Last update:
Wed Mar 10 06:19:43 MST 2021
Anonymous Editorial --- Databases . . . . . . . . 1--1
K. H. Baik and
L. L. Miller Topological Approach for Testing
Equivalence in Heterogeneous Relational
Databases . . . . . . . . . . . . . . . 2--10
Anonymous Announcement . . . . . . . . . . . . . . 10--10
N. L. Sarda Algebra and Query Language for A
Historical Data Model . . . . . . . . . 11--18
M. Levene and
G. Loizou The nested relation type model: an
application of domain theory to
databases . . . . . . . . . . . . . . . 19--30
Anonymous Announcement . . . . . . . . . . . . . . 30--30
M. Azmoodeh BRMQ: a database interface facility
based on graph traversals and extended
relationships on groups of entities . . 31--39
D. A. Bell and
J. Shao and
M. Elizabeth C. Hull Integrated Deductive Database System
Implementation. A Systematic Study . . . 40--48
Anonymous Announcements . . . . . . . . . . . . . 48--48
M. C. Taylor Logical optimisation of distributed
knowledge base queries . . . . . . . . . 49--60
T. P. Martin and
K. H. Lam and
Judy I. Russell An Evaluation of Site Selection
Algorithms for Distributed Query
Processing . . . . . . . . . . . . . . . 61--70
Anonymous Announcement . . . . . . . . . . . . . . 70--70
D. Agrawal and
A. El Abbadi Integrating Security with Fault-tolerant
Distributed Databases . . . . . . . . . 71--78
Anonymous Announcements . . . . . . . . . . . . . 78--78
R. Mukkamala and
S. C. Bruell Efficient schemes to evaluate
transaction performance in distributed
database systems . . . . . . . . . . . . 79--89
D. A. Kemp Correspondence . . . . . . . . . . . . . 90--91
P. J. Marcer Correspondence . . . . . . . . . . . . . 91--92
G. J. Chaitin Correspondence . . . . . . . . . . . . . 92--92
B. G. Gooch Correspondence . . . . . . . . . . . . . 92--92
T. Stonier Correspondence . . . . . . . . . . . . . 92--93
Anonymous Announcement . . . . . . . . . . . . . . 93--93
G. G. Scarrott Correspondence . . . . . . . . . . . . . 93--93
Anonymous Editorial --- Procedural Programming . . 97--97
R. E. Griswold String Scanning in the Icon Programming
Language . . . . . . . . . . . . . . . . 98--107
P. C. Philbrow and
M. P. Atkinson Events and exception handling in
PS-Algol . . . . . . . . . . . . . . . . 108--125
Anonymous Announcements . . . . . . . . . . . . . 125--125
R. G. Dromey and
T. A. Chorvat Structure Clashes --- An Alternative to
Program Inversion . . . . . . . . . . . 126--132
M. O. Jokinen Parameter Transmission Abstractions . . 133--139
Anonymous Announcements . . . . . . . . . . . . . 139--139
G. Whale Identification of Program Similarity in
Large Populations . . . . . . . . . . . 140--146
Anonymous Announcements . . . . . . . . . . . . . 146--146
G. L. Davies and
A. Burns The Teaching Language Pascal-FC . . . . 147--154
Anonymous Announcements . . . . . . . . . . . . . 154--154
C. F. Reynolds CODIL: The Architecture of an
Information Language . . . . . . . . . . 155--163
Anonymous Announcement . . . . . . . . . . . . . . 163--163
Anonymous Wilkes Award . . . . . . . . . . . . . . 163--163
Gerald D. P. Dueck and
Gordon V. Cormack Modular Attribute Grammars . . . . . . . 164--172
Marian Petre and
R. Winder On Languages, Models and Programming
Styles . . . . . . . . . . . . . . . . . 173--180
H. Berghel and
R. Rankin A Proposed Standard for Measuring
Crossword Compilation Efficiency . . . . 181--184
Anonymous Announcements . . . . . . . . . . . . . 184--184
R. Govindarajan and
L. M. Patnaik Short Notes: Lenient Execution and
Concurrent Execution of Re-entrant
Routines: Efficient Implementation in
Data Flow Systems . . . . . . . . . . . 185--187
Anonymous Announcements . . . . . . . . . . . . . 187--187
K. Brokate Correspondence . . . . . . . . . . . . . 188--188
C. G. Burgess Correspondence . . . . . . . . . . . . . 188--188
S. Dvorák Correspondence . . . . . . . . . . . . . 188--188
S. W. Palmer Correspondence . . . . . . . . . . . . . 188--188
H. Liddell Editorial --- Parallel Computing . . . . 193--193
O. G. Plata and
J. D. Bruguera and
F. F. Rivera and
R. Doallo and
E. L. Zapata ACLE: a Software Package for SIMD
Computer Simulation . . . . . . . . . . 194--203
S. Gulati and
S. S. Iyengar and
J. Barhen The Pebble-crunching Model for
Fault-tolerant Load Balancing in
Hypercube Ensembles . . . . . . . . . . 204--214
Anonymous Announcements . . . . . . . . . . . . . 214--214
K. W. Ng and
H. F. Leung Competition: a Model of AND-Parallel
Execution of Logic Programs . . . . . . 215--218
Camille C. Price and
M. A. Salama Scheduling of Precedence-Constrained
Tasks on Multiprocessors . . . . . . . . 219--229
Anonymous Announcements . . . . . . . . . . . . . 229--229
D. Abramson and
G. Egan The RMIT Data Flow Computer: a Hybrid
Architecture . . . . . . . . . . . . . . 230--240
S. Dey and
P. K. Srimani A New Parallel Sorting Algorithm and its
Efficient VLSI Implementation . . . . . 241--246
Anonymous Announcements . . . . . . . . . . . . . 246--246
P. Chaudhuri Finding and updating depth-first
spanning trees of acyclic digraphs in
parallel . . . . . . . . . . . . . . . . 247--251
F.-. C. Lin and
K. Chen On the design of an integrated systolic
array for solving simultaneous linear
equations . . . . . . . . . . . . . . . 252--260
G. M. Megson An efficient double pipe systolic array
for matrix product . . . . . . . . . . . 261--265
Anonymous Announcements . . . . . . . . . . . . . 265--265
H. Wills Fundamentals of Pricing and Scheduling
Computer Services and Investment in
Computer Equipment . . . . . . . . . . . 266--273
Anonymous Announcements . . . . . . . . . . . . . 273--273
J. S. Rohl Reversing is not inherent in
lexicographical permutation generation 274--278
Anonymous Announcements . . . . . . . . . . . . . 278--278
F. W. Burton and
J. G. Kollias and
D. G. Matsakis and
V. G. Kollias Short Note: Implementation of
Overlapping B-Trees for Time and Space
Efficient Representation of Collections
of Similar Files . . . . . . . . . . . . 279--280
Anonymous Announcements . . . . . . . . . . . . . 280--280
G. Xunrang and
Z. Yuzhang Short Note: a new HEAPSORT Algorithm and
the Analysis of its Complexity . . . . . 281--282
Anonymous Announcements . . . . . . . . . . . . . 282--282
A. Jordan Editorial --- Communications . . . . . . 289--289
C. Mitchell and
D. Rush and
M. Walker A Secure Messaging Architecture
Implementing the X.400-1988 Security
Features . . . . . . . . . . . . . . . . 290--295
A. S. Fraenkel and
S. T. Klein Bidirectional Huffman Coding . . . . . . 296--307
R. L. Bailey and
R. Mukkamala Pipelining Data Compression Algorithms 308--313
Anonymous Announcements . . . . . . . . . . . . . 313--313
P. Fenwick Performance Measurements on a 39 km
Extended Ethernet . . . . . . . . . . . 314--322
Y. Pan and
R. Melhem Short circuits in buffered multi-stage
interconnection networks . . . . . . . . 323--329
Anonymous Announcement . . . . . . . . . . . . . . 329--329
F. W. Burton and
G. P. McKeown and
V. J. Rayward-Smith Applications of UET scheduling theory to
the implementation of declarative
languages . . . . . . . . . . . . . . . 330--336
D. Alcock and
D. Brown PRAXIS: a Program for Reproducing
Proforma Design Calculations . . . . . . 337--343
M. Ancona and
L. De Floriani and
J. S. Deogun Structured Spanning Trees . . . . . . . 344--355
Anonymous Announcement . . . . . . . . . . . . . . 355--355
R. Feldman and
M. C. Golumbic Optimization algorithms for student
scheduling via constraint satisfiability 356--364
Anonymous Announcement . . . . . . . . . . . . . . 364--364
B. K. Haddon Cycle-Sort: a Linear Sorting Method . . 365--367
B. J. Oommen and
D. T. H. Ng On Generating Random Permutations with
Arbitrary Distributions . . . . . . . . 368--374
Anonymous Announcement . . . . . . . . . . . . . . 374--374
H. Miyakoshi A Literal Code Method for Minimizing
Boolean Functions . . . . . . . . . . . 375--380
T. H. Merrett Short Note: Scoping is not Orthogonal to
Completeness . . . . . . . . . . . . . . 381--381
T. H. Merrett Scoping is not orthogonal to
completeness . . . . . . . . . . . . . . 381--381
J. Won Park and
S. R. Maeng and
J. Wan Cho Correspondence . . . . . . . . . . . . . 382--382
J. Landsdown Editorial --- Communications . . . . . . 385--385
S. B. M. Bell and
D. C. Mason Tesseral Quaternions for the Octtree . . 386--397
A. Hunter and
P. J. Willis A Note on the Optimal Labelling of
Quadtree Nodes . . . . . . . . . . . . . 398--401
K. G. Suffern Quadtree Algorithms for Contouring
Functions of Two Variables . . . . . . . 402--407
L. R. Neal and
M. L. V. Pitteway Yet More Circle Generators . . . . . . . 408--411
B. Pham Algorithms for calculating cubic
Beta-splines . . . . . . . . . . . . . . 412--416
Anonymous Announcements . . . . . . . . . . . . . 416--416
P. Puliti and
G. Tascini Interpreting Technical Drawings . . . . 417--423
F. Dehne and
L. Ficocelli An efficient computational geometry
method for detecting dotted lines in
noisy images . . . . . . . . . . . . . . 424--428
L. Moltedo and
A. Noferini An Implementation of $7$-bit Character
Encoding for Standard Computer Graphics
Environments . . . . . . . . . . . . . . 429--436
N. E. Wiseman Book Review . . . . . . . . . . . . . . 436--436
F. Neelamkavil and
O. Mullarney Separating Graphics from Application in
the Design of User Interfaces . . . . . 437--443
M. Bilodeau and
D. Laguitton Development of Screen Management
Subroutines Compatible with Microsoft
FORTRAN Compiler . . . . . . . . . . . . 444--452
K. Bowden Kron's method of tearing on a Transputer
Array . . . . . . . . . . . . . . . . . 453--459
L. Allison Continuations Implement Generators and
Streams . . . . . . . . . . . . . . . . 460--465
Anonymous Announcement . . . . . . . . . . . . . . 465--465
T. H. Axford Reference Counting of Cyclic Graphs for
Functional Programs . . . . . . . . . . 466--470
A. Andersson Short Note: a Note on the Expected
Behaviour of Binary Tree Traversals . . 471--472
G. Alia and
E. Martinelli Short note: VLSI Binary-Residue
Converters for Pipelined Processing . . 473--475
B. E. P. Clement Correspondence . . . . . . . . . . . . . 475--475
Anonymous Announcements . . . . . . . . . . . . . 476--477
S. Gregory Editorial --- Concurrent Logic
Programming . . . . . . . . . . . . . . 481--481
K. L. Clark Parallel Logic Programming . . . . . . . 482--493
Kazunori Ueda and
Takashi C. Chikayama Design of the kernel language for the
parallel inference machine . . . . . . . 494--500
Anonymous Announcements . . . . . . . . . . . . . 500--500
I. Foster and
C. Kesselman and
S. Taylor Concurrency: Simple Concepts and
Powerful Tools . . . . . . . . . . . . . 501--507
Anonymous Announcements . . . . . . . . . . . . . 507--507
I. Shizgal The Amoeba-Prolog System . . . . . . . . 508--517
Anonymous Announcements . . . . . . . . . . . . . 517--517
J. G. Wolff Simplicity and Power --- Some Unifying
Ideas in Computing . . . . . . . . . . . 518--534
K. G. Waugh and
M. H. Williams and
Q. Kong and
S. Salvini and
G. Chen Designing SQUIRREL: an extended SQL for
a deductive database system . . . . . . 535--546
Anonymous Announcements . . . . . . . . . . . . . 546--546
N. W. Paton and
P. M. D. Gray Optimising and executing DAPLEX queries
using Prolog . . . . . . . . . . . . . . 547--555
H. J. Roberts Expert Systems Clubs: Design Methods . . 556--561
Anonymous Announcements . . . . . . . . . . . . . 561--561
G. M. Megson and
D. J. Evans A Systolic Array Solution for the
Assignment Problem . . . . . . . . . . . 562--569
T. Y. Chen On the Consistency of Multi-valued
Functions . . . . . . . . . . . . . . . 570--572
Anonymous Announcements . . . . . . . . . . . . . 572--572
M. Thomas Editorial --- Term Rewriting . . . . . . 1--1
A. J. J. Dick An Introduction to Knuth--Bendix
Completion . . . . . . . . . . . . . . . 2--15
J. A. Vince Book Review . . . . . . . . . . . . . . 15--15
A. J. J. Dick and
P. Watson Order-sorted Term Rewriting . . . . . . 16--19
M. Hermann and
C. Kirchner and
H. Kirchner Implementations of Term Rewriting
Systems . . . . . . . . . . . . . . . . 20--33
T. Nipkow Constructive Rewriting . . . . . . . . . 34--41
T. Drapkin Book Review . . . . . . . . . . . . . . 41--41
P. Padawitz Reduction and Narrowing for Horn Clause
Theories . . . . . . . . . . . . . . . . 42--51
P. Kacsuk A Parallel Prolog Abstract Machine and
its Multi-Transputer Implementation . . 52--63
J. Paakki Prolog in Practical Compiler Writing . . 64--72
B. Dwyer Correspondence . . . . . . . . . . . . . 72--72
L. Orman Constraint Maintenance as a Data Model
Design Criterion . . . . . . . . . . . . 73--79
F. B. Bastani and
I.-R. Chen and
W. Hilal A model for the stability analysis of
maintenance strategies for linear list 80--87
Anonymous Announcements . . . . . . . . . . . . . 87--87
M. A. Weiss Short Note: Empirical study of the
expected running time of Shellsort . . . 88--91
Anonymous Announcements . . . . . . . . . . . . . 91--91
J.-L. Wu and
S.-T. Cheng Short Note: a Neural Network Simulating
