Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/cj/cj31.bht:"
@article{DBLP:journals/cj/Akinyokun88, author = {Oluwole Charles Akinyokun}, title = {The Experimental Study of {CODASYL} Database Administration at the Secondary Storage Level}, journal = {Comput. J.}, volume = {31}, number = {4}, pages = {344--352}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.4.344}, doi = {10.1093/COMJNL/31.4.344}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Akinyokun88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Allison88, author = {Lloyd Allison}, title = {Some Applications of Continuations}, journal = {Comput. J.}, volume = {31}, number = {1}, pages = {9--11}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.1.9}, doi = {10.1093/COMJNL/31.1.9}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Allison88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/AneddaF88, author = {C. Anedda and Leonardo Felician}, title = {P-Compressed Quadtrees for Image Storing}, journal = {Comput. J.}, volume = {31}, number = {4}, pages = {353--357}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.4.353}, doi = {10.1093/COMJNL/31.4.353}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/AneddaF88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/AtkinsonBM88, author = {Malcolm P. Atkinson and Peter Buneman and Ronald Morrison}, title = {Binding and Type Checking in Database Programming Languages}, journal = {Comput. J.}, volume = {31}, number = {2}, pages = {99--109}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.2.99}, doi = {10.1093/COMJNL/31.2.99}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/AtkinsonBM88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/AvisonFW88, author = {David E. Avison and Guy Fitzgerald and A. T. Wood{-}Harper}, title = {Information Systems Development: {A} Tool Kit is not Enough}, journal = {Comput. J.}, volume = {31}, number = {4}, pages = {379--380}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.4.379}, doi = {10.1093/COMJNL/31.4.379}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/AvisonFW88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Bailes88, author = {Paul A. Bailes}, title = {An Advanced Problem-Oriented Introduction to Imperative Programming with Modula-2}, journal = {Comput. J.}, volume = {31}, number = {6}, pages = {531--539}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.6.531}, doi = {10.1093/COMJNL/31.6.531}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Bailes88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BarnardWM88, author = {Philip J. Barnard and Michael D. Wilson and Allan MacLean}, title = {Approximate Modelling of Cognitive Activity with and Expert System: {A} Theory-Based Strategy for Developing an Interactive Design Tool}, journal = {Comput. J.}, volume = {31}, number = {5}, pages = {445--456}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.5.445}, doi = {10.1093/COMJNL/31.5.445}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/BarnardWM88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BastaniIY88, author = {Farokh B. Bastani and S. Sitharama Iyengar and I{-}Ling Yen}, title = {Concurrent Maintenance of Data Structures in a Distributed Environment}, journal = {Comput. J.}, volume = {31}, number = {2}, pages = {165--174}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.2.165}, doi = {10.1093/COMJNL/31.2.165}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/BastaniIY88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BellMSA88, author = {David A. Bell and F. J. McErlean and P. M. Stewart and W. Arbuckle}, title = {Clustering Related Tuples in Databases}, journal = {Comput. J.}, volume = {31}, number = {3}, pages = {253--257}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.3.253}, doi = {10.1093/COMJNL/31.3.253}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/BellMSA88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BenyonM88, author = {David Benyon and Dianne Murray}, title = {Experience with Adaptive Interfaces}, journal = {Comput. J.}, volume = {31}, number = {5}, pages = {465--473}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.5.465}, doi = {10.1093/COMJNL/31.5.465}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/BenyonM88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Bjorn-Andersen88, author = {Niels Bj{\o}rn{-}Andersen}, title = {Are 'Human Factors' Human?}, journal = {Comput. J.}, volume = {31}, number = {5}, pages = {386--390}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.5.386}, doi = {10.1093/COMJNL/31.5.386}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Bjorn-Andersen88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Bradley88, author = {James Bradley}, title = {Polygon Join Dependencies, Closed Co-Relationship Chains and the Connection Trap in Relational Databases}, journal = {Comput. J.}, volume = {31}, number = {2}, pages = {141--146}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.2.141}, doi = {10.1093/COMJNL/31.2.141}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Bradley88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Burton88, author = {F. Warren Burton}, title = {Nondeterminism with Referential Transparency in Functional Programming Languages}, journal = {Comput. J.}, volume = {31}, number = {3}, pages = {243--247}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.3.243}, doi = {10.1093/COMJNL/31.3.243}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Burton88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ChangC88, author = {Chin{-}Chen Chang and C. Y. Chen}, title = {A Recursive Performance Formula of the Disc Modulo Allocation Method for Binary Cartesian Product Files}, journal = {Comput. J.