirical Performance Study on PSIM. 509-526 - Guohui Li, LihChyun Shu:

Design and Evaluation of a Low-Latency Checkpointing Scheme for Mobile Computing Systems. 527-540 - Qizhi Ye, Yu Lei, David Chenho Kung:

A Blocking-based Approach to Protocol Validation. 541-553 - Engin Kirda, Christopher Krügel:

Protecting Users against Phishing Attacks. 554-561
- José Luis Sierra

, Alfredo Fernández-Valmayor, Baltasar Fernández-Manjón
:
A Document-Oriented Paradigm for the Construction of Content-Intensive Applications. 562-584
- Tiziana Calamoneri

:
The L(h, k)-Labelling Problem: A Survey and Annotated Bibliography. 585-608
- Alexander Thomasian, Lijuan Zhang:

The Stepwise Dimensionality Increasing (SDI) Index for High-Dimensional Data. 609-618
- Apostolos Syropoulos

:
Fuzzifying P Systems. 619-628
Volume 49, Number 6, November 2006
- Fairouz Kamareddine:

Capsule Reviews. 631-633
- Yi-Sheng Huang:

Design of Traffic Light Control Systems Using Statecharts. 634-649
- Frank Land:

Leo II and the Model T Ford. 650-656
- Jorma Rissanen:

The Structure Function and Distinguishable Models of Data. 657-664
- Dick den Hertog, P. B. Hulshof:

Solving Rummikub Problems by Integer Linear Programming. 665-669
- Alexander Thomasian, Lijuan Zhang:

Persistent Semi-Dynamic Ordered Partition Index. 670-684
- Samir M. Koriem:

Development, Analysis and Evaluation of Performance Models for Mobile Multi-Agent Networks. 685-709 - Vlad Rusu:

Verifying an ATM Protocol Using a Combination of Formal Techniques. 710-730
- Betül Demiröz, Haluk Rahmi Topcuoglu

:
Static Task Scheduling with a Unified Objective on Time and Resource Domains. 731-743
- Carlos A. G. Assis, Edil S. T. Fernandes, Valmir Carneiro Barbosa

:
Modeling the Input History of Programs for Improved Instruction-Memory Performance. 744-761

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














