Table of contents for issues of Computer Systems Science and Engineering

Last update: Thu Jan 4 10:50:12 MST 2018                Valid HTML 3.2!

Volume 1, Number 1, October, 1985
Volume 1, Number 2, January, 1986
Volume 1, Number 4, October, 1986
Volume 2, Number 1, January, 1987
Volume 2, Number 2, April, 1987
Volume 2, Number 3, July, 1987
Volume 2, Number 4, October, 1987
Volume 3, Number 1, January, 1988
Volume 3, Number 2, April, 1988
Volume 3, Number 3, July, 1988
Volume 3, Number 4, October, 1988
Volume 4, Number 1, 1989
Volume 4, Number 3, July, 1989
Volume 5, Number 1, January, 1990
Volume 5, Number 2, April, 1990
Volume 5, Number 3, July, 1990
Volume 5, Number 4, October, 1990
Volume 6, Number 1, January, 1991
Volume 6, Number 2, April, 1991
Volume 6, Number 3, July, 1991
Volume 6, Number 4, October, 1991
Volume 7, Number 1, January, 1992
Volume 7, Number 2, April, 1992
Volume 7, Number 3, July, 1992
Volume 7, Number 4, October, 1992
Volume 8, Number 1, January, 1993
Volume 8, Number 2, April, 1993
Volume 8, Number 3, July, 1993
Volume 8, Number 4, October, 1993
Volume 9, Number 1, January, 1994
Volume 9, Number 2, April, 1994
Volume 9, Number 3, July, 1994
Volume 9, Number 4, October, 1994
Volume 10, Number 1, January, 1995
Volume 10, Number 2, April, 1995
Volume 10, Number 3, July, 1995
Volume 10, Number 4, October, 1995
Volume 11, Number 1, January, 1996
Volume 11, Number 2, March, 1996
Volume 11, Number 3, May, 1996
Volume 11, Number 4, July, 1996
Volume 11, Number 5, September, 1996
Volume 11, Number 6, November, 1996
Volume 12, Number 1, January, 1997
Volume 12, Number 2, March, 1997
Volume 12, Number 3, May, 1997
Volume 12, Number 4, July, 1997
Volume 12, Number 5, September, 1997
Volume 12, Number 6, November, 1997
Volume 13, Number 1, January, 1998
Volume 13, Number 2, March, 1998
Volume 13, Number 3, May, 1998
Volume 13, Number 4, July, 1998
Volume 13, Number 5, September, 1998
Volume 13, Number 6, November, 1998
Volume 14, Number 1, January, 1999
Volume 14, Number 2, March, 1999
Volume 14, Number 3, May, 1999
Volume 14, Number 4, July, 1999
Volume 14, Number 5, 1999
Volume 14, Number 6, 1999
Volume 15, Number 1, January, 2000
Volume 15, Number 2, March, 2000
Volume 15, Number 3, May, 2000
Volume 15, Number 4, July, 2000
Volume 15, Number 5, September, 2000
Volume 15, Number 6, December, 2000
Volume 16, Number 1, January, 2001
Volume 16, Number 2, March, 2001
Volume 16, Number 3, May, 2001
Volume 16, Number 4, July, 2001
Volume 16, Number 5, September, 2001
Volume 16, Number 6, November, 2001
Volume 17, Number 1, January, 2002
Volume 17, Number 2, March, 2002
Volume 17, Number 3, May, 2002
Volume 17, Number 4/5, July / September, 2002
Volume 17, Number 6, November, 2002
Volume 18, Number 1, January, 2003
Volume 18, Number 2, March, 2003
Volume 18, Number 3, May, 2003
Volume 18, Number 4, July, 2003
Volume 18, Number 5, September, 2003
Volume 18, Number 6, December, 2003
Volume 19, Number 1, January, 2004
Volume 19, Number 2, March, 2004
Volume 19, Number 3, May, 2004
Volume 19, Number 4, July, 2004
Volume 19, Number 5, September, 2004
Volume 19, Number 6, November, 2004
Volume 20, Number 1, January, 2005
Volume 20, Number 2, March, 2005
Volume 21, Number 1, January, 2006
Volume 21, Number 2, March, 2006
Volume 21, Number 3, May, 2006
Volume 21, Number 4, July, 2006
Volume 21, Number 5, September, 2006
Volume 21, Number 6, November, 2006
Volume 22, Number 1--2, January / March, 2007
Volume 22, Number 3, May, 2007
Volume 22, Number 4, July, 2007
Volume 22, Number 5, September, 2007
Volume 22, Number 6, November, 2007
Volume 23, Number 1, January, 2008
Volume 23, Number 2, March, 2008
Volume 23, Number 3, May, 2008
Volume 23, Number 4, July, 2008
Volume 23, Number 5, September, 2008
Volume 23, Number 6, November, 2008
Volume 24, Number 1, January, 2009
Volume 24, Number 2, March, 2009
Volume 24, Number 3, May, 2009
Volume 24, Number 4, July, 2009
Volume 24, Number 5, September, 2009
Volume 24, Number 6, November, 2009
Volume 25, Number 1, January, 2010
Volume 25, Number 2, March, 2010
Volume 25, Number 3, May, 2010
Volume 25, Number 4, July, 2010
Volume 25, Number 5, September, 2010
Volume 25, Number 6, November, 2010
Volume 26, Number 1, January, 2011
Volume 26, Number 2, March, 2011
Volume 26, Number 3, May, 2011
Volume 26, Number 4, July, 2011
Volume 26, Number 5, September, 2011
Volume 26, Number 6, November, 2011
Volume 27, Number 1, 2012
Volume 27, Number 2, 2012
Volume 27, Number 3, 2012
Volume 27, Number 4, 2012
Volume 27, Number 5, 2012
Volume 27, Number 6, 2012
Volume 28, Number 1, 2013
Volume 28, Number 2, 2013
Volume 28, Number 3, 2013
Volume 28, Number 4, 2013
Volume 28, Number 5, 2013
Volume 28, Number 6, 2013
Volume 29, Number 1, 2014
Volume 29, Number 2, 2014
Volume 29, Number 3, 2014
Volume 29, Number 4, 2014
Volume 29, Number 5, 2014
Volume 29, Number 6, 2014
Volume 30, Number 1, January, 2015
Volume 30, Number 2, March, 2015
Volume 30, Number 3, May, 2015
Volume 30, Number 4, July, 2015
Volume 30, Number 5, September, 2015
Volume 30, Number 6, November, 2015
Volume 31, Number 1, January, 2016
Volume 31, Number 2, March, 2016
Volume 31, Number 3, May, 2016
Volume 31, Number 4, July, 2016
Volume 31, Number 5, September, 2016
Volume 31, Number 6, November, 2016


Computer Systems Science and Engineering
Volume 1, Number 1, October, 1985

                 C. Boswell and   
               K. K. Saluja and   
                   K. Kinoshita   Design of Programmable Logic Arrays for
                                  Parallel Testing . . . . . . . . . . . . 5--16
                 Kinji Mori and   
            Shyoji Miyamoto and   
                 Hirokazu Ihara   Autonomous Decentralized Computer System
                                  and Software Structure . . . . . . . . . 17--22
                 P. Corsini and   
                C. A. Prete and   
                   L. Simoncini   MuTEAM: An experience in the design of
                                  robust multiprocessor systems  . . . . . 23--35
          C. D. Spyropoulos and   
                    D. J. Evans   Performance Analysis of Priority-Driven
                                  Algorithm for Multiprocessor . . . . . . 36--46
     Christopher S. Wallace and   
                     David Koch   TTL-compatible Multiport Bus . . . . . . 47--52
                  G. Haring and   
                     H. Schelch   Modelling of RPS Disc Systems  . . . . . 53--64
                 Barbara K. Lee   Implementing a Quality Circle Programme
                                  for Computer Professionals . . . . . . . 65--67

Computer Systems Science and Engineering
Volume 1, Number 2, January, 1986

              Sang Hyuk Son and   
              Ashok K. Agrawala   Algorithm for Concurrency Control in
                                  Replicated Databases . . . . . . . . . . 75--81
            Milena M. Didic and   
             Peter Kohlhepp and   
                Reinhold Oberle   Design Considerations for a Distributed
                                  Real-Time Unclear Reactor Safety System  82--92
                 Jonathan Bowen   Design of a Simple Cambridge Ring
                                  Interface Adapter  . . . . . . . . . . . 93--98
                 S. Balsamo and   
                    G. Iazeolla   Synthesis of Queueing Networks with
                                  Block and State-Dependent Routing  . . . 99--108
       G. C. Pentzaropoulos and   
               G. C. Barney and   
                   W. Swindells   Performance Modelling of Serc Prime
                                  Computer System  . . . . . . . . . . . . 109--113
                  K. S. Lew and   
               T. S. Dillon and   
                  K. E. Forward   Model of Error Propagation in Database
                                  Systems  . . . . . . . . . . . . . . . . 114--118
                R. L. Ennis and   
             J. H. Griesmer and   
                 S. J. Hong and   
                M. Karnaugh and   
              J. K. Kastner and   
                D. A. Klein and   
             K. R. Milliken and   
                M. I. Schor and   
              H. M. Van Woerkom   Automation of MVS Operations; an
                                  Expert-Systems Approach  . . . . . . . . 119--124

Computer Systems Science and Engineering
Volume 1, Number 4, October, 1986

               Kang G. Shin and   
                  C. M. Krishna   New Performance Measures for Design and
                                  Evaluation of Real-Time Multiprocessors  179--192
               Helen D. Karatza   Simulation Study of Multitasking of Open
                                  Computer System Networks . . . . . . . . 193--204
                 P. Corsini and   
                     G. Frosini   Methodology for Complex System
                                  Description via Extended Petri Nets  . . 205--212
                Yinghua Min and   
                  Zhongcheng Li   Pseudo-Exhaustive Testing Strategy for
                                  Large Combinational Circuits . . . . . . 213--220


Computer Systems Science and Engineering
Volume 2, Number 1, January, 1987

                J. R. Barra and   
                  M. Becker and   
                E. F. Kouka and   
                      M. Tricot   Application of Data Analysis Methods and
                                  of Simulated Annealing for the Automatic
                                  Layout of Circuits . . . . . . . . . . . 3--15
            Ahmed K. Elmagarmid   Fault-Tolerant Deadlock Detection in
                                  Distributed Database Systems . . . . . . 16--28
            Yang-Chang Hong and   
                Thomas H. Payne   Efficient Computation of Dataflow Graphs
                                  in a Hypercube Architecture  . . . . . . 29--41
               Helen D. Karatza   Simulation Study of Multitasking of
                                  Closed Computer System Networks  . . . . 42--51

Computer Systems Science and Engineering
Volume 2, Number 2, April, 1987

        Balakrishna R. Iyer and   
               Philip S. Yu and   
             Lorenzo Donatiello   Analysis of Fault Tolerant
                                  Multiprocessor Architectures for Lock
                                  Engine Design  . . . . . . . . . . . . . 59--75
                  Sang Hyuk Son   On Multiversion Replication Control in
                                  Distributed Systems  . . . . . . . . . . 76--84
              Herman Hughes and   
              Ke Ren Chuang and   
                  Parviz Yegani   Give-Up-Based Protocol for Token Passing 85--91
          Lawrence W. Dowdy and   
                Karen D. Gordon   Performance Sensitivity with Respect to
                                  the Distribution of the Multiprogramming
                                  Level  . . . . . . . . . . . . . . . . . 92--98

Computer Systems Science and Engineering
Volume 2, Number 3, July, 1987

               A. R. Hurson and   
                   L. L. Miller   Database Machine Architecture for
                                  Supporting Incomplete Information  . . . 107--116
                 C. Y. Wong and   
               T. S. Dillon and   
                  K. E. Forward   Concurrent, Real-Time Systems: a
                                  Systematic Approach Using Timed Petri
                                  Nets . . . . . . . . . . . . . . . . . . 117--124
              Herman Hughes and   
                Horng Jiang and   
                  Susanne Smith   Voice/Data Integrated Transmission on a
                                  Time Division CSMA/CD Network  . . . . . 125--130
                       T. Downs   Reliability Problems in Software
                                  Engineering --- a Review . . . . . . . . 131--147

Computer Systems Science and Engineering
Volume 2, Number 4, October, 1987

            M. A. Bassiouni and   
                       A. Gupta   Computing Estimates of Waiting Times in
                                  Ring Local Area Networks with Priority
                                  Classes  . . . . . . . . . . . . . . . . 155--160
                  Y. W. Yak and   
               T. S. Dillon and   
                  K. E. Forward   Modelling the Effect of Transient Faults
                                  in Fault-Tolerant Computer Systems . . . 161--166
            V. Varadharajan and   
                    K. D. Baker   Net-Based System Design Representation
                                  and Analysis . . . . . . . . . . . . . . 167--178
              M. E. C. Hull and   
             R. G. Roulston and   
                 T. R. S. Gregg   Interactive Computing Service Monitoring
                                  System . . . . . . . . . . . . . . . . . 179--185
                     Jason Gait   Synchronizing Multiprocessor Access to
                                  Shared Operating System Data Structures  186--191
                           Anon   Design of I/O Drivers for a
                                  High-Availability Unix . . . . . . . . . 193--196


Computer Systems Science and Engineering
Volume 3, Number 1, January, 1988

                    S. M. Shatz   Superprocesses: a Distributed Program
                                  Configuration Concept Supporting . . . . 3--12
              Herman Hughes and   
              Parviz Yegani and   
                   Jih-Shyr Yih   CSMA/CD Protocol with Message-Based
                                  Priority Function  . . . . . . . . . . . 13--20
               Kang G. Shin and   
                   Heungkyu Lee   Port Manipulator for the Distributed
                                  Realization of an Integrated
                                  Manufacturing System . . . . . . . . . . 21--31
         F. Di Giandomenico and   
             M. L. Guidotti and   
                F. Grandoni and   
                   L. Simoncini   Gracefully Degradable Algorithm for
                                  Byzantine Agreement  . . . . . . . . . . 32--40

Computer Systems Science and Engineering
Volume 3, Number 2, April, 1988

               R. K. Molnar and   
                   S. C. Bruell   Sensitivity of Operational Formulae  . . 51--66
              Ajoy K. Datta and   
              Sukumar Ghosh and   
              Douglas Harms and   
            Ahmed K. Elmagarmid   Deadlock-Avoidance Mechanisms in
                                  Distributed Systems  . . . . . . . . . . 67--82
                 Heiko Schroder   Instruction Systolic Array --- Tradeoff
                                  Between Flexibility and Speed  . . . . . 83--90
               Simin Pakzad and   
              S. Lakshmivarahan   Interconnection Networks and Fault
                                  Tolerance  . . . . . . . . . . . . . . . 91--99

Computer Systems Science and Engineering
Volume 3, Number 3, July, 1988

              Ajoy K. Datta and   
              Sukumar Ghosh and   
           Muhundan Gopalan and   
            Ahmed K. Elmagarmid   Pipelining and concurrency in graphics
                                  and image-processing applications  . . . 107--116
                  C. Robach and   
                     S. Guibert   Testability measures: a Review . . . . . 117--126
                Vernon Rego and   
           Wojciech Szpankowski   Closed-network duals of multiqueues with
                                  application to token-passing systems . . 127--139
             E. S. Harrison and   
                  E. J. Schmitt   Structure of System/88, a fault-tolerant
                                  computer . . . . . . . . . . . . . . . . 140--162

Computer Systems Science and Engineering
Volume 3, Number 4, October, 1988

              Luigi Mancini and   
            Giuseppe Pappalardo   Hoare logic of distributed redundant
                                  systems  . . . . . . . . . . . . . . . . 171--180
              Ratan K. Guha and   
        Arthur F. Dickinson and   
                   Allan Kikawa   Analysis of CMH deadlock-detection
                                  algorithm using transmission delays  . . 181--188
              Arumalla V. Reddi   Secondary memory analysis of a
                                  mini/microcomputer in resource-sharing
                                  distributed information systems  . . . . 189--198
                        S. Bedi   File system activity and the
                                  distribution of disc transfers on a
                                  multiaccess system . . . . . . . . . . . 199--200
        Balakrishna R. Iyer and   
             Daniel M. Dias and   
                   Philip S. Yu   Performability comparison of
                                  configurable duplex systems  . . . . . . 201--215


Computer Systems Science and Engineering
Volume 4, Number 1, 1989

         F. Di Giandomenico and   
             M. L. Guidotti and   
                F. Grandoni and   
                   L. Simoncini   Evaluating the Efficiency of Byzantine
                                  Agreement Algorithms . . . . . . . . . . 3--11

Computer Systems Science and Engineering
Volume 4, Number 3, July, 1989

                 Jason Gait and   
              Terry Laskodi and   
                     Rick Krull   Interactive Monitor for a Communication
                                  Kernel . . . . . . . . . . . . . . . . . 154--160


Computer Systems Science and Engineering
Volume 5, Number 1, January, 1990

                      Anonymous   Editorial  . . . . . . . . . . . . . . . 3
              G. Ciccarella and   
                   G. Paris and   
                      G. Valent   Top-down approach to the design of OCCAM
                                  and transputer-based real-time systems   5--12
            Kevin A. Murray and   
               Andy J. Wellings   Wisdom: a distributed operating system
                                  for transputers  . . . . . . . . . . . . 13--20
               Qingping Guo and   
                    Yakup Paker   Concurrent communication and granularity
                                  assessment for a transputer-based
                                  multiprocessor system  . . . . . . . . . 21--28
                 Harald Richter   Multiprocessor with dynamically variable
                                  topology . . . . . . . . . . . . . . . . 29--35
                 X. L. Deng and   
                  T. Dillon and   
                     K. Lew and   
                  J. Rankin and   
                   E. Smith and   
                       D. Suter   Optimal topologies of transputers for
                                  different classes of problems  . . . . . 36--41
             A. G. Chalmers and   
               J. W. Hearne and   
              K. J. Cameron and   
                   N. E. Ligeti   Implementation and performance
                                  evaluation of an optimization algorithm
                                  on transputers . . . . . . . . . . . . . 42--46
               R. K. Cooper and   
                  D. A. Peshkin   Parallel alternating direction implicit
                                  method on a network of transputers . . . 47--52

Computer Systems Science and Engineering
Volume 5, Number 2, April, 1990

          Pradip K. Srimani and   
               Shivakant Mishra   Performance evaluation of distributed
                                  mutual exclusion algorithms for computer
                                  networks . . . . . . . . . . . . . . . . 59--64
                  M. Becker and   
               C. Dekoninck and   
                J. P. Prost and   
                     B. Verrier   Stochastic Petri net model for the
                                  FPS/264  . . . . . . . . . . . . . . . . 65--72
          M. Seetha Lakshmi and   
                   Philip S. Yu   Effectiveness of parallel processing in
                                  database systems . . . . . . . . . . . . 73--81
                  C. S. Wallace   Physically random generator  . . . . . . 82--88
                   David Finkel   Modelling dynamic load-sharing in a
                                  distributed computing system . . . . . . 89--94
            Edmond F. Kouka and   
                 Jean Luc Patry   Algorithms for restructuring WSI arrays
                                  of processors  . . . . . . . . . . . . . 95--104
                  Y. M. Lam and   
              H. T. Mouftah and   
                       M. Ilyas   Performance analysis of CSMA-CD
                                  protocols in local area bus networks . . 105--110
            C. P. Ravikumar and   
                  L. M. Patnaik   Performance improvement of simulated
                                  annealing algorithms . . . . . . . . . . 111--115
                 Hong-Fa Ho and   
              Gen-Heuy Chen and   
                     Te-Son Kuo   Branch testing of concurrent programs
                                  using Petri net models . . . . . . . . . 116--125