}, volume = {31}, number = {6}, pages = {565--566}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.6.565}, doi = {10.1093/COMJNL/31.6.565}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ChangC88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Clarke88, author = {Roger A. Clarke}, title = {Judicial Understanding of Information Technology: The Case of the Wombat ROMs}, journal = {Comput. J.}, volume = {31}, number = {1}, pages = {25--33}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.1.25}, doi = {10.1093/COMJNL/31.1.25}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Clarke88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ColeF88, author = {R. Cole and Clare Foxcroft}, title = {An Experiment in Clock Synchronisation}, journal = {Comput. J.}, volume = {31}, number = {6}, pages = {496--502}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.6.496}, doi = {10.1093/COMJNL/31.6.496}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ColeF88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Czech88, author = {Zbigniew J. Czech}, title = {Efficient Implementation of Detection of Undefined Variables}, journal = {Comput. J.}, volume = {31}, number = {6}, pages = {545--549}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.6.545}, doi = {10.1093/COMJNL/31.6.545}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Czech88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/DavisW88, author = {Martin D. Davis and Elaine J. Weyuker}, title = {Metric Space- Based Test-Data Adequacy Criteria}, journal = {Comput. J.}, volume = {31}, number = {1}, pages = {17--24}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.1.17}, doi = {10.1093/COMJNL/31.1.17}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/DavisW88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/DawsonP88, author = {Kathryn S. Dawson and Lorraine M. Purgailis Parker}, title = {From Entity-Relationship Diagrams to Fourth Normal Form: {A} Pictorial Aid to Analysis}, journal = {Comput. J.}, volume = {31}, number = {3}, pages = {258--268}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.3.258}, doi = {10.1093/COMJNL/31.3.258}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/DawsonP88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/DearleB88, author = {Alan Dearle and Alfred L. Brown}, title = {Safe Browsing in a Strongly Typed Persistent Environment}, journal = {Comput. J.}, volume = {31}, number = {6}, pages = {540--544}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.6.540}, doi = {10.1093/COMJNL/31.6.540}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/DearleB88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/DeenTIR88, author = {S. Misbah Deen and Malcolm C. Taylor and P. A. Ingram and K. W. Rayner}, title = {A Distributed Directory Database System for Telecommunications}, journal = {Comput. J.}, volume = {31}, number = {2}, pages = {175--181}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.2.175}, doi = {10.1093/COMJNL/31.2.175}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/DeenTIR88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/DillonMR88, author = {Andrew Dillon and Cliff McKnight and John Richardson}, title = {Reading From Paper Versus Reading From Screen}, journal = {Comput. J.}, volume = {31}, number = {5}, pages = {457--464}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.5.457}, doi = {10.1093/COMJNL/31.5.457}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/DillonMR88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/DvoraD88, author = {S. Dvor{\'{a}}k and Branislav Durian}, title = {Merging by Decomposition Revisited}, journal = {Comput. J.}, volume = {31}, number = {6}, pages = {553--556}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.6.553}, doi = {10.1093/COMJNL/31.6.553}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/DvoraD88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/DvorakD88, author = {S. Dvor{\'{a}}k and Branislav Durian}, title = {Unstable Linear Time {O(1)} Space Merging}, journal = {Comput. J.}, volume = {31}, number = {3}, pages = {279--282}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.3.279}, doi = {10.1093/COMJNL/31.3.279}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/DvorakD88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/EasonH88, author = {Ken D. Eason and Susan Harker}, title = {The Supplier's Role in the Design of Products for Organisations}, journal = {Comput. J.}, volume = {31}, number = {5}, pages = {426--430}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.5.426}, doi = {10.1093/COMJNL/31.5.426}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/EasonH88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/EgyhazyT88, author = {Csaba J. Egyhazy and Konstantinos P. Triantis}, title = {A Query Processing Algorithm for Distributed Relational Database Systems}, journal = {Comput. J.}, volume = {31}, number = {1}, pages = {34--40}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.1.34}, doi = {10.1093/COMJNL/31.1.34}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/EgyhazyT88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Er88, author = {M. C. Er}, title = {A Simple Algorithm for Generating Non-Regular Trees in Lexicographic Order}, journal = {Comput. J.