Table of contents for issues of The Computer Journal

Last update: Fri Oct 13 13:02:33 MDT 2017                Valid HTML 3.2!

Volume 33, Number 1, 1990
Volume 33, Number 2, 1990
Volume 33, Number 3, 1990
Volume 33, Number 4, 1990
Volume 33, Number 5, 1990
Volume 33, Number 6, 1990
Volume 34, Number 1, 1991
Volume 34, Number 2, 1991
Volume 34, Number 3, June, 1991
Volume 34, Number 4, August, 1991
Volume 34, Number 5, 1991
Volume 34, Number 6, December, 1991
Volume 7, Number ??, 1992
Volume 35, Number 1, February, 1992
Volume 35, Number 2, April, 1992
Volume 35, Number 3, June, 1992
Volume 35, Number 4, August, 1992
Volume 35, Number 5, October, 1992
Volume 35, Number 6, December, 1992
Volume 36, Number 1, 1993
Volume 36, Number 2, April, 1993
Volume 36, Number 3, June, 1993
Volume 36, Number 4, 1993
Volume 36, Number 5, October, 1993
Volume 36, Number 6, December, 1993
Volume 36, Number 7, 1993
Volume 36, Number 8, 1993
Volume 37, Number 1, 1994
Volume 37, Number 2, 1994
Volume 37, Number 3, 1994
Volume 37, Number 4, 1994
Volume 37, Number 5, 1994
Volume 37, Number 6, 1994
Volume 37, Number 7, 1994
Volume 37, Number 8, 1994
Volume 37, Number 9, 1994
Volume 37, Number 10, 1994
Volume 38, Number 1, 1995
Volume 38, Number 2, 1995
Volume 38, Number 3, 1995
Volume 38, Number 4, 1995
Volume 38, Number 5, 1995
Volume 38, Number 6, 1995
Volume 38, Number 7, 1995
Volume 38, Number 8, 1995
Volume 38, Number 9, 1995
Volume 38, Number 10, 1995
Volume 39, Number 1, 1996
Volume 39, Number 2, 1996
Volume 39, Number 3, 1996
Volume 39, Number 4, 1996
Volume 39, Number 5, 1996
Volume 39, Number 6, 1996
Volume 39, Number 7, 1996
Volume 39, Number 8, 1996
Volume 39, Number 9, 1996
Volume 39, Number 10, 1996
Volume 40, Number 1, 1997
Volume 40, Number 2--3, 1997
Volume 40, Number 4, 1997
Volume 40, Number 5, 1997
Volume 40, Number 6, 1997
Volume 40, Number 7, 1997
Volume 40, Number 8, 1997
Volume 40, Number 9, 1997
Volume 40, Number 10, 1997
Volume 41, Number 1, 1998
Volume 41, Number 2, 1998
Volume 41, Number 3, 1998
Volume 41, Number 4, 1998
Volume 41, Number 5, 1998
Volume 41, Number 6, 1998
Volume 41, Number 7, 1998
Volume 41, Number 8, 1998
Volume 42, Number 1, 1999
Volume 42, Number 2, 1999
Volume 42, Number 3, 1999
Volume 42, Number 4, 1999
Volume 42, Number 5, 1999
Volume 42, Number 6, 1999
Volume 42, Number 7, 1999
Volume 42, Number 8, 1999
Volume 44, Number 4, 2001


The Computer Journal
Volume 33, Number 1, 1990

                      Anonymous   Editorial --- Databases  . . . . . . . . 1--1
                 K. H. Baik and   
                   L. L. Miller   Topological Approach for Testing
                                  Equivalence in Heterogeneous Relational
                                  Databases  . . . . . . . . . . . . . . . 2--10
                      Anonymous   Announcement . . . . . . . . . . . . . . 10--10
                    N. L. Sarda   Algebra and Query Language for A
                                  Historical Data Model  . . . . . . . . . 11--18
                  M. Levene and   
                      G. Loizou   The nested relation type model: an
                                  application of domain theory to
                                  databases  . . . . . . . . . . . . . . . 19--30
                      Anonymous   Announcement . . . . . . . . . . . . . . 30--30
                    M. Azmoodeh   BRMQ: a database interface facility
                                  based on graph traversals and extended
                                  relationships on groups of entities  . . 31--39
                 D. A. Bell and   
                    J. Shao and   
           M. Elizabeth C. Hull   Integrated Deductive Database System
                                  Implementation. A Systematic Study . . . 40--48
                      Anonymous   Announcements  . . . . . . . . . . . . . 48--48
                   M. C. Taylor   Logical optimisation of distributed
                                  knowledge base queries . . . . . . . . . 49--60
               T. P. Martin and   
                  K. H. Lam and   
                Judy I. Russell   An Evaluation of Site Selection
                                  Algorithms for Distributed Query
                                  Processing . . . . . . . . . . . . . . . 61--70
                      Anonymous   Announcement . . . . . . . . . . . . . . 70--70
                 D. Agrawal and   
                   A. El Abbadi   Integrating Security with Fault-tolerant
                                  Distributed Databases  . . . . . . . . . 71--78
                      Anonymous   Announcements  . . . . . . . . . . . . . 78--78
               R. Mukkamala and   
                   S. C. Bruell   Efficient schemes to evaluate
                                  transaction performance in distributed
                                  database systems . . . . . . . . . . . . 79--89
                     D. A. Kemp   Correspondence . . . . . . . . . . . . . 90--91
                   P. J. Marcer   Correspondence . . . . . . . . . . . . . 91--92
                  G. J. Chaitin   Correspondence . . . . . . . . . . . . . 92--92
                    B. G. Gooch   Correspondence . . . . . . . . . . . . . 92--92
                     T. Stonier   Correspondence . . . . . . . . . . . . . 92--93
                      Anonymous   Announcement . . . . . . . . . . . . . . 93--93
                 G. G. Scarrott   Correspondence . . . . . . . . . . . . . 93--93

The Computer Journal
Volume 33, Number 2, 1990

                      Anonymous   Editorial --- Procedural Programming . . 97--97
                 R. E. Griswold   String Scanning in the Icon Programming
                                  Language . . . . . . . . . . . . . . . . 98--107
             P. C. Philbrow and   
                 M. P. Atkinson   Events and exception handling in
                                  PS-Algol . . . . . . . . . . . . . . . . 108--125
                      Anonymous   Announcements  . . . . . . . . . . . . . 125--125
               R. G. Dromey and   
                  T. A. Chorvat   Structure Clashes --- An Alternative to
                                  Program Inversion  . . . . . . . . . . . 126--132
                  M. O. Jokinen   Parameter Transmission Abstractions  . . 133--139
                      Anonymous   Announcements  . . . . . . . . . . . . . 139--139
                       G. Whale   Identification of Program Similarity in
                                  Large Populations  . . . . . . . . . . . 140--146
                      Anonymous   Announcements  . . . . . . . . . . . . . 146--146
               G. L. Davies and   
                       A. Burns   The Teaching Language Pascal-FC  . . . . 147--154
                      Anonymous   Announcements  . . . . . . . . . . . . . 154--154
                 C. F. Reynolds   CODIL: The Architecture of an
                                  Information Language . . . . . . . . . . 155--163
                      Anonymous   Announcement . . . . . . . . . . . . . . 163--163
                      Anonymous   Wilkes Award . . . . . . . . . . . . . . 163--163
         Gerald D. P. Dueck and   
              Gordon V. Cormack   Modular Attribute Grammars . . . . . . . 164--172
               Marian Petre and   
                      R. Winder   On Languages, Models and Programming
                                  Styles . . . . . . . . . . . . . . . . . 173--180
                 H. Berghel and   
                      R. Rankin   A Proposed Standard for Measuring
                                  Crossword Compilation Efficiency . . . . 181--184
                      Anonymous   Announcements  . . . . . . . . . . . . . 184--184
            R. Govindarajan and   
                  L. M. Patnaik   Short Notes: Lenient Execution and
                                  Concurrent Execution of Re-entrant
                                  Routines: Efficient Implementation in
                                  Data Flow Systems  . . . . . . . . . . . 185--187
                      Anonymous   Announcements  . . . . . . . . . . . . . 187--187
                     K. Brokate   Correspondence . . . . . . . . . . . . . 188--188
                  C. G. Burgess   Correspondence . . . . . . . . . . . . . 188--188
               S. Dvorák   Correspondence . . . . . . . . . . . . . 188--188
                   S. W. Palmer   Correspondence . . . . . . . . . . . . . 188--188

The Computer Journal
Volume 33, Number 3, 1990

                     H. Liddell   Editorial --- Parallel Computing . . . . 193--193
                O. G. Plata and   
             J. D. Bruguera and   
               F. F. Rivera and   
                  R. Doallo and   
                   E. L. Zapata   ACLE: a Software Package for SIMD
                                  Computer Simulation  . . . . . . . . . . 194--203
                  S. Gulati and   
              S. S. Iyengar and   
                      J. Barhen   The Pebble-crunching Model for
                                  Fault-tolerant Load Balancing in
                                  Hypercube Ensembles  . . . . . . . . . . 204--214
                      Anonymous   Announcements  . . . . . . . . . . . . . 214--214
                   K. W. Ng and   
                    H. F. Leung   Competition: a Model of AND-Parallel
                                  Execution of Logic Programs  . . . . . . 215--218
           Camille C. Price and   
                   M. A. Salama   Scheduling of Precedence-Constrained
                                  Tasks on Multiprocessors . . . . . . . . 219--229
                      Anonymous   Announcements  . . . . . . . . . . . . . 229--229
                D. Abramson and   
                        G. Egan   The RMIT Data Flow Computer: a Hybrid
                                  Architecture . . . . . . . . . . . . . . 230--240
                     S. Dey and   
                  P. K. Srimani   A New Parallel Sorting Algorithm and its
                                  Efficient VLSI Implementation  . . . . . 241--246
                      Anonymous   Announcements  . . . . . . . . . . . . . 246--246
                   P. Chaudhuri   Finding and updating depth-first
                                  spanning trees of acyclic digraphs in
                                  parallel . . . . . . . . . . . . . . . . 247--251
                F.-. C. Lin and   
                        K. Chen   On the design of an integrated systolic
                                  array for solving simultaneous linear
                                  equations  . . . . . . . . . . . . . . . 252--260
                   G. M. Megson   An efficient double pipe systolic array
                                  for matrix product . . . . . . . . . . . 261--265
                      Anonymous   Announcements  . . . . . . . . . . . . . 265--265
                       H. Wills   Fundamentals of Pricing and Scheduling
                                  Computer Services and Investment in
                                  Computer Equipment . . . . . . . . . . . 266--273
                      Anonymous   Announcements  . . . . . . . . . . . . . 273--273
                     J. S. Rohl   Reversing is not inherent in
                                  lexicographical permutation generation   274--278
                      Anonymous   Announcements  . . . . . . . . . . . . . 278--278
               F. W. Burton and   
              J. G. Kollias and   
             D. G. Matsakis and   
                  V. G. Kollias   Short Note: Implementation of
                                  Overlapping B-Trees for Time and Space
                                  Efficient Representation of Collections
                                  of Similar Files . . . . . . . . . . . . 279--280
                      Anonymous   Announcements  . . . . . . . . . . . . . 280--280
                 G. Xunrang and   
                     Z. Yuzhang   Short Note: a new HEAPSORT Algorithm and
                                  the Analysis of its Complexity . . . . . 281--282
                      Anonymous   Announcements  . . . . . . . . . . . . . 282--282

The Computer Journal
Volume 33, Number 4, 1990

                      A. Jordan   Editorial --- Communications . . . . . . 289--289
                C. Mitchell and   
                    D. Rush and   
                      M. Walker   A Secure Messaging Architecture
                                  Implementing the X.400-1988 Security
                                  Features . . . . . . . . . . . . . . . . 290--295
             A. S. Fraenkel and   
                    S. T. Klein   Bidirectional Huffman Coding . . . . . . 296--307
               R. L. Bailey and   
                   R. Mukkamala   Pipelining Data Compression Algorithms   308--313
                      Anonymous   Announcements  . . . . . . . . . . . . . 313--313
                     P. Fenwick   Performance Measurements on a 39 km
                                  Extended Ethernet  . . . . . . . . . . . 314--322
                     Y. Pan and   
                      R. Melhem   Short circuits in buffered multi-stage
                                  interconnection networks . . . . . . . . 323--329
                      Anonymous   Announcement . . . . . . . . . . . . . . 329--329
               F. W. Burton and   
              G. P. McKeown and   
            V. J. Rayward-Smith   Applications of UET scheduling theory to
                                  the implementation of declarative
                                  languages  . . . . . . . . . . . . . . . 330--336
                  D. Alcock and   
                       D. Brown   PRAXIS: a Program for Reproducing
                                  Proforma Design Calculations . . . . . . 337--343
                  M. Ancona and   
             L. De Floriani and   
                   J. S. Deogun   Structured Spanning Trees  . . . . . . . 344--355
                      Anonymous   Announcement . . . . . . . . . . . . . . 355--355
                 R. Feldman and   
                 M. C. Golumbic   Optimization algorithms for student
                                  scheduling via constraint satisfiability 356--364
                      Anonymous   Announcement . . . . . . . . . . . . . . 364--364
                   B. K. Haddon   Cycle-Sort: a Linear Sorting Method  . . 365--367
               B. J. Oommen and   
                    D. T. H. Ng   On Generating Random Permutations with
                                  Arbitrary Distributions  . . . . . . . . 368--374
                      Anonymous   Announcement . . . . . . . . . . . . . . 374--374
                   H. Miyakoshi   A Literal Code Method for Minimizing
                                  Boolean Functions  . . . . . . . . . . . 375--380
                  T. H. Merrett   Short Note: Scoping is not Orthogonal to
                                  Completeness . . . . . . . . . . . . . . 381--381
                  T. H. Merrett   Scoping is not orthogonal to
                                  completeness . . . . . . . . . . . . . . 381--381
                J. Won Park and   
                S. R. Maeng and   
                     J. Wan Cho   Correspondence . . . . . . . . . . . . . 382--382

The Computer Journal
Volume 33, Number 5, 1990

                   J. Landsdown   Editorial --- Communications . . . . . . 385--385
              S. B. M. Bell and   
                    D. C. Mason   Tesseral Quaternions for the Octtree . . 386--397
                  A. Hunter and   
                   P. J. Willis   A Note on the Optimal Labelling of
                                  Quadtree Nodes . . . . . . . . . . . . . 398--401
                  K. G. Suffern   Quadtree Algorithms for Contouring
                                  Functions of Two Variables . . . . . . . 402--407
                 L. R. Neal and   
              M. L. V. Pitteway   Yet More Circle Generators . . . . . . . 408--411
                        B. Pham   Algorithms for calculating cubic
                                  Beta-splines . . . . . . . . . . . . . . 412--416
                      Anonymous   Announcements  . . . . . . . . . . . . . 416--416
                  P. Puliti and   
                     G. Tascini   Interpreting Technical Drawings  . . . . 417--423
                   F. Dehne and   
                   L. Ficocelli   An efficient computational geometry
                                  method for detecting dotted lines in
                                  noisy images . . . . . . . . . . . . . . 424--428
                 L. Moltedo and   
                    A. Noferini   An Implementation of $7$-bit Character
                                  Encoding for Standard Computer Graphics
                                  Environments . . . . . . . . . . . . . . 429--436
                  N. E. Wiseman   Book Review  . . . . . . . . . . . . . . 436--436
             F. Neelamkavil and   
                   O. Mullarney   Separating Graphics from Application in
                                  the Design of User Interfaces  . . . . . 437--443
                M. Bilodeau and   
                   D. Laguitton   Development of Screen Management
                                  Subroutines Compatible with Microsoft
                                  FORTRAN Compiler . . . . . . . . . . . . 444--452
                      K. Bowden   Kron's method of tearing on a Transputer
                                  Array  . . . . . . . . . . . . . . . . . 453--459
                     L. Allison   Continuations Implement Generators and
                                  Streams  . . . . . . . . . . . . . . . . 460--465
                      Anonymous   Announcement . . . . . . . . . . . . . . 465--465
                   T. H. Axford   Reference Counting of Cyclic Graphs for
                                  Functional Programs  . . . . . . . . . . 466--470
                   A. Andersson   Short Note: a Note on the Expected
                                  Behaviour of Binary Tree Traversals  . . 471--472
                    G. Alia and   
                  E. Martinelli   Short note: VLSI Binary-Residue
                                  Converters for Pipelined Processing  . . 473--475
               B. E. P. Clement   Correspondence . . . . . . . . . . . . . 475--475
                      Anonymous   Announcements  . . . . . . . . . . . . . 476--477

The Computer Journal
Volume 33, Number 6, 1990

                     S. Gregory   Editorial --- Concurrent Logic
                                  Programming  . . . . . . . . . . . . . . 481--481
                    K. L. Clark   Parallel Logic Programming . . . . . . . 482--493
              Kazunori Ueda and   
           Takashi C. Chikayama   Design of the kernel language for the
                                  parallel inference machine . . . . . . . 494--500
                      Anonymous   Announcements  . . . . . . . . . . . . . 500--500
                  I. Foster and   
               C. Kesselman and   
                      S. Taylor   Concurrency: Simple Concepts and
                                  Powerful Tools . . . . . . . . . . . . . 501--507
                      Anonymous   Announcements  . . . . . . . . . . . . . 507--507
                     I. Shizgal   The Amoeba-Prolog System . . . . . . . . 508--517
                      Anonymous   Announcements  . . . . . . . . . . . . . 517--517
                    J. G. Wolff   Simplicity and Power --- Some Unifying
                                  Ideas in Computing . . . . . . . . . . . 518--534
                K. G. Waugh and   
             M. H. Williams and   
                    Q. Kong and   
                 S. Salvini and   
                        G. Chen   Designing SQUIRREL: an extended SQL for
                                  a deductive database system  . . . . . . 535--546
                      Anonymous   Announcements  . . . . . . . . . . . . . 546--546
                N. W. Paton and   
                  P. M. D. Gray   Optimising and executing DAPLEX queries
                                  using Prolog . . . . . . . . . . . . . . 547--555
                  H. J. Roberts   Expert Systems Clubs: Design Methods . . 556--561
                      Anonymous   Announcements  . . . . . . . . . . . . . 561--561
               G. M. Megson and   
                    D. J. Evans   A Systolic Array Solution for the
                                  Assignment Problem . . . . . . . . . . . 562--569
                     T. Y. Chen   On the Consistency of Multi-valued
                                  Functions  . . . . . . . . . . . . . . . 570--572
                      Anonymous   Announcements  . . . . . . . . . . . . . 572--572


The Computer Journal
Volume 34, Number 1, 1991

                      M. Thomas   Editorial --- Term Rewriting . . . . . . 1--1
                  A. J. J. Dick   An Introduction to Knuth--Bendix
                                  Completion . . . . . . . . . . . . . . . 2--15
                    J. A. Vince   Book Review  . . . . . . . . . . . . . . 15--15
              A. J. J. Dick and   
                      P. Watson   Order-sorted Term Rewriting  . . . . . . 16--19
                 M. Hermann and   
                C. Kirchner and   
                    H. Kirchner   Implementations of Term Rewriting
                                  Systems  . . . . . . . . . . . . . . . . 20--33
                      T. Nipkow   Constructive Rewriting . . . . . . . . . 34--41
                     T. Drapkin   Book Review  . . . . . . . . . . . . . . 41--41
                    P. Padawitz   Reduction and Narrowing for Horn Clause
                                  Theories . . . . . . . . . . . . . . . . 42--51
                      P. Kacsuk   A Parallel Prolog Abstract Machine and
                                  its Multi-Transputer Implementation  . . 52--63
                      J. Paakki   Prolog in Practical Compiler Writing . . 64--72
                       B. Dwyer   Correspondence . . . . . . . . . . . . . 72--72
                       L. Orman   Constraint Maintenance as a Data Model
                                  Design Criterion . . . . . . . . . . . . 73--79
              F. B. Bastani and   
                 I.-R. Chen and   
                       W. Hilal   A model for the stability analysis of
                                  maintenance strategies for linear list   80--87
                      Anonymous   Announcements  . . . . . . . . . . . . . 87--87
                    M. A. Weiss   Short Note: Empirical study of the
                                  expected running time of Shellsort . . . 88--91
                      Anonymous   Announcements  . . . . . . . . . . . . . 91--91
                   J.-L. Wu and   
                    S.-T. Cheng   Short Note: a Neural Network Simulating
                                  System . . . . . . . . . . . . . . . . . 92--93

