


default search action
The Computer Journal, Volume 46, 2003
Volume 46, Number 1, January 2003
- Capsule Reviews. 1-2
- Giuseppe Anastasi, Marco Conti, Willy Lapenna:
A Power-Saving Network Architecture for Accessing the Internet from Mobile Computers: Design, Implementation and Measurements. 3-15 - Kim Potter Kihlstrom, Louise E. Moser, P. M. Melliar-Smith:
Byzantine Fault Detectors for Solving Consensus. 16-35 - Sotirios G. Ziavras, Qian Wang, Paraskevi Papathanasiou:
Viable Architectures for High-Performance Computing. 36-54 - Henning Pagnia, Holger Vogt, Felix C. Gärtner:
Fair Exchange. 55-75 - Frederic Paik Schoenberg, Thomas S. Ferguson, Cheng Li
:
Inverting Dirichlet Tessellations. 76-83 - Juan A. Carrasco:
Transient Analysis of Rewarded Continuous Time Markov Models by Regenerative Randomization with Laplace Transform Inversion. 84-99 - Hsien-Wen Tseng, Chin-Chen Chang:
Construction of Symmetrical Reversible Variable Length Codes Using Backtracking. 100-105 - James F. Korsh, Paul LaFollette:
Loopless Generation of Schröder Trees. 106-113
Volume 46, Number 2, February 2003
- Capsule Reviews. 121-122
- José María Álvarez, Manuel Díaz
, Luis Llopis
, Ernesto Pimentel
, José M. Troya:
An Object-oriented Methodology for Embedded Real-time Systems. 123-145 - Giuseppe Anastasi, Alberto Bartoli:
On the Structuring of Reliable Multicast Protocols for Distributed Mobile Systems. 146-160 - Jun Wu
, Tei-Wei Kuo
, Chih-wen Hsueh:
RCPCP: A Ceiling-based Protocol for Multiple-disk Environments. 161-173 - Tei-Wei Kuo
, Yen-Hsi Hou, Kam-yiu Lam:
The Impacts of Write-Through Procedures and Checkpointing on Real-Time Concurrency Control. 174-192 - Hung-Yu Chien, Jinn-ke Jan:
Robust and Simple Authentication Protocol. 193-201 - Carlo Blundo, Clemente Galdi:
Hiding Information in Image Mosaics. 202-212 - Jixin Ma
, Brian Knight:
Representing The Dividing Instant. 213-222
Volume 46, Number 3, May 2003
- Sourav S. Bhowmick
, Sanjay Madria, Wee Keong Ng
:
Representation of Web Data in A Web Warehouse. 229-262 - Mirko Viroli:
A Type-Passing Approach for the Implementation of Parametric Methods in Java. 263-294 - Florentin Ipate:
On the Minimality of Stream X-machines. 295-306 - Robert M. Hierons
:
Generating Candidates When Testing a Deterministic Implementation against a Non-deterministic Finite-state Machine. 307-318 - Panayiotis Bozanis, Alexandros Nanopoulos, Yannis Manolopoulos:
LR-tree: a Logarithmic Decomposable Spatial Index Method. 319-331
Volume 46, Number 4, July 2003
- Fabio Paternò, Carmen Santoro
:
Support for Reasoning about Interactive Systems through Human-Computer Interaction Designers' Representations. 340-357 - Randeep Bhatia, Rakesh K. Sinha, Chung-Min Chen:
A Hierarchical Technique for Constructing Efficient Declustering Schemes for Range Queries. 358-377 - Xiaohua Jia, Deying Li, Xiao-Dong Hu, Weili Wu, Ding-Zhu Du:
Placement of Web-Server Proxies with Consideration of Read and Update Operations on the Internet. 378-390 - Alan Gibbons, Aris Pagourtzis
, Igor Potapov, Wojciech Rytter:
Coarse-Grained Parallel Transitive Closure Algorithm: Path Decomposition Technique. 391-400 - Christian Rinderknecht:
An Algorithm for Validating ASN.1 (X.680) Specifications using Set Constraints. 401-420 - Aysegül Gençata, Feza Buzluca
:
Determining the Asynchronous Threshold Values of the Timed Token Medium Access Protocol. 421-426 - Tak-Ming Chan, Sam Kwong
, Kim-Fung Man:
Solving the Converter Placement Problem in WDM Ring Networks using Genetic Algorithms. 427-448 - Chang N. Zhang, Hua Li:
Design of Reconfigurable VLSI Architecture for Hybrid Arithmetic in $GF(2^m)$. 449-460
Volume 46, Number 5, September 2003
- Sameer M. Bataineh, Ghassan E. Qanzu'a:
Reliable Omega Interconnected Network for Large-Scale Multiprocessor Systems. 467-475 - Siddhartha Rai, Priti Shankar:
Efficient Statistical Modeling for the Compression of Tree Structured Intermediate Code. 476-486 - Shmuel Tomi Klein
, Yair Wiseman:
Parallel Huffman Decoding with Applications to JPEG Files. 487-497 - Alexandros V. Gerbessiotis, Constantinos J. Siniolakis:
Increasing the Efficiency of Existing Sorting Algorithms by Using Randomized Wrappers. 498-504 - Daniel Yuh Chao:
Extended Synchronized Choice Nets. 505-523 - Awais Rashid
, Lynne Blair:
Editorial: Aspect-oriented Programming and Separation of Crosscutting Concerns. 527-528 - Marcelo Sihman, Shmuel Katz:
Superimpositions and Aspect-oriented Programming. 529-541 - Karl J. Lieberherr, David H. Lorenz, Johan Ovlinger:
Aspectual Collaborations: Combining Modules and Aspects. 542-565 - Tony Clark
, Andy Evans, Stuart Kent:
Aspect-oriented Metamodelling. 566-577 - Ian S. Welch
, Robert J. Stroud:
Re-engineering Security as a Crosscutting Concern. 578-589
Volume 46, Number 6, November 2003
- Caroline Kovac:
Computing in the Age of the Genome. 593-597 - Ray J. Solomonoff:
The Kolmogorov Lecture* The Universal Distribution and Machine Learning. 598-601 - Vesper Owei:
Development of a Conceptual Query Language: Adopting the User-Centered Methodology. 602-624 - Keqin Li:
Speed-up of Parallel Processing of Divisible Loads on k-dimensional Meshes and Tori. 625-631 - Volker Heun, Ernst W. Mayr:
Efficient Embeddings into Hypercube-like Topologies. 632-644 - Ing-Ray Chen, Naresh Verma:
A Cost-Based Admission Control Algorithm for Digital Library Multimedia Systems Storing Heterogeneous Objects. 645-659 - Yannis Manolopoulos:
Introduction to the Special Section on Spatiotemporal Databases. 662-663 - Stéphane Grumbach, Philippe Rigaux, Luc Segoufin:
Handling Interpolated Data. 664-679 - José Antonio Cotelo Lema, Luca Forlizzi, Ralf Hartmut Güting, Enrico Nardelli, Markus Schneider:
Algorithms for Moving Objects Databases. 680-712 - Yannis Theodoridis
:
Ten Benchmark Database Queries for Location-based Services. 713-725

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.