System . . . . . . . . . . . . . . . . . 92--93
C. J. Theaker Editorial . . . . . . . . . . . . . . . 97--97
D. E. Avison and
A. T. Wood-Harper Information systems development
research: an exploration of ideas in
practice . . . . . . . . . . . . . . . . 98--112
Anonymous Wilkes Award . . . . . . . . . . . . . . 112--112
F. Noble Seven Ways to Develop Office Systems: a
Managerial Comparison of Office System
Development Methodologies . . . . . . . 113--121
Anonymous Announcement . . . . . . . . . . . . . . 121--121
C.-C. D. Poo Representing business policies in the
Jackson system development method . . . 122--131
A. G. Sutcliffe and
I. Wang Integrating human computer interaction
with Jackson system development . . . . 132--142
Anonymous Announcement . . . . . . . . . . . . . . 142--142
T. H. Tse and
L. Pong An examination of requirements
specification languages . . . . . . . . 143--152
Anonymous Announcement . . . . . . . . . . . . . . 152--152
J. Trenouth A Survey of Exploratory Software
Development . . . . . . . . . . . . . . 153--163
Anonymous Announcement . . . . . . . . . . . . . . 163--163
M. Elizabeth C. Hull and
P. G. O'Donoghue and
B. J. Hagan Development Methods for Real-Time
Systems . . . . . . . . . . . . . . . . 164--172
A. Burns and
A. M. Lister A Framework for Building Dependable
Systems . . . . . . . . . . . . . . . . 173--181
Anonymous Announcement . . . . . . . . . . . . . . 181--181
P. Hammersley Information Systems Design Methodologies
--- Book Reviews . . . . . . . . . . . . 182--185
Anonymous Announcement . . . . . . . . . . . . . . 185--185
D. Campbell and
T. McNeill Finding a Majority When Sorting is Not
Available . . . . . . . . . . . . . . . 186--186
D. Campbell and
T. McNeill Short Note: Finding a majority when
sorting is not available . . . . . . . . 186--186
M. V. Wilkes Editorial --- the Maturing of VLSI ---
and its Consequences for the Computer
Industry . . . . . . . . . . . . . . . . 193--194
C. Hankins Book Review . . . . . . . . . . . . . . 194--194
J. Jagiello Book Review . . . . . . . . . . . . . . 194--194
M. Ancona and
A. Clematis and
L. De Floriani and
E. Puppo HIDEL: a Language for Hierarchical VLSI
Design . . . . . . . . . . . . . . . . . 195--206
W. S. Elliot Correspondence . . . . . . . . . . . . . 206--206
B. Wilkinson Comparative Performance of Overlapping
Connectivity Multiprocessor
Interconnection Networks . . . . . . . . 207--214
A. Olerup Design Approaches: a Comparative Study
of Information System Design and
Architectural Design . . . . . . . . . . 215--224
M. H. O'Docherty and
C. N. Daskalakis Multimedia Information Systems --- The
Management and Semantic Retrieval of all
Electronic Data Types . . . . . . . . . 225--238
Anonymous Announcements . . . . . . . . . . . . . 238--238
P. King and
C. Small Default Databases and Incomplete
Information . . . . . . . . . . . . . . 239--244
Anonymous Announcements . . . . . . . . . . . . . 244--244
R. Marshall Manipulating Full-text Scientific
Databases: a Logic-based
Se\-man\-tico-prag\-matic Approach . . . 245--253
I. A. Macleod A Query Language for Retrieving
Information from Hierarchic Text
Structures . . . . . . . . . . . . . . . 254--264
I. W. Merry Correspondence . . . . . . . . . . . . . 264--264
K. Morgan and
R. L. Morris and
S. Gibbs When does a mouse become a rat? or
\ldotsComparing performance and
preferences in direct manipulation and
command line environment . . . . . . . . 265--271
Anonymous Announcements . . . . . . . . . . . . . 271--271
The Rt. Hon. The Earl of Halsbury `Innovation for Failure --- Some
Reflections on the Work of the NRDC
Relevant to the Early History of the
Computer Industry in the UK' . . . . . . 272--274
The Rt. Hon. The Earl of Halsbury Ten Years of Computer Development . . . 275--279
V. Akman Short notes: Implementation of
Karp--Luby Monte Carlo method: an
exercise in approximate counting . . . . 279--282
K. Wicovsky and
P. F. Thanisch and
M. H. Williams Short Notes: Improved Recursion Handling
through Integrity Constraints . . . . . 282--285
Ian Watson Editorial --- Concurrent Programming . . 289--289
H. Kingdon and
D. R. Lester and
G. L. Burn The HDG-Machine: a Highly Distributed
Graph-Reducer for a Transputer Network 290--301
D. B. Skillicorn Practical Concurrent Programming for
Parallel Machines . . . . . . . . . . . 302--310
J. Henderson Correspondence . . . . . . . . . . . . . 310--310
J. Padget and
R. Bradford and
J. Fitch Concurrent Object-Oriented Programming
in Lisp . . . . . . . . . . . . . . . . 311--319
A. S. Douglas Book Review . . . . . . . . . . . . . . 319--319
A. S. Douglas Book Review . . . . . . . . . . . . . . 319--319
M.-C. Pong I-Pigs: an Interactive Graphical
Environment for Concurrent Programming 320--330
E. J. Yannakoudakis and
A. A. Shahid A Controlled Environment for
Meta-Message Processing . . . . . . . . 331--344
Anonymous Announcement . . . . . . . . . . . . . . 344--344
K-B. Yue and
R. T. Jacob An Efficient Starvation-Free Semaphore
Solution for the Graphical Mutual
Exclusion Problem . . . . . . . . . . . 345--349
S. Khanna Logic Programming for Software
Verification and Testing . . . . . . . . 350--357
M. L. V. Pitteway Book Review . . . . . . . . . . . . . . 357--357
J. Vanthienen Algorithm 124: a Longest Path Algorithm
to Display Decision Tables . . . . . . . 358--362
Anonymous Algorithms Supplement . . . . . . . . . 358--379
A. P. Hammersley Algorithm 125: Efficient Two-Dimensional
Fast Fourier Transform Subroutines for
Real-Valued or Hermitian data . . . . . 362--370
W. Dobosiewicz Algorithm 126: Linear Probing Sort . . . 370--373
J. K. Slape and
P. J. L. Wallis Algorithm 127: a modification of Sale's
algorithm to accommodate FORTRAN 77 . . 373--376
A. Stewart and
C. Holt and
M. Clint and
R. Perrott Algorithm 128: a DAP FORTRAN subroutine
for thinning digitised pictures . . . . 377--379
E. Makinen Efficient Generation of
Rotational-Admissible Codewords for
Binary Trees . . . . . . . . . . . . . . 379--379
E. Mäkinen Short Notes . . . . . . . . . . . . . . 379--379
C. Brink and
I. M. Rewitzky and
R. A. Schmidt Short Notes: Autodescriptivity: beware! 380--381
Anonymous Announcement . . . . . . . . . . . . . . 381--381
D. Giles Editorial --- Data Structures . . . . . 385--385
David Watson Editorial: Data Structures . . . . . . . 385--385
D. J. Challab Implementation of Flexible Arrays Using
Balanced Trees . . . . . . . . . . . . . 386--396
K. Bhaskar Book Review . . . . . . . . . . . . . . 396--396
B. Srinivasan An adaptive overflow technique to defer
splitting in B-trees . . . . . . . . . . 397--405
F. Hussain and
M. L. V. Pitteway Correspondence . . . . . . . . . . . . . 405--405
W. F. Smyth Mu-balancing M-way Search Trees . . . . 406--414
Anonymous Announcements . . . . . . . . . . . . . 414--414
S. P. Dandamudi and
P. G. Sorenson Improved Partial-Match Search Algorithms
for BD Trees . . . . . . . . . . . . . . 415--422
S. Maybank Book Review . . . . . . . . . . . . . . 422--422
B. Wichmann Book Review . . . . . . . . . . . . . . 422--422
S. Olariu and
C. M. Overstreet and
Z. Wenn A Mergeable Double-ended Priority Queue 423--427
C. T. Bhunia Correspondence . . . . . . . . . . . . . 427--427
D. Naor and
C. U. Martel and
N. S. Matloff Performance of Priority Queue Structures
in a Virtual Memory Environment . . . . 428--437
Anonymous Announcement . . . . . . . . . . . . . . 437--437
E. Mäkinen A Survey on Binary Tree Codings . . . . 438--443
G. Argo Weighting Without Waiting: the Weighted
Path Length Tree . . . . . . . . . . . . 444--449
P. M. Fenwick A New Technique for Self-Organising
Linear Searches . . . . . . . . . . . . 450--454
Anonymous Announcement . . . . . . . . . . . . . . 454--454
Seng Fat Ou and
Alan L. Tharp High Storage Utilisation for
Single-Probe Retrieval Linear Hashing 455--468
Anonymous Announcement . . . . . . . . . . . . . . 468--468
E. Oxborrow Book Review . . . . . . . . . . . . . . 468--468
C. C. Chang and
C. Y. Chen and
J. K. Jan On the Design of a Machine-Independent
Perfect Hashing Scheme . . . . . . . . . 469--474
D. Shepherd Book Review . . . . . . . . . . . . . . 474--474
P. Ru\vzi\vcka Short Note: a Note on the Efficiency of
an Interval Routing Algorithm . . . . . 475--476
Anonymous Announcement . . . . . . . . . . . . . . 476--476
Andrew Herbert Editorial: Distributed Systems . . . . . 481--481
W. B. Daszczuk A Structured Semantic Design of
Distributed Operating Systems . . . . . 482--492
Anonymous Announcements . . . . . . . . . . . . . 492--492
N. T. Son and
Y. Paker Adaptive deadlock-free packet routing in
transputer-based multiprocessor
interconnection networks . . . . . . . . 493--502
P. A. Kalinchenko Does a Point Belong to a Polygon? . . . 502--502
L. Mancini and
S. K. Shrivastava Fault-Tolerant Reference Counting for
Garbage Collection in Distributed
Systems . . . . . . . . . . . . . . . . 503--513
M. C. Er A Note on the Optimality of a Reve
Algorithm . . . . . . . . . . . . . . . 513--513
J. Dollimore and
E. Miranda and
Wang Xu The Design of a System for Distributing
Shared Objects . . . . . . . . . . . . . 514--521
I. D. Hill Book Review: Valerie Illingworth
(editor), \booktitleDictionary of
Computing (third edition) . . . . . . . 521--521
M. S. Verrall Unity Doesn't Imply Unification or
Overcoming Heterogeneity Problems in
Distributed Software Engineering
Environments . . . . . . . . . . . . . . 522--533
Andrew Dillon Abstracts in Human Computer Interaction 533--533
D. Agrawal and
A. Malpani Efficient Dissemination of Information
in Computer Networks . . . . . . . . . . 534--541
Anonymous Announcements . . . . . . . . . . . . . 541--541
L. H. Geesink The Coordination of Distributed Active
Messages in a Dynamic Network Topology 542--550
Anonymous Announcements . . . . . . . . . . . . . 550--550
P. Bodorik and
J. S. Riordon Threshold Values for Processing
Distributed Queries . . . . . . . . . . 551--558
Anonymous Announcements . . . . . . . . . . . . . 558--558
D. Michie Methodologies from Machine Learning in
Data Analysis and Software . . . . . . . 559--565
Anonymous Announcement . . . . . . . . . . . . . . 565--565
Lu Lahodynskyj Structure Clashes . . . . . . . . . . . 566--568
J. S. Rohl Ord-Smith's pseudo-lexicographical
permutation procedure is the
Tompkins-Paige algorithm . . . . . . . . 569--570
Anonymous Additional Papers . . . . . . . . . . . 571--572
G. M. Megson Book Review: D. Gassilloud and J. C.
Grossetie (eds), \booktitleComputing
with Parallel Architectures --- T. Node 573b-573
Chris Osborne Book Review: Helene G. Kershner,
\booktitleIntroduction to Computer
Literacy . . . . . . . . . . . . . . . . 573--573
Chris Osborne Book Review: Ernest S. Colantonio,
\booktitleA Laboratory Course in DOS,
Wordperfect 5.0, Lotus 1-2-3, dBASE IV 573a-573
V. S. Alagar and
P. Goyal and
P. S. Nair and
F. Sadri Integrated magic set method: a rule
rewrite scheme for optimising linear
datalog programs . . . . . . . . . . . . A121--A129
S. Dvorak and
B. Durian Decomposition merging with symmetric
exchanges . . . . . . . . . . . . . . . A029--A033
A. Ghafoor and
F. Y. Farhat Dynamic concurrency control algorithms
for large distributed database systems A095--A104
V. Goel and
Y. V. Venkatesh On an optimal and faster construction of
linear quadtrees from raster-scanned
images . . . . . . . . . . . . . . . . . A073--A083
K. K. Lau Top-down synthesis of sorting algorithm A001--A007
W. W. L. Lee and
D. S. Bowers A relational database simulator . . . . A061--A072
R. Marshall Discourse and natural-language text
analysis: functional grammar approach A035--A060
B. J. Oommen and
D. C. Y. Ma Stochastic automata solutions to the
object partitioning problem . . . . . . A105--A120
W. Wah and
S. G. Akl Simulating multiple memory accesses in
logarithmic time and linear space . . . A085--A088
C. J. Wang and
C. H. Wu and
V. P. Nelson A study of the generalized multiple
bus-connected parallel computer . . . . A089--A094
D. A. Watt Modular description of programming
languages . . . . . . . . . . . . . . . A009--A028
G. Tredoux Mechanizing Execution Sequence Semantics
in HOL . . . . . . . . . . . . . . . . . 81--86
Brian Wichmann and
Philip Giles Editorial . . . . . . . . . . . . . . . 1--2
A. Burns and
J. McDermid and
J. Dobson On the Meaning of Safety and Security 3--15
Rachel Burnett Yearbook of Law Computers and
Technology, Volume 5 . . . . . . . . . . 15--15
J.-J. Hwang and
B.-M. Shao and
P. C. Wang A new access control method using prime
factorisation . . . . . . . . . . . . . 16--20
M. V. D. Burmester and
Y. G. Desmedt and
T. Beth Efficient Zero-Knowledge Identification
Schemes for Smart Cards . . . . . . . . 21--29
Mildred L. G. Shaw Human Factors for Informatics Usability 29--29
R. de Lemos and
A. Saeed and
T. Anderson A Train Set as a Case Study for the
Requirements Analysis of Safety-Critical
Systems . . . . . . . . . . . . . . . . 30--40
Christopher Hankins and
John Vince Book reviews: \booktitleThe SGML
Handbook, by Charles Goldfarb, 1990;