The Computer Journal
Volume 34, Number 2, 1991

                  C. J. Theaker   Editorial  . . . . . . . . . . . . . . . 97--97
               D. E. Avison and   
              A. T. Wood-Harper   Information systems development
                                  research: an exploration of ideas in
                                  practice . . . . . . . . . . . . . . . . 98--112
                      Anonymous   Wilkes Award . . . . . . . . . . . . . . 112--112
                       F. Noble   Seven Ways to Develop Office Systems: a
                                  Managerial Comparison of Office System
                                  Development Methodologies  . . . . . . . 113--121
                      Anonymous   Announcement . . . . . . . . . . . . . . 121--121
                   C.-C. D. Poo   Representing business policies in the
                                  Jackson system development method  . . . 122--131
            A. G. Sutcliffe and   
                        I. Wang   Integrating human computer interaction
                                  with Jackson system development  . . . . 132--142
                      Anonymous   Announcement . . . . . . . . . . . . . . 142--142
                  T. H. Tse and   
                        L. Pong   An examination of requirements
                                  specification languages  . . . . . . . . 143--152
                      Anonymous   Announcement . . . . . . . . . . . . . . 152--152
                    J. Trenouth   A Survey of Exploratory Software
                                  Development  . . . . . . . . . . . . . . 153--163
                      Anonymous   Announcement . . . . . . . . . . . . . . 163--163
       M. Elizabeth C. Hull and   
           P. G. O'Donoghue and   
                    B. J. Hagan   Development Methods for Real-Time
                                  Systems  . . . . . . . . . . . . . . . . 164--172
                   A. Burns and   
                   A. M. Lister   A Framework for Building Dependable
                                  Systems  . . . . . . . . . . . . . . . . 173--181
                      Anonymous   Announcement . . . . . . . . . . . . . . 181--181
                  P. Hammersley   Information Systems Design Methodologies
                                  --- Book Reviews . . . . . . . . . . . . 182--185
                      Anonymous   Announcement . . . . . . . . . . . . . . 185--185
                D. Campbell and   
                     T. McNeill   Finding a Majority When Sorting is Not
                                  Available  . . . . . . . . . . . . . . . 186--186
                D. Campbell and   
                     T. McNeill   Short Note: Finding a majority when
                                  sorting is not available . . . . . . . . 186--186

The Computer Journal
Volume 34, Number 3, June, 1991

                   M. V. Wilkes   Editorial --- the Maturing of VLSI ---
                                  and its Consequences for the Computer
                                  Industry . . . . . . . . . . . . . . . . 193--194
                     C. Hankins   Book Review  . . . . . . . . . . . . . . 194--194
                    J. Jagiello   Book Review  . . . . . . . . . . . . . . 194--194
                  M. Ancona and   
                A. Clematis and   
             L. De Floriani and   
                       E. Puppo   HIDEL: a Language for Hierarchical VLSI
                                  Design . . . . . . . . . . . . . . . . . 195--206
                   W. S. Elliot   Correspondence . . . . . . . . . . . . . 206--206
                   B. Wilkinson   Comparative Performance of Overlapping
                                  Connectivity Multiprocessor
                                  Interconnection Networks . . . . . . . . 207--214
                      A. Olerup   Design Approaches: a Comparative Study
                                  of Information System Design and
                                  Architectural Design . . . . . . . . . . 215--224
           M. H. O'Docherty and   
               C. N. Daskalakis   Multimedia Information Systems --- The
                                  Management and Semantic Retrieval of all
                                  Electronic Data Types  . . . . . . . . . 225--238
                      Anonymous   Announcements  . . . . . . . . . . . . . 238--238
                    P. King and   
                       C. Small   Default Databases and Incomplete
                                  Information  . . . . . . . . . . . . . . 239--244
                      Anonymous   Announcements  . . . . . . . . . . . . . 244--244
                    R. Marshall   Manipulating Full-text Scientific
                                  Databases: a Logic-based
                                  Se\-man\-tico-prag\-matic Approach . . . 245--253
                  I. A. Macleod   A Query Language for Retrieving
                                  Information from Hierarchic Text
                                  Structures . . . . . . . . . . . . . . . 254--264
                    I. W. Merry   Correspondence . . . . . . . . . . . . . 264--264
                  K. Morgan and   
               R. L. Morris and   
                       S. Gibbs   When does a mouse become a rat? or
                                  \ldotsComparing performance and
                                  preferences in direct manipulation and
                                  command line environment . . . . . . . . 265--271
                      Anonymous   Announcements  . . . . . . . . . . . . . 271--271
The Rt. Hon. The Earl of Halsbury   `Innovation for Failure --- Some
                                  Reflections on the Work of the NRDC
                                  Relevant to the Early History of the
                                  Computer Industry in the UK' . . . . . . 272--274
The Rt. Hon. The Earl of Halsbury   Ten Years of Computer Development  . . . 275--279
                       V. Akman   Short notes: Implementation of
                                  Karp--Luby Monte Carlo method: an
                                  exercise in approximate counting . . . . 279--282
                K. Wicovsky and   
             P. F. Thanisch and   
                 M. H. Williams   Short Notes: Improved Recursion Handling
                                  through Integrity Constraints  . . . . . 282--285

The Computer Journal
Volume 34, Number 4, August, 1991

                     Ian Watson   Editorial --- Concurrent Programming . . 289--289
                 H. Kingdon and   
               D. R. Lester and   
                     G. L. Burn   The HDG-Machine: a Highly Distributed
                                  Graph-Reducer for a Transputer Network   290--301
               D. B. Skillicorn   Practical Concurrent Programming for
                                  Parallel Machines  . . . . . . . . . . . 302--310
                   J. Henderson   Correspondence . . . . . . . . . . . . . 310--310
                  J. Padget and   
                R. Bradford and   
                       J. Fitch   Concurrent Object-Oriented Programming
                                  in Lisp  . . . . . . . . . . . . . . . . 311--319
                  A. S. Douglas   Book Review  . . . . . . . . . . . . . . 319--319
                  A. S. Douglas   Book Review  . . . . . . . . . . . . . . 319--319
                     M.-C. Pong   I-Pigs: an Interactive Graphical
                                  Environment for Concurrent Programming   320--330
        E. J. Yannakoudakis and   
                   A. A. Shahid   A Controlled Environment for
                                  Meta-Message Processing  . . . . . . . . 331--344
                      Anonymous   Announcement . . . . . . . . . . . . . . 344--344
                   K-B. Yue and   
                    R. T. Jacob   An Efficient Starvation-Free Semaphore
                                  Solution for the Graphical Mutual
                                  Exclusion Problem  . . . . . . . . . . . 345--349
                      S. Khanna   Logic Programming for Software
                                  Verification and Testing . . . . . . . . 350--357
              M. L. V. Pitteway   Book Review  . . . . . . . . . . . . . . 357--357
                  J. Vanthienen   Algorithm 124: a Longest Path Algorithm
                                  to Display Decision Tables . . . . . . . 358--362
                      Anonymous   Algorithms Supplement  . . . . . . . . . 358--379
               A. P. Hammersley   Algorithm 125: Efficient Two-Dimensional
                                  Fast Fourier Transform Subroutines for
                                  Real-Valued or Hermitian data  . . . . . 362--370
                 W. Dobosiewicz   Algorithm 126: Linear Probing Sort . . . 370--373
                J. K. Slape and   
                P. J. L. Wallis   Algorithm 127: a modification of Sale's
                                  algorithm to accommodate FORTRAN 77  . . 373--376
                 A. Stewart and   
                    C. Holt and   
                   M. Clint and   
                     R. Perrott   Algorithm 128: a DAP FORTRAN subroutine
                                  for thinning digitised pictures  . . . . 377--379
                     E. Makinen   Efficient Generation of
                                  Rotational-Admissible Codewords for
                                  Binary Trees . . . . . . . . . . . . . . 379--379
                E. Mäkinen   Short Notes  . . . . . . . . . . . . . . 379--379
                   C. Brink and   
             I. M. Rewitzky and   
                  R. A. Schmidt   Short Notes: Autodescriptivity: beware!  380--381
                      Anonymous   Announcement . . . . . . . . . . . . . . 381--381

The Computer Journal
Volume 34, Number 5, 1991

                       D. Giles   Editorial --- Data Structures  . . . . . 385--385
                   David Watson   Editorial: Data Structures . . . . . . . 385--385
                  D. J. Challab   Implementation of Flexible Arrays Using
                                  Balanced Trees . . . . . . . . . . . . . 386--396
                     K. Bhaskar   Book Review  . . . . . . . . . . . . . . 396--396
                  B. Srinivasan   An adaptive overflow technique to defer
                                  splitting in B-trees . . . . . . . . . . 397--405
                 F. Hussain and   
              M. L. V. Pitteway   Correspondence . . . . . . . . . . . . . 405--405
                    W. F. Smyth   Mu-balancing M-way Search Trees  . . . . 406--414
                      Anonymous   Announcements  . . . . . . . . . . . . . 414--414
            S. P. Dandamudi and   
                 P. G. Sorenson   Improved Partial-Match Search Algorithms
                                  for BD Trees . . . . . . . . . . . . . . 415--422
                     S. Maybank   Book Review  . . . . . . . . . . . . . . 422--422
                    B. Wichmann   Book Review  . . . . . . . . . . . . . . 422--422
                  S. Olariu and   
           C. M. Overstreet and   
                        Z. Wenn   A Mergeable Double-ended Priority Queue  423--427
                   C. T. Bhunia   Correspondence . . . . . . . . . . . . . 427--427
                    D. Naor and   
               C. U. Martel and   
                  N. S. Matloff   Performance of Priority Queue Structures
                                  in a Virtual Memory Environment  . . . . 428--437
                      Anonymous   Announcement . . . . . . . . . . . . . . 437--437
                E. Mäkinen   A Survey on Binary Tree Codings  . . . . 438--443
                        G. Argo   Weighting Without Waiting: the Weighted
                                  Path Length Tree . . . . . . . . . . . . 444--449
                  P. M. Fenwick   A New Technique for Self-Organising
                                  Linear Searches  . . . . . . . . . . . . 450--454
                      Anonymous   Announcement . . . . . . . . . . . . . . 454--454
                Seng Fat Ou and   
                  Alan L. Tharp   High Storage Utilisation for
                                  Single-Probe Retrieval Linear Hashing    455--468
                      Anonymous   Announcement . . . . . . . . . . . . . . 468--468
                    E. Oxborrow   Book Review  . . . . . . . . . . . . . . 468--468
                C. C. Chang and   
                 C. Y. Chen and   
                      J. K. Jan   On the Design of a Machine-Independent
                                  Perfect Hashing Scheme . . . . . . . . . 469--474
                    D. Shepherd   Book Review  . . . . . . . . . . . . . . 474--474
                 P. Ru\vzi\vcka   Short Note: a Note on the Efficiency of
                                  an Interval Routing Algorithm  . . . . . 475--476
                      Anonymous   Announcement . . . . . . . . . . . . . . 476--476

The Computer Journal
Volume 34, Number 6, December, 1991

                 Andrew Herbert   Editorial: Distributed Systems . . . . . 481--481
                 W. B. Daszczuk   A Structured Semantic Design of
                                  Distributed Operating Systems  . . . . . 482--492
                      Anonymous   Announcements  . . . . . . . . . . . . . 492--492
                  N. T. Son and   
                       Y. Paker   Adaptive deadlock-free packet routing in
                                  transputer-based multiprocessor
                                  interconnection networks . . . . . . . . 493--502
              P. A. Kalinchenko   Does a Point Belong to a Polygon?  . . . 502--502
                 L. Mancini and   
              S. K. Shrivastava   Fault-Tolerant Reference Counting for
                                  Garbage Collection in Distributed
                                  Systems  . . . . . . . . . . . . . . . . 503--513
                       M. C. Er   A Note on the Optimality of a Reve
                                  Algorithm  . . . . . . . . . . . . . . . 513--513
               J. Dollimore and   
                 E. Miranda and   
                        Wang Xu   The Design of a System for Distributing
                                  Shared Objects . . . . . . . . . . . . . 514--521
                     I. D. Hill   Book Review: Valerie Illingworth
                                  (editor), \booktitleDictionary of
                                  Computing (third edition)  . . . . . . . 521--521
                  M. S. Verrall   Unity Doesn't Imply Unification or
                                  Overcoming Heterogeneity Problems in
                                  Distributed Software Engineering
                                  Environments . . . . . . . . . . . . . . 522--533
                  Andrew Dillon   Abstracts in Human Computer Interaction  533--533
                 D. Agrawal and   
                     A. Malpani   Efficient Dissemination of Information
                                  in Computer Networks . . . . . . . . . . 534--541
                      Anonymous   Announcements  . . . . . . . . . . . . . 541--541
                  L. H. Geesink   The Coordination of Distributed Active
                                  Messages in a Dynamic Network Topology   542--550
                      Anonymous   Announcements  . . . . . . . . . . . . . 550--550
                 P. Bodorik and   
                  J. S. Riordon   Threshold Values for Processing
                                  Distributed Queries  . . . . . . . . . . 551--558
                      Anonymous   Announcements  . . . . . . . . . . . . . 558--558
                      D. Michie   Methodologies from Machine Learning in
                                  Data Analysis and Software . . . . . . . 559--565
                      Anonymous   Announcement . . . . . . . . . . . . . . 565--565
                 Lu Lahodynskyj   Structure Clashes  . . . . . . . . . . . 566--568
                     J. S. Rohl   Ord-Smith's pseudo-lexicographical
                                  permutation procedure is the
                                  Tompkins-Paige algorithm . . . . . . . . 569--570
                      Anonymous   Additional Papers  . . . . . . . . . . . 571--572
                   G. M. Megson   Book Review: D. Gassilloud and J. C.
                                  Grossetie (eds), \booktitleComputing
                                  with Parallel Architectures --- T. Node  573b-573
                  Chris Osborne   Book Review: Helene G. Kershner,
                                  \booktitleIntroduction to Computer
                                  Literacy . . . . . . . . . . . . . . . . 573--573
                  Chris Osborne   Book Review: Ernest S. Colantonio,
                                  \booktitleA Laboratory Course in DOS,
                                  Wordperfect 5.0, Lotus 1-2-3, dBASE IV   573a-573
               V. S. Alagar and   
                   P. Goyal and   
                 P. S. Nair and   
                       F. Sadri   Integrated magic set method: a rule
                                  rewrite scheme for optimising linear
                                  datalog programs . . . . . . . . . . . . A121--A129
                  S. Dvorak and   
                      B. Durian   Decomposition merging with symmetric
                                  exchanges  . . . . . . . . . . . . . . . A029--A033
                 A. Ghafoor and   
                   F. Y. Farhat   Dynamic concurrency control algorithms
                                  for large distributed database systems   A095--A104
                    V. Goel and   
                Y. V. Venkatesh   On an optimal and faster construction of
                                  linear quadtrees from raster-scanned
                                  images . . . . . . . . . . . . . . . . . A073--A083
                      K. K. Lau   Top-down synthesis of sorting algorithm  A001--A007
               W. W. L. Lee and   
                   D. S. Bowers   A relational database simulator  . . . . A061--A072
                    R. Marshall   Discourse and natural-language text
                                  analysis: functional grammar approach    A035--A060
               B. J. Oommen and   
                    D. C. Y. Ma   Stochastic automata solutions to the
                                  object partitioning problem  . . . . . . A105--A120
                     W. Wah and   
                      S. G. Akl   Simulating multiple memory accesses in
                                  logarithmic time and linear space  . . . A085--A088
                 C. J. Wang and   
                   C. H. Wu and   
                   V. P. Nelson   A study of the generalized multiple
                                  bus-connected parallel computer  . . . . A089--A094
                     D. A. Watt   Modular description of programming
                                  languages  . . . . . . . . . . . . . . . A009--A028


The Computer Journal
Volume 7, Number ??, 1992

                     G. Tredoux   Mechanizing Execution Sequence Semantics
                                  in HOL . . . . . . . . . . . . . . . . . 81--86


The Computer Journal
Volume 35, Number 1, February, 1992

             Brian Wichmann and   
                   Philip Giles   Editorial  . . . . . . . . . . . . . . . 1--2
                   A. Burns and   
                J. McDermid and   
                      J. Dobson   On the Meaning of Safety and Security    3--15
                 Rachel Burnett   Yearbook of Law Computers and
                                  Technology, Volume 5 . . . . . . . . . . 15--15
                J.-J. Hwang and   
                 B.-M. Shao and   
                     P. C. Wang   A new access control method using prime
                                  factorisation  . . . . . . . . . . . . . 16--20
         M. V. D. Burmester and   
              Y. G. Desmedt and   
                        T. Beth   Efficient Zero-Knowledge Identification
                                  Schemes for Smart Cards  . . . . . . . . 21--29
             Mildred L. G. Shaw   Human Factors for Informatics Usability  29--29
                R. de Lemos and   
                   A. Saeed and   
                    T. Anderson   A Train Set as a Case Study for the
                                  Requirements Analysis of Safety-Critical
                                  Systems  . . . . . . . . . . . . . . . . 30--40
        Christopher Hankins and   
                     John Vince   Book reviews: \booktitleThe SGML
                                  Handbook, by Charles Goldfarb, 1990;
                                  \booktitleFractal Creations, by Timothy
                                  Wegner and Mark Peterson, 1991 . . . . . 40--40
                     John Vince   Fractal Creations  . . . . . . . . . . . 40a-40
                 B. A. Wichmann   A Note on the Use of Floating Point in
                                  Critical Systems . . . . . . . . . . . . 41--44
                  M. Ho Kim and   
                    S. Pramanik   Optimizing Database Accesses for
                                  Parallel Processing of Multikey Range
                                  Searches . . . . . . . . . . . . . . . . 45--51
                      Anonymous   Announcement . . . . . . . . . . . . . . 51--51
                 I. F. Akyildiz   Performance Analysis of a Multiprocessor
                                  System Model with Process Communication  52--61
                      Anonymous   Announcement . . . . . . . . . . . . . . 61--61
            R. G. Börn and   
                  J. R. Kenevan   Theoretical Performance-Based
                                  Cost-Effectiveness of Multicomputers . . 62--70
                    Faith Noble   Office Information Systems . . . . . . . 70--70
                        H. Shen   Self-adjusting Mapping: a Heuristic
                                  Mapping Algorithm for Mapping Parallel
                                  Programs on to Transputer Networks . . . 71--80
                   Peter Wallis   Mathematical Structures for Software
                                  Engineering  . . . . . . . . . . . . . . 80--80
                        D. Kaur   Hierarchical Hypernet for Pipelining . . 81--87
                M. Vassallo and   
                     A. Ralston   Algorithms for De Bruijn Sequences --- A
                                  Case Study in the Empirical Analysis of
                                  Algorithms . . . . . . . . . . . . . . . 88--90
            A. van de Liefvoort   An Iterative Algorithm for the Reve's
                                  Puzzle . . . . . . . . . . . . . . . . . 91--92
                      Anonymous   Additional Papers  . . . . . . . . . . . 93--93

The Computer Journal
Volume 35, Number 2, April, 1992

                      Anonymous   Editorial  . . . . . . . . . . . . . . . 97--97
                     W. Sun and   
                    W. Meng and   
                          C. Yu   Query Optimisation in Distributed
                                  Object-Oriented Database Systems . . . . 98--107
                      Anonymous   Announcements  . . . . . . . . . . . . . 107--107
                      Anonymous   Erratum  . . . . . . . . . . . . . . . . 107a-107
                  J. A. Mariani   Oggetto: An Object Oriented Database
                                  Layered on a Triple Store  . . . . . . . 108--118
                    G. Scarrott   Logic and Information  . . . . . . . . . 118--118
               A. Poulovassilis   The Implementation of FDL, a Functional
                                  Database Language  . . . . . . . . . . . 119--128
                     I. D. Hill   Book Review: B. Samways and T.
                                  Byrne-Jones, \booktitleCollins Gem Basic
                                  Facts: Computers, 3rd edn  . . . . . . . 128--128
              J. S. H. Yang and   
                 Y. H. Chin and   
                    C. G. Chung   Many-Sorted First-Order Logic Database
                                  Language . . . . . . . . . . . . . . . . 129--137
                      Anonymous   Announcements  . . . . . . . . . . . . . 137--137
             P. G. Harrison and   
                H. Khoshnevisan   The Mechanical Transformation of Data
                                  Types  . . . . . . . . . . . . . . . . . 138--147
                        D. Ince   Formal Specification using Z . . . . . . 147a-147
                       N. Obeid   Nonmonotonic Reasoning: Logical
                                  Foundation of Commonsense  . . . . . . . 147--147
       Th. P. Van Der Weide and   
      A. H. M. Ter Hofstede and   
                  P. Van Bommel   Uniquest: Determining the Semantics of
                                  Complex Uniqueness Constraints . . . . . 148--156
                     L. Paulson   Logical Frameworks . . . . . . . . . . . 156--156
                  T. Conlon and   
                     S. Gregory   Debugging Tools for Concurrent Logic
                                  Programming  . . . . . . . . . . . . . . 157--169
             S. J. Thompson and   
                     R. D. Lins   The Categorical Multi-Combinator
                                  Machine: CMCM  . . . . . . . . . . . . . 170--176
                      Ken Moody   An Introduction to Formal Languages and
                                  Automata . . . . . . . . . . . . . . . . 176--176
              O. Nevalainen and   
                       T. Raita   An Internal Hybrid Sort Algorithm
                                  Revisited  . . . . . . . . . . . . . . . 177--183
                     I. Shearer   Retrospective Update: Data as it was
                                  Believed to be . . . . . . . . . . . . . 184--184
                   T. D. Gedeon   The Reve's Puzzle: an Iterative Solution
                                  Produced by Transformation . . . . . . . 186--186
                      Anonymous   Additional Papers  . . . . . . . . . . . 188--188