}, volume = {31}, number = {1}, pages = {61--64}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.1.61}, doi = {10.1093/COMJNL/31.1.61}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Er88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Er88a, author = {M. C. Er}, title = {A Fast Algorithm for Generating Set Partitions}, journal = {Comput. J.}, volume = {31}, number = {3}, pages = {283--284}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.3.283}, doi = {10.1093/COMJNL/31.3.283}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Er88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Er88b, author = {M. C. Er}, title = {A Smooth Reshuffling Algorithm for Solving the Bulterman's Problem}, journal = {Comput. J.}, volume = {31}, number = {6}, pages = {557--560}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.6.557}, doi = {10.1093/COMJNL/31.6.557}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Er88b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/FangD88, author = {Zhixi Fang and Jitender S. Deogun}, title = {Closure Properties of Certain Classes of Languages Under Generalized Morphic Replication}, journal = {Comput. J.}, volume = {31}, number = {4}, pages = {325--329}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.4.325}, doi = {10.1093/COMJNL/31.4.325}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/FangD88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/FranklinA88, author = {Wm. Randolph Franklin and Varol Akman}, title = {Adaptive Grid for Polyhedral Visibility in Object Space: An Implementation}, journal = {Comput. J.}, volume = {31}, number = {1}, pages = {56--60}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.1.56}, doi = {10.1093/COMJNL/31.1.56}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/FranklinA88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Gibbins88, author = {P. F. Gibbins}, title = {{VDM:} Axiomatising its Propositional Logic}, journal = {Comput. J.}, volume = {31}, number = {6}, pages = {510--516}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.6.510}, doi = {10.1093/COMJNL/31.6.510}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Gibbins88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/GopalakrishnanP88, author = {M. Gopalakrishnan and Lalit M. Patnaik}, title = {Medium Access Control Schemes for Local Area Networks with Multiple Priority Function}, journal = {Comput. J.}, volume = {31}, number = {3}, pages = {209--219}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.3.209}, doi = {10.1093/COMJNL/31.3.209}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/GopalakrishnanP88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/GoyalN88, author = {Pankaj Goyal and T. S. Narayanan}, title = {Dictionary Machine with Improved Performance}, journal = {Comput. J.}, volume = {31}, number = {6}, pages = {490--495}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.6.490}, doi = {10.1093/COMJNL/31.6.490}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/GoyalN88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Griswold88, author = {Ralph E. Griswold}, title = {Programming with Generators}, journal = {Comput. J.}, volume = {31}, number = {3}, pages = {220--228}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.3.220}, doi = {10.1093/COMJNL/31.3.220}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Griswold88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/GuarisoW88, author = {Giorgio Guariso and Hannes Werthner}, title = {A Software Base For Environmental Studies}, journal = {Comput. J.}, volume = {31}, number = {6}, pages = {550--552}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.6.550}, doi = {10.1093/COMJNL/31.6.550}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/GuarisoW88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Harker88, author = {Susan Harker}, title = {The Use of Prototyping and Simulation in the Development of Large-Scale Applications}, journal = {Comput. J.}, volume = {31}, number = {5}, pages = {420--425}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.5.420}, doi = {10.1093/COMJNL/31.5.420}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Harker88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HarrisonK88, author = {Peter G. Harrison and Hessam Khoshnevisan}, title = {Algebraic Transformation Techniques for Functional Languages}, journal = {Comput. J.}, volume = {31}, number = {3}, pages = {229--242}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.3.229}, doi = {10.1093/COMJNL/31.3.229}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/HarrisonK88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HelaryPR88, author = {Jean{-}Michel H{\'{e}}lary and No{\"{e}}l Plouzeau and Michel Raynal}, title = {A Distributed Algorithm for Mutual Exclusion in an Arbitrary Network}, journal = {Comput. J.}, volume = {31}, number = {4}, pages = {289--295}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.4.289}, doi = {10.1093/COMJNL/31.4.289}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HelaryPR88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HenschenW88, author = {Lawrence J. Henschen and Bob P. Weems}, title = {A Top-Down Inference Procedure for Template Dependencies}, journal = {Comput. J.}, volume = {31}, number = {1}, pages = {51--55}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.1.51}, doi = {10.1093/COMJNL/31.1.51}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HenschenW88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Henson88, author = {Martin C. Henson}, title = {Higher-Order Transformations and Type Simulations}, journal = {Comput. J.