Computer Systems Science and Engineering
Volume 5, Number 3, July, 1990

               Sajal K. Das and   
                   Narsingh Deo   Parallel Hungarian algorithm . . . . . . 131--136
             Paul T. Hulina and   
                  Lee D. Coraor   Coprocessor architectures for efficient
                                  address computation and memory accessing 137--146
              Jin-Chin Wang and   
                  Michel Dubois   Performance comparison of cache
                                  coherence protocols based on the access
                                  burst model  . . . . . . . . . . . . . . 147--158
                   G. M. Megson   Complex Eigenproblem solution by a
                                  parallel norm-reducing Jacobi method . . 159--168
         B. Beresford-Smith and   
                    H. Schroder   Effective reconfiguration algorithms in
                                  fault-tolerant processor arrays  . . . . 169--177
         Vincenza Carchiolo and   
       Antonella Di Stefano and   
               Alberto Faro and   
            Giuseppe Pappalardo   Case study in protocol verification  . . 178--186
             Milind Mahajan and   
           V. K. Prasanna Kumar   Efficient parallel implementation of
                                  RETE pattern matching  . . . . . . . . . 187--192

Computer Systems Science and Engineering
Volume 5, Number 4, October, 1990

                  Reda A. Ammar   Algorithmic approach to construct
                                  probabilistic grammatical models of
                                  command streams in interactive software
                                  systems  . . . . . . . . . . . . . . . . 195--201
               Dilip Sarkar and   
               Ratan Kumar Guha   Mapping a class of algorithms from
                                  binary tree machines to linear arrays    202--204
                David P. Stotts   Bounding procedure execution times in a
                                  synchronous Petri net computation model  205--214
                  Hyuk Son Sang   Reconstruction of distributed databases  215--222
                   Tad Hogg and   
                  J. O. Kephart   Phase transitions in high-dimensional
                                  pattern classification . . . . . . . . . 223--232
            Shih-Chian Yang and   
              John A. Silvester   Fault-tolerant multistage
                                  interconnection networks:
                                  performance/reliability tradeoffs  . . . 233--242
         Douglas W. Cornell and   
                   Philip S. Yu   Integrated approach to buffer management
                                  and query optimization . . . . . . . . . 243--251


Computer Systems Science and Engineering
Volume 6, Number 1, January, 1991

            C. P. Ravikumar and   
               Sarma Sastry and   
                  L. M. Patnaik   Parallel min-cut placement on reduced
                                  hardware SIMD architecture . . . . . . . 3
                 Amos R. Omondi   Design of a high performance instruction
                                  pipeline . . . . . . . . . . . . . . . . 13--29
                 D. Crookes and   
               P. J. Morrow and   
                P. J. McParland   Occam implementation of an algebra-based
                                  language for low-level image processing  30
               Helen D. Karatza   Simulation of load balancing and
                                  multitasking in a homogeneous
                                  distributed system model . . . . . . . . 37
             Daniel M. Dias and   
               Philip S. Yu and   
               Brian T. Bennett   Analysis of trade-offs between
                                  centralized and geographically
                                  distributed transaction processing
                                  systems  . . . . . . . . . . . . . . . . 45
            David L. Landis and   
                 Daniel C. Muha   Optimal maintenance resource allocation
                                  for multiprocessor systems . . . . . . . 54

Computer Systems Science and Engineering
Volume 6, Number 2, April, 1991

            Franz Schreiner and   
             Gerhard Zimmermann   Pesa-I: a Parallel and Distributed
                                  Architecture for Production Systems  . . 67
              Arumalla V. Reddi   Memory performance of microcomputers at
                                  large user nodes of distributed systems  85
               A. R. Hurson and   
               L. L. Miller and   
               S. H. Pakzad and   
                         C. Fan   Functional dependencies to enforce
                                  integrity constraints in database
                                  machine environments . . . . . . . . . . 91
           Paul V. Shebalin and   
                Sang H. Son and   
                Chun-Hyon Chang   Software safety analysis in distributed
                                  systems  . . . . . . . . . . . . . . . . 102
               A. E. Conway and   
                     D. O'Brien   Validation of an approximation technique
                                  for queueing network models with
                                  chain-dependent FCFS queues  . . . . . . 117

Computer Systems Science and Engineering
Volume 6, Number 3, July, 1991

                J. C. Muzio and   
                       M. Serra   Data compaction for bridging faults  . . 131
                 L. Marinos and   
           M. P. Papazoglou and   
             D. Christodoulakis   Data integration methodology for an
                                  office environment . . . . . . . . . . . 143
                 X.-L. Deng and   
                  T. Dillon and   
                         K. Lew   Reconfigurable transputer-based
                                  architecture . . . . . . . . . . . . . . 152
                    Bin Qin and   
              Reda A. Ammar and   
                Howard A. Sholl   Allocating processing power to minimize
                                  time costs in parallel software systems  159
              Pradip K. Srimani   Heuristic deadlock avoidance algorithm
                                  in a distributed system  . . . . . . . . 170
           Peter Richardson and   
          Dzaharudin Mansor and   
               T. S. Dillon and   
                  K. E. Forward   Fault-tolerant approach to the design of
                                  a Signalling Transfer Point: Part 1  . . 178
            Chin-Chen Chang and   
                  Tzong-Chen Wu   Broadcasting cryptosystem in computer
                                  networks using interpolating polynomials 185

Computer Systems Science and Engineering
Volume 6, Number 4, October, 1991

               Jozo J. Dujmovic   Clustering, comparison and selection of
                                  standard synthetic benchmark programs    195--210
          Dzaharudin Mansor and   
           Peter Richardson and   
           Tharam S. Dillon and   
               Kevin E. Forward   Design, implementation and evaluation of
                                  a fault-tolerant signalling network
                                  management system. Part II . . . . . . . 211--226
              Chihping Wang and   
                Victor O. K. Li   Precedence-agreement concurrency control
                                  algorithm for distributed database
                                  systems  . . . . . . . . . . . . . . . . 227--237
             N. Ranganathan and   
             Amar Mukherjee and   
                   M. Bassiouni   VLSI algorithms for data compression . . 238--253


Computer Systems Science and Engineering
Volume 7, Number 1, January, 1992

                 D. F. Ross and   
                    R. H. Davis   Comparative study of performance of
                                  concurrency control algorithms in a
                                  centralized database . . . . . . . . . . 3--16
               L. L. Miller and   
               A. R. Hurson and   
                J. K. Huang and   
                   S. H. Pakzad   Comparing database processor
                                  configurations in the database machine
                                  ASLM . . . . . . . . . . . . . . . . . . 17--24
              Bruno Ciciani and   
             Daniel M. Dias and   
                   Philip S. Yu   Dynamic and static load sharing in
                                  hybrid distributed-centralized database
                                  systems  . . . . . . . . . . . . . . . . 25--41
                S. Srinivas and   
                    A. Basu and   
                K. G. Kumar and   
                 A. Paulraj and   
                  L. M. Patnaik   Pipelined ring algorithm for matrix
                                  multiplication on transputer networks.
                                  Performance analysis and estimation  . . 42--51
              Yann-Hang Lee and   
                   Philip S. Yu   Adaptive access path selection for
                                  relational database systems  . . . . . . 52--61

Computer Systems Science and Engineering
Volume 7, Number 2, April, 1992

                      Anonymous   Editorial  . . . . . . . . . . . . . . . 67
                     H. Lam and   
                S. Y. W. Su and   
                  V. Ruhela and   
                    S. Pant and   
                   S. M. Ju and   
                  M. Sharma and   
                      N. Prasad   GTOOLS: an active GUI toolset for an
                                  object-oriented KBMS . . . . . . . . . . 69--85
    Jean-Christophe Burneau and   
                   Odile Thiery   Classifying evolving objects in
                                  object-oriented knowledge bases  . . . . 86--90
                James G. Mullen   FBASE: a federated objectbase system . . 91--99
                Amelia Choi and   
                      W. S. Luk   Using an object-oriented database system
                                  to construct a spatial database kernel
                                  for GIS applications . . . . . . . . . . 100--121
                  P. L. Tan and   
                   T. S. Dillon   Incorporating semantics, relationships
                                  and exceptions into object oriented data
                                  models . . . . . . . . . . . . . . . . . 122--135
          Sherman R. Alpert and   
               Mary Beth Rosson   ParCE: an object-oriented approach to
                                  context-free parsing . . . . . . . . . . 136--144

Computer Systems Science and Engineering
Volume 7, Number 3, July, 1992

                C. P. Ravikumar   Parallel $r$-dimensional placement on a
                                  vector minisupercomputer . . . . . . . . 147--151
        Walter B. Iii Ligon and   
               Aditya P. Mathur   Parallel parsing on a transputer network 152--159
                  J. H. Kim and   
                    S. M. Reddy   Easily testable and reconfigurable
                                  two-dimensional systolic arrays  . . . . 160--169
              Reda A. Ammar and   
              Matthew J. Krzych   Computer aided performance engineering.
                                  A survey . . . . . . . . . . . . . . . . 170--189
           Constantine Katsinis   Performance modelling of message-based
                                  multiprocessors under heavy traffic  . . 190--198
                     Jie Wu and   
           Eduardo B. Fernandez   Comparison connection assignments for
                                  diagnosis of multiprocessor systems
                                  under a two-fault assumption . . . . . . 199--201
                Ahmed Kamel and   
                Ahmed Nazif and   
         Ossama El-Dessouki and   
                    Nabil Kamel   MCFS: a multiple criteria reasoning
                                  fuzzy expert systems building tool . . . 202--208

Computer Systems Science and Engineering
Volume 7, Number 4, October, 1992

               Jenshiuh Liu and   
            Chi-Ming Chiang and   
               Herman D. Hughes   Performance analysis of load-sharing for
                                  multiprocessor systems . . . . . . . . . 210
                 Adam Kapralski   Algorithms for processing NP-complete
                                  and isomorphic complete problems . . . . 218
                Xian-He Sun and   
                 Nabil N. Kamel   Augmenting multikey searching structure
                                  for general database queries . . . . . . 229
     Theodore K. Apostolopoulos   Performance of read-only transactions in
                                  a distributed system . . . . . . . . . . 236
                   A. Dubey and   
                  M. Zubair and   
                   C. E. Grosch   Real Fourier transforms on a massively
                                  parallel machine . . . . . . . . . . . . 243
           D. Chennapragada and   
                  P. Looges and   
                      S. Olariu   Single row routing with indifference
                                  graphs on the Distributed Array
                                  Processor  . . . . . . . . . . . . . . . 249
        Ramesh Dutt Javagal and   
           Ajoy Kumar Datta and   
                  Sukumar Ghosh   An algorithm for resource deadlock
                                  detection in distributed systems . . . . 257


Computer Systems Science and Engineering
Volume 8, Number 1, January, 1993

               M. Colajanni and   
                       S. Tucci   Equivalence relation between Fork-Join
                                  systems and $N$-stage queueing networks  3--12
            Rudy Lauwereins and   
              Jean Peperstraete   Queueing theoretical analysis of
                                  processor utilization in parallel
                                  computers  . . . . . . . . . . . . . . . 13--23
           Andreas Stafylopatis   Performance of parallel computations of
                                  triangular structure . . . . . . . . . . 24--32
                     Chyan Yang   Multigauge computers and their
                                  applications . . . . . . . . . . . . . . 33--39
               Avraham Leff and   
               Philip S. Yu and   
                   Joel L. Wolf   Performance issues in object replication
                                  for a remote caching architecture  . . . 40--51
               Namhyung Kim and   
               Vinod K. Agarwal   Concurrent error detection schemes for
                                  the match function . . . . . . . . . . . 52--56
                    A. E. Kamal   Modelling multibus interconnection
                                  networks using state aggregation . . . . 57--63

Computer Systems Science and Engineering
Volume 8, Number 2, April, 1993

              Lorrie L. Hoffman   Improved performance evaluation of
                                  distributed mutual exclusion algorithms
                                  for computer networks  . . . . . . . . . 67--71
           A. B. Romanovsky and   
                  I. V. Shturtz   Unplanned recovery for non-program
                                  objects  . . . . . . . . . . . . . . . . 72--79
              N. C. Audsley and   
                   A. Burns and   
           M. F. Richardson and   
                 A. J. Wellings   Incorporating unbounded algorithms into
                                  predictable real-time systems  . . . . . 80--89
                    Bin Qin and   
                  Reda A. Ammar   Analytic approach to deriving time costs
                                  of parallel computations . . . . . . . . 90--100
                   Willi Gunter   Design and implementation of the
                                  Attempto fault-tolerant system . . . . . 101--108
                  Chen Ping and   
                  Cai Xiyao and   
                      Jin Yimin   XDRC++: a reflective architecture in the
                                  C++ language . . . . . . . . . . . . . . 109--120
              Tzong-Chen Wu and   
                  Yi-Shiung Yeh   Cryptosystem for selectively
                                  broadcasting separate secrets  . . . . . 121--124

Computer Systems Science and Engineering
Volume 8, Number 3, July, 1993

            Elizabeth Chang and   
                   T. S. Dillon   Two phase methodology for the design of
                                  the human computer interface . . . . . . 131--143
                      Ling Chen   Systematic design of systolic arrays
                                  from affine recurrence techniques  . . . 144--153
        Alexander Thomasian and   
                   Behzad Nadji   State representation tradeoffs in Markov
                                  chains of serialization delays in
                                  computer systems . . . . . . . . . . . . 154--165
               P. M. Miller and   
               A. R. Hurson and   
           R. H. Hettmansperger   Modular scheme for designing associative
                                  memories . . . . . . . . . . . . . . . . 166--181

Computer Systems Science and Engineering
Volume 8, Number 4, October, 1993

             Jing-Long Wang and   
             Meng-Hong Shie and   
                  Liang-Teh Lee   Asymmetrically-initiated load balancing
                                  policy for distributed systems . . . . . 187--194
                      C. Ho and   
                S. A. Mabbs and   
                  K. E. Forward   Performance modeling of the MR-1
                                  multiprocessor using extended
                                  deterministic and stochastic Petri nets  195--209
                 H. T. Liaw and   
                 S. J. Wang and   
                      C. L. Lei   Secure dynamic user hierarchy scheme
                                  based on the knapsack problem  . . . . . 210--216
                  Sumit Sur and   
              Pradip K. Srimani   Self-diagnosability properties of
                                  hypercubes and star graphs and diagnosis
                                  algorithms . . . . . . . . . . . . . . . 217--223
                     Jie Wu and   
           Eduardo B. Fernandez   Fault-tolerant distributed broadcast
                                  algorithm for cube-connected cycles  . . 224--233
          Andrea Bondavalli and   
   Felicita Di Giandomenico and   
                         Jie Xu   Cost-effective and flexible scheme for
                                  software fault tolerance . . . . . . . . 234--244
               Chhping Wang and   
            Victor O. K. Li and   
               Arbee L. P. Chen   One-shot semi-join execution strategies
                                  for processing distributed join queries  245--253


Computer Systems Science and Engineering
Volume 9, Number 1, January, 1994

                  Yoshiro Tohma   Review of fault-tolerant computing for
                                  safely critical applications in Japan    3--10
              Hongying Wang and   
          Douglas M. Blough and   
                   Leon Alkalaj   Practical approach to comparison-based
                                  fault diagnosis in multiprocessor
                                  systems  . . . . . . . . . . . . . . . . 11--20
              Her-Kun Chang and   
                Shyan-Ming Yuan   Efficient algorithm for evaluating the
                                  availability of multidimensional voting  21--24
              Yoshiro Tohma and   
              Yukichi Matsunaga   Application of hyper-geometric
                                  distribution model to the hardware
                                  debugging process  . . . . . . . . . . . 25--30
                         H. Ito   WSI network design and its evaluation
                                  using yields . . . . . . . . . . . . . . 31--37
               Yukiya Miura and   
                    Jung Li and   
                    Wang Li and   
                   Naito Sachio   Four-valued logic system and its
                                  application to describing the
                                  specification and design verification of
                                  combinational circuits . . . . . . . . . 38--45
                  Takashi Nanya   Anti-code-disjoint mapping for exception
                                  handling in self-checking systems
                                  hierarchy  . . . . . . . . . . . . . . . 46--53
            Tomohiro Yoneda and   
              Toru Egashira and   
                Yoshihiro Tohma   Improving a fault-tolerant clock
                                  synchronization algorithm by
                                  overcorrection . . . . . . . . . . . . . 54--64
                 Carlson Ho and   
               Kevin E. Forward   Verification and validation of hardware
                                  designs via hardware Petri nets  . . . . 65--72

Computer Systems Science and Engineering
Volume 9, Number 2, April, 1994

                  K. H. Kim and   
             L. F. Bacellar and   
                J. Goldberg and   
                   K. Masui and   
                    K. Mori and   
                   R. Yoshizawa   Modular implementation model for
                                  real-time fault-tolerant LAN systems
                                  based on the DRB scheme with a
                                  configuration supervisor . . . . . . . . 75--82
            Shinji Kusumoto and   
         Ken-ichi Matsumoto and   
               Tohru Kikuno and   
                Kazuhiro Tanaka   Improvement of the software development
                                  process by using fault tolerant
                                  techniques . . . . . . . . . . . . . . . 83--88
                   Oliver Theel   Meeting the application's needs: a
                                  design study of a highly customized
                                  replication scheme and its
                                  implementation . . . . . . . . . . . . . 89--97
                   Henning Koch   Embedding protocols for scalable
                                  replication management . . . . . . . . . 98--103
                      Tom Downs   Modelling software testing for
                                  reliability prediction . . . . . . . . . 104--111
            Hiromi Hiraishi and   
                  Tatsuya Nakae   Efficient inverse image computation
                                  algorithm for sequential machine
                                  verification using temporal logics . . . 112--117
            Elizabeth Chang and   
               Tharam S. Dillon   Achieving software reliability and fault
                                  tolerance using the object oriented
                                  paradigm . . . . . . . . . . . . . . . . 118--121
              Kent C. Clapp and   
            Ravishankar K. Iyer   Large system test data analysis  . . . . 122--133
Òystein Torbjòrnsen and   
           Svein-Olaf Hvasshovd   Application of an abstract machine
                                  supporting fault-tolerance in a parallel
                                  database server  . . . . . . . . . . . . 134--141
  Jörgen Christmansson and   
        Zbigniew Kalbarczyk and   
                      Jan Torin   Dependable Flight Control System Using
                                  Data Diversity with Error Recovery . . . 142--150

International Journal of Computer Systems Science and Engineering
Volume 9, Number 3, July, 1994

              A. Pombortsis and   
                       A. Menos   Modelling a class of resource sharing
                                  interconnection networks using timed
                                  Petri nets . . . . . . . . . . . . . . . 155--163
                Chiun-Chieh Hsu   On the allocation of processors to tasks
                                  with precedence constraints and
                                  communication overhead . . . . . . . . . 164--174
              D. Bhagavathi and   
                W. M. Denny and   
               C. E. Grosch and   
               P. J. Looges and   
                      S. Olariu   Sorting and merging on the DAP . . . . . 175--183
       Constantine Katsinis and   
                Amelie Constant   Effect of queue selection and service
                                  time distributions in multiple resource
                                  allocation . . . . . . . . . . . . . . . 184--194
               L. L. Miller and   
           J. Leszczylowski and   
                S. K. Gadia and   
                        P. Chan   Storage model for processing semantic
                                  exceptions . . . . . . . . . . . . . . . 195--204