The Computer Journal
Volume 35, Number 3, June, 1992

       Keith Van Rijsbergen and   
              Maristella Agosti   Editorial --- the Context of Information
                                  Retrieval  . . . . . . . . . . . . . . . 193--193
          Maristella Agosti and   
         Pier Giorgio Marchetti   User Navigation in the IRS Conceptual
                                  Structure through a Semantic Association
                                  Function . . . . . . . . . . . . . . . . 194--199
                    D. C. Blair   Information Retrieval and the Philosophy
                                  of Language  . . . . . . . . . . . . . . 200--207
                      A. Gilles   The Art of Computer Systems Performance
                                  Analysis (Techniques for Experimental
                                  Design, Measurement, Simulation, and
                                  Modeling)  . . . . . . . . . . . . . . . 207--207
                P. D. Bruza and   
            T. P. Van Der Weide   Stratified Hypermedia Structures for
                                  Information Disclosure . . . . . . . . . 208--220
                      Anonymous   Announcement . . . . . . . . . . . . . . 220--220
              Alison Cawsey and   
             Julia Galliers and   
               Steven Reece and   
             Karen Sparck Jones   Automating the Librarian: Belief
                                  Revision as a Base for System Action and
                                  Communication with the User  . . . . . . 221--232
             Y. Chiaramella and   
                J. P. Chevallet   About Retrieval Models and Logic . . . . 233--242
                      Anonymous   Announcement . . . . . . . . . . . . . . 242--242
                   Norbert Fuhr   Probabilistic Models in Information
                                  Retrieval  . . . . . . . . . . . . . . . 243--255
                    Judy Bishop   Introduction to Pascal and Structured
                                  Design; Pascal plus Data Structures,
                                  Algorithms and Advanced Programming  . . 255--255
            David J. Harper and   
            Andrew D. M. Walker   ECLAIR: an Extensible Class Library for
                                  Information Retrieval  . . . . . . . . . 256--267
                Alan F. Smeaton   Progress in the Application of Natural
                                  Language Processing to Information
                                  Retrieval Tasks  . . . . . . . . . . . . 268--278
                      Anonymous   Announcement . . . . . . . . . . . . . . 278a-278
                 Mark Sanderson   Conceptual Information Retrieval --- a
                                  Case Study in Adaptive Partial Parsing   278--278
           Howard R. Turtle and   
                 W. Bruce Croft   A Comparison of Text Retrieval Models    279--290
                      Anonymous   Erratum  . . . . . . . . . . . . . . . . 290a-290
                   M. A. Turega   Neural Networks  . . . . . . . . . . . . 290--290
           C. J. van Rijsbergen   Probabilistic Retrieval Revisited  . . . 291--298
                      Anonymous   Correspondence . . . . . . . . . . . . . 298--298
                    David Gries   Correspondence: On ``Finding a Majority
                                  When Sorting is Not Available''  . . . . 298--298
                C. C. Chang and   
                 H. Y. Chen and   
                     C. Y. Chen   Symbolic Gray Code As a Data Allocation
                                  Scheme for Two-Disc Systems  . . . . . . 299--305
                      Anonymous   Announcement . . . . . . . . . . . . . . 305--305
                       M. C. Er   Efficient Generation of $k$-ary Trees in
                                  Natural Order  . . . . . . . . . . . . . 306--308
         W. R. Dufrene, Jr. and   
                      F. C. Lin   An Efficient External Sort Algorithm
                                  with no Additional Space . . . . . . . . 308--310
                      Anonymous   Announcements  . . . . . . . . . . . . . 310--310
                      Anonymous   Additional Papers  . . . . . . . . . . . 311--312
            Feliks Kluzniak and   
           Stanislaw Szpakowicz   Correspondence . . . . . . . . . . . . . 313--313

The Computer Journal
Volume 35, Number 4, August, 1992

                      Anonymous   Editorial --- Models and Architectures   321--321
             S. W. Dietrich and   
                   M. Brown and   
            E. Cortes-Rello and   
                   S. Wunderlin   A Practitioner's Introduction to
                                  Database Performance Benchmarks and
                                  Measurements . . . . . . . . . . . . . . 322--331
                     Dan Diaper   Human-Computer Interaction: Theory and
                                  Practice . . . . . . . . . . . . . . . . 331--331
              D. H. O. Ling and   
                     D. A. Bell   Modelling and Managing Time in Database
                                  Systems  . . . . . . . . . . . . . . . . 332--341
           E. Auramäki and   
              R. Hirschheim and   
                    K. Lyytinen   Modelling offices through discourse
                                  analysis: the SAMPO approach . . . . . . 342--352
                      Anonymous   Announcement . . . . . . . . . . . . . . 352--352
                      M. Turega   A Computer Architecture to Support
                                  Neural Net Simulation  . . . . . . . . . 353--360
             R. Männer and   
                      O. Stucky   Fault-Tolerant Data Transfer in a
                                  Multiprocessor System by Forward and
                                  Backward Hardware Error Recovery . . . . 361--368
                     Alan Burns   Constructing Predictable Real-Time
                                  Systems  . . . . . . . . . . . . . . . . 368a-368
                 Ronald Stamper   A Theory of Computer Semiotics . . . . . 368--368
               J. Rosenberg and   
                J. L. Keedy and   
                    D. Abramson   Addressing Mechanisms for Large Virtual
                                  Memories . . . . . . . . . . . . . . . . 369--375
                    R. A. Frost   Constructing Programs as Executable
                                  Attribute Grammars . . . . . . . . . . . 376--389
                C. C. Chang and   
                  H. F. Lin and   
                     C. Y. Chen   Optimality properties of the disc modulo
                                  allocation method for $k$-ary multiple
                                  key hashing files  . . . . . . . . . . . 390--394
                      Anonymous   Announcement . . . . . . . . . . . . . . 394--394
                   R. Sprugnoli   Properties of Binary Trees Related to
                                  Position . . . . . . . . . . . . . . . . 395--404
                    Carl French   Computer Science . . . . . . . . . . . . 404--404
                     B. Parhami   Systolic Number Radix Converters . . . . 405--409
                    S. Carlsson   A Note on Heapsort . . . . . . . . . . . 410--411
                      Anonymous   Announcements  . . . . . . . . . . . . . 411--411
                      Anonymous   Additional Papers  . . . . . . . . . . . 412--413

The Computer Journal
Volume 35, Number 5, October, 1992

                     John Cooke   Editorial --- Formal Methods: What? Why?
                                  and When?  . . . . . . . . . . . . . . . 417--418
                       J. Cooke   Formal methods --- Mathematics, Theory,
                                  Recipes or what? . . . . . . . . . . . . 419--423
                      Anonymous   Announcements  . . . . . . . . . . . . . 423--423
                      A. Galton   Classical Logic: a Crash Course for
                                  Beginners  . . . . . . . . . . . . . . . 424--430
                        D. Ince   Case Technology  . . . . . . . . . . . . 430--430
                   P. Thainisch   Real-time Transaction Processin  . . . . 430a-430
                      A. Galton   Logic as a Formal Method . . . . . . . . 431--440
              J. C. P. Woodcock   The Rudiments of Algorithm Refinement    441--450
                     Dave Berry   Ml for the Working Programme . . . . . . 450a-450
                     P. Quinlan   Neural Network Parallel Computing  . . . 450--450
                     T. Clement   The Role of Data Reification in Program
                                  Refinement: Origins, Synthesis and
                                  Appraisal  . . . . . . . . . . . . . . . 451--459
                   H. Ehrig and   
                    B. Mahr and   
                 I. Classen and   
                      F. Orejas   Introduction to Algebraic Specification.
                                  Part 1: Formal Methods for Software
                                  Development  . . . . . . . . . . . . . . 460--467
                      Anonymous   Special Issue on Spatial Data --- Call
                                  for Papers . . . . . . . . . . . . . . . 467--467
                   H. Ehrig and   
                    B. Mahr and   
                      F. Orejas   Introduction to Algebraic Specification.
                                  Part 2: From Classical View to
                                  Foundations of System Specifications . . 468--477
                      Anonymous   Announcement . . . . . . . . . . . . . . 477a-477
                     A. Leeming   Informatization in the Public Sector . . 477--477
            M. van Sinderen and   
          L. Ferreira Pires and   
                  C. A. Vissers   Protocol Design and Implementation Using
                                  Formal Methods . . . . . . . . . . . . . 478--491
                  L. C. Paulson   Functional Programming with Hope . . . . 491--491
           E. Auramäki and   
              R. Hirschheim and   
                    K. Lyytinen   Modelling Offices Through Discourse
                                  Analysis: a Comparison and Evaluation of
                                  SAMPO with OSSAD and ICN . . . . . . . . 492--500
                      Anonymous   Announcement . . . . . . . . . . . . . . 500--500
                  B. Czejdo and   
                   M. C. Taylor   Integration of Information Systems Using
                                  an Object-Oriented Approach  . . . . . . 501--513
                      Anonymous   Announcements  . . . . . . . . . . . . . 513--513
  Harald Sòndergaard and   
                  Peter Sestoft   Non-Determinism in Functional Languages  514--523
             A. A. Bertossi and   
                  F. Luccio and   
                   L. Pagli and   
                        E. Lodi   Short notes: a parallel solution to the
                                  approximate string matching problem  . . 524--526
                  D. J. Challab   Short notes: Flexible arrays: evaluation
                                  of the B-tree based system . . . . . . . 527--529
                   David Furber   Short notes: a survey of the teaching of
                                  programming to computing undergraduates
                                  in U.K. Universities and Polytechnics    530--533
                D. T. H. Ng and   
                   B. J. Oommen   Short notes: a short note on
                                  doubly-linked list re-organizing
                                  heuristics . . . . . . . . . . . . . . . 533--535
                 B. Jamison and   
                      S. Olariu   Short notes: Indexing for
                                  multi-attribute retrieval  . . . . . . . 535--537
                      Anonymous   Announcement . . . . . . . . . . . . . . 537--537
                      Anonymous   Additional Papers  . . . . . . . . . . . 538--538
                      Anonymous   Announcement . . . . . . . . . . . . . . 539a-539
                   Roy Dyckhoff   Book Review  . . . . . . . . . . . . . . 539--539
                 K. N. Dandeker   Implementation of parameterised views in
                                  relational query languages with a macro
                                  processor  . . . . . . . . . . . . . . . A425
             F. Neelamkavil and   
                      S. O'Shea   Interfacing Eiffel and PCTE  . . . . . . A439
                 P. W. Oman and   
                  K. Van Houten   On the use of binary strings to
                                  represent tree structures  . . . . . . . A463
           V. T. H. Paschos and   
             A. N. Stafylopatis   Evaluation of the execution cost of
                                  recursive definitions  . . . . . . . . . A429
                       F. Sadri   Data dependencies in deductive databases A415
        E. J. Yannakoudakis and   
              H. A. Attar-Bashi   Constructing natural language sentences
                                  from database tuples . . . . . . . . . . A445

The Computer Journal
Volume 35, Number 6, December, 1992

                     John Cooke   Editorial --- Formal Methods: What? Why?
                                  and When?  . . . . . . . . . . . . . . . 545--546
               E. A. Boiten and   
              H. A. Partsch and   
                D. Tuijnman and   
                 N. Völker   How to Produce Correct Software --- An
                                  Introduction to Formal Specification and
                                  Program Development by Transformations   547--554
                      Anonymous   Special Issue on Spatial Data --- Call
                                  for Papers . . . . . . . . . . . . . . . 554a-554
                       R. Moore   Programming with VDM . . . . . . . . . . 554--554
                 P. G. Harrison   A Higher-Order Approach to Parallel
                                  Algorithms . . . . . . . . . . . . . . . 555--566
               P. G. Larsen and   
                        N. Plat   Standards for Non-Executable
                                  Specification Languages  . . . . . . . . 567--573
                      J. Bishop   A Compiler Writer's Toolbox  . . . . . . 573--573
                     D. R. Kuhn   A Technique for Analyzing the Effects of
                                  Changes in Formal Specifications . . . . 574--578
                      Anonymous   Notice . . . . . . . . . . . . . . . . . 578--578
              L. M. Barroca and   
                 J. A. McDermid   Formal methods: use and relevance for
                                  the development of safety-critical
                                  systems  . . . . . . . . . . . . . . . . 579--599
                      Anonymous   Announcement . . . . . . . . . . . . . . 599--599
              L. T. Semmens and   
               R. B. France and   
                T. W. G. Docker   Integrated structured analysis and
                                  formal specification techniques  . . . . 600--610
                      Anonymous   Announcement . . . . . . . . . . . . . . 610a-610
                   R. E. Cooley   The Integration of Expert Systems into
                                  Mainstream Software  . . . . . . . . . . 610--610
               V. Mi\vsi\'c and   
           D. Vela\vsevi\'c and   
                 B. Lazarevi\'c   Formal Specification of a Data
                                  Dictionary for an Extended ER Data Model 611--622
                     G. O'Neill   Short note: Automatic translation of VDM
                                  specifications into Standard ML programs 623--624
                Trevor Clarkson   Book review: \booktitleVLSI Design of
                                  Neural Networks, by Ulrich Ramacher and
                                  Ulrich Ruckert . . . . . . . . . . . . . 624--624
                Trevor Clarkson   Vlsi Design of Neural Networks . . . . . 624--624
                       I. Bruha   AI Multilanguage System McPOPLOG: The
                                  Power of Communication Between its
                                  Subsystems . . . . . . . . . . . . . . . 625--629
                         J. Mak   CD-ROMs in Print: an International Guide
                                  to CD-ROM, CD-I, CDTV & Electronic Book
                                  Product  . . . . . . . . . . . . . . . . 629--629
                   F. Barsi and   
                  M. C. Pinotti   Adding Flexibility to Hybrid Number
                                  Systems  . . . . . . . . . . . . . . . . 630--635
                      Anonymous   Announcement . . . . . . . . . . . . . . 635--635
                    I. J. Davis   A Fast Radix Sort  . . . . . . . . . . . 636--642
                      Anonymous   Announcement . . . . . . . . . . . . . . 642--642
                B.-C. Huang and   
                 M. A. Langston   Fast stable merging and sorting in
                                  constant extra space . . . . . . . . . . 643--650
             M. A. H. MacCallum   Book Review  . . . . . . . . . . . . . . 650a-650
                  R. E. Massara   Book Review  . . . . . . . . . . . . . . 650--650
               A. P. Robson and   
                D. J. Kinniment   Simstrict: a Behavioural Simulator for
                                  Use with the Strict Hardware Description
                                  Language . . . . . . . . . . . . . . . . 651--654
              C. M. Eastman and   
                R. P. Trueblood   Occupancy Models for the Estimation of
                                  Block Accesses . . . . . . . . . . . . . 654--658
                  C. H. Lin and   
                C. C. Chang and   
                   R. C. T. Lee   A Record-Oriented Cryptosystem for
                                  Database Sharing . . . . . . . . . . . . 658--660
                A. P. Korah and   
                   M. R. Kaimal   A Short Note on Perfectly Balanced
                                  Binary Search Trees  . . . . . . . . . . 660--662
                   Y-C. Hou and   
                      J-C. Tsay   On Equivalent Systolic Designs of $LU$
                                  Decomposition and its Algebraic
                                  Representation . . . . . . . . . . . . . 662--666
                Y. Manolopoulos   Reverse Chaining for Answering Temporal
                                  Logical Queries  . . . . . . . . . . . . 666--668
                      Anonymous   Announcement . . . . . . . . . . . . . . 668a-668
                   Peter Wallis   Software Reuse Guidelines and Method . . 668--668
                      Anonymous   Additional Papers  . . . . . . . . . . . 669--670
                      Anonymous   Errata . . . . . . . . . . . . . . . . . 670--670
                   J. K. Mullin   Hash functions for hash-based join
                                  methods  . . . . . . . . . . . . . . . . A499--A503


The Computer Journal
Volume 36, Number 1, 1993

              K. van Rijsbergen   Editorial  . . . . . . . . . . . . . . . 1--1
Keith van Rijsbergen, Editor-in-Chief   Welcome  . . . . . . . . . . . . . . . . 1--1
                  D. Hutchinson   Special Issue Editorial: Distributed
                                  Multimedia Systems . . . . . . . . . . . 2--3
                David Hutchison   Special Issue Editorial: Distributed
                                  Multimedia Systems . . . . . . . . . . . 2
                    F. Horn and   
                  J. B. Stefani   On Programming and Supporting Multimedia
                                  Object Synchronisation . . . . . . . . . 4--18
              S. Ramanathan and   
               P. Venkat Rangan   Feedback techniques for intra-media
                                  continuity and inter-media
                                  synchronization in distributed
                                  multimedia systems . . . . . . . . . . . 19--31
            Phillip Lougher and   
                  Doug Shepherd   The Design of a Storage Server for
                                  Continuous Media . . . . . . . . . . . . 32--42
                   W. Tawbi and   
                    F. Horn and   
                 E. Horlait and   
           J.-B. Stéfani   Video Compression Standards and Quality
                                  of Service . . . . . . . . . . . . . . . 43--54
                    Ian Wakeman   Packetized video: options for
                                  interaction between the user, the
                                  network and the codec  . . . . . . . . . 55--67
              P. E. Tischer and   
               R. T. Worley and   
               A. J. Maeder and   
                     M. Goodwin   Context-based Lossless Image Compression 68--77
            M. Vazirgiannis and   
                     C. Mourlas   An object-oriented model for interactive
                                  multimedia presentations . . . . . . . . 78--86
                  H. M. Vin and   
                 M.-S. Chen and   
                    T. Barzilai   Collaboration Management in DiCE . . . . 87--96
                  S. C. Hui and   
                     A. Goh and   
                      L. H. Lau   A multimedia information system for IC
                                  failure analysis . . . . . . . . . . . . 97--105

The Computer Journal
Volume 36, Number 2, April, 1993

              J. Nievergelt and   
                    P. Widmayer   Guard Files: Stabbing and Intersection
                                  Queries on Fat Spatial Objects . . . . . 107--116
                  M. F. Challis   Two new techniques for computing
                                  extremal $h$-bases ${A}_k$ . . . . . . . 117--126
                      B. Knight   Information loss in temporal knowledge
                                  representations  . . . . . . . . . . . . 127--136
                  S. S. Yau and   
                     J. V. Gore   Paradigm lost: discovering the
                                  intersection of assertion-guided program
                                  construction and constraint-driven
                                  re-evaluation  . . . . . . . . . . . . . 137--142
                 N. Pliskin and   
                    T. Romm and   
                  A. S. Lee and   
                       Y. Weber   Presumed versus actual organizational
                                  culture: managerial implications for
                                  implementation of information systems    143--152
       M. Elizabeth C. Hull and   
               P. G. O'Donoghue   Family relationships between
                                  requirements and design specification
                                  methods  . . . . . . . . . . . . . . . . 153--167
                 C. Burdorf and   
                       J. Marti   Load balancing strategies for Time Warp
                                  on multi-user workstations . . . . . . . 168--176
                 V. Catania and   
               A. Puliafito and   
                        L. Vita   A model for performance evaluation of
                                  gracefully degrading systems . . . . . . 177--185
               R. J. Millar and   
       M. Elizabeth C. Hull and   
                   J. H. Frazer   The Millar Polyhedron and its use in the
                                  construction of octrees  . . . . . . . . 186--194
               A. Poulovassilis   A Pattern-Matching Algorithm for
                                  Functional Databases . . . . . . . . . . 195--199
             C. C. Charlton and   
                P. E. Dunne and   
                K. Halewood and   
                     P. H. Leng   An algorithm to generate random large
                                  combinational circuits . . . . . . . . . 200--206
                          M. Er   Correspondence . . . . . . . . . . . . . 207--207