\booktitleFractal Creations, by Timothy
Wegner and Mark Peterson, 1991 . . . . . 40--40
John Vince Fractal Creations . . . . . . . . . . . 40a-40
B. A. Wichmann A Note on the Use of Floating Point in
Critical Systems . . . . . . . . . . . . 41--44
M. Ho Kim and
S. Pramanik Optimizing Database Accesses for
Parallel Processing of Multikey Range
Searches . . . . . . . . . . . . . . . . 45--51
Anonymous Announcement . . . . . . . . . . . . . . 51--51
I. F. Akyildiz Performance Analysis of a Multiprocessor
System Model with Process Communication 52--61
Anonymous Announcement . . . . . . . . . . . . . . 61--61
R. G. Börn and
J. R. Kenevan Theoretical Performance-Based
Cost-Effectiveness of Multicomputers . . 62--70
Faith Noble Office Information Systems . . . . . . . 70--70
H. Shen Self-adjusting Mapping: a Heuristic
Mapping Algorithm for Mapping Parallel
Programs on to Transputer Networks . . . 71--80
Peter Wallis Mathematical Structures for Software
Engineering . . . . . . . . . . . . . . 80--80
D. Kaur Hierarchical Hypernet for Pipelining . . 81--87
M. Vassallo and
A. Ralston Algorithms for De Bruijn Sequences --- A
Case Study in the Empirical Analysis of
Algorithms . . . . . . . . . . . . . . . 88--90
A. van de Liefvoort An Iterative Algorithm for the Reve's
Puzzle . . . . . . . . . . . . . . . . . 91--92
Anonymous Additional Papers . . . . . . . . . . . 93--93
Anonymous Editorial . . . . . . . . . . . . . . . 97--97
W. Sun and
W. Meng and
C. Yu Query Optimisation in Distributed
Object-Oriented Database Systems . . . . 98--107
Anonymous Announcements . . . . . . . . . . . . . 107--107
Anonymous Erratum . . . . . . . . . . . . . . . . 107a-107
J. A. Mariani Oggetto: An Object Oriented Database
Layered on a Triple Store . . . . . . . 108--118
G. Scarrott Logic and Information . . . . . . . . . 118--118
A. Poulovassilis The Implementation of FDL, a Functional
Database Language . . . . . . . . . . . 119--128
I. D. Hill Book Review: B. Samways and T.
Byrne-Jones, \booktitleCollins Gem Basic
Facts: Computers, 3rd edn . . . . . . . 128--128
J. S. H. Yang and
Y. H. Chin and
C. G. Chung Many-Sorted First-Order Logic Database
Language . . . . . . . . . . . . . . . . 129--137
Anonymous Announcements . . . . . . . . . . . . . 137--137
P. G. Harrison and
H. Khoshnevisan The Mechanical Transformation of Data
Types . . . . . . . . . . . . . . . . . 138--147
D. Ince Formal Specification using Z . . . . . . 147a-147
N. Obeid Nonmonotonic Reasoning: Logical
Foundation of Commonsense . . . . . . . 147--147
Th. P. Van Der Weide and
A. H. M. Ter Hofstede and
P. Van Bommel Uniquest: Determining the Semantics of
Complex Uniqueness Constraints . . . . . 148--156
L. Paulson Logical Frameworks . . . . . . . . . . . 156--156
T. Conlon and
S. Gregory Debugging Tools for Concurrent Logic
Programming . . . . . . . . . . . . . . 157--169
S. J. Thompson and
R. D. Lins The Categorical Multi-Combinator
Machine: CMCM . . . . . . . . . . . . . 170--176
Ken Moody An Introduction to Formal Languages and
Automata . . . . . . . . . . . . . . . . 176--176
O. Nevalainen and
T. Raita An Internal Hybrid Sort Algorithm
Revisited . . . . . . . . . . . . . . . 177--183
I. Shearer Retrospective Update: Data as it was
Believed to be . . . . . . . . . . . . . 184--184
T. D. Gedeon The Reve's Puzzle: an Iterative Solution
Produced by Transformation . . . . . . . 186--186
Anonymous Additional Papers . . . . . . . . . . . 188--188
Keith Van Rijsbergen and
Maristella Agosti Editorial --- the Context of Information
Retrieval . . . . . . . . . . . . . . . 193--193
Maristella Agosti and
Pier Giorgio Marchetti User Navigation in the IRS Conceptual
Structure through a Semantic Association
Function . . . . . . . . . . . . . . . . 194--199
D. C. Blair Information Retrieval and the Philosophy
of Language . . . . . . . . . . . . . . 200--207
A. Gilles The Art of Computer Systems Performance
Analysis (Techniques for Experimental
Design, Measurement, Simulation, and
Modeling) . . . . . . . . . . . . . . . 207--207
P. D. Bruza and
T. P. Van Der Weide Stratified Hypermedia Structures for
Information Disclosure . . . . . . . . . 208--220
Anonymous Announcement . . . . . . . . . . . . . . 220--220
Alison Cawsey and
Julia Galliers and
Steven Reece and
Karen Sparck Jones Automating the Librarian: Belief
Revision as a Base for System Action and
Communication with the User . . . . . . 221--232
Y. Chiaramella and
J. P. Chevallet About Retrieval Models and Logic . . . . 233--242
Anonymous Announcement . . . . . . . . . . . . . . 242--242
Norbert Fuhr Probabilistic Models in Information
Retrieval . . . . . . . . . . . . . . . 243--255
Judy Bishop Introduction to Pascal and Structured
Design; Pascal plus Data Structures,
Algorithms and Advanced Programming . . 255--255
David J. Harper and
Andrew D. M. Walker ECLAIR: an Extensible Class Library for
Information Retrieval . . . . . . . . . 256--267
Alan F. Smeaton Progress in the Application of Natural
Language Processing to Information
Retrieval Tasks . . . . . . . . . . . . 268--278
Anonymous Announcement . . . . . . . . . . . . . . 278a-278
Mark Sanderson Conceptual Information Retrieval --- a
Case Study in Adaptive Partial Parsing 278--278
Howard R. Turtle and
W. Bruce Croft A Comparison of Text Retrieval Models 279--290
Anonymous Erratum . . . . . . . . . . . . . . . . 290a-290
M. A. Turega Neural Networks . . . . . . . . . . . . 290--290
C. J. van Rijsbergen Probabilistic Retrieval Revisited . . . 291--298
Anonymous Correspondence . . . . . . . . . . . . . 298--298
David Gries Correspondence: On ``Finding a Majority
When Sorting is Not Available'' . . . . 298--298
C. C. Chang and
H. Y. Chen and
C. Y. Chen Symbolic Gray Code As a Data Allocation
Scheme for Two-Disc Systems . . . . . . 299--305
Anonymous Announcement . . . . . . . . . . . . . . 305--305
M. C. Er Efficient Generation of $k$-ary Trees in
Natural Order . . . . . . . . . . . . . 306--308
W. R. Dufrene, Jr. and
F. C. Lin An Efficient External Sort Algorithm
with no Additional Space . . . . . . . . 308--310
Anonymous Announcements . . . . . . . . . . . . . 310--310
Anonymous Additional Papers . . . . . . . . . . . 311--312
Feliks Kluzniak and
Stanislaw Szpakowicz Correspondence . . . . . . . . . . . . . 313--313
Anonymous Editorial --- Models and Architectures 321--321
S. W. Dietrich and
M. Brown and
E. Cortes-Rello and
S. Wunderlin A Practitioner's Introduction to
Database Performance Benchmarks and
Measurements . . . . . . . . . . . . . . 322--331
Dan Diaper Human-Computer Interaction: Theory and
Practice . . . . . . . . . . . . . . . . 331--331
D. H. O. Ling and
D. A. Bell Modelling and Managing Time in Database
Systems . . . . . . . . . . . . . . . . 332--341
E. Auramäki and
R. Hirschheim and
K. Lyytinen Modelling offices through discourse
analysis: the SAMPO approach . . . . . . 342--352
Anonymous Announcement . . . . . . . . . . . . . . 352--352
M. Turega A Computer Architecture to Support
Neural Net Simulation . . . . . . . . . 353--360
R. Männer and
O. Stucky Fault-Tolerant Data Transfer in a
Multiprocessor System by Forward and
Backward Hardware Error Recovery . . . . 361--368
Alan Burns Constructing Predictable Real-Time
Systems . . . . . . . . . . . . . . . . 368a-368
Ronald Stamper A Theory of Computer Semiotics . . . . . 368--368
J. Rosenberg and
J. L. Keedy and
D. Abramson Addressing Mechanisms for Large Virtual
Memories . . . . . . . . . . . . . . . . 369--375
R. A. Frost Constructing Programs as Executable
Attribute Grammars . . . . . . . . . . . 376--389
C. C. Chang and
H. F. Lin and
C. Y. Chen Optimality properties of the disc modulo
allocation method for $k$-ary multiple
key hashing files . . . . . . . . . . . 390--394
Anonymous Announcement . . . . . . . . . . . . . . 394--394
R. Sprugnoli Properties of Binary Trees Related to
Position . . . . . . . . . . . . . . . . 395--404
Carl French Computer Science . . . . . . . . . . . . 404--404
B. Parhami Systolic Number Radix Converters . . . . 405--409
S. Carlsson A Note on Heapsort . . . . . . . . . . . 410--411
Anonymous Announcements . . . . . . . . . . . . . 411--411
Anonymous Additional Papers . . . . . . . . . . . 412--413
John Cooke Editorial --- Formal Methods: What? Why?
and When? . . . . . . . . . . . . . . . 417--418
J. Cooke Formal methods --- Mathematics, Theory,
Recipes or what? . . . . . . . . . . . . 419--423
Anonymous Announcements . . . . . . . . . . . . . 423--423
A. Galton Classical Logic: a Crash Course for
Beginners . . . . . . . . . . . . . . . 424--430
D. Ince Case Technology . . . . . . . . . . . . 430--430
P. Thainisch Real-time Transaction Processin . . . . 430a-430
A. Galton Logic as a Formal Method . . . . . . . . 431--440
J. C. P. Woodcock The Rudiments of Algorithm Refinement 441--450
Dave Berry Ml for the Working Programme . . . . . . 450a-450
P. Quinlan Neural Network Parallel Computing . . . 450--450
T. Clement The Role of Data Reification in Program
Refinement: Origins, Synthesis and
Appraisal . . . . . . . . . . . . . . . 451--459
H. Ehrig and
B. Mahr and
I. Classen and
F. Orejas Introduction to Algebraic Specification.
Part 1: Formal Methods for Software
Development . . . . . . . . . . . . . . 460--467
Anonymous Special Issue on Spatial Data --- Call
for Papers . . . . . . . . . . . . . . . 467--467
H. Ehrig and
B. Mahr and
F. Orejas Introduction to Algebraic Specification.
Part 2: From Classical View to
Foundations of System Specifications . . 468--477
Anonymous Announcement . . . . . . . . . . . . . . 477a-477
A. Leeming Informatization in the Public Sector . . 477--477
M. van Sinderen and
L. Ferreira Pires and
C. A. Vissers Protocol Design and Implementation Using
Formal Methods . . . . . . . . . . . . . 478--491
L. C. Paulson Functional Programming with Hope . . . . 491--491
E. Auramäki and
R. Hirschheim and
K. Lyytinen Modelling Offices Through Discourse
Analysis: a Comparison and Evaluation of
SAMPO with OSSAD and ICN . . . . . . . . 492--500
Anonymous Announcement . . . . . . . . . . . . . . 500--500
B. Czejdo and
M. C. Taylor Integration of Information Systems Using
an Object-Oriented Approach . . . . . . 501--513
Anonymous Announcements . . . . . . . . . . . . . 513--513
Harald Sòndergaard and
Peter Sestoft Non-Determinism in Functional Languages 514--523
A. A. Bertossi and
F. Luccio and
L. Pagli and
E. Lodi Short notes: a parallel solution to the
approximate string matching problem . . 524--526
D. J. Challab Short notes: Flexible arrays: evaluation
of the B-tree based system . . . . . . . 527--529
David Furber Short notes: a survey of the teaching of
programming to computing undergraduates
in U.K. Universities and Polytechnics 530--533
D. T. H. Ng and
B. J. Oommen Short notes: a short note on
doubly-linked list re-organizing
heuristics . . . . . . . . . . . . . . . 533--535
B. Jamison and
S. Olariu Short notes: Indexing for
multi-attribute retrieval . . . . . . . 535--537
Anonymous Announcement . . . . . . . . . . . . . . 537--537
Anonymous Additional Papers . . . . . . . . . . . 538--538
Anonymous Announcement . . . . . . . . . . . . . . 539a-539
Roy Dyckhoff Book Review . . . . . . . . . . . . . . 539--539
K. N. Dandeker Implementation of parameterised views in
relational query languages with a macro
processor . . . . . . . . . . . . . . . A425
F. Neelamkavil and
S. O'Shea Interfacing Eiffel and PCTE . . . . . . A439
P. W. Oman and
K. Van Houten On the use of binary strings to
represent tree structures . . . . . . . A463
V. T. H. Paschos and
A. N. Stafylopatis Evaluation of the execution cost of
recursive definitions . . . . . . . . . A429
F. Sadri Data dependencies in deductive databases A415
E. J. Yannakoudakis and
H. A. Attar-Bashi Constructing natural language sentences
from database tuples . . . . . . . . . . A445
John Cooke Editorial --- Formal Methods: What? Why?
and When? . . . . . . . . . . . . . . . 545--546
E. A. Boiten and
H. A. Partsch and
D. Tuijnman and
N. Völker How to Produce Correct Software --- An
Introduction to Formal Specification and
Program Development by Transformations 547--554
Anonymous Special Issue on Spatial Data --- Call
for Papers . . . . . . . . . . . . . . . 554a-554
R. Moore Programming with VDM . . . . . . . . . . 554--554
P. G. Harrison A Higher-Order Approach to Parallel
Algorithms . . . . . . . . . . . . . . . 555--566
P. G. Larsen and
N. Plat Standards for Non-Executable
Specification Languages . . . . . . . . 567--573
J. Bishop A Compiler Writer's Toolbox . . . . . . 573--573
D. R. Kuhn A Technique for Analyzing the Effects of
Changes in Formal Specifications . . . . 574--578
Anonymous Notice . . . . . . . . . . . . . . . . . 578--578
L. M. Barroca and
J. A. McDermid Formal methods: use and relevance for
the development of safety-critical
systems . . . . . . . . . . . . . . . . 579--599
Anonymous Announcement . . . . . . . . . . . . . . 599--599
L. T. Semmens and
R. B. France and
T. W. G. Docker Integrated structured analysis and
formal specification techniques . . . . 600--610
Anonymous Announcement . . . . . . . . . . . . . . 610a-610
R. E. Cooley The Integration of Expert Systems into
Mainstream Software . . . . . . . . . . 610--610
V. Mi\vsi\'c and
D. Vela\vsevi\'c and
B. Lazarevi\'c Formal Specification of a Data
Dictionary for an Extended ER Data Model 611--622
G. O'Neill Short note: Automatic translation of VDM
specifications into Standard ML programs 623--624
Trevor Clarkson Book review: \booktitleVLSI Design of
Neural Networks, by Ulrich Ramacher and
Ulrich Ruckert . . . . . . . . . . . . . 624--624
Trevor Clarkson Vlsi Design of Neural Networks . . . . . 624--624
I. Bruha AI Multilanguage System McPOPLOG: The
Power of Communication Between its
Subsystems . . . . . . . . . . . . . . . 625--629
J. Mak CD-ROMs in Print: an International Guide
to CD-ROM, CD-I, CDTV & Electronic Book
Product . . . . . . . . . . . . . . . . 629--629
F. Barsi and
M. C. Pinotti Adding Flexibility to Hybrid Number
Systems . . . . . . . . . . . . . . . . 630--635
Anonymous Announcement . . . . . . . . . . . . . . 635--635
I. J. Davis A Fast Radix Sort . . . . . . . . . . . 636--642
Anonymous Announcement . . . . . . . . . . . . . . 642--642
B.-C. Huang and
M. A. Langston Fast stable merging and sorting in
constant extra space . . . . . . . . . . 643--650
M. A. H. MacCallum Book Review . . . . . . . . . . . . . . 650a-650
R. E. Massara Book Review . . . . . . . . . . . . . . 650--650
A. P. Robson and
D. J. Kinniment Simstrict: a Behavioural Simulator for
Use with the Strict Hardware Description
Language . . . . . . . . . . . . . . . . 651--654
C. M. Eastman and
R. P. Trueblood Occupancy Models for the Estimation of
Block Accesses . . . . . . . . . . . . . 654--658
C. H. Lin and
C. C. Chang and
R. C. T. Lee A Record-Oriented Cryptosystem for
Database Sharing . . . . . . . . . . . . 658--660
A. P. Korah and
M. R. Kaimal A Short Note on Perfectly Balanced
Binary Search Trees . . . . . . . . . . 660--662
Y-C. Hou and
J-C. Tsay On Equivalent Systolic Designs of $LU$
Decomposition and its Algebraic
Representation . . . . . . . . . . . . . 662--666
Y. Manolopoulos Reverse Chaining for Answering Temporal
Logical Queries . . . . . . . . . . . . 666--668
Anonymous Announcement . . . . . . . . . . . . . . 668a-668
Peter Wallis Software Reuse Guidelines and Method . . 668--668
Anonymous Additional Papers . . . . . . . . . . . 669--670
Anonymous Errata . . . . . . . . . . . . . . . . . 670--670
J. K. Mullin Hash functions for hash-based join
methods . . . . . . . . . . . . . . . . A499--A503
K. van Rijsbergen Editorial . . . . . . . . . . . . . . . 1--1
Keith van Rijsbergen, Editor-in-Chief Welcome . . . . . . . . . . . . . . . . 1--1
D. Hutchinson Special Issue Editorial: Distributed
Multimedia Systems . . . . . . . . . . . 2--3
David Hutchison Special Issue Editorial: Distributed
Multimedia Systems . . . . . . . . . . . 2
F. Horn and
J. B. Stefani On Programming and Supporting Multimedia
Object Synchronisation . . . . . . . . . 4--18
S. Ramanathan and
P. Venkat Rangan Feedback techniques for intra-media
continuity and inter-media
synchronization in distributed
multimedia systems . . . . . . . . . . . 19--31
Phillip Lougher and
Doug Shepherd The Design of a Storage Server for
Continuous Media . . . . . . . . . . . . 32--42
W. Tawbi and
F. Horn and
E. Horlait and
J.-B. Stéfani Video Compression Standards and Quality
of Service . . . . . . . . . . . . . . . 43--54
Ian Wakeman Packetized video: options for
interaction between the user, the
network and the codec . . . . . . . . . 55--67
P. E. Tischer and
R. T. Worley and
A. J. Maeder and
M. Goodwin Context-based Lossless Image Compression 68--77