}, volume = {31}, number = {6}, pages = {517--524}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.6.517}, doi = {10.1093/COMJNL/31.6.517}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Henson88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HirschheimN88, author = {Rudy Hirschheim and Michael Newman}, title = {Information Systems and User Resistance: Theory and Practice}, journal = {Comput. J.}, volume = {31}, number = {5}, pages = {398--408}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.5.398}, doi = {10.1093/COMJNL/31.5.398}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HirschheimN88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/JagodzinskiC88, author = {A. P. Jagodzinski and D. D. Clarke}, title = {A Multidimensional Approach to the Measurement of Human-Computer Performance}, journal = {Comput. J.}, volume = {31}, number = {5}, pages = {409--419}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.5.409}, doi = {10.1093/COMJNL/31.5.409}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/JagodzinskiC88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Jankowitz88, author = {Hugo T. Jankowitz}, title = {Detecting Plagiarism in Student Pascal Programs}, journal = {Comput. J.}, volume = {31}, number = {1}, pages = {1--8}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.1.1}, doi = {10.1093/COMJNL/31.1.1}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Jankowitz88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Kiessling88, author = {Werner Kie{\ss}ling}, title = {Access Path Selection in Databases with Intelligent Disc Subsystems}, journal = {Comput. J.}, volume = {31}, number = {1}, pages = {41--50}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.1.41}, doi = {10.1093/COMJNL/31.1.41}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Kiessling88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/KontosC88, author = {John Kontos and John C. Cavouras}, title = {Knowledge Acquisition from Technical Texts Using Attribute Grammars}, journal = {Comput. J.}, volume = {31}, number = {6}, pages = {525--530}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.6.525}, doi = {10.1093/COMJNL/31.6.525}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/KontosC88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Lombardi88, author = {Fabrizio Lombardi}, title = {Analysis of Comparison-Based Diagnosable Systems Using Temporal Criteria}, journal = {Comput. J.}, volume = {31}, number = {3}, pages = {201--208}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.3.201}, doi = {10.1093/COMJNL/31.3.201}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Lombardi88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LucasM88, author = {Cormac Lucas and Gautam Mitra}, title = {Computer-Assisted Mathematical Programming (Modelling) System: {CAMPS}}, journal = {Comput. J.}, volume = {31}, number = {4}, pages = {364--375}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.4.364}, doi = {10.1093/COMJNL/31.4.364}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LucasM88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/MaesD88, author = {Rik Maes and J. E. M. van Dijk}, title = {On the Role of Ambiguity and Incompleteness in the Design of Decision Tables and Rule-Based Systems}, journal = {Comput. J.}, volume = {31}, number = {6}, pages = {481--489}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.6.481}, doi = {10.1093/COMJNL/31.6.481}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/MaesD88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/MegsonE88, author = {Graham M. Megson and David J. Evans}, title = {The Unification of Systolic Differencing Algorithms}, journal = {Comput. J.}, volume = {31}, number = {1}, pages = {83--91}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.1.83}, doi = {10.1093/COMJNL/31.1.83}, timestamp = {Tue, 13 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/MegsonE88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/MegsonE88a, author = {Graham M. Megson and David J. Evans}, title = {Improved Matrix Product Computation Using Double-Pipeline Systolic Arrays}, journal = {Comput. J.}, volume = {31}, number = {6}, pages = {567--569}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.6.567}, doi = {10.1093/COMJNL/31.6.567}, timestamp = {Tue, 13 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/MegsonE88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/MillerF88, author = {Mirka Miller and Ivan Fris}, title = {Minimum Diameter of Diregular Digraphs of Degree 2}, journal = {Comput. J.}, volume = {31}, number = {1}, pages = {71--75}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.1.71}, doi = {10.1093/COMJNL/31.1.71}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/MillerF88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Mingers88, author = {John Mingers}, title = {Comparing Conceptual Models and Data Flow Diagrams}, journal = {Comput. J.}, volume = {31}, number = {4}, pages = {376--379}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.4.376}, doi = {10.1093/COMJNL/31.4.376}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Mingers88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/MoffatG88, author = {David S. Moffat and Peter M. D. Gray}, title = {Perlog: {A} Prolog With Persistence and Modules}, journal = {Comput. J.}, volume = {31}, number = {2}, pages = {110--115}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.2.110}, doi = {10.1093/COMJNL/31.2.110}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/MoffatG88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/MorrisTPL88, author = {Derrick Morris and Colin J. Theaker and R. Phillips and W. Love}, title = {Human-Computer Interface Recording}, journal = {Comput. J.