Table of contents for issues of The Computer Journal

Last update: Sat Oct 14 12:43:53 MDT 2017                Valid HTML 3.2!

Volume 43, Number 1, 2000
Volume 43, Number 2, 2000
Volume 43, Number 3, 2000
Volume 43, Number 4, 2000
Volume 43, Number 5, 2000
Volume 43, Number 6, 2000
Volume 44, Number 1, 2001
Volume 44, Number 2, 2001
Volume 44, Number 3, 2001
Volume 44, Number 4, 2001
Volume 44, Number 5, 2001
Volume 44, Number 6, 2001
Volume 45, Number 1, 2002
Volume 45, Number 2, 2002
Volume 45, Number 3, 2002
Volume 45, Number 4, 2002
Volume 45, Number 5, 2002
Volume 45, Number 6, 2002
Volume 46, Number 1, January, 2003
Volume 46, Number 2, February, 2003
Volume 46, Number 3, May, 2003
Volume 46, Number 4, July, 2003
Volume 46, Number 5, September, 2003
Volume 46, Number 6, November, 2003
Volume 47, Number 1, January, 2004
Volume 47, Number 2, March, 2004
Volume 47, Number 3, May, 2004
Volume 47, Number 4, July, 2004
Volume 47, Number 5, September, 2004
Volume 47, Number 6, November, 2004
Volume 48, Number 1, January, 2005
Volume 48, Number 2, March, 2005
Volume 48, Number 3, May, 2005
Volume 48, Number 4, July, 2005
Volume 48, Number 5, September, 2005
Volume 48, Number 6, November, 2005
Volume 49, Number 1, January, 2006
Volume 49, Number 2, March, 2006
Volume 49, Number 3, May, 2006
Volume 49, Number 4, July, 2006
Volume 49, Number 5, September, 2006
Volume 49, Number 6, November, 2006
Volume 50, Number 1, January, 2007
Volume 50, Number 2, March, 2007
Volume 50, Number 3, May, 2007
Volume 50, Number 4, July, 2007
Volume 50, Number 5, September, 2007
Volume 50, Number 6, November, 2007
Volume 51, Number 1, January, 2008
Volume 51, Number 2, March, 2008
Volume 51, Number 3, May, 2008
Volume 51, Number 4, July, 2008
Volume 51, Number 5, September, 2008
Volume 51, Number 6, November, 2008
Volume 52, Number 1, January, 2009
Volume 52, Number 2, March, 2009
Volume 52, Number 3, May, 2009
Volume 52, Number 4, July, 2009
Volume 52, Number 5, August, 2009
Volume 52, Number 6, August, 2009
Volume 53, Number 7, September, 2010
Volume 41, Number 7, 1998
Volume 1008, 1995


The Computer Journal
Volume 43, Number 1, 2000

               Gianni Amati and   
                     Iadh Ounis   Conceptual Graphs and First Order Logic  1--12
            Jeremy M. R. Martin   A Tool for Checking the CSP \bf sat
                                  Property . . . . . . . . . . . . . . . . 13--23
             A. D. Pengelly and   
                     D. C. Ince   Quotient Machines, the Interface
                                  Equation and Protocol Conversion . . . . 24--39
                 John Ellis and   
                   Minko Markov   In situ, Stable Merging by Way of the
                                  Perfect Shuffle  . . . . . . . . . . . . 40--53
         Simon Y. Berkovich and   
               Eyas El-Qawasmeh   Reversing the Error-Correction Scheme
                                  for a Fault-Tolerant Indexing  . . . . . 54--64
                Kam-yiu Lam and   
                Tei-Wei Kuo and   
             Wai-Hung Tsang and   
                 Gary C. K. Law   The Reduced Ceiling Protocol for
                                  Concurrency Control in Real-time
                                  Databases with Mixed Transactions  . . . 65--80
               Suk-Kyu Song and   
             Narasimhaiah Gorla   A Genetic Algorithm for Vertical
                                  Fragmentation and Access Path Selection  81--93

The Computer Journal
Volume 43, Number 2, 2000

                  Brian Randell   Turing Memorial Lecture: Facing Up to
                                  Faults . . . . . . . . . . . . . . . . . 95--106
              Fionn Murtagh and   
            Jean-Luc Starck and   
               Michael W. Berry   Overcoming the Curse of Dimensionality
                                  in Clustering by Means of the Wavelet
                                  Transform  . . . . . . . . . . . . . . . 107--120
                  F. Luccio and   
                M. Mahafzah and   
                   M. Omari and   
                       L. Pagli   Masked Interval Routing: a New Routing
                                  Scheme . . . . . . . . . . . . . . . . . 121--129
    Marina Papatriantafilou and   
              Phillippas Tsigas   Wait-Free Handshaking Using Rainbow
                                  Colouring  . . . . . . . . . . . . . . . 130--137
               Lizy Kurian John   Data Placement Schemes to Reduce
                                  Conflicts in Interleaved Memories  . . . 138--151
               Imtiaz Ahmad and   
         Muhammad K. Dhodhi and   
                 Faridah M. Ali   TLS: a Tabu Search Based Scheduling
                                  Algorithm for Behavioral Synthesis of
                                  Functional Pipelines . . . . . . . . . . 152--166

The Computer Journal
Volume 43, Number 3, 2000

                 Ian Holyer and   
         Hüseyin Pehlivan.   A Recovery Mechanism for Shells  . . . . 168--176
          Tatiana Tambouratzis.   Counter-clustering for Training Pattern
                                  Selection  . . . . . . . . . . . . . . . 177--190
        Cinzia Bernardeschi and   
        Alessandro Fantechi and   
                Luca Simoncini.   Formally Verifying Fault Tolerant System
                                  Designs  . . . . . . . . . . . . . . . . 191--205
               Samir M. Koriem.   A Fuzzy Petri Net Tool For Modeling and
                                  Verification of Knowledge-Based Systems  206--223
   Sòren Christensen and   
                Laure Petrucci.   Modular Analysis of Petri Nets . . . . . 224--242
                Cyril Gavoille.   On the Dilation of Interval Routing  . . 243--249

The Computer Journal
Volume 43, Number 4, 2000

                Hugh Glaser and   
           Pieter H. Hartel and   
               Paul W. Garratt.   Programming by Numbers: a Programming
                                  Method for Novices . . . . . . . . . . . 252--265
                   S. Zeadally.   Implementation and Performance of
                                  QoS-aware Java Applications over ATM
                                  Networks . . . . . . . . . . . . . . . . 266--273
              Tijn Borghuis and   
                     Loe Feijs.   A Constructive Logic for Services and
                                  Information Flow in Computer Networks    274--289
                Limin Xiang and   
             Kazuo Ushijima and   
                  Selim G. Akl.   Generating Regular $k$-ary Trees
                                  Efficiently  . . . . . . . . . . . . . . 290--300
             Eleni Tousidou and   
            Alex Nanopoulos and   
           Yannis Manolopoulos.   Improved Methods for Signature-Tree
                                  Construction . . . . . . . . . . . . . . 301--314
            Kuo-Liang Chung and   
               Hsiu-Niang Chen.   A Neighbor-finding Algorithm for
                                  Bincode-based Images on Reconfigurable
                                  Meshes . . . . . . . . . . . . . . . . . 315--324
      Theodoros Tzouramanis and   
    Michael Vassilakopoulos and   
           Yannis Manolopoulos.   Overlapping Linear Quadtrees and
                                  Spatio-Temporal Query Processing . . . . 325--324

The Computer Journal
Volume 43, Number 5, 2000

         Sourav S. Bhowmick and   
              Sanjay Madria and   
               Wee Keong Ng and   
                    Ee-Peng Lim   Data Visualization Operators for WHOWEDA 364--385
          Sheng-Tzong Cheng and   
                  Chia-Mei Chen   Dynamic Round-based Resource Management
                                  for On-demand Multimedia Servers . . . . 386--395
               Duen-Ren Liu and   
             Chen-Hsien Lin and   
                Jing-Jang Hwang   Classifying Video Documents by
                                  Hierarchical Structure of Video Contents 396--410
            H. Sarbazi-Azad and   
             M. Ould-Khaoua and   
                L. M. Mackenzie   Message Latency in Hypercubes in the
                                  Presence of Matrix-Transpose Traffic . . 411--419
         Antigoni Manousaka and   
            Yannis Manolopoulos   Fringe Analysis of $2$-$3$ Trees with
                                  Lazy Parent Split  . . . . . . . . . . . 420--429
               Willy Susilo and   
           Rei Safavi-Naini and   
                 Marc Gysin and   
               Jennifer Seberry   A New and Efficient Fail-stop Signature
                                  Scheme . . . . . . . . . . . . . . . . . 430--437

The Computer Journal
Volume 43, Number 6, 2000

                    James Noble   Arguments and Results  . . . . . . . . . 439--450
                    K. Lano and   
                  R. France and   
                    J.-M. Bruel   A Semantic Comparison of Fusion and
                                  Syntropy . . . . . . . . . . . . . . . . 451--468
     Konstantin Läufer and   
         Gerald Baumgartner and   
               Vincent F. Russo   Safe Structural Conformance for Java . . 469--481
                Houman Younessi   An Algorithm for Automatic Construction
                                  of Class Diagrams  . . . . . . . . . . . 482--490
                 Suad Alagi\'c.   Temporal Object-Oriented Programming . . 491--511
                Eun-Sun Cho and   
                 Hyoung-Joo Kim   Interface/implementation Separation
                                  Mechanism for Integrating
                                  Object-oriented Management Systems and
                                  General-purpose Programming Languages    512--523
                Jung-Ho Ahn and   
                 Hyoung-Joo Kim   Dynamic SEOF: An Adaptable Object
                                  Prefetch Policy for Object-oriented
                                  Database Systems . . . . . . . . . . . . 524--537


The Computer Journal
Volume 44, Number 1, 2001

               Michael Luck and   
                 Mark d'Inverno   A Conceptual Framework for Agent
                                  Definition and Development . . . . . . . 1--20
          Giuseppe Anastasi and   
            Alberto Bartoli and   
     Nicoletta De Francesco and   
              Antonella Santone   Efficient Verification of a Multicast
                                  Protocol for Mobile Computing  . . . . . 21--30
               Sijing Zhang and   
             E. Stewart Lee and   
                     Alan Burns   Determining the Worst-case Synchronous
                                  Message Response Time in FDDI Networks   31--41
           Juha Puustjärvi   Workflow Concurrency Control . . . . . . 42--53
             Jason Crampton and   
              George Loizou and   
                    Greg O'Shea   A Logic of Access Control  . . . . . . . 54--66

The Computer Journal
Volume 44, Number 2, 2001

                  Nick Donofrio   Turing Memorial Lecture  . . . . . . . . 67--74
          Evaggelia Pitoura and   
                  Ioannis Fudos   Distributed Location Databases for
                                  Tracking Highly Mobile Objects . . . . . 75--91
            Roberto Baldoni and   
          Francesco Quaglia and   
                  Michel Raynal   Consistent Checkpointing for Transaction
                                  Systems  . . . . . . . . . . . . . . . . 92--100
               F. C. M. Lau and   
             P. K. W. Cheng and   
                   S. S. H. Tse   An Algorithm for the $2$-Median Problem
                                  on Two-Dimensional Meshes  . . . . . . . 101--108
            N. De Francesco and   
                A. Fantechi and   
                   S. Gnesi and   
                   P. Inverardi   Finite Approximations for Model Checking
                                  Non-finite-state Processes . . . . . . . 109--123
             Daniel Y. Chao and   
                 Jose A. Nicdao   Liveness for Synchronized Choice Petri
                                  Nets . . . . . . . . . . . . . . . . . . 124--136
             Jason Crampton and   
              George Loizou and   
                    Greg O'Shea   A Logic of Access Control  . . . . . . . 137--149

The Computer Journal
Volume 44, Number 3, 2001

                 Willis H. Ware   Introduction to Davies' paper  . . . . . 151--151
                   D. W. Davies   An Historical Study of the Beginnings of
                                  Packet Switching . . . . . . . . . . . . 152--162
        Kostas Politopoulos and   
   George F. Georgakopoulos and   
            Panagiotis Tsanakas   Precedence Constrained Scheduling: a
                                  Case in P  . . . . . . . . . . . . . . . 163--173
                 A. Stewart and   
                       M. Clint   BSP-style Computation: a Semantic
                                  Investigation  . . . . . . . . . . . . . 174--185
              Da-Qian Zhang and   
                 Kang Zhang and   
                   Jiannong Cao   A Context-sensitive Graph Grammar
                                  Formalism for the Specification of
                                  Visual Languages . . . . . . . . . . . . 186--200
               SangKeun Lee and   
                Chong-Sun Hwang   Unified Protocols of Concurrency Control
                                  and Recovery in Distributed Object-based
                                  Databases  . . . . . . . . . . . . . . . 201--213
                  C.-H. Lai and   
            C. S. Ierotheou and   
          C. J. Palansuriya and   
               K. A. Pericleous   Performance Evaluation of a Distributed
                                  Algorithm for an Inverse Heat Conduction
                                  Problem  . . . . . . . . . . . . . . . . 214--220

The Computer Journal
Volume 44, Number 4, 2001

          Alexis C. Kaporis and   
       Lefteris M. Kirousis and   
         Evangelos Kranakis and   
              Danny Krizanc and   
        Yannis C. Stamatiou and   
          Elias C. Stavropoulos   Locating Information with Uncertainty in
                                  Fully Interconnected Networks with
                                  Applications to World Wide Web
                                  Information Retrieval  . . . . . . . . . 221--229
                  H. Bowman and   
               J. W. Bryans and   
                     J. Derrick   Analysis of a Multimedia Stream using
                                  Stochastic Process Algebra . . . . . . . 230--245
           H. M. W. Verbeek and   
                  T. Basten and   
         W. M. P. van der Aalst   Diagnosing Workflow Processes using
                                  Woflan . . . . . . . . . . . . . . . . . 246--279
                  Yuke Wang and   
              Carl McCrosky and   
                    Xiaoyu Song   Single-faced Boolean Functions and their
                                  Minimization . . . . . . . . . . . . . . 280--291
                Limin Xiang and   
                 Kazuo Ushijima   On $O(1)$ Time Algorithms for
                                  Combinatorial Generation . . . . . . . . 292--302
                    M. Amor and   
           F. Argüello and   
            J. López and   
                   O. Plata and   
                   E. L. Zapata   A Data-Parallel Formulation for Divide
                                  and Conquer Algorithms . . . . . . . . . 303--320
             Erkki Mäkinen   Comment on `A Framework for Modelling
                                  Trojans and Computer Virus Infection'    321--323
               H. Thimbleby and   
             S. O. Anderson and   
                   P. A. Cairns   Reply to ``Comment on `A Framework for
                                  Modelling Trojans and Computer Virus
                                  Infection' by E. Mäkinen''  . . . . . . . 324--325
                     Fred Cohen   Reply to ``Comment on `A Framework for
                                  Modelling Trojans and Computer Virus
                                  Infection' by E. Mäkinen''  . . . . . . . 326--327