M. Vazirgiannis and
C. Mourlas An object-oriented model for interactive
multimedia presentations . . . . . . . . 78--86
H. M. Vin and
M.-S. Chen and
T. Barzilai Collaboration Management in DiCE . . . . 87--96
S. C. Hui and
A. Goh and
L. H. Lau A multimedia information system for IC
failure analysis . . . . . . . . . . . . 97--105
J. Nievergelt and
P. Widmayer Guard Files: Stabbing and Intersection
Queries on Fat Spatial Objects . . . . . 107--116
M. F. Challis Two new techniques for computing
extremal $h$-bases ${A}_k$ . . . . . . . 117--126
B. Knight Information loss in temporal knowledge
representations . . . . . . . . . . . . 127--136
S. S. Yau and
J. V. Gore Paradigm lost: discovering the
intersection of assertion-guided program
construction and constraint-driven
re-evaluation . . . . . . . . . . . . . 137--142
N. Pliskin and
T. Romm and
A. S. Lee and
Y. Weber Presumed versus actual organizational
culture: managerial implications for
implementation of information systems 143--152
M. Elizabeth C. Hull and
P. G. O'Donoghue Family relationships between
requirements and design specification
methods . . . . . . . . . . . . . . . . 153--167
C. Burdorf and
J. Marti Load balancing strategies for Time Warp
on multi-user workstations . . . . . . . 168--176
V. Catania and
A. Puliafito and
L. Vita A model for performance evaluation of
gracefully degrading systems . . . . . . 177--185
R. J. Millar and
M. Elizabeth C. Hull and
J. H. Frazer The Millar Polyhedron and its use in the
construction of octrees . . . . . . . . 186--194
A. Poulovassilis A Pattern-Matching Algorithm for
Functional Databases . . . . . . . . . . 195--199
C. C. Charlton and
P. E. Dunne and
K. Halewood and
P. H. Leng An algorithm to generate random large
combinational circuits . . . . . . . . . 200--206
M. Er Correspondence . . . . . . . . . . . . . 207--207
J. van Leeuwen and
D. Wood Interval Heaps . . . . . . . . . . . . . 209--216
G. Rossi Programs as Data in an Extended Prolog 217--226
M. Zviran and
W. J. Haga A comparison of password techniques for
multilevel authentication mechanisms . . 227--237
G. Hains and
L. M. R. Mullin Parallel Functional Programming with
Arrays . . . . . . . . . . . . . . . . . 238--245
S. J. Horng Constant time algorithm for template
matching on a reconfigurable array of
processors . . . . . . . . . . . . . . . 246--253
I. P. de Guzmán and
P. G. Harrison and
E. Medina Pipelines for Divide-and-Conquer
Functions . . . . . . . . . . . . . . . 254--268
W. Appelt and
N. Tetteh-Lartey The formal specification of the ISO open
document architecture (ODA) standard . . 269--279
M. A. Weiss On Finding the Height of a Binary Search
Tree . . . . . . . . . . . . . . . . . . 280--281
B. J. Oommen Transforming ill-conditioned constrained
problems using projections . . . . . . . 282--285
I. Wegener A simple modification of Xunrang and
Yuzhang's HEAPSORT variant improving its
complexity significantly . . . . . . . . 286--288
M. Thomas Book Review . . . . . . . . . . . . . . 289--289
A. Solomon Book Review . . . . . . . . . . . . . . 289--290
I. R. MacCallum Book Review . . . . . . . . . . . . . . 290--290
M. Turega Book Review . . . . . . . . . . . . . . 290--291
C. Davies Book Review . . . . . . . . . . . . . . 291--292
G. I. Parkin Book Review . . . . . . . . . . . . . . 292--292
Anonymous Book Review . . . . . . . . . . . . . . 292--293
V. J. Rayward-Smith Book Review . . . . . . . . . . . . . . 293--294
S. Gregory Book Review . . . . . . . . . . . . . . 294--294
I. R. Murray Book Review . . . . . . . . . . . . . . 294--295
N. Alm Book Review . . . . . . . . . . . . . . 295--296
D. Gollmann Book Review . . . . . . . . . . . . . . 296--296
P. Hammersley Editorial . . . . . . . . . . . . . . . 297--298
Peter Hammersley Special Issue Editorial: Computing
Curricula . . . . . . . . . . . . . . . 297
Anthony Finkelstein European computing curricula: a guide
and comparative analysis . . . . . . . . 299--319
Anthony Finkelstein and
Jeff Kramer and
Samson Abramsky and
Krysia Broda and
Sophia Drossopoulou and
Susan Eisenbach An Integrated Engineering Study Scheme
in Computing . . . . . . . . . . . . . . 320--334
Jonathan D. Pemberton and
Joanne M. Smailes Educating the Masses --- is IT a Tricky
Business? . . . . . . . . . . . . . . . 335--342
Chris Osborne Planning for IT literacy in an
institution of higher education: a case
study . . . . . . . . . . . . . . . . . 343--350
P. Naur Understanding Turing's universal machine
--- personal style in program
description . . . . . . . . . . . . . . 351--372
Doug Goldson and
Steve Reeves and
Richard Bornat A review of several programs for the
teaching of logic . . . . . . . . . . . 373--386
Andrew Ireland On exploiting the structure of
Martin-Lof's Theory of Types . . . . . . 387--398
Hoon Hong Special Issue Editorial: Computational
Quantifier Elimination . . . . . . . . . 399--399
Felipe Cucker On the complexity of quantifier
elimination: the structural approach . . 400--408
John Canny Improved algorithms for sign
determination and existential quantifier
elimination . . . . . . . . . . . . . . 409--418
Devdatt P. Dubhashi Quantifier Elimination in $p$-adic
Fields . . . . . . . . . . . . . . . . . 419--426
Joos Heintz and
Marie-Françoise Roy and
Pablo Solernó On the theoretical and practical
complexity of the existential theory of
reals . . . . . . . . . . . . . . . . . 427--431
Scott McCallum Solving polynomial strict inequalities
using cylindrical algebraic
decomposition . . . . . . . . . . . . . 432--438
Hoon Hong Quantifier elimination for formulas
constrained by quadratic equations via
slope resultants . . . . . . . . . . . . 439--449
Rüdiger Loos and
Volker Weispfenning Applying Linear Quantifier Elimination 450--462
Vijay Chandru Variable Elimination in Linear
Constraints . . . . . . . . . . . . . . 463--472
Jean-Louis Imbert Variable elimination for disequations in
generalized linear constraint systems 473--484
Dinesh Manocha Efficient Algorithms for MultiPolynomial
Resultant . . . . . . . . . . . . . . . 485--496
Richard Liska and
Stanly Steinberg Applying quantifier elimination to
stability analysis of difference schemes 497--503
John Canny Computing Roadmaps of General
Semi-Algebraic Sets . . . . . . . . . . 504--514
M. J. González-López and
T. Recio Path Tracking in Motion Planning . . . . 515--524
Abraham Mehrez and
Geoffry S. Howard and
Yaakov Lugassi and
Peretz Shoval Information system planning and
selection: a multiattribute theoretic
approach . . . . . . . . . . . . . . . . 525--541
B. John Oommen and
Chris Fothergill Fast learning automaton-based image
examination and retrieval . . . . . . . 542--553
Daniel Y. Chao and
David T. Wang and
Douglas D. C. Hung Convergence time and memory capacity of
higher-order Hopfield associative memory
with multi-valued neurons . . . . . . . 554--561
L. A. Breene Quadtrees and hypercubes: grid embedding
strategies based on spatial data
structure addressing . . . . . . . . . . 562--569
Henry Ker-Chang Chang and
Shing Hong Chen A new locally adaptive data compression
scheme using multilist structure . . . . 570--578
Zbigniew J. Czech and
Bohdan S. Majewski A Linear Time Algorithm for Finding
Minimal Perfect Hash Functions . . . . . 579--587
C. M. Khoong Shortest-Path Reconstruction Algorithms 588--592
M. D. Atkinson Uniform generation of rooted ordered
trees with prescribed degrees . . . . . 593--594
P. Hall Book Review . . . . . . . . . . . . . . 595--595
P. Strain-Clark Book Review . . . . . . . . . . . . . . 595--596
D. Ince Book Review . . . . . . . . . . . . . . 596--596
P. Hall Book Review . . . . . . . . . . . . . . 596--597
P. Hall Book Review . . . . . . . . . . . . . . 597--597
H. Robinson Book Review . . . . . . . . . . . . . . 597--598
M. Newton Book Review . . . . . . . . . . . . . . 598--598
M. Field Book Review . . . . . . . . . . . . . . 598--599
M. Woodman Book Review . . . . . . . . . . . . . . 599--599
D. Lyons Book Review . . . . . . . . . . . . . . 599--600
M. S. Joy Book Review . . . . . . . . . . . . . . 600--600
M. S. Joy Book Review . . . . . . . . . . . . . . 600--601
I. Craig Book Review . . . . . . . . . . . . . . 601--601
M. S. Joy Book Review . . . . . . . . . . . . . . 601--601
A. Solomon Book Review . . . . . . . . . . . . . . 602--602
M. Turega Book Review . . . . . . . . . . . . . . 602--602
P. A. S. Veloso Book Review . . . . . . . . . . . . . . 603--603
K. Dudman Book Review . . . . . . . . . . . . . . 603--604
D. Corne Book Review . . . . . . . . . . . . . . 604--605
Jukka Teuhola and
Timo Raita Application of a Finite-State Model to
Text Compression . . . . . . . . . . . . 607--614
Pasi Fränti and
Olli Nevalainen A two-stage modelling method for
compressing binary images by arithmetic
coding . . . . . . . . . . . . . . . . . 615--622
Robert R. Goldberg Finite State Automata from Regular
Expression Trees . . . . . . . . . . . . 623--630
Min Sheng Lin and
Deng Jyi Chen General reduction methods for the
reliability analysis of distributed
computing systems . . . . . . . . . . . 631--644
Tim B. Cooper and
Jeffrey H. Kingston The solution of real instances of the
timetabling problem . . . . . . . . . . 645--653
D. J. Pavey and
L. A. Winsborrow Demonstrating equivalence of source code
and PROM contents . . . . . . . . . . . 654--667
A. S. Fraenkel and
S. T. Klein Bounding the Depth of Search Trees . . . 668--678
V. Dancík Book Review . . . . . . . . . . . . . . 679--679
M. Thomas Book Review . . . . . . . . . . . . . . 679--680
A. Bowyer and
R. Martin and
J. Woodwark Correspondence . . . . . . . . . . . . . 681--681
W. M. Waite Correspondence . . . . . . . . . . . . . 681--681
Thomas Schwederski and
Rudolph Kober Special Issue Editorial: Parallel
Processing . . . . . . . . . . . . . . . 683--683
T. Schwederski and
R. Kober Editorial . . . . . . . . . . . . . . . 683--684
M. Schneider and
U. Wever and
Q. Zheng Solving large and sparse linear
equations in analog circuit simulation
on a cluster of workstations . . . . . . 685--689
D. A. Clark and
C. J. Rawlings and
J. Shirazi and
L.-L. Li and
K. Schuerman and
M. Reeve and
A. Véron Solving large combinatorial problems in
molecular biology using the ElipSys
parallel constraint logic programming
system . . . . . . . . . . . . . . . . . 690--701
U. Geuder and
M. Härdtner and
A. Reuter and
B. Wörner and
R. Zink GRIDS --- a parallel programming system
for grid-based algorithms . . . . . . . 702--711
V. B. Muchnick and
A. V. Shafarenko and
C. D. Sutton $F$-code and its Implementation: a
Portable Software Platform for Data
Parallelism . . . . . . . . . . . . . . 712--722
Neil Berrington and
David De Roure and
Julian Padget Guaranteeing unpredictability
(programming model) . . . . . . . . . . 723--733
B. Bergsten and
M. Couprie and
P. Valduriez Overview of Parallel Architectures for
Databases . . . . . . . . . . . . . . . 734--740
Hermann Hellwagner Design Considerations for Scalable
Parallel File Systems . . . . . . . . . 741--755
F. Abolhassan and
R. Drefenstedt and
J. Keller and
W. J. Paul and
D. Scheerer On the Physical Design of PRAMs . . . . 756--762
C. R. Jesshope and
C. Izu The MP1 network chip and its application
to parallel computers . . . . . . . . . 763--777
Peter Thompson Concurrent Interconnect for Parallel
Systems . . . . . . . . . . . . . . . . 778--784
Jurg Nievergelt and
Mike Freeston Special Issue Editorial: Spatial data:
applications, concepts, techniques . . . 1--2
D. A. Varley and
M. Visvalingam Road extraction and topographic data
validation using area topology . . . . . 3--15
Oliver Günther and
Johannes Lamberts Object-oriented Techniques for the
Management of Geographic and
Environmental Data . . . . . . . . . . . 16--25
Michael F. Worboys A Unified Model for Spatial and Temporal
Information . . . . . . . . . . . . . . 26--34
Peter Schorn Degeneracy in geometric computation and
the perturbation approach . . . . . . . 35--42
Christopher B. Jones and
David B. Kidner and
J. Mark Ware The implicit triangulated irregular
network and multiscale spatial databases 43--57
James Bradley A complete ${L}$-system specification
for generating an exact self-affine
growth-decay function with a random walk
scaling property . . . . . . . . . . . . 58--66
Daniel Y. Chao and
Mengchu C. Zhou and
David T. Wang Extending the knitting technique to
Petri Net synthesis of automated
manufacturing systems . . . . . . . . . 67--76
S. Arun-Kumar Book Review . . . . . . . . . . . . . . 77--77
M. Jirotka Book Review . . . . . . . . . . . . . . 77--78
M. Jirotka Book Review . . . . . . . . . . . . . . 77--78
Alan Bundy and
Hector MacQueen The New Software Copyright Law . . . . . 79--82
Ian H. Witten and
Timothy C. Bell and
Alistair Moffat and
Craig G. Nevill-Manning and
Tony C. Smith and
Harold Thimbleby Semantic and generative models for lossy
text compression . . . . . . . . . . . . 83--87
Nenad Marovac Link Associated Computation in HyperNet 88--95
Victoria Stavridou Formal Methods and VLSI Engineering
Practice . . . . . . . . . . . . . . . . 96--113
Jixin Ma and
Brian Knight A General Temporal Theory . . . . . . . 114--123
D. Bhagavathi and
C. E. Grosch and
S. Olariu A Greedy Hypercube-Labeling Algorithm 124--128
Kwok-Bun Yue and
R. T. Jacob An optimal algorithm for reducing
edge-solvable mutual exclusion graphs 129--138
Greg A. Wade and
Jiang-Hsing Chu Drawability of complete graphs using a
minimal slope set . . . . . . . . . . . 139--142
D. Murphy Book Review . . . . . . . . . . . . . . 143--144
D. Murphy Book Review . . . . . . . . . . . . . . 143--144
D. Murphy Book Review . . . . . . . . . . . . . . 143--144
J. A. Dain Book Review . . . . . . . . . . . . . . 144--144
I. Craig Book Review . . . . . . . . . . . . . . 145--145
C. Speed Book Review . . . . . . . . . . . . . . 145--146
P. E. Dunne Book Review . . . . . . . . . . . . . . 146--146
K. Kingman Book Review . . . . . . . . . . . . . . 146--146
C. Speed Book Review . . . . . . . . . . . . . . 146--147
R. Perrott Book Review . . . . . . . . . . . . . . 147--147
R. Hamilton Book Review . . . . . . . . . . . . . . 148--148
J. W. Sanders Book Review . . . . . . . . . . . . . . 148--149
R. M. McKeag Book Review . . . . . . . . . . . . . . 149--150
K. Lucas Book Review . . . . . . . . . . . . . . 150--151
S. Ramesh Book Review . . . . . . . . . . . . . . 151--151
M. Murakami Book Review . . . . . . . . . . . . . . 152--152
M. Smurthwaite Book Review . . . . . . . . . . . . . . 152--152
M. Lamming and
P. Brown and
K. Carter and
M. Eldridge and
M. Flynn and
G. Louie and
P. Robinson and
A. Sellen The Design of a Human Memory Prosthesis 153--163
Nikos A. Lorentzos and
Alexandra Poulovassilis and
Carol Small Implementation of Update Operations for
Interval Relations . . . . . . . . . . . 164--176
Doug Goldson A symbolic calculator for non-strict
functional programs . . . . . . . . . . 177--187
Kisenchand Ranai and
Koon Seng Lim and
R. H. Deng Simulating a Multimedia FDDI Backbone
Network . . . . . . . . . . . . . . . . 188--198
Yuliang Zheng and
T. Hardjono and
J. Seberry Reusing Shares in Secret Sharing Schemes 199--205
M. Hamdi and
R. W. Hall An efficient class of interconnection
networks for parallel computations . . . 206--218
Benjamin Arazi On primality testing using purely
divisionless operations . . . . . . . . 219--222
V. Danck Book Review . . . . . . . . . . . . . . 223--223
R. Ramanujam Book Review . . . . . . . . . . . . . . 223--223
I. Craig Book Review . . . . . . . . . . . . . . 224--225
K. Lodaya Book Review . . . . . . . . . . . . . . 225--226
P. Mukherjee Book Review . . . . . . . . . . . . . . 226--226
P. Mukherjee Book Review . . . . . . . . . . . . . . 226--227
M. B. M. Gibson Book Review . . . . . . . . . . . . . . 227--227
C. C. Kirkham Book Review . . . . . . . . . . . . . . 227--228
A. Larner Book Review . . . . . . . . . . . . . . 228--228
A. Larner Book Review . . . . . . . . . . . . . . 228--229
D. Anthony Book Review . . . . . . . . . . . . . . 229--229
P. Green Book Review . . . . . . . . . . . . . . 229--230
P. V. S. Rao Book Review . . . . . . . . . . . . . . 230--231
N. M. Gibbins Book Review . . . . . . . . . . . . . . 231--232
G. R. Martin Book Review . . . . . . . . . . . . . . 232--232
Sòren Christensen and
Yoram Hirshfeld and
Faron Moller Decidable Subsets of CCS . . . . . . . . 233--242
Jan A. Bergstra and
Inge Bethke and
Alban Ponse Process Algebra with Iteration and
Nesting . . . . . . . . . . . . . . . . 243--258
Wan Fokkink and
Hans Zantema Basic process algebra with iteration:
completeness of its equational axioms 259--267
S. Mauw and
M. A. Reniers An algebraic semantics of basic message