}, volume = {31}, number = {5}, pages = {437--444}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.5.437}, doi = {10.1093/COMJNL/31.5.437}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/MorrisTPL88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/MorrisTW88, author = {Derrick Morris and Colin J. Theaker and P. B. Whitehead}, title = {Structured Abstract Schematics}, journal = {Comput. J.}, volume = {31}, number = {3}, pages = {193--200}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.3.193}, doi = {10.1093/COMJNL/31.3.193}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/MorrisTW88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/OShea88, author = {Greg O'Shea}, title = {Controlling the Dependency of User Access Control Mechanisms on Correctness of User Identification}, journal = {Comput. J.}, volume = {31}, number = {6}, pages = {503--509}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.6.503}, doi = {10.1093/COMJNL/31.6.503}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/OShea88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Orman88, author = {Levent V. Orman}, title = {Functional Database Constraints}, journal = {Comput. J.}, volume = {31}, number = {4}, pages = {336--343}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.4.336}, doi = {10.1093/COMJNL/31.4.336}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Orman88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/OwrangM88, author = {Mehdi Owrang and Les L. Miller}, title = {Query Translation Based on Hypergraph Models}, journal = {Comput. J.}, volume = {31}, number = {2}, pages = {155--164}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.2.155}, doi = {10.1093/COMJNL/31.2.155}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/OwrangM88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Pachl88, author = {Jan K. Pachl}, title = {Two Livelock-Free Protocols for Slotted Rings}, journal = {Comput. J.}, volume = {31}, number = {5}, pages = {474--476}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.5.474}, doi = {10.1093/COMJNL/31.5.474}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/Pachl88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Pallo88, author = {Jean Marcel Pallo}, title = {Some Properties of the Rotation Lattice of Binary Trees}, journal = {Comput. J.}, volume = {31}, number = {6}, pages = {564--565}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.6.564}, doi = {10.1093/COMJNL/31.6.564}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Pallo88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Parr88, author = {Gerard P. Parr}, title = {Enhanced Address Resolution in a Multi-LAN Ethernet Communications System}, journal = {Comput. J.}, volume = {31}, number = {4}, pages = {296--303}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.4.296}, doi = {10.1093/COMJNL/31.4.296}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Parr88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Prather88, author = {Ronald E. Prather}, title = {Comparison and Extension of Theories of Zipf and Halstead}, journal = {Comput. J.}, volume = {31}, number = {3}, pages = {248--252}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.3.248}, doi = {10.1093/COMJNL/31.3.248}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Prather88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Quesne88, author = {P. N. Le Quesne}, title = {Individual and Organisational Factors and the Design of IPSEs}, journal = {Comput. J.}, volume = {31}, number = {5}, pages = {391--397}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.5.391}, doi = {10.1093/COMJNL/31.5.391}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Quesne88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/RazazS88, author = {M. Razaz and J. L. Schonfelder}, title = {Test Procedures for Measurement of Floating-Point Characteristics of Computing Environments}, journal = {Comput. J.}, volume = {31}, number = {1}, pages = {13--16}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.1.12}, doi = {10.1093/COMJNL/31.1.12}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/RazazS88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/RennhackkampS88, author = {M. H. Rennhackkamp and Sebastiaan H. von Solms}, title = {On Using an Abstract Model of Distributed Database Concurrency Control Methods}, journal = {Comput. J.}, volume = {31}, number = {6}, pages = {570--572}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.6.570}, doi = {10.1093/COMJNL/31.6.570}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/RennhackkampS88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Richards88, author = {D. Richards}, title = {On the Worst-Possible Analysis of Weighted Comparison-Based Algorithms}, journal = {Comput. J.}, volume = {31}, number = {3}, pages = {276--278}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.3.276}, doi = {10.1093/COMJNL/31.3.276}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Richards88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Roberts88, author = {W. T. Roberts}, title = {A Formal Specification of the {QMC} Message System: The Underlying Abstract Model}, journal = {Comput. J.}, volume = {31}, number = {4}, pages = {313--324}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.4.313}, doi = {10.1093/COMJNL/31.4.313}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Roberts88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Selim88, author = {Selim M. Selim}, title = {Split Vertices in Vertex Colouring and Their Application in Developing a Solution to the Faculty Timetable Problem}, journal = {Comput. J.