International Journal of Computer Systems Science and Engineering
Volume 9, Number 4, October, 1994

   Constantinos V. Papadopoulos   Provably optimal routing algorithms for
                                  signal routing . . . . . . . . . . . . . 211--219
       Rasiah Loganantharaj and   
                 Ay-Hwa A. Liou   Recent results on parallel link
                                  resolution . . . . . . . . . . . . . . . 220--233
        Alexander B. Romanovsky   Recovery unification for concurrent
                                  heterogeneous systems  . . . . . . . . . 234--239
         Patrick M. Lenders and   
                 Heiko Schroder   Minimizing data flow in mathematical
                                  morphology architectures . . . . . . . . 240--245
               David Finkel and   
              Xiannong Meng and   
                  Sanjay Parikh   Load sharing that supports fault
                                  tolerance in a distributed computing
                                  system . . . . . . . . . . . . . . . . . 246--254
         Giuseppina C. Gini and   
                    C. Rogialli   CONSTRICTOR: a constraint-based language 255--261


International Journal of Computer Systems Science and Engineering
Volume 10, Number 1, January, 1995

               Kian-Lee Tan and   
                     Hongjun Lu   Skew handling strategies for pipelined
                                  processing of multi-join queries in
                                  shared-nothing systems . . . . . . . . . 3--18
                Ravi Mittal and   
                 Deepak Cherian   Self-routing double tree (DOT) network,
                                  its permutation capability and
                                  applications . . . . . . . . . . . . . . 19--27
                        Wei Wei   Constructing reliable neural network
                                  systems using less reliable neuron
                                  network components . . . . . . . . . . . 28--32
                   M. Ghose and   
                  M. Zubair and   
                   C. E. Grosch   Parallel partitioning of sparse matrices 33--40
               Son T. Vuong and   
              George K. Tsiknis   Significant event temporal logic: a
                                  method for protocol specification and
                                  verification . . . . . . . . . . . . . . 41--49
                Mikal Ziane and   
               Mohamed Zait and   
               Hong Hoang Quang   Parallelism and query optimization . . . 50--56
            Hsiou-Mien Lien and   
                Shyan-Ming Yuan   SGHC: a new class of optimally
                                  fault-tolerant networks  . . . . . . . . 57--64

International Journal of Computer Systems Science and Engineering
Volume 10, Number 2, April, 1995

     Jonathan Jen-Rong Chen and   
          Henry Ker-Chang Chang   Secure information broadcasting scheme
                                  using embedded locks . . . . . . . . . . 67--74
           Ajoy Kumar Datta and   
           Oscar R. Aguilar and   
           Mitchell Flatebo and   
                  Sukumar Ghosh   Simulating shared memory primitives in
                                  asynchronous message passing systems . . 75--83
                 A. Kuchlos and   
                C. P. Ravikumar   Two-way partitioning of shuffle-exchange
                                  and DeBruijn graphs  . . . . . . . . . . 84--92
              Tzong-Chen Wu and   
               Tzong-Sun Wu and   
                     Wei-Hua He   Dynamic access control scheme based on
                                  the Chinese remainder theorem  . . . . . 92--99
                 B. Pradeep and   
             C. Siva Ram Murthy   Sorting on mesh-connected computers with
                                  multiple broadcasting using $ N^{2 / 3}
                                  \times N^{2 / 3} $ processors  . . . . . 100--110
                Yen-Wen Lin and   
            Shyan-Ming Yuan and   
                    Deron Liang   Design and implementation of Moony: a
                                  fault tolerant distributed shared memory
                                  system . . . . . . . . . . . . . . . . . 111--119
              Cui-Qing Yang and   
                   Yaoshuang Qu   Reliability analysis for the execution
                                  of remote jobs in a workstation-based
                                  environment  . . . . . . . . . . . . . . 120--128

International Journal of Computer Systems Science and Engineering
Volume 10, Number 3, July, 1995

                  S. Olariu and   
              J. L. Schwing and   
                       J. Zhang   Fast adaptive convex hull algorithm on
                                  two-dimensional processor arrays with a
                                  reconfigurable bus system  . . . . . . . 131--137
                C. P. Ravikumar   Parallel $r$-dimensional placement on a
                                  vector minisupercomputer . . . . . . . . 138--143
                  L. Lilien and   
                S. M. Shatz and   
                     S. Damerla   Redistribution of hierarchically
                                  structured software in response to
                                  distributed system site crashes  . . . . 144--155
                 C. C. Jong and   
                  G. N. Toh and   
                       L. S. Ng   Automatic generation of customized
                                  functional models for rapid
                                  implementation of digital integrated
                                  circuits . . . . . . . . . . . . . . . . 156--163
                  M. Mohsin and   
                       B. Gupta   Fault-tolerance in pyramid tree network
                                  architecture . . . . . . . . . . . . . . 164--172
                        D. Saha   Improved topology for achieving
                                  reliability in high-speed tree LANs  . . 173--178
               Ch.-zong Lin and   
              Ch.-Ch. Tseng and   
                     Kw.-H. Chi   Design of an efficient data-driven
                                  pipelined computer architecture  . . . . 179--186
                K.-L. Chung and   
                     Yu-W. Chen   Fault-tolerant embedding multiple
                                  complete binary trees into hypercubes    187--191

International Journal of Computer Systems Science and Engineering
Volume 10, Number 4, October, 1995

         Mike P. Papazoglou and   
                 Alex Denis and   
           Bernd J. Krämer   Use of middleware facilities in
                                  interoperable databases  . . . . . . . . 195--206
                   Tao Wang and   
                      Wuxu Peng   Improving Internet routing information
                                  protocol . . . . . . . . . . . . . . . . 207--213
  Suresh K. Damodaran-Kamal and   
                  Niki Pissinou   Shared access and communication in
                                  distributed databases using an object
                                  environment  . . . . . . . . . . . . . . 214--222
           Dinesh Kadamuddi and   
             Jeffrey J. P. Tsai   MDDT constructs for incorporating
                                  early-receives in distributed computing  223--233
              W. Melody Moh and   
               Yu-Jen Chien and   
             Teng-Sheng Moh and   
              Charles U. Martel   Prioritized conflict resolution on
                                  multiple access broadcast networks:
                                  algorithms and performance . . . . . . . 234--243
                W. A. Woods and   
                H. D. Moser and   
                 O. Frieder and   
                 Paul B. Kantor   Simulation evaluation of task scheduling
                                  on reconfigurable multicomputer
                                  architectures  . . . . . . . . . . . . . 244--254


International Journal of Computer Systems Science and Engineering
Volume 11, Number 1, January, 1996

             Javier Cordova and   
                  Yann-Hang Lee   Multicast trees to provide message
                                  ordering in mesh networks  . . . . . . . 3--13
                     R. Lai and   
            A. Jirachiefpattana   Verifying Estelle protocol
                                  specifications using numerical Petri
                                  nets . . . . . . . . . . . . . . . . . . 15--33
              Niki Pissinou and   
            Kanonkluk Vanapipat   Active database rules in distributed
                                  database systems: a dynamic approach to
                                  solving structural and semantic
                                  conflicts in distributed database
                                  systems  . . . . . . . . . . . . . . . . 35--44
              D. Manivannan and   
                     M. Singhal   Decentralized token generation scheme
                                  for token-based mutual exclusion
                                  algorithms . . . . . . . . . . . . . . . 45--54
            Shyan-Ming Yuan and   
                Jeng-Dar Wu and   
                Dong-Lieng Wang   SHDS --- an X-Window based
                                  semi-hypermedia document system  . . . . 55--64

International Journal of Computer Systems Science and Engineering
Volume 11, Number 2, March, 1996

              Sadiq M. Sait and   
         Khaled M. Elleithy and   
                 Masud-ul Hasan   Formal synthesis of VLSI layouts from
                                  algorithmic specifications . . . . . . . 67--81
                Tomislav Lovric   Detecting hardware faults with
                                  systematic and design diversity:
                                  Experimental results . . . . . . . . . . 83--92
                 S. K. Dash and   
                         B. Jha   Global numerical weather model
                                  integrated on a transputer-based
                                  parallel computer  . . . . . . . . . . . 93--98
                      Yahui Zhu   Fast processor allocation and dynamic
                                  scheduling for mesh multiprocessors  . . 99--107
           A. B. Romanovsky and   
                  I. V. Shturtz   Dynamic conversions  . . . . . . . . . . 109--116
              Jiann-Fu Linn and   
                   Sao-Jie Chen   Analysis of multiprocessor task
                                  scheduling . . . . . . . . . . . . . . . 117--120

International Journal of Computer Systems Science and Engineering
Volume 11, Number 3, May, 1996

                  D. M. Johnson   Integrated modular avionics: a scheme
                                  for autonomous dynamic system
                                  reconfiguration  . . . . . . . . . . . . 125--133
               Marwan Krunz and   
                   Ron Sass and   
                  Herman Hughes   Study of VBR MPEG-coded video traffic
                                  and associated multiplexing performance  135--143
             Shahram Latifi and   
              Nader Bagherzadeh   On clustered-star graph and its
                                  properties . . . . . . . . . . . . . . . 145--149
                Xiaohua Jia and   
            Kentaro Shimizu and   
                 Mamoru Maekawa   Atomic accesses to replicated files in
                                  reliable distributed file systems  . . . 151--158
            Mark J. Clement and   
               Michael J. Quinn   Architectural scaling and analytical
                                  performance prediction . . . . . . . . . 159--167
       Constantine Katsinis and   
                      Pat Hogan   Concurrent multitasking applications on
                                  a shared-bus multicomputer system  . . . 169--176
           Allan K. Y. Wong and   
                Daniel S. Yeung   RHS --- a framework for exploiting
                                  distributed parallelism efficiently  . . 177--184

International Journal of Computer Systems Science and Engineering
Volume 11, Number 4, July, 1996

             Zahira S. Khan and   
                  Eugene Kwatny   Performance comparison of interprocessor
                                  communication schemes for a hashing
                                  technique on the Connection Machine  . . 189--194
            Naphtali Rishie and   
        Artyom Shaposhnikov and   
                   Scott Graham   Load balancing in a massively parallel
                                  semantic database  . . . . . . . . . . . 195--199
               A. V. Shafarenko   RETRAN: a recurrent paradigm for
                                  data-parallel computing  . . . . . . . . 201--209
                 M. Dal Cin and   
              H. Hessenauer and   
                        W. Hohl   The Modular Expandable Multiprocessor
                                  System, MEMSY  . . . . . . . . . . . . . 211--219
          Nader Bagherzadeh and   
                    Martin Dowd   Problems on routing bounded distance
                                  assignments in hypercubes  . . . . . . . 221--226
                    Sam Lor and   
                  Hong Shen and   
              Piyush Maheshwari   Divide-and-conquer minimal-cut
                                  bisectioning of task graphs  . . . . . . 227--234
          Sampalli Srinivas and   
            Nripendra N. Biswas   Fast algorithm for data exchange in
                                  reconfigurable tree structures . . . . . 235--243
                   Gibor Nemeth   Scheduling, timing and intractability in
                                  massively parallel systems . . . . . . . 245--254

International Journal of Computer Systems Science and Engineering
Volume 11, Number 5, September, 1996

              Habib Youssef and   
              Sadiq M. Sait and   
           A. S. Al-Mulhelm and   
                M. S. T. Benten   High-level synthesis from purely
                                  behavioral descriptions  . . . . . . . . 259--273
          Matti A. Hiltunen and   
         Richard D. Schlichting   Adaptive distributed and fault-tolerant
                                  systems  . . . . . . . . . . . . . . . . 275--285
            Hamid R. Sharif and   
          Hamid Vakilzadian and   
            Sreekanth Nagisetty   Design and analysis of a serial link
                                  interconnection network architecture . . 287--299
                  I. Majzik and   
                    W. Hohl and   
               A. Pataricza and   
                        V. Sieh   Multiprocessor checking using watchdog
                                  processors . . . . . . . . . . . . . . . 301--310
             Tzonelih Hwang and   
               Narn-Yih Lee and   
              Chuan-Ming Li and   
                Chin-Chen Chang   On the security of Chang and Wu's
                                  broadcasting cryptosystem for computer
                                  networks . . . . . . . . . . . . . . . . 311--314
               Jiann-Fu Lin and   
                   Sao-Jie Chen   Comment on `Broadcasting cryptosystem in
                                  computer networks using interpolating
                                  polynomials' . . . . . . . . . . . . . . 315--317

International Journal of Computer Systems Science and Engineering
Volume 11, Number 6, November, 1996

               Erol Gelenbe and   
               Xiaowen Mang and   
                     Yutao Feng   Diffusion cell loss estimate for ATM
                                  with multiclass bursty traffic . . . . . 325--333
         Shuo-Yen Robert Li and   
                    Chu Man Lau   Concentrators in ATM switching . . . . . 335--342
              Shih T. Liang and   
                 Maria C. Yuang   Departure process analysis for
                                  earliest-due-date scheduling discipline
                                  in ATM switches  . . . . . . . . . . . . 343--352
         Zigmantas Budrikis and   
          Steven Van Luinen and   
            Antonio Cantoni and   
               Vaughan Wittorff   Performance evaluation of controlled
                                  cell transfer service in ATM LAN . . . . 353--360
               Hongyi Zhang and   
             Oliver W. Yang and   
                     H. Mouftah   Adaptive rate-based congestion control
                                  in ATM switching networks  . . . . . . . 361--367
                     W. Liu and   
                     Erik Dirkx   Parallel simulation of ATM switches  . . 369--381
              Philip W. Tse and   
            Moshe Zuckerman and   
    François Le Faucheur   Performance and fairness issues related
                                  to the EFCI rate-based flow control for
                                  the ABR service in ATM networks  . . . . 383--392
              Bart Steyaert and   
                 Herwig Bruneel   Delay performance of CBR traffic in an
                                  ATM multiplexer with high-priority
                                  background traffic . . . . . . . . . . . 393--399


International Journal of Computer Systems Science and Engineering
Volume 12, Number 1, January, 1997

            Andrzej Krasniewski   Coverage of delay faults: single number
                                  can be very misleading . . . . . . . . . 3--12
              Yuh-Dauh Lyuu and   
                Eugen Schenfeld   New algorithms for matrix operations
                                  with applications to a reconfigurable
                                  parallel architecture  . . . . . . . . . 13--24
                   Kian-Lee Tan   Decoupling load-balancing and
                                  optimization issues: a two-phase query
                                  processing framework for shared-nothing
                                  systems  . . . . . . . . . . . . . . . . 25--36
          Jonathan J-R Chen and   
                   Ping-Tai Sun   New ID-based cryptosystem based on
                                  number theory  . . . . . . . . . . . . . 37--41
            Shyan-Ming Yuan and   
                    Yu-Kwen Hsu   Design and implementation of a
                                  distributed monitor facility . . . . . . 43--51
            Chiun-Chieh Hsu and   
             Chien-Min Wang and   
                  Jeen-Fong Lin   Efficient loop allocation based on the
                                  analysis of processor requirement of
                                  loops with equivalent completion times   53--60

International Journal of Computer Systems Science and Engineering
Volume 12, Number 2, March, 1997

            Hussein Mouftah and   
           Mohammed Atiquzzaman   Special Issue: ATM Networks  . . . . . . ??
              Sanjeev Kumar and   
              Dharma P. Agrawal   The shared-buffer direct-access (SBDA)
                                  ATM switch architecture for broadband
                                  networks . . . . . . . . . . . . . . . . 69--79
                 Simon Fong and   
                Samar Singh and   
           Mohammed Atiquzzaman   Analytical model and performance
                                  analysis of shared buffer ATM switches
                                  under non-uniform traffic  . . . . . . . 81--93
                  Yanhe Fan and   
              Nicolas Georganas   Performance analysis of ATM switches
                                  with self-similar input traffic  . . . . 95--102
                Yijun Xiong and   
                    Lorne Mason   Performance of multistage ATM switching
                                  networks with multicast capability . . . 103--115
                 Latha Kant and   
             William H. Sanders   Analysis of the distribution of
                                  consecutive cell losses in an ATM switch
                                  using stochastic activity networks . . . 117--129
           H. Jonathan Chao and   
                    Jun S. Hong   Design of an ATM shaping multiplexer
                                  with guaranteed output burstiness  . . . 131--141
              Rose P. Tsang and   
                 David D. C. Hu   Efficient interconnections for cascading
                                  multiple ATM switches  . . . . . . . . . 143--157
                Tony T. Lee and   
                   Philip P. To   Non-blocking and self-routing properties
                                  of sort-Clos networks  . . . . . . . . . 159--169

International Journal of Computer Systems Science and Engineering
Volume 12, Number 3, May, 1997

             Wei-Kuo Chiang and   
                 Rong-Jaye Chen   Block-switch networks: a cost-effective
                                  class of interconnection networks  . . . 175--185
  Vassilios V. Dimakopoulos and   
          Nikitas J. Dimopoulos   Broadcasting in hypercycles  . . . . . . 187--192
                Xiaohua Jia and   
                   Wilson Cheng   Distributed operating systems vs.
                                  distributed system environments  . . . . 193--203
             Stephan Olariu and   
           James L. Schwing and   
             Jingyuan Zhang and   
                  Albert Zomaya   A time- and cost-optimal algorithm for
                                  channel assignment . . . . . . . . . . . 205--211
             Amitabha Sinha and   
              Arunava Sinha and   
              Subrata Choudhury   New approach for splitting a class of
                                  real-time algorithms for pipelined
                                  processing . . . . . . . . . . . . . . . 213--220
             Jamel M. Tahir and   
             Satnam S. Dlay and   
     Raouf N. Gorgui-Naguib and   
               Oliver R. Hinton   Concurrent error detection in fast
                                  Fermat number transform networks . . . . 221--226

International Journal of Computer Systems Science and Engineering
Volume 12, Number 4, July, 1997

           Paul P. Ignatius and   
             C. Siva Ram Murthy   On task allocation in heterogeneous
                                  distributed computing systems  . . . . . 231--238
              Tzong-Chen Wu and   
                  Bor-Ron Hwang   On the design of a secure anonymous
                                  conference key distribution system . . . 239--244
               Bernd Bieker and   
            Geert Deconinck and   
                Erik Maehle and   
                  Johan Vounckx   Fault-tolerant routing, reconfiguration
                                  and backward error recovery for parallel
                                  systems  . . . . . . . . . . . . . . . . 245--253
                    Hu-Jun Wang   Analysis of prioritized cluster-based
                                  crossbar systems . . . . . . . . . . . . 255--261
               Kian-Lee Tan and   
                  Jeffrey X. Yu   Framework for scheduling partition-based
                                  joins  . . . . . . . . . . . . . . . . . 263--273
               C. J. Semple and   
          V. Lakshmi Narasimhan   Design and implementation of a
                                  distributed system utilising task
                                  farming on IBM PC compatible computers
                                  and a Novell network . . . . . . . . . . 275--283

International Journal of Computer Systems Science and Engineering
Volume 12, Number 5, September, 1997