sequence charts . . . . . . . . . . . . 269--277
Henri P. Korver A Theory for Simulators . . . . . . . . 279--287
M. A. Bezem and
J. F. Groote A Correctness Proof of a One-bit Sliding
Window Protocol in $\mu$CRL . . . . . . 289--307
Pasi Fränti and
Olli Nevalainen and
Timo Kaukoranta Compression of digital images by block
truncation coding: a survey . . . . . . 308--332
Wentong Cai and
Stephen J. Turner An Approach to the Run-Time Monitoring
of Parallel Programs . . . . . . . . . . 333--345
V. Danck Book Review . . . . . . . . . . . . . . 346--346
R. Ramanujam Book Review . . . . . . . . . . . . . . 346--347
I. Craig Book Review . . . . . . . . . . . . . . 347--348
K. Lodaya Book Review . . . . . . . . . . . . . . 348--349
P. Mukherjee Book Review . . . . . . . . . . . . . . 349--349
P. Mukherjee Book Review . . . . . . . . . . . . . . 349--350
M. B. M. Gibson Book Review . . . . . . . . . . . . . . 350--350
C. C. Kirkham Book Review . . . . . . . . . . . . . . 350--351
A. Larner Book Review . . . . . . . . . . . . . . 351--351
A. Larner Book Review . . . . . . . . . . . . . . 351--352
D. Anthony Book Review . . . . . . . . . . . . . . 352--352
P. Green Book Review . . . . . . . . . . . . . . 352--353
P. V. S. Rao Book Review . . . . . . . . . . . . . . 353--354
N. M. Gibbins Book Review . . . . . . . . . . . . . . 354--355
G. R. Martin Book Review . . . . . . . . . . . . . . 355--355
Ian Sommerville and
Richard Bentley and
Tom Rodden and
Peter Sawyer Cooperative Systems Design . . . . . . . 357--366
P. A. Firby and
D. J. Stone Analysis of the structure and resolution
of a graphics device . . . . . . . . . . 367--376
Christophe Poix and
Robert Laurini A geometric reasoning tool based on a
successive improvement approach . . . . 377--384
A. N. Clark Pattern recognition of noisy sequences
of behavioural events using functional
combinators . . . . . . . . . . . . . . 385--398
Per Brinch Hansen Interference control in SuperPascal ---
a block-structured parallel language . . 399--406
M. Díaz and
E. Pimentel and
J. M. Troya DROL: a distributed and real-time
object-oriented logic environment . . . 407--421
Marie Rose Low and
Bruce Christianson Self Authenticating Proxies . . . . . . 422--428
J. P. Giddy and
R. Safavi Naini Automated Cryptanalysis of Transposition
Ciphers . . . . . . . . . . . . . . . . 429--436
Greg O'Shea On the specification, validation and
verification of security in access
control systems . . . . . . . . . . . . 437--448
Nancy G. Kinnersley and
William M. Kinnersley An efficient polynomial-time algorithm
for three-track gate matrix layout . . . 449--462
A. A. K. Majumdar A note on the iterative algorithm for
the Reve's puzzle . . . . . . . . . . . 463--464
R. E. Roger Letters: Correspondence. on the Millar
polyhedron and its use in the
construction of octrees . . . . . . . . 465--466
D. Caminer Book Review . . . . . . . . . . . . . . 467--467
S. Ramani Book Review . . . . . . . . . . . . . . 467--468
M. H. E. Larcombe Book Review . . . . . . . . . . . . . . 468--469
M. Holcombe Book Review . . . . . . . . . . . . . . 469--469
H. Brown Book Review . . . . . . . . . . . . . . 469--470
P. Mukherjee Book Review . . . . . . . . . . . . . . 470--470
B. Wichmann Book Review . . . . . . . . . . . . . . 470--471
M. Joy Book Review . . . . . . . . . . . . . . 471--471
A. Larner Book Review . . . . . . . . . . . . . . 471--472
A. H. Khan Book Review . . . . . . . . . . . . . . 472--472
Y. Merali Book Review . . . . . . . . . . . . . . 472--473
J. C. M. Baeten Special Issue Editorial Process Algebra 474--475
Vinny Cahill and
Roland Balter and
David Harper and
Neville Harris and
Xavier Rousset De Pina and
Pedro Sousa The Comandos Distributed Application
Platform . . . . . . . . . . . . . . . . 477--486
Paul Taylor and
Vinny Cahill and
Michael Mock Combining object-oriented systems and
open transaction processing . . . . . . 487--498
Brendan Tangney and
Andrew Condon and
Vinny Cahill and
Neville Harris Requirements for parallel programming in
object-oriented distributed systems . . 499--508
Gerrit Kerber and
Helmut Meitner and
Friedemann Reim The Comandos toolset for distributed
systems management . . . . . . . . . . . 509--518
Roland Balter and
Serge Lacourte and
Michel Riveill The Guide Language . . . . . . . . . . . 519--530
Pedro Sousa and
André Zúquete and
Nuno Neves and
José Alves Marques Orthogonal persistence in a
heterogeneous distributed
object-oriented environment . . . . . . 531--541
David C. Dyer Simulation in the Design of Electronic
Systems . . . . . . . . . . . . . . . . 542b-543
R. Sobczak Fddi: a High Speed Network . . . . . . . 542a-542
R. Sobczak Token Ring Networks . . . . . . . . . . 542--542
Simon Clippingdale Practical Computer Vision Using C . . . 543--544
Antoni Diller Object-oriented Specification Case
Studies . . . . . . . . . . . . . . . . 544a-545
Gerry Wolff Data Abstraction, the Object-Oriented
Approach Using C++ . . . . . . . . . . . 544--544
Frank Bott Software Systems Construction with
Examples in Ada . . . . . . . . . . . . 545--546
A. Philippou The Art of Parallel Programming &
Parallel Programming, an Introduction 546--547
Adrian Larner Software Assistance for Business
Re-Engineering . . . . . . . . . . . . . 547--547
D. A. Randell Inductive Logic Programming . . . . . . 547a-548
Mike Joy The Joy of X . . . . . . . . . . . . . . 548a-549
V. Raghunathan Prototyping-oriented Software Developmen 548--548
Mike Joy Introduction to the X Window System . . 549--549
S. P. Mudur Visual and Technical Aspects of Type . . 549a-550
Mathai Joseph The Visual Display of Quantitative
Information & Envisioning Information . . 551--552
Roy L. Crole Computation and Reasoning . . . . . . . 552a-553
Mike Joy Book Review: \booktitleAdvanced Motif
Programming Technique . . . . . . . . . 552--552
Norman Fenton Derivation and Validation of Software
Metri . . . . . . . . . . . . . . . . . 553a-554
Michael Luck Artificial Intelligence . . . . . . . . 553--553
Adrian Larner C for Corporate Programmers . . . . . . 554--554
Adrian Larner Designing Usable Electronic Text . . . . 554a-555
Adrian Larner Introducing Specification Using . . . . 555--555
Ian Parberry Lectures on Parallel Computation . . . . 556a-557
K. Tindell Programming Real-Time Multicomputers for
Signal Processing . . . . . . . . . . . 556--556
Iain Craig Constraint Logic Programming: Selected
Research & Constraint-Based Reasoning . . 557a-559
S. Rumsby The Evolution of C++ . . . . . . . . . . 557--557
Alistair Kilgour Correspondence . . . . . . . . . . . . . 560--560
J. A. Bakker A semantic approach to enforce
correctness of data distribution schemes 561--575
Mostafa A. Bassiouni and
Amar Mukherjee and
Mark J. Llewellyn Design and implementation of extended
Boolean and comparison operators for
time-oriented query languages . . . . . 576--587
Brian Knight and
Jixin Ma A temporal database model supporting
relative and absolute time . . . . . . . 588--597
B. J. Oommen and
D. T. H. Ng A New Technique for Enhancing
Linked-List Data Retrieval: Reorganize
Data Using Artificially Synthesized
Queries . . . . . . . . . . . . . . . . 598--609
Lanfranco Lopriore Stack Cache Memory for Block-Structured
Programs . . . . . . . . . . . . . . . . 610--620
Noureddine Belkhatir and
Walcelio L. Melo Supporting software development
processes in Adele 2 . . . . . . . . . . 621--628
I. McFarlane and
S. G. Hoggar Optimal Drivers for the `Random'
Iteration Algorithm . . . . . . . . . . 629--640
Joseph L. Ganley and
Lenwood S. Heath Optimal and Random Partitions of Random
Graphs . . . . . . . . . . . . . . . . . 641--643
D. J. Cooke Book Review . . . . . . . . . . . . . . 644--644
A. P. Luff Book Review . . . . . . . . . . . . . . 644--645
T. W. Routen Book Review . . . . . . . . . . . . . . 645--646
A. Larner Book Review . . . . . . . . . . . . . . 646--646
H. P. Haughton Book Review . . . . . . . . . . . . . . 646--647
S. Arun-Kumar Book Review . . . . . . . . . . . . . . 647--647
S. B. Jones Book Review . . . . . . . . . . . . . . 647--648
A. M. Day Book Review . . . . . . . . . . . . . . 649--649
R. Hamilton Book Review . . . . . . . . . . . . . . 649--650
M. Bezem and
J. F. Groote Corrigendum to a Correctness Proof of a
One-bit Sliding Window Protocol in
$\mu$CRL . . . . . . . . . . . . . . . . 651--651
Steve Benford and
John Bowers and
Lennart E. Fahlén and
John Mariani and
Tom Rodden Supporting Cooperative Work in Virtual
Environments . . . . . . . . . . . . . . 653--668
Danny C. C. Poo and
Shwu-Yi Lee An object-oriented systems modelling
method based on the Jackson approach . . 669--682
Helen E. Thomson and
Pam Mayhew The Software Process: a Perspective on
Improvement . . . . . . . . . . . . . . 683--690
K. Tindell and
A. Burns Fixed priority scheduling of hard
real-time multi-media disk traffic . . . 691--697
Chung-Ming Huang and
Jenq-Muh Hsu An Incremental Protocol Verification
Method . . . . . . . . . . . . . . . . . 698--710
W. Ken Jackson and
F. Warren Burton A definite and unfoldable, partially
deterministic language . . . . . . . . . 711--714
Jiang-Hsing Chu and
Gary D. Knott An Analysis of Spiral Hashing . . . . . 715--719
S. Matthews Book Review . . . . . . . . . . . . . . 720--720
F. K. Hanna Book Review . . . . . . . . . . . . . . 720--721
C. Brown Book Review . . . . . . . . . . . . . . 721--722
P. Mukherjee Book Review . . . . . . . . . . . . . . 722--722
G. Hayes Book Review . . . . . . . . . . . . . . 722--723
J. Shawe-Taylor Book Review . . . . . . . . . . . . . . 723--725
C. Czarnecki Book Review . . . . . . . . . . . . . . 725--725
K. V. Nori Book Review . . . . . . . . . . . . . . 725--726
J. Jones Book Review . . . . . . . . . . . . . . 726--727
S. J. Mullender Book Review . . . . . . . . . . . . . . 727--727
R. Stroud Book Review . . . . . . . . . . . . . . 727--728
R. Stroud Book Review . . . . . . . . . . . . . . 728--730
C. Czarnecki Book Review . . . . . . . . . . . . . . 730--730
M. Joy Book Review . . . . . . . . . . . . . . 730--731
A. Gupta Book Review . . . . . . . . . . . . . . 731--731
R. C. Johnson Book Review . . . . . . . . . . . . . . 731--731
J. Vytopil Book Review . . . . . . . . . . . . . . 732--732
P. V. S. Rao Book Review . . . . . . . . . . . . . . 732--734
R. A. Sharman Speech recognition in the office: how
the technology supports dictation . . . 735--744
Anonymous Editorial Note . . . . . . . . . . . . . 744--744
Graham A. Stephen and
Paul Mather What is SP? (theory of computing) . . . 745--752
Sunil Vadera and
Farid Meziane From English to Formal Specifications 753--763
Kamyar Jambor-Sadeghi and
Mohammad A. Ketabchi and
Junjie Chue and
M. Ghiassi A Systematic Approach to Corrective
Maintenance . . . . . . . . . . . . . . 764--778
Ying Hao and
Jyh-Charn S. Liu and
Junguk L. Kim An All-sharing Load-balancing Scheme on
the CSMA/CD Network and its Analysis . . 779--794
M. P. Ward Reverse engineering through formal
transformation: Knuth's ``Polynomial
Addition'' algorithm . . . . . . . . . . 795--813
P. B. Ladkin and
S. Leue Correspondence: Comments on a Proposed
Semantics for Basic Message Sequence
Charts . . . . . . . . . . . . . . . . . 814--817
S. Vickers Book Review . . . . . . . . . . . . . . 818--818
M. Fox Book Review . . . . . . . . . . . . . . 818--821
M. K. Srivas Book Review . . . . . . . . . . . . . . 821--823
R. Sobczak Book Review . . . . . . . . . . . . . . 823--824
A. Larner Book Review . . . . . . . . . . . . . . 824--825
A. Larner Book Review . . . . . . . . . . . . . . 825--825
M. Joy Book Review . . . . . . . . . . . . . . 825--826
M. Joy Book Review . . . . . . . . . . . . . . 826--826
K. M. Lucas Book Review . . . . . . . . . . . . . . 826--827
J. W. Patterson and
P. J. Willis Computer Assisted Animation: $2$D or not
$2$D? . . . . . . . . . . . . . . . . . 829--839
C.-H. Lai Diakoptics, domain decomposition and
parallel computing . . . . . . . . . . . 840--846
J. Ma and
B. Knight and
M. Petridis A revised theory of action and time
based on intervals and points . . . . . 847--857
D. K. C. Chan and
P. W. Trinder and
R. C. Welland Evaluating Object-Oriented Query
Languages . . . . . . . . . . . . . . . 858--872
Sridhar Seshadri and
Doron Rotem and
Arie Segev Optimal arrangements of cartridges in
carousel type mass storage systems . . . 873--887
G. Berrisford and
M. Burrows Reconciling OO with Turing machines . . 888--906
Ferruccio Barsi and
M. Cristina Pinotti Time optimal mixed radix conversion for
residue number applications . . . . . . 907--916
Ron Morrison and
Richard C. H. Connor and
Quintin I. Cutts and
Vivienne S. Dunstan and
Graham N. C. Kirby Exploiting persistent linkage in
software engineering environments . . . 1--16
R. J. Wieringa Combining static and dynamic modelling
methods: a comparison of four methods 17--30
D. R. Sutton and
P. J. H. King Incomplete Information and the
Functional Data Model . . . . . . . . . 31--42
Charles L. A. Clarke and
G. V. Cormack and
F. J. Burkowski An algebra for structured text search
and a framework for its implementation 43--56
John G. Vaughan A Hierarchical Protocol for
Decentralising Information Dissemination
in Distributed Systems . . . . . . . . . 57--70
R. F. Browne The embedding of meshes and trees into
degree four chordal ring networks . . . 71--77
Mike Joy Lambda Calculi: a Guide for Computer
Scientists . . . . . . . . . . . . . . . 78a-79
J. C. Shepherdson From Logic to Logic Programming . . . . 78--78
Alan Mycroft Object-Oriented Type Systems . . . . . . 79a-80
S. Sanyal Computer Arithmetic Systems . . . . . . 79--79
J. W. Sanders The Construction of Formal
Specifications . . . . . . . . . . . . . 80--81
D. K. G. Campbell Parallel Evolution of Parallel
Processors . . . . . . . . . . . . . . . 81--81
Michael Ashton Analysing Systems . . . . . . . . . . . 82--82
Michael Ashton Software Quality Assurance --- a
practical approach . . . . . . . . . . . 82a-83
M. Sasikumar Exploring Interior Point Linear
Programming: Algorithms and Software . . 83--84
R. Wilson Spatial Vision in Humans and Robots . . 84--84
P. K. Ghosh and
S. P. Mudur Three-Dimensional Computer Vision: a
Geometric Viewpoint . . . . . . . . . . 85--86
Paul C. Rhodes Essentials of Fuzzy Modelling and
Control . . . . . . . . . . . . . . . . 86--87
Simon Bennett Innovations in GIS 1 . . . . . . . . . . 87a-88
P. P. Gupta A New Era in Computation . . . . . . . . 87--87
T. F. Melham Special Issue Editorial: Higher Order
Logic Theorem Proving and its
Applications . . . . . . . . . . . . . . 89--90
Paul Curzon Tracking design changes with formal
machine-checked proof . . . . . . . . . 91--100
Mats Larsson An engineering approach to formal
digital system design . . . . . . . . . 101--110
Sofi\`ene Tahar and
Ramayya Kumar Formal specification and verification
techniques for RISC pipeline conflicts 111--120
Sten Agerholm LCF Examples in HOL . . . . . . . . . . 121--130
Peter V. Homeier and
David F. Martin A mechanically verified verification
condition generator . . . . . . . . . . 131--141
Elsa Gunter and
Savi Maharaj Studying the ML Module System in HOL . . 142--151
Ching-Tsun Chou Mechanical verification of distributed
algorithms in higher-order logic . . . . 152--161
John Harrison Binary Decision Diagrams as a HOL
Derived Rule . . . . . . . . . . . . . . 162--170
J. von Wright Representing Higher-Order Logic Proofs
in HOL . . . . . . . . . . . . . . . . . 171--179
Mark Evered and
Axel Schmolitzky and
Michael Kölling A flexible object invocation language
based on object-oriented language
definition . . . . . . . . . . . . . . . 181--192
Linda B. Sherrell and
Doris L. Carver FunZ: An Intermediate Specification
Language . . . . . . . . . . . . . . . . 193--206
M. J. Kumar and
S. Venkatesh and
D. Kieronska and
L. M. Patnaik Hierarchical directory-based shared
memory architecture . . . . . . . . . . 207--216
Hong Shen Efficient Parallel $k$-Set Chain
Range-Join in Hypercubes . . . . . . . . 217--226
V. Kapelios and
G. Panagopoulou and
G. Papamichail and
S. Sirmakessis and
A. Tsakalidis The `Cross' Rectangle Intersection
Problem . . . . . . . . . . . . . . . . 227--235
Imtiaz Ahmad and
Muhammad K. Dhodhi On the $m$-Way Graph Partitioning
Problem . . . . . . . . . . . . . . . . 237--244
Ing-Ray Ray Chen A Degradable B$^{\rm link}$-Tree with
Periodic Data Reorganization . . . . . . 245--252
J. Gerard Wolff `What is Sp?': a Reply . . . . . . . . . 253--256
Anonymous Letters . . . . . . . . . . . . . . . . 257--258
Konstantinos Georgatos Logic and Information Flow . . . . . . . 259--260
D. Peled Temporal Logic: Mathematical Foundations
and Computational Aspects, Volume 1 . . 260--261
S. Ramesh A Programming Approach to Formal Methods 261--262