}, volume = {31}, number = {1}, pages = {76--82}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.1.76}, doi = {10.1093/COMJNL/31.1.76}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Selim88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Sipala88, author = {Paolo Sipala}, title = {Efficient Implementation of Binary Trees in {LISP} Systems}, journal = {Comput. J.}, volume = {31}, number = {4}, pages = {330--335}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.4.330}, doi = {10.1093/COMJNL/31.4.330}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Sipala88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Small88, author = {Carol Small}, title = {The Implementation of the Exegesis System}, journal = {Comput. J.}, volume = {31}, number = {2}, pages = {125--132}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.2.125}, doi = {10.1093/COMJNL/31.2.125}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Small88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Spurr88, author = {Kathleen Spurr}, title = {A Data Dictionary Approach to Teaching Information Systems Analysis}, journal = {Comput. J.}, volume = {31}, number = {2}, pages = {182--189}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.2.182}, doi = {10.1093/COMJNL/31.2.182}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Spurr88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/StojmenovicM88, author = {Ivan Stojmenovic and Masahiro Miyakawa}, title = {Applications of a Subset-Generating Algorithm to Base Enumeration, Knapsack and Minimal Covering Problems}, journal = {Comput. J.}, volume = {31}, number = {1}, pages = {65--70}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.1.65}, doi = {10.1093/COMJNL/31.1.65}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/StojmenovicM88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/SubietaAM88, author = {Kazimierz Subieta and K. Anacki and Marek Missala}, title = {Overlay Clusters for {C} Programs}, journal = {Comput. J.}, volume = {31}, number = {3}, pages = {285--286}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.3.285}, doi = {10.1093/COMJNL/31.3.285}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/SubietaAM88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/SuraweeraA88, author = {Francis Suraweera and J. M. Al{-}Anzy}, title = {Analysis of a Modified Address Calculation Sorting Algorithm}, journal = {Comput. J.}, volume = {31}, number = {6}, pages = {561--563}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.6.561}, doi = {10.1093/COMJNL/31.6.561}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/SuraweeraA88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Tyldesley88, author = {D. A. Tyldesley}, title = {Employing Usability Engineering in the Development of Office Products}, journal = {Comput. J.}, volume = {31}, number = {5}, pages = {431--436}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.5.431}, doi = {10.1093/COMJNL/31.5.431}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Tyldesley88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Ullmann88, author = {Julian R. Ullmann}, title = {Fast Implementation of Relational Operations Via Inverse Projections}, journal = {Comput. J.}, volume = {31}, number = {2}, pages = {147--154}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.2.147}, doi = {10.1093/COMJNL/31.2.147}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Ullmann88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Weide88, author = {Theo P. van der Weide}, title = {Iterative Tree Traversal Using Refinements and Pointer Rotation}, journal = {Comput. J.}, volume = {31}, number = {3}, pages = {269--275}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.3.269}, doi = {10.1093/COMJNL/31.3.269}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Weide88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Williams88, author = {R. Williams}, title = {The Goblin Quadtree}, journal = {Comput. J.}, volume = {31}, number = {4}, pages = {358--363}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.4.358}, doi = {10.1093/COMJNL/31.4.358}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Williams88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WilliamsN88, author = {M. Howard Williams and K. A. Nicholson}, title = {An Approach to Handling Incomplete Information in Databases}, journal = {Comput. J.}, volume = {31}, number = {2}, pages = {133--140}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.2.133}, doi = {10.1093/COMJNL/31.2.133}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/WilliamsN88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZakiE88, author = {Mohammed Zaki and M. M. Elboraey}, title = {Analysis of Reliability Models for Interconnecting {MIMD} Systems}, journal = {Comput. J.}, volume = {31}, number = {4}, pages = {304--312}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.4.304}, doi = {10.1093/COMJNL/31.4.304}, timestamp = {Mon, 28 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZakiE88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhaoR88, author = {Liping Zhao and S. A. Roberts}, title = {An Object-Oriented Data Model for Database Modelling, Implementation and Access}, journal = {Comput. J.}, volume = {31}, number = {2}, pages = {116--124}, year = {1988}, url = {https://doi.org/10.1093/comjnl/31.2.116}, doi = {10.1093/COMJNL/31.2.116}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhaoR88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.