![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
The Computer Journal, Volume 50, 2007
Volume 50, Number 1, January 2007
- Fairouz Kamareddine:
Capsule Reviews. 1-3 - Editorial on the Occasion of Volume 50 of The Computer Journal. 4-6
- Zhongqiang Chen, Zhongrong Chen, Alex Delis:
An Inline Detection and Prevention Framework for Distributed Denial of Service Attacks. 7-40 - Yuh-Min Tseng:
A secure authenticated group key agreement protocol for resource-limited mobile devices. 41-52
- Rachid Guerraoui
, Michel Raynal:
The Alpha of Indulgent Consensus. 53-67
- Kil Hong Joo, Won Suk Lee:
An Adaptive Materialization Method for Globally Optimized Query Evaluation in a Hierarchical Mediator System. 68-80
- Hooman Nikmehr, Braden Phillips, Cheng-Chew Lim
:
A Fast Radix-4 Floating-Point Divider with Quotient Digit Selection by Comparison Multiples. 81-92
- Ralf Gitzel, Ingo Ott, Martin Schader:
Ontological Extension to the MOF Metamodel as a Basis for Code Generation. 93-115 - Jesús Manuel Almendros-Jiménez
, Luis Iribarne
:
Describing Use-Case Relationships with Sequence Diagrams. 116-128
Volume 50, Number 2, March 2007
- Fairouz Kamareddine:
Capsule Reviews. 131-133
- Roland Rüdiger:
Quantum Programming Languages: An Introductory Overview. 134-150
- Alexander Gammerman
, Vladimir Vovk
:
Hedging Predictions in Machine Learning: The Second Computer Journal Lecture. 151-163 - Discussion on Hedging Predictions in Machine Learning by A. Gammerman and V. Vovk. 164-172
- Alexander Gammerman
, Vladimir Vovk
:
Rejoinder Hedging Predictions in Machine Learning. 173-177
- A. Bakalis, Costas S. Iliopoulos, Christos Makris
, Spyros Sioutas, Evangelos Theodoridis, Athanasios K. Tsakalidis, Kostas Tsichlas:
Locating Maximal Multirepeats in Multiple Strings Under Various Constraints. 178-185 - Abdelrahman Amer, B. John Oommen
:
A Novel Framework for Self-Organizing Lists in Environments with Locality of Reference: Lists-on-Lists. 186-196
- Doina Bein, Ajoy Kumar Datta, Vincent Villain:
Self-Stabilizing Local Routing in Ad Hoc Networks. 197-203 - Sheng-Tzong Cheng, Ming-Hung Tao:
A Scheduling-Based Medium Access Control Protocol for Supporting Multi-class Services in Wireless Networks. 204-216
- Alexander Thomasian, Gang Fu, Spencer W. Ng:
Analysis of Rebuild Processing in RAID5 Disk Arrays. 217-231
- W. Paul Cockshott, Greg Michaelson:
Are There New Models of Computation? Reply to Wegner and Eberbach. 232-247
- Ricardo P. Jasinski:
Fault-Tolerance Techniques for SRAM-Based FPGAs. 248 - Carlos Caldeira:
The Microsoft Data Warehouse Toolkit. 249 - Marino Segnan:
Web Data Management Practices - Emerging Techniques and Technologies. 249-250
Volume 50, Number 3, May 2007
- Fairouz Kamareddine:
Capsule Reviews. 251-253
- Tony Hoare:
The Ideal of Program Correctness: Third Computer Journal Lecture. 254-260 - Discussion on The Ideal of Program Correctness by Tony Hoare. 261-268
- Discussion on The Ideal of Program Correctness: Responses from Tony Hoare. 269-273
- Chris Mairs:
Inclusion and Exclusion in the Digital World: Turing Lecture 2006. 274-280
- Ing-Ray Chen, Weiping He, Baoshan Gu:
Proxy-based Regional Registration for Integrated Mobility and Service Management in Mobile IP Systems. 281-293
- H. M. W. Verbeek
, Wil M. P. van der Aalst
, Arthur H. M. ter Hofstede
:
Verifying Workflows with Cancellation Regions and OR-joins: An Approach Based on Relaxed Soundness and Invariants. 294-314
- Monika Kapus-Kolar:
Testing as Collecting of Evidence: An Integrated Approach to Test Generation for Finite State Machines. 315-331
- Doina Bein, Ajoy Kumar Datta, Mehmet Hakan Karaata:
An Optimal Snap-Stabilizing Multi-Wave Algorithm. 332-340 - Tzong-Jye Liu, Chia-Lin Lee:
State-Optimal Alternator for Uniform Synchronous Rings. 341-347
- George F. Georgakopoulos, Kostas Politopoulos:
MAX-DENSITY Revisited: a Generalization and a More Efficient Algorithm. 348-356 - William Chung-Kung Yen:
Edge-Orienting on Split, Planar and Treelike Graphs. 357-368
- Peter Grünwald:
Christopher S. Wallace Statistical and Inductive Inference by Minimum Message Length. Springer (2005), ISBN 038723795X 432 pp, Hardbound. 369-370 - Mark Levene:
Artificial Intelligence for Games. Series in Interactive 3D Technology. 371 - Jorge Martínez Gil
:
Thinking on the Web: Berners-Lee, Gödel and Turing. 371-372
Volume 50, Number 4, July 2007
- Fairouz Kamareddine:
Capsule Reviews. 373-374
- Karen Spärck Jones (1935-2007): Professor (emeritus) of Computers and Information, University of Cambridge. 375-376
- Ruqian Lu, Zhi-Hua Zhou:
Guest Editorial to the Special Issue on Advances of Artificial Intelligence and Knowledge Engineering in China. 377 - Wei Li:
R-Calculus: An Inference System for Belief Revision. 378-390 - Sanjiang Li
, Bernhard Nebel
:
Qualitative Spatial Representation and Reasoning: A Hierarchical Approach. 391-402 - Kaile Su
, Abdul Sattar
, Xiangyu Luo:
Model Checking Temporal Logics of Knowledge Via OBDDs. 403-420 - Hongli Liang, Jue Wang, Yiyu Yao
:
User-Oriented Feature Selection for Machine Learning. 421-434
- Shan-Tai Chen, Shun-Shii Lin, Li-Te Huang:
A Two-Phase Optimization Algorithm For Mastermind. 435-443
- Roberto Baldoni, Roberto Beraldi, Leonardo Querzoni
, Antonino Virgillito:
Efficient Publish/Subscribe Through a Self-Organizing Broker Overlay and its Application to SIENA. 444-459
- Amit Thawani, Srividya Gopalan, V. Sridhar, Krithi Ramamritham:
Context-aware Timely Information Delivery in Mobile Environments. 460-472
- Vladimir Yanovski, Israel A. Wagner, Alfred M. Bruckstein
:
A Linear-Time Constant-Space Algorithm for the Boundary Fill Problem. 473-477
- Emilio Ancillotti, Raffaele Bruno
, Marco Conti
, Enrico Gregori, Antonio Pinizzotto:
A Layer-2 Framework for Interconnecting Ad Hoc Networks to Fixed Internet: Test-bed Implementation and Experimental Evaluation. 478-499
- Antonio Izquierdo Manzanares:
Professional Pen Testing for Web Applications - Programmer to Programmer Series (P2P). 500
Volume 50, Number 5, September 2007
- Fairouz Kamareddine:
Capsule Reviews. 501-504
- Dan C. Marinescu, Gabriela M. Marinescu:
The Boole Lecture Quantum Information: A Glimpse at the Strange and Intriguing Future of Information. 505-521
- Mehran S. Fallah, Ahmad R. Sharafat:
Service Availability in Concurrent Systems - Part I: A Theory of Hierarchical Services of Interacting Processes. 522-534 - Mehran S. Fallah, Ahmad R. Sharafat:
Service Availability in Concurrent Systems - Part II: Analysis and Case Studies Using HSIP. 535-554 - Der-Chiang Li
, Fengming M. Chang:
An In-Out Combined Dynamic Weighted Round-Robin Method for Network Load Balancing. 555-566
- Mark Levene, Judit Bar-Ilan
:
Comparing Typical Opening Move Choices Made by Humans and Chess Engines. 567-573
- Asep Juarna, Vincent Vajnovszki:
Some Generalizations of a Simion-Schmidt Bijection. 574-580 - Haydeh Ahrabian, Abbas Nowzari-Dalini:
Parallel Generation of t-Ary Trees in A-order. 581-588
- Qiang Tang
:
On The Security of a Group Key Agreement Protocol. 589-590 - Kim-Kwang Raymond Choo
:
A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model. 591-601 - Ren-Junn Hwang, Sheng-Hua Shiau:
Provably Efficient Authenticated Key Agreement Protocol for Multi-Servers. 602-615
- Jaesung Lee, Hyuk-Jae Lee, Chanho Lee:
A High-Speed Link Layer Architecture for Low Latency and Memory Cost Reduction. 616-628
Volume 50, Number 6, November 2007
- Fairouz Kamareddine:
Capsule reviews. 629
- Erol Gelenbe
, Andrew Tilbrook, Richard Vinter:
Editorial: Introduction to the Special Issue. 630-631 - Robert A. Ghanea-Hercock, Erol Gelenbe
, Nicholas R. Jennings
, Oliver Smith, David N. Allsopp, Alex Healing, Hakan Duman, Simon Sparks, Nishan C. Karunatillake, Perukrishnen Vytelingum:
Hyperion - Next-Generation Battlespace Information Services. 632-645 - Asher Mahmood, Philip M. Tudor, William Oxford, Robert Hansford, James D. B. Nelson, Nicholas G. Kingsbury, Antonis Katartzis, Maria Petrou, Nikolaos Mitianoudis
, Tania Stathaki, Alin Achim
, David R. Bull, Cedric Nishan Canagarajah, Stavri G. Nikolov, Artur Loza, Nedeljko Cvejic:
Applied Multi-Dimensional Fusion. 646-659 - Nikolaos Mitianoudis
, Tania Stathaki:
Joint Fusion and Blind Restoration For Multiple Image Scenarios With Missing Data. 660-673 - William Ng, Jack Li, Simon J. Godsill, Sze Kim Pang:
Multitarget Initiation, Tracking and Termination Using Bayesian Monte Carlo Methods. 674-693 - Samuel M. Waldron, John Patrick, Phillip L. Morgan, Sophia L. King:
Influencing Cognitive Strategy by Manipulating Information Access. 694-702 - Paul R. Smart, Alistair Russell, Nigel R. Shadbolt, m. c. schraefel
, Les Carr:
AKTiveSA: A Technical Demonstrator System For Enhanced Situation Awareness. 703-716 - Gülay Öke, Georgios Loukas
:
A Denial of Service Detector based on Maximum Likelihood Detection and the Random Neural Network. 717-727
- Imtiaz Ahmad, A. Shoba Das:
Analysis and Detection Of Errors In Implementation Of SHA-512 Algorithms On FPGAs. 728-738 - Chung-Ming Huang, Jian-Wei Li:
Efficient and Provably Secure IP Multimedia Subsystem Authentication for UMTS. 739-757
- Jan Peters:
Computational Intelligence: Principles, Techniques and Applications. 758
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.