David A. Watt The Structure of Typed Programming
Languages . . . . . . . . . . . . . . . 262--263
M. F. Bott Programming and Problem Solving with Ada 263--263
Mike Joy Programming with C: an Introduction . . 263a-264
Adrian Larner Software Quality . . . . . . . . . . . . 264--264
Rajesh K. Mansharamani Parallel Computing Using the Prefix
Problem . . . . . . . . . . . . . . . . 264a-265
Colin Isaac User Interface Design & User Interface
Evaluation . . . . . . . . . . . . . . . 265b-265
P. Jalote Book Reviews . . . . . . . . . . . . . . 265--265
P. Jalote Introduction to Distributed Algorithms 265a-265
J. Rosbottom The Muse Method for Usability
Engineering . . . . . . . . . . . . . . 266--267
Leela Damodaran Studio-Structured User-interface Design
for Interaction Optimisation . . . . . . 267--268
K. M. Lucas Building Applications with Pexlib . . . 268--268
Tim Watson Rules of Encounter . . . . . . . . . . . 268a-269
Claire Speed It's Alive! . . . . . . . . . . . . . . 269--269
Saurav Chatterjee and
Jay Strosnider Distributed pipeline scheduling: a
framework for distributed, heterogeneous
real-time system design . . . . . . . . 271--285
Scott Dawson and
Farnam Jahanian Probing and fault injection of
dependable distributed protocols . . . . 286--300
Wolfgang A. Halang and
Bernd Krämer and
Leszek Trybus Exploiting a graphical programming
paradigm to facilitate rigorous
verification of embedded software . . . 301--309
Benjamin Macias and
Stephen G. Pulman A method for controlling the production
of specifications in natural language 310--318
Alexander D. Stoyenko and
Thomas J. Marlowe and
Mohamed F. Younis A Language for Complex Real-Time Systems 319--338
Andrew Turpin and
Alistair Moffat Practical Length-limited Coding for
Large Alphabets . . . . . . . . . . . . 339--347
Ing-Ray Chen and
I.-Ling Yen Analysis of probabilistic error checking
procedures on storage systems . . . . . 348--354
Hu Jun Wang and
Yuan-Da Jiang and
Hui-Zhong Wu Performance analysis of cluster-based
PPMB multiprocessor systems . . . . . . 355--364
A. Shafarenko Symmetries in Data Parallelism . . . . . 365--380
S. M. Eker Associative-Commutative Matching Via
Bipartite Graph Matching . . . . . . . . 381--399
M. Campbell-Kelly ICL and the Evolution of the British
Mainframe . . . . . . . . . . . . . . . 400--412
Stella Mills To live or drown: when information
systems become critical . . . . . . . . 413--417
Harold Thimbleby A New Calculator and Why it is Necessary 418--433
Ing-Ray Chen On applying imprecise computation to
real-time AI systems . . . . . . . . . . 434--442
Gavin Lowe Scheduling-Oriented Models for Real-Time
Systems . . . . . . . . . . . . . . . . 443--456
Ruey-Liang Ma and
Chung-Ping Chung Periodic adaptive branch prediction and
its application in superscalar
processing in Prolog . . . . . . . . . . 457--470
C. H. C. Leung and
E. Currie The effect of failures on the
performance of long-duration database
transactions . . . . . . . . . . . . . . 471--478
Panayiotis Bozanis and
Christos Makris and
Athanasios Tsakalidis Parametric Weighted Filter: an Efficient
Dynamic Manipulation of Signature Files 479--488
Stephen Gilmore and
Jane Hillston Process Algebras and Their Application
to Performance Modelling: Proceedings of
the Third Workshop on Process Algebra
and Performance Modelling . . . . . . . 489--491
Marco Bernardo and
Nadia Busi and
Roberto Gorrieri A distributed semantics for EMPA based
on stochastic contextual nets . . . . . 492--509
Peter Harrison and
Jane Hillston Exploiting quasi-reversible structures
in Markovian process algebra models . . 510--520
Boudewijn R. Haverkort In search of probability mass:
probabilistic evaluation of high-level
specified Markov models . . . . . . . . 521--529
Holger Hermanns and
Michael Rettelbach and
Thorsten Weiss Formal characterisation of immediate
actions in SPA with nondeterministic
branching . . . . . . . . . . . . . . . 530--541
D. R. W. Holton A PEPA specification of an industrial
production cell . . . . . . . . . . . . 542--551
Ed Brinksma and
Joost-Pieter Katoen and
Rom Langerak and
Diego Latella A Stochastic Causality-Based Process
Algebra . . . . . . . . . . . . . . . . 552--565
Jane Hillston and
Vassilis Mertsiotakis A simple time scale decomposition
technique for stochastic process
algebras . . . . . . . . . . . . . . . . 566--577
Corrado Priami Stochastic $\pi$-calculus . . . . . . . 578--589
Michael Rettelbach Probabilistic branching in Markovian
process algebras . . . . . . . . . . . . 590--599
Marina Ribaudo On the aggregation techniques in
stochastic Petri nets and stochastic
process algebras . . . . . . . . . . . . 600--611
Isabel Rojas Compositional Construction of SWN models 612--621
Matteo Sereno Towards a product form solution for
stochastic process algebras . . . . . . 622--632
Michael Reiter and
Li Gong Securing Causal Relationships in
Distributed Systems . . . . . . . . . . 633--642
Jian-Yun Nie and
Martin Brisebois and
Françoise Lepage Information Retrieval as Counterfactual 643--657
Kang Zhang and
Gaurav Marwaha Visputer --- a graphical visualization
tool for parallel programming . . . . . 658--669
Peter Kirstein and
Goli Montasser-Kohsari The C-ODA Project: Experiences and Tools 670--680
Antonios Symvonis Optimal Stable Merging . . . . . . . . . 681--690
C. H. A. Koster and
Th. P. Van Der Weide Hairy Search Trees . . . . . . . . . . . 691--694
Simon W. Moore and
Brian T. Graham Tagged Up/Down Sorter --- A Hardware
Priority Queue . . . . . . . . . . . . . 695--703
Kam-Yiu Lam and
Sheung-Lun Hung Concurrency Control for Time-constrained
Transactions in Distributed Databases
Systems . . . . . . . . . . . . . . . . 704--716
Ing-Ray Chen Stochastic Petri net analysis of
deadlock detection algorithms in
transaction database systems with
dynamic locking . . . . . . . . . . . . 717--733
Weidong He and
Chaochen Zhou A Case Study of Optimization . . . . . . 734--746
A. Davie Book Review . . . . . . . . . . . . . . 747--747
P. E. Dunne Book Review . . . . . . . . . . . . . . 747--747
V. Kulkarni Book Review . . . . . . . . . . . . . . 747--748
K. Lucas Book Review . . . . . . . . . . . . . . 748--748
M. Luck Book Review . . . . . . . . . . . . . . 748--749
S. Arun-Kumar Book Review . . . . . . . . . . . . . . 749--750
U. Zwick Book Review . . . . . . . . . . . . . . 750--750
A. Diller Book Review . . . . . . . . . . . . . . 750--751
K. V. Nori Book Review . . . . . . . . . . . . . . 751--752
T. M. Vijayaraman Book Review . . . . . . . . . . . . . . 753--753
T. M. Vijayaraman Book Review . . . . . . . . . . . . . . 753--754
R. N. Ibbett and
P. E. Heywood and
F. W. Howell HASE: a Flexible Toolset for Computer
Architects . . . . . . . . . . . . . . . 755--764
Stephen P. Wilson and
John A. McDermid Integrated analysis of complex safety
critical systems . . . . . . . . . . . . 765--776
Antonio Ruiz-Delgado and
David Pitt and
Colin Smythe A review of object-oriented approaches
in formal methods . . . . . . . . . . . 777--784
Gavin Lowe and
Hussein Zedan Refinement of Complex Systems: a Case
Study . . . . . . . . . . . . . . . . . 785--800
Ville Leppänen Performance of work-optimal PRAM
simulation algorithms on coated meshes 801--810
Ken Deighton Average time to travel on two-headed,
non-linear discs . . . . . . . . . . . . 811--817
Jingsen Chen An efficient construction algorithm for
a class of implicit double-ended
priority queues . . . . . . . . . . . . 818--821
Frank P. Verdon and
Mike Wells Computing in British universities: the
Computer Board 1966--1991 . . . . . . . 822--830
A. Makur Book Review . . . . . . . . . . . . . . 831--831
C. L. Hankin Book Review . . . . . . . . . . . . . . 831--832
K. V. Nori Book Review . . . . . . . . . . . . . . 832--833
P. Naur Book Review . . . . . . . . . . . . . . 833--834
M. J. Jamieson Book Review . . . . . . . . . . . . . . 834--835
M. J. Jamieson Book Review . . . . . . . . . . . . . . 835--836
A. Larner Book Review . . . . . . . . . . . . . . 836--836
A. Larner Book Review . . . . . . . . . . . . . . 836--837
S. A. Schneider Book Review . . . . . . . . . . . . . . 837--838
David Jeff Jackson and
Wagdy Mahmoud Parallel pipelined fractal image
compression using quadtree recomposition 1--13
Qian-Ping Gu and
Shietung Peng An efficient algorithm for node-to-node
routing in hypercubes with faulty
clusters . . . . . . . . . . . . . . . . 14--19
Vincenzo Loia and
Michel Quaggetto The OPLA system: designing complex
systems in an object-oriented logic
programming framework . . . . . . . . . 20--35
Chandran N. Sekharan and
John G. Del Greco and
Sailesh Rathi Space-time trade-offs in the relative
unranking of binary trees . . . . . . . 36--44
T. S. Narayanan A Class of Semi-$X$ Tree-Based
Dictionary Machines . . . . . . . . . . 45--51
Egon. Börger and
Igor \Dbarur\dbaranovic Correctness of compiling Occam to
transputer code . . . . . . . . . . . . 52--92
A. R. Forrest Book Review . . . . . . . . . . . . . . 93--93
C. Johnson Book Review . . . . . . . . . . . . . . 93--93
T. Watson Book Review . . . . . . . . . . . . . . 93--94
C. A. Czarnecki Book Review . . . . . . . . . . . . . . 94--94
M. Mannion Book Review . . . . . . . . . . . . . . 95--95
S. Rogerson Book Review . . . . . . . . . . . . . . 95--96
Linda C. van der Gaag Bayesian Belief Networks: Odds and Ends 97--113
Mark Levene Maintaining Consistency of Imprecise
Relations . . . . . . . . . . . . . . . 114--123
Hossein Saiedian and
Thomas Spencer An efficient algorithm to compute the
candidate keys of a relational database
schema . . . . . . . . . . . . . . . . . 124--132
Evangelos Kranakis and
Danny Krizanc and
S. S. Ravi On Multi-Label Linear Interval Routing
Schemes . . . . . . . . . . . . . . . . 133--139
Yi Pan and
Mounir Hamdi and
Gurdip Singh Selection on $k$-Dimensional Meshes with
Multiple Broadcasting . . . . . . . . . 140--144
Stephen Fitzpatrick and
M. Clint and
T. J. Harmer and
P. Kilpatrick The tailoring of abstract functional
specifications of numerical algorithms
for sparse data structures through
automated program derivation and
transformation . . . . . . . . . . . . . 145--168
I. Harvey Book Review . . . . . . . . . . . . . . 169--169
J. Malard Book Review . . . . . . . . . . . . . . 169--170
S. Rogerson Book Review . . . . . . . . . . . . . . 170--170
A. C. Kilgour Book Review . . . . . . . . . . . . . . 170--171
C. Stirling Book Review . . . . . . . . . . . . . . 171--172
Carlo Meghini Logical Image Modelling and Retrieval 173--183
Si Pan and
R. Geoff Dromey Re-engineering Loops . . . . . . . . . . 184--202
Si Pan and
R. Geoff Dromey A Formal Basis For Removing goto
Statements . . . . . . . . . . . . . . . 203--214
A. H. M. Ter Hofstede and
E. Lippe and
P. J. M. Frederiks Conceptual data modelling from a
categorical perspective . . . . . . . . 215--231
M. Ould-Khaoua and
L. M. MacKenzie and
R. Sotudeh Comparative evaluation of hypermesh and
multi-stage interconnection networks . . 232--240
Behrooz Parhami Extreme-value search and general
selection algorithms for fully parallel
associative memories . . . . . . . . . . 241--250
A. Cawsey Book Review . . . . . . . . . . . . . . 251--251
F. Culwin Book Review . . . . . . . . . . . . . . 251--252
M. Joseph Book Review . . . . . . . . . . . . . . 252--252
P. Willett Book Review . . . . . . . . . . . . . . 253--253
A. Larner Book Review . . . . . . . . . . . . . . 253--254
A. H. M. Ter Hofstede and
H. A. Proper and
Th. P. van der Weide Query formulation as an information
retrieval problem . . . . . . . . . . . 255--274
Anthony N. Godwin Building a semantic description for a
data modelling language . . . . . . . . 275--290
Jim Grundy Transformational Hierarchical Reasoning 291--302
Howard Barringer and
Graham Gough and
Brian Monahan and
Alan Williams A process algebra foundation for
reasoning about Core ELLA . . . . . . . 303--324
R. M. Hierons Extending Test Sequence Overlap by
Invertibility . . . . . . . . . . . . . 325--330
Haifeng Qian and
Jie Wu Enhanced Fibonacci Cubes . . . . . . . . 331--345
Hu-Jun Wang and
Jian Li Bandwidth Analysis for A Class of
Bus-Based Systems . . . . . . . . . . . 346--352
T. D. Gedeon The Cyclic Towers of Hanoi: an iterative
solution produced by transformation . . 353--356
C. Johnson Book Review . . . . . . . . . . . . . . 357--357
K. Kedem Book Review . . . . . . . . . . . . . . 357--358
F. Crestani Book Review . . . . . . . . . . . . . . 358--358
A. Larner Book Review . . . . . . . . . . . . . . 358--359
E. J. Briscoe Book Review . . . . . . . . . . . . . . 359--360
A. J. Wellings and
A. Burns Programming Replicated Systems in Ada 95 361--373
Yasemin Turkan and
Özgür Ulusoy An efficient memory management algorithm
for client-server database management
systems . . . . . . . . . . . . . . . . 374--385
J. P. Geschiere and
W. H. F. J. Körver A practical development process for
parallel large-scale applications and
its underlying formal framework . . . . 386--407
Maarten Fokkinga Expressions That Talk About Themselves 408--412
Tadao Takaoka A left-to-right preprocessing
computation for the Boyer--Moore string
matching algorithm . . . . . . . . . . . 413--416
Wen-Jing Hsu and
Moon Jung Chung and
Zejun Hu Gaussian Networks For Scalable
Distributed Systems . . . . . . . . . . 417--426
Lucas Chi Kwong Hui and
Charles U. Martel Randomized competitive algorithms for
successful and unsuccessful search . . . 427--438
Nectarios Koziris and
George Papakonstantinou and
Panayotis Tsanakas Optimal time and efficient space free
scheduling for nested loops . . . . . . 439--448
P. Curzon Book Review . . . . . . . . . . . . . . 449--449
A. Larner Book Review . . . . . . . . . . . . . . 449--452
A. Larner Book Review . . . . . . . . . . . . . . 449--452
R. Anderson Book Review . . . . . . . . . . . . . . 452--453
John A. Mariani and
Tom Rodden Cooperative information sharing:
developing a shared object service . . . 455--470
D. B. Skillicorn Using distributed hypermedia for
collaborative learning in universities 471--482
Jonathan M. Nash and
Peter M. Dew and
Martin E. Dyer A scalable shared queue on a distributed
memory machine . . . . . . . . . . . . . 483--495
Oliver E. Theel and
Brett D. Fleisch The boundary-restricted coherence
protocol for scalable and highly
available distributed shared memory
systems . . . . . . . . . . . . . . . . 496--510
Chung-Ming Huang and
Ye-In Chang and
Duen-Tay Huang Reverse protocol verification: concept,
algorithm and application . . . . . . . 511--524
Yen-Min Huang and
Chinya V. Ravishankar URPC: a toolkit for prototyping remote
procedure calls . . . . . . . . . . . . 525--540
Panayiotis Bozanis and
Nectarios Kitsios and
Christos Makris and
Athanasios Tsakalidis Red--Blue Intersection Reporting for
Objects of Non-Constant Size . . . . . . 541--546
Bohdan S. Majewski and
Nicholas C. Wormald and
George Havas and
Zbigniew J. Czech A Family of Perfect Hashing Methods . . 547--554
C. B. Jones Book Review . . . . . . . . . . . . . . 555--555
A. Simpson Book Review . . . . . . . . . . . . . . 556--556
D. K. G. Campbell Book Review . . . . . . . . . . . . . . 556--557
R. P. W. Duin Book Review . . . . . . . . . . . . . . 557--558
R. P. W. Duin Book Review . . . . . . . . . . . . . . 557--558
U. Martin Book Review . . . . . . . . . . . . . . 558--559
H. Evans Book Review . . . . . . . . . . . . . . 559--559
K. Kedem Erratum . . . . . . . . . . . . . . . . 560--560
John M. Taylor, OBE, F. Eng. Special Feature: Forward with Foresight 561--565
Cristina Cifuentes and
Anne Fitzgerald Australian recommendations on computer
software protection . . . . . . . . . . 566--576
Jukka Paakki and
Airi Salminen and
Jussi Koskinen Automated Hypertext Support for Software
Maintenance . . . . . . . . . . . . . . 577--597
M. P. Ward Program Analysis by Formal
Transformation . . . . . . . . . . . . . 598--618
Tsong Yueh Chen and
Yuen Tak Yu Constraints for Safe Partition Testing
Strategies . . . . . . . . . . . . . . . 619--625
Qian-Ping Gu and
Shietung Peng Optimal algorithms for node-to-node
fault tolerant routing in hypercubes . . 626--629
Jon Agar History of Computing Feature: The
provision of digital computers to
British universities up to the Flowers
Report (1966) . . . . . . . . . . . . . 630--642
S. Gilmore Book Review . . . . . . . . . . . . . . 643--643
C. Johnson Book Review . . . . . . . . . . . . . . 643--643
T. Watson Book Review . . . . . . . . . . . . . . 644--644
D. K. G. Campbell Book Review . . . . . . . . . . . . . . 644--645
A. Larner Book Review . . . . . . . . . . . . . . 645--646
D. England Book Review . . . . . . . . . . . . . . 646--646
Anonymous Book Reviews . . . . . . . . . . . . . . ??
