


default search action
The Computer Journal, Volume 44, 2001
Volume 44, Number 1, 2001
- Michael Luck

, Mark d'Inverno:
A Conceptual Framework for Agent Definition and Development. 1-20 - Giuseppe Anastasi, Alberto Bartoli

, Nicoletta De Francesco, Antonella Santone:
Efficient Verification of a Multicast Protocol for Mobile Computing. 21-30 - Sijing Zhang, E. Stewart Lee, Alan Burns:

Determining the Worst-case Synchronous Message Response Time in FDDI Networks. 31-41 - Juha Puustjärvi:

Workflow Concurrency Control. 42-53 - Jason Crampton, George Loizou, Greg O'Shea:

A Logic of Access Control. 54-66
Volume 44, Number 2, 2001
- Nicholas M. Donofrio:

Turing Memorial Lecture. 67-74 - Evaggelia Pitoura, Ioannis Fudos:

Distributed Location Databases for Tracking Highly Mobile Objects. 75-91 - Roberto Baldoni, Francesco Quaglia, Michel Raynal:

Consistent Checkpointing for Transaction Systems. 92-100 - Francis C. M. Lau, Philip K. W. Cheng, Savio S. H. Tse:

An Algorithm for the 2-Median Problem on Two-Dimensional Meshes. 101-108 - Nicoletta De Francesco, Alessandro Fantechi, Stefania Gnesi

, Paola Inverardi:
Finite Approximations for Model Checking Non-finite-state Processes. 109-123 - Daniel Y. Chao, Jose A. Nicdao:

Liveness for Synchronized Choice Petri Nets. 124-136 - Jason Crampton, George Loizou, Greg O'Shea:

A Logic of Access Control. 137-149
Volume 44, Number 3, 2001
- Willis H. Ware:

Introduction to Davies' paper. 151 - Donald W. Davies:

An Historical Study of the Beginnings of Packet Switching. 152-162 - Kostas Politopoulos, George F. Georgakopoulos, Panayotis Tsanakas:

Precedence Constrained Scheduling: A Case in P. 163-173 - Alan Stewart, Maurice Clint:

BSP-style Computation: a Semantic Investigation. 174-185 - Da-Qian Zhang, Kang Zhang, Jiannong Cao

:
A Context-sensitive Graph Grammar Formalism for the Specification of Visual Languages. 186-200 - SangKeun Lee, Chong-Sun Hwang:

Unified Protocols of Concurrency Control and Recovery in Distributed Object-based Databases. 201-213 - Choi-Hong Lai, Cos S. Ierotheou, Charaka J. Palansuriya, Koulis A. Pericleous

:
Performance Evaluation of a Distributed Algorithm for an Inverse Heat Conduction Problem. 214-220
Volume 44, Number 4, 2001
- Alexis C. Kaporis, Lefteris M. Kirousis, Evangelos Kranakis

, Danny Krizanc, Yannis C. Stamatiou
, Elias C. Stavropoulos:
Locating Information with Uncertainty in Fully Interconnected Networks with Applications to World Wide Web Information Retrieval. 221-229 - Howard Bowman, Jeremy W. Bryans

, John Derrick
:
Analysis of a Multimedia Stream using Stochastic Process Algebra. 230-245 - H. M. W. Verbeek

, Twan Basten
, Wil M. P. van der Aalst
:
Diagnosing Workflow Processes using Woflan. 246-279 - Yuke Wang, Carl McCrosky, Xiaoyu Song:

Single-faced Boolean Functions and their Minimization. 280-291 - Limin Xiang, Kazuo Ushijima:

On O(1) Time Algorithms for Combinatorial Generation. 292-302 - Margarita Amor, Francisco Argüello

, Juan López, Oscar G. Plata
, Emilio L. Zapata:
A Data-Parallel Formulation for Divide and Conquer Algorithms. 303-320 - Erkki Mäkinen

:
Comment on 'A Framework for Modelling Trojans and Computer Virus Infection'. 321-323 - Harold W. Thimbleby, Stuart Anderson

, Paul A. Cairns
:
Reply to 'Comment on "A Framework for Modelling Trojans and Computer Virus Infection"' by E. Mäkinen. 324-325 - Fred Cohen:

Reply to 'Comment on "A Framework for Modelling Trojans and Computer Virus Infection"' by E. Mäkinen. 326-327
Volume 44, Number 5, 2001
- Xiaohua Jia

, Deying Li, Xiao-Dong Hu, Ding-Zhu Du:
Optimal Placement of Web Proxies for Replicated Web Servers in the Internet. 329-339 - Aline Baggio, Gerco Ballintijn, Maarten van Steen

, Andrew S. Tanenbaum:
Efficient Tracking of Mobile Objects in Globe. 340-353 - San-Yuan Wang, Yu-Chee Tseng, Ching-Sung Shiu, Jang-Ping Sheu:

Balancing Traffic Load for Multi-Node Multicast in a Wormhole 2-D Torus/Mesh. 354-367 - Jehad Al-Sadi, Khaled Day

, Mohamed Ould-Khaoua:
Probability-based Fault-tolerant Routing in Hypercubes. 368-373 - Guihai Chen

, Francis C. M. Lau:
Layout of the Cube-connected Cycles without Long Wires. 374-383 - Jitian Xiao, Yanchun Zhang, Xiaohua Jia

:
Clustering Non-uniform-sized Spatial Objects to Reduce I/O Cost for Spatial-join Processing. 384-397 - Ngoc Thanh Nguyen:

Consensus-based Timestamps in Distributed Temporal Databases. 398-409 - David E. Losada

, Alvaro Barreiro:
A Logical Model for Information Retrieval based on Propositional Logic and Belief Revision. 410-424 - Robert W. P. Luk

:
Compact Morphic Directed Acyclic Word Graphs. 425-434 - Ousmane Koné:

A Local Approach to the Testing of Real-time Systems. 435-447 - Carlos Canal

, Lidia Fuentes
, Ernesto Pimentel
, José M. Troya, Antonio Vallecillo
:
Extending CORBA Interfaces with Protocols. 448-462 - Gwoboa Horng

:
An Efficient and Secure Protocol for Multi-party Key Establishment. 463-470
Volume 44, Number 6, 2001
- Ing-Ray Chen:

Special Issue Editorial: High Assurance Systems. 471-472 - Tadashi Dohi

, Katerina Goseva-Popstojanova
, Kishor S. Trivedi:
Estimating Software Rejuvenation Schedules in High-Assurance Systems. 473-485 - Steve Goddard, Kevin Jeffay:

Managing Latency and Buffer Requirements in Processing Graph Chains. 486-503 - Jeffrey J. P. Tsai, Eric Y. T. Juan

:
Modeling and Verification of High-Assurance Properties of Safety-Critical Systems. 504-530 - Iain Bate, Philippa Conmy

, Tim Kelly, John A. McDermid:
Use of Modern Processors in Safety-Critical Applications. 531-543 - Fabrizio Grandoni, Silvano Chiaradonna, Felicita Di Giandomenico, Andrea Bondavalli

:
Evaluation of Fault-Tolerant Multiprocessor Systems for High Assurance Applications. 544-556 - Zhiwei Xu

, Taghi M. Khoshgoftaar:
Software Quality Prediction for High-Assurance Network Telecommunications Systems. 557-568 - Alessandro F. Garcia, Delano M. Beder

, Cecília M. F. Rubira
:
A Unified Meta-Level Software Architecture for Sequential and Concurrent Exception Handling. 569-587

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