The Computer Journal
Volume 36, Number 3, June, 1993

             J. van Leeuwen and   
                        D. Wood   Interval Heaps . . . . . . . . . . . . . 209--216
                       G. Rossi   Programs as Data in an Extended Prolog   217--226
                  M. Zviran and   
                     W. J. Haga   A comparison of password techniques for
                                  multilevel authentication mechanisms . . 227--237
                   G. Hains and   
                L. M. R. Mullin   Parallel Functional Programming with
                                  Arrays . . . . . . . . . . . . . . . . . 238--245
                    S. J. Horng   Constant time algorithm for template
                                  matching on a reconfigurable array of
                                  processors . . . . . . . . . . . . . . . 246--253
     I. P. de Guzmán and   
             P. G. Harrison and   
                      E. Medina   Pipelines for Divide-and-Conquer
                                  Functions  . . . . . . . . . . . . . . . 254--268
                  W. Appelt and   
               N. Tetteh-Lartey   The formal specification of the ISO open
                                  document architecture (ODA) standard . . 269--279
                    M. A. Weiss   On Finding the Height of a Binary Search
                                  Tree . . . . . . . . . . . . . . . . . . 280--281
                   B. J. Oommen   Transforming ill-conditioned constrained
                                  problems using projections . . . . . . . 282--285
                     I. Wegener   A simple modification of Xunrang and
                                  Yuzhang's HEAPSORT variant improving its
                                  complexity significantly . . . . . . . . 286--288
                      M. Thomas   Book Review  . . . . . . . . . . . . . . 289--289
                     A. Solomon   Book Review  . . . . . . . . . . . . . . 289--290
                I. R. MacCallum   Book Review  . . . . . . . . . . . . . . 290--290
                      M. Turega   Book Review  . . . . . . . . . . . . . . 290--291
                      C. Davies   Book Review  . . . . . . . . . . . . . . 291--292
                   G. I. Parkin   Book Review  . . . . . . . . . . . . . . 292--292
                      Anonymous   Book Review  . . . . . . . . . . . . . . 292--293
            V. J. Rayward-Smith   Book Review  . . . . . . . . . . . . . . 293--294
                     S. Gregory   Book Review  . . . . . . . . . . . . . . 294--294
                   I. R. Murray   Book Review  . . . . . . . . . . . . . . 294--295
                         N. Alm   Book Review  . . . . . . . . . . . . . . 295--296
                    D. Gollmann   Book Review  . . . . . . . . . . . . . . 296--296

The Computer Journal
Volume 36, Number 4, 1993

                  P. Hammersley   Editorial  . . . . . . . . . . . . . . . 297--298
               Peter Hammersley   Special Issue Editorial: Computing
                                  Curricula  . . . . . . . . . . . . . . . 297
            Anthony Finkelstein   European computing curricula: a guide
                                  and comparative analysis . . . . . . . . 299--319
        Anthony Finkelstein and   
                Jeff Kramer and   
            Samson Abramsky and   
               Krysia Broda and   
        Sophia Drossopoulou and   
                Susan Eisenbach   An Integrated Engineering Study Scheme
                                  in Computing . . . . . . . . . . . . . . 320--334
      Jonathan D. Pemberton and   
              Joanne M. Smailes   Educating the Masses --- is IT a Tricky
                                  Business?  . . . . . . . . . . . . . . . 335--342
                  Chris Osborne   Planning for IT literacy in an
                                  institution of higher education: a case
                                  study  . . . . . . . . . . . . . . . . . 343--350
                        P. Naur   Understanding Turing's universal machine
                                  --- personal style in program
                                  description  . . . . . . . . . . . . . . 351--372
               Doug Goldson and   
               Steve Reeves and   
                 Richard Bornat   A review of several programs for the
                                  teaching of logic  . . . . . . . . . . . 373--386
                 Andrew Ireland   On exploiting the structure of
                                  Martin-Lof's Theory of Types . . . . . . 387--398

The Computer Journal
Volume 36, Number 5, October, 1993

                      Hoon Hong   Special Issue Editorial: Computational
                                  Quantifier Elimination . . . . . . . . . 399--399
                  Felipe Cucker   On the complexity of quantifier
                                  elimination: the structural approach . . 400--408
                     John Canny   Improved algorithms for sign
                                  determination and existential quantifier
                                  elimination  . . . . . . . . . . . . . . 409--418
            Devdatt P. Dubhashi   Quantifier Elimination in $p$-adic
                                  Fields . . . . . . . . . . . . . . . . . 419--426
                Joos Heintz and   
 Marie-Françoise Roy and   
           Pablo Solernó   On the theoretical and practical
                                  complexity of the existential theory of
                                  reals  . . . . . . . . . . . . . . . . . 427--431
                 Scott McCallum   Solving polynomial strict inequalities
                                  using cylindrical algebraic
                                  decomposition  . . . . . . . . . . . . . 432--438
                      Hoon Hong   Quantifier elimination for formulas
                                  constrained by quadratic equations via
                                  slope resultants . . . . . . . . . . . . 439--449
          Rüdiger Loos and   
            Volker Weispfenning   Applying Linear Quantifier Elimination   450--462
                  Vijay Chandru   Variable Elimination in Linear
                                  Constraints  . . . . . . . . . . . . . . 463--472
              Jean-Louis Imbert   Variable elimination for disequations in
                                  generalized linear constraint systems    473--484
                 Dinesh Manocha   Efficient Algorithms for MultiPolynomial
                                  Resultant  . . . . . . . . . . . . . . . 485--496
              Richard Liska and   
               Stanly Steinberg   Applying quantifier elimination to
                                  stability analysis of difference schemes 497--503
                     John Canny   Computing Roadmaps of General
                                  Semi-Algebraic Sets  . . . . . . . . . . 504--514
M. J. González-López and   
                       T. Recio   Path Tracking in Motion Planning . . . . 515--524

The Computer Journal
Volume 36, Number 6, December, 1993

             Abraham Mehrez and   
          Geoffry S. Howard and   
             Yaakov Lugassi and   
                  Peretz Shoval   Information system planning and
                                  selection: a multiattribute theoretic
                                  approach . . . . . . . . . . . . . . . . 525--541
             B. John Oommen and   
               Chris Fothergill   Fast learning automaton-based image
                                  examination and retrieval  . . . . . . . 542--553
             Daniel Y. Chao and   
              David T. Wang and   
             Douglas D. C. Hung   Convergence time and memory capacity of
                                  higher-order Hopfield associative memory
                                  with multi-valued neurons  . . . . . . . 554--561
                   L. A. Breene   Quadtrees and hypercubes: grid embedding
                                  strategies based on spatial data
                                  structure addressing . . . . . . . . . . 562--569
      Henry Ker-Chang Chang and   
                Shing Hong Chen   A new locally adaptive data compression
                                  scheme using multilist structure . . . . 570--578
          Zbigniew J. Czech and   
             Bohdan S. Majewski   A Linear Time Algorithm for Finding
                                  Minimal Perfect Hash Functions . . . . . 579--587
                   C. M. Khoong   Shortest-Path Reconstruction Algorithms  588--592
                 M. D. Atkinson   Uniform generation of rooted ordered
                                  trees with prescribed degrees  . . . . . 593--594
                        P. Hall   Book Review  . . . . . . . . . . . . . . 595--595
                P. Strain-Clark   Book Review  . . . . . . . . . . . . . . 595--596
                        D. Ince   Book Review  . . . . . . . . . . . . . . 596--596
                        P. Hall   Book Review  . . . . . . . . . . . . . . 596--597
                        P. Hall   Book Review  . . . . . . . . . . . . . . 597--597
                    H. Robinson   Book Review  . . . . . . . . . . . . . . 597--598
                      M. Newton   Book Review  . . . . . . . . . . . . . . 598--598
                       M. Field   Book Review  . . . . . . . . . . . . . . 598--599
                     M. Woodman   Book Review  . . . . . . . . . . . . . . 599--599
                       D. Lyons   Book Review  . . . . . . . . . . . . . . 599--600
                      M. S. Joy   Book Review  . . . . . . . . . . . . . . 600--600
                      M. S. Joy   Book Review  . . . . . . . . . . . . . . 600--601
                       I. Craig   Book Review  . . . . . . . . . . . . . . 601--601
                      M. S. Joy   Book Review  . . . . . . . . . . . . . . 601--601
                     A. Solomon   Book Review  . . . . . . . . . . . . . . 602--602
                      M. Turega   Book Review  . . . . . . . . . . . . . . 602--602
                P. A. S. Veloso   Book Review  . . . . . . . . . . . . . . 603--603
                      K. Dudman   Book Review  . . . . . . . . . . . . . . 603--604
                       D. Corne   Book Review  . . . . . . . . . . . . . . 604--605

The Computer Journal
Volume 36, Number 7, 1993

              Jukka Teuhola and   
                     Timo Raita   Application of a Finite-State Model to
                                  Text Compression . . . . . . . . . . . . 607--614
           Pasi Fränti and   
                Olli Nevalainen   A two-stage modelling method for
                                  compressing binary images by arithmetic
                                  coding . . . . . . . . . . . . . . . . . 615--622
             Robert R. Goldberg   Finite State Automata from Regular
                                  Expression Trees . . . . . . . . . . . . 623--630
              Min Sheng Lin and   
                  Deng Jyi Chen   General reduction methods for the
                                  reliability analysis of distributed
                                  computing systems  . . . . . . . . . . . 631--644
              Tim B. Cooper and   
            Jeffrey H. Kingston   The solution of real instances of the
                                  timetabling problem  . . . . . . . . . . 645--653
                D. J. Pavey and   
               L. A. Winsborrow   Demonstrating equivalence of source code
                                  and PROM contents  . . . . . . . . . . . 654--667
             A. S. Fraenkel and   
                    S. T. Klein   Bounding the Depth of Search Trees . . . 668--678
               V. Dancík   Book Review  . . . . . . . . . . . . . . 679--679
                      M. Thomas   Book Review  . . . . . . . . . . . . . . 679--680
                  A. Bowyer and   
                  R. Martin and   
                    J. Woodwark   Correspondence . . . . . . . . . . . . . 681--681
                    W. M. Waite   Correspondence . . . . . . . . . . . . . 681--681

The Computer Journal
Volume 36, Number 8, 1993

         Thomas Schwederski and   
                  Rudolph Kober   Special Issue Editorial: Parallel
                                  Processing . . . . . . . . . . . . . . . 683--683
             T. Schwederski and   
                       R. Kober   Editorial  . . . . . . . . . . . . . . . 683--684
               M. Schneider and   
                   U. Wever and   
                       Q. Zheng   Solving large and sparse linear
                                  equations in analog circuit simulation
                                  on a cluster of workstations . . . . . . 685--689
                D. A. Clark and   
             C. J. Rawlings and   
                 J. Shirazi and   
                   L.-L. Li and   
               K. Schuerman and   
                   M. Reeve and   
                A. Véron   Solving large combinatorial problems in
                                  molecular biology using the ElipSys
                                  parallel constraint logic programming
                                  system . . . . . . . . . . . . . . . . . 690--701
                  U. Geuder and   
           M. Härdtner and   
                  A. Reuter and   
             B. Wörner and   
                        R. Zink   GRIDS --- a parallel programming system
                                  for grid-based algorithms  . . . . . . . 702--711
             V. B. Muchnick and   
           A. V. Shafarenko and   
                   C. D. Sutton   $F$-code and its Implementation: a
                                  Portable Software Platform for Data
                                  Parallelism  . . . . . . . . . . . . . . 712--722
            Neil Berrington and   
             David De Roure and   
                  Julian Padget   Guaranteeing unpredictability
                                  (programming model)  . . . . . . . . . . 723--733
                B. Bergsten and   
                 M. Couprie and   
                   P. Valduriez   Overview of Parallel Architectures for
                                  Databases  . . . . . . . . . . . . . . . 734--740
             Hermann Hellwagner   Design Considerations for Scalable
                                  Parallel File Systems  . . . . . . . . . 741--755
              F. Abolhassan and   
             R. Drefenstedt and   
                  J. Keller and   
                 W. J. Paul and   
                    D. Scheerer   On the Physical Design of PRAMs  . . . . 756--762
             C. R. Jesshope and   
                         C. Izu   The MP1 network chip and its application
                                  to parallel computers  . . . . . . . . . 763--777
                 Peter Thompson   Concurrent Interconnect for Parallel
                                  Systems  . . . . . . . . . . . . . . . . 778--784


The Computer Journal
Volume 37, Number 1, 1994

            Jurg Nievergelt and   
                  Mike Freeston   Special Issue Editorial: Spatial data:
                                  applications, concepts, techniques . . . 1--2
               D. A. Varley and   
                 M. Visvalingam   Road extraction and topographic data
                                  validation using area topology . . . . . 3--15
        Oliver Günther and   
              Johannes Lamberts   Object-oriented Techniques for the
                                  Management of Geographic and
                                  Environmental Data . . . . . . . . . . . 16--25
             Michael F. Worboys   A Unified Model for Spatial and Temporal
                                  Information  . . . . . . . . . . . . . . 26--34
                   Peter Schorn   Degeneracy in geometric computation and
                                  the perturbation approach  . . . . . . . 35--42
       Christopher B. Jones and   
            David B. Kidner and   
                   J. Mark Ware   The implicit triangulated irregular
                                  network and multiscale spatial databases 43--57
                  James Bradley   A complete ${L}$-system specification
                                  for generating an exact self-affine
                                  growth-decay function with a random walk
                                  scaling property . . . . . . . . . . . . 58--66
             Daniel Y. Chao and   
            Mengchu C. Zhou and   
                  David T. Wang   Extending the knitting technique to
                                  Petri Net synthesis of automated
                                  manufacturing systems  . . . . . . . . . 67--76
                  S. Arun-Kumar   Book Review  . . . . . . . . . . . . . . 77--77
                     M. Jirotka   Book Review  . . . . . . . . . . . . . . 77--78
                     M. Jirotka   Book Review  . . . . . . . . . . . . . . 77--78

The Computer Journal
Volume 37, Number 2, 1994

                 Alan Bundy and   
                Hector MacQueen   The New Software Copyright Law . . . . . 79--82
              Ian H. Witten and   
            Timothy C. Bell and   
            Alistair Moffat and   
    Craig G. Nevill-Manning and   
              Tony C. Smith and   
               Harold Thimbleby   Semantic and generative models for lossy
                                  text compression . . . . . . . . . . . . 83--87
                  Nenad Marovac   Link Associated Computation in HyperNet  88--95
             Victoria Stavridou   Formal Methods and VLSI Engineering
                                  Practice . . . . . . . . . . . . . . . . 96--113
                   Jixin Ma and   
                   Brian Knight   A General Temporal Theory  . . . . . . . 114--123
              D. Bhagavathi and   
               C. E. Grosch and   
                      S. Olariu   A Greedy Hypercube-Labeling Algorithm    124--128
               Kwok-Bun Yue and   
                    R. T. Jacob   An optimal algorithm for reducing
                                  edge-solvable mutual exclusion graphs    129--138
               Greg A. Wade and   
                Jiang-Hsing Chu   Drawability of complete graphs using a
                                  minimal slope set  . . . . . . . . . . . 139--142
                      D. Murphy   Book Review  . . . . . . . . . . . . . . 143--144
                      D. Murphy   Book Review  . . . . . . . . . . . . . . 143--144
                      D. Murphy   Book Review  . . . . . . . . . . . . . . 143--144
                     J. A. Dain   Book Review  . . . . . . . . . . . . . . 144--144
                       I. Craig   Book Review  . . . . . . . . . . . . . . 145--145
                       C. Speed   Book Review  . . . . . . . . . . . . . . 145--146
                    P. E. Dunne   Book Review  . . . . . . . . . . . . . . 146--146
                     K. Kingman   Book Review  . . . . . . . . . . . . . . 146--146
                       C. Speed   Book Review  . . . . . . . . . . . . . . 146--147
                     R. Perrott   Book Review  . . . . . . . . . . . . . . 147--147
                    R. Hamilton   Book Review  . . . . . . . . . . . . . . 148--148
                  J. W. Sanders   Book Review  . . . . . . . . . . . . . . 148--149
                   R. M. McKeag   Book Review  . . . . . . . . . . . . . . 149--150
                       K. Lucas   Book Review  . . . . . . . . . . . . . . 150--151
                      S. Ramesh   Book Review  . . . . . . . . . . . . . . 151--151
                    M. Murakami   Book Review  . . . . . . . . . . . . . . 152--152
                 M. Smurthwaite   Book Review  . . . . . . . . . . . . . . 152--152

The Computer Journal
Volume 37, Number 3, 1994

                 M. Lamming and   
                   P. Brown and   
                  K. Carter and   
                M. Eldridge and   
                   M. Flynn and   
                   G. Louie and   
                P. Robinson and   
                      A. Sellen   The Design of a Human Memory Prosthesis  153--163
         Nikos A. Lorentzos and   
    Alexandra Poulovassilis and   
                    Carol Small   Implementation of Update Operations for
                                  Interval Relations . . . . . . . . . . . 164--176
                   Doug Goldson   A symbolic calculator for non-strict
                                  functional programs  . . . . . . . . . . 177--187
           Kisenchand Ranai and   
              Koon Seng Lim and   
                     R. H. Deng   Simulating a Multimedia FDDI Backbone
                                  Network  . . . . . . . . . . . . . . . . 188--198
              Yuliang Zheng and   
                T. Hardjono and   
                     J. Seberry   Reusing Shares in Secret Sharing Schemes 199--205
                   M. Hamdi and   
                     R. W. Hall   An efficient class of interconnection
                                  networks for parallel computations . . . 206--218
                 Benjamin Arazi   On primality testing using purely
                                  divisionless operations  . . . . . . . . 219--222
                       V. Danck   Book Review  . . . . . . . . . . . . . . 223--223
                   R. Ramanujam   Book Review  . . . . . . . . . . . . . . 223--223
                       I. Craig   Book Review  . . . . . . . . . . . . . . 224--225
                      K. Lodaya   Book Review  . . . . . . . . . . . . . . 225--226
                   P. Mukherjee   Book Review  . . . . . . . . . . . . . . 226--226
                   P. Mukherjee   Book Review  . . . . . . . . . . . . . . 226--227
                M. B. M. Gibson   Book Review  . . . . . . . . . . . . . . 227--227
                  C. C. Kirkham   Book Review  . . . . . . . . . . . . . . 227--228
                      A. Larner   Book Review  . . . . . . . . . . . . . . 228--228
                      A. Larner   Book Review  . . . . . . . . . . . . . . 228--229
                     D. Anthony   Book Review  . . . . . . . . . . . . . . 229--229
                       P. Green   Book Review  . . . . . . . . . . . . . . 229--230
                   P. V. S. Rao   Book Review  . . . . . . . . . . . . . . 230--231
                  N. M. Gibbins   Book Review  . . . . . . . . . . . . . . 231--232
                   G. R. Martin   Book Review  . . . . . . . . . . . . . . 232--232

The Computer Journal
Volume 37, Number 4, 1994

   Sòren Christensen and   
            Yoram Hirshfeld and   
                   Faron Moller   Decidable Subsets of CCS . . . . . . . . 233--242
            Jan A. Bergstra and   
                Inge Bethke and   
                    Alban Ponse   Process Algebra with Iteration and
                                  Nesting  . . . . . . . . . . . . . . . . 243--258
                Wan Fokkink and   
                   Hans Zantema   Basic process algebra with iteration:
                                  completeness of its equational axioms    259--267
                    S. Mauw and   
                  M. A. Reniers   An algebraic semantics of basic message
                                  sequence charts  . . . . . . . . . . . . 269--277
                Henri P. Korver   A Theory for Simulators  . . . . . . . . 279--287
                M. A. Bezem and   
                   J. F. Groote   A Correctness Proof of a One-bit Sliding
                                  Window Protocol in $\mu$CRL  . . . . . . 289--307
           Pasi Fränti and   
            Olli Nevalainen and   
                Timo Kaukoranta   Compression of digital images by block
                                  truncation coding: a survey  . . . . . . 308--332
                Wentong Cai and   
              Stephen J. Turner   An Approach to the Run-Time Monitoring
                                  of Parallel Programs . . . . . . . . . . 333--345
                       V. Danck   Book Review  . . . . . . . . . . . . . . 346--346
                   R. Ramanujam   Book Review  . . . . . . . . . . . . . . 346--347
                       I. Craig   Book Review  . . . . . . . . . . . . . . 347--348
                      K. Lodaya   Book Review  . . . . . . . . . . . . . . 348--349
                   P. Mukherjee   Book Review  . . . . . . . . . . . . . . 349--349
                   P. Mukherjee   Book Review  . . . . . . . . . . . . . . 349--350
                M. B. M. Gibson   Book Review  . . . . . . . . . . . . . . 350--350
                  C. C. Kirkham   Book Review  . . . . . . . . . . . . . . 350--351
                      A. Larner   Book Review  . . . . . . . . . . . . . . 351--351
                      A. Larner   Book Review  . . . . . . . . . . . . . . 351--352
                     D. Anthony   Book Review  . . . . . . . . . . . . . . 352--352
                       P. Green   Book Review  . . . . . . . . . . . . . . 352--353
                   P. V. S. Rao   Book Review  . . . . . . . . . . . . . . 353--354
                  N. M. Gibbins   Book Review  . . . . . . . . . . . . . . 354--355
                   G. R. Martin   Book Review  . . . . . . . . . . . . . . 355--355