A. Puliafito and
S. Riccobene and
M. Scarpa Evaluation of Performability Parameters
in Client-Server Environments . . . . . 647--662
Goran Lj. Djordjevi\'c and
Milorad B. To\vsi\'c A Compile-Time Scheduling Heuristic for
Multiprocessor Architectures . . . . . . 663--674
Joan M. Morrissey and
W. T. Bealor Minimizing Data Transfers in Distributed
Query Processing: a Comparative Study
and Evaluation . . . . . . . . . . . . . 675--687
Xindong Wu A Bayesian Discretizer for Real-Valued
Attributes . . . . . . . . . . . . . . . 688--691
Behrooz Parhami Parallel Threshold Voting . . . . . . . 692--700
Emil Sekerinski and
Kaisa Sere A Theory of Prioritizing Composition . . 701--712
Shietung Peng and
Stanislav Sedukhin Array Processors Design for
Division-free Linear System Solving . . 713--722
A. Larner Book Review . . . . . . . . . . . . . . 723--723
D. K. G. Campbell Book Review . . . . . . . . . . . . . . 723--724
Anonymous Book reviews . . . . . . . . . . . . . . 723--730
S. J. J. Kent Book Review . . . . . . . . . . . . . . 724--724
T. Watson Book Review . . . . . . . . . . . . . . 724--725
D. A. Watt Book Review . . . . . . . . . . . . . . 725--725
D. K. G. Campbell Book Review . . . . . . . . . . . . . . 726--726
A. Larner Book Review . . . . . . . . . . . . . . 726--727
A. G. Hamilton Book Review . . . . . . . . . . . . . . 727--728
F. Sebastiani Book Review . . . . . . . . . . . . . . 728--728
F. Crestani Book Review . . . . . . . . . . . . . . 728--729
J. L. DePaul and
T. T. Hewett Book Review . . . . . . . . . . . . . . 729--730
P. M. Fenwick The Burrows--Wheeler Transform for block
sorting text compression: principles and
improvements . . . . . . . . . . . . . . 731--740
K. L. Verco and
M. J. Wise Plagiarism \`a la mode: a Comparison of
Automated Systems for Detecting
Suspected Plagiarism . . . . . . . . . . 741--750
M. Visvalingam and
D. Varley and
C. Wright A Cognitive Approach to Road Recognition
with Novel Feature Indicators . . . . . 751--756
Ing-Ray Chen and
Chi-Ming Chen Threshold-based Admission Control
Policies for Multimedia Servers . . . . 757--766
I.-R. Chen and
D.-C. Wang Analysis of Replicated Data with Repair
Dependency . . . . . . . . . . . . . . . 767--779
J. Tubella and
A. González and
Eduard Elias The Multipath Architecture for Prolog
Programs . . . . . . . . . . . . . . . . 780--792
P. van Bommel and
P. J. M. Frederiks and
Th. P. van der Weide Object-Oriented Modelling based on
Logbooks . . . . . . . . . . . . . . . . 793--799
Jixin Ma and
Brian Knight A Reified Temporal Logic . . . . . . . . 800--807
G. M. Seed and
D. E. R. Clark and
J. R. Corney and
R. Tuttle and
G. Little Object-Oriented Graph-Based Geometric
Feature Recognition . . . . . . . . . . 808--811
A. Lunzer Book Review . . . . . . . . . . . . . . 812--813
M. D. Dunlop Book Review . . . . . . . . . . . . . . 813--813
K. Hammond Book Review . . . . . . . . . . . . . . 813--815
K. Hammond Book Review . . . . . . . . . . . . . . 813--815
K. Hammond Book Review . . . . . . . . . . . . . . 813--815
M. Joy Book Review . . . . . . . . . . . . . . 815--815
P. Wright and
A. Dearden Book Review . . . . . . . . . . . . . . 815--816
S. Aitken Book Review . . . . . . . . . . . . . . 816--816
T. Ashworth Book Review . . . . . . . . . . . . . . 816--817
M. Joy Book Review . . . . . . . . . . . . . . 817--817
R. Ingram and
S. Benford The Application of Legibility Techniques
to Enhance Information Visualizations 819--836
C. Du An Interpolation Method for Grid-based
Terrain Modelling . . . . . . . . . . . 837--843
N. Zhang and
Q. Shi Achieving Non-repudiation of Receipt . . 844--853
A. B. McDonald and
T. Znati ARP versus ES-IS: Performance Evaluation
of Neighbour-Greeting Protocols . . . . 854--867
J. J. Sarbo Building Sub-knowledge Bases Using
Concept Lattices . . . . . . . . . . . . 868--875
M. Díaz and
B. Rubio and
J. M. Troya Distributed Programming with a Logic
Channel Based Coordination Model . . . . 876--889
M. R. Williams Book Review . . . . . . . . . . . . . . 890--891
S. Mills Book Review . . . . . . . . . . . . . . 891--891
M. Joy Book Review . . . . . . . . . . . . . . 891--892
R. Cardell-Oliver Book Review . . . . . . . . . . . . . . 892--892
D. K. G. Campbell Book Review . . . . . . . . . . . . . . 892--893
P. Cochrane From Copper to Glass: the Right Idea,
Decisions and Investments at the Right
Time\ldots . . . . . . . . . . . . . . . 1--11
D. G. Patrick and
P. R. Green and
T. A. York Occam- and C-Based Multiprocessor
Environments for Unix Clusters . . . . . 12--21
P. Bozanis and
N. Kitsios and
C. Makris and
A. Tsakalidis New Results on Intersection Query
Problems . . . . . . . . . . . . . . . . 22--29
W.-J. Tsai and
S.-Y. Lee Multi-Partition RAID: a New Method for
Improving Performance of Disk Arrays
under Failure . . . . . . . . . . . . . 30--42
E. Chan and
C. Daoxu and
J. Cao and
C.-H. Lee Timing Properties of the FDDI-M Medium
Access Protocol . . . . . . . . . . . . 43--49
X. Wu Hybrid Interpretation of `No Match' and
`Multiple Match' in Induction . . . . . 50--57
P. W. Trinder Book Review . . . . . . . . . . . . . . 58--58
V. Stavridou Book Review . . . . . . . . . . . . . . 58--59
M. Butler Book Review . . . . . . . . . . . . . . 59--61
T. Forster Book Review . . . . . . . . . . . . . . 61--63
A. Moffat Editorial for Special Issue on Lossless
Compression . . . . . . . . . . . . . . 65--66
A. Moffat Lossless Compression . . . . . . . . . . 65--66
J. G. Cleary and
W. J. Teahan Unbounded Length Contexts for PPM . . . 67--75
S. Bunton Semantically Motivated Improvements for
PPM Variants . . . . . . . . . . . . . . 76--93
Hidetoshi Yokoo Data Compression Using a Sort-Based
Context Similarity Measure . . . . . . . 94--102
C. G. Nevill-Manning and
I. H. Witten Compression and Explanation Using
Hierarchical Grammars . . . . . . . . . 103--116
S. T. Klein Efficient Optimal Recompression . . . . 117--126
N. Memon and
X. Wu Recent Developments in Context-Based
Predictive Techniques for Lossless Image
Compression . . . . . . . . . . . . . . 127--136
J. A. Storer and
H. Helfgott Lossless Image Compression by Block
Matching . . . . . . . . . . . . . . . . 137--145
P. G. Howard Text Image Compression Using Soft
Pattern Matching . . . . . . . . . . . . 146--156
B. J. Frey and
G. E. Hinton Efficient Stochastic Source Coding and
an Application to a Bayesian Network
Source Model . . . . . . . . . . . . . . 157--165
Andrew M. Dearden and
Michael D. Harrison A Software Engineering Model for Case
Memory Systems . . . . . . . . . . . . . 167--182
Alex Delis and
Quang LeViet Contemporary Access Structures Under
Mixed Workloads . . . . . . . . . . . . 183--193
Fun Ting Chan and
Tsong Yueh Chen and
Ieng Kei Mark and
Shir Ming Shen On Some Properties of the Optimally
Refined Proportional Sampling Strategy 194--199
Pranay Chaudhuri An optimal distributed algorithm for
computing bridge- connected components 200--207
Fredrick H. Dahlgren and
Per Stenström and
Marten Björkman Reducing the Read-miss Penalty for Flat
COMA Protocols . . . . . . . . . . . . . 208--219
Robert M. Hierons Testing from a Finite-State Machine:
Extending Invertibility to Sequences . . 220--230
D. England Book Review . . . . . . . . . . . . . . 231--231
S. Rock Book Review . . . . . . . . . . . . . . 231--232
R. Turner Book Review . . . . . . . . . . . . . . 232--233
A. Larner Book Review . . . . . . . . . . . . . . 233--234
R. M. Colomb Impact of Semantic Heterogeneity on
Federating Databases . . . . . . . . . . 235--244
F. de Ferreira Rezende and
T. Härder and
J. Zielinski Transaction Identifiers in Nested
Transactions: Implementation Schemes and
Performance . . . . . . . . . . . . . . 245--258
T. Bolognesi Expressive Flexibility of a
Constraint-oriented Notation . . . . . . 259--277
L. Xiang and
C. Tang and
K. Ushijima Grammar-Oriented Enumeration of Binary
Trees . . . . . . . . . . . . . . . . . 278--291
Z. Arnavut and
S. S. Magliveras Lexical Permutation Sorting Algorithm 292--295
C. Waite Book Review . . . . . . . . . . . . . . 296--296
J. Bowen Book Review . . . . . . . . . . . . . . 296--297
B. C. Pierce Book Review . . . . . . . . . . . . . . 297--298
F. Sebastiani Book Review . . . . . . . . . . . . . . 298--299
S. Rock Book Review . . . . . . . . . . . . . . 299--299
M. Kumar and
L. M. Patnaik Automatic Loop Parallelization . . . . . 301--301
Mohan Kumar and
L. M. Patnaik Special Issue Editorial: Automatic Loop
Parallelization . . . . . . . . . . . . 301--301
Hyuk-Jae Lee and
José A. B. Fortes Communication-Minimal Partitioning and
Data Alignment for Affine Nested Loops 302--310
Steven Novack and
Alexandru Nicolau Resource-Directed Loop Pipelining:
Exposing Just Enough Parallelism . . . . 311--321
Jialin Ju and
Vipin Chaudhary Unique sets oriented parallelization of
loops with non-uniform dependences . . . 322--339
Sharad K. Singhai and
Kathryn S. McKinley A Parametrized Loop Fusion Algorithm for
Improving Parallelism and Cache Locality 340--355
Michal Cierniak and
Mohammed Javeed Zaki and
Wei Li Compile-Time Scheduling Algorithms for a
Heterogeneous Network of Workstations 356--372
Dattatraya Kulkarni and
Micheal Stumm Linear and Extended Linear
Transformations for Shared-Memory
Multiprocessors . . . . . . . . . . . . 373--387
Balaram Sinharoy Optimized Thread Creation for Processor
Multithreading . . . . . . . . . . . . . 388--400
Hong Va Leong and
Antonio Si Database Caching Over the Air-Storage 401--415
Evan P. Harris and
Kotagiri Ramamohanarao Optimal Clustering of Relations to
Improve Sorting and Partitioning for
Joins . . . . . . . . . . . . . . . . . 416--434
Yi Pan and
Jerry L. Trathan and
Ramachandran Vaidyanathan A Scalable and Efficient Algorithm for
Computing the City Block Distance
Transform on Reconfigurable Meshes . . . 435--440
Kshirasagar Naik Designing Reliable Test Architectures
for Communication Protocols . . . . . . 441--456
Marlin H. Mickle An Electrical Circuit and Computer
System Analogy . . . . . . . . . . . . . 457--462
Paddy Nixon and
Vinny Cahill and
Fethi Rabhi Building Parallel and Distributed
Systems . . . . . . . . . . . . . . . . 463--464
K. Mandy Chandy and
Adam Rikfin Systematic Composition of Distributed
Objects: Processes and Sessions . . . . 465--478
Andry Rakotonirainy and
Andrew Berry and
Stephen Crawley and
Zoran Milosevic Describing Open Distributed Systems: a
Foundation . . . . . . . . . . . . . . . 479--488
Richard B. Kilgore and
Craig M. Chase Testing Distributed Programs Containing
Racing Messages . . . . . . . . . . . . 489--498
T. Kunz and
J. P. Black and
D. J. Taylor and
T. Basten Poet: Target-System Independent
Visualizations of Complex
Distributed-Application Executions . . . 499--512
Vinny Cahill and
Paddy Nixon and
Brendan Tangney and
Fethi Rabhi Object Models for Distributed or
Persistent Programming . . . . . . . . . 513--527
S.-W. Lau and
J. C. S. Lui Designing a Hierarchical Multimedia
Storage Server . . . . . . . . . . . . . 529--540
C.-K. Shene An Analysis of Two In-Place Array
Rotation Algorithms . . . . . . . . . . 541--546
P. Fränti and
J. Kivijärvi and
T. Kaukoranta and
O. Nevalainen Genetic Algorithms for Large-Scale
Clustering Problems . . . . . . . . . . 547--554
A. Sanna and
P. Montuschi and
A. Fisone and
B. Montrucchio A New Algorithm for the Rendering of CSG
Scenes . . . . . . . . . . . . . . . . . 555--564
E. Burke and
K. Jackson and
J. H. Kingston and
R. Weare Automated University Timetabling: the
State of the Art . . . . . . . . . . . . 565--571
L. M. G. Feijs and
M. A. Reniers Lazy Functional Programs in a Concurrent
Environment . . . . . . . . . . . . . . 572--584
David Tresman Caminer, OBE LEO and its applications: the beginning
of business computing . . . . . . . . . 585--597
Dag I. K. Sjöberg and
Ray Welland and
Malcolm P. Atkinson Software Constraints for Large
Application Systems . . . . . . . . . . 598--616
Derrick Morris and
D. Gareth Evans and
Simon Schofield Simulating the behaviour of computer
systems: co-simulation of
hardware/software . . . . . . . . . . . 617--629
Sanjay Kumar Madria A study of the concurrency control and
recovery algorithms in nested
transaction environment . . . . . . . . 630--639
Olaf Müller and
Konrad Slind Treating Partiality in a Logic of Total
Functions . . . . . . . . . . . . . . . 640--651
Anonymous Author index for 1997 . . . . . . . . . ??
Anonymous Subject index for 1997 . . . . . . . . . ??