                M. Bozyigit and   
                       M. Melhi   Load balancing framework for distributed
                                  systems  . . . . . . . . . . . . . . . . 287--293
           Ajoy Kumar Datta and   
           Mitchell Flatebo and   
         Visalakshi Thiagarajan   Simulation of self-stabilizing
                                  algorithms . . . . . . . . . . . . . . . 295--306
             D. J. V. Evans and   
                A. M. Goscinski   Automatic identification of parallel
                                  units and synchronization points in
                                  programs for parallel execution on a
                                  distributed system . . . . . . . . . . . 307--315
                Avigdor Gal and   
                   Opher Etzion   Parallel execution model for updating
                                  temporal databases . . . . . . . . . . . 317--327
            Alexander Thomasian   Approximate analyses for fork/join
                                  synchronization in RAID5 . . . . . . . . 329--337

International Journal of Computer Systems Science and Engineering
Volume 12, Number 6, November, 1997

                      Anonymous   Index to Volume 12, 1997 . . . . . . . . ??
            Shyan-Ming Yuan and   
              Ashok K. Agrawala   An efficient communication structure for
                                  decentralized algorithms with fault
                                  tolerance  . . . . . . . . . . . . . . . 343--349
              T. Srikanthan and   
                 K. Y. Chan and   
                    S. K. Leong   Two-layer dynamic load balancing for a
                                  transputer-based vehicle simulator . . . 351--358
               Erik Demaine and   
              Sampalli Srinivas   Routing algorithms on static
                                  interconnection networks: a
                                  classification scheme  . . . . . . . . . 359--367
            Peter K. K. Loh and   
                   Hsu Wen Jing   Dynamic load balancing on multiprocessor
                                  networks . . . . . . . . . . . . . . . . 369--372
             Fillia Makedon and   
               Antonis Symvonis   Heuristic methods for permutation
                                  routing on meshes and tori . . . . . . . 373--380
                     J. You and   
                  W. P. Zhu and   
                   E. Pissaloux   Parallel image matching on a distributed
                                  system . . . . . . . . . . . . . . . . . 381--385
               Hui-Tang Lin and   
               Herman D. Hughes   Performance evaluation of priority
                                  buffer management in ATM switches  . . . 387--393


International Journal of Computer Systems Science and Engineering
Volume 13, Number 1, January, 1998

               Albert Y. Zomaya   Special Issue: Simulation in parallel
                                  and distributed computing environments   ??
            Michael Jurczyk and   
         Thomas Schwederski and   
          Howard Jay Siegel and   
               Seth Abraham and   
            Richard Martin Born   Strategies for the implementation of
                                  interconnection network simulators on
                                  parallel computers . . . . . . . . . . . 5--16
             Henk L. Muller and   
               Sanjay Raina and   
        Paul W. A. Stallard and   
             David H. D. Warren   Parallel calibrated emulation as a
                                  technique for evaluating parallel
                                  architectures  . . . . . . . . . . . . . 17--25
               Celso Hirata and   
                    Jeff Kramer   A novel modelling approach for parallel
                                  simulation . . . . . . . . . . . . . . . 27--37
          Mostafa Bassiouni and   
            Ming-Hsing Chiu and   
             Margaret Loper and   
                Michael Garnsey   Relevance filtering for distributed
                                  interactive simulation . . . . . . . . . 39--47
                Gary A. Bundell   Modelling of distributed systems with
                                  timed event graphs . . . . . . . . . . . 49--54
               Narsingh Deo and   
          Muralidhar Medidi and   
               Sushil K. Prasad   Load balancing in parallel battlefield
                                  management simulation on local- and
                                  shared-memory architectures  . . . . . . 55--65
            Ka-Cheong Leung and   
                   Mounir Hamdi   Performance assessment of network
                                  protocols and parallel programming tools
                                  for distributed computing systems  . . . 67--80

International Journal of Computer Systems Science and Engineering
Volume 13, Number 2, March, 1998

                   C. Black and   
                S. M. Shatz and   
                          S. Tu   A query language for automated general
                                  analysis of Concurrent Ada programs  . . 83--95
                Yu-Wei Chen and   
                Kuo-Liang Chung   On fault-tolerant embedding complete
                                  binary trees into hypercubes . . . . . . 97--100
                 Reinhard Posch   Massive parallelism on a chip: VLSI
                                  aspects involving dynamic logic  . . . . 101--107
             Shin-Jia Hwang and   
           Chien-Yuang Chen and   
                Chin-Chen Chang   An encryption/multisignature scheme with
                                  specified receiving groups . . . . . . . 109--112
                       Keqin Li   Efficient reliability prediction for
                                  $N$-version software systems with
                                  multiple stages  . . . . . . . . . . . . 113--120
            Chin-Chen Chang and   
              Tzong-Chen Wu and   
                  Yi-Shiung Yeh   Broadcasting secrets in communication
                                  networks . . . . . . . . . . . . . . . . 121--124
            Kuo-Liang Chung and   
                    Yu-Wei Chen   Fast pipelined prefix computations on
                                  MIMD hypercubes  . . . . . . . . . . . . 125--130
           Carsta Petersohn and   
           Cornelis Huizing and   
                Jan Peleska and   
          Willem-Paul de Roever   Formal semantics for Ward and Mellor's
                                  transformation schemas and its
                                  application to fault tolerant systems    131--136

International Journal of Computer Systems Science and Engineering
Volume 13, Number 3, May, 1998

         Phillip C.-Y. Sheu and   
                      K. H. Kim   Special Issue: Real-Time Object-Oriented
                                  Systems  . . . . . . . . . . . . . . . . ??
           Dieter K. Hammer and   
           Andrew A. Hanish and   
               Tharam S. Dillon   Modeling behavior and dependability of
                                  object-oriented real-time systems  . . . 139--150
           Martin Gergeleit and   
               Michael Mock and   
                     Edgar Nett   T-CORBA: Making object-oriented systems
                                  time-aware . . . . . . . . . . . . . . . 151--160
                   L. Motus and   
                        T. Naks   Formal timing analysis of OMT designs
                                  using LIMITS . . . . . . . . . . . . . . 161--170
               Jung-Guk Kim and   
               Jin Pyo Hong and   
            Byoung-Joon Min and   
                   Moon Hae Kim   Modeling of multimedia services using
                                  the TMO model  . . . . . . . . . . . . . 171--178
             Katsuya Tanaka and   
             Hiroaki Higaki and   
                Makoto Takizawa   Object-based checkpoints in distributed
                                  systems  . . . . . . . . . . . . . . . . 179--185

International Journal of Computer Systems Science and Engineering
Volume 13, Number 4, July, 1998

         George A. Papadopoulos   A multimedia programming model based on
                                  timed concurrent constraint programming  195--205
            Andrea Baiocchi and   
     Nicola Blefari-Melazzi and   
                Francesca Cuomo   Dimensioning criteria of traffic
                                  contract parameters and connection
                                  admission control rules in an ATM
                                  user-network interface . . . . . . . . . 207--217
                 Lily Cheng and   
                  Herman Hughes   Integrating call admission and cell
                                  scheduling . . . . . . . . . . . . . . . 219--226
            Cheng-Huang Yen and   
               L. L. Miller and   
                 A. Sirjani and   
                      J. Tenner   Extending the object-relational
                                  interface to support an extensible view
                                  system for multidatabase integration and
                                  interoperation . . . . . . . . . . . . . 227--240
               Gopal Sharma and   
                   Bidyut Gupta   Parallel scheduler for a shared memory
                                  (tightly-coupled) multiprocessor system  241--247
     Sibelius Lellis Vieira and   
Mauricio Ferreira Magalhães   Online sporadic task scheduling in hard
                                  real-time systems  . . . . . . . . . . . 249--258

International Journal of Computer Systems Science and Engineering
Volume 13, Number 5, September, 1998

            Roberto Baldoni and   
               Ravi Prakash and   
              Michel Raynal and   
                 Mukesh Singhal   Efficient $ \Delta $-causal broadcasting 263--269
            Roberto Beraldi and   
           Paolo Giacomazzi and   
                 Riccardo Melen   Efficient topologies for ATM switching
                                  fabrics with shortest path and
                                  deflection routing . . . . . . . . . . . 271--281
            C. P. Ravikumar and   
                 S. Chakraverty   VLSI implementation of a strongly fault
                                  secure ALU . . . . . . . . . . . . . . . 283--288
            Daniel S. Yeung and   
               Allan K. Y. Wong   OORHS: a conceptual framework that
                                  provides easy and reversible distributed
                                  programming  . . . . . . . . . . . . . . 289--301
         Mehran Dowlatshahi and   
                       S. K. De   Performance analysis of ATM switches fed
                                  with periodic and correlated traffic . . 303--310
            Daniel S. Yeung and   
                  A. K. Y. Wong   An evaluation identifying features of
                                  unified distributed programming  . . . . 311--321

International Journal of Computer Systems Science and Engineering
Volume 13, Number 6, November, 1998

                      Anonymous   Index to Volume 13, 1998 . . . . . . . . ??
              D. R. Avresky and   
            S. J. Geoghegan and   
                 P. K. Tapadiya   A software-based fault-injection tool
                                  (SOFIT)  . . . . . . . . . . . . . . . . 327--337
              Andrea Bobbio and   
                   Miklos Telek   Non-exponential stochastic Petri nets:
                                  an overview of methods and techniques    339--351
             Der-Chyuan Lou and   
                Chin-Chen Chang   A fast modular multiplication method . . 353--358
                 N. N. Raju and   
                    Ravi Mittal   Performance comparison of multicasting
                                  schemes for ATM switches under
                                  heterogeneous traffic  . . . . . . . . . 359--368
        Alexander B. Romanovsky   Predictable toleration of design faults:
                                  Recovery blocks in real time systems . . 369--377
                 A. A. Andijani   Buffer management of a switch for ATM
                                  networks: a multi-objective approach . . 379--386


International Journal of Computer Systems Science and Engineering
Volume 14, Number 1, January, 1999

              Sadiq M. Sait and   
              Habib Youssef and   
              Khalid Nassar and   
          Muhammad S. T. Benten   Timing driven genetic placement  . . . . 3--14
              Jin Chin Wang and   
           Jacqueline Chame and   
                  Michel Dubois   Modeling finite cache effects in
                                  write-invalidate snooping protocols  . . 15--25
                  Xiannong Meng   Distributed simulations: Issues and
                                  implementations in a cluster of
                                  workstations environment . . . . . . . . 27--37
         George A. Papadopoulos   Object-oriented term graph rewriting . . 39--50
             S. Jayaprakash and   
            C. R. Muthukrishnan   Permission-based fault-tolerant
                                  distributed mutual exclusion algorithm   51--60

International Journal of Computer Systems Science and Engineering
Volume 14, Number 2, March, 1999

              Letizia Tanca and   
                      Dan Suciu   Special issue: Semantics on the World
                                  Wide Web . . . . . . . . . . . . . . . . ??
         Danius Michaelides and   
                 Luc Moreau and   
                 David De Roure   Editorial: Uniform approach to
                                  programming the World Wide Web . . . . . 69--81
               Laura Bright and   
         Jean-Robert Gruser and   
             Louiqa Raschid and   
             Maria Esther Vidal   A wrapper generation toolkit to specify
                                  and construct wrappers for Web
                                  accessible data sources (WebSources) . . 83--97
                   Ling Liu and   
                  Calton Pu and   
                   Wei Tang and   
                        Wei Han   CONQUER: a continual query system for
                                  update monitoring in the WWW . . . . . . 99--112
              Myra Spiliopoulou   The laborious way from data mining to
                                  Web log mining . . . . . . . . . . . . . 113--125

International Journal of Computer Systems Science and Engineering
Volume 14, Number 3, May, 1999

                       Keqin Li   An analytical model for approximating
                                  performance of partitionable
                                  multiprocessor systems . . . . . . . . . 131--145
            Meng Chang Chen and   
                Jan-Ming Ho and   
                Ming-Tat Ko and   
                 Shie-Yuan Wang   A SCSI disk model for multimedia storage
                                  systems  . . . . . . . . . . . . . . . . 147--154
         Marleen Adé and   
            Rudy Lauwereins and   
             J. A. Peperstraete   Buffer memory requirements in DSP
                                  applications . . . . . . . . . . . . . . 155--165
              D. R. Avresky and   
                  K. M. Altawil   Embedding general spanning trees in
                                  faulty hypercubes  . . . . . . . . . . . 167--174
              Habib Youssef and   
                  Sadiq M. Sait   Timing-driven global routing for
                                  standard-cell VLSI design  . . . . . . . 175--185

International Journal of Computer Systems Science and Engineering
Volume 14, Number 4, July, 1999

           Dieter K. Hammer and   
               Tohru Kikuno and   
                      Insup Lee   Special issue: Object-Oriented Real-Time
                                  Distributed Computing  . . . . . . . . . ??
       Alexander Romanovsky and   
                     Jie Xu and   
                  Brian Randell   Editorial: Coordination exception
                                  handling in real-time distributed object
                                  systems  . . . . . . . . . . . . . . . . 197--207
              Andreas Polze and   
                 Miroslaw Malek   Responsive services with CORBA . . . . . 209--216
         Reino Kurki-Suonio and   
                    Mika Katara   Logical layers in specifications with
                                  distributed objects and real time  . . . 217--226
          Michael Squadrito and   
               Levon Esibov and   
      Lisa Cingiser DiPippo and   
           Victor Fay Wolfe and   
             Gregory Cooper and   
       Bhavani Thurasingham and   
                Peter Krupp and   
            Michel Milligan and   
           Russell Johnston and   
      Ramachandra Bethmangalkar   The affected set priority ceiling
                                  protocols for real-time object-oriented
                                  concurrency control  . . . . . . . . . . 227--239
           K. H. (Kane) Kim and   
             Chittur Subbaraman   Architectural principles for realizing
                                  timeliness-guaranteed operating system
                                  kernels  . . . . . . . . . . . . . . . . 241--249
          John A. Stankovic and   
                    Sang H. Son   An architecture and object model for
                                  distributed object-oriented real-time
                                  databases  . . . . . . . . . . . . . . . 251--259

International Journal of Computer Systems Science and Engineering
Volume 14, Number 5, 1999

                  C.-C. Hsu and   
                      S.-S. Lin   Path establishment of permutations in a
                                  rearrangeable interconnection network    267
             A. Arulambalam and   
                    X. Chen and   
                      N. Ansari   Impact of per-VC and single FIFO queuing
                                  on ABR congestion control  . . . . . . . 275
                 M. D. Feng and   
                  C. K. Y. Chen   Parallel Lisp with speculation and
                                  subtuplespace on distributed systems . . 283
                  H. A. Xie and   
              K. E. Forward and   
                    K. M. Adams   A programmable database coprocessor in a
                                  PSQL system  . . . . . . . . . . . . . . 299
                      C.-C. Hsu   Embedability and recovery of a
                                  bubblesort star graph interconnection
                                  network  . . . . . . . . . . . . . . . . 307
                     L. Shi and   
                  O. De Vel and   
                         J. Cao   A hierarchical and distributed
                                  monitoring system in interprocess
                                  communications . . . . . . . . . . . . . 317

International Journal of Computer Systems Science and Engineering
Volume 14, Number 6, 1999

        E. A. Rundensteiner and   
                 H. A. Kuno and   
                        Y. Zhou   Experimental evaluation of the SMX
                                  strategy for incremental materialized
                                  path view maintenance  . . . . . . . . . 331
            A. J. H. Simons and   
                  M. Snoeck and   
                  K. S. Y. Hung   Using design patterns to reveal the
                                  competence of object-oriented methods in
                                  system-level design  . . . . . . . . . . 343
            T. Vianna de Araujo   Object-oriented hierarchies and their
                                  resulting complex systems  . . . . . . . 353
                 M. Saksena and   
               R. B. France and   
          M. M. Larrondo-Petrie   A characterization of aggregation  . . . 363
                    M. L. Hines   Ontology of object-oriented database
                                  evolution  . . . . . . . . . . . . . . . 371
              C. Ben Achour and   
                C. Souveyet and   
                       M. Tawbi   Bridging the gap between users and
                                  requirements engineering: the
                                  scenario-based approach  . . . . . . . . 379
                C. Souveyet and   
                   R. Deneckere   Overview of the TOOBIS project: from a
                                  temporal extension of ODMG to a
                                  patterns-based approach extending the OO
                                  model  . . . . . . . . . . . . . . . . . 389


International Journal of Computer Systems Science and Engineering
Volume 15, Number 1, January, 2000

    R. Jiménez-Peris and   
M. Patiño Martínez and   
          S. Arévalo and   
              F. J. Ballesteros   TransLib: an Ada 95 object oriented
                                  framework for building transactional
                                  applications . . . . . . . . . . . . . . 7
               T. Vardanega and   
                     J. Gaisler   Lessons learned from the implementation
                                  of on-board tolerance to physical faults
                                  in Ada . . . . . . . . . . . . . . . . . 19
                  P. Rogers and   
                 A. J. Wellings   An incremental recovery cache supporting
                                  software fault tolerance mechanisms  . . 33
                 J. Miranda and   
          A. Álvarez and   
                  F. Guerra and   
              S. Arévalo   Programming replicated systems in Drago  49
                  J. Napier and   
                    L. Chen and   
                     J. May and   
                      G. Hughes   Fault simulation to validate
                                  fault-tolerance in Ada . . . . . . . . . 61

International Journal of Computer Systems Science and Engineering
Volume 15, Number 2, March, 2000

                      L. C. Hui   A practical algorithm to find longest
                                  common substring in linear time  . . . . 73
                      M. Raynal   Non-blocking atomic commitment in
                                  distributed systems: a tutorial based on
                                  a generic protocol . . . . . . . . . . . 77
                H. Ashihara and   
                   M. Matsumoto   Application of finite projective space
                                  to replicated data management  . . . . . 87
                    P. Buchholz   Efficient computation of equivalent and
                                  reduced representations for stochastic
                                  automata . . . . . . . . . . . . . . . . 93
              J. J.-R. Chen and   
                         Y. Liu   An ID-based digital multisignatures
                                  scheme with time stamp technique . . . . 105
                  D.-C. Lou and   
                     C.-C. Chen   An efficient divide-and-conquer
                                  technique for parallel computation of
                                  modular multi-exponentiation . . . . . . 111
                 J.-H. Park and   
                  H.-K. Lee and   
                      C.-S. Lee   A fault tolerant multistage
                                  interconnection network and its fault
                                  tolerant diagnosis: the ring-banyan
                                  network  . . . . . . . . . . . . . . . . 119
                C.-M. Chung and   
                 Y.-H. Wang and   
                 T. K. Shih and   
                  H.-C. Keh and   
                     J.-F. Chen   The complexity measurement of software
                                  through program decomposition  . . . . . 127

International Journal of Computer Systems Science and Engineering
Volume 15, Number 3, May, 2000

                        M. Abid   Prototyping environment for the design
                                  of hardware/software systems . . . . . . 137
                  A. Romanovsky   The domino effect as a deadlock  . . . . 147
                   P. S. Yu and   
                   K.-L. Wu and   
                         A. Dan   A dynamic parity grouping for efficient
                                  parity buffering for RAID-5 disk arrays  155
              T. Apostolopoulos   A time dependent network fault
                                  management model in a TCP/IP environment 165
              M. H. Karaata and   
                    K. A. Saleh   A distributed self-stabilizing algorithm
                                  for finding maximum matching . . . . . . 175
                T. Tsichiya and   
                      T. Kikuno   Dependable evaluation of the weighted
                                  voting scheme in the presence of node
                                  and link failures  . . . . . . . . . . . 181
                   C. Ersoy and   
                    A. Levi and   
                      O. Gumrah   Artificial intelligence techniques for
                                  discrete link capacity assignment in
                                  prioritized multiservice networks  . . . 191

International Journal of Computer Systems Science and Engineering
Volume 15, Number 4, July, 2000