The Computer Journal
Volume 37, Number 5, 1994

            Ian Sommerville and   
            Richard Bentley and   
                 Tom Rodden and   
                   Peter Sawyer   Cooperative Systems Design . . . . . . . 357--366
                P. A. Firby and   
                    D. J. Stone   Analysis of the structure and resolution
                                  of a graphics device . . . . . . . . . . 367--376
            Christophe Poix and   
                 Robert Laurini   A geometric reasoning tool based on a
                                  successive improvement approach  . . . . 377--384
                    A. N. Clark   Pattern recognition of noisy sequences
                                  of behavioural events using functional
                                  combinators  . . . . . . . . . . . . . . 385--398
              Per Brinch Hansen   Interference control in SuperPascal ---
                                  a block-structured parallel language . . 399--406
             M. Díaz and   
                E. Pimentel and   
                    J. M. Troya   DROL: a distributed and real-time
                                  object-oriented logic environment  . . . 407--421
             Marie Rose Low and   
             Bruce Christianson   Self Authenticating Proxies  . . . . . . 422--428
                J. P. Giddy and   
                R. Safavi Naini   Automated Cryptanalysis of Transposition
                                  Ciphers  . . . . . . . . . . . . . . . . 429--436
                    Greg O'Shea   On the specification, validation and
                                  verification of security in access
                                  control systems  . . . . . . . . . . . . 437--448
        Nancy G. Kinnersley and   
          William M. Kinnersley   An efficient polynomial-time algorithm
                                  for three-track gate matrix layout . . . 449--462
              A. A. K. Majumdar   A note on the iterative algorithm for
                                  the Reve's puzzle  . . . . . . . . . . . 463--464
                    R. E. Roger   Letters: Correspondence. on the Millar
                                  polyhedron and its use in the
                                  construction of octrees  . . . . . . . . 465--466
                     D. Caminer   Book Review  . . . . . . . . . . . . . . 467--467
                      S. Ramani   Book Review  . . . . . . . . . . . . . . 467--468
              M. H. E. Larcombe   Book Review  . . . . . . . . . . . . . . 468--469
                    M. Holcombe   Book Review  . . . . . . . . . . . . . . 469--469
                       H. Brown   Book Review  . . . . . . . . . . . . . . 469--470
                   P. Mukherjee   Book Review  . . . . . . . . . . . . . . 470--470
                    B. Wichmann   Book Review  . . . . . . . . . . . . . . 470--471
                         M. Joy   Book Review  . . . . . . . . . . . . . . 471--471
                      A. Larner   Book Review  . . . . . . . . . . . . . . 471--472
                     A. H. Khan   Book Review  . . . . . . . . . . . . . . 472--472
                      Y. Merali   Book Review  . . . . . . . . . . . . . . 472--473
                J. C. M. Baeten   Special Issue Editorial Process Algebra  474--475

The Computer Journal
Volume 37, Number 6, 1994

               Vinny Cahill and   
              Roland Balter and   
               David Harper and   
             Neville Harris and   
     Xavier Rousset De Pina and   
                    Pedro Sousa   The Comandos Distributed Application
                                  Platform . . . . . . . . . . . . . . . . 477--486
                Paul Taylor and   
               Vinny Cahill and   
                   Michael Mock   Combining object-oriented systems and
                                  open transaction processing  . . . . . . 487--498
            Brendan Tangney and   
              Andrew Condon and   
               Vinny Cahill and   
                 Neville Harris   Requirements for parallel programming in
                                  object-oriented distributed systems  . . 499--508
              Gerrit Kerber and   
             Helmut Meitner and   
                Friedemann Reim   The Comandos toolset for distributed
                                  systems management . . . . . . . . . . . 509--518
              Roland Balter and   
             Serge Lacourte and   
                 Michel Riveill   The Guide Language . . . . . . . . . . . 519--530
                Pedro Sousa and   
André Zúquete and   
                 Nuno Neves and   
      José Alves Marques   Orthogonal persistence in a
                                  heterogeneous distributed
                                  object-oriented environment  . . . . . . 531--541
                  David C. Dyer   Simulation in the Design of Electronic
                                  Systems  . . . . . . . . . . . . . . . . 542b-543
                     R. Sobczak   Fddi: a High Speed Network . . . . . . . 542a-542
                     R. Sobczak   Token Ring Networks  . . . . . . . . . . 542--542
             Simon Clippingdale   Practical Computer Vision Using C  . . . 543--544
                  Antoni Diller   Object-oriented Specification Case
                                  Studies  . . . . . . . . . . . . . . . . 544a-545
                    Gerry Wolff   Data Abstraction, the Object-Oriented
                                  Approach Using C++ . . . . . . . . . . . 544--544
                     Frank Bott   Software Systems Construction with
                                  Examples in Ada  . . . . . . . . . . . . 545--546
                   A. Philippou   The Art of Parallel Programming &
                                  Parallel Programming, an Introduction    546--547
                  Adrian Larner   Software Assistance for Business
                                  Re-Engineering . . . . . . . . . . . . . 547--547
                  D. A. Randell   Inductive Logic Programming  . . . . . . 547a-548
                       Mike Joy   The Joy of X . . . . . . . . . . . . . . 548a-549
                 V. Raghunathan   Prototyping-oriented Software Developmen 548--548
                       Mike Joy   Introduction to the X Window System  . . 549--549
                    S. P. Mudur   Visual and Technical Aspects of Type . . 549a-550
                  Mathai Joseph   The Visual Display of Quantitative
                                  Information & Envisioning Information . . 551--552
                   Roy L. Crole   Computation and Reasoning  . . . . . . . 552a-553
                       Mike Joy   Book Review: \booktitleAdvanced Motif
                                  Programming Technique  . . . . . . . . . 552--552
                  Norman Fenton   Derivation and Validation of Software
                                  Metri  . . . . . . . . . . . . . . . . . 553a-554
                   Michael Luck   Artificial Intelligence  . . . . . . . . 553--553
                  Adrian Larner   C for Corporate Programmers  . . . . . . 554--554
                  Adrian Larner   Designing Usable Electronic Text . . . . 554a-555
                  Adrian Larner   Introducing Specification Using  . . . . 555--555
                   Ian Parberry   Lectures on Parallel Computation . . . . 556a-557
                     K. Tindell   Programming Real-Time Multicomputers for
                                  Signal Processing  . . . . . . . . . . . 556--556
                     Iain Craig   Constraint Logic Programming: Selected
                                  Research & Constraint-Based Reasoning . . 557a-559
                      S. Rumsby   The Evolution of C++ . . . . . . . . . . 557--557
               Alistair Kilgour   Correspondence . . . . . . . . . . . . . 560--560

The Computer Journal
Volume 37, Number 7, 1994

                   J. A. Bakker   A semantic approach to enforce
                                  correctness of data distribution schemes 561--575
       Mostafa A. Bassiouni and   
             Amar Mukherjee and   
              Mark J. Llewellyn   Design and implementation of extended
                                  Boolean and comparison operators for
                                  time-oriented query languages  . . . . . 576--587
               Brian Knight and   
                       Jixin Ma   A temporal database model supporting
                                  relative and absolute time . . . . . . . 588--597
               B. J. Oommen and   
                    D. T. H. Ng   A New Technique for Enhancing
                                  Linked-List Data Retrieval: Reorganize
                                  Data Using Artificially Synthesized
                                  Queries  . . . . . . . . . . . . . . . . 598--609
             Lanfranco Lopriore   Stack Cache Memory for Block-Structured
                                  Programs . . . . . . . . . . . . . . . . 610--620
       Noureddine Belkhatir and   
               Walcelio L. Melo   Supporting software development
                                  processes in Adele 2 . . . . . . . . . . 621--628
               I. McFarlane and   
                   S. G. Hoggar   Optimal Drivers for the `Random'
                                  Iteration Algorithm  . . . . . . . . . . 629--640
           Joseph L. Ganley and   
               Lenwood S. Heath   Optimal and Random Partitions of Random
                                  Graphs . . . . . . . . . . . . . . . . . 641--643
                    D. J. Cooke   Book Review  . . . . . . . . . . . . . . 644--644
                     A. P. Luff   Book Review  . . . . . . . . . . . . . . 644--645
                   T. W. Routen   Book Review  . . . . . . . . . . . . . . 645--646
                      A. Larner   Book Review  . . . . . . . . . . . . . . 646--646
                 H. P. Haughton   Book Review  . . . . . . . . . . . . . . 646--647
                  S. Arun-Kumar   Book Review  . . . . . . . . . . . . . . 647--647
                    S. B. Jones   Book Review  . . . . . . . . . . . . . . 647--648
                      A. M. Day   Book Review  . . . . . . . . . . . . . . 649--649
                    R. Hamilton   Book Review  . . . . . . . . . . . . . . 649--650
                   M. Bezem and   
                   J. F. Groote   Corrigendum to a Correctness Proof of a
                                  One-bit Sliding Window Protocol in
                                  $\mu$CRL . . . . . . . . . . . . . . . . 651--651

The Computer Journal
Volume 37, Number 8, 1994

              Steve Benford and   
                John Bowers and   
   Lennart E. Fahlén and   
               John Mariani and   
                     Tom Rodden   Supporting Cooperative Work in Virtual
                                  Environments . . . . . . . . . . . . . . 653--668
            Danny C. C. Poo and   
                    Shwu-Yi Lee   An object-oriented systems modelling
                                  method based on the Jackson approach . . 669--682
           Helen E. Thomson and   
                     Pam Mayhew   The Software Process: a Perspective on
                                  Improvement  . . . . . . . . . . . . . . 683--690
                 K. Tindell and   
                       A. Burns   Fixed priority scheduling of hard
                                  real-time multi-media disk traffic . . . 691--697
           Chung-Ming Huang and   
                   Jenq-Muh Hsu   An Incremental Protocol Verification
                                  Method . . . . . . . . . . . . . . . . . 698--710
             W. Ken Jackson and   
               F. Warren Burton   A definite and unfoldable, partially
                                  deterministic language . . . . . . . . . 711--714
            Jiang-Hsing Chu and   
                  Gary D. Knott   An Analysis of Spiral Hashing  . . . . . 715--719
                    S. Matthews   Book Review  . . . . . . . . . . . . . . 720--720
                    F. K. Hanna   Book Review  . . . . . . . . . . . . . . 720--721
                       C. Brown   Book Review  . . . . . . . . . . . . . . 721--722
                   P. Mukherjee   Book Review  . . . . . . . . . . . . . . 722--722
                       G. Hayes   Book Review  . . . . . . . . . . . . . . 722--723
                J. Shawe-Taylor   Book Review  . . . . . . . . . . . . . . 723--725
                   C. Czarnecki   Book Review  . . . . . . . . . . . . . . 725--725
                     K. V. Nori   Book Review  . . . . . . . . . . . . . . 725--726
                       J. Jones   Book Review  . . . . . . . . . . . . . . 726--727
                S. J. Mullender   Book Review  . . . . . . . . . . . . . . 727--727
                      R. Stroud   Book Review  . . . . . . . . . . . . . . 727--728
                      R. Stroud   Book Review  . . . . . . . . . . . . . . 728--730
                   C. Czarnecki   Book Review  . . . . . . . . . . . . . . 730--730
                         M. Joy   Book Review  . . . . . . . . . . . . . . 730--731
                       A. Gupta   Book Review  . . . . . . . . . . . . . . 731--731
                  R. C. Johnson   Book Review  . . . . . . . . . . . . . . 731--731
                     J. Vytopil   Book Review  . . . . . . . . . . . . . . 732--732
                   P. V. S. Rao   Book Review  . . . . . . . . . . . . . . 732--734

The Computer Journal
Volume 37, Number 9, 1994

                  R. A. Sharman   Speech recognition in the office: how
                                  the technology supports dictation  . . . 735--744
                      Anonymous   Editorial Note . . . . . . . . . . . . . 744--744
          Graham A. Stephen and   
                    Paul Mather   What is SP? (theory of computing)  . . . 745--752
               Sunil Vadera and   
                  Farid Meziane   From English to Formal Specifications    753--763
      Kamyar Jambor-Sadeghi and   
       Mohammad A. Ketabchi and   
                Junjie Chue and   
                     M. Ghiassi   A Systematic Approach to Corrective
                                  Maintenance  . . . . . . . . . . . . . . 764--778
                   Ying Hao and   
           Jyh-Charn S. Liu and   
                  Junguk L. Kim   An All-sharing Load-balancing Scheme on
                                  the CSMA/CD Network and its Analysis . . 779--794
                     M. P. Ward   Reverse engineering through formal
                                  transformation: Knuth's ``Polynomial
                                  Addition'' algorithm . . . . . . . . . . 795--813
               P. B. Ladkin and   
                        S. Leue   Correspondence: Comments on a Proposed
                                  Semantics for Basic Message Sequence
                                  Charts . . . . . . . . . . . . . . . . . 814--817
                     S. Vickers   Book Review  . . . . . . . . . . . . . . 818--818
                         M. Fox   Book Review  . . . . . . . . . . . . . . 818--821
                   M. K. Srivas   Book Review  . . . . . . . . . . . . . . 821--823
                     R. Sobczak   Book Review  . . . . . . . . . . . . . . 823--824
                      A. Larner   Book Review  . . . . . . . . . . . . . . 824--825
                      A. Larner   Book Review  . . . . . . . . . . . . . . 825--825
                         M. Joy   Book Review  . . . . . . . . . . . . . . 825--826
                         M. Joy   Book Review  . . . . . . . . . . . . . . 826--826
                    K. M. Lucas   Book Review  . . . . . . . . . . . . . . 826--827

The Computer Journal
Volume 37, Number 10, 1994

            J. W. Patterson and   
                   P. J. Willis   Computer Assisted Animation: $2$D or not
                                  $2$D?  . . . . . . . . . . . . . . . . . 829--839
                      C.-H. Lai   Diakoptics, domain decomposition and
                                  parallel computing . . . . . . . . . . . 840--846
                      J. Ma and   
                  B. Knight and   
                    M. Petridis   A revised theory of action and time
                                  based on intervals and points  . . . . . 847--857
              D. K. C. Chan and   
              P. W. Trinder and   
                  R. C. Welland   Evaluating Object-Oriented Query
                                  Languages  . . . . . . . . . . . . . . . 858--872
           Sridhar Seshadri and   
                Doron Rotem and   
                     Arie Segev   Optimal arrangements of cartridges in
                                  carousel type mass storage systems . . . 873--887
              G. Berrisford and   
                     M. Burrows   Reconciling OO with Turing machines  . . 888--906
            Ferruccio Barsi and   
            M. Cristina Pinotti   Time optimal mixed radix conversion for
                                  residue number applications  . . . . . . 907--916


The Computer Journal
Volume 38, Number 1, 1995

               Ron Morrison and   
       Richard C. H. Connor and   
           Quintin I. Cutts and   
        Vivienne S. Dunstan and   
             Graham N. C. Kirby   Exploiting persistent linkage in
                                  software engineering environments  . . . 1--16
                 R. J. Wieringa   Combining static and dynamic modelling
                                  methods: a comparison of four methods    17--30
               D. R. Sutton and   
                  P. J. H. King   Incomplete Information and the
                                  Functional Data Model  . . . . . . . . . 31--42
       Charles L. A. Clarke and   
              G. V. Cormack and   
                F. J. Burkowski   An algebra for structured text search
                                  and a framework for its implementation   43--56
                John G. Vaughan   A Hierarchical Protocol for
                                  Decentralising Information Dissemination
                                  in Distributed Systems . . . . . . . . . 57--70
                   R. F. Browne   The embedding of meshes and trees into
                                  degree four chordal ring networks  . . . 71--77
                       Mike Joy   Lambda Calculi: a Guide for Computer
                                  Scientists . . . . . . . . . . . . . . . 78a-79
              J. C. Shepherdson   From Logic to Logic Programming  . . . . 78--78
                   Alan Mycroft   Object-Oriented Type Systems . . . . . . 79a-80
                      S. Sanyal   Computer Arithmetic Systems  . . . . . . 79--79
                  J. W. Sanders   The Construction of Formal
                                  Specifications . . . . . . . . . . . . . 80--81
              D. K. G. Campbell   Parallel Evolution of Parallel
                                  Processors . . . . . . . . . . . . . . . 81--81
                 Michael Ashton   Analysing Systems  . . . . . . . . . . . 82--82
                 Michael Ashton   Software Quality Assurance --- a
                                  practical approach . . . . . . . . . . . 82a-83
                   M. Sasikumar   Exploring Interior Point Linear
                                  Programming: Algorithms and Software . . 83--84
                      R. Wilson   Spatial Vision in Humans and Robots  . . 84--84
                P. K. Ghosh and   
                    S. P. Mudur   Three-Dimensional Computer Vision: a
                                  Geometric Viewpoint  . . . . . . . . . . 85--86
                 Paul C. Rhodes   Essentials of Fuzzy Modelling and
                                  Control  . . . . . . . . . . . . . . . . 86--87
                  Simon Bennett   Innovations in GIS 1 . . . . . . . . . . 87a-88
                    P. P. Gupta   A New Era in Computation . . . . . . . . 87--87

The Computer Journal
Volume 38, Number 2, 1995

                   T. F. Melham   Special Issue Editorial: Higher Order
                                  Logic Theorem Proving and its
                                  Applications . . . . . . . . . . . . . . 89--90
                    Paul Curzon   Tracking design changes with formal
                                  machine-checked proof  . . . . . . . . . 91--100
                   Mats Larsson   An engineering approach to formal
                                  digital system design  . . . . . . . . . 101--110
            Sofi\`ene Tahar and   
                  Ramayya Kumar   Formal specification and verification
                                  techniques for RISC pipeline conflicts   111--120
                  Sten Agerholm   LCF Examples in HOL  . . . . . . . . . . 121--130
           Peter V. Homeier and   
                David F. Martin   A mechanically verified verification
                                  condition generator  . . . . . . . . . . 131--141
                Elsa Gunter and   
                   Savi Maharaj   Studying the ML Module System in HOL . . 142--151
                Ching-Tsun Chou   Mechanical verification of distributed
                                  algorithms in higher-order logic . . . . 152--161
                  John Harrison   Binary Decision Diagrams as a HOL
                                  Derived Rule . . . . . . . . . . . . . . 162--170
                  J. von Wright   Representing Higher-Order Logic Proofs
                                  in HOL . . . . . . . . . . . . . . . . . 171--179

The Computer Journal
Volume 38, Number 3, 1995

                Mark Evered and   
           Axel Schmolitzky and   
           Michael Kölling   A flexible object invocation language
                                  based on object-oriented language
                                  definition . . . . . . . . . . . . . . . 181--192
          Linda B. Sherrell and   
                Doris L. Carver   FunZ: An Intermediate Specification
                                  Language . . . . . . . . . . . . . . . . 193--206
                M. J. Kumar and   
               S. Venkatesh and   
               D. Kieronska and   
                  L. M. Patnaik   Hierarchical directory-based shared
                                  memory architecture  . . . . . . . . . . 207--216
                      Hong Shen   Efficient Parallel $k$-Set Chain
                                  Range-Join in Hypercubes . . . . . . . . 217--226
                V. Kapelios and   
            G. Panagopoulou and   
             G. Papamichail and   
             S. Sirmakessis and   
                  A. Tsakalidis   The `Cross' Rectangle Intersection
                                  Problem  . . . . . . . . . . . . . . . . 227--235
               Imtiaz Ahmad and   
             Muhammad K. Dhodhi   On the $m$-Way Graph Partitioning
                                  Problem  . . . . . . . . . . . . . . . . 237--244
               Ing-Ray Ray Chen   A Degradable B$^{\rm link}$-Tree with
                                  Periodic Data Reorganization . . . . . . 245--252
                J. Gerard Wolff   `What is Sp?': a Reply . . . . . . . . . 253--256
                      Anonymous   Letters  . . . . . . . . . . . . . . . . 257--258
         Konstantinos Georgatos   Logic and Information Flow . . . . . . . 259--260
                       D. Peled   Temporal Logic: Mathematical Foundations
                                  and Computational Aspects, Volume 1  . . 260--261
                      S. Ramesh   A Programming Approach to Formal Methods 261--262
                  David A. Watt   The Structure of Typed Programming
                                  Languages  . . . . . . . . . . . . . . . 262--263
                     M. F. Bott   Programming and Problem Solving with Ada 263--263
                       Mike Joy   Programming with C: an Introduction  . . 263a-264
                  Adrian Larner   Software Quality . . . . . . . . . . . . 264--264
         Rajesh K. Mansharamani   Parallel Computing Using the Prefix
                                  Problem  . . . . . . . . . . . . . . . . 264a-265
                    Colin Isaac   User Interface Design & User Interface
                                  Evaluation . . . . . . . . . . . . . . . 265b-265
                      P. Jalote   Book Reviews . . . . . . . . . . . . . . 265--265
                      P. Jalote   Introduction to Distributed Algorithms   265a-265
                   J. Rosbottom   The Muse Method for Usability
                                  Engineering  . . . . . . . . . . . . . . 266--267
                Leela Damodaran   Studio-Structured User-interface Design
                                  for Interaction Optimisation . . . . . . 267--268
                    K. M. Lucas   Building Applications with Pexlib  . . . 268--268
                     Tim Watson   Rules of Encounter . . . . . . . . . . . 268a-269
                   Claire Speed   It's Alive!  . . . . . . . . . . . . . . 269--269