Ana Cavalcanti and
Jim Woodcock A Weakest Precondition Semantics for $Z$ 1--15
Michele Flammini and
Jan van Leeuwen and
Alberto Marchetti-Spaccamela The Complexity of Interval Routing on
Random Graphs . . . . . . . . . . . . . 16--25
Soo-Mook Moon and
Kemal Ebcio\uglu The Performance Impact of Exploiting
Branch ILP with Tree Representation of
ILP Code . . . . . . . . . . . . . . . . 26--44
Giuseppe Alia and
Enrico Martinelli Logic Design of a Fast Circuit for
Iterative Additions in Redundant Hybrid
Number Systems . . . . . . . . . . . . . 45--51
Ding-Ming Kwai and
Behrooz Parhami Tight Bounds on the Diameter of Gaussian
Cubes . . . . . . . . . . . . . . . . . 52--56
C. Ierotheou and
C. H. Lai and
C. J. Palansuriya and
K. A. Pericleous Simulation of $2$-D metal cutting by
means of a distributed algorithm . . . . 57--63
R. Cooper Book Review . . . . . . . . . . . . . . 64--65
C.-H. L. Ong Book Review . . . . . . . . . . . . . . 65--66
Martyn Thomas Myths of the Year 2000 . . . . . . . . . 67--70
Christopher B. Jones and
J. Mark Ware Proximity Search with a Triangulated
Spatial Model . . . . . . . . . . . . . 71--83
P. Bodorik and
D. Jutla Multi-View Memory Support to Operating
Systems in Locking for Transaction and
Database Systems . . . . . . . . . . . . 84--97
B. F. Jones and
D. E. Eyres and
H. H. Sthamer A Strategy for using Genetic Algorithms
to Automate Branch and Fault-based
Testing . . . . . . . . . . . . . . . . 98--107
Akhil Kumar and
Noha Adly HPP: a Reliable Causal Broadcast
Protocol for Large-Scale Replication in
Wide Area Networks . . . . . . . . . . . 108--124
Woei-Jiunn Tsaur and
Shi-Jinn Horng Establishing Secure Ethernet LANs Using
Intelligent Switching Hubs in Internet
Environments . . . . . . . . . . . . . . 125--133
M. D. Dunlop Book Review . . . . . . . . . . . . . . 134--135
H. Barendregt and
W. Dekkers Book Review . . . . . . . . . . . . . . 135--135
Roberto De Prisco and
Alfredo De Santis On the Data Expansion of the Huffman
Compression Algorithm . . . . . . . . . 137--144
Antonino Mazzeo and
Nicola Mazzocca and
Stefano Russo and
Carlo Savy and
Valeria Vittorini Formal Specification of Concurrent
Systems: a Structured Approach . . . . . 145--162
Anton Biasizzo and
Alenka Zuzek and
Franc Novak Sequential Diagnosis with Asymmetrical
Tests . . . . . . . . . . . . . . . . . 163--170
L. Q. Bai and
H. Ebara and
H. Nakano and
H. Maeda Fault-Tolerant Broadcasting on the
Arrangement Graph . . . . . . . . . . . 171--184
Jamel Tayeb and
Özgür Ulusoy and
Ouri Wolfson A Quadtree-Based Dynamic Attribute
Indexing Method . . . . . . . . . . . . 185--200
Alois Panholzer and
Helmut Prodinger Towards a More Precise Analysis of an
Algorithm to Generate Binary Trees: a
Tutorial . . . . . . . . . . . . . . . . 201--204
Jie Wu and
Eduardo B. Fernandex and
Donglai Dai Optimal Fault-Secure Scheduling . . . . 207--222
Keqin Li Optimizing Average Job Response Time via
Decentralized Probabilistic Job
Dispatching in Heterogeneous Multiple
Computer Systems . . . . . . . . . . . . 223--230
I-Chen Wu and
Loon-Been Chen On Detection of Bounded Global
Predicates . . . . . . . . . . . . . . . 231--237
Savio S. H. Tse and
Francis C. M. Lau More on the Efficiency of Interval
Routing . . . . . . . . . . . . . . . . 238--242
Ing-Ray Chen and
Tsong-Min Chen and
Chiang Lee Performance Evaluation of Forwarding
Strategies for Location Management in
Mobile Networks . . . . . . . . . . . . 243--253
Shun-Shii Lin and
Shan-Tai Chen On Detecting Multiple Faults in Baseline
Interconnection Networks . . . . . . . . 254--269
Khaled A. A. Abdel-Ghaffar Detecting Substitutions and
Transpositions of Characters . . . . . . 270--277
H. R. A. Townsend Letters . . . . . . . . . . . . . . . . 278--278
M. Fairtlough Book Review . . . . . . . . . . . . . . 279--280
M. Fairtlough Book Review . . . . . . . . . . . . . . 279--280
F. Sebastiani Book Review . . . . . . . . . . . . . . 280--281
W. Paul Cockshott and
Douglas McGregor and
John Wilson High performance operations using a
compressed database architecture . . . . 283--296
Maarten van Steen and
Franz J. Hauck and
Gerco Ballintijn and
Andrew S. Tanenbaum Algorithmic design of the globe
wide-area location service . . . . . . . 297--310
Th. P. van der Weide and
T. W. C. Huibers and
P. van Bommel The incremental searcher satisfaction
model for information retrieval . . . . 311--318
Stuart G. Hoggar and
Lindsey Menzies Fractal Compression and the Jigsaw
Property I . . . . . . . . . . . . . . . 319--336
Roberto Baldoni and
Roberto Beraldi and
Ravi Prakash Slotted-FIFO communication for
asynchronous distributed systems . . . . 337--348
R. M. Hierons Adaptive testing of a deterministic
implementation against a
nondeterministic finite state machine 349--355
Michael Prasse and
Peter Rittgen Why Church's Thesis still holds. Some
notes on Peter Wegner's tracts on
interaction and computability . . . . . 357--362
Hugh Robinson and
Pat Hall and
Fiona Hovenden and
Janet Rachel Postmodern Software Development . . . . 363--375
Sanjay Kumar Madria Handling of mutual conflicts in
distributed databases using timestamps 376--385
Declan P. Kelly ARC: a specification language for
communicating systems . . . . . . . . . 386--401
K. W. Chu and
S. K. Lam and
M. H. Wong An efficient hash-based algorithm for
sequence data searching . . . . . . . . 402--415
Zbigniew J. Czech Quasi-perfect Hashing . . . . . . . . . 416--421
E. Mäkinen Binary Tree Code Words as Context-Free
Languages . . . . . . . . . . . . . . . 422--424
L. C. Paulson Book Review . . . . . . . . . . . . . . 425--425
B. M. Matthews Book Review . . . . . . . . . . . . . . 426--427
A. Dearden Book Review . . . . . . . . . . . . . . 427--428
F. Crestani Book Review . . . . . . . . . . . . . . 428--428
R. Benjamin and
B. Gladman and
B. Randell Protecting IT Systems from CyberCrime 429--443
Harold Thimbleby and
Stuart Anderson and
Paul Cairns A Framework for Modelling Trojans and
Computer Virus Infection . . . . . . . . 444--458
Luc Moreau and
Wendy Hall On the Expressiveness of Links in
Hypertext Systems . . . . . . . . . . . 459--473
Pasi Fränti and
Timo Hatakka Context Model Automata for Text
Compression . . . . . . . . . . . . . . 474--485
S. E. Mitchell and
A. J. Wellings and
A. Romanovsky Distributed Atomic Actions in Ada 95 . . 486--502
Andrea Sanna and
Paolo Montuschi and
Massimo Rossi A Flexible Algorithm for Multiprocessor
Ray Tracing . . . . . . . . . . . . . . 503--516
F. Murtagh Clustering and Classification . . . . . 517--517
F. Murtagh Foreword to special issue on clustering
and classification . . . . . . . . . . . 517--517
Boris Mirkin Least-Squares Structuring, Clustering
and Data Processing Issues . . . . . . . 518--536
Y. H. Li and
A. K. Jain Classification of Text Documents . . . . 537--546
Valerie J. Gillet and
David J. Wild and
Peter Willett and
John Bradshaw Similarity and Dissimilarity Methods for
Processing Chemical Structure Databases 547--558
Ryuichi Oka Spotting Method for Classification of
Real World Data . . . . . . . . . . . . 559--565
Lawrence Hubert and
Phipps Arabie and
Jacqueline Meulman The Representation of Symmetric
Proximity Data: Dimensions and
Classifications . . . . . . . . . . . . 566--577
Chris Fraley and
Adrian E. Raftery How Many Clusters? Which Clustering
Method? Answers Via Model-Based Cluster
Analysis . . . . . . . . . . . . . . . . 578--588
Dian I. Witter and
Michael W. Berry Downdating the Latent Semantic Indexing
Model for Conceptual Information
Retrieval . . . . . . . . . . . . . . . 589--601
C. S. Wallace Intrinsic Classification of Spatially
Correlated Data . . . . . . . . . . . . 602--611
L. Allison and
D. Powell and
T. I. Dix Compression and approximate matching . . 1--10
S. Kocberber and
F. Can and
J. M. Patton Optimization of signature file
parameters for databases with varying
record lengths . . . . . . . . . . . . . 11--23
M. Choy Consistent implementations of replicated
objects . . . . . . . . . . . . . . . . 24--38
G. S. Chinchwadkar and
A. Goh An overview of vertical partitioning in
object oriented databases . . . . . . . 39--50
Carlo Blundo and
P. D'Arco and
A. G. Gaggia A $\tau$-restricted key agreement scheme 51--61
S. Loucif and
M. Ould-Khaoua and
L. M. Mackenzie On the performance merits of bypass
channels in hypermeshes and $k$-ary
$n$-cubes . . . . . . . . . . . . . . . 62--72
Birgit Schieder and
Manfred Broy Adapting Calculational Logic to the
Undefined . . . . . . . . . . . . . . . 73--81
Richard F. Paige Integrating a Program Design Calculus
and a Subset of UML . . . . . . . . . . 82--99
Ykä Huhtala and
Juha Kärkkäinen and
Pasi Porkka and
Hannu Toivonen TANE: An Efficient Algorithm for
Discovering Functional and Approximate
Dependencies . . . . . . . . . . . . . . 100--111
Chung-Ming Huang and
Ming-Yuhe Jang Interactive Temporal Behaviours and
Modelling for Multimedia Presentations
in the WWW Environment . . . . . . . . . 112--128
Min-Sheng Lin and
Deng-Jyi Chen and
Maw-Sheng Horng The Reliability Analysis of Distributed
Computing Systems with Imperfect Nodes 129--141
W. F. Wong Source Level Static Branch Prediction 142--149
Jim Rook and
Ian J. Lloyd and
Kenneth J. Turner Book Reviews . . . . . . . . . . . . . . 150--152
Harry W. Agius and
Marios C. Angelides COSMOS-Content Oriented Semantic
Modelling Overlay Scheme . . . . . . . . 153--176
Richard Bornat and
Bernard Sufrin Animating Formal Proof at the Surface:
The Jape Proof Calculator . . . . . . . 177--192
Hugh E. Williams and
Justin Zobel Compressing Integers for Fast File
Access . . . . . . . . . . . . . . . . . 193--201
Weijia Jia and
Jiannong Cao and
To-Yat Cheung and
Xiaohua Jia A Multicast Protocol Based on a Single
Logical Ring Using a Virtual Token and
Logical Clocks . . . . . . . . . . . . . 202--220
Kecheng Liu and
Tina Ong A Modelling Approach for Handling
Business Rules and Exceptions . . . . . 221--231
Ahmad A. Hiasat and
Hoda Abdel-Aty-Zohdy Semi-Custom VLSI Design and
Implementation of a New Efficient RNS
Division Algorithm . . . . . . . . . . . 232--240
Neven Tomov and
Euan Dempster and
M. Howard Williams and
Peter J. B. King and
Albert Burger Approximate Estimation of Transaction
Response Time . . . . . . . . . . . . . 241--250
Alexander Gammerman and
Vladimir Vovk Special Issue Editorial: Kolmogorov
Complexity . . . . . . . . . . . . . . . 251--251
Alexander Gammerman and
Vladimir Vovk Kolmogorov Complexity: Sources, Theory
and Applications . . . . . . . . . . . . 252--255
Ray Solomonoff Two Kinds of Probabilistic Induction . . 256--259
J. Rissanen Hypothesis Selection and Testing by the
MDL Principle . . . . . . . . . . . . . 260--269
C. S. Wallace and
D. L. Dowe Minimum Message Length and Kolmogorov
Complexity . . . . . . . . . . . . . . . 270--283
Leonid. A. Levin Robust Measures of Information . . . . . 284--286
Tao Jiang and
Ming Li and
Paul Vitányi New Applications of the
Incompressibility Method . . . . . . . . 287--293
V. V. V'yugin Algorithmic Complexity and Stochastic
Properties of Finite Binary Sequences 294--317
Vladimir Vovk and
Alexander Gammerman Complexity Approximation Principle . . . 318--322
A. P. Dawid Discussion of the Papers by Rissanen and
by Wallace and Dowe . . . . . . . . . . 323--326
Jorma Rissanen Discussion of paper `Minimum Message
Length and Kolmogorov Complexity' by C.
S. Wallace and D. L. Dowe . . . . . . . 327--329
C. S. Wallace and
D. L. Dowe Refinements of MDL and MML Coding . . . 330--337
B. Clarke Discussion of the Papers by Rissanen,
and by Wallace and Dowe . . . . . . . . 338--339
Alexander Shen Discussion on Kolmogorov Complexity and
Statistical Analysis . . . . . . . . . . 340--342
Jorma Rissanen Rejoinder . . . . . . . . . . . . . . . 343--344
C. S. Wallace and
D. L. Dowe Rejoinder . . . . . . . . . . . . . . . 345--347
A. H. M. ter Hofstede and
M. E. Orlowska On the Complexity of Some Verification
Problems in Process Control
Specifications . . . . . . . . . . . . . 349--359
Norman Ramsey Eliminating Spurious Error Messages
Using Exceptions, Polymorphism, and
Higher-Order Functions . . . . . . . . . 360--372
Mayez Al-Mouhamed Evolution-Based Scheduling of
Computations and Communications on
Distributed-Memory Multicomputers . . . 373--390
R. W. P. Luk Near Optimal $\beta$ Heap . . . . . . . 391--399
Tadao Takaoka $O(1)$ Time Algorithms for Combinatorial
Generation by Tree Traversal . . . . . . 400--408
Po-Jen Chuang and
Huey-Ming Hsu Effective Fault Diagnosis Approaches for
Multipath Networks . . . . . . . . . . . 409--421
Miroslav Bojovic and
Milo Tomasevic and
Jovan Djordjevic The Interactive Development and Testing
System for a RISC-Style Processor . . . 422--429
Tsong Yueh Chen and
Man Fai Lau On the Completeness of a Test Suite
Reduction Strategy . . . . . . . . . . . 430--440
Mohan Kumar Special Issue Editorial: Mobile
Computing . . . . . . . . . . . . . . . 441--441
Kevin W. Froese and
Richard B. Bunt Cache Management for Mobile File Service 442--454
Cedric C. F. Fong and
John C. S. Lui and
M. H. Wong Distributed Caching and Broadcast in a
Wireless Mobile Computing Environment 455--472
Sajal K. Das and
Sanjoy K. Sen Adaptive Location Prediction Strategies
Based on a Hierarchical Network Model in
a Cellular Mobile Environment . . . . . 473--486
Sihui Zhou and
Aruna Seneviratne and
Terry Percival An Efficient Location Management Scheme
for Hybrid Wireless Asynchronous
Transfer Mode Networks . . . . . . . . . 487--500
Ersan Kayan and
Özgür Ulusoy An Evaluation of Real-Time Transaction
Management Issues in Mobile Database
Systems . . . . . . . . . . . . . . . . 501--510
Guan-Chi Chen and
Suh-Yin Lee An Analytic Model for Performance
Analysis of Concurrency Control
Strategies in Mobile Environments . . . 511--521
Kuang-Hwei Chi and
Chien-Chao Tseng and
Ting-Lu Huang A Framework for Mobile Multicast Using
Dynamic Route Reconstructions . . . . . 522--533
Timothy Bickmore and
Andreas Girgensohn and
Joseph W. Sullivan Web Page Filtering and Re-Authoring for
Mobile Users . . . . . . . . . . . . . . 534--546
Mounia Lalmas A Model for Representing and Retrieving
Heterogeneous Structured Documents Based
on Evidential Reasoning . . . . . . . . 547--568
N. Zhang and
Q. Shi and
M. Merabti A Flexible Approach to Secure and Fair
Document Exchange . . . . . . . . . . . 569--581
Francesca Arcelli Fontana and
Ferrante Formato and
Remo Pareschi Computational Models for Information
Reuse . . . . . . . . . . . . . . . . . 582--591
Wanlei Zhou and
Andrzej Goscinski Managing Replicated Remote Procedure
Call Transactions . . . . . . . . . . . 592--608
Esther Jennings Distributed Algorithms for Finding
Central Paths in Tree Networks . . . . . 609--612
Tatsuhiro Tsuchiya and
Tohru Kikuno Availability Evaluation of Quorum-Based
Mutual Exclusion Schemes in General
Topology Networks . . . . . . . . . . . 613--622
Richard Mitchell and
B. de la Iglesia and
J. C. W. Debuse and
Mark Staples Book Reviews . . . . . . . . . . . . . . 623--625
Alexander Romanovsky On Structuring Cooperative and
Competitive Concurrent Systems . . . . . 627--637
Keith M. Martin and
Rei Safavi-Naini and
Huaxiong Wang Bounds and Techniques for Efficient
Redistribution of Secret Shares to New
Access Structures . . . . . . . . . . . 638--649
Martin P. Ward and
Keith H. Bennett Recursion Removal/Introduction by Formal
Transformation: An Aid to Program
Development and Program Comprehension 650--673
Kam-Yiu Lam and
Chung-Leung Pang and
Sang H. Son and
Jiannong Cao Resolving Executing-Committing Conflicts
in Distributed Real-time Database
Systems . . . . . . . . . . . . . . . . 674--692
H. Leung and
T. Y. Chen A New Perspective of the Proportional
Sampling Strategy . . . . . . . . . . . 693--698
Voon-Yee Vee and
Wen-Jing Hsu Applying Cilk in Provably Efficient Task
Scheduling . . . . . . . . . . . . . . . 699--712
Mark Sanderson Book Reviews . . . . . . . . . . . . . . 713--715
Erkki Mäkinen Comment on `A Framework for Modelling
Trojans and Computer Virus Infection' 321--323
H. Thimbleby and
S. O. Anderson and
P. A. Cairns Reply to ``Comment on `A Framework for
Modelling Trojans and Computer Virus
Infection' by E. Mäkinen'' . . . . . . . 324--325
Fred Cohen Reply to ``Comment on `A Framework for
Modelling Trojans and Computer Virus
Infection' by E. Mäkinen'' . . . . . . . 326--327