                    S. Bataineh   Response time analysis of repairable
                                  multiprocessor systems . . . . . . . . . 201
                  W.-B. Lee and   
                    C.-C. Chang   User identification and key distribution
                                  maintaining anonymity for distributed
                                  computer networks  . . . . . . . . . . . 211
                     J. Kim and   
                     T. Han and   
                      S. K. Lee   VOQL: a Visual Object-oriented database
                                  Query Language for visualizing path
                                  expressions  . . . . . . . . . . . . . . 215
                     S.-J. Yang   Efficient algorithms for finding cores
                                  on weighted tree networks  . . . . . . . 233
                     Y. Min and   
               L. L. Miller and   
                   M. M. Owrang   A calculus for handling time in complex
                                  objects  . . . . . . . . . . . . . . . . 253

International Journal of Computer Systems Science and Engineering
Volume 15, Number 5, September, 2000

          Wil van der Aalst and   
               Stefan Jablonski   Editorial  . . . . . . . . . . . . . . . ??
     W. M. P. van der Aalst and   
                   S. Jablonski   Dealing with workflow change:
                                  identification of issues and solutions   ??
                  P. Grefen and   
                  K. Aberer and   
                 Y. Hoffner and   
                      H. Ludwig   CrossFlow: Cross-organizational workflow
                                  management in dynamic virtual
                                  enterprises  . . . . . . . . . . . . . . ??
                   J. Desel and   
                       T. Erwin   Hybrid specifications: looking at
                                  workflows from a run-time perspective    ??
                 W. Deiters and   
                T. Goesmann and   
               T. Löffeler   Flexibility in workflow management:
                                  dimensions and solutions . . . . . . . . ??
               A. B. Raposo and   
     L. P. Magalhães and   
               I. L. M. Ricarte   Petri nets based coordination mechanisms
                                  for multi-workflow environments  . . . . ??
                      G. Joeris   Modeling of flexible workflows and their
                                  decentralized enactment in flow.net  . . ??
                 A. Lazcano and   
                  G. Alonso and   
                 H. Schuldt and   
                     C. Schuler   The WISE approach to electronic commerce ??
               S. Donatelli and   
                  M. Sarini and   
                      C. Simone   Negotiating propagation of changes in
                                  inter-organizational workflows . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 15, Number 6, December, 2000

                  J.-L. Chu and   
                     R. K. Guha   Triangular level quorums for distributed
                                  mutual exclusion . . . . . . . . . . . . ??
              D. R. Avresky and   
              C. Cunningham and   
                H. Ravichandran   Fault-tolerant routing for wormhole
                                  routed two-dimensional meshes  . . . . . ??
             T. P. Katsaros and   
                       C. Lazos   A technique for determining queuing
                                  network simulation length based on
                                  desired accuracy . . . . . . . . . . . . ??
                K. H. Jones and   
                  S. Olariu and   
               L. F. Rowell and   
              J. L. Schwing and   
                     A. Wilhite   A database integrity monitor with
                                  applications to vehicular technology . . ??


International Journal of Computer Systems Science and Engineering
Volume 16, Number 1, January, 2001

                  S.-W. Kim and   
                    K.-Y. Whang   New join processing using a
                                  multidimensional dynamic file
                                  organization . . . . . . . . . . . . . . ??
               B. B. Kristensen   Subjective behaviour . . . . . . . . . . ??
                   T.-C. Wu and   
                    C.-C. Chang   Cryptographic key assignment scheme for
                                  hierarchical access control  . . . . . . ??
                 J.-L. Wang and   
                      L.-T. Lee   Effective bandwidth allocation for ATM
                                  networks . . . . . . . . . . . . . . . . ??
                 R. Baldoni and   
                  G. Cioffi and   
               J.-M. Helary and   
                      M. Raynal   Direct dependency-based determination of
                                  consistent global checkpoints  . . . . . ??
                      I. De and   
                       B. Gupta   Efficient fault tolerant multicasting in
                                  hybrid incomplete hypercube
                                  interconnection networks . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 16, Number 2, March, 2001

                   E. D. Jensen   The distributed real-time specification
                                  for Java: an initial proposal  . . . . . ??
                  H. Kopetz and   
                M. Holzmann and   
                  W. Elmenreich   A universal smart transducer interface:
                                  TTP/A  . . . . . . . . . . . . . . . . . ??
                   H. Fahmi and   
                 W. G. Aref and   
                   M. Latif and   
                  B. Shafiq and   
                 A. Ghafoor and   
                     P. Liu and   
                         L. Hsu   Distributed Web-based framework for
                                  real-time multimedia object
                                  communication  . . . . . . . . . . . . . ??
               L. B. Becker and   
               M. Gergeleit and   
                    E. Nett and   
                  C. E. Pereira   An integrated environment for the
                                  complete development cycle of an
                                  object-oriented distributed real-time
                                  system . . . . . . . . . . . . . . . . . ??
                 R. Schantz and   
                   J. Zinky and   
                J. Megquier and   
                  J. Loyall and   
                    D. Karr and   
                      D. Bakken   An object leel gateway supporting
                                  quality of service . . . . . . . . . . . ??
           K. H. (Kane) Kim and   
                     J. Liu and   
                        M-H Kim   Deadline handling in real-time
                                  distributed objects: issues and basic
                                  approaches . . . . . . . . . . . . . . . ??
                R. de Lemos and   
                  A. Romanovsky   Exception handling in the software
                                  lifecycle  . . . . . . . . . . . . . . . ??
                   A. Polze and   
                J. Richling and   
                 J. Schwarz and   
                       M. Malek   Towards predictable CORBA-based services ??

International Journal of Computer Systems Science and Engineering
Volume 16, Number 3, May, 2001

                 M. Pezz\`e and   
                    S. M. Shatz   Editorial  . . . . . . . . . . . . . . . ??
                       M. Young   Neat models of messy problems: Notes on
                                  the interplay between solution- and
                                  problem-centered disciplines, and more
                                  particularly on the interaction between
                                  Petri net research and software
                                  engineering research . . . . . . . . . . ??
                   H. Giese and   
                       G. Wirtz   The OCoN approach for object-oriented
                                  distributed software systems modeling    ??
                   A. Burns and   
             A. J. Wellings and   
                   F. Burns and   
             A. M. Koelmans and   
                  M. Koutny and   
              A. Romanovsky and   
                    A. Yakovlev   Modelling and verification of an atomic
                                  action protocol implemented in Ada . . . ??
                   M. Ceska and   
                V. Janousek and   
                      T. Vojnar   Generating and using state spaces of
                                  object-oriented Petri nets . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 16, Number 4, July, 2001

                   D. Dutta and   
                       B. Gupta   An efficient time-based checkpoint and
                                  recovery algorithm for distributed
                                  systems involving mobile computers . . . ??
                   B. Gupta and   
                   K. Ghosh and   
                   D. Dutta and   
                       A. Gupta   Broadcasting in complete and incomplete
                                  star interconnection networks  . . . . . ??
                     C. Liu and   
                M. A. Orgun and   
                       K. Zhang   A parallel execution model for Chronolog ??
              A. K. Y. Wong and   
                  J. H. C. Wong   A convergence algorithm for enhancing
                                  the performance of distributed
                                  applications running on sizeable
                                  networks . . . . . . . . . . . . . . . . ??
              A. Romanovsky and   
                       A. Zorzo   A distributed coordinated atomic action
                                  scheme . . . . . . . . . . . . . . . . . ??
              A. Bondavalli and   
                   M. Nelli and   
               L. Simoncini and   
                    G. Mongardi   Hierarchical modelling of complex
                                  control systems: dependability analysis
                                  of a railway interlocking  . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 16, Number 5, September, 2001

              A. Bondavalli and   
                 M. Dal Cin and   
                 D. Latella and   
                  I. Majzik and   
               A. Pataricza and   
                      G. Savoia   Dependability analysis in the early
                                  phases of UML-based system design  . . . ??
                   Y. Jiang and   
                  D. Taniar and   
                 C. H. C. Leung   High performance distributed parallel
                                  query processing . . . . . . . . . . . . ??
                Y.-M. Tseng and   
                      J.-K. Jan   Generalized group-oriented cryptosystem
                                  with authenticated sender  . . . . . . . ??
         W. M. P. van der Aalst   How to handle dynamic change and capture
                                  management information? An approach
                                  based on generic workflow models . . . . ??
                 S. Shigeta and   
                 K. Shimizu and   
                        M. Sowa   Access route control by an extended
                                  key/lock scheme  . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 16, Number 6, November, 2001

                       T.-C. Wu   Digital signature/multisignature schemes
                                  giving public key verification and
                                  message recovery simultaneously  . . . . ??
               K. Gunavathi and   
                   A. Shanmugam   Comparative analysis of new multiple
                                  access protocols for bus LANs  . . . . . ??
                   K.-L. Wu and   
                   P. S. Yu and   
                     J. Z. Teng   Thrashing control and avoidance for
                                  concurrent mergesorts using parallel
                                  prefetching  . . . . . . . . . . . . . . ??
                  W. J. Gutjahr   A reliability model for nonhomogeneous
                                  redundant software versions with
                                  correlated failures  . . . . . . . . . . ??
                W.-S. Juang and   
                  C.-L. Lei and   
                     H.-T. Liaw   Fair blind threshold signatures based on
                                  discrete logarithm . . . . . . . . . . . ??
                      Anonymous   Book Review  . . . . . . . . . . . . . . ??
                      Anonymous   Index to Volume 16, 2001 . . . . . . . . ??


International Journal of Computer Systems Science and Engineering
Volume 17, Number 1, January, 2002

                    J-H Kim and   
                    S-W Kim and   
                    D-Y Kim and   
                    Y-Y You and   
                        W. Choi   Soft real-time scheduling in a general
                                  purpose operating system: scheduling
                                  daemon approach  . . . . . . . . . . . . ??
                       S-J Yang   A distributed algorithm of efficient
                                  core discipline on weighted bipartite
                                  networks . . . . . . . . . . . . . . . . ??
                  D. Taniar and   
                J. Wenny Rahayu   Parallel group-by query processing in a
                                  cluster architecture . . . . . . . . . . ??
                   P. Chaudhuri   An optimal distributed algorithm for
                                  finding a set of fundamental cycles in a
                                  graph  . . . . . . . . . . . . . . . . . ??
           K. H. (Kane) Kim and   
                    L. Bacellar   The distributed real-time conversation
                                  scheme for time-bounded cooperative
                                  recovery . . . . . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 17, Number 2, March, 2002

              C. E. Pereira and   
                     R. Baldoni   Editorial  . . . . . . . . . . . . . . . ??
                       N. Selic   The emerging real-time UML standard  . . ??
           K. H. (Kane) Kim and   
                  J. Q. Liu and   
                H. Miyazaki and   
                   E. H. Shokri   A CORBA service middleware enabling
                                  high-level high-precision real-time
                                  distributed object programming . . . . . ??
               W. A. Halang and   
              C. E. Pereira and   
                  A. H. Frigeri   Safe object oriented programming of
                                  distributed real time systems in PEARL   ??
                R. Friedman and   
                       E. Hadad   Client-side enhancements using portable
                                  interceptors . . . . . . . . . . . . . . ??
              P. Narasimhan and   
                L. E. Moser and   
            P. M. Melliar-Smith   Strongly consistent replication and
                                  recovery of fault-tolerant CORBA
                                  applications . . . . . . . . . . . . . . ??
                  C. O'Ryan and   
              D. C. Schmidt and   
               J. R. Noseworthy   Patterns and performance of a CORBA
                                  event service for large-scale
                                  distributed interactive simulations  . . ??
         F. J. Torres-Rojas and   
                  M. Ahamad and   
                      M. Raynal   Real-time based strong consistency for
                                  distributed objects  . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 17, Number 3, May, 2002

                  D. Taniar and   
                J. Wenny Rahayu   Parallel sort-merge object-oriented
                                  collection join algorithms . . . . . . . ??
                  A. Romanovsky   On version state recovery and
                                  adjudication in class diversity  . . . . ??
                     X. Xie and   
                    S. M. Shatz   Development of class-level and
                                  instance-level design models for
                                  distributed-object software  . . . . . . ??
                    H-T Lin and   
                   H. D. Hughes   A hand-off scheme for wireless ATM
                                  networks . . . . . . . . . . . . . . . . ??
                R. Friedman and   
                       E. Hadad   Client-side enhancements using portable
                                  interceptors . . . . . . . . . . . . . . ??
                    W. Zhou and   
                         W. Jia   A token-based independent update
                                  protocol for managing replicated objects ??

International Journal of Computer Systems Science and Engineering
Volume 17, Number 4/5, July / September, 2002

                    J-K Jan and   
                       Y-Y Chen   A secure anonymous voting protocol with
                                  a complete supervision . . . . . . . . . ??
                  O. Sharon and   
              A. Vainshtein and   
                    A. Likholat   On the relation between the throughput
                                  gain with slot reuse and the number of
                                  address bits in the dual bus
                                  configuration. Part 1: Maximum
                                  throughput . . . . . . . . . . . . . . . ??
                  O. Sharon and   
                    A. Likholat   On the relation between the throughput
                                  gain with slot reuse and the number of
                                  address bits in the dual bus
                                  configuration. Part 2: Linear and equal
                                  throughputs  . . . . . . . . . . . . . . ??
               N. S. V. Rao and   
                    N. Manickam   General quickest paths and path-tables   ??
             A. R. Sharafat and   
                   M. S. Fallah   A measure of resilience against denial
                                  of service attacks in computer networks  ??
                   S-J Seok and   
                    S-H Lee and   
                    J. Park and   
                       C-H Kang   Characteristics of assured service and
                                  an alternative RIO scheme in
                                  differentiated services networks . . . . ??
                    D-C Lou and   
                    T-L Yin and   
                      M-C Chang   An efficient steganographic approach . . ??
                     K-L Wu and   
                       P. S. Yu   Controlled replication for hash
                                  routing-based Web caching  . . . . . . . ??
                    S-W Kim and   
                        H-S Won   Bulk-loading of a multidimensional file:
                                  algorithm and its performance evaluation ??
                      Anonymous   Book review  . . . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 17, Number 6, November, 2002

                      M. Ma and   
                     E. Gunawan   Single-code and multi-code DS/CDMA MAC
                                  protocols for video/voice integration    ??
                    D-H Kim and   
           K. H. (Kane) Kim and   
                     S. Liu and   
                        J-H Kim   A TMO-based approach to tolerance of
                                  transmission jitters in tele-audio
                                  services . . . . . . . . . . . . . . . . ??
                D. Cotroneo and   
                N. Mazzocca and   
                  L. Romano and   
                       S. Russo   A fault tolerant access to legacy
                                  database systems using CORBA technology  ??
                   J. Mbale and   
                  X. X. Fei and   
                      D. Ursino   Acquisition of interoperability using
                                  intelligent binary schema matching
                                  technology . . . . . . . . . . . . . . . ??
                    Z. Ding and   
                       C. Jiang   Temporal Petri nets model of concurrent
                                  systems  . . . . . . . . . . . . . . . . ??
                      M. Raynal   Token-based sequential consistency . . . ??


International Journal of Computer Systems Science and Engineering
Volume 18, Number 1, January, 2003

                   X-X Chen and   
                  M. Minami and   
                H. Morikawa and   
                      T. Aoyama   Service description model and toolkit
                                  for ubiquitous computing . . . . . . . . ??
                    A. Moga and   
                      M. Dubois   Scalability implications of
                                  software-implemented coherence . . . . . ??
                    T. Newe and   
                      T. Coffey   Formal verification logic for hybrid
                                  secutity protocols . . . . . . . . . . . ??
                 K. Komathy and   
            P. Vivekanandan and   
                V. Ramachandran   Secure SOAP-based Web services . . . . . ??
                   D-R Chen and   
                        C-C Hsu   Fault-tolerant routing for pyramid
                                  networks using the least level minimal
                                  routing method . . . . . . . . . . . . . ??
                    L. Feng and   
                   E. Chang and   
                   T. S. Dillon   Schemata transformation of
                                  object-oriented conceptual models to XML ??

International Journal of Computer Systems Science and Engineering
Volume 18, Number 2, March, 2003

                    K. Maly and   
                  S. Olariu and   
                   L. Zhang and   
                         N. Rao   Fairness in DQDB revisited: a new
                                  solution . . . . . . . . . . . . . . . . ??
                H. Juidette and   
               N. Idboufker and   
                 A. Berraissoul   QoS routing in data networking using
                                  genetic algorithms: a new two-level
                                  approach . . . . . . . . . . . . . . . . ??
                 J. Al-Sadi and   
                     K. Day and   
                 M. Ould-Khaoua   Analysis of fault-tolerant routing
                                  algorithms in $k$-ary n-cube networks    ??
                     K. Lee and   
                 Y. Y. Park and   
                     H. Y. Yeom   Pre-emptive but safe interval caching
                                  for real-time multimedia systems . . . . ??
                        S-W Kim   Development of a high-performance index
                                  manager in a main memory DBMS  . . . . . ??
              H. C. B. Chan and   
                    H. Chen and   
                       J. Zhang   An adaptive reservation protocol with a
                                  pre-emptive priority mechanism for
                                  wireless ATM LANs  . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 18, Number 3, May, 2003

                 S. Sarangi and   
              P. N. Sireesh and   
                      S. P. Pal   A scalable, efficient and general Monte
                                  Carlo scheme for generating synthetic
                                  Web request streams  . . . . . . . . . . ??
              D. Manivannan and   
                       C. Zhang   Performance of communication-induced
                                  checkpointing algorithms . . . . . . . . ??
                 E. Guntama and   
                   E. Chang and   
               N. Jayaratna and   
                     L. Pudhota   Extension of activity diagrams for
                                  flexible business workflow modeling  . . ??
                  D.-R. Liu and   
                      S.-C. Pan   Integrating software agents with
                                  multi-level metadata in support of
                                  heterogeneous product search . . . . . . ??
                 L.-C. Chen and   
                 D.-R. Chen and   
                  C.-C. Hsu and   
                      H.-R. Lin   Fast and efficient allocation for mesh
                                  systems  . . . . . . . . . . . . . . . . ??
             M. Naghibzadeh and   
               K. H. (Kane) Kim   The yielding-first rate-monotonic
                                  scheduling approach and its efficiency
                                  assessment . . . . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 18, Number 4, July, 2003

                     G. Min and   
                 M. Ould-Khaoua   Performance analysis of hypercube
                                  networks under LRD traffic . . . . . . . ??
              V. Gorodetski and   
                 I. Kotenko and   
                     O. Karsaev   Multi-agent technologies for computer
                                  network security: attack simulation,
                                  intrusion detection and intrusion
                                  detection learning . . . . . . . . . . . ??
              J. L. Aguilar and   
                    E. L. Leiss   Optimal scheduling of loops with
                                  dependence cycles on parallel platforms  ??
                    J. Chen and   
                    J. Zhou and   
                      S. Yu and   
                   J. Zheng and   
                   C. Zhang and   
                       L. Zhong   A framework of scalar quantization
                                  multiwavelet transform for very low bit
                                  rate video coding  . . . . . . . . . . . ??
                     J. Aguilar   Heuristic algorithm based on a genetic
                                  algorithm for mapping parallel programs
                                  on hypercube multiprocessors . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 18, Number 5, September, 2003

                   E. Chang and   
                 E. Damiani and   
                        L. Feng   Editorial  . . . . . . . . . . . . . . . ??
                   J. X. Yu and   
                    G. Wang and   
                      H. Lu and   
                      G. Yu and   
                      J. Lv and   
                         B. Sun   Automata Match: a new XML query
                                  processing approach  . . . . . . . . . . ??
                   H. Zhang and   
                       F. Tompa   XQuery rewriting at the relational
                                  algebra level  . . . . . . . . . . . . . ??
      M. M. Martínez and   
            P. de la Fuente and   
                 J.-C. Derniame   XML as a means to support information
                                  extraction from legal documents  . . . . ??
                  B.-S. Lee and   
                   B. R. Bryant   Applying XML technology for
                                  implementation of natural language
                                  specifications . . . . . . . . . . . . . ??
            D. G. Synodinos and   
                    P. Avgeriou   Leveraging hypermedia engineering for
                                  multi-channel access with the use of XML ??
                      W. Jonker   XML and secure data management in an
                                  ambient world  . . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 18, Number 6, December, 2003

                     L. Zhenhua   A bus-type software model based on CORBA
                                  and XML  . . . . . . . . . . . . . . . . ??
                 M. Sharifi and   
                  B. Zolfaghari   Optimizing the ready queue structure for
                                  dynamic scheduling strategies in
                                  real-time operating systems  . . . . . . ??
               P. C. Saxena and   
                         J. Rai   Communication cost of $k$-coteries . . . ??
                    S. Goel and   
                  H. Sharda and   
                      D. Taniar   Messaging in distributed systems . . . . ??
                    H. Zhou and   
                     W. Cao and   
                         Z. Lin   Formal semantics analysis for VHDL RTL
                                  synthesis  . . . . . . . . . . . . . . . ??
                     J.-L. Wang   An effective link arrangement scheme for
                                  distributed systems using Markov-chain
                                  based reliability analysis . . . . . . . ??
                      Anonymous   Index to Volume 18, 2003 . . . . . . . . ??