The Computer Journal
Volume 38, Number 4, 1995

          Saurav Chatterjee and   
                 Jay Strosnider   Distributed pipeline scheduling: a
                                  framework for distributed, heterogeneous
                                  real-time system design  . . . . . . . . 271--285
               Scott Dawson and   
                Farnam Jahanian   Probing and fault injection of
                                  dependable distributed protocols . . . . 286--300
         Wolfgang A. Halang and   
          Bernd Krämer and   
                  Leszek Trybus   Exploiting a graphical programming
                                  paradigm to facilitate rigorous
                                  verification of embedded software  . . . 301--309
            Benjamin Macias and   
              Stephen G. Pulman   A method for controlling the production
                                  of specifications in natural language    310--318
      Alexander D. Stoyenko and   
          Thomas J. Marlowe and   
              Mohamed F. Younis   A Language for Complex Real-Time Systems 319--338

The Computer Journal
Volume 38, Number 5, 1995

              Andrew Turpin and   
                Alistair Moffat   Practical Length-limited Coding for
                                  Large Alphabets  . . . . . . . . . . . . 339--347
               Ing-Ray Chen and   
                    I.-Ling Yen   Analysis of probabilistic error checking
                                  procedures on storage systems  . . . . . 348--354
                Hu Jun Wang and   
              Yuan-Da Jiang and   
                   Hui-Zhong Wu   Performance analysis of cluster-based
                                  PPMB multiprocessor systems  . . . . . . 355--364
                  A. Shafarenko   Symmetries in Data Parallelism . . . . . 365--380
                     S. M. Eker   Associative-Commutative Matching Via
                                  Bipartite Graph Matching . . . . . . . . 381--399
              M. Campbell-Kelly   ICL and the Evolution of the British
                                  Mainframe  . . . . . . . . . . . . . . . 400--412

The Computer Journal
Volume 38, Number 6, 1995

                   Stella Mills   To live or drown: when information
                                  systems become critical  . . . . . . . . 413--417
               Harold Thimbleby   A New Calculator and Why it is Necessary 418--433
                   Ing-Ray Chen   On applying imprecise computation to
                                  real-time AI systems . . . . . . . . . . 434--442
                     Gavin Lowe   Scheduling-Oriented Models for Real-Time
                                  Systems  . . . . . . . . . . . . . . . . 443--456
              Ruey-Liang Ma and   
               Chung-Ping Chung   Periodic adaptive branch prediction and
                                  its application in superscalar
                                  processing in Prolog . . . . . . . . . . 457--470
             C. H. C. Leung and   
                      E. Currie   The effect of failures on the
                                  performance of long-duration database
                                  transactions . . . . . . . . . . . . . . 471--478
         Panayiotis Bozanis and   
            Christos Makris and   
          Athanasios Tsakalidis   Parametric Weighted Filter: an Efficient
                                  Dynamic Manipulation of Signature Files  479--488

The Computer Journal
Volume 38, Number 7, 1995

            Stephen Gilmore and   
                  Jane Hillston   Process Algebras and Their Application
                                  to Performance Modelling: Proceedings of
                                  the Third Workshop on Process Algebra
                                  and Performance Modelling  . . . . . . . 489--491
             Marco Bernardo and   
                 Nadia Busi and   
               Roberto Gorrieri   A distributed semantics for EMPA based
                                  on stochastic contextual nets  . . . . . 492--509
             Peter Harrison and   
                  Jane Hillston   Exploiting quasi-reversible structures
                                  in Markovian process algebra models  . . 510--520
         Boudewijn R. Haverkort   In search of probability mass:
                                  probabilistic evaluation of high-level
                                  specified Markov models  . . . . . . . . 521--529
            Holger Hermanns and   
         Michael Rettelbach and   
                 Thorsten Weiss   Formal characterisation of immediate
                                  actions in SPA with nondeterministic
                                  branching  . . . . . . . . . . . . . . . 530--541
                D. R. W. Holton   A PEPA specification of an industrial
                                  production cell  . . . . . . . . . . . . 542--551
                Ed Brinksma and   
        Joost-Pieter Katoen and   
               Rom Langerak and   
                  Diego Latella   A Stochastic Causality-Based Process
                                  Algebra  . . . . . . . . . . . . . . . . 552--565
              Jane Hillston and   
          Vassilis Mertsiotakis   A simple time scale decomposition
                                  technique for stochastic process
                                  algebras . . . . . . . . . . . . . . . . 566--577
                 Corrado Priami   Stochastic $\pi$-calculus  . . . . . . . 578--589
             Michael Rettelbach   Probabilistic branching in Markovian
                                  process algebras . . . . . . . . . . . . 590--599
                 Marina Ribaudo   On the aggregation techniques in
                                  stochastic Petri nets and stochastic
                                  process algebras . . . . . . . . . . . . 600--611
                   Isabel Rojas   Compositional Construction of SWN models 612--621
                  Matteo Sereno   Towards a product form solution for
                                  stochastic process algebras  . . . . . . 622--632

The Computer Journal
Volume 38, Number 8, 1995

             Michael Reiter and   
                        Li Gong   Securing Causal Relationships in
                                  Distributed Systems  . . . . . . . . . . 633--642
               Jian-Yun Nie and   
           Martin Brisebois and   
        Françoise Lepage   Information Retrieval as Counterfactual  643--657
                 Kang Zhang and   
                 Gaurav Marwaha   Visputer --- a graphical visualization
                                  tool for parallel programming  . . . . . 658--669
             Peter Kirstein and   
         Goli Montasser-Kohsari   The C-ODA Project: Experiences and Tools 670--680
              Antonios Symvonis   Optimal Stable Merging . . . . . . . . . 681--690
            C. H. A. Koster and   
           Th. P. Van Der Weide   Hairy Search Trees . . . . . . . . . . . 691--694

The Computer Journal
Volume 38, Number 9, 1995

             Simon W. Moore and   
                Brian T. Graham   Tagged Up/Down Sorter --- A Hardware
                                  Priority Queue . . . . . . . . . . . . . 695--703
                Kam-Yiu Lam and   
                Sheung-Lun Hung   Concurrency Control for Time-constrained
                                  Transactions in Distributed Databases
                                  Systems  . . . . . . . . . . . . . . . . 704--716
                   Ing-Ray Chen   Stochastic Petri net analysis of
                                  deadlock detection algorithms in
                                  transaction database systems with
                                  dynamic locking  . . . . . . . . . . . . 717--733
                 Weidong He and   
                  Chaochen Zhou   A Case Study of Optimization . . . . . . 734--746
                       A. Davie   Book Review  . . . . . . . . . . . . . . 747--747
                    P. E. Dunne   Book Review  . . . . . . . . . . . . . . 747--747
                    V. Kulkarni   Book Review  . . . . . . . . . . . . . . 747--748
                       K. Lucas   Book Review  . . . . . . . . . . . . . . 748--748
                        M. Luck   Book Review  . . . . . . . . . . . . . . 748--749
                  S. Arun-Kumar   Book Review  . . . . . . . . . . . . . . 749--750
                       U. Zwick   Book Review  . . . . . . . . . . . . . . 750--750
                      A. Diller   Book Review  . . . . . . . . . . . . . . 750--751
                     K. V. Nori   Book Review  . . . . . . . . . . . . . . 751--752
              T. M. Vijayaraman   Book Review  . . . . . . . . . . . . . . 753--753
              T. M. Vijayaraman   Book Review  . . . . . . . . . . . . . . 753--754

The Computer Journal
Volume 38, Number 10, 1995

               R. N. Ibbett and   
              P. E. Heywood and   
                   F. W. Howell   HASE: a Flexible Toolset for Computer
                                  Architects . . . . . . . . . . . . . . . 755--764
          Stephen P. Wilson and   
               John A. McDermid   Integrated analysis of complex safety
                                  critical systems . . . . . . . . . . . . 765--776
       Antonio Ruiz-Delgado and   
                 David Pitt and   
                   Colin Smythe   A review of object-oriented approaches
                                  in formal methods  . . . . . . . . . . . 777--784
                 Gavin Lowe and   
                  Hussein Zedan   Refinement of Complex Systems: a Case
                                  Study  . . . . . . . . . . . . . . . . . 785--800
            Ville Leppänen   Performance of work-optimal PRAM
                                  simulation algorithms on coated meshes   801--810
                   Ken Deighton   Average time to travel on two-headed,
                                  non-linear discs . . . . . . . . . . . . 811--817
                   Jingsen Chen   An efficient construction algorithm for
                                  a class of implicit double-ended
                                  priority queues  . . . . . . . . . . . . 818--821
            Frank P. Verdon and   
                     Mike Wells   Computing in British universities: the
                                  Computer Board 1966--1991  . . . . . . . 822--830
                       A. Makur   Book Review  . . . . . . . . . . . . . . 831--831
                   C. L. Hankin   Book Review  . . . . . . . . . . . . . . 831--832
                     K. V. Nori   Book Review  . . . . . . . . . . . . . . 832--833
                        P. Naur   Book Review  . . . . . . . . . . . . . . 833--834
                 M. J. Jamieson   Book Review  . . . . . . . . . . . . . . 834--835
                 M. J. Jamieson   Book Review  . . . . . . . . . . . . . . 835--836
                      A. Larner   Book Review  . . . . . . . . . . . . . . 836--836
                      A. Larner   Book Review  . . . . . . . . . . . . . . 836--837
                S. A. Schneider   Book Review  . . . . . . . . . . . . . . 837--838


The Computer Journal
Volume 39, Number 1, 1996

         David Jeff Jackson and   
                  Wagdy Mahmoud   Parallel pipelined fractal image
                                  compression using quadtree recomposition 1--13
               Qian-Ping Gu and   
                  Shietung Peng   An efficient algorithm for node-to-node
                                  routing in hypercubes with faulty
                                  clusters . . . . . . . . . . . . . . . . 14--19
              Vincenzo Loia and   
               Michel Quaggetto   The OPLA system: designing complex
                                  systems in an object-oriented logic
                                  programming framework  . . . . . . . . . 20--35
       Chandran N. Sekharan and   
          John G. Del Greco and   
                  Sailesh Rathi   Space-time trade-offs in the relative
                                  unranking of binary trees  . . . . . . . 36--44
                T. S. Narayanan   A Class of Semi-$X$ Tree-Based
                                  Dictionary Machines  . . . . . . . . . . 45--51
          Egon. Börger and   
        Igor \Dbarur\dbaranovic   Correctness of compiling Occam to
                                  transputer code  . . . . . . . . . . . . 52--92
                  A. R. Forrest   Book Review  . . . . . . . . . . . . . . 93--93
                     C. Johnson   Book Review  . . . . . . . . . . . . . . 93--93
                      T. Watson   Book Review  . . . . . . . . . . . . . . 93--94
                C. A. Czarnecki   Book Review  . . . . . . . . . . . . . . 94--94
                     M. Mannion   Book Review  . . . . . . . . . . . . . . 95--95
                    S. Rogerson   Book Review  . . . . . . . . . . . . . . 95--96

The Computer Journal
Volume 39, Number 2, 1996

          Linda C. van der Gaag   Bayesian Belief Networks: Odds and Ends  97--113
                    Mark Levene   Maintaining Consistency of Imprecise
                                  Relations  . . . . . . . . . . . . . . . 114--123
           Hossein Saiedian and   
                 Thomas Spencer   An efficient algorithm to compute the
                                  candidate keys of a relational database
                                  schema . . . . . . . . . . . . . . . . . 124--132
         Evangelos Kranakis and   
              Danny Krizanc and   
                     S. S. Ravi   On Multi-Label Linear Interval Routing
                                  Schemes  . . . . . . . . . . . . . . . . 133--139
                     Yi Pan and   
               Mounir Hamdi and   
                   Gurdip Singh   Selection on $k$-Dimensional Meshes with
                                  Multiple Broadcasting  . . . . . . . . . 140--144
        Stephen Fitzpatrick and   
                   M. Clint and   
               T. J. Harmer and   
                  P. Kilpatrick   The tailoring of abstract functional
                                  specifications of numerical algorithms
                                  for sparse data structures through
                                  automated program derivation and
                                  transformation . . . . . . . . . . . . . 145--168
                      I. Harvey   Book Review  . . . . . . . . . . . . . . 169--169
                      J. Malard   Book Review  . . . . . . . . . . . . . . 169--170
                    S. Rogerson   Book Review  . . . . . . . . . . . . . . 170--170
                  A. C. Kilgour   Book Review  . . . . . . . . . . . . . . 170--171
                    C. Stirling   Book Review  . . . . . . . . . . . . . . 171--172

The Computer Journal
Volume 39, Number 3, 1996

                  Carlo Meghini   Logical Image Modelling and Retrieval    173--183
                     Si Pan and   
                R. Geoff Dromey   Re-engineering Loops . . . . . . . . . . 184--202
                     Si Pan and   
                R. Geoff Dromey   A Formal Basis For Removing goto
                                  Statements . . . . . . . . . . . . . . . 203--214
      A. H. M. Ter Hofstede and   
                   E. Lippe and   
             P. J. M. Frederiks   Conceptual data modelling from a
                                  categorical perspective  . . . . . . . . 215--231
             M. Ould-Khaoua and   
            L. M. MacKenzie and   
                     R. Sotudeh   Comparative evaluation of hypermesh and
                                  multi-stage interconnection networks . . 232--240
                Behrooz Parhami   Extreme-value search and general
                                  selection algorithms for fully parallel
                                  associative memories . . . . . . . . . . 241--250
                      A. Cawsey   Book Review  . . . . . . . . . . . . . . 251--251
                      F. Culwin   Book Review  . . . . . . . . . . . . . . 251--252
                      M. Joseph   Book Review  . . . . . . . . . . . . . . 252--252
                     P. Willett   Book Review  . . . . . . . . . . . . . . 253--253
                      A. Larner   Book Review  . . . . . . . . . . . . . . 253--254

The Computer Journal
Volume 39, Number 4, 1996

      A. H. M. Ter Hofstede and   
               H. A. Proper and   
           Th. P. van der Weide   Query formulation as an information
                                  retrieval problem  . . . . . . . . . . . 255--274
              Anthony N. Godwin   Building a semantic description for a
                                  data modelling language  . . . . . . . . 275--290
                     Jim Grundy   Transformational Hierarchical Reasoning  291--302
           Howard Barringer and   
               Graham Gough and   
              Brian Monahan and   
                  Alan Williams   A process algebra foundation for
                                  reasoning about Core ELLA  . . . . . . . 303--324
                  R. M. Hierons   Extending Test Sequence Overlap by
                                  Invertibility  . . . . . . . . . . . . . 325--330
               Haifeng Qian and   
                         Jie Wu   Enhanced Fibonacci Cubes . . . . . . . . 331--345
                Hu-Jun Wang and   
                        Jian Li   Bandwidth Analysis for A Class of
                                  Bus-Based Systems  . . . . . . . . . . . 346--352
                   T. D. Gedeon   The Cyclic Towers of Hanoi: an iterative
                                  solution produced by transformation  . . 353--356
                     C. Johnson   Book Review  . . . . . . . . . . . . . . 357--357
                       K. Kedem   Book Review  . . . . . . . . . . . . . . 357--358
                    F. Crestani   Book Review  . . . . . . . . . . . . . . 358--358
                      A. Larner   Book Review  . . . . . . . . . . . . . . 358--359
                  E. J. Briscoe   Book Review  . . . . . . . . . . . . . . 359--360

The Computer Journal
Volume 39, Number 5, 1996

             A. J. Wellings and   
                       A. Burns   Programming Replicated Systems in Ada 95 361--373
             Yasemin Turkan and   
         Özgür Ulusoy   An efficient memory management algorithm
                                  for client-server database management
                                  systems  . . . . . . . . . . . . . . . . 374--385
            J. P. Geschiere and   
        W. H. F. J. Körver   A practical development process for
                                  parallel large-scale applications and
                                  its underlying formal framework  . . . . 386--407
               Maarten Fokkinga   Expressions That Talk About Themselves   408--412
                  Tadao Takaoka   A left-to-right preprocessing
                                  computation for the Boyer--Moore string
                                  matching algorithm . . . . . . . . . . . 413--416
               Wen-Jing Hsu and   
            Moon Jung Chung and   
                       Zejun Hu   Gaussian Networks For Scalable
                                  Distributed Systems  . . . . . . . . . . 417--426
        Lucas Chi Kwong Hui and   
              Charles U. Martel   Randomized competitive algorithms for
                                  successful and unsuccessful search . . . 427--438
          Nectarios Koziris and   
    George Papakonstantinou and   
             Panayotis Tsanakas   Optimal time and efficient space free
                                  scheduling for nested loops  . . . . . . 439--448
                      P. Curzon   Book Review  . . . . . . . . . . . . . . 449--449
                      A. Larner   Book Review  . . . . . . . . . . . . . . 449--452
                      A. Larner   Book Review  . . . . . . . . . . . . . . 449--452
                    R. Anderson   Book Review  . . . . . . . . . . . . . . 452--453

The Computer Journal
Volume 39, Number 6, 1996

            John A. Mariani and   
                     Tom Rodden   Cooperative information sharing:
                                  developing a shared object service . . . 455--470
               D. B. Skillicorn   Using distributed hypermedia for
                                  collaborative learning in universities   471--482
           Jonathan M. Nash and   
               Peter M. Dew and   
                 Martin E. Dyer   A scalable shared queue on a distributed
                                  memory machine . . . . . . . . . . . . . 483--495
            Oliver E. Theel and   
               Brett D. Fleisch   The boundary-restricted coherence
                                  protocol for scalable and highly
                                  available distributed shared memory
                                  systems  . . . . . . . . . . . . . . . . 496--510
           Chung-Ming Huang and   
                Ye-In Chang and   
                 Duen-Tay Huang   Reverse protocol verification: concept,
                                  algorithm and application  . . . . . . . 511--524
              Yen-Min Huang and   
          Chinya V. Ravishankar   URPC: a toolkit for prototyping remote
                                  procedure calls  . . . . . . . . . . . . 525--540
         Panayiotis Bozanis and   
          Nectarios Kitsios and   
            Christos Makris and   
          Athanasios Tsakalidis   Red--Blue Intersection Reporting for
                                  Objects of Non-Constant Size . . . . . . 541--546
         Bohdan S. Majewski and   
        Nicholas C. Wormald and   
               George Havas and   
              Zbigniew J. Czech   A Family of Perfect Hashing Methods  . . 547--554
                    C. B. Jones   Book Review  . . . . . . . . . . . . . . 555--555
                     A. Simpson   Book Review  . . . . . . . . . . . . . . 556--556
              D. K. G. Campbell   Book Review  . . . . . . . . . . . . . . 556--557
                  R. P. W. Duin   Book Review  . . . . . . . . . . . . . . 557--558
                  R. P. W. Duin   Book Review  . . . . . . . . . . . . . . 557--558
                      U. Martin   Book Review  . . . . . . . . . . . . . . 558--559
                       H. Evans   Book Review  . . . . . . . . . . . . . . 559--559
                       K. Kedem   Erratum  . . . . . . . . . . . . . . . . 560--560

The Computer Journal
Volume 39, Number 7, 1996

   John M. Taylor, OBE, F. Eng.   Special Feature: Forward with Foresight  561--565
         Cristina Cifuentes and   
                Anne Fitzgerald   Australian recommendations on computer
                                  software protection  . . . . . . . . . . 566--576
               Jukka Paakki and   
              Airi Salminen and   
                 Jussi Koskinen   Automated Hypertext Support for Software
                                  Maintenance  . . . . . . . . . . . . . . 577--597
                     M. P. Ward   Program Analysis by Formal
                                  Transformation . . . . . . . . . . . . . 598--618
            Tsong Yueh Chen and   
                    Yuen Tak Yu   Constraints for Safe Partition Testing
                                  Strategies . . . . . . . . . . . . . . . 619--625
               Qian-Ping Gu and   
                  Shietung Peng   Optimal algorithms for node-to-node
                                  fault tolerant routing in hypercubes . . 626--629
                       Jon Agar   History of Computing Feature: The
                                  provision of digital computers to
                                  British universities up to the Flowers
                                  Report (1966)  . . . . . . . . . . . . . 630--642
                     S. Gilmore   Book Review  . . . . . . . . . . . . . . 643--643
                     C. Johnson   Book Review  . . . . . . . . . . . . . . 643--643
                      T. Watson   Book Review  . . . . . . . . . . . . . . 644--644
              D. K. G. Campbell   Book Review  . . . . . . . . . . . . . . 644--645
                      A. Larner   Book Review  . . . . . . . . . . . . . . 645--646
                     D. England   Book Review  . . . . . . . . . . . . . . 646--646
                      Anonymous   Book Reviews . . . . . . . . . . . . . . ??