The Computer Journal
Volume 44, Number 5, 2001

                Xiaohua Jia and   
                  Deying Li and   
                Xiaodong Hu and   
                     DingZhu Du   Optimal Placement of Web Proxies for
                                  Replicated Web Servers in the Internet   329--339
               Aline Baggio and   
           Gerco Ballintijn and   
          Maarten van Steen and   
            Andrew S. Tanenbaum   Efficient Tracking of Mobile Objects in
                                  Globe  . . . . . . . . . . . . . . . . . 340--353
              San-Yuan Wang and   
              Yu-Chee Tseng and   
            Ching-Sung Shiu and   
                 Jang-Ping Sheu   Balancing Traffic Load for Multi-Node
                                  Multicast in a Wormhole $2$-D Torus/Mesh 354--367
                 J. Al-Sadi and   
                     K. Day and   
                 M. Ould-Khaoua   Probability-based Fault-tolerant Routing
                                  in Hypercubes  . . . . . . . . . . . . . 368--373
                Guihai Chen and   
              Francis C. M. Lau   Layout of the Cube-connected Cycles
                                  without Long Wires . . . . . . . . . . . 374--383
                Jitian Xiao and   
              Yanchun Zhang and   
                    Xiaohua Jia   Clustering Non-uniform-sized Spatial
                                  Objects to Reduce I/O Cost for
                                  Spatial-join Processing  . . . . . . . . 384--397
              Ngoc Thanh Nguyen   Consensus-based Timestamps in
                                  Distributed Temporal Databases . . . . . 398--409
            David E. Losada and   
                Alvaro Barreiro   A Logical Model for Information
                                  Retrieval based on Propositional Logic
                                  and Belief Revision  . . . . . . . . . . 410--424
               Robert W. P. Luk   Compact Morphic Directed Acyclic Word
                                  Graphs . . . . . . . . . . . . . . . . . 425--434
           Ousmane Koné.   A Local Approach to the Testing of
                                  Real-time Systems  . . . . . . . . . . . 435--447
                   C. Canal and   
                 L. Fuentes and   
                E. Pimentel and   
                J. M. Troya and   
                  A. Vallecillo   Extending CORBA Interfaces with
                                  Protocols  . . . . . . . . . . . . . . . 448--462
                   Gwoboa Horng   An Efficient and Secure Protocol for
                                  Multi-party Key Establishment  . . . . . 463--470

The Computer Journal
Volume 44, Number 6, 2001

                   Ing-Ray Chen   Special Issue Editorial. High Assurance
                                  Systems  . . . . . . . . . . . . . . . . 471--472
               Tadashi Dohi and   
Katerina Go\vseva-Popstojanova and   
                 Kishor Trivedi   Estimating Software Rejuvenation
                                  Schedules in High-Assurance Systems  . . 473--485
              Steve Goddard and   
                   Kevin Jeffay   Managing Latency and Buffer Requirements
                                  in Processing Graph Chains . . . . . . . 486--503
         Jeffrey J. P. Tsai and   
                Eric Y. T. Juan   Modeling and Verification of
                                  High-Assurance Properties of
                                  Safety-Critical Systems  . . . . . . . . 504--530
                  Iain Bate and   
             Philippa Conmy and   
                  Tim Kelly and   
                  John McDermid   Use of Modern Processors in
                                  Safety-Critical Applications . . . . . . 531--543
                F. Grandoni and   
             S. Chiaradonna and   
         F. Di Giandomenico and   
                  A. Bondavalli   Evaluation of Fault-Tolerant
                                  Multiprocessor Systems for High
                                  Assurance Applications . . . . . . . . . 544--556
                  Zhiwei Xu and   
          Taghi M. Khoshgoftaar   Software Quality Prediction for
                                  High-Assurance Network
                                  Telecommunications Systems . . . . . . . 557--568
       Alessandro F. Garcia and   
            Delano M. Beder and   
    Cecília M. F. Rubira   A Unified Meta-Level Software
                                  Architecture for Sequential and
                                  Concurrent Exception Handling  . . . . . 569--587


The Computer Journal
Volume 45, Number 1, 2002

                Faron G. Moller   Editorial: Formal Methods in Computation 1--1
           Howard Barringer and   
              Donal Fellows and   
               Graham Gough and   
                  Alan Williams   Rainbow: Development, Simulation and
                                  Analysis Tools for Asynchronous
                                  Micropipeline Hardware Design  . . . . . 2--11
               Doug Edwards and   
                Andrew Bardsley   Balsa: An Asynchronous Hardware
                                  Synthesis Language . . . . . . . . . . . 12--18
                   Steve Furber   Validating the AMULET Microprocessors    19--26
           Michael J. C. Gordon   Relating Event and Trace Semantics of
                                  Hardware Description Languages . . . . . 27--36
            Michael Norrish and   
                   Konrad Slind   A Thread of HOL Development  . . . . . . 37--45
                Susan Older and   
                  Shiu-Kai Chin   Formal Methods for Assuring Security of
                                  Protocols  . . . . . . . . . . . . . . . 46--54
                  M. Calder and   
                 S. Maharaj and   
                   C. Shankland   A Modal Logic for Full LOTOS based on
                                  Symbolic Transition Systems  . . . . . . 55--61
                       C. Tofts   Traffic Modelling and Probabilistic
                                  Process Abstraction  . . . . . . . . . . 62--67
               J. V. Tucker and   
            Sergei Vorobyov and   
                    Chris Tofts   Book Reviews . . . . . . . . . . . . . . 68--71
           Chung-Ming Huang and   
                  Yu-Chang Chao   Differentiated Information Presentations
                                  for Heterogeneous I/O Devices using a
                                  Single Mark-up Language Approach . . . . 72--87
               Ali Shatnawi and   
                M. O. Ahmad and   
                 M. N. S. Swamy   Optimal Scheduling of Digital Signal
                                  Processing Data-flow Graphs using
                                  Shortest-path Algorithms . . . . . . . . 88--100
                Shih-Lin Wu and   
              Yu-Chee Tseng and   
                Chih-Yu Lin and   
                 Jang-Ping Sheu   A Multi-channel MAC Protocol with Power
                                  Control for Multi-hop Mobile Ad Hoc
                                  Networks . . . . . . . . . . . . . . . . 101--110
                  Xudong He and   
                        Yi Deng   A Framework for Developing and Analyzing
                                  Software Architecture Specifications in
                                  SAM  . . . . . . . . . . . . . . . . . . 111--128

The Computer Journal
Volume 45, Number 2, 2002

          Syed Masud Mahmud and   
       L. Tissa Samaratunga and   
                 Shilpa Kommidi   Fault-Tolerant Hierarchical Networks for
                                  Shared Memory Multiprocessors and their
                                  Bandwidth Analysis . . . . . . . . . . . 147--161
              Xiao Jun Chen and   
                     Hasan Ural   Construction of Deadlock-free Designs of
                                  Communication Protocols from
                                  Observations . . . . . . . . . . . . . . 162--173
               Tien-Tai Pan and   
                  Shun-Shii Lin   Constant-time Algorithms for Minimum
                                  Spanning Tree and Related Problems on
                                  Processor Array with Reconfigurable Bus
                                  Systems  . . . . . . . . . . . . . . . . 174--186
        Fairouz Kamareddine and   
          Alejandro Ríos   Pure Type Systems with de Bruijn Indices 187--201
                    N. Parimala   Explicit Operation Specification for
                                  Component Databases  . . . . . . . . . . 202--212
               Alan Gibbons and   
                     Ida Pu and   
            Muthu Muthukrishnan   Exact Analyses of a Simple Heuristic
                                  Employed in Array Compression  . . . . . 213--220
                 Alexey Stakhov   Brousentsov's Ternary Principle,
                                  Bergman's Number System and Ternary
                                  Mirror-symmetrical Arithmetic  . . . . . 221--236
         Vladimir B. Balakirsky   A New Coding Algorithm for Trees . . . . 237--242
         Vladimir B. Balakirsky   Block Codes for Asynchronous Data
                                  Transmission Designed from Binary Trees  243--248
                  S. Conrad and   
             W. Hasselbring and   
                   A. James and   
                  D. Kambur and   
              R.-D. Kutsche and   
                      P. Thiran   Report on the EFIS 2001 Workshop . . . . 249--251
                  Ananda Amatya   Book Review  . . . . . . . . . . . . . . 252--252
                   Edward Smith   Book Review  . . . . . . . . . . . . . . 252--253
                Marco Locatelli   Book Review  . . . . . . . . . . . . . . 253--253
                  R. A. O'Keefe   Book Review  . . . . . . . . . . . . . . 253--254
                  Wai-hung Chan   Book Review  . . . . . . . . . . . . . . 254--255
                Claude Kirchner   Book Review  . . . . . . . . . . . . . . 255--256
                 Carl Pomerance   Book Review  . . . . . . . . . . . . . . 256--256

The Computer Journal
Volume 45, Number 3, 2002

                  Fionn Murtagh   Editorial: Statistics and Trends . . . . 259--259
       Gábor Huszerl and   
       István Majzik and   
    András Pataricza and   
      Konstantinos Kosmidis and   
                  Mario Dal Cin   Quantitative Analysis of UML Statechart
                                  Models of Dependable Systems . . . . . . 260--277
               Liu Zhenglin and   
                   Xu Chongyang   An Analytical Model for the Performance
                                  of the DOCSIS CATV Network . . . . . . . 278--284
                 G. E. Farr and   
                  C. S. Wallace   The Complexity of Strict Minimum Message
                                  Length Inference . . . . . . . . . . . . 285--292
           Goichiro Hanaoka and   
          Tsuyoshi Nishioka and   
              Yuliang Zheng and   
                    Hideki Imai   A Hierarchical Non-interactive
                                  Key-Sharing Scheme with Low Memory Size
                                  and High Resistance against Collusion
                                  Attacks  . . . . . . . . . . . . . . . . 293--303
               Ing-Ray Chen and   
                     Baoshan Gu   A Comparative Cost Analysis of
                                  Degradable Location Management
                                  Algorithms in Wireless Networks  . . . . 304--319
               Theo Ungerer and   
              Borut Robi\vc and   
                   Jurij \vSilc   Multithreaded Processors . . . . . . . . 320--348
                         Jie Wu   A Fault-tolerant Adaptive and Minimal
                                  Routing Scheme in $n$-D Meshes . . . . . 349--363
             James F. Korsh and   
                Paul LaFollette   Loopless Generation of Trees with
                                  Specified Degrees  . . . . . . . . . . . 364--372
                    Hiroo Iwata   Book Review  . . . . . . . . . . . . . . 373--373
                    Barry Munro   Book Review  . . . . . . . . . . . . . . 373--373
                     Rowan Limb   Book Review  . . . . . . . . . . . . . . 373--374
                    Simon Berry   Book Review  . . . . . . . . . . . . . . 374--374
                  David Menzies   Book Review  . . . . . . . . . . . . . . 374--375
                Arvind Aggarwal   Book Review  . . . . . . . . . . . . . . 375--375
              Margherita Napoli   Book Review  . . . . . . . . . . . . . . 375--376
            Geoffrey Archenhold   Book Review  . . . . . . . . . . . . . . 376--377
                Scott W. Ambler   Book Review  . . . . . . . . . . . . . . 377--377

The Computer Journal
Volume 45, Number 4, 2002

                      Anonymous   Capsule Reviews  . . . . . . . . . . . . 379--380
         Hazem T. El-Khatib and   
         M. Howard Williams and   
           David H. Marwick and   
           Lachlan M. Mackinnon   Using a Distributed Approach to Retrieve
                                  and Integrate Information from
                                  Heterogeneous Distributed Databases  . . 381--394
               Daeyoung Kim and   
                  Yann-Hang Lee   Periodic and Aperiodic Task Scheduling
                                  in Strongly Partitioned Integrated
                                  Real-time Systems  . . . . . . . . . . . 395--409
           Victor C. S. Lee and   
                Kwok-Wa Lam and   
                    Sang H. Son   Concurrency Control Using Timestamp
                                  Ordering in Broadcast Environments . . . 410--422
               Alan Roberts and   
          Antonios Symvonis and   
                  David R. Wood   Lower Bounds for One-to-one Packet
                                  Routing on Trees using Hot-Potato
                                  Algorithms . . . . . . . . . . . . . . . 423--435
                   Yang Jun and   
            Greg Michaelson and   
                   Phil Trinder   Explaining Polymorphic Types . . . . . . 436--452
      Constantinos Papadopoulos   An Extended Temporal Logic for CSCW  . . 453--472
                Claudio Fornaro   Book Review  . . . . . . . . . . . . . . 473--473
              Daniel D. G. Moth   Book Review  . . . . . . . . . . . . . . 473--474
                 Matthew Outram   Book Review  . . . . . . . . . . . . . . 474--474
                   Andrea Sanna   Book Review  . . . . . . . . . . . . . . 474--474
            André Grosse   Book Review  . . . . . . . . . . . . . . 475--475
                Paolo Montuschi   Book Review  . . . . . . . . . . . . . . 475--475
                Angela Bonifati   Book Review  . . . . . . . . . . . . . . 476--476
              Giuseppe Decandia   Book Review  . . . . . . . . . . . . . . 476--476
            Ing. Felice Tartaro   Book Review  . . . . . . . . . . . . . . 476--477
                  Ananda Amatya   Book Review  . . . . . . . . . . . . . . 477--477

The Computer Journal
Volume 45, Number 5, 2002

                      Anonymous   Capsule Reviews  . . . . . . . . . . . . 479--480
                 Janne Skyt and   
            Christian S. Jensen   Persistent Views --- A Mechanism for
                                  Managing Ageing Data . . . . . . . . . . 481--493
             B. John Oommen and   
                  Luis G. Rueda   The Efficiency of Histogram-like
                                  Techniques for Database Query
                                  Optimization . . . . . . . . . . . . . . 494--510
           Victoria S. Uren and   
                Thomas R. Addis   How Weak Categorizers Based Upon
                                  Different Principles Strengthen
                                  Performance  . . . . . . . . . . . . . . 511--524
            Irina Kozatchok and   
                  Samuel Pierre   User Tracking and Mobility Management
                                  Algorithm for Wireless Networks  . . . . 525--539
                    Wei Jie and   
                Wentong Cai and   
              Stephen J. Turner   POEMS: a Parallel Object-oriented
                                  Environment for Multi-computer Systems   540--560
                  Peter Sanders   Randomized Receiver Initiated
                                  Load-balancing Algorithms for
                                  Tree-shaped Computations . . . . . . . . 561--573
              Giuseppe Prencipe   Book Review  . . . . . . . . . . . . . . 574--575
         Elizabeth F. Churchill   Book Review  . . . . . . . . . . . . . . 575--577
                   Michele Zito   Book Review  . . . . . . . . . . . . . . 577--578
                Daniel Berleant   Book Review  . . . . . . . . . . . . . . 578--579
                Paolo Montuschi   Book Review  . . . . . . . . . . . . . . 579--579

The Computer Journal
Volume 45, Number 6, 2002

                      Anonymous   Capsule Reviews  . . . . . . . . . . . . 581--582
               Anna Formica and   
              Michele Missikoff   Concept Similarity in SymOntos: An
                                  Enterprise Ontology Management Tool  . . 583--594
           Paolo Bellavista and   
            Antonio Corradi and   
              Cesare Stefanelli   Java for On-line Distributed Monitoring
                                  of Heterogeneous Systems and Services    595--607
               Jonathan J. Cook   Reverse Execution of Java Bytecode . . . 608--619
                John Aycock and   
              R. Nigel Horspool   Practical Earley Parsing . . . . . . . . 620--630
            John W. Raymond and   
        Eleanor J. Gardiner and   
                  Peter Willett   RASCAL: Calculation of Graph Similarity
                                  using Maximum Common Edge Subgraphs  . . 631--644
               M. C. Little and   
          S. K. Shrivastava and   
                   N. A. Speirs   Using Bloom Filters to Speed-up Name
                                  Lookup in Distributed Systems  . . . . . 645--652
            Jarmo Siltaneva and   
             Erkki Mäkinen   A Comparison of Random Binary Tree
                                  Generators . . . . . . . . . . . . . . . 653--660
               Masayuki Abe and   
                 Masayuki Kanda   A Key Escrow Scheme with Time-Limited
                                  Monitoring for One-way Communication . . 661--671
            Wen-Shenq Juang and   
             Chin-Laung Lei and   
                 Horng-Twu Liaw   A Verifiable Multi-Authority Secret
                                  Election Allowing Abstention from Voting 672--682
        Massimo Franceschet and   
               Angelo Montanari   Book Review  . . . . . . . . . . . . . . 683--685
                     M. J. Pont   Book Review  . . . . . . . . . . . . . . 685--686
                 Andrea Valente   Book Review  . . . . . . . . . . . . . . 686--687
                    Marco Botta   Book Review  . . . . . . . . . . . . . . 687--688
                  Andrea Bobbio   Book Review  . . . . . . . . . . . . . . 688


The Computer Journal
Volume 46, Number 1, January, 2003

                      Anonymous   Capsule Reviews  . . . . . . . . . . . . 1--2
          Giuseppe Anastasi and   
                Marco Conti and   
                  Willy Lapenna   A Power-Saving Network Architecture for
                                  Accessing the Internet from Mobile
                                  Computers: Design, Implementation and
                                  Measurements . . . . . . . . . . . . . . 3--15
       Kim Potter Kihlstrom and   
            Louise E. Moser and   
            P. M. Melliar-Smith   Byzantine Fault Detectors for Solving
                                  Consensus  . . . . . . . . . . . . . . . 16--35
        Sotirios G. Ziavras and   
                  Qian Wang and   
        Paraskevi Papathanasiou   Viable Architectures for
                                  High-Performance Computing . . . . . . . 36--54
             Henning Pagnia and   
                Holger Vogt and   
          Felix C. Gärtner   Fair Exchange  . . . . . . . . . . . . . 55--75
   Frederic Paik Schoenberg and   
            Thomas Ferguson and   
                       Cheng Li   Inverting Dirichlet Tessellations  . . . 76--83
               Juan A. Carrasco   Transient Analysis of Rewarded
                                  Continuous Time Markov Models by
                                  Regenerative Randomization with Laplace
                                  Transform Inversion  . . . . . . . . . . 84--99
            Hsien-Wen Tseng and   
                Chin-Chen Chang   Construction of Symmetrical Reversible
                                  Variable Length Codes Using Backtracking 100--105
             James F. Korsh and   
             Paul S. LaFollette   Loopless Generation of Schröder Trees . . 106--113
                  Matteo Sereno   Book Review  . . . . . . . . . . . . . . 114--114
                  James J. Hunt   Book Review  . . . . . . . . . . . . . . 115--115
                 Adrian Hibbert   Book Review  . . . . . . . . . . . . . . 115--115
                   Enrico Macii   Book Review  . . . . . . . . . . . . . . 115--116
                   M. L. Sapino   Book Review  . . . . . . . . . . . . . . 116--116
                    Marco Botta   Book Review  . . . . . . . . . . . . . . 117--117
              Vincenzo Lombardo   Book Review  . . . . . . . . . . . . . . 117--119

The Computer Journal
Volume 46, Number 2, February, 2003

                      Anonymous   Capsule Reviews  . . . . . . . . . . . . 121--122
              J. M. Alvarez and   
                    M. Diaz and   
                  L. Llopis and   
                E. Pimentel and   
                    J. M. Troya   An Object-oriented Methodology for
                                  Embedded Real-time Systems . . . . . . . 123--145
          Giuseppe Anastasi and   
                Alberto Bartoli   On the Structuring of Reliable Multicast
                                  Protocols for Distributed Mobile Systems 146--160
                     Jun Wu and   
                Tei-Wei Kuo and   
                 Chih-wen Hsueh   R.C.P.C.P.: a Ceiling-based Protocol for
                                  Multiple-disk Environments . . . . . . . ??
                Tei-Wei Kuo and   
                Yen-Hsi Hou and   
                    Kam-Yiu Lam   The Impacts of Write-Through Procedures
                                  and Checkpointing on Real-Time
                                  Concurrency Control  . . . . . . . . . . 174--192
              Hung-Yu Chien and   
                    Jinn-Ke Jan   Robust and Simple Authentication
                                  Protocol . . . . . . . . . . . . . . . . 193--201
               Carlo Blundo and   
                 Clemente Galdi   Hiding Information in Image Mosaics  . . 202--212
                   Jixin Ma and   
                   Brian Knight   Representing The Dividing Instant  . . . 213--222
                       Rosa Meo   Book Review  . . . . . . . . . . . . . . 223--223
                   Antonio Lioy   Book Review  . . . . . . . . . . . . . . 223--224
          Juan Carlos De Martin   Book Review  . . . . . . . . . . . . . . 224

The Computer Journal
Volume 46, Number 3, May, 2003

                  Fionn Murtagh   In Memoriam: Roger Needham . . . . . . . 227--227
                      Anonymous   Capsule Reviews  . . . . . . . . . . . . 227--228
         Sourav S. Bhowmick and   
              Sanjay Madria and   
                   Wee Keong Ng   Representation of Web Data in a Web
                                  Warehouse  . . . . . . . . . . . . . . . 229--262
                   Mirko Viroli   A Type-Passing Approach for the
                                  Implementation of Parametric Methods in
                                  Java . . . . . . . . . . . . . . . . . . 263--294
                Florentin Ipate   On the Minimality of Stream X-machines   295--306
                  R. M. Hierons   Generating Candidates When Testing a
                                  Deterministic Implementation against a
                                  Non-deterministic Finite-state Machine   307--318
         Panayiotis Bozanis and   
      Alexandros Nanopoulos and   
            Yannis Manolopoulos   LR-tree: a Logarithmic Decomposable
                                  Spatial Index Method . . . . . . . . . . 319--331
                   Ingo Wegener   Book Review  . . . . . . . . . . . . . . 332--332
                  Georg Glaeser   Book Review  . . . . . . . . . . . . . . 332
                Luigi Portinale   Book Review  . . . . . . . . . . . . . . 332--333
                Luigi Portinale   Book Review  . . . . . . . . . . . . . . 333--334
                Emilio Leonardi   Book Review  . . . . . . . . . . . . . . 334--334
                Juraj Hromkovic   Book Review  . . . . . . . . . . . . . . 334--335

The Computer Journal
Volume 46, Number 4, July, 2003

                      Anonymous   Capsule Reviews  . . . . . . . . . . . . 337--339
            Fabio Patern\`o and   
                 Carmen Santoro   Support for Reasoning about Interactive
                                  Systems through Human-Computer
                                  Interaction Designers' Representations   340--357
             Randeep Bhatia and   
            Rakesh K. Sinha and   
                 Chung-Min Chen   A Hierarchical Technique for
                                  Constructing Efficient Declustering
                                  Schemes for Range Queries  . . . . . . . 358--377
                Xiaohua Jia and   
                  Deying Li and   
                Xiaodong Hu and   
                   Weili Wu and   
                     Dingzhu Du   Placement of Web-Server Proxies with
                                  Consideration of Read and Update
                                  Operations on the Internet . . . . . . . 378--390
               Alan Gibbons and   
            Aris Pagourtzis and   
               Igor Potapov and   
                Wojciech Rytter   Coarse-Grained Parallel Transitive
                                  Closure Algorithm: Path Decomposition
                                  Technique  . . . . . . . . . . . . . . . 391--400
         Christian Rinderknecht   An Algorithm for Validating ASN.1
                                  (X.680) Specifications using Set
                                  Constraints  . . . . . . . . . . . . . . 401--420
Ay\csegül Gençata and   
                   Feza Buzluca   Determining the Asynchronous Threshold
                                  Values of the Timed Token Medium Access
                                  Protocol . . . . . . . . . . . . . . . . 421--426
              Tak-Ming Chan and   
                  Sam Kwong and   
                      K. F. Man   Solving the Converter Placement Problem
                                  in WDM Ring Networks using Genetic
                                  Algorithms . . . . . . . . . . . . . . . 427--448
             Chang N. Zhang and   
                         Hua Li   Design of Reconfigurable VLSI
                                  Architecture for Hybrid Arithmetic in
                                  $GF(2^m)$  . . . . . . . . . . . . . . . 449--460
                  Pascal Zimmer   Book Review  . . . . . . . . . . . . . . 461--461
                 Sinan Si Alhir   Book Review  . . . . . . . . . . . . . . 461--462
                  Aladdin Ayesh   Book Review  . . . . . . . . . . . . . . 462--462
                      John Hunt   Book Review  . . . . . . . . . . . . . . 462--463
                   Viviana Bono   Book Review  . . . . . . . . . . . . . . 463--464

The Computer Journal
Volume 46, Number 5, September, 2003

                      Anonymous   Capsule Reviews  . . . . . . . . . . . . 465--466
            Sameer Bataineh and   
             Ghassan E. Qanzu'a   Reliable Omega Interconnected Network
                                  for Large-Scale Multiprocessor Systems   467--475
             Siddhartha Rai and   
                  Priti Shankar   Efficient Statistical Modeling for the
                                  Compression of Tree Structured
                                  Intermediate Code  . . . . . . . . . . . 476--486
                S. T. Klein and   
                     Y. Wiseman   Parallel Huffman Decoding with
                                  Applications to JPEG Files . . . . . . . 487--497
 Alexandros V. Gerbessiotis and   
     Constantinos J. Siniolakis   Increasing the Efficiency of Existing
                                  Sorting Algorithms by Using Randomized
                                  Wrappers . . . . . . . . . . . . . . . . 498--504
                Daniel Yuh Chao   Extended Synchronized Choice Nets  . . . 505--523
                   Antonio Lioy   Book Review  . . . . . . . . . . . . . . 524--524
                     Jon Timmis   Book Review  . . . . . . . . . . . . . . 524--525
                Greg Michaelson   Book Review  . . . . . . . . . . . . . . 525--525
              Ferruccio Damiani   Book Review  . . . . . . . . . . . . . . 525--526
                     Frank Land   Book Review  . . . . . . . . . . . . . . 526--526
               Awais Rashid and   
                    Lynne Blair   Editorial: Aspect-oriented Programming
                                  and Separation of Crosscutting Concerns  527--528
             Marcelo Sihman and   
                    Shmuel Katz   Superimpositions and Aspect-oriented
                                  Programming  . . . . . . . . . . . . . . 529--541
David H. Lorenz Karl Lieberherr and   
                 Johan Ovlinger   Aspectual Collaborations: Combining
                                  Modules and Aspects  . . . . . . . . . . 542--565
                 Tony Clark and   
                 Andy Evans and   
                    Stuart Kent   Aspect-oriented Metamodelling  . . . . . 566--577
               Ian S. Welch and   
               Robert J. Stroud   Re-engineering Security as a
                                  Crosscutting Concern . . . . . . . . . . 578--589

The Computer Journal
Volume 46, Number 6, November, 2003

                      Anonymous   Capsule Reviews  . . . . . . . . . . . . 591--592
                 Caroline Kovac   Computing in the Age of the Genome . . . 593--597
              Ray J. Solomonoff   The Kolmogorov Lecture: The Universal
                                  Distribution and Machine Learning  . . . 598--601
                    Vesper Owei   Development of a Conceptual Query
                                  Language: Adopting the User-Centered
                                  Methodology  . . . . . . . . . . . . . . 602--624
                       Keqin Li   Speed-up of Parallel Processing of
                                  Divisible Loads on $k$-dimensional
                                  Meshes and Tori  . . . . . . . . . . . . 625--631
                Volker Heun and   
                  Ernst W. Mayr   Efficient Embeddings into Hypercube-like
                                  Topologies . . . . . . . . . . . . . . . 632--644
               Ing-Ray Chen and   
                   Naresh Verma   A Cost-Based Admission Control Algorithm
                                  for Digital Library Multimedia Systems
                                  Storing Heterogeneous Objects  . . . . . 645--659
                    Alok Mishra   Book Review  . . . . . . . . . . . . . . 660--660
            Richard Baskerville   Book Review  . . . . . . . . . . . . . . 660--660
                  Liquori Luigi   Book Review  . . . . . . . . . . . . . . 661--661
                       Rosa Meo   Book Review  . . . . . . . . . . . . . . 661--661
            Yannis Manolopoulos   Introduction to the Special Section on
                                  Spatiotemporal Databases . . . . . . . . 662--663
   Stéphane Grumbach and   
            Philippe Rigaux and   
                   Luc Segoufin   Handling Interpolated Data . . . . . . . 664--679
José Antonio Cotelo Lema and   
              Luca Forlizzi and   
   Ralf Hartmut Güting and   
            Enrico Nardelli and   
               Markus Schneider   Algorithms for Moving Objects Databases  680--712
             Yannis Theodoridis   Ten Benchmark Database Queries for
                                  Location-based Services  . . . . . . . . 713--725


The Computer Journal
Volume 47, Number 1, January, 2004

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 1--3
                   Peter Wegner   New Models of Computation  . . . . . . . 4
       George F. Georgakopoulos   Generalized Template Splay: a Basic
                                  Theory and Calculus  . . . . . . . . . . 10
                     Amir Sapir   The Tower of Hanoi with Forbidden Moves  20
                Roberto Barbuti   Analyzing Information Flow Properties in
                                  Assembly Code by Abstract Interpretation 25
                   Ziya Arnavut   Inversion Coding . . . . . . . . . . . . 46
                   Masayuki Abe   Combining Encryption and Proof of
                                  Knowledge in the Random Oracle Model . . 58
                        Ying Xu   Model Checking for a First-Order
                                  Temporal Logic Using Multiway Decision
                                  Graphs (MDGs)  . . . . . . . . . . . . . 71
                L. C. P. Albini   Diagnosis of Symmetric Graphs Under the
                                  BGM Model  . . . . . . . . . . . . . . . 85
                Ahmad A. Hiasat   A Suggestion for a Fast Residue
                                  Multiplier for a Family of Moduli of the
                                  Form $(2 n - (2 p \pm 1))$ . . . . . . . 93
                Zhongqiang Chen   Building Footprint Simplification
                                  Techniques and Their Effects on Radio
                                  Propagation Predictions  . . . . . . . . 103
                  Erik Reinhard   Tomas Akenine-Möller and Eric Haines:
                                  Real-Time Rendering, 2nd edition . . . . 134
                  Adrian Colyer   Ramnivas Laddad: AspectJ in
                                  Action-Practical Aspect-Oriented
                                  Programming  . . . . . . . . . . . . . . 134--135
          Jean-Pierre Jouannaud   Terese: Term Rewriting Systems . . . . . 135

The Computer Journal
Volume 47, Number 2, March, 2004

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 137--139
                 Chian Wang and   
               Chung-Ming Huang   Synchronization Schemes for Controlling
                                  VCR-Like User Interactions in
                                  Interactive Multimedia-on-Demand (MOD)
                                  Systems  . . . . . . . . . . . . . . . . 140--152
              Sheau-Ru Tong and   
                Yuan-Tse Yu and   
               Chung-Ming Huang   Efficient Region Layouts for
                                  Region-based Video Servers Employing
                                  Multi-zone Disks . . . . . . . . . . . . 153--168
                Ting-Yu Lin and   
              Yu-Chee Tseng and   
                   Yuan-Ting Lu   An Efficient Link Polling Policy by
                                  Pattern Matching for Bluetooth Piconets  169--178
          Ahmad R. Sharafat and   
               Mehran S. Fallah   A Framework for the Analysis of Denial
                                  of Service Attacks . . . . . . . . . . . 179--192
         Hans L. Bodlaender and   
                  Ton Kloks and   
             Richard B. Tan and   
                Jan Van Leeuwen   Approximations for $\lambda$-Colorings
                                  of Graphs  . . . . . . . . . . . . . . . 193--204
    Aleksander Laurentowski and   
          Krzysztof Zieli\'nski   Experiences from Implementation and
                                  Evaluation of Event Processing and
                                  Distribution of Notifications in an
                                  Object Monitoring Service  . . . . . . . 205--220
                  Qiang Zhu and   
               Brian Dunkel and   
                   Wing Lau and   
                 Suyun Chen and   
                 Berni Schiefer   Piggyback Statistics Collection for
                                  Query Optimization: Towards a
                                  Self-Maintaining Database Management
                                  System . . . . . . . . . . . . . . . . . 221--244
        Hans Vandierendonck and   
              Koen De Bosschere   On Generating Set Index Functions for
                                  Randomized Caches  . . . . . . . . . . . 245--258
                  Joan M. Lucas   Untangling Binary Trees via Rotations    259--269
                Mika Hirvensalo   Book Review: Quantum Computation: A
                                  Grand Mathematical Challenge for the
                                  Twenty-First Century and the Millennium,
                                  by Samuel J. Lomonaco, Jr. (ed.) . . . . 270--270
      Simona Ronchi Della Rocca   Book Review: Abstract State Machines ---
                                  A Method for High-Level System Design
                                  and Analysis, by Egon Boerger and Robert
                                  Staerk . . . . . . . . . . . . . . . . . 270--271
    Niels Bjòrn-Andersen   Book Review: Redesigning Human Systems
                                  --- InfoSCI 2003 by Enid Mumford . . . . 271--271
       Miguel A. Vega-Rodriguez   Book Review: Feature Extraction and
                                  Image Processing, by Mark S. Nixon and
                                  Alberto S. Aguado  . . . . . . . . . . . 271--272
                Jochen Schiller   Book Review: Mobile Commerce and
                                  Wireless Computing Systems by Nigel
                                  Phillips and Geoffrey Elliott  . . . . . 272--273

The Computer Journal
Volume 47, Number 3, May, 2004

                      Anonymous   Capsule Reviews  . . . . . . . . . . . . 275--277
           Alvin T. S. Chan and   
             Siu-Nam Chuang and   
               Jiannong Cao and   
                  Hong-Va Leong   An Event-Driven Middleware for Mobile
                                  Context Awareness  . . . . . . . . . . . 278--288
              Ajoy K. Datta and   
           Maria Gradinariu and   
       Sébastien Tixeuil   Self-Stabilizing Mutual Exclusion Under
                                  Arbitrary Scheduler* . . . . . . . . . . 289--298
          G. Latif-Shabgahi and   
                 J. M. Bass and   
                     S. Bennett   Multiple Error Filtering in Cyclic
                                  Systems  . . . . . . . . . . . . . . . . 299--308
                 S. Perkins and   
                D. H. Smith and   
                       A. Ryley   Robust Data Compression: Consistency
                                  Checking in the Synchronization of
                                  Variable Length Codes  . . . . . . . . . 309--319
                     Hua Li and   
                 Chang N. Zhang   A Cellular Automata Based Reconfigurable
                                  Architecture for Hybrid Cryptosystems    320--328
    Christoforos N. Hadjicostis   Coding Techniques for Fault-Tolerant
                                  Parallel Prefix Computations in Abelian
                                  Groups . . . . . . . . . . . . . . . . . 329--341
              Luis Iribarne and   
       José M. Troya and   
             Antonio Vallecillo   A Trading Service for COTS Components    342--357
              Evelina Lamma and   
                Paola Mello and   
               Fabrizio Riguzzi   A System for Measuring Function Points
                                  from an ER-DFD Specification . . . . . . 358--372
              Lih Chyun Shu and   
          John A. Stankovic and   
                    Sang H. Son   Achieving Bounded and Predictable
                                  Recovery using Real-Time Logging . . . . 373--394
                 Andreas Kerren   Book Review: \booktitleSoftware
                                  Visualization --- From Theory to
                                  Practice, by Kang Zhang  . . . . . . . . 395--395
          Geraldine Fitzpatrick   Book Review: \booktitleDesigning
                                  Collaborative Systems: A Practical Guide
                                  to Ethnography, by Andy Crabtree . . . . 395--396
               Cdric Lhoussaine   Book Review: \booktitleThe Pi-Calculus
                                  --- A Theory of Mobile Processes, by D.
                                  Sangiorgi and D. Walker  . . . . . . . . 396--396
              Priya Seetharaman   Book Review: \booktitleBeyond Fear ---
                                  Thinking Sensibly About Security in an
                                  Uncertain World, by Bruce Schneier . . . 397--397

The Computer Journal
Volume 47, Number 4, July, 2004

                  Jack Dongarra   The Boole Lecture: Trends in High
                                  Performance Computing  . . . . . . . . . 399--403
               Ing-Ray Chen and   
               Luiz DaSilva and   
                  Scott Midkiff   Editorial: Mobile and Pervasive
                                  Computing  . . . . . . . . . . . . . . . 404
         Vincent W.-S. Feng and   
                  Lin-Yi Wu and   
                Yi-Bing Lin and   
                   Whai-En Chen   WGSN: WLAN-based GPRS Support Node with
                                  Push Mechanism . . . . . . . . . . . . . 405--417
            K. L. Eddie Law and   
                       Sunny So   Pervasive Computing on Active Networks   418--431
          Christian Bettstetter   On the Connectivity of Ad Hoc Networks   432--447
              Yu-Chee Tseng and   
               Sheng-Po Kuo and   
               Hung-Wei Lee and   
                   Chi-Fu Huang   Location Tracking in a Wireless Sensor
                                  Network by Mobile Agents and Its Data
                                  Fusion Strategies  . . . . . . . . . . . 448--460
          Georgia Koloniari and   
              Evaggelia Pitoura   Filters for XML-based Service Discovery
                                  in Pervasive Computing . . . . . . . . . 461--474
                Porlin Kang and   
            Cristian Borcea and   
                    Gang Xu and   
            Akhilesh Saxena and   
              Ulrich Kremer and   
                   Liviu Iftode   Smart Messages: a Distributed Computing
                                  Platform for Networks of Embedded
                                  Systems  . . . . . . . . . . . . . . . . 475--494
             Dejan Raskovic and   
              Thomas Martin and   
                   Emil Jovanov   Medical Monitoring Applications for
                                  Wearable Computing . . . . . . . . . . . 495--504
                 Gustavo Alonso   Book Review: \booktitlePerspectives on
                                  Web Services --- Applying SOAP, WSDL and
                                  UDDI to Real-World Projects, by O.
                                  Zimmermann and M. Tomlinson and S.
                                  Peuser . . . . . . . . . . . . . . . . . 505--505
            Luís C. Lamb   Book Review: \booktitleLogics for
                                  Emerging Applications of Databases,
                                  edited by J. Chomicki and R. van der
                                  Meyden and G. Saake  . . . . . . . . . . 505--506
   Javier Farreres De La Morena   Book Review: \booktitleThe Functional
                                  Approach to Data Management-Modeling,
                                  Analyzing and Integrating Heterogeneous
                                  Data, edited by P. M. D. Gray and L.
                                  Kerschberg and P. J. H. King and A.
                                  Poulovassilis  . . . . . . . . . . . . . 506--507
                    Alok Mishra   Book Review: \booktitleUML Xtra-Light
                                  --- How to Specify Your Software
                                  Requirements, by M. Kratochvíl and B.
                                  McGibbon . . . . . . . . . . . . . . . . 507--507
              Luis M. Contreras   Book Review: \booktitleData Networks, IP
                                  and the Internet: Protocols, Design and
                                  Operation, by M. P. Clark  . . . . . . . 507

The Computer Journal
Volume 47, Number 5, September, 2004

                      Anonymous   Capsule Reviews  . . . . . . . . . . . . 509--510
             Luigi Catuogno and   
                  Ivan Visconti   An Architecture for Kernel-Level
                                  Verification of Executables at Run Time  511--526
          Kamilla Klonowska and   
              Lars Lundberg and   
     Håkan Lennerstad and   
                 Magnus Broberg   Comparing the Optimal Performance of
                                  Parallel Architectures . . . . . . . . . 527--544
                  N. Glinos and   
                D. B. Hoang and   
                  C. Nguyen and   
                    A. Symvonis   Video-on-Demand Based on
                                  Delayed-Multicast: Algorithmic Support   545--559
                  Hsung-Pin and   
                      Chang and   
                Ray-I Chang and   
              Wei-Kuan Shih and   
               Ruei-Chuan Chang   Cache-Aware Real-Time Disk Scheduling    560--578
              Chia-Mei Chen and   
               Huey-Min Sun and   
                   LihChyun Shu   Optimizing Object-based Multimedia
                                  Delivery Across Bandwidth Constrained
                                  Networks . . . . . . . . . . . . . . . . 579--590
                   Anna Formica   Legality of XML-Schema Type Hierarchies  591--601
              Shan-Tai Chen and   
                  Shun-Shii Lin   Optimal Algorithms for $2 \times n$
                                  Mastermind Games --- a Graph-Partition
                                  Approach . . . . . . . . . . . . . . . . 602--611
             James F. Korsh and   
             Paul S. LaFollette   Loopless Array Generation of Multiset
                                  Permutations . . . . . . . . . . . . . . 612--621
                 Nigel Phillips   Book Review: \booktitleMobile
                                  Communications, by Jochen Schiller . . . 622--622
                Isa Servan Uzun   Book Review: \booktitleCryptographic
                                  Security Architecture --- Design and
                                  Verification, by Peter Gutmann . . . . . 622--623
               Satish K. Sehgal   Book Review: \booktitleUnderstanding
                                  Agent Systems, by Mark d'Inverno and
                                  Michael Luck . . . . . . . . . . . . . . 623--623
                      Lin-Yi Wu   Corrigendum: ``WGSN: WLAN-based GPRS
                                  Support Node with Push Mechanism'' . . . 624--624

The Computer Journal
Volume 47, Number 6, November, 2004

                      Anonymous   Capsule Reviews  . . . . . . . . . . . . 625--626
                Zhihong Zuo and   
                  Mingtian Zhou   Some Further Theoretical Results about
                                  Computer Viruses . . . . . . . . . . . . 627--633
          Andrea Bondavalli and   
              Roberto Filippini   Modeling and Analysis of a Scheduled
                                  Maintenance System: a DSPN Approach  . . 634--650
 José De Oliveira Guimar   The Green Language Exception System  . . 651--661
                   Hui Wang and   
                     David Bell   Extended $k$-Nearest Neighbours based on
                                  Evidence Theory  . . . . . . . . . . . . 662--672
              Byung Suk Lee and   
                    Li Chen and   
                 Jeff Buzas and   
                  Vinod Kannoth   Regression-Based Self-Tuning Modeling of
                                  Smooth User-Defined Function Costs for
                                  an Object-Relational Database Management
                                  System Query Optimizer . . . . . . . . . 673--693
                  Ling Chen and   
                     Yi Pan and   
                 Yixin Chen and   
                    Xiao-hua Xu   Efficient Parallel Algorithms for
                                  Euclidean Distance Transform . . . . . . 694--700
            Hsien-Wen Tseng and   
                Chin-Chen Chang   A Branch-and-Bound Algorithm for the
                                  Construction of Reversible Variable
                                  Length Codes . . . . . . . . . . . . . . 701--707
           David G. Elliman and   
              Sherin M. Youssef   A New Intelligent Agent-based Strategy
                                  for Constrained Multiple Destination
                                  Routing Problems . . . . . . . . . . . . 708--727
                    Alok Mishra   Book Review: \booktitleSoftware Quality
                                  Assurance --- From Theory to
                                  Implementation, by D. Galin  . . . . . . 728--728
                    B. Kelleher   Book Review: \booktitleShaping the IT
                                  Organization: The Impact of Outsourcing
                                  and the New Business Model, by I. Gouge  728--729


The Computer Journal
Volume 48, Number 1, January, 2005

                      Anonymous   Capsule Reviews  . . . . . . . . . . . . 1--3
         Vladimir B. Balakirsky   Hashing of Databases with the Use of
                                  Metric Properties of the Hamming Space   4--16
                 Andrew Rae and   
                    Colin Fidge   Information Flow Analysis for
                                  Fail-Secure Devices  . . . . . . . . . . 17--26
              Hung-Yu Chien and   
             Ren-Chiun Wang and   
                 Chou-Chen Yang   Note on Robust and Simple Authentication
                                  Protocol . . . . . . . . . . . . . . . . 27--29
                 Wei Yi Liu and   
                  Ning Song and   
                       Hong Yao   Temporal Functional Dependencies and
                                  Temporal Nodes Bayesian Networks . . . . 30--41
          Andrew McGettrick and   
                Roger Boyle and   
              Roland Ibbett and   
                 John Lloyd and   
          Gillian Lovegrove and   
                   Keith Mander   Grand Challenges in Computing: Education
                                  --- a Summary  . . . . . . . . . . . . . 42--48
                 Tony Hoare and   
                   Robin Milner   Grand Challenges for Computing Research  49--52
           Chung-Ming Huang and   
                    Tz-Heng Hsu   A Resource Exchange Architecture for
                                  Peer-to-Peer File Sharing Applications   53--71
          Jean-Pierre Ebert and   
              Daniel Hollos and   
                Holger Karl and   
              Marc Löbbers   Does Multi-Hop Communication Reduce
                                  Electromagnetic Exposure?  . . . . . . . 72--83
                Kam-Yiu Lam and   
                 BiYu Liang and   
                 ChuanLin Zhang   On Using Handoff Statistics and Velocity
                                  for Location Management in Cellular
                                  Wireless Networks  . . . . . . . . . . . 84--100
                   Guang-Ho Cha   The Segment-Page Indexing Method for
                                  Large Multidimensional Queries . . . . . 101--114
          Brian J. D'Auriol and   
             Rajesh Molakaseema   A Parameterized Linear Array with a
                                  Reconfigurable Pipelined Bus System:
                                  LARPBS(p)  . . . . . . . . . . . . . . . 115--125
                    Alison Holt   Book Review: \booktitleMOF, A Pocket
                                  Guide-IT Service Operations Management,
                                  by D. Pultorak, P. Quagliarello, R.
                                  Akker and J. van Bon . . . . . . . . . . 126--126
            Vladimir Geroimenko   Book Review: \booktitleA Semantic Web
                                  Primer, by G. Antoniou and F. van
                                  Harmelen . . . . . . . . . . . . . . . . 126--126

The Computer Journal
Volume 48, Number 2, March, 2005

                Capsule reviews   Capsule Reviews  . . . . . . . . . . . . 127--129
Mercedes Gómez-Albarrán   The Teaching and Learning of
                                  Programming: a Survey of Supporting
                                  Software Tools . . . . . . . . . . . . . 130--144
                     Fred Piper   Turing Lecture: Cyberworld Security ---
                                  the Good, the Bad and the Ugly . . . . . 145--156
                Florentin Ipate   On the Minimality of Finite Automata and
                                  Stream X-machines for Finite Languages   157--167
            Chin-Chen Chang and   
                  Chih-Yang Lin   Perfect Hashing Schemes for Mining
                                  Association Rules  . . . . . . . . . . . 168--179
        Valentin E. Brimkov and   
              Reneta P. Barneva   Analytical Honeycomb Geometry for Raster
                                  and Volume Graphics  . . . . . . . . . . 180--199
            Ghada Hany Badr and   
                 B. John Oommen   Self-Adjusting of Ternary Search Tries
                                  Using Conditional Rotations and
                                  Randomized Heuristics  . . . . . . . . . 200--219
             Antonio Corral and   
        Michael Vassilakopoulos   On Approximate Algorithms for
                                  Distance-Based Queries using R-trees . . 220--238
 Sébastien Cantarell and   
              Ajoy K. Datta and   
               Franck Petit and   
                Vincent Villain   Group Mutual Exclusion in Token Rings    239--252
                    Peter Mares   Book Review: \booktitleArt of Java Web
                                  Development, by N. Ford  . . . . . . . . 253--253
                      Anonymous   Acknowledgement of Referees  . . . . . . 254--256

The Computer Journal
Volume 48, Number 3, May, 2005

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 257--258
                   K. Subramani   A Comprehensive Framework for Specifying
                                  Clairvoyance, Constraints and
                                  Periodicity in Real-Time Scheduling  . . 259--272
          Güray Yilmaz and   
                  Nadia Erdogan   DCOBE: Distributed Composite
                                  Object-Based Environment . . . . . . . . 273--291
        Alexander Thomasian and   
                     Chunqi Han   Affinity-Based Routing in Zoned Mirrored
                                  Disks  . . . . . . . . . . . . . . . . . 292--299
               Atakan Dogan and   
   Füsun Özgüner   Biobjective Scheduling Algorithms for
                                  Execution Time--Reliability Trade-off in
                                  Heterogeneous Computing Systems  . . . . 300--314
                 S. Perkins and   
                    D. H. Smith   Robust Data Compression: Variable Length
                                  Codes and Burst Errors . . . . . . . . . 315--322
          Aad P. A. van Moorsel   Grid, Management and Self-Management . . 325--332
           Mohammed H. Haji and   
               Iain Gourlay and   
              Karim Djemame and   
                   Peter M. Dew   A SNAP-Based Community Resource Broker
                                  Using a Three-Phase Commit Protocol: a
                                  Performance Study  . . . . . . . . . . . 333--346
              D. P. Spooner and   
                     J. Cao and   
               S. A. Jarvis and   
                      L. He and   
                     G. R. Nudd   Performance-Aware Workflow Management
                                  for Grid Computing . . . . . . . . . . . 347--357
     Andrew Stephen McGough and   
                  Ali Afzal and   
            John Darlington and   
          Nathalie Furmento and   
              Anthony Mayer and   
                   Laurie Young   Making the Grid Predictable through
                                  Reservations and Performance Modelling   358--368
                  A. Benoit and   
                    M. Cole and   
                 S. Gilmore and   
                    J. Hillston   Scheduling Skeleton-Based Grid
                                  Applications Using PEPA and NWS  . . . . 369--378
                   Nigel Thomas   Editorial: Grid Performability . . . . . 323--324
                     Paul Hulse   Review: \booktitleBeowulf Cluster
                                  Computing with Linux, Second Edition . . 379--380
                    Haoyang Che   Review: \booktitleFrom P2P to Web
                                  Services and Grids: Peers in a
                                  Client/Server World  . . . . . . . . . . 379

The Computer Journal
Volume 48, Number 4, July, 2005

                  Fionn Murtagh   Editorial  . . . . . . . . . . . . . . . 381
            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 382--384
                  Jane Hillston   Tuning Systems: From Composition to
                                  Performance  . . . . . . . . . . . . . . 385--400
        Mónica Pinto and   
              Lidia Fuentes and   
 José María Troya   A Dynamic Component and Aspect-Oriented
                                  Platform . . . . . . . . . . . . . . . . 401--420
              R. M. Hierons and   
                  M. Harman and   
                      C. J. Fox   Branch-Coverage Testability
                                  Transformation for Unstructured Programs 421--436
             Hyung-Kyu Choi and   
               Yoo C. Chung and   
                  Soo-Mook Moon   Java Memory Allocation with Lazy Worst
                                  Fit for Small Objects  . . . . . . . . . 437--442
          Santanu Chattopadhyay   Area Conscious State Assignment with
                                  Flip-Flop and Output Polarity Selection
                                  for Finite State Machine Synthesis --- a
                                  Genetic Algorithm Approach . . . . . . . 443--450
            Lieven Eeckhout and   
                    Yue Luo and   
          Koen De Bosschere and   
                   Lizy K. John   BLRL: Accurate and Efficient Warmup for
                                  Sampled Processor Simulation . . . . . . 451--459
               Paul O'Neill and   
                Karl Fraser and   
                Zidong Wang and   
                Paul Kellam and   
               Joost N. Kok and   
                    Xiaohui Liu   Pyramidic Clustering of Large-Scale
                                  Microarray Images  . . . . . . . . . . . 466--479
                  Yuh-Min Tseng   A Robust Multi-Party Key Agreement
                                  Protocol Resistant to Malicious
                                  Participants . . . . . . . . . . . . . . 480--487
                 James F. Korsh   Generating $T$-ary Trees in Linked
                                  Representation . . . . . . . . . . . . . 488--497
           Nikolaj A. Kuznetsov   The Science of Infocommunications  . . . 460--465
                 Daniel O'Leary   Review: \booktitleOntologies: A Silver
                                  Bullet for Knowledge Management and
                                  Electronic Commerce  . . . . . . . . . . 498
                         Yi Pan   Review: \booktitleActive Services:
                                  Concepts, Architecture and
                                  Implementation . . . . . . . . . . . . . 498--499
                  J. Sethuraman   Review: \booktitleNetwork Recovery:
                                  Protection and Restoration of Optical,
                                  SONET-SDH, IP, and MPLS  . . . . . . . . 499--500

The Computer Journal
Volume 48, Number 5, September, 2005

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 501
            Marios C. Angelides   Editorial: Working with Multimedia
                                  Standards: MPEG-7, MPEG-21 and H.264 . . 502--503
                 Hari Kalva and   
                    Borko Furht   Complexity Estimation of the H.264 Coded
                                  Video Bitstreams . . . . . . . . . . . . 504--513
      Herbert Van de Sompel and   
             Jeroen Bekaert and   
               Xiaoming Liu and   
            Luda Balakireva and   
             Thorsten Schwander   aDORe: a Modular, Standards-Based
                                  Digital Object Repository  . . . . . . . 514--535
             William Grosky and   
               Nilesh Patel and   
                     Xin Li and   
                Farshad Fotouhi   Dynamically Emerging Semantics in an
                                  MPEG-7 Image Database  . . . . . . . . . 536--544
                Harry Agius and   
            Marios C. Angelides   COSMOS-7: Video-Oriented MPEG-7 Scheme
                                  for Modelling and Filtering of Semantic
                                  Content  . . . . . . . . . . . . . . . . 545--562
           Anastasis Sofokleous   Review: \booktitleH.264 and MPEG-4 Video
                                  Compression: Video Coding for
                                  Next-generation Multimedia . . . . . . . 563
                   Minaz Parmar   Review: \booktitleDistributed Multimedia
                                  Database Technologies Supported by
                                  MPEG-7 and MPEG-21 . . . . . . . . . . . 563--564
            Elizabeth Scott and   
               Adrian Johnstone   Generalized Bottom Up Parsers With
                                  Reduced Stack Activity . . . . . . . . . 565--587
                Xinmin Tian and   
              Milind Girkar and   
                   Aart Bik and   
                   Hideki Saito   Practical Compiler Techniques on
                                  Efficient Multithreaded Code Generation
                                  for OpenMP Programs  . . . . . . . . . . 588--601
          René Meier and   
                   Vinny Cahill   Taxonomy of Distributed Event-Based
                                  Programming Systems  . . . . . . . . . . 602--626

The Computer Journal
Volume 48, Number 6, November, 2005

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 627--629
              J. Djordjevic and   
                 B. Nikolic and   
                    M. Mitrovic   A Memory System for Education  . . . . . 630--641
                Leonid A. Levin   Aperiodic Tilings: Breaking
                                  Translational Symmetry . . . . . . . . . 642--645
          Martin Campbell-Kelly   Celebration of David Wheeler
                                  (1927--2004) . . . . . . . . . . . . . . 646--648
                David W. Barron   David Wheeler: a Personal Memoir . . . . 650--651
        Lefteris Moussiades and   
                  Athena Vakali   PDetect: a Clustering Approach for
                                  Detecting Plagiarism in Source Code
                                  Datasets . . . . . . . . . . . . . . . . 651--661
               Charlie Daly and   
                    Jane Horgan   A Technique for Detecting Plagiarism in
                                  Computer Code  . . . . . . . . . . . . . 662--666
                     Fei He and   
                    Ming Gu and   
                Xiaoyu Song and   
                Zhiwei Tang and   
                 Guowu Yang and   
                   Lerong Cheng   Probabilistic Estimation for Routing
                                  Space  . . . . . . . . . . . . . . . . . 667--676
               Dana Shapira and   
                James A. Storer   In Place Differential File Compression   677--691
                    Li Jiao and   
              To-Yat Cheung and   
                     Weiming Lu   Handling Synchronization Problem in
                                  Petri Net-Based System Design by
                                  Property-Preserving Transition-Reduction 692--701
            Alexander Thomasian   Clustered RAID Arrays and Their Access
                                  Costs  . . . . . . . . . . . . . . . . . 702--713
              Manuel Torres and   
              José Samos   A Methodology to Define External Schemas
                                  in ODMG Databases  . . . . . . . . . . . 714--736
          Sebastian Danicic and   
                  Chris Fox and   
                Mark Harman and   
                Rob Hierons and   
               John Howroyd and   
            Michael R. Laurence   Static Program Slicing Algorithms are
                                  Minimal for Free Liberal Program Schemas 737--748
                 T. M. Chan and   
                  K. F. Man and   
                 K. S. Tang and   
                       S. Kwong   A Jumping Gene Algorithm for
                                  Multiobjective Resource Management in
                                  Wideband CDMA Systems  . . . . . . . . . 749--768


The Computer Journal
Volume 49, Number 1, January, 2006

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 1--3
               Robert M. Colomb   Formal versus Material Ontologies for
                                  Information Systems Interoperation in
                                  the Semantic Web . . . . . . . . . . . . 4--19
              Duncan Martin and   
                   Helen Ashman   Atomic Hypermedia  . . . . . . . . . . . 20--31
                   Jixin Ma and   
                      Pat Hayes   Primitive Intervals versus Point-Based
                                  Intervals: Rivals or Allies? . . . . . . 32--41
              Gianluca Dini and   
          Giuseppe Lettieri and   
             Lanfranco Lopriore   Caching and prefetching algorithms for
                                  programs with looping reference patterns 42--61
         Nikos A. Lorentzos and   
            Jose R. R. Viqueira   Relational Formalism for the Management
                                  of Spatial Data  . . . . . . . . . . . . 62--81
             Miguel Correia and   
        Nuno Ferreira Neves and   
         Paulo Veríssimo   From Consensus to Atomic Broadcast:
                                  Time-Free Byzantine-Resistant Protocols
                                  without Signatures . . . . . . . . . . . 82--96
                  S. Cimato and   
               R. De Prisco and   
                   A. De Santis   Probabilistic Visual Cryptography
                                  Schemes  . . . . . . . . . . . . . . . . 97--107
               Alexei Vernitski   Can Unbreakable Mean Incomputable? . . . 108--112
Pablo H. Ibargüengoytia and   
               Sunil Vadera and   
               L. Enrique Sucar   A Probabilistic Model for Information
                                  and Sensor Validation  . . . . . . . . . 113--126
                    Jaime Gomez   Book Review: Stefano Ceri, Piero
                                  Fraternali, Aldo Bongio, Marco
                                  Brambilla, Sara Comai and Maristella
                                  Matera, \booktitleDesigning
                                  Data-Intensive Web Applications, Morgan
                                  Kaufmann Publishers (2003). ISBN
                                  1-55860-843-5. \$59.95/ 58.90. 562 pp.
                                  Softbound} . . . . . . . . . . . . . . . 127
                 Lech Polkowski   Book Review: Una-May O'Reilly, Tina Yu,
                                  Rick Riolo and Bill Worzel (eds),
                                  \booktitleGenetic Programming Theory and
                                  Practice II, Springer Science+Business
                                  Media, Inc. (2005). ISBN 0-387-23253-2.
                                  \$129.00. 320 pp. Hardbound} . . . . . . 127--128
                    Mark Levene   Book Review: A. Spink and B. J. Jansen,
                                  \booktitleWeb Search: Public Searching
                                  of the Web. Information Science &
                                  Knowledge Management, Vol. 6. Kluwer
                                  Academic Publishers (2004). ISBN
                                  1-4020-2268-9. 100. 199 pp. Hardcover    128--129
              Anas N. Al-Rabadi   Book Review: Lee Spector,
                                  \booktitleAutomatic Quantum Computer
                                  Programming: A Genetic Programming
                                  Approach, Kluwer Academic Publishers
                                  (2004). ISBN 1-4020-7894-3. 153 pp . . . 129--130
                 Felice Cardone   Book Review: Benjamin C. Pierce (ed.),
                                  \booktitleAdvanced Topics in Types and
                                  Programming Languages, The MIT Press
                                  (2005) ISBN 0-262-16228-8. \pounds
                                  39.95. 574 pp. Hardbound . . . . . . . . 130--131
            Iman Hafiz Poernomo   Book Review: Yves Bertot and Pierre
                                  Castéran, \booktitleInteractive Theorem
                                  Proving and Program Development
                                  (Coq'Art: The Calculus of Inductive
                                  Constructions). Texts in Theoretical
                                  Computer Science. An EATCS Series.
                                  (2004). ISBN 3-540-20854-2. 469pp.
                                  Hardcover  . . . . . . . . . . . . . . . 130--131

The Computer Journal
Volume 49, Number 2, March, 2006

                      Anonymous   Capsule Reviews  . . . . . . . . . . . . 133--133
                  Fionn Murtagh   Editorial  . . . . . . . . . . . . . . . 134--135
                   Erol Gelenbe   Editorial: Building Adaptivity into
                                  Computer Networks  . . . . . . . . . . . 136--136
             Gerardo Rubino and   
       Martín Varela and   
              Jean-Marie Bonnin   Controlling Multimedia QoS in the Future
                                  Home Network Using the PSQA Metric . . . 137--155
                Jeremy Pitt and   
               Lloyd Kamara and   
               Marek Sergot and   
              Alexander Artikis   Voting in Multi-Agent Systems  . . . . . 156--170
                   Ricardo Lent   Design of a MANET Testbed Management
                                  System . . . . . . . . . . . . . . . . . 171--179
  András György and   
    György Ottucsák   Adaptive Routing Using Expert Advice . . 180--189
                   Taskin Kocak   A Hybrid Network Processor with Support
                                  for High-Speed Execution of CPN and
                                  Upper Layer IP Protocols . . . . . . . . 190--200
                    M. Amor and   
              M. Bóo and   
        E. J. Padrón and   
                       D. Bartz   Hardware Oriented Algorithms for
                                  Rendering Order-Independent Transparency 201--210
             Kostas Bousias and   
             Nabil Hasasneh and   
                 Chris Jesshope   Instruction Level Parallelism through
                                  Microthreading --- a Scalable Approach
                                  to Chip Multiprocessors  . . . . . . . . 211--233
            C. Bernardeschi and   
                G. Lettieri and   
                 L. Martini and   
                       P. Masci   Using Control Dependencies for
                                  Space-Aware Bytecode Verification  . . . 234--248
                    Mark Burgin   Book Review: Juraj Hromkovi\vc, Design
                                  and Analysis of Randomized Algorithms:
                                  Introduction to Design Paradigms.
                                  Series: Texts in Theoretical Computer
                                  Science. An EATCS Series. Springer
                                  (2005). ISBN 3-540-23949-9. \pounds
                                  30.50/\pounds 39.95/\$49.95. 274 pp.
                                  Hardbound} . . . . . . . . . . . . . . . 249--250
                  Mostafa Azizi   Book Review: John Hunt and Chris Loftus,
                                  Guide to J2EE: Enterprise Java. Series
                                  Springer Professional Computing.
                                  Springer (2003). ISBN 1-85233-704-4.
                                  \$79.95\slash \pounds 45.00\slash
                                  \pounds 69.95. 672 pp} . . . . . . . . . 250--251
         Pierre Castéran   Book Review: Iman Hafiz Poernomo, John
                                  Newsome Crossley and Martin Wirsing,
                                  \booktitleAdapting Proofs-as-Programs
                                  --- The Curry--Howard Protocol. Springer
                                  (2005). ISBN 0-387-23759-3.
                                  \$79.95/\pounds 50.00/ 64.95. 420 pp.
                                  Hardbound} . . . . . . . . . . . . . . . 251--252
                Ronald Morrison   Book Review: K. C. Tan, E. F. Khor and
                                  T. H. Lee, Multiobjective Evolutionary
                                  Algorithms and Applications. Series:
                                  Advanced Information & Knowledge
                                  Processing. Springer-Verlag (2005). ISBN
                                  1-85233-836-9. \$89.95\slash
                                  \$99.95/\pounds 50.00. 295 pp. Hardbound 252--253

The Computer Journal
Volume 49, Number 3, May, 2006

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 255--257
              Mehmet Savsar and   
               Fawaz S. Al-Anzi   Reliability of Data Allocation on a
                                  Centralized Service Configuration with
                                  Distributed Servers  . . . . . . . . . . 258--267
             Alain Cournier and   
   Stéphane Devismes and   
               Franck Petit and   
                Vincent Villain   Snap-Stabilizing Depth-First Search on
                                  Arbitrary Networks . . . . . . . . . . . 268--280
  Apostolos N. Papadopoulos and   
      Alexandros Nanopoulos and   
            Yannis Manolopoulos   Processing Distance Join Queries with
                                  Constraints  . . . . . . . . . . . . . . 281--296
               Moses Reuven and   
                   Yair Wiseman   Medium-Term Scheduler as a Solution for
                                  the Thrashing Effect . . . . . . . . . . 297--309
           Goichiro Hanaoka and   
              Junji Shikata and   
             Yumiko Hanaoka and   
                    Hideki Imai   Unconditionally Secure Anonymous
                                  Encryption and Group Authentication  . . 310--321
                 Javier Herranz   Deterministic Identity-Based Signatures
                                  for Partial Aggregation  . . . . . . . . 322--330
           Karnig Derderian and   
          Robert M. Hierons and   
                Mark Harman and   
                      Qiang Guo   Automated Unique Input Output Sequence
                                  Generation for Conformance Testing of
                                  FSMs . . . . . . . . . . . . . . . . . . 331--344
            Per Martin-Löf   100 years of Zermelo's Axiom of Choice:
                                  what was the problem with it?  . . . . . 345--350
                 James F. Korsh   Skarbek's Algorithm for $t$-Ary Trees    351--357
               Sung Eun Bae and   
                  Tadao Takaoka   Improved Algorithms for the $K$-Maximum
                                  Subarray Problem . . . . . . . . . . . . 358--374
               Ricardo Jasinski   Book Review: S. Ivarama and P. D.
                                  Andamudi, \booktitleGuide to RISC
                                  Processors for Programmers and
                                  Engineers, Springer-Verlag (2005). ISBN
                                  0-387-21017-2. \pounds 36.00, US\$46.95,
                                  US\$59.95. 387 pp. Hardbound . . . . . . 375
                  George Pallis   Book Review: Robert J. Glushko and T.
                                  Im. McGrath, \booktitleDocument
                                  Engineering --- Analyzing and Designing
                                  Document for Business Informatics and
                                  Web Services. The MIT Press (2005). ISBN
                                  0-262-07261-0 . \pounds 21.95. 703 pp.
                                  Hardbound  . . . . . . . . . . . . . . . 376
                  Athena Vakali   Book Review: S. Bressan, S. Ceri, E.
                                  Hunt, Z. G. Ives, Z. Bellahséne, M. Rys
                                  and R. Unland, \booktitle(EDS) Database
                                  and XML Technologies. Third
                                  International XML Database Symposium,
                                  XSym 2005, Trondheim, Norway, August
                                  28--29, 2005, Proceedings. Series:
                                  Lecture Notes in Computer Science, Vol.
                                  3671. Springer-Verlag (2005). ISBN
                                  3-540-28583-0. 44.94/\pounds
                                  32.50/US\$58.00. 236 pp. Softbound}} . . 376--377
                      Anonymous   Acknowledgement of Referees: Reviewers
                                  who have agreed to review between 1
                                  January 2005 and 31 December 2005 for
                                  \booktitleThe Computer Journal . . . . . 378--380

The Computer Journal
Volume 49, Number 4, July, 2006

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 381--382
                   Robin Milner   Ubiquitous Computing: Shall we
                                  Understand It? . . . . . . . . . . . . . 383--389
                      Anonymous   Discussion on Robin Milner's First
                                  \booktitleComputer Journal Lecture:
                                  Ubiquitous Computing: Shall We
                                  Understand It? . . . . . . . . . . . . . 390--399
           Chung-Ming Huang and   
           Ching-Hsien Tsai and   
                  Ming-Chi Tsai   Design and Implementation of Video
                                  Streaming Hot-plug between Wired and
                                  Wireless Networks Using SCTP . . . . . . 400--417
                 T. Y. Wong and   
                  K. T. Law and   
             John C. S. Lui and   
                     M. H. Wong   An Efficient Distributed Algorithm to
                                  Identify and Traceback DDoS Traffic  . . 418--442
                Barry Doyle and   
                Stuart Bell and   
            Alan F. Smeaton and   
            Kealan McCusker and   
               Noel E. O'Connor   Security Considerations and Key
                                  Negotiation Techniques for Power
                                  Constrained Sensor Networks  . . . . . . 443--453
      Juan Fernández and   
         Eitan Frachtenberg and   
           Fabrizio Petrini and   
      José-Carlos Sancho   An Abstract Interface for System
                                  Software on Large-Scale Clusters . . . . 454--469
                Daniel Yuh Chao   Computation of Elementary Siphons in
                                  Petri Nets For Deadlock Control  . . . . 470--479
                     Alan Bundy   A Very Mathematical Dilemma  . . . . . . 480--486
             Patrick Martin and   
               Wendy Powley and   
                  Xiaoyi Xu and   
                     Wenhu Tian   Automated Configuration of Multiple
                                  Buffer Pools . . . . . . . . . . . . . . 487--499
                    Keith Duddy   Book Review: Kevin Lano, Advanced
                                  Systems Design with Java, UML and MDA.
                                  Elsevier (2005). ISBN 0-7506-6496-7.
                                  \pounds 27.99/US\$44.95. 378 pp.
                                  Softbound} . . . . . . . . . . . . . . . 500--501
                 Judit Bar-Ilan   Book Review: Mark Levene, An
                                  Introduction to Search Engines and Web
                                  Navigation. Addison Wesley, Pearson
                                  Education (2006). ISBN 0-321-30677-5.
                                  \pounds 39.99. 365 pp. Softbound . . . . 500
                  George Pallis   Book Review: Xiaofang Zhou, Stanley Su,
                                  Mike P. Papazoglou, Maria E. Orlowska
                                  and Keith G. Jeffery, Web Information
                                  Systems Engineering --- WISE 2004.
                                  Springer-Proceedings Series: Lecture
                                  Notes in Computer Science, Vol. 3306
                                  (2004). ISBN 3-540-23894-8. \pounds
                                  34.55/US\$117.00. 745 pp. Softbound} . . 501
                    Mark Burgin   Book Review: Kimiz Dalkir, Knowledge
                                  Management in Theory and Practice.
                                  Butterworth Heinemann (2005). ISBN
                                  0-7506-7864-X. EUR 44.95/\$49.95\slash
                                  \pounds 29.99. 368 pp. Hardbound}  . . . 501--503

The Computer Journal
Volume 49, Number 5, September, 2006

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 505--506
               Ing-Ray Chen and   
                    Bojan Cukic   High Assurance Software Systems  . . . . 507--508
                Jinchun Xia and   
              Carl K. Chang and   
                  Jeff Wise and   
                       Yujia Ge   An Empirical Performance Study on PSIM   509--526
                  Guohui Li and   
                   LihChyun Shu   Design and Evaluation of a Low-Latency
                                  Checkpointing Scheme for Mobile
                                  Computing Systems  . . . . . . . . . . . 527--540
                   Qizhi Ye and   
                     Yu Lei and   
                     David Kung   A Blocking-based Approach to Protocol
                                  Validation . . . . . . . . . . . . . . . 541--553
                Engin Kirda and   
            Christopher Kruegel   Protecting Users against Phishing
                                  Attacks  . . . . . . . . . . . . . . . . 554--561
    José Luis Sierra and   
Alfredo Fernández-Valmayor and   
Baltasar Fernández-Manjón   A Document-Oriented Paradigm for the
                                  Construction of Content-Intensive
                                  Applications . . . . . . . . . . . . . . 562--584
             Tiziana Calamoneri   The $L(h,k)$-Labelling Problem: a Survey
                                  and Annotated Bibliography . . . . . . . 585--608
        Alexander Thomasian and   
                   Lijuan Zhang   The Stepwise Dimensionality Increasing
                                  (SDI) Index for High-Dimensional Data    609--618
           Apostolos Syropoulos   Fuzzifying $P$ Systems . . . . . . . . . 619--628
                    Ali Mahdoum   Book Review: Franz Rothlauf,
                                  Representations for Genetic and
                                  Evolutionary Algorithms. Springer-Verlag
                                  (2006, second edition). ISBN
                                  3-540-25059-X. \$103.95/\$129.00/\pounds
                                  77.00. 325 pp. Hardbound . . . . . . . . 629
                     Boran Gazi   Book Review: W. Van Wezel, R. J. Jorna
                                  and A. M. Meystel, Planning in
                                  Intelligent Systems: Aspects,
                                  Motivations, and Methods. John Wiley and
                                  Sons, Inc. (2006). ISBN 0-471-73427-6.
                                  \pounds 64.95/ 91.70/US \$110.00. 592
                                  pp. Hardbound} . . . . . . . . . . . . . 629--630

The Computer Journal
Volume 49, Number 6, November, 2006

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 631--633
                 Yi-Sheng Huang   Design of Traffic Light Control Systems
                                  Using Statecharts  . . . . . . . . . . . 634--649
                     Frank Land   Leo II and the Model T Ford  . . . . . . 650--656
                    J. Rissanen   The Structure Function and
                                  Distinguishable Models of Data . . . . . 657--664
              D. Den Hertog and   
                  P. B. Hulshof   Solving Rummikub Problems by Integer
                                  Linear Programming . . . . . . . . . . . 665--669
        Alexander Thomasian and   
                   Lijuan Zhang   Persistent Semi-Dynamic Ordered
                                  Partition Index  . . . . . . . . . . . . 670--684
                Samir M. Koriem   Development, Analysis and Evaluation of
                                  Performance Models for Mobile
                                  Multi-Agent Networks . . . . . . . . . . 685--709
                      Vlad Rusu   Verifying an ATM Protocol Using a
                                  Combination of Formal Techniques . . . . 710--730
              Betul Demiroz and   
          Haluk Rahmi Topcuoglu   Static Task Scheduling with a Unified
                                  Objective on Time and Resource Domains   731--743
         Carlos A. G. Assis and   
       Edil S. T. Fernandes and   
              Valmir C. Barbosa   Modeling the Input History of Programs
                                  for Improved Instruction-Memory
                                  Performance  . . . . . . . . . . . . . . 744--761
                Klaus Schneider   Book Review: R. Kurki-Suonio,
                                  \booktitleA Practical Theory of Reactive
                                  Systems. Springer-Verlag (2005). ISBN
                                  3-540-23342-3. 49.95/\pounds 38.50. 418
                                  pp. Hardbound  . . . . . . . . . . . . . 762
                  Marc L. Smith   Book Review: Mark Burgin,
                                  \booktitleSuper-Recursive Algorithms.
                                  Series: Monographs in Computer Science.
                                  Springer-Verlag (2005). ISBN
                                  0-387-95569-0. \$79.95\slash \pounds
                                  61.50. 304 pp. Hardbound}  . . . . . . . 762--763
           Elizabeth Harrin and   
                           MBCS   Book Review: Robert S Coble and Shel
                                  Israel, \booktitleNaked Conversations:
                                  How Blogs are Changing the Way
                                  Businesses Talk with Customers, John
                                  Wiley & Sons (2006). ISBN 0-471-74719-X.
                                  \pounds 16.99. 251 pp. Hardcover . . . . 764


The Computer Journal
Volume 50, Number 1, January, 2007

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 1--3
                      Anonymous   Editorial on the Occasion of Volume 50
                                  of \booktitleThe Computer Journal  . . . 4--6
            Zhongqiang Chen and   
             Zhongrong Chen and   
                     Alex Delis   An Inline Detection and Prevention
                                  Framework for Distributed Denial of
                                  Service Attacks  . . . . . . . . . . . . 7--40
                  Yuh-Min Tseng   A secure authenticated group key
                                  agreement protocol for resource-limited
                                  mobile devices . . . . . . . . . . . . . 41--52
           Rachid Guerraoui and   
                  Michel Raynal   The Alpha of Indulgent Consensus . . . . 53--67
               Kil Hong Joo and   
                    Won Suk Lee   An Adaptive Materialization Method for
                                  Globally Optimized Query Evaluation in a
                                  Hierarchical Mediator System . . . . . . 68--80
             Hooman Nikmehr and   
            Braden Phillips and   
                 Cheng-Chew Lim   A Fast Radix-4 Floating-Point Divider
                                  with Quotient Digit Selection by
                                  Comparison Multiples . . . . . . . . . . 81--92
                Ralf Gitzel and   
                   Ingo Ott and   
                 Martin Schader   Ontological Extension to the MOF
                                  Metamodel as a Basis for Code Generation 93--115
Jesús M. Almendros-Jiménez and   
                  Luis Iribarne   Describing Use-Case Relationships with
                                  Sequence Diagrams  . . . . . . . . . . . 116--128
               Elizabeth Harrin   Book Review: Susan Snedaker, IT Security
                                  Project Management Handbook. Syngress
                                  (2006). ISBN 1-59749-076-8.
                                  47.95/\pounds 32.99/\$59.95. 612 pp.
                                  Softbound} . . . . . . . . . . . . . . . 129
             Lutz Schröder   Book Review: L. M. G. Feijs and H. B. M.
                                  Jonkers, \booktitleFormal Specification
                                  and Design. Cambridge University Press
                                  (2005). ISBN-13 978-0-521-43592-5,
                                  ISBN-10 0-521-43592-7. \pounds
                                  29.00/\$50.00. Softbound}  . . . . . . . 129--130

The Computer Journal
Volume 50, Number 2, March, 2007

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 131--133
            Roland Rüdiger   Quantum Programming Languages: An
                                  Introductory Overview  . . . . . . . . . 134--150
        Alexander Gammerman and   
                  Vladimir Vovk   Hedging Predictions in Machine Learning:
                                  The Second \booktitleComputer Journal
                                  Lecture  . . . . . . . . . . . . . . . . 151--163
                      Anonymous   Discussion on ``Hedging Predictions in
                                  Machine Learning'' by A. Gammerman and
                                  V. Vovk  . . . . . . . . . . . . . . . . 164--172
        Alexander Gammerman and   
                  Vladimir Vovk   Rejoinder: ``Hedging Predictions in
                                  Machine Learning'' . . . . . . . . . . . 173--177
                 A. Bakalis and   
           C. S. Iliopoulos and   
                  C. Makris and   
                 S. Sioutas and   
             E. Theodoridis and   
              A. Tsakalidis and   
                    K. Tsichlas   Locating Maximal Multirepeats in
                                  Multiple Strings Under Various
                                  Constraints  . . . . . . . . . . . . . . 178--185
           Abdelrahman Amer and   
                   B. J. Oommen   A Novel Framework for Self-Organizing
                                  Lists in Environments with Locality of
                                  Reference: Lists-on-Lists  . . . . . . . 186--196
                 Doina Bein and   
              Ajoy K. Datta and   
                Vincent Villain   Self-Stabilizing Local Routing in Ad Hoc
                                  Networks . . . . . . . . . . . . . . . . 197--203
          Sheng-Tzong Cheng and   
                  Ming-Hung Tao   A Scheduling-Based Medium Access Control
                                  Protocol for Supporting Multi-class
                                  Services in Wireless Networks  . . . . . 204--216
        Alexander Thomasian and   
                    Gang Fu and   
                  Spencer W. Ng   Analysis of Rebuild Processing in RAID5
                                  Disk Arrays  . . . . . . . . . . . . . . 217--231
             Paul Cockshott and   
                Greg Michaelson   Are There New Models of Computation?
                                  Reply to Wegner and Eberbach . . . . . . 232--247
               Ricardo Jasinski   Fault-Tolerance Techniques for
                                  SRAM-Based FPGAs . . . . . . . . . . . . 248
                Carlos Caldeira   The Microsoft Data Warehouse Toolkit . . 249
                  Marino Segnan   Web Data Management Practices ---
                                  Emerging Techniques and Technologies . . 249--250

The Computer Journal
Volume 50, Number 3, May, 2007

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 251--253
                     Tony Hoare   The Ideal of Program Correctness: Third
                                  \booktitleComputer Journal Lecture . . . 254--260
                      Anonymous   Discussion on ``The Ideal of Program
                                  Correctness'' by Tony Hoare  . . . . . . 261--268
                      Anonymous   Discussion on ``The Ideal of Program
                                  Correctness'': Responses from Tony Hoare 269--273
                    Chris Mairs   Inclusion and Exclusion in the Digital
                                  World: Turing Lecture 2006 . . . . . . . 274--280
               Ing-Ray Chen and   
                 Weiping He and   
                     Baoshan Gu   Proxy-based Regional Registration for
                                  Integrated Mobility and Service
                                  Management in Mobile IP Systems  . . . . 281--293
           H. M. W. Verbeek and   
     W. M. P. van der Aalst and   
          A. H. M. ter Hofstede   Verifying Workflows with Cancellation
                                  Regions and OR-joins: An Approach Based
                                  on Relaxed Soundness and Invariants  . . 294--314
             Monika Kapus-Kolar   Testing as Collecting of Evidence: An
                                  Integrated Approach to Test Generation
                                  for Finite State Machines  . . . . . . . 315--331
                 Doina Bein and   
              Ajoy K. Datta and   
           Mehmet Hakan Karaata   An Optimal Snap-Stabilizing Multi-Wave
                                  Algorithm  . . . . . . . . . . . . . . . 332--340
              Tzong-Jye Liu and   
                   Chia-Lin Lee   State-Optimal Alternator for Uniform
                                  Synchronous Rings  . . . . . . . . . . . 341--347
   George F. Georgakopoulos and   
            Kostas Politopoulos   MAX-DENSITY Revisited: a Generalization
                                  and a More Efficient Algorithm . . . . . 348--356
         William Chung-Kung Yen   Edge-Orienting on Split, Planar and
                                  Treelike Graphs  . . . . . . . . . . . . 357--368
            Peter Grünwald   Book Review: Christopher S. Wallace,
                                  \booktitleStatistical and Inductive
                                  Inference by Minimum Message Length,
                                  Springer (2005). ISBN 038723795X.
                                  \pounds 46.00. 432 pp. Hardbound . . . . 369--370
                    Mark Levene   Artificial Intelligence for Games.
                                  Series in Interactive $3$D Technology    371
             Martinez-Gil Jorge   Thinking on the Web: Berners-Lee, Gödel
                                  and Turing . . . . . . . . . . . . . . . 371--372

The Computer Journal
Volume 50, Number 4, July, 2007

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 373--374
                      Anonymous   Karen Spärck Jones (1935--2007):
                                  Professor (emeritus) of Computers and
                                  Information, University of Cambridge . . 375--376
                  Ruqian Lu and   
                   Zhi-Hua Zhou   Guest Editorial to the Special Issue on
                                  Advances of Artificial Intelligence and
                                  Knowledge Engineering in China . . . . . 377
                         Wei Li   R-Calculus: An Inference System for
                                  Belief Revision  . . . . . . . . . . . . 378--390
                Sanjiang Li and   
                 Bernhard Nebel   Qualitative Spatial Representation and
                                  Reasoning: a Hierarchical Approach . . . 391--402
                   Kaile Su and   
               Abdul Sattar and   
                    Xiangyu Luo   Model Checking Temporal Logics of
                                  Knowledge Via OBDDs  . . . . . . . . . . 403--420
               Hongli Liang and   
                   Jue Wang and   
                       Yiyu Yao   User-Oriented Feature Selection for
                                  Machine Learning . . . . . . . . . . . . 421--434
              Shan-Tai Chen and   
              Shun-Shii Lin and   
                    Li-Te Huang   A Two-Phase Optimization Algorithm For
                                  Mastermind . . . . . . . . . . . . . . . 435--443
            Roberto Baldoni and   
            Roberto Beraldi and   
          Leonardo Querzoni and   
            Antonino Virgillito   Efficient Publish/Subscribe Through a
                                  Self-Organizing Broker Overlay and its
                                  Application to SIENA . . . . . . . . . . 444--459
               Amit Thawani and   
           Srividya Gopalan and   
                 V. Sridhar and   
             Krithi Ramamritham   Context-aware Timely Information
                                  Delivery in Mobile Environments  . . . . 460--472
       Vladimir M. Yanovsky and   
           Israel A. Wagner and   
           Alfred M. Bruckstein   A Linear-Time Constant-Space Algorithm
                                  for the Boundary Fill Problem  . . . . . 473--477
              E. Ancillotti and   
                   R. Bruno and   
                   M. Conti and   
                 E. Gregori and   
                  A. Pinizzotto   A Layer-2 Framework for Interconnecting
                                  Ad Hoc Networks to Fixed Internet:
                                  Test-bed Implementation and Experimental
                                  Evaluation . . . . . . . . . . . . . . . 478--499
   Antonio Izquierdo Manzanares   Professional Pen Testing for Web
                                  Applications --- Programmer to
                                  Programmer Series (P2P)  . . . . . . . . 500

The Computer Journal
Volume 50, Number 5, September, 2007

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 501--504
           Dan C. Marinescu and   
          Gabriela M. Marinescu   The Boole Lecture: Quantum Information:
                                  a Glimpse at the Strange and Intriguing
                                  Future of Information  . . . . . . . . . 505--521
           Mehran S. Fallah and   
              Ahmad R. Sharafat   Service Availability in Concurrent
                                  Systems --- Part I: a Theory of
                                  Hierarchical Services of Interacting
                                  Processes  . . . . . . . . . . . . . . . 522--534
           Mehran S. Fallah and   
              Ahmad R. Sharafat   Service Availability in Concurrent
                                  Systems --- Part II: Analysis and Case
                                  Studies Using HSIP . . . . . . . . . . . 535--554
              Der-Chiang Li and   
              Fengming M. Chang   An In--Out Combined Dynamic Weighted
                                  Round-Robin Method for Network Load
                                  Balancing  . . . . . . . . . . . . . . . 555--566
                Mark Levene and   
                 Judit Bar-Ilan   Comparing Typical Opening Move Choices
                                  Made by Humans and Chess Engines . . . . 567--573
                Asep Juarna and   
             Vincent Vajnovszki   Some Generalizations of a
                                  Simion--Schmidt Bijection  . . . . . . . 574--580
                H. Ahrabian and   
              A. Nowzari-Dalini   Parallel Generation of $t$-Ary Trees in
                                  $A$-order  . . . . . . . . . . . . . . . 581--588
                     Qiang Tang   On The Security of a Group Key Agreement
                                  Protocol . . . . . . . . . . . . . . . . 589--590
         Kim-Kwang Raymond Choo   A Proof of Revised Yahalom Protocol in
                                  the Bellare and Rogaway (1993) Model . . 591--601
             Ren-Junn Hwang and   
                Sheng-Hua Shiau   Provably Efficient Authenticated Key
                                  Agreement Protocol for Multi-Servers . . 602--615
                Jaesung Lee and   
               Hyuk-Jae Lee and   
                     Chanho Lee   A High-Speed Link Layer Architecture for
                                  Low Latency and Memory Cost Reduction    616--628

The Computer Journal
Volume 50, Number 6, November, 2007

            Fairouz Kamareddine   Capsule reviews  . . . . . . . . . . . . 629
               Erol Gelenbe and   
            Andrew Tilbrook and   
                 Richard Vinter   Editorial: Introduction to the Special
                                  Issue  . . . . . . . . . . . . . . . . . 630--631
      Robert Ghanea-Hercock and   
                 E. Gelenbe and   
       Nicholas R. Jennings and   
               Oliver Smith and   
           David N. Allsopp and   
               Alex Healing and   
                Hakan Duman and   
               Simon Sparks and   
    Nishan C. Karunatillake and   
        Perukrishnen Vytelingum   Hyperion --- Next-Generation Battlespace
                                  Information Services . . . . . . . . . . 632--645
              Asher Mahmood and   
            Philip M. Tudor and   
             William Oxford and   
            Robert Hansford and   
         James D. B. Nelson and   
      Nicholas G. Kingsbury and   
          Antonis Katartzis and   
                  M. Petrou and   
             N. Mitianoudis and   
                T. Stathaki and   
                 Alin Achim and   
                 David Bull and   
         Nishan Canagarajah and   
             Stavri Nikolov and   
                 Artur Loza and   
                Nedeljko Cvejic   Applied Multi-Dimensional Fusion . . . . 646--659
       Nikolaos Mitianoudis and   
                 Tania Stathaki   Joint Fusion and Blind Restoration for
                                  Multiple Image Scenarios with Missing
                                  Data . . . . . . . . . . . . . . . . . . 660--673
                 William Ng and   
                    Jack Li and   
              Simon Godsill and   
                   Sze Kim Pang   Multitarget Initiation, Tracking and
                                  Termination Using Bayesian Monte Carlo
                                  Methods  . . . . . . . . . . . . . . . . 674--693
          Samuel M. Waldron and   
               John Patrick and   
          Phillip L. Morgan and   
                    Sophia King   Influencing Cognitive Strategy by
                                  Manipulating Information Access  . . . . 694--702
              Paul R. Smart and   
           Alistair Russell and   
          Nigel R. Shadbolt and   
            m. c. schraefel and   
                 Leslie A. Carr   AKTiveSA: a Technical Demonstrator
                                  System For Enhanced Situation Awareness  703--716
        Gülay Öke and   
                Georgios Loukas   A Denial of Service Detector based on
                                  Maximum Likelihood Detection and the
                                  Random Neural Network  . . . . . . . . . 717--727
               Imtiaz Ahmad and   
                   A. Shoba Das   Analysis and Detection of Errors in
                                  Implementation of SHA-512 Algorithms on
                                  FPGAs  . . . . . . . . . . . . . . . . . 728--738
           Chung-Ming Huang and   
                    Jian-Wei Li   Efficient and Provably Secure IP
                                  Multimedia Subsystem Authentication for
                                  UMTS . . . . . . . . . . . . . . . . . . 739--757
                     Jan Peters   Computational Intelligence: Principles,
                                  Techniques and Applications  . . . . . . 758


The Computer Journal
Volume 51, Number 1, January, 2008

           Rodney G. Downey and   
         Michael R. Fellows and   
            Michael A. Langston   \booktitleThe Computer Journal Special
                                  Issue on Parameterized Complexity:
                                  Foreword by the Guest Editors  . . . . . 1--6
          Falk Hüffner and   
           Rolf Niedermeier and   
             Sebastian Wernicke   Techniques for Practical Fixed-Parameter
                                  Algorithms . . . . . . . . . . . . . . . 7--25
        Michael A. Langston and   
            Andy D. Perkins and   
           Arnold M. Saxton and   
             Jon A. Scharff and   
                   Brynn H. Voy   Innovative Computational Methods for
                                  Transcriptomic Data Analysis: a Case
                                  Study in the Use of FPT for Practical
                                  Algorithm Design and Implementation  . . 26--38
                Jianer Chen and   
                       Jie Meng   On Parameterized Intractability:
                                  Hardness and Completeness  . . . . . . . 39--59
             Dániel Marx   Parameterized Complexity and
                                  Approximation Algorithms . . . . . . . . 60--78
                 Jens Gramm and   
            Arfst Nickelsen and   
                    Till Tantau   Fixed-Parameter Algorithms in
                                  Phylogenetics  . . . . . . . . . . . . . 79--101
                    Leizhen Cai   Parameterized Complexity of Cardinality
                                  Constrained Optimization Problems  . . . 102--121
           Christian Sloper and   
                 Jan Arne Telle   An Overview of Techniques for Designing
                                  Parameterized Algorithms . . . . . . . . 122--136
            William Gasarch and   
                   Keung Ma Kin   Invitation to Fixed-Parameter Algorithms
                                  --- Parameterized Complexity Theory ---
                                  Parameterized Algorithmics: Theory,
                                  Practice and Prospects . . . . . . . . . 137--140
                      Anonymous   The Wilkes Best Paper Award in Volume 49
                                  (2006) . . . . . . . . . . . . . . . . . 

The Computer Journal
Volume 51, Number 2, March, 2008

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 141--143
                  Hyeonsang Eom   Information-Dynamics-Conscious
                                  Development of Routing Software: a Case
                                  of Routing Software that Improves
                                  Link-State Routing Based on Future
                                  Link-Delay-Information Estimation  . . . 144--161
                    Ye Tian and   
                      Di Wu and   
                    Kam-Wing Ng   On Distributed Rating Systems for
                                  Peer-to-Peer Networks  . . . . . . . . . 162--180
              Manuel A. Martins   On the Behavioral Equivalence Between
                                  $k$-data Structures  . . . . . . . . . . 181--191
           Luk Van Ertvelde and   
            Filip Hellebaut and   
                Lieven Eeckhout   Accurate and Efficient Cache Warmup for
                                  Sampled Processor Simulation Through
                                  NSL--BLRL  . . . . . . . . . . . . . . . 192--206
                 Guowu Yang and   
                Xiaoyu Song and   
         William N. N. Hung and   
             Marek A. Perkowski   Bi-Directional Synthesis of 4-Bit
                                  Reversible Circuits  . . . . . . . . . . 207--215
                       Keqin Li   Average-Case Performance Analysis of
                                  Online Non-Clairvoyant Scheduling of
                                  Parallel Tasks with Precedence
                                  Constraints  . . . . . . . . . . . . . . 216--226
               Silvio Croce and   
       Francesco Marcelloni and   
                Massimo Vecchio   Reducing Power Consumption in Wireless
                                  Sensor Networks Using a Novel Approach
                                  to Data Aggregation  . . . . . . . . . . 227--239
                   Anna Formica   Similarity of XML-Schema Elements: a
                                  Structural and Information Content
                                  Approach . . . . . . . . . . . . . . . . 240--254

The Computer Journal
Volume 51, Number 3, May, 2008

         Hans L. Bodlaender and   
           Arie M. C. A. Koster   Combinatorial Optimization on Graphs of
                                  Bounded Treewidth  . . . . . . . . . . . 255--269
                 Liming Cai and   
              Xiuzhen Huang and   
                Chunmei Liu and   
           Frances Rosamond and   
                   Yinglei Song   Parameterized Complexity and Biopolymer
                                  Sequence Comparison  . . . . . . . . . . 270--291
            Erik D. Demaine and   
       MohammadTaghi Hajiaghayi   The Bidimensionality Theory and Its
                                  Algorithmic Applications . . . . . . . . 292--302
              Georg Gottlob and   
                 Stefan Szeider   Fixed-Parameter Algorithms For
                                  Artificial Intelligence, Constraint
                                  Satisfaction and Database Problems . . . 303--325
               Petr Hlineny and   
                Sang-il Oum and   
               Detlef Seese and   
                  Georg Gottlob   Width Parameters Beyond Tree-width and
                                  their Applications . . . . . . . . . . . 326--362
              Gregory Gutin and   
                     Anders Yeo   Some Parameterized Problems On Digraphs  363--371
         Panos Giannopoulos and   
           Christian Knauer and   
                 Sue Whitesides   Parameterized Complexity of Geometric
                                  Problems . . . . . . . . . . . . . . . . 372--384
             Iris van Rooij and   
                   Todd Wareham   Parameterized Complexity in Cognitive
                                  Modeling: Foundations, Applications and
                                  Opportunities  . . . . . . . . . . . . . 385--404

The Computer Journal
Volume 51, Number 4, July, 2008

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 405--407
                    Azlan Iqbal   Evaluation of Economy in a Zero-sum
                                  Perfect Information Game . . . . . . . . 408--418
                  Hung-Yu Chien   Selectively Convertible Authenticated
                                  Encryption in the Random Oracle Model    419--434
José Raúl Romero and   
       José M. Troya and   
             Antonio Vallecillo   Modeling ODP Computational
                                  Specifications Using UML . . . . . . . . 435--450
         Paul M. E. Shutler and   
              Seok Woon Sim and   
             Wei Yin Selina Lim   Analysis of Linear Time Sorting
                                  Algorithms . . . . . . . . . . . . . . . 451--469
               D. Cavagnino and   
                A. E. Werbrouck   Efficient Algorithms for Integer
                                  Division by Constants Using
                                  Multiplication . . . . . . . . . . . . . 470--480
             J. L. Pastrana and   
                E. Pimentel and   
                      M. Katrib   Composition of Self-Adapting Components
                                  for Customizable Systems . . . . . . . . 481--496
              R. M. Hierons and   
                        H. Ural   The Effect of the Distributed Test
                                  Architecture on the Power of Testing . . 497--510
      Boleslaw K. Szymanski and   
                Gilbert G. Chen   Computing with Time: From Neural
                                  Networks to Sensor Networks  . . . . . . 511--522

The Computer Journal
Volume 51, Number 5, September, 2008

                  David L. Dowe   Foreword re C. S. Wallace  . . . . . . . 523--560
                  M. H. Brennan   Data Processing in the Early Cosmic Ray
                                  Experiments in Sydney  . . . . . . . . . 561--565
              Ray J. Solomonoff   Three Kinds of Probabilistic Induction:
                                  Universal Distributions and Convergence
                                  Theorems . . . . . . . . . . . . . . . . 566--570
        Murray A. Jorgensen and   
          Geoffrey J. McLachlan   Wallace's Approach to Unsupervised
                                  Learning: The Snob Program . . . . . . . 571--578
               Richard P. Brent   Some Comments on C. S. Wallace's Random
                                  Number Generators  . . . . . . . . . . . 579--584
   Glenn Colón-Bonet and   
           Paul Winterrowd, Jr.   Multiplier Evolution: a Family of
                                  Multiplier VLSI Implementations  . . . . 585--594
          Maurice D. Castro and   
             Ronald D. Pose and   
                     Carlo Kopp   Password-Capabilities and the Walnut
                                  Kernel . . . . . . . . . . . . . . . . . 595--607

The Computer Journal
Volume 51, Number 6, November, 2008

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 609--611
                  Fionn Murtagh   Editorial  . . . . . . . . . . . . . . . 612--614
        Alexander Thomasian and   
                         Jun Xu   Reliability and Performance of Mirrored
                                  Disk Organizations . . . . . . . . . . . 615--629
             M. Hassaballah and   
                Saleh Omran and   
               Youssef B. Mahdy   A Review of SIMD Multimedia Extensions
                                  and their Usage in Scientific and
                                  Engineering Applications . . . . . . . . 630--649
                Paul Cairns and   
               Harold Thimbleby   Affordance and Symmetry in User
                                  Interfaces . . . . . . . . . . . . . . . 650--661
                  Qiang Zhu and   
            Brahim Medjahed and   
            Anshuman Sharma and   
                    Henry Huang   The Collective Index: a Technique for
                                  Efficient Processing of Progressive
                                  Queries  . . . . . . . . . . . . . . . . 662--676
                Yu-Chen Kuo and   
                      Po-Yao Wu   The Availability of Complemental
                                  $k$-Coteries . . . . . . . . . . . . . . 677--687
              E. M. Tadjouddine   Vertex-ordering Algorithms for Automatic
                                  Differentiation of Computer Codes  . . . 688--699
                     J. E. Rice   An Introduction to Reversible Latches    700--709
            Ching-Nung Yang and   
            Chung-Chun Wang and   
                  Tse-Shih Chen   Visual Cryptography Schemes with
                                  Reversing  . . . . . . . . . . . . . . . 710--722
               Erol Gelenbe and   
              Stelios Timotheou   Synchronized Interactions in Spiked
                                  Neuronal Networks  . . . . . . . . . . . 723--730
          Peter G. Harrison and   
               Taskin Kocak and   
                   Erol Gelenbe   Discussant Contributions for the
                                  \booktitleComputer Journal Lecture by
                                  Erol Gelenbe . . . . . . . . . . . . . . 731--734
                      S. Furber   The Future of Computer Technology and
                                  its Implications for the Computer
                                  Industry . . . . . . . . . . . . . . . . 735--740
         Peter Y. K. Cheung and   
                  Alex Yakovlev   Comments on the BCS Lecture ``The Future
                                  of Computer Technology and its
                                  Implications for the Computer Industry''
                                  by Professor Steve Furber  . . . . . . . 741--742
                Baykasoglu Adil   Evolutionary Computation for Modeling
                                  and Optimization . . . . . . . . . . . . 743
               Elizabeth Harrin   Universal Usability: Designing Computer
                                  Interfaces for Diverse Users . . . . . . 743--744
         Kim-Kwang Raymond Choo   Privacy on the Line: The Politics of
                                  Wiretapping and Encryption, Updated and
                                  Expanded Edition . . . . . . . . . . . . 744
               Juan A. Carrasco   Corrigendum: ``Transient Analysis of
                                  Rewarded Continuous Time Markov Models
                                  by Regenerative Randomization with
                                  Laplace Transform Inversion''  . . . . . 745


The Computer Journal
Volume 52, Number 1, January, 2009

             Murat Gevrekci and   
         Bahadir K. Gunturk and   
               Yucel Altunbasak   Restoration of Bayer-sampled Image
                                  Sequences  . . . . . . . . . . . . . . . 1--14
               Michael Elad and   
                Dmitry Datsenko   Example-Based Regularization Deployed to
                                  Super-Resolution Reconstruction of a
                                  Single Image . . . . . . . . . . . . . . 15--30
              Dirk Robinson and   
                Sina Farsiu and   
                Peyman Milanfar   Optimal Registration Of Aliased Images
                                  Using Variable Projection With
                                  Applications To Super-Resolution . . . . 31--42
                Hayit Greenspan   Super-Resolution in Medical Imaging  . . 43--63
               M. J. Fadili and   
               J.-L. Starck and   
                     F. Murtagh   Inpainting and Zooming Using Sparse
                                  Representations  . . . . . . . . . . . . 64--79
          Priyam Chatterjee and   
           Sujata Mukherjee and   
         Subhasis Chaudhuri and   
               Guna Seetharaman   Application Of Papoulis--Gerchberg
                                  Method In Image Super-Resolution and
                                  Inpainting . . . . . . . . . . . . . . . 80--89
              Huanfeng Shen and   
              Michael K. Ng and   
               Pingxiang Li and   
                 Liangpei Zhang   Super-Resolution Reconstruction
                                  Algorithm To MODIS Remote Sensing Images 90--100
          Lyndsey C. Pickup and   
             David P. Capel and   
         Stephen J. Roberts and   
               Andrew Zisserman   Bayesian Methods for Image
                                  Super-Resolution . . . . . . . . . . . . 101--113
             Jongseong Choi and   
               Min Kyu Park and   
                   Moon Gi Kang   High Dynamic Range Image Reconstruction
                                  with Spatial Resolution Enhancement  . . 114--125
           Ali Mohammad-Djafari   Super-Resolution: a Short Review, A New
                                  Method Based on Hidden Markov Modeling
                                  of HR Image and Future Challenges  . . . 126--141
              Filip Sroubek and   
                Jan Flusser and   
       Gabriel Cristóbal   Super-Resolution and Blind Deconvolution
                                  For Rational Factors With an Application
                                  to Color Images  . . . . . . . . . . . . 142--152
                    M. Vega and   
                  J. Mateos and   
                  R. Molina and   
              A. K. Katsaggelos   Super-Resolution of Multispectral Images 153--167

The Computer Journal
Volume 52, Number 2, March, 2009

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 169--170
           Chung-Ming Huang and   
              Chung-Wei Lin and   
                   Xin-Ying Lin   A Predictive Video-on-Demand Bandwidth
                                  Management Using the Kalman Filter over
                                  Heterogeneous Networks . . . . . . . . . 171--185
          Giuseppe Anastasi and   
          Emilio Ancillotti and   
                Marco Conti and   
              Andrea Passarella   Design and Performance Evaluation of a
                                  Transport Protocol for Ad hoc Networks   186--209
         Abdelgadir Ibrahim and   
                    Liping Zhao   Supporting the OSGi Service Platform
                                  with Mobility and Service Distribution
                                  in Ubiquitous Home Environments  . . . . 210--239
Tomás Sánchez López and   
               Daeyoung Kim and   
      Gonzalo Huerta Canepa and   
                 Koudjo Koumadi   Integrating Wireless Sensors and RFID
                                  Tags into Energy-Efficient and Dynamic
                                  Context Networks . . . . . . . . . . . . 240--267
                   Yamin Li and   
              Shietung Peng and   
                    Wanming Chu   Optimal Algorithms for Finding a Trunk
                                  on a Tree Network and its Applications   268--275

The Computer Journal
Volume 52, Number 3, May, 2009

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 277--279
                     Fei He and   
                Xiaoyu Song and   
                    Ming Gu and   
                   Jiaguang Sun   Heuristic-Guided Abstraction Refinement  280--287
    Ricardo Pereira e Silva and   
Evandro César Freiberger   Metrics to Evaluate the Use of Object
                                  Oriented Frameworks  . . . . . . . . . . 288--304
                David Power and   
             Mark Slaymaker and   
                 Andrew Simpson   On Formalizing and Normalizing
                                  Role-Based Access Control Systems  . . . 305--325
             Alex Gammerman and   
               Volodya Vovk and   
              Brian Burford and   
           Ilia Nouretdinov and   
                Zhiyuan Luo and   
        Alexey Chervonenkis and   
            Mike Waterfield and   
              Rainer Cramer and   
                Paul Tempst and   
           Josep Villanueva and   
              Musarat Kabir and   
         Stephane Camuzeaux and   
                 John Timms and   
                 Usha Menon and   
                     Ian Jacobs   Serum Proteomic Abnormality Predating
                                  Screen Detection of Ovarian Cancer . . . 326--333
                Florentin Ipate   Test Selection for Hierarchical and
                                  Communicating Finite State Machines  . . 334--347
Jesús M. Almendros-Jiménez and   
                  Luis Iribarne   UML Modeling of User and Database
                                  Interaction  . . . . . . . . . . . . . . 348--367
                  Jukka Teuhola   Tournament Coding of Integer Sequences   368--377
                Simon Lavington   An Appreciation of Dina St Johnston
                                  (1930--2007) Founder of the UK's First
                                  Software House . . . . . . . . . . . . . 378--387
           Get checked abstract   Appreciation of Professor Colin Tully
                                  (1936--2007): Professor of Software
                                  Practice, Middlesex University . . . . . 388--391

The Computer Journal
Volume 52, Number 4, July, 2009

            Fairouz Kamareddine   Capsule Reviews  . . . . . . . . . . . . 393--394
     Aggelos K. Katsaggelos and   
                  Rafael Molina   Guest Editorial  . . . . . . . . . . . . 395--396
             Fabrice Saffre and   
            Richard Tateson and   
         José Halloy and   
            Mark Shackleton and   
          Jean Louis Deneubourg   Aggregation Dynamics in Overlay Networks
                                  and Their Implications for
                                  Self-Organized Distributed Applications  397--412
    Anastasis A. Sofokleous and   
            Marios C. Angelides   Dynamic Selection of a Video Content
                                  Adaptation Strategy from a Pareto Front  413--428
            Zhongqiang Chen and   
                 Alex Delis and   
                      Peter Wei   A Pragmatic Methodology for Testing
                                  Intrusion Prevention Systems . . . . . . 429--460
          Natarajan Meghanathan   A Location Prediction-Based Reactive
                                  Routing Protocol to Minimize the Number
                                  of Route Discoveries and Hop Count per
                                  Path in Mobile Ad Hoc Networks . . . . . 461--482
            Yukiko Yamauchi and   
        Toshimitsu Masuzawa and   
                     Doina Bein   Preserving the Fault-Containment of Ring
                                  Protocols Executed on Trees  . . . . . . 483--498
                Kuo-Qin Yan and   
            Shun-Sheng Wang and   
                 Shu-Ching Wang   The Agreement Problem in Unreliable
                                  Scale-Free Networks  . . . . . . . . . . 499--509
                      Olav Geil   Book Review: Tracey Ho and Desmond S.
                                  Lun, \booktitleNetwork Coding: An
                                  Introduction. Cambridge University Press
                                  (2008). ISBN-13 978-0-521-87310-9. 184
                                  pp. \pounds 30/\$60. Hardcover}  . . . . 510
               Elizabeth Harrin   Book Review: John E. Gibson, William T.
                                  Scherer and William F. Gibson,
                                  \booktitleHow to do Systems Analysis,
                                  Wiley (2007). ISBN-13 978-0-470-00765-5.
                                  \pounds 47.50. 360 pp. Hardcover . . . . 510--511

The Computer Journal
Volume 52, Number 5, August, 2009

                   Hong Zhu and   
               S. C. Cheung and   
           Joseph R. Horgan and   
                    J. Jenny Li   Guest Editorial to the Special Issue on
                                  Automation of Software Testing . . . . . 513
          Leonard Gallagher and   
                    Jeff Offutt   Test Sequence Generation For Integration
                                  Testing Of Component Software  . . . . . 514--529
                Meng-Luo Ji and   
                    Ji Wang and   
                  Shuhao Li and   
                   Zhi-Chang Qi   Automated Worst-Case Execution Time
                                  Analysis Based on Program Modes  . . . . 530--544
              Mingsong Chen and   
               Xiaokang Qiu and   
                     Wei Xu and   
              Linzhang Wang and   
               Jianhua Zhao and   
                    Xuandong Li   UML Activity Diagram-Based Automatic
                                  Test Case Generation for Java Programs   545--556
            Aynur Abdurazik and   
                    Jeff Offutt   Using Coupling-Based Weights for the
                                  Class Integration and Test Order Problem 557--570
                 Lijun Shan and   
                       Hong Zhu   Generating Structurally Complex Test
                                  Cases By Data Mutation: a Case Study Of
                                  Testing An Automated Modelling Tool  . . 571--588
                  Qian Yang and   
                J. Jenny Li and   
                 David M. Weiss   A Survey of Coverage-Based Testing Tools 589--597

The Computer Journal
Volume 52, Number 6, August, 2009

             Monika Kapus-Kolar   Three Generalizations to a Generic
                                  Integrated Test Generation Method for
                                  Finite State Machines  . . . . . . . . . 599--625
                Jaesung Lee and   
               Hyuk-Jae Lee and   
                     Chanho Lee   A Phase-Based Approach for On-Chip Bus
                                  Architecture Optimization  . . . . . . . 626--645
              Hung-Yu Chien and   
                  Tzong-Chen Wu   Provably Secure Password-Based
                                  Three-Party Key Exchange With Optimal
                                  Message Steps  . . . . . . . . . . . . . 646--655
               Daniel Lacks and   
          Mainak Chatterjee and   
                   Taskin Kocak   Design and Evaluation of a Distributed
                                  Clustering Algorithm for Mobile ad hoc
                                  Networks . . . . . . . . . . . . . . . . 656--670
              Tzu-Chi Huang and   
              Ce-Kuen Shieh and   
                    Yu-Ben Miao   Just-In-Time Cache for Capsule-Based
                                  Active Networks  . . . . . . . . . . . . 671--689
          Daniel Greenfield and   
                    Simon Moore   Implications of Electronics Technology
                                  Trends for Algorithm Design  . . . . . . 690--698
            Zhongqiang Chen and   
                 Yuan Zhang and   
             Zhongrong Chen and   
                     Alex Delis   A Digest and Pattern Matching-Based
                                  Intrusion Detection Engine . . . . . . . 699--723
                  Jakub Marecek   Book Review: Yves Pochet and Laurence A.
                                  Wolsey, \booktitleProduction Planning
                                  Using Mixed Integer Programming,
                                  Springer (2006). ISBN-13
                                  978-0-387-29959-4. \pounds
                                  38.50/\$59.95. 477 pp. Hardbound}  . . . 724--725
               Elizabeth Harrin   Book Review: Jean Tabaka,
                                  \booktitleCollaboration Explained:
                                  Facilitation Skills for Software Project
                                  Leaders. Addison Wesley (2006). ISBN-13
                                  978-0-321-26877-8. \pounds 31.99. 412
                                  pp. Softbound  . . . . . . . . . . . . . 725--725
                 Mamdouh Refaat   Book Review: Colleen Mccue,
                                  \booktitleData Mining and Predictive
                                  Analytics: Intelligence Gathering and
                                  Crime Analysis, Elsevier (2007). ISBN
                                  0-7506-7796-1. 28.99 GBP. 332 pp.
                                  Paperback  . . . . . . . . . . . . . . . 725--726


The Computer Journal
Volume 53, Number 7, September, 2010

               Michael Elad and   
                Dmitry Datsenko   Corrigendum: ``Example-Based
                                  Regularization Deployed to
                                  Super-Resolution Reconstruction of a
                                  Single Image'' . . . . . . . . . . . . . 1131--1131


The Computer Journal
Volume 41, Number 7, 1998

           Harold Thimbleby and   
            Stuart Anderson and   
                    Paul Cairns   A Framework for Modelling Trojans and
                                  Computer Virus Infection . . . . . . . . 445--458


Lecture Notes in Computer Science
Volume 1008, 1995

              D. J. Wheeler and   
                  R. M. Needham   TEA, a tiny encryption algorithm . . . . 363