International Journal of Computer Systems Science and Engineering
Volume 19, Number 1, January, 2004

                 X.-X. Chen and   
                  M. Minami and   
                H. Morikawa and   
                      T. Aoyama   Service description model and toolkit
                                  for ubiquitous computing . . . . . . . . ??
                    A. Moga and   
                      M. Dubois   Scalability implications of
                                  software-implemented coherence . . . . . ??
                    T. Newe and   
                      T. Coffey   Formal verification logic for hybrid
                                  security protocols . . . . . . . . . . . ??
                 K. Komathy and   
            P. Vivekanandan and   
                V. Ramachandran   Secure SOAP-based Web services . . . . . ??
                 D.-R. Chen and   
                      C.-C. Hsu   Fault-tolerant routing for pyramid
                                  networks using the least level minimal
                                  routing method . . . . . . . . . . . . . ??
                    L. Feng and   
                   E. Chang and   
                   T. S. Dillon   Schemata transformation of
                                  object-oriented conceptual models to XML ??

International Journal of Computer Systems Science and Engineering
Volume 19, Number 2, March, 2004

              F. K. Hussain and   
                   E. Chang and   
                   T. S. Dillon   Classification of trust in Peer-to-Peer
                                  (P2P) communication  . . . . . . . . . . ??
                 Y.-H. Wang and   
                C. M. Chung and   
                  C.-J. Lee and   
                   C.-C. Chuang   Ad hoc routing protocol based on setup
                                  on-demand backup node  . . . . . . . . . ??
               W. W. K. Lin and   
              A. K. Y. Wong and   
                   T. S. Dillon   HBP: an optimization technique to
                                  shorten the control cycle time of the
                                  Neural Network Controller that provides
                                  dynamic buffer tuning to eliminate
                                  overflow at user level . . . . . . . . . ??
                  D. Taniar and   
               J. W. Rahayu and   
                R. Boon-Noi Tan   Parallel algorithms for selection query
                                  processing involving index in parallel
                                  database systems . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 19, Number 3, May, 2004

                     E. Damiani   Semantics-aware techniques for security  ??
                    P. Ceravolo   Extracting role hierarchies from
                                  authentication data flows  . . . . . . . ??
                  N. Kodali and   
                  C. Farkas and   
                  D. Wijesekera   Specifying multimedia access control
                                  using RDF  . . . . . . . . . . . . . . . ??
                 C. Ardagna and   
    S. De capitani di Vimercati   A comparison of modeling strategies in
                                  defining XML-based access control
                                  languages  . . . . . . . . . . . . . . . ??
               C. F. Cupens and   
                A. Miége   AdOrBAC: an administration model for
                                  Or-BAC . . . . . . . . . . . . . . . . . ??
                    L. Feng and   
                      W. Jonker   Preparations for encrypted XML metadata
                                  querying . . . . . . . . . . . . . . . . ??
              F. K. Hussain and   
                   E. Chang and   
                   T. S. Dillon   Trustworthiness and CCCI metrics in P2P
                                  communication  . . . . . . . . . . . . . ??
                      G. Hogben   The formation of software agreements
                                  between autonomous agents  . . . . . . . ??
               R. Tolksdorf and   
                   C. Bizer and   
                R. Eckstein and   
                       R. Heese   Trustable B2C markets on the Semantic
                                  Web  . . . . . . . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 19, Number 4, July, 2004

                   Yong-Jin Lee   Minimal cost heuristic algorithm for
                                  delay constrained loop network . . . . . ??
               Sooyong Kang and   
                Hyunjoo Kim and   
                   Heon Y. Yeom   A framework for fault-tolerant
                                  peer-to-peer streaming service based on
                                  the service migration  . . . . . . . . . ??
               Sheila Anand and   
                V. Ramachandran   A generic model for an application based
                                  intrusion prevention detection system    ??
       Christopher Kohlhoff and   
                  Robert Steele   Evaluating SOAP for high performance
                                  applications in capital markets  . . . . ??
                   Der-Rong Din   A simulated annealing algorithm for
                                  finding minimal wavelength on a WDM ring ??
                  Sang-Wook Kim   Concurrency control in main-memory DBMS  ??

International Journal of Computer Systems Science and Engineering
Volume 19, Number 5, September, 2004

      Abdelkader Hameurlain and   
                  Franck Morvan   Parallel query optimization methods and
                                  approaches: a survey . . . . . . . . . . ??
          Dmitri D. Perkins and   
               Jinping Yang and   
              Herman Hughes and   
                   Charles Owen   A QoS-aware routing scheme for mobile ad
                                  hoc networks . . . . . . . . . . . . . . ??
              Jia-Kang Seng and   
                        Jing Yu   Toward a more generic design of XML
                                  benchmark workload . . . . . . . . . . . ??
                    W. Zhao and   
                L. E. Moser and   
            P. M. Melliar-Smith   Design and implementation of a
                                  consistent time service for
                                  fault-tolerant distributed systems . . . ??

International Journal of Computer Systems Science and Engineering
Volume 19, Number 6, November, 2004

                   Keqiu Li and   
                      Hong Shen   Proxy placement problem for coordinated
                                  en-route transcoding proxy caching . . . ??
               David Taniar and   
               Hui Yee Khaw and   
      Haorianto Cokrowijoyo and   
           Johanna Wenny Rahayu   The use of hints in object-relational
                                  query optimization . . . . . . . . . . . ??
       Natalia López and   
 Manuel Núñez and   
                 Fernando Rubio   Predicting performance in the presence
                                  of stochastic information  . . . . . . . ??
                Min-Jae Lee and   
              Wook-Shih Han and   
                Kyu-Young Whang   Transformation-based spatial partition
                                  join . . . . . . . . . . . . . . . . . . ??
           Richard S. L. Wu and   
           Allan K. Y. Wong and   
               Tharam S. Dillon   RDCT: a novel reconfigurable dynamic
                                  cache size tuner to shorten information
                                  retrieval time over the Internet . . . . ??


International Journal of Computer Systems Science and Engineering
Volume 20, Number 1, January, 2005

               Didar Zowghi and   
               Vincenzo Gervasi   Editorial  . . . . . . . . . . . . . . . ??
          Martin S. Feather and   
         Steven L. Cornford and   
           Kenneth A. Hicks and   
             Kenneth R. Johnson   Applications of tool support for
                                  risk-informed requirements reasoning . . ??
               C. Heitmeyer and   
                  M. Archer and   
               R. Bharadwaj and   
                    R. Jeffords   Tools for constructing requirements
                                  specifications: the SCR Toolset at the
                                  age of nine  . . . . . . . . . . . . . . ??
                     Leonid Kof   An application of natural language
                                  processing to domain modelling: two case
                                  studies  . . . . . . . . . . . . . . . . ??
             Stefania Gnesi and   
              Giuseppe Lami and   
             Gianluca Trentanni   An automatic tool for the analysis of
                                  natural language requirements  . . . . . ??
Alfredo Raúl Teyseyre and   
                  Marcelo Campo   Early requirements validation with $3$D
                                  worlds . . . . . . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 20, Number 2, March, 2005

          Abdelkader Hameurlain   Editorial  . . . . . . . . . . . . . . . ??
     Agustinus Borgy Waluyo and   
            Bala Srinivasan and   
                   David Taniar   Research on location-dependent queries
                                  in mobile databases  . . . . . . . . . . ??
                Artem Katasonov   User-centric data querying for
                                  location-based services  . . . . . . . . ??
             Chin-Wan Chung and   
               Sunghee Choi and   
                  Yong-Jin Choi   Closest pair queries in spatio-temporal
                                  databases  . . . . . . . . . . . . . . . ??
                Vijay Kumar and   
         Margaret H. Dunham and   
                   Nitin Prabhu   Mobilaction: a mobile transaction
                                  framework supporting spatial replication
                                  and spatial consistency  . . . . . . . . ??
  Patricia Serrano-Alvarado and   
          Claudia Roncancio and   
               Michel Adiba and   
             Cyril Labbé   An adaptable mobile transaction system   ??
               Luc Bouganim and   
  François Dang Ngoc and   
              Philippe Pucharel   Tamper-resistant ubiquitous data
                                  management . . . . . . . . . . . . . . . ??


International Journal of Computer Systems Science and Engineering
Volume 21, Number 1, January, 2006

              Tharam Dillon and   
                 Mukesh Mohania   Special issue: Privacy Data Management   ??
  Hendrick J. G. Oberholzer and   
              Martin S. Olivier   Privacy contracts incorporated in a
                                  privacy protection framework . . . . . . ??
       Omar Khadeer Hussain and   
            Elizabeth Chang and   
    Farookh Khadeer Hussain and   
               Tharam S. Dillon   A methodology for risk measurement in
                                  e-transactions . . . . . . . . . . . . . ??
               B. Carminati and   
                     E. Ferraru   A system for controlled outsourcing of
                                  personal data  . . . . . . . . . . . . . ??
              Zhiqiang Yang and   
          Rebecca N. Wright and   
         Hiranmayee Subramaniam   Experimental analysis of a
                                  privacy-preserving scalar product
                                  protocol . . . . . . . . . . . . . . . . ??
                Dang Tran Khanh   A practical solution to supporting
                                  oblivious basic operations on dynamic
                                  outsourced search trees  . . . . . . . . ??
        Katharina Grün and   
          Michael Karlinger and   
                Michael Schrefl   Schema-aware labelling of XML documents
                                  for efficient query and update
                                  processing in SemCrypt . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 21, Number 2, March, 2006

          Alessandro Garcia and   
                  Carlos Lucena   Special issue: Software Engineering for
                                  Multi-Agent Systems  . . . . . . . . . . ??
                Iyad Rahwan and   
                Thomas Juan and   
                  Leon Sterling   Integrating social modelling and agent
                                  interaction through goal-oriented
                                  analysis . . . . . . . . . . . . . . . . ??
               Magid Nikraz and   
             Giovanni Caire and   
                Parisa A. Bahri   A methodology for the development of
                                  multi-agent systems using the JADE
                                  platform . . . . . . . . . . . . . . . . ??
        Quynh-Nhu Numi Tran and   
                 Graham Low and   
                Ghassan Beydoun   A methodological framework for ontology
                                  centric oriented software engineering    ??
             Antonio Chella and   
         Massimo Cossentino and   
             Luca Sabatucci and   
                Valeria Seidita   Agile PASSI: An agile process for
                                  designing agents . . . . . . . . . . . . ??
         Fabiano K. T. Tiba and   
           Miriam A. M. Capretz   Agent-oriented architecture for
                                  monitoring and diagnosis in supervisory
                                  systems  . . . . . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 21, Number 3, May, 2006

         K. K. Thyagharajan and   
                V. Ramachandran   Optimal buffering requirement analysis
                                  for jitter-free variable bit rate video
                                  streaming  . . . . . . . . . . . . . . . ??
        Alexander Thomasian and   
                        Gang Fu   Anticipatory disk arm placement to
                                  reduce seek time . . . . . . . . . . . . ??
         Christian Guttmann and   
                Ingrid Zukerman   Agents with limited modeling abilities:
                                  Implications on collaborative problem
                                  solving  . . . . . . . . . . . . . . . . ??
       Franziska Klügl and   
             Rainer Herrler and   
         Gustavo Kuhn Andriotti   Coupling GIS and multi-agent simulation
                                  towards infrastructure for realistic
                                  simulation . . . . . . . . . . . . . . . ??
                  T. Murata and   
                     J. Yim and   
                     H. Yin and   
                     O. Wolfson   Petri-net model and minimum cycle time
                                  for updating a moving objects database   ??
             Mihaela Ulieru and   
                    Dan Ionescu   Privacy and security shield for health
                                  information systems (e-health) . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 21, Number 4, July, 2006

                  J-Y Chung and   
              G. Feuerlicht and   
              W. Lamersdorf and   
                     C. Zirpins   Special issue: Engineering design and
                                  composition of service-oriented
                                  applications . . . . . . . . . . . . . . ??
                   S. Bleul and   
                   T. Weise and   
                       K. Geihs   An ontology for quality-aware service
                                  discovery  . . . . . . . . . . . . . . . ??
                  A. Colman and   
                         J. Han   Adaptive service-oriented systems: an
                                  organisational approach  . . . . . . . . ??
                L. Aversano and   
                M. di Penta and   
                      K. Taneja   A genetiv programming approach to
                                  support the design of service
                                  compositions . . . . . . . . . . . . . . ??
                  C-L Huang and   
                   K-M Chao and   
                     C-C Lo and   
                    P. Wang and   
                      J-Y Chung   Service discovery through consensus
                                  based preferences  . . . . . . . . . . . ??
                  A. Erradi and   
                N. Kulkarni and   
                       S. Anand   Service design principles: a case study
                                  in modeling services for the securities
                                  trading domain . . . . . . . . . . . . . ??
                   M. Weiss and   
                A. Oreshkin and   
                  B. Esfandiari   Method for detecting functional feature
                                  of interactions of Web services  . . . . ??
                      Z. Lu and   
                      S. Li and   
                  P. Hyland and   
                       A. Ghose   Reliable service composition by adopting
                                  assumptions  . . . . . . . . . . . . . . ??
                K. Guennoun and   
                       K. Drira   Using graph grammars for interaction
                                  style description: applications for
                                  service-oriented architectures . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 21, Number 5, September, 2006

            Ernesto Damiani and   
           Gabriele Gianini and   
               Hiroshi Maruyama   Special issue: Web service security  . . ??
                 Jason Crampton   Applying hierarchical and role-based
                                  access control to XML documents  . . . . ??
                      N. Li and   
                      T. Yu and   
                A. Antón   A semantics based approach to privacy
                                  languages  . . . . . . . . . . . . . . . ??
                 Alban Gabillon   A logical formalization of secure XML
                                  database . . . . . . . . . . . . . . . . ??
                  N. Kodali and   
                  C. Farkas and   
                  D. Wijesekera   uSMIL: Towards secure unbreakable
                                  semantics in multimedia Web services . . ??
                  C. Skalka and   
                   X. Sean Wang   Trust but verify: Authorization for Web
                                  services . . . . . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 21, Number 6, November, 2006

                Jae-Gil Lee and   
            Kyu-Young Whang and   
              Wook-Shin Han and   
                   Il-Yeol Song   Special issue: Hippocratic XML
                                  databases: a model and an access control
                                  mechanism  . . . . . . . . . . . . . . . ??
         Behrouz Zolfaghari and   
                 Mohsen Sharifi   The impact of skewed associativity on
                                  the replacement traffic in COMA
                                  multiprocessors  . . . . . . . . . . . . ??
             Maria J. Blesa and   
                Jordi Petit and   
                    Fatos Xhafa   Generic parallel implementations for
                                  Tabu search  . . . . . . . . . . . . . . ??
                      Anonymous   Index to Volume 21, 2006 . . . . . . . . ??


International Journal of Computer Systems Science and Engineering
Volume 22, Number 1--2, January / March, 2007

                   K. Salah and   
                    K. Elbadawi   Throughput and delay analysis of
                                  interrupt-driven kernels under Poisson
                                  and bursty traffic . . . . . . . . . . . ??
                    L. Wang and   
                    L. Khan and   
               B. Thuraisingham   A framework for automated image
                                  annotation . . . . . . . . . . . . . . . ??
                   C.-L. Wu and   
                  D.-C. Lou and   
                     S.-Y. Chen   Integer factorization for RSA
                                  cryptosystem under a PVM environment . . ??
                    S. Park and   
                    S-W Kim and   
                      W. W. Chu   SBASS: Segment based approach for
                                  subsequence searches in sequence
                                  databases  . . . . . . . . . . . . . . . ??
                      K. Li and   
                   T. Nanya and   
                    H. Shen and   
                    F. Chin and   
                       W. Zhang   An efficient cache replacement algorithm
                                  for multimedia object caching  . . . . . ??
             Jason C. T. Lo and   
           Allan K. Y. Wong and   
              Wilfred W. K. Lin   SDITPM: A novel transfer policy model to
                                  facilitate object mobility that shortens
                                  service roundtrip time by load balancing
                                  over the Internet  . . . . . . . . . . . ??
                Tran Khanh Dang   Solving approximate similarity queries   ??
          John G. Vlachogiannis   Automatic construction of a decision
                                  tree for the analysis of traffic load in
                                  computer networks  . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 22, Number 3, May, 2007

                Doohyun Kim and   
                   Arif Ghafoor   Special issue: Real time software
                                  architecture . . . . . . . . . . . . . . ??
                 A. Cilardo and   
                D. Cotroneo and   
                C. di Flora and   
                  A. Mazzeo and   
                  L. Romano and   
                       S. Russo   Design and implementation of a high
                                  performance architecture for providing
                                  digital time stamping services to mobile
                                  devices  . . . . . . . . . . . . . . . . ??
                     Y. Nah and   
           K. H. (Kane) Kim and   
                    T. Wang and   
                      M. H. Kim   A cluster-based TMO-structured scalable
                                  approach for location information
                                  systems  . . . . . . . . . . . . . . . . ??
                   S. Itaya and   
                    M. Takizawa   Parallel transmission model for
                                  real-time multi-source streaming of
                                  multimedia data in scalable networks . . ??
                  M. H. Kim and   
                   E. H. Jo and   
                    D-J Kim and   
                        J-G Kim   Time-triggered and message-triggered
                                  object framework and global time-based
                                  synchronization for real-time multimedia
                                  streaming  . . . . . . . . . . . . . . . ??
                A. Talevski and   
                   E. Chang and   
                   T. S. Dillon   A dynamically reconfigurable Voice User
                                  Interface (VUI) framework and platform   ??
                T. Nakajima and   
                E. Tokunaga and   
                H. Ishikawa and   
                    D. Ueno and   
                K. Fujinami and   
                  M. Sugaya and   
                      S. Oikawa   Software infrastructures for building
                                  ubiquitous computing environments  . . . ??
                  W. Sheikh and   
                  B. Shafiq and   
                   S. Baqai and   
                 R. A. Paul and   
                 M. F. Khan and   
                     H. Ghafoor   A QoS framework for multimedia
                                  applications in mobile ad hoc networks   ??