The Computer Journal
Volume 39, Number 8, 1996

               A. Puliafito and   
               S. Riccobene and   
                      M. Scarpa   Evaluation of Performability Parameters
                                  in Client-Server Environments  . . . . . 647--662
     Goran Lj. Djordjevi\'c and   
           Milorad B. To\vsi\'c   A Compile-Time Scheduling Heuristic for
                                  Multiprocessor Architectures . . . . . . 663--674
          Joan M. Morrissey and   
                   W. T. Bealor   Minimizing Data Transfers in Distributed
                                  Query Processing: a Comparative Study
                                  and Evaluation . . . . . . . . . . . . . 675--687
                     Xindong Wu   A Bayesian Discretizer for Real-Valued
                                  Attributes . . . . . . . . . . . . . . . 688--691
                Behrooz Parhami   Parallel Threshold Voting  . . . . . . . 692--700
            Emil Sekerinski and   
                     Kaisa Sere   A Theory of Prioritizing Composition . . 701--712
              Shietung Peng and   
             Stanislav Sedukhin   Array Processors Design for
                                  Division-free Linear System Solving  . . 713--722
                      A. Larner   Book Review  . . . . . . . . . . . . . . 723--723
              D. K. G. Campbell   Book Review  . . . . . . . . . . . . . . 723--724
                      Anonymous   Book reviews . . . . . . . . . . . . . . 723--730
                  S. J. J. Kent   Book Review  . . . . . . . . . . . . . . 724--724
                      T. Watson   Book Review  . . . . . . . . . . . . . . 724--725
                     D. A. Watt   Book Review  . . . . . . . . . . . . . . 725--725
              D. K. G. Campbell   Book Review  . . . . . . . . . . . . . . 726--726
                      A. Larner   Book Review  . . . . . . . . . . . . . . 726--727
                 A. G. Hamilton   Book Review  . . . . . . . . . . . . . . 727--728
                  F. Sebastiani   Book Review  . . . . . . . . . . . . . . 728--728
                    F. Crestani   Book Review  . . . . . . . . . . . . . . 728--729
               J. L. DePaul and   
                   T. T. Hewett   Book Review  . . . . . . . . . . . . . . 729--730

The Computer Journal
Volume 39, Number 9, 1996

                  P. M. Fenwick   The Burrows--Wheeler Transform for block
                                  sorting text compression: principles and
                                  improvements . . . . . . . . . . . . . . 731--740
                K. L. Verco and   
                     M. J. Wise   Plagiarism \`a la mode: a Comparison of
                                  Automated Systems for Detecting
                                  Suspected Plagiarism . . . . . . . . . . 741--750
             M. Visvalingam and   
                  D. Varley and   
                      C. Wright   A Cognitive Approach to Road Recognition
                                  with Novel Feature Indicators  . . . . . 751--756
               Ing-Ray Chen and   
                  Chi-Ming Chen   Threshold-based Admission Control
                                  Policies for Multimedia Servers  . . . . 757--766
                 I.-R. Chen and   
                     D.-C. Wang   Analysis of Replicated Data with Repair
                                  Dependency . . . . . . . . . . . . . . . 767--779
                 J. Tubella and   
         A. González and   
                   Eduard Elias   The Multipath Architecture for Prolog
                                  Programs . . . . . . . . . . . . . . . . 780--792
              P. van Bommel and   
         P. J. M. Frederiks and   
           Th. P. van der Weide   Object-Oriented Modelling based on
                                  Logbooks . . . . . . . . . . . . . . . . 793--799
                   Jixin Ma and   
                   Brian Knight   A Reified Temporal Logic . . . . . . . . 800--807
                 G. M. Seed and   
             D. E. R. Clark and   
               J. R. Corney and   
                  R. Tuttle and   
                      G. Little   Object-Oriented Graph-Based Geometric
                                  Feature Recognition  . . . . . . . . . . 808--811
                      A. Lunzer   Book Review  . . . . . . . . . . . . . . 812--813
                   M. D. Dunlop   Book Review  . . . . . . . . . . . . . . 813--813
                     K. Hammond   Book Review  . . . . . . . . . . . . . . 813--815
                     K. Hammond   Book Review  . . . . . . . . . . . . . . 813--815
                     K. Hammond   Book Review  . . . . . . . . . . . . . . 813--815
                         M. Joy   Book Review  . . . . . . . . . . . . . . 815--815
                  P. Wright and   
                     A. Dearden   Book Review  . . . . . . . . . . . . . . 815--816
                      S. Aitken   Book Review  . . . . . . . . . . . . . . 816--816
                    T. Ashworth   Book Review  . . . . . . . . . . . . . . 816--817
                         M. Joy   Book Review  . . . . . . . . . . . . . . 817--817

The Computer Journal
Volume 39, Number 10, 1996

                  R. Ingram and   
                     S. Benford   The Application of Legibility Techniques
                                  to Enhance Information Visualizations    819--836
                          C. Du   An Interpolation Method for Grid-based
                                  Terrain Modelling  . . . . . . . . . . . 837--843
                   N. Zhang and   
                         Q. Shi   Achieving Non-repudiation of Receipt . . 844--853
             A. B. McDonald and   
                       T. Znati   ARP versus ES-IS: Performance Evaluation
                                  of Neighbour-Greeting Protocols  . . . . 854--867
                    J. J. Sarbo   Building Sub-knowledge Bases Using
                                  Concept Lattices . . . . . . . . . . . . 868--875
             M. Díaz and   
                   B. Rubio and   
                    J. M. Troya   Distributed Programming with a Logic
                                  Channel Based Coordination Model . . . . 876--889
                 M. R. Williams   Book Review  . . . . . . . . . . . . . . 890--891
                       S. Mills   Book Review  . . . . . . . . . . . . . . 891--891
                         M. Joy   Book Review  . . . . . . . . . . . . . . 891--892
              R. Cardell-Oliver   Book Review  . . . . . . . . . . . . . . 892--892
              D. K. G. Campbell   Book Review  . . . . . . . . . . . . . . 892--893


The Computer Journal
Volume 40, Number 1, 1997

                    P. Cochrane   From Copper to Glass: the Right Idea,
                                  Decisions and Investments at the Right
                                  Time\ldots . . . . . . . . . . . . . . . 1--11
              D. G. Patrick and   
                P. R. Green and   
                     T. A. York   Occam- and C-Based Multiprocessor
                                  Environments for Unix Clusters . . . . . 12--21
                 P. Bozanis and   
                 N. Kitsios and   
                  C. Makris and   
                  A. Tsakalidis   New Results on Intersection Query
                                  Problems . . . . . . . . . . . . . . . . 22--29
                 W.-J. Tsai and   
                      S.-Y. Lee   Multi-Partition RAID: a New Method for
                                  Improving Performance of Disk Arrays
                                  under Failure  . . . . . . . . . . . . . 30--42
                    E. Chan and   
                   C. Daoxu and   
                     J. Cao and   
                      C.-H. Lee   Timing Properties of the FDDI-M Medium
                                  Access Protocol  . . . . . . . . . . . . 43--49
                          X. Wu   Hybrid Interpretation of `No Match' and
                                  `Multiple Match' in Induction  . . . . . 50--57
                  P. W. Trinder   Book Review  . . . . . . . . . . . . . . 58--58
                   V. Stavridou   Book Review  . . . . . . . . . . . . . . 58--59
                      M. Butler   Book Review  . . . . . . . . . . . . . . 59--61
                     T. Forster   Book Review  . . . . . . . . . . . . . . 61--63

The Computer Journal
Volume 40, Number 2--3, 1997

                      A. Moffat   Editorial for Special Issue on Lossless
                                  Compression  . . . . . . . . . . . . . . 65--66
                      A. Moffat   Lossless Compression . . . . . . . . . . 65--66
               J. G. Cleary and   
                   W. J. Teahan   Unbounded Length Contexts for PPM  . . . 67--75
                      S. Bunton   Semantically Motivated Improvements for
                                  PPM Variants . . . . . . . . . . . . . . 76--93
                Hidetoshi Yokoo   Data Compression Using a Sort-Based
                                  Context Similarity Measure . . . . . . . 94--102
       C. G. Nevill-Manning and   
                   I. H. Witten   Compression and Explanation Using
                                  Hierarchical Grammars  . . . . . . . . . 103--116
                    S. T. Klein   Efficient Optimal Recompression  . . . . 117--126
                   N. Memon and   
                          X. Wu   Recent Developments in Context-Based
                                  Predictive Techniques for Lossless Image
                                  Compression  . . . . . . . . . . . . . . 127--136
               J. A. Storer and   
                    H. Helfgott   Lossless Image Compression by Block
                                  Matching . . . . . . . . . . . . . . . . 137--145
                   P. G. Howard   Text Image Compression Using Soft
                                  Pattern Matching . . . . . . . . . . . . 146--156
                 B. J. Frey and   
                   G. E. Hinton   Efficient Stochastic Source Coding and
                                  an Application to a Bayesian Network
                                  Source Model . . . . . . . . . . . . . . 157--165

The Computer Journal
Volume 40, Number 4, 1997

          Andrew M. Dearden and   
            Michael D. Harrison   A Software Engineering Model for Case
                                  Memory Systems . . . . . . . . . . . . . 167--182
                 Alex Delis and   
                   Quang LeViet   Contemporary Access Structures Under
                                  Mixed Workloads  . . . . . . . . . . . . 183--193
              Fun Ting Chan and   
            Tsong Yueh Chen and   
              Ieng Kei Mark and   
                 Shir Ming Shen   On Some Properties of the Optimally
                                  Refined Proportional Sampling Strategy   194--199
               Pranay Chaudhuri   An optimal distributed algorithm for
                                  computing bridge- connected components   200--207
       Fredrick H. Dahlgren and   
         Per Stenström and   
           Marten Björkman   Reducing the Read-miss Penalty for Flat
                                  COMA Protocols . . . . . . . . . . . . . 208--219
              Robert M. Hierons   Testing from a Finite-State Machine:
                                  Extending Invertibility to Sequences . . 220--230
                     D. England   Book Review  . . . . . . . . . . . . . . 231--231
                        S. Rock   Book Review  . . . . . . . . . . . . . . 231--232
                      R. Turner   Book Review  . . . . . . . . . . . . . . 232--233
                      A. Larner   Book Review  . . . . . . . . . . . . . . 233--234

The Computer Journal
Volume 40, Number 5, 1997

                   R. M. Colomb   Impact of Semantic Heterogeneity on
                                  Federating Databases . . . . . . . . . . 235--244
     F. de Ferreira Rezende and   
             T. Härder and   
                   J. Zielinski   Transaction Identifiers in Nested
                                  Transactions: Implementation Schemes and
                                  Performance  . . . . . . . . . . . . . . 245--258
                   T. Bolognesi   Expressive Flexibility of a
                                  Constraint-oriented Notation . . . . . . 259--277
                   L. Xiang and   
                    C. Tang and   
                    K. Ushijima   Grammar-Oriented Enumeration of Binary
                                  Trees  . . . . . . . . . . . . . . . . . 278--291
                 Z. Arnavut and   
               S. S. Magliveras   Lexical Permutation Sorting Algorithm    292--295
                       C. Waite   Book Review  . . . . . . . . . . . . . . 296--296
                       J. Bowen   Book Review  . . . . . . . . . . . . . . 296--297
                   B. C. Pierce   Book Review  . . . . . . . . . . . . . . 297--298
                  F. Sebastiani   Book Review  . . . . . . . . . . . . . . 298--299
                        S. Rock   Book Review  . . . . . . . . . . . . . . 299--299

The Computer Journal
Volume 40, Number 6, 1997

                   M. Kumar and   
                  L. M. Patnaik   Automatic Loop Parallelization . . . . . 301--301
                Mohan Kumar and   
                  L. M. Patnaik   Special Issue Editorial: Automatic Loop
                                  Parallelization  . . . . . . . . . . . . 301--301
               Hyuk-Jae Lee and   
       José A. B. Fortes   Communication-Minimal Partitioning and
                                  Data Alignment for Affine Nested Loops   302--310
              Steven Novack and   
              Alexandru Nicolau   Resource-Directed Loop Pipelining:
                                  Exposing Just Enough Parallelism . . . . 311--321
                  Jialin Ju and   
                Vipin Chaudhary   Unique sets oriented parallelization of
                                  loops with non-uniform dependences . . . 322--339
          Sharad K. Singhai and   
            Kathryn S. McKinley   A Parametrized Loop Fusion Algorithm for
                                  Improving Parallelism and Cache Locality 340--355
            Michal Cierniak and   
       Mohammed Javeed Zaki and   
                         Wei Li   Compile-Time Scheduling Algorithms for a
                                  Heterogeneous Network of Workstations    356--372
        Dattatraya Kulkarni and   
                  Micheal Stumm   Linear and Extended Linear
                                  Transformations for Shared-Memory
                                  Multiprocessors  . . . . . . . . . . . . 373--387
               Balaram Sinharoy   Optimized Thread Creation for Processor
                                  Multithreading . . . . . . . . . . . . . 388--400

The Computer Journal
Volume 40, Number 7, 1997

              Hong Va Leong and   
                     Antonio Si   Database Caching Over the Air-Storage    401--415
             Evan P. Harris and   
         Kotagiri Ramamohanarao   Optimal Clustering of Relations to
                                  Improve Sorting and Partitioning for
                                  Joins  . . . . . . . . . . . . . . . . . 416--434
                     Yi Pan and   
           Jerry L. Trathan and   
      Ramachandran Vaidyanathan   A Scalable and Efficient Algorithm for
                                  Computing the City Block Distance
                                  Transform on Reconfigurable Meshes . . . 435--440
               Kshirasagar Naik   Designing Reliable Test Architectures
                                  for Communication Protocols  . . . . . . 441--456
               Marlin H. Mickle   An Electrical Circuit and Computer
                                  System Analogy . . . . . . . . . . . . . 457--462

The Computer Journal
Volume 40, Number 8, 1997

                Paddy Nixon and   
               Vinny Cahill and   
                    Fethi Rabhi   Building Parallel and Distributed
                                  Systems  . . . . . . . . . . . . . . . . 463--464
            K. Mandy Chandy and   
                    Adam Rikfin   Systematic Composition of Distributed
                                  Objects: Processes and Sessions  . . . . 465--478
        Andry Rakotonirainy and   
               Andrew Berry and   
            Stephen Crawley and   
                Zoran Milosevic   Describing Open Distributed Systems: a
                                  Foundation . . . . . . . . . . . . . . . 479--488
         Richard B. Kilgore and   
                 Craig M. Chase   Testing Distributed Programs Containing
                                  Racing Messages  . . . . . . . . . . . . 489--498
                    T. Kunz and   
                J. P. Black and   
               D. J. Taylor and   
                      T. Basten   Poet: Target-System Independent
                                  Visualizations of Complex
                                  Distributed-Application Executions . . . 499--512
               Vinny Cahill and   
                Paddy Nixon and   
            Brendan Tangney and   
                    Fethi Rabhi   Object Models for Distributed or
                                  Persistent Programming . . . . . . . . . 513--527

The Computer Journal
Volume 40, Number 9, 1997

                  S.-W. Lau and   
                   J. C. S. Lui   Designing a Hierarchical Multimedia
                                  Storage Server . . . . . . . . . . . . . 529--540
                    C.-K. Shene   An Analysis of Two In-Place Array
                                  Rotation Algorithms  . . . . . . . . . . 541--546
             P. Fränti and   
          J. Kivijärvi and   
              T. Kaukoranta and   
                  O. Nevalainen   Genetic Algorithms for Large-Scale
                                  Clustering Problems  . . . . . . . . . . 547--554
                   A. Sanna and   
               P. Montuschi and   
                  A. Fisone and   
                 B. Montrucchio   A New Algorithm for the Rendering of CSG
                                  Scenes . . . . . . . . . . . . . . . . . 555--564
                   E. Burke and   
                 K. Jackson and   
             J. H. Kingston and   
                       R. Weare   Automated University Timetabling: the
                                  State of the Art . . . . . . . . . . . . 565--571
             L. M. G. Feijs and   
                  M. A. Reniers   Lazy Functional Programs in a Concurrent
                                  Environment  . . . . . . . . . . . . . . 572--584

The Computer Journal
Volume 40, Number 10, 1997

     David Tresman Caminer, OBE   LEO and its applications: the beginning
                                  of business computing  . . . . . . . . . 585--597
     Dag I. K. Sjöberg and   
                Ray Welland and   
            Malcolm P. Atkinson   Software Constraints for Large
                                  Application Systems  . . . . . . . . . . 598--616
             Derrick Morris and   
            D. Gareth Evans and   
                Simon Schofield   Simulating the behaviour of computer
                                  systems: co-simulation of
                                  hardware/software  . . . . . . . . . . . 617--629
            Sanjay Kumar Madria   A study of the concurrency control and
                                  recovery algorithms in nested
                                  transaction environment  . . . . . . . . 630--639
           Olaf Müller and   
                   Konrad Slind   Treating Partiality in a Logic of Total
                                  Functions  . . . . . . . . . . . . . . . 640--651
                      Anonymous   Author index for 1997  . . . . . . . . . ??
                      Anonymous   Subject index for 1997 . . . . . . . . . ??


The Computer Journal
Volume 41, Number 1, 1998

             Ana Cavalcanti and   
                   Jim Woodcock   A Weakest Precondition Semantics for $Z$ 1--15
           Michele Flammini and   
            Jan van Leeuwen and   
   Alberto Marchetti-Spaccamela   The Complexity of Interval Routing on
                                  Random Graphs  . . . . . . . . . . . . . 16--25
              Soo-Mook Moon and   
               Kemal Ebcio\uglu   The Performance Impact of Exploiting
                                  Branch ILP with Tree Representation of
                                  ILP Code . . . . . . . . . . . . . . . . 26--44
              Giuseppe Alia and   
              Enrico Martinelli   Logic Design of a Fast Circuit for
                                  Iterative Additions in Redundant Hybrid
                                  Number Systems . . . . . . . . . . . . . 45--51
             Ding-Ming Kwai and   
                Behrooz Parhami   Tight Bounds on the Diameter of Gaussian
                                  Cubes  . . . . . . . . . . . . . . . . . 52--56
               C. Ierotheou and   
                  C. H. Lai and   
          C. J. Palansuriya and   
               K. A. Pericleous   Simulation of $2$-D metal cutting by
                                  means of a distributed algorithm . . . . 57--63
                      R. Cooper   Book Review  . . . . . . . . . . . . . . 64--65
                   C.-H. L. Ong   Book Review  . . . . . . . . . . . . . . 65--66

The Computer Journal
Volume 41, Number 2, 1998

                  Martyn Thomas   Myths of the Year 2000 . . . . . . . . . 67--70
       Christopher B. Jones and   
                   J. Mark Ware   Proximity Search with a Triangulated
                                  Spatial Model  . . . . . . . . . . . . . 71--83
                 P. Bodorik and   
                       D. Jutla   Multi-View Memory Support to Operating
                                  Systems in Locking for Transaction and
                                  Database Systems . . . . . . . . . . . . 84--97
                B. F. Jones and   
                D. E. Eyres and   
                  H. H. Sthamer   A Strategy for using Genetic Algorithms
                                  to Automate Branch and Fault-based
                                  Testing  . . . . . . . . . . . . . . . . 98--107
                Akhil Kumar and   
                      Noha Adly   HPP: a Reliable Causal Broadcast
                                  Protocol for Large-Scale Replication in
                                  Wide Area Networks . . . . . . . . . . . 108--124
           Woei-Jiunn Tsaur and   
                 Shi-Jinn Horng   Establishing Secure Ethernet LANs Using
                                  Intelligent Switching Hubs in Internet
                                  Environments . . . . . . . . . . . . . . 125--133
                   M. D. Dunlop   Book Review  . . . . . . . . . . . . . . 134--135
              H. Barendregt and   
                     W. Dekkers   Book Review  . . . . . . . . . . . . . . 135--135

The Computer Journal
Volume 41, Number 3, 1998

          Roberto De Prisco and   
              Alfredo De Santis   On the Data Expansion of the Huffman
                                  Compression Algorithm  . . . . . . . . . 137--144
            Antonino Mazzeo and   
            Nicola Mazzocca and   
              Stefano Russo and   
                 Carlo Savy and   
              Valeria Vittorini   Formal Specification of Concurrent
                                  Systems: a Structured Approach . . . . . 145--162
             Anton Biasizzo and   
               Alenka Zuzek and   
                    Franc Novak   Sequential Diagnosis with Asymmetrical
                                  Tests  . . . . . . . . . . . . . . . . . 163--170
                  L. Q. Bai and   
                   H. Ebara and   
                  H. Nakano and   
                       H. Maeda   Fault-Tolerant Broadcasting on the
                                  Arrangement Graph  . . . . . . . . . . . 171--184
                Jamel Tayeb and   
     Özgür Ulusoy and   
                   Ouri Wolfson   A Quadtree-Based Dynamic Attribute
                                  Indexing Method  . . . . . . . . . . . . 185--200
            Alois Panholzer and   
               Helmut Prodinger   Towards a More Precise Analysis of an
                                  Algorithm to Generate Binary Trees: a
                                  Tutorial . . . . . . . . . . . . . . . . 201--204

The Computer Journal
Volume 41, Number 4, 1998

                     Jie Wu and   
       Eduardo B. Fernandex and   
                    Donglai Dai   Optimal Fault-Secure Scheduling  . . . . 207--222
                       Keqin Li   Optimizing Average Job Response Time via
                                  Decentralized Probabilistic Job
                                  Dispatching in Heterogeneous Multiple
                                  Computer Systems . . . . . . . . . . . . 223--230
                  I-Chen Wu and   
                 Loon-Been Chen   On Detection of Bounded Global
                                  Predicates . . . . . . . . . . . . . . . 231--237
            Savio S. H. Tse and   
              Francis C. M. Lau   More on the Efficiency of Interval
                                  Routing  . . . . . . . . . . . . . . . . 238--242
               Ing-Ray Chen and   
             Tsong-Min Chen and   
                     Chiang Lee   Performance Evaluation of Forwarding
                                  Strategies for Location Management in
                                  Mobile Networks  . . . . . . . . . . . . 243--253
              Shun-Shii Lin and   
                  Shan-Tai Chen   On Detecting Multiple Faults in Baseline
                                  Interconnection Networks . . . . . . . . 254--269
     Khaled A. A. Abdel-Ghaffar   Detecting Substitutions and
                                  Transpositions of Characters . . . . . . 270--277
              H. R. A. Townsend   Letters  . . . . . . . . . . . . . . . . 278--278
                  M. Fairtlough   Book Review  . . . . . . . . . . . . . . 279--280
                  M. Fairtlough   Book Review  . . . . . . . . . . . . . . 279--280
                  F. Sebastiani   Book Review  . . . . . . . . . . . . . . 280--281

The Computer Journal
Volume 41, Number 5, 1998

          W. Paul Cockshott and   
           Douglas McGregor and   
                    John Wilson   High performance operations using a
                                  compressed database architecture . . . . 283--296
          Maarten van Steen and   
             Franz J. Hauck and   
           Gerco Ballintijn and   
            Andrew S. Tanenbaum   Algorithmic design of the globe
                                  wide-area location service . . . . . . . 297--310
       Th. P. van der Weide and   
           T. W. C. Huibers and   
                  P. van Bommel   The incremental searcher satisfaction
                                  model for information retrieval  . . . . 311--318
           Stuart G. Hoggar and   
                Lindsey Menzies   Fractal Compression and the Jigsaw
                                  Property I . . . . . . . . . . . . . . . 319--336
            Roberto Baldoni and   
            Roberto Beraldi and   
                   Ravi Prakash   Slotted-FIFO communication for
                                  asynchronous distributed systems . . . . 337--348
                  R. M. Hierons   Adaptive testing of a deterministic
                                  implementation against a
                                  nondeterministic finite state machine    349--355

The Computer Journal
Volume 41, Number 6, 1998

             Michael Prasse and   
                  Peter Rittgen   Why Church's Thesis still holds. Some
                                  notes on Peter Wegner's tracts on
                                  interaction and computability  . . . . . 357--362
              Hugh Robinson and   
                   Pat Hall and   
             Fiona Hovenden and   
                   Janet Rachel   Postmodern Software Development  . . . . 363--375
            Sanjay Kumar Madria   Handling of mutual conflicts in
                                  distributed databases using timestamps   376--385
                Declan P. Kelly   ARC: a specification language for
                                  communicating systems  . . . . . . . . . 386--401
                  K. W. Chu and   
                  S. K. Lam and   
                     M. H. Wong   An efficient hash-based algorithm for
                                  sequence data searching  . . . . . . . . 402--415
              Zbigniew J. Czech   Quasi-perfect Hashing  . . . . . . . . . 416--421
                E. Mäkinen   Binary Tree Code Words as Context-Free
                                  Languages  . . . . . . . . . . . . . . . 422--424
                  L. C. Paulson   Book Review  . . . . . . . . . . . . . . 425--425
                 B. M. Matthews   Book Review  . . . . . . . . . . . . . . 426--427
                     A. Dearden   Book Review  . . . . . . . . . . . . . . 427--428
                    F. Crestani   Book Review  . . . . . . . . . . . . . . 428--428

The Computer Journal
Volume 41, Number 7, 1998

                R. Benjamin and   
                 B. Gladman and   
                     B. Randell   Protecting IT Systems from CyberCrime    429--443
           Harold Thimbleby and   
            Stuart Anderson and   
                    Paul Cairns   A Framework for Modelling Trojans and
                                  Computer Virus Infection . . . . . . . . 444--458
                 Luc Moreau and   
                     Wendy Hall   On the Expressiveness of Links in
                                  Hypertext Systems  . . . . . . . . . . . 459--473
           Pasi Fränti and   
                   Timo Hatakka   Context Model Automata for Text
                                  Compression  . . . . . . . . . . . . . . 474--485
             S. E. Mitchell and   
             A. J. Wellings and   
                  A. Romanovsky   Distributed Atomic Actions in Ada 95 . . 486--502
               Andrea Sanna and   
            Paolo Montuschi and   
                  Massimo Rossi   A Flexible Algorithm for Multiprocessor
                                  Ray Tracing  . . . . . . . . . . . . . . 503--516

The Computer Journal
Volume 41, Number 8, 1998

                     F. Murtagh   Clustering and Classification  . . . . . 517--517
                     F. Murtagh   Foreword to special issue on clustering
                                  and classification . . . . . . . . . . . 517--517
                   Boris Mirkin   Least-Squares Structuring, Clustering
                                  and Data Processing Issues . . . . . . . 518--536
                   Y. H. Li and   
                     A. K. Jain   Classification of Text Documents . . . . 537--546
          Valerie J. Gillet and   
              David J. Wild and   
              Peter Willett and   
                  John Bradshaw   Similarity and Dissimilarity Methods for
                                  Processing Chemical Structure Databases  547--558
                    Ryuichi Oka   Spotting Method for Classification of
                                  Real World Data  . . . . . . . . . . . . 559--565
            Lawrence Hubert and   
              Phipps Arabie and   
             Jacqueline Meulman   The Representation of Symmetric
                                  Proximity Data: Dimensions and
                                  Classifications  . . . . . . . . . . . . 566--577
               Chris Fraley and   
              Adrian E. Raftery   How Many Clusters? Which Clustering
                                  Method? Answers Via Model-Based Cluster
                                  Analysis . . . . . . . . . . . . . . . . 578--588
             Dian I. Witter and   
               Michael W. Berry   Downdating the Latent Semantic Indexing
                                  Model for Conceptual Information
                                  Retrieval  . . . . . . . . . . . . . . . 589--601
                  C. S. Wallace   Intrinsic Classification of Spatially
                                  Correlated Data  . . . . . . . . . . . . 602--611


The Computer Journal
Volume 42, Number 1, 1999

                 L. Allison and   
                  D. Powell and   
                      T. I. Dix   Compression and approximate matching . . 1--10
               S. Kocberber and   
                     F. Can and   
                   J. M. Patton   Optimization of signature file
                                  parameters for databases with varying
                                  record lengths . . . . . . . . . . . . . 11--23
                        M. Choy   Consistent implementations of replicated
                                  objects  . . . . . . . . . . . . . . . . 24--38
         G. S. Chinchwadkar and   
                         A. Goh   An overview of vertical partitioning in
                                  object oriented databases  . . . . . . . 39--50
               Carlo Blundo and   
                  P. D'Arco and   
                   A. G. Gaggia   A $\tau$-restricted key agreement scheme 51--61
                  S. Loucif and   
             M. Ould-Khaoua and   
                L. M. Mackenzie   On the performance merits of bypass
                                  channels in hypermeshes and $k$-ary
                                  $n$-cubes  . . . . . . . . . . . . . . . 62--72

The Computer Journal
Volume 42, Number 2, 1999

            Birgit Schieder and   
                   Manfred Broy   Adapting Calculational Logic to the
                                  Undefined  . . . . . . . . . . . . . . . 73--81
               Richard F. Paige   Integrating a Program Design Calculus
                                  and a Subset of UML  . . . . . . . . . . 82--99
           Ykä Huhtala and   
  Juha Kärkkäinen and   
                Pasi Porkka and   
                 Hannu Toivonen   TANE: An Efficient Algorithm for
                                  Discovering Functional and Approximate
                                  Dependencies . . . . . . . . . . . . . . 100--111
           Chung-Ming Huang and   
                 Ming-Yuhe Jang   Interactive Temporal Behaviours and
                                  Modelling for Multimedia Presentations
                                  in the WWW Environment . . . . . . . . . 112--128
              Min-Sheng Lin and   
              Deng-Jyi Chen and   
                Maw-Sheng Horng   The Reliability Analysis of Distributed
                                  Computing Systems with Imperfect Nodes   129--141
                     W. F. Wong   Source Level Static Branch Prediction    142--149
                   Jim Rook and   
               Ian J. Lloyd and   
              Kenneth J. Turner   Book Reviews . . . . . . . . . . . . . . 150--152

The Computer Journal
Volume 42, Number 3, 1999

             Harry W. Agius and   
            Marios C. Angelides   COSMOS-Content Oriented Semantic
                                  Modelling Overlay Scheme . . . . . . . . 153--176
             Richard Bornat and   
                 Bernard Sufrin   Animating Formal Proof at the Surface:
                                  The Jape Proof Calculator  . . . . . . . 177--192
           Hugh E. Williams and   
                   Justin Zobel   Compressing Integers for Fast File
                                  Access . . . . . . . . . . . . . . . . . 193--201
                 Weijia Jia and   
               Jiannong Cao and   
              To-Yat Cheung and   
                    Xiaohua Jia   A Multicast Protocol Based on a Single
                                  Logical Ring Using a Virtual Token and
                                  Logical Clocks . . . . . . . . . . . . . 202--220
                Kecheng Liu and   
                       Tina Ong   A Modelling Approach for Handling
                                  Business Rules and Exceptions  . . . . . 221--231
            Ahmad A. Hiasat and   
           Hoda Abdel-Aty-Zohdy   Semi-Custom VLSI Design and
                                  Implementation of a New Efficient RNS
                                  Division Algorithm . . . . . . . . . . . 232--240
                Neven Tomov and   
              Euan Dempster and   
         M. Howard Williams and   
           Peter J. B. King and   
                  Albert Burger   Approximate Estimation of Transaction
                                  Response Time  . . . . . . . . . . . . . 241--250

The Computer Journal
Volume 42, Number 4, 1999

        Alexander Gammerman and   
                  Vladimir Vovk   Special Issue Editorial: Kolmogorov
                                  Complexity . . . . . . . . . . . . . . . 251--251
        Alexander Gammerman and   
                  Vladimir Vovk   Kolmogorov Complexity: Sources, Theory
                                  and Applications . . . . . . . . . . . . 252--255
                 Ray Solomonoff   Two Kinds of Probabilistic Induction . . 256--259
                    J. Rissanen   Hypothesis Selection and Testing by the
                                  MDL Principle  . . . . . . . . . . . . . 260--269
              C. S. Wallace and   
                     D. L. Dowe   Minimum Message Length and Kolmogorov
                                  Complexity . . . . . . . . . . . . . . . 270--283
               Leonid. A. Levin   Robust Measures of Information . . . . . 284--286
                  Tao Jiang and   
                    Ming Li and   
            Paul Vitányi   New Applications of the
                                  Incompressibility Method . . . . . . . . 287--293
                  V. V. V'yugin   Algorithmic Complexity and Stochastic
                                  Properties of Finite Binary Sequences    294--317
              Vladimir Vovk and   
            Alexander Gammerman   Complexity Approximation Principle . . . 318--322
                    A. P. Dawid   Discussion of the Papers by Rissanen and
                                  by Wallace and Dowe  . . . . . . . . . . 323--326
                 Jorma Rissanen   Discussion of paper `Minimum Message
                                  Length and Kolmogorov Complexity' by C.
                                  S. Wallace and D. L. Dowe  . . . . . . . 327--329
              C. S. Wallace and   
                     D. L. Dowe   Refinements of MDL and MML Coding  . . . 330--337
                      B. Clarke   Discussion of the Papers by Rissanen,
                                  and by Wallace and Dowe  . . . . . . . . 338--339
                 Alexander Shen   Discussion on Kolmogorov Complexity and
                                  Statistical Analysis . . . . . . . . . . 340--342
                 Jorma Rissanen   Rejoinder  . . . . . . . . . . . . . . . 343--344
              C. S. Wallace and   
                     D. L. Dowe   Rejoinder  . . . . . . . . . . . . . . . 345--347

The Computer Journal
Volume 42, Number 5, 1999

      A. H. M. ter Hofstede and   
                 M. E. Orlowska   On the Complexity of Some Verification
                                  Problems in Process Control
                                  Specifications . . . . . . . . . . . . . 349--359
                  Norman Ramsey   Eliminating Spurious Error Messages
                                  Using Exceptions, Polymorphism, and
                                  Higher-Order Functions . . . . . . . . . 360--372
              Mayez Al-Mouhamed   Evolution-Based Scheduling of
                                  Computations and Communications on
                                  Distributed-Memory Multicomputers  . . . 373--390
                   R. W. P. Luk   Near Optimal $\beta$ Heap  . . . . . . . 391--399
                  Tadao Takaoka   $O(1)$ Time Algorithms for Combinatorial
                                  Generation by Tree Traversal . . . . . . 400--408
              Po-Jen Chuang and   
                  Huey-Ming Hsu   Effective Fault Diagnosis Approaches for
                                  Multipath Networks . . . . . . . . . . . 409--421
           Miroslav Bojovic and   
             Milo Tomasevic and   
               Jovan Djordjevic   The Interactive Development and Testing
                                  System for a RISC-Style Processor  . . . 422--429
            Tsong Yueh Chen and   
                    Man Fai Lau   On the Completeness of a Test Suite
                                  Reduction Strategy . . . . . . . . . . . 430--440

The Computer Journal
Volume 42, Number 6, 1999

                    Mohan Kumar   Special Issue Editorial: Mobile
                                  Computing  . . . . . . . . . . . . . . . 441--441
            Kevin W. Froese and   
                Richard B. Bunt   Cache Management for Mobile File Service 442--454
          Cedric C. F. Fong and   
             John C. S. Lui and   
                     M. H. Wong   Distributed Caching and Broadcast in a
                                  Wireless Mobile Computing Environment    455--472
               Sajal K. Das and   
                  Sanjoy K. Sen   Adaptive Location Prediction Strategies
                                  Based on a Hierarchical Network Model in
                                  a Cellular Mobile Environment  . . . . . 473--486
                 Sihui Zhou and   
          Aruna Seneviratne and   
                 Terry Percival   An Efficient Location Management Scheme
                                  for Hybrid Wireless Asynchronous
                                  Transfer Mode Networks . . . . . . . . . 487--500
                Ersan Kayan and   
         Özgür Ulusoy   An Evaluation of Real-Time Transaction
                                  Management Issues in Mobile Database
                                  Systems  . . . . . . . . . . . . . . . . 501--510
              Guan-Chi Chen and   
                    Suh-Yin Lee   An Analytic Model for Performance
                                  Analysis of Concurrency Control
                                  Strategies in Mobile Environments  . . . 511--521
             Kuang-Hwei Chi and   
           Chien-Chao Tseng and   
                  Ting-Lu Huang   A Framework for Mobile Multicast Using
                                  Dynamic Route Reconstructions  . . . . . 522--533
           Timothy Bickmore and   
         Andreas Girgensohn and   
             Joseph W. Sullivan   Web Page Filtering and Re-Authoring for
                                  Mobile Users . . . . . . . . . . . . . . 534--546

The Computer Journal
Volume 42, Number 7, 1999

                  Mounia Lalmas   A Model for Representing and Retrieving
                                  Heterogeneous Structured Documents Based
                                  on Evidential Reasoning  . . . . . . . . 547--568
                   N. Zhang and   
                     Q. Shi and   
                     M. Merabti   A Flexible Approach to Secure and Fair
                                  Document Exchange  . . . . . . . . . . . 569--581
  Francesca Arcelli Fontana and   
           Ferrante Formato and   
                  Remo Pareschi   Computational Models for Information
                                  Reuse  . . . . . . . . . . . . . . . . . 582--591
                Wanlei Zhou and   
              Andrzej Goscinski   Managing Replicated Remote Procedure
                                  Call Transactions  . . . . . . . . . . . 592--608
                Esther Jennings   Distributed Algorithms for Finding
                                  Central Paths in Tree Networks . . . . . 609--612
         Tatsuhiro Tsuchiya and   
                   Tohru Kikuno   Availability Evaluation of Quorum-Based
                                  Mutual Exclusion Schemes in General
                                  Topology Networks  . . . . . . . . . . . 613--622
           Richard Mitchell and   
           B. de la Iglesia and   
            J. C. W. Debuse and   
                   Mark Staples   Book Reviews . . . . . . . . . . . . . . 623--625

The Computer Journal
Volume 42, Number 8, 1999

           Alexander Romanovsky   On Structuring Cooperative and
                                  Competitive Concurrent Systems . . . . . 627--637
            Keith M. Martin and   
           Rei Safavi-Naini and   
                  Huaxiong Wang   Bounds and Techniques for Efficient
                                  Redistribution of Secret Shares to New
                                  Access Structures  . . . . . . . . . . . 638--649
             Martin P. Ward and   
               Keith H. Bennett   Recursion Removal/Introduction by Formal
                                  Transformation: An Aid to Program
                                  Development and Program Comprehension    650--673
                Kam-Yiu Lam and   
           Chung-Leung Pang and   
                Sang H. Son and   
                   Jiannong Cao   Resolving Executing-Committing Conflicts
                                  in Distributed Real-time Database
                                  Systems  . . . . . . . . . . . . . . . . 674--692
                   H. Leung and   
                     T. Y. Chen   A New Perspective of the Proportional
                                  Sampling Strategy  . . . . . . . . . . . 693--698
               Voon-Yee Vee and   
                   Wen-Jing Hsu   Applying Cilk in Provably Efficient Task
                                  Scheduling . . . . . . . . . . . . . . . 699--712
                 Mark Sanderson   Book Reviews . . . . . . . . . . . . . . 713--715


The Computer Journal
Volume 44, Number 4, 2001

             Erkki Mäkinen   Comment on `A Framework for Modelling
                                  Trojans and Computer Virus Infection'    321--323
               H. Thimbleby and   
             S. O. Anderson and   
                   P. A. Cairns   Reply to ``Comment on `A Framework for
                                  Modelling Trojans and Computer Virus
                                  Infection' by E. Mäkinen''  . . . . . . . 324--325
                     Fred Cohen   Reply to ``Comment on `A Framework for
                                  Modelling Trojans and Computer Virus
                                  Infection' by E. Mäkinen''  . . . . . . . 326--327