International Journal of Computer Systems Science and Engineering
Volume 22, Number 4, July, 2007

                 Haiping Xu and   
                 Yi-Tsung Cheng   Model checking bidding behaviors in
                                  Internet concurrent auctions . . . . . . ??
                Kinh Nguyen and   
                  Tharam Dillon   Obligation nets: a rigorous
                                  object-oriented technique for modeling
                                  the behavioural semantics of information
                                  systems  . . . . . . . . . . . . . . . . ??
            Rung-Ching Chen and   
               Cheun-Chieh Liao   A genetic algorithm with fuzzy selection
                                  and local search for multicast routing
                                  problem on the QoS constraint  . . . . . ??
               Garrett Camp and   
                 Mihaela Ulieru   InOrder: enhancing Google via stigmergic
                                  query refinement . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 22, Number 5, September, 2007

 Simone Fischer-Hübner and   
             Steven Furnell and   
          Costas Lambrinoudakis   Special issue: TrustBus 2006 . . . . . . ??
                    Jeremy Ward   Building the information assurance
                                  community of purpose . . . . . . . . . . ??
             V. Poursalidis and   
                    C. Nikolaou   Towards a person-centric Identity
                                  Management Infrastructure (IMI)  . . . . ??
    Christian Schläger and   
                   Thomas Nowey   On the effects of authentication and
                                  authorisation infrastructures on
                                  e-commerce activities  . . . . . . . . . ??
                  Mikolaj Morzy   Cluster-based analysis and
                                  recommendation of sellers in online
                                  auctions . . . . . . . . . . . . . . . . ??
              Muhammad Alam and   
             Michael Hafner and   
                  Ruth Breu and   
            Stefan Untherthiner   A framework for modelling restricted
                                  delegation of rights in the SECTET . . . ??
   Alfonso Rodríguez and   
Eduardo Fernández-Medina and   
                 Mario Piattini   An MDA approach to develop secure
                                  business processes through a UML 2.0
                                  extension  . . . . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 22, Number 6, November, 2007

                   Wenyu Qu and   
         Masaru Kitsuregawa and   
                  Hai Zhuge and   
                  Hong Shen and   
                     Yinwei Jin   A traffic-based routing algorithm by
                                  using mobile agents  . . . . . . . . . . ??
             R. Obermaisser and   
              C. El-Salloum and   
                   B. Huber and   
                      H. Kopetz   Modeling and verification of distributed
                                  real-time systems using periodic finite
                                  state machines . . . . . . . . . . . . . ??
                   K. S. Cheung   A formal method for synthesising
                                  components of shared resource systems    ??
              Qingtian Zeng and   
                       Hua Duan   Behavior description for complex
                                  flexible manufacturing system based on
                                  decomposition of Petri net . . . . . . . ??
                Min-Soo Kim and   
            Kyu-Young Whang and   
                    Jae-Gil Lee   $n$-Gram/2L-approximation: a two-level
                                  $n$-gram inverted index structure for
                                  approximate string matching  . . . . . . ??
                      Anonymous   Index to Volume 22, 2007 . . . . . . . . ??


International Journal of Computer Systems Science and Engineering
Volume 23, Number 1, January, 2008

                   Song Han and   
            Elizabeth Chang and   
                  Tharam Dillon   Pairing-based public-key encryption
                                  schemes with backward-and-forward
                                  security . . . . . . . . . . . . . . . . ??
              Jin-Long Wang and   
                Chen-Hsing Chen   Adaptive two-stage QoS provisioning
                                  schemes for CDMA networks  . . . . . . . ??
                Maja Hadzic and   
                Elizabeth Chang   Onto-agent methodology for design of
                                  ontology-based multi-agent systems . . . ??
              Sang-Wook Kim and   
                   Miyoung Shin   Subsequence matching under time warping
                                  in time-series databases: observation,
                                  optimization, and performance results    ??
                 Dechang Pi and   
                Chuhua Xian and   
                    Xiaolin Qin   An improved C-means clustering algorithm ??

International Journal of Computer Systems Science and Engineering
Volume 23, Number 2, March, 2008

          Abdelkader Hameurlain   Special Issue: Data Management in Grid
                                  and P2P Systems: Editorial . . . . . . . ??
                  C. Comito and   
                 S. Patarin and   
                       D. Talia   PARIS: A peer-to-peer architecture for
                                  large-scale semantic data sharing  . . . ??
                      W. He and   
                     L. Fegaras   Answering XPath queries with search
                                  predicates in structured P2P networks    ??
                M. Barhamgi and   
              D. Benslimane and   
                   A. M. Ouksel   PWSMS: A Peer-to-peer Web service
                                  management system for data sharing in
                                  collaborative environments . . . . . . . ??
            G. Vargas-Solar and   
     J-L Zechinelli-Martini and   
     V. Cuevas-Vicenttín   Integrating and querying astronomical
                                  data on the e-GrOV data grid . . . . . . ??
                    H-S Kim and   
                  C-S Hwang and   
                    S-K Lee and   
                   S-J Choi and   
                        J-M Gil   Priority based list scheduling for
                                  sabotage-tolerance with deadline tasks
                                  in desktop grids . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 23, Number 3, May, 2008

                Wanlei Zhou and   
                 Yang Xiang and   
                      Minyi Guo   Special Issue: Network Attacks and
                                  Defense Systems  . . . . . . . . . . . . ??
                Duc-Liem Vo and   
                    Kwangjo Kim   A secure mutual authentication scheme
                                  with key agreement using smart card from
                                  bilinear pairings  . . . . . . . . . . . ??
       Udaya Kiran Tupakula and   
             Vijay Varadharajan   A hybrid model against TCP SYN and
                                  reflection DDoS attacks  . . . . . . . . ??
                Zhongwen Li and   
                 Qiong Chen and   
                     Yang Xiang   A cross-authentication model and
                                  implementation . . . . . . . . . . . . . ??
                 Zhuowei Li and   
               Amitabha Das and   
              Jianying Zhou and   
               Jagdish C. Patra   Variable-length signatures for intrusion
                                  detection  . . . . . . . . . . . . . . . ??
                 Ruixuan Li and   
                  Zhuo Tang and   
               Zhengding Lu and   
                      Jinwei Hu   Request-driven role mapping framework
                                  for secure interoperation in
                                  multi-domain environments  . . . . . . . ??
             Shi-Jinn Horng and   
                Pingzhi Fan and   
               Ming-Yang Su and   
             Yuan-Hsin Chen and   
             Cheng-Ling Lee and   
                   Shao-Wei Lan   Anomaly detection for Web server based
                                  on smooth support vector machine . . . . ??
               Zhu Hongfeng and   
                Liu Tianhua and   
                        Liu Jie   EV-C2C-PAKE: An improved
                                  client-to-client password-authenticated
                                  key exchange protocol  . . . . . . . . . ??
                 Chua-Ta Li and   
           Min-Shiang Hwang and   
                   Yen-Ping Chu   Improving the security of a secure
                                  anonymous routing protocol with
                                  authenticated key exchange for ad hoc
                                  networks . . . . . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 23, Number 4, July, 2008

               R. Hooshmand and   
                       M. Ataei   Real-coded genetic algorithm applied to
                                  optimal placement of capacitor banks for
                                  unbalanced distribution systems with
                                  meshed/ radial configurations  . . . . . ??
                  Henry Tan and   
               Fedja Hadzic and   
           Tharam S. Dillon and   
                Elizabeth Chang   State of the art of data mining of tree
                                  structured information . . . . . . . . . ??
          Bent Bruun Kristensen   Interaction cases: generalized use cases
                                  in ambient systems . . . . . . . . . . . ??
               Joong Hyuk Chang   Adaptive selection of tuples over data
                                  streams for efficient load shedding  . . ??
             R. Obermaisser and   
              C. El-Salloum and   
                   B. Huber and   
                      H. Kopetz   Modeling and verification of distributed
                                  real-time systems using periodic finite
                                  state machines . . . . . . . . . . . . . ??
                   Song Han and   
            Elizabeth Chang and   
                  Tharam Dillon   Pairing-based public-key encryption
                                  schemes with backward-and-forward
                                  security . . . . . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 23, Number 5, September, 2008

             Nicolas Guelfi and   
              Henry Muccini and   
       Patrizio Pelliccione and   
           Alexander Romanovsky   Special issue: Engineering Fault
                                  Tolerant Systems . . . . . . . . . . . . ??
                    Francis Tam   On the development of standards based
                                  carrier grade platforms  . . . . . . . . ??
              Michele Banci and   
             Stefania Gnesi and   
        Alessandro Fantechi and   
              Giovanni Lombardi   Model driven development of railway
                                  systems using diversity  . . . . . . . . ??
            Nuno Laranjeiro and   
                   Marco Vieira   Deploying fault tolerant Web service
                                  compositions . . . . . . . . . . . . . . ??
Máté Kovács and   
 Dániel Varró and   
László Gönczy   Formal analysis of BPEL workflows with
                                  compensation by model checking . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 23, Number 6, November, 2008

                 Chien-Lung Hsu   Cryptanalysis of elliptic curve
                                  cryptosystem on smart card access
                                  control with threshold scheme  . . . . . ??
             Ambrosio Toval and   
        Begoña Moros and   
Joaquín Nicolás and   
        Joaquín Lasheras   Eight key issues for an effective
                                  reuse-based requirements process . . . . ??
                S. P. Singh and   
                C. Kistanna and   
                      A. R. Rao   Optimal capacitor allocation in
                                  distribution systems using genetic
                                  algorithm  . . . . . . . . . . . . . . . ??
         William Chung-Kung Yen   Restricted independent domination
                                  problems on graphs . . . . . . . . . . . ??
                 S. Y. Wang and   
                     C. L. Chou   On the characteristics of information
                                  dissemination paths in vehicular ad hoc
                                  networks on the move . . . . . . . . . . ??


International Journal of Computer Systems Science and Engineering
Volume 24, Number 1, January, 2009

             Wolfgang A. Halang   Special issue: Automated control systems
                                  for the safety integrity levels 3 and 4  ??
           K. H. (Kane) Kim and   
                     Chansik Im   Hybrid approaches for derivation of
                                  tight service time bounds of distributed
                                  embedded computing systems . . . . . . . ??
          Peter Tröger and   
                  Andreas Polze   Object and process migration in .NET . . ??
            Stefan Schemmer and   
                     Edgar Nett   Achieving high reliable and timely task
                                  execution in mobile embedded
                                  applications . . . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 24, Number 2, March, 2009

                   Gita Das and   
                        Sid Ray   A compact feature representation and
                                  feature re-weighting in content-based
                                  image retrieval  . . . . . . . . . . . . ??
              Sandeep Kumar and   
               P. K. Bansal and   
                     Seema Bawa   Modified quad tree network with
                                  architectural analysis (M\_QUAD) . . . . ??
              Ryan Layfield and   
      Bhavani Thuraisingham and   
              Laatifur Khan and   
             Murat Kantarcioglu   Design and implementation of a secure
                                  social network system  . . . . . . . . . ??
        José Aguilar and   
               Jorge Chacal and   
             César Bravo   A multiagents system for planning and
                                  management of the production factors . . ??
                  Giuseppe Lami   Analytic effectiveness evaluation of
                                  techniques for natural language software
                                  requirements testability . . . . . . . . ??
              Yang-Sae Moon and   
                  Woong-Kee Loh   Efficient stream subsequence matching
                                  algorithms for handheld devices on
                                  streaming time-series data . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 24, Number 3, May, 2009

                   Kequi Li and   
               Yanming Shen and   
                      Minyi Guo   Special issue: Network and Parallel
                                  Computing  . . . . . . . . . . . . . . . ??
                   Tan Yiyu and   
                Yau Chihang and   
            Anthony S. Fong and   
                  Yang Xiaojian   An instruction folding solution for a
                                  Java processor . . . . . . . . . . . . . ??
             Angela L. Chiu and   
            Gagan Choudhury and   
          Robert Doverspike and   
                    Guangzhi Li   Restoration design in IP over
                                  reconfigurable WDM networks  . . . . . . ??
                 Yang Xiang and   
                  Xiang Fan and   
                    Wen Tao Zhu   Propagation of active worms: A survey    ??
                Liu Weidong and   
                 Lin Chuang and   
                    Wang Jirong   A novel data transmission scheme for
                                  mobile sensor network  . . . . . . . . . ??
                   Wenyu Qu and   
         Masaru Kitsuregawa and   
               Yanming Shen and   
                  Takashi Nanya   An optimal lifetime-adaptive method for
                                  wireless sensor networks . . . . . . . . ??
                  Chao Peng and   
                  Yasuo Tan and   
               Naixue Xiong and   
           Laurence T. Yang and   
                       Hong Zhu   Approximation algorithms for inner-node
                                  weighted minimum spanning trees  . . . . ??
               Siliang Tang and   
               Jianhua Yang and   
                     Zhaohui Wu   A context quality management
                                  infrastructure for complex ubiquitous
                                  environment  . . . . . . . . . . . . . . ??
               Yanming Shen and   
                       Kequi Li   On the design of P2P video streaming
                                  with layered coding  . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 24, Number 4, July, 2009

          Jackei H. K. Wong and   
           Allan K. Y. Wong and   
              Tharam Dillon and   
              Wilfred W. K. Lin   A novel approach to achieve real-time
                                  TCM (traditional Chinese medicine)
                                  telemedicine through the use of ontology
                                  and clinical intelligence discovery  . . ??
                    Gao Shu and   
                  Dingfang Chen   Matchmaking framework for visualization
                                  Web services . . . . . . . . . . . . . . ??
              Manzur Ashraf and   
         Syed Mahfuzul Aziz and   
            M. Lutful Kabir and   
                Biswajit K. Dey   A SIM-based electronic transaction
                                  authentication system  . . . . . . . . . ??
                  Jung-Hoon Lee   Low power TLB structure by using dynamic
                                  searching algorithm  . . . . . . . . . . ??
              Yang-Sae Moon and   
                  Woong-Kee Loh   Efficient stream subsequence matching
                                  algorithms for handheld devices on
                                  streaming time-series data . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 24, Number 5, September, 2009

                   Keqin Li and   
                     Geyong Min   Special issue: Advanced Topics on Grid,
                                  Cluster and P2P Computing  . . . . . . . ??
              Abdullah Kayi and   
            Edward Kornkven and   
           Tarek El-Ghazawi and   
             Samy Al-Bazhra and   
               Gregory B. Newby   Performance analysis and tuning for
                                  clusters with ccNUMA nodes for
                                  scientific computing: a case study . . . ??
                Behram Khan and   
           Matthew Horsnell and   
                 Ian Rogers and   
         Mikel Luján and   
                Andrew Dinn and   
                     Ian Watson   Exploiting object structure in hardware
                                  transactional memory . . . . . . . . . . ??
             Dang Ming Quan and   
          Jörn Altmann and   
               Laurence T. Yang   Improving the capability of the SLA
                                  workflow broker with parallel processing
                                  technology . . . . . . . . . . . . . . . ??
                   Wenyu Qu and   
                Wanlei Zhou and   
             Masaru Kitsuregawa   A parallel information retrieval method
                                  for e-commerce . . . . . . . . . . . . . ??
                 Yuxin Tang and   
              Yunquan Zhang and   
                        Hu Chen   A parallel shortest path algorithm based
                                  on graph-partitioning and iterative
                                  correcting . . . . . . . . . . . . . . . ??
                    Hao Yin and   
                ChangLai Du and   
                   Chao Ren and   
                Zhijia Chen and   
                 Heyong Min and   
                     Chuang Lin   A secure and scalable video conference
                                  system based on peer-assisted content
                                  delivery networks  . . . . . . . . . . . ??
                 John Casey and   
                    Wanlei Zhou   Adjacency cache: an efficient P2P Web
                                  cache indexing and lookup system . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 24, Number 6, November, 2009

              A. Chatterjee and   
                    M. Goel and   
             N. Raghuvanshi and   
                   P. Gupta and   
                   S. G. Dhande   Facial feature extraction in frontal
                                  views using activeshape models . . . . . ??
                  Omar Shatnawi   Discrete time modelling in software
                                  reliability engineering: a unified
                                  approach . . . . . . . . . . . . . . . . ??
         Ioannis Antonellis and   
            Christos Bouras and   
           Vassilis Poulopoulos   Scalable text classification as a tool
                                  for personalization  . . . . . . . . . . ??
           Kiarash Mizanian and   
                Mehdi Vasef and   
                Morteza Analoui   The modified alternating fractal renewal
                                  process for modelling peer to peer
                                  traffic  . . . . . . . . . . . . . . . . ??
                  Yang Ping and   
                    Liao Ningbo   Approach on complex neural-genetic
                                  algorithm modeling for isomorphism
                                  identification in conceptual design of
                                  mechanism  . . . . . . . . . . . . . . . ??


International Journal of Computer Systems Science and Engineering
Volume 25, Number 1, January, 2010

                Luci Pirmez and   
        Luiz F. R. C. Carmo and   
            Luiz F. H. Bacellar   Enhancing Levenshtein distance algorithm
                                  for assessing behavioral trust . . . . . ??
       Pmar Khadeer Hussain and   
              Tharam Dillon and   
            Elizabeth Chang and   
                Farookh Hussain   Transactional risk-based decision making
                                  system in e-business interactions  . . . ??
            Seung-Joon Seok and   
                Bongsoo You and   
               Sungwan Youm and   
              Kyung-Hoe Kim and   
                  Chul-Hee Kang   A heuristic multi-path routing scheme
                                  for online traffic in MPLS networks  . . ??
                 H. T. Kung and   
                     S. Y. Wang   TCP trunking for bandwidth management of
                                  aggregate traffic  . . . . . . . . . . . ??
             V. Poursakidis and   
                    C. Nikolaou   Towards a person-centric Identity
                                  Management Infrastructure (IMI)  . . . . ??
       Guillermo L. Taboada and   
        Juan Touriño and   
            Ramón Doallo   Performance analysis of message-passing
                                  libraries on high-speed clusters . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 25, Number 2, March, 2010

              Jiro Iwashige and   
                Leonard Barolli   Electromagnetic Fields Diffracted by Two
                                  Horizontal edges with Arbitrary Angle
                                  for Different and Same Heights . . . . . ??
                  Hiroshi Maeda   Simulation of Soliton Propagation in
                                  Slab Waveguide by Frequency Dependent
                                  FDTD Method  . . . . . . . . . . . . . . ??
            Makoto Murakami and   
             Motoi Yamagiwa and   
                  Minoru Uehara   Decision Model for a System to Start
                                  Communicating with a Human . . . . . . . ??
             Tomoya Enokido and   
                Makoto Takizawa   A Purpose-based Synchronization Protocol
                                  for Secure Information Flow Control  . . ??
               C. Militello and   
                   V. Conti and   
                F. Sorbello and   
                    S. Vitabile   An embedded IRIS recognizer for portable
                                  and mobile devices . . . . . . . . . . . ??
     Alireza Goudarzinemati and   
             Tomoya Enokido and   
                Makoto Takizawa   Scheduling Algorithms for Concurrently
                                  Streaming Multimedia Objects in P2P
                                  Overlay Networks . . . . . . . . . . . . ??
            Antonio Gentile and   
            Roberto Pirrone and   
                 Giuseppe Russo   Knowledge Discovery for the Linguistic
                                  Atlas of Sicily Project  . . . . . . . . ??
             Motoi Yamagiwa and   
              Minoru Uehara and   
                Makoto Murakami   A reconstruction method for Ultrasonic
                                  deterioration image by the combination
                                  of Constructive Solid Geometry and
                                  Strongly Typed Genetic Programming . . . ??
               David Taniar and   
               Wenny Rahayu and   
                Vincent Lee and   
                     Olena Daly   Mining Hierarchical Negative Association
                                  Rules  . . . . . . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 25, Number 3, May, 2010

              Frank Morovan and   
          Abdelkader Hameurlain   Special issue: Mobile Data Management:
                                  Models, Methodologies and Services . . . ??
            Young-Chang Kim and   
                  Jae-Woo Chang   A new distributed grid scheme and $k$-NN
                                  query processing for mobile objects in
                                  spatial networks . . . . . . . . . . . . ??
                  Geng Zhao and   
                Kefeng Xuan and   
               David Taniar and   
                Bala Srinivasan   LookAhead continuous KNN mobile query
                                  processing . . . . . . . . . . . . . . . ??
               Bhuvan Bamba and   
                   Ling Liu and   
                   Philip S. Yu   A motion-aware safe period-based
                                  framework for spatial alarm processing   ??
               Michele Ruta and   
          Floriano Scioscia and   
            Tommaso Di Noia and   
            Eugenio Di Sciascio   A hybrid ZigBee/Bluetooth approach to
                                  mobile semantic grids  . . . . . . . . . ??
                  Yiwei Cao and   
                Ralf Klamma and   
                 Matthias Jarke   Mobile multimedia management for Virtual
                                  Campfire --- the German excellence
                                  research cluster UMIC  . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 25, Number 4, July, 2010

            Ernesto Damiani and   
               Luis Barbosa and   
            Peter T. Breuer and   
             Claudio A. Ardagna   Special issue: Open Source Certification ??
            Luis S. Barbosa and   
             Antonio Cerone and   
      Alexander K. Petrenko and   
                Siraj A. Shaikh   Certification of open-source software: A
                                  role for formal methods? . . . . . . . . ??
   Pedro Luis Mateo Navarro and   
Gregorio Martínez Pêrez and   
             Diego Sevilla Ruiz   OpenHMI-tester: an open and
                                  cross-platform architecture for GUI
                                  testing and certification  . . . . . . . ??
             Etiel Petrinja and   
                Giancarlo Succi   Trustworthiness of the FLOSS development
                                  process  . . . . . . . . . . . . . . . . ??
         Chiara Francalanci and   
                Francesco Merlo   Empirical analysis of the bug fixing
                                  process in open source projects  . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 25, Number 5, September, 2010

              Yuh-Dauh Lyuu and   
                   Ming-Luen Wu   Group undeniable signatures with
                                  convertibility . . . . . . . . . . . . . ??
           V. Lakshmi Praba and   
                    G. Arumugam   Message authentication code algorithm
                                  for IP-SEC . . . . . . . . . . . . . . . ??
             Rodolfo Sumoza and   
            Jose Aguilar Castro   A cache coherence protocol for
                                  distributed memory platforms . . . . . . ??
              Yang-Sae Moon and   
                      Jinho Kim   MBR-safe piecewise aggregate
                                  approximation for time-series
                                  subsequence matching . . . . . . . . . . ??
            K. Bekiropoulos and   
            E. Keramopoulos and   
                    O. Beza and   
                  P. Mouratidis   A list of features that a graphical XML
                                  query language should support  . . . . . ??
       Muhammad Sheikh Sadi and   
                D. G. Myers and   
       Cesar Ortega Sanchez and   
                    Jan Jurjens   Component criticality analysis to
                                  minimize soft errors risk  . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 25, Number 6, November, 2010

                    Kai Lin and   
                       Kequi Li   Special issue: Selected topics on
                                  Wireless Sensor Networks . . . . . . . . ??
                   Song Guo and   
                     An-Ni Shen   A compromise-resilient pair-wise
                                  rekeying protocol in hierarchical
                                  wireless sensor networks . . . . . . . . ??
             Guangcheng Qin and   
               Panlong Yang and   
                Guihai Chen and   
                       Deke Guo   Characterizing the scaling capacity for
                                  multiple access wireless sensor networks ??
               Zhongwen Guo and   
                  Yuan Feng and   
                    Lu Hong and   
                   Ying Guo and   
                      Meng Yang   Efficient and adaptive transmission
                                  algorithms for underwater acoustic
                                  networks . . . . . . . . . . . . . . . . ??
                 Junfeng Xu and   
                   Kequi Li and   
               Yanming Shen and   
                     Geyong Min   An energy efficient packet aggregation
                                  scheme for wireless sensor networks  . . ??
                Xiaowu Chen and   
                 Yongtao Ma and   
                   Qinping Zhao   Multi-category Web object extraction
                                  based on relation schema . . . . . . . . ??


International Journal of Computer Systems Science and Engineering
Volume 26, Number 1, January, 2011

                  Baoshu Xu and   
                   Wenyu Qu and   
                    Wanlei Zhou   A mobile agent-based routing algorithm
                                  and some theoretical analysis  . . . . . ??
             Rodolfo Sumoza and   
            Jose Aguilar Castro   A cache coherence protocol for
                                  distributed memory platforms . . . . . . ??
                Eun-Sun Cho and   
                    Manpyo Hong   A structural view definition for RDF
                                  data . . . . . . . . . . . . . . . . . . ??
             Xiangxian Chen and   
                  Hai Huang and   
                  Jiafang Zhang   In-car speech enhancement based on
                                  ensemble empirical mode decomposition    ??
                    Ercan Bulus   Designing attacks for SMTP servers . . . ??
          Prashant M. Dolia and   
             Ashwin R. Dobariya   New approach towards event monitoring
                                  through IP surveillance technology using
                                  4G mobile devices  . . . . . . . . . . . ??
               Fouzi Harrag and   
    Aboubekeur Hamdi-Cherif and   
   Abdul Malik S. Al-Salman and   
               Eyas El-Qawasmeh   Evaluating the effectiveness of VSM
                                  model and topic segmentation in
                                  retrieving Arabic documents  . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 26, Number 2, March, 2011

             Danielle Costa and   
                Luci Pirmez and   
        Luiz F. R. C. Carmo and   
            Luiz F. H. Bacellar   Enhancing Levenshtein distance algorithm
                                  for assessing behavioral trust . . . . . ??
              Pedram Hayati and   
          Vidyasagar Potdar and   
              Alex Talevski and   
                     Kevin Chai   Characterisation of Web spambots using
                                  self organising maps . . . . . . . . . . ??
          Ali Mirza Mahmood and   
         Mrithyumjaya Rao Kuppa   Increasing generalization accuracy by
                                  using multivariate statistical method    ??
                   Gang Xue and   
                  Tony Chen and   
                    Gang He and   
                    Shaowen Yao   Modeling service interaction patterns    ??
               Eyas El-Qawasmeh   Categorizing received email to improve
                                  delivery . . . . . . . . . . . . . . . . ??
        Georgia Frantzeskou and   
       Stephen G. MacDonell and   
      Efstathios Stamatatos and   
           Stelios Georgiou and   
             Stefanos Gritzalis   The significance of user-defined
                                  identifiers in Java source code
                                  authorship identification  . . . . . . . ??
                    Kun Yue and   
                 Wei-Yi Liu and   
                   Li-Ping Zhou   Automatic keyword extraction from
                                  documents based on multiple
                                  content-based measures . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 26, Number 3, May, 2011

                     Yi Sun and   
                 Lizhe Wang and   
                    Wei Jie and   
                       Cheng Fu   Special issue --- Research in e-science:
                                  current status and future direction  . . ??
                   Zheng Xu and   
              Xiangfeng Luo and   
                     Lizhe Wang   Incremental building association link
                                  network  . . . . . . . . . . . . . . . . ??
                 Peng Zhang and   
              Sabu Emmanuel and   
              Yanning Zhang and   
                       Cheng Fu   Auto-scaled ISL tracking for region
                                  based control infrastructure and
                                  applications in video surveillance . . . ??
                 Guoli Wang and   
                     Chao Huang   Energy-efficient beaconless real-time
                                  routing protocol for wireless sensor
                                  networks . . . . . . . . . . . . . . . . ??
                   Zhe Tang and   
                Meng Joo Er and   
                        Fang Qi   Dynamic fuzzy neural network for the
                                  intelligent control of a humanoid robot  ??
                   Dan Chen and   
                 Lizhe Wang and   
              Congcong Bian and   
                  Xuguang Zhang   A grid infrastructure for hybrid
                                  simulations  . . . . . . . . . . . . . . ??
              Jungying Chen and   
                   Dan Chen and   
                   Oliver Lemon   A feature-based detection and tracking
                                  system for gaze and smiling behaviours   ??
                Tianyi Zang and   
             Radu Calinescu and   
              Marta Kwiatkowska   Metamodel-driven SOA for collaborative
                                  e-science application  . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 26, Number 4, July, 2011

               Sanghyun Yoo and   
                Ki Yong Lee and   
                  Myoung Ho Kim   Fast $k$-NN search using pre-computed
                                  $l$-NN sets  . . . . . . . . . . . . . . ??
                   Yun Shen and   
                      Ling Feng   Evaluation of XPath queries with
                                  predicates: an Eulerian cycle theory
                                  based sequencing approach  . . . . . . . ??
   Görkem Çetyn and   
       Mehmet Göktürk   Assessing usability readiness of
                                  collaborative projects . . . . . . . . . ??
                   Haengrae Cho   Distributed multidimensional clustering
                                  based on spatial correlation in wireless
                                  sensor networks  . . . . . . . . . . . . ??
               D. Surendran and   
            T. Purusothaman and   
             R. A. Baclachandar   Performance analysis of a resource
                                  aggregator in a grid of grids
                                  environment  . . . . . . . . . . . . . . ??
              Helaine Sousa and   
            Denivaldo Lopes and   
           Zair Abdelouahab and   
     Daniela Barreiro Claro and   
               Slimane Hammoudi   An approach for model driven testing:
                                  framework, metamodels and tools  . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 26, Number 5, September, 2011

                    Xin Bai and   
           Michael B. Smith and   
          Rathika Rajaravivarma   Affordance of ubiquitous learning
                                  through cloud computing  . . . . . . . . ??
                  Xuping Tu and   
                    Hai Jin and   
                  Zhibin Yu and   
                   Jie Chen and   
                   Yabin Hu and   
                        Xie Xia   MT-BTRIMER: A master-slave
                                  multi-threaded dynamic binary translator ??
                  Jijun Cao and   
                  Jinshu Su and   
                   Jing Xie and   
                      Feng Chen   DBMISD-D: A distributed algorithm for
                                  constructing and maintaining high
                                  stability application-layer multicast
                                  tree . . . . . . . . . . . . . . . . . . ??
                Xiaohui Wei and   
               Hongliang Li and   
                Qingnan Guo and   
                   Na Jiang and   
                       Liang Hu   LimeVI: A platform for virtual cluster
                                  live migration over WAN  . . . . . . . . ??
                  Likun Liu and   
                 Cheng Chen and   
                 Yongwei Wu and   
                  Guangwen Yang   Metadata changes in large file systems:
                                  a metadata querying perspective  . . . . ??
               Weijiang Liu and   
                   Wenyu Qu and   
                Zhaobin Liu and   
                       Kequi Li   A novel method for estimating flow
                                  length distributions from double-sampled
                                  flow statistics  . . . . . . . . . . . . ??
                  Jing Xiao and   
                        Min Zhu   HyperMonitor: A lightweight
                                  multi-platform monitor based on hardware
                                  virtualization . . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 26, Number 6, November, 2011

              T. Richardson and   
                 A. J. Wellings   On the road to real-time OSGi: extending
                                  OSGi with an admission control protocol  ??
                 James Hill and   
           Hunt Sutherlandy and   
           Paul Staudingery and   
           Thomas Silveriaz and   
         Douglas C. Schmidt and   
                John Slabyz and   
              Nikita Visnevskiy   OASIS: an architecture for dynamic
                                  instrumentation of enterprise
                                  distributed real-time and embedded
                                  systems  . . . . . . . . . . . . . . . . ??
                 H. Posadas and   
                  E. Villar and   
            Dominique Ragot and   
                Marcos Martinez   Early, time-approximate modeling of
                                  multi-OS Linux platforms in a systemC
                                  co-simulation environment  . . . . . . . ??
                  Jon Perez and   
          Roman Obermaisser and   
          Carlos F. Nicolas and   
                 Iban Ayestaran   Modeling time-triggered real-time
                                  control systems using executable
                                  time-triggered model (E-TTM) and
                                  systemC-AMS  . . . . . . . . . . . . . . ??
             Olivier Gilles and   
                  Jerome Hugues   A MDE-based optimisation process for
                                  real-time systems: optimizing systems at
                                  the architecture-level using the real
                                  DSL and library of transformation and
                                  heuristics . . . . . . . . . . . . . . . ??
            Albrecht Kadlec and   
             Raimund Kirner and   
                 Peter Puschner   Code transformations to prevent timing
                                  anomalies  . . . . . . . . . . . . . . . ??
                Julian Wolf and   
                Mike Gerdes and   
              Florian Kluge and   
               Sascha Uhrig and   
           Jörg Mische and   
            Stefan Metzlaff and   
         Christine Rochange and   
        Hugues Cassé and   
             Pascal Sainrat and   
                   Theo Ungerer   RTOS support for execution of
                                  parallelized hard real-time tasks on the
                                  MERASA multi-core processor  . . . . . . ??
           Hiromasa Shimada and   
          Alexandre Courbot and   
             Yuki Kinebuchi and   
                Tatsuo Nakajima   A software infrastructure for dependable
                                  embedded systems . . . . . . . . . . . . ??
             Stefan Henkler and   
        Simon Oberthür and   
               Holger Giese and   
                 Andreas Seibel   Model-driven runtime resource
                                  predictions for advanced mechatronic
                                  systems with dynamic data structures . . ??
      Alexander von Renteln and   
               Uwe Brinkschulte   Implementing and evaluating the AHS
                                  organic middleware . . . . . . . . . . . ??


International Journal of Computer Systems Science and Engineering
Volume 27, Number 1, 2012

            Joanna Koodziej and   
                Hiroaki Nishino   Preface  . . . . . . . . . . . . . . . . ??
          Aleksander Byrski and   
               Roman Debski and   
       Marek Kisiel-Dorohinicki   Agent-based computing in an augmented
                                  cloud environment  . . . . . . . . . . . ??
                 Ejaz Ahmed and   
                 Nik Bessis and   
           Peter Norrington and   
                       Yong Yue   Data integration: the method of data
                                  mapping, matching and loading grid
                                  staging catalogue  . . . . . . . . . . . ??
              Seiji Okajima and   
                Yoshihiro Okada   Hierarchical visual motion retrieval
                                  system for distributed motion DB and its
                                  user experiments . . . . . . . . . . . . ??
               Yutaka Okaie and   
                 Tadashi Nakano   Network formation games in
                                  non-cooperative service overlay networks ??
              Admir Barolli and   
                Fatos Xhafa and   
   Christian Sánchez and   
                Makoto Takizawa   A study on the effect of mutation in
                                  genetic algorithms for mesh router
                                  placement in wireless mesh networks  . . ??
              Tsuneo Kagawa and   
            Hiroaki Nishino and   
               Kouichi Utsumiya   Development and evaluation of an
                                  interactive texture design method  . . . ??
         Toshihiko Wakahara and   
          Noriyasu Yamamoto and   
                    Hiroki Ochi   Image processing of dotted picture in QR
                                  code of cellular phones  . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 27, Number 2, 2012

                   Jun Shen and   
               Soo Dong Kim and   
      Nalini Venkatasubramanian   Special issue: Service Oriented
                                  Computing and Applications . . . . . . . ??
              Farzad Sanati and   
                         Jie Lu   An ontology for e-government service
                                  integration  . . . . . . . . . . . . . . ??
              Neda Alipanah and   
               Latifur Khan and   
           Bjavani Thurisingham   Optmized ontology-driven query expansion
                                  using map-reduce framework to facilitate
                                  federated queries  . . . . . . . . . . . ??
   Andreas Schönberger and   
                    Guido Wirtz   Configurable analysis of sequential
                                  multi-party choreographies . . . . . . . ??
           Hmood Al-Dossari and   
               Jianhua Shao and   
                    Alun Preece   Improving QoS assessment over multiple
                                  attributes with asynchronous data  . . . ??
                Jae-Suk Lee and   
                 Sung-Bong Yang   An improved pathfinding under multiple
                                  exits with SOA in a double-layered MANET ??

International Journal of Computer Systems Science and Engineering
Volume 27, Number 3, 2012

            Osvaldo Gervasi and   
         Bernady O. Apduhan and   
          C. J. Kenneth Tan and   
                   David Taniar   Preface  . . . . . . . . . . . . . . . . ??
                  Ilsun You and   
             Jong-Hyouk Lee and   
                Kouichi Sakurai   DSSH: Digital signature based secure
                                  handover for network-based mobility
                                  management . . . . . . . . . . . . . . . ??
               Shinya Kondo and   
           Akimitsu Kanzaki and   
              Takahiro Hara and   
                 Shojiro Nishio   Integration of traffic reduction and
                                  sleep scheduling in wireless sensor
                                  networks . . . . . . . . . . . . . . . . ??
             Mahmudul Hasan and   
        Marina L. Gavrilova and   
                   Jon G. Rokne   Clearance-based homotopic optimal path
                                  computation  . . . . . . . . . . . . . . ??
         Olivia Fachrunnisa and   
        Farookh Khadeer Hussain   digital enterprise . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 27, Number 4, 2012

              Deniz Cokuslu and   
      Abdelkader Hemeurlain and   
                 Kayhan Erciyes   Resource allocation for query processing
                                  in grid systems: a survey  . . . . . . . ??
             Bory J. Bradel and   
           Tarek S. Abdelrahman   Inlining with traces in Java programs    ??
               D. Surendran and   
            T. Purusothaman and   
          R. A. Balachandar and   
                    G. Kousalya   ESGIA: Extensible service based grid
                                  information aggregator . . . . . . . . . ??
              Hesham A. Ali and   
            Mofreh M. Salem and   
                 Ahmed A. Hamza   A framework for scalable autonomous P2P
                                  resource discovery for the grid
                                  implementation . . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 27, Number 5, 2012

                  Ilsun You and   
            Leonard Barolli and   
                   Feilong Tang   Editorial  . . . . . . . . . . . . . . . ??
               Fang-Yie Leu and   
            Fuu-Cheng Jiang and   
            Chih-Cheng Lien and   
              Sen-Tarng Lai and   
               Shiuan-You Chiou   A rate-allocation based multi-path
                                  control scheme for event-driven wireless
                                  sensor networks on constant event packet
                                  rates  . . . . . . . . . . . . . . . . . ??
                   Tao Yang and   
                Tetsuya Oda and   
               Gjergji Mino and   
            Leonard Barolli and   
              Arjan Durresi and   
                    Fatos Xhafa   Energy-saving in wireless sensor
                                  networks considering mobile sensor
                                  nodes, single and multi events . . . . . ??
                Min-jun Kim and   
              Yong-suk Jang and   
               Yong-do Choi and   
                    Sung-ho Kim   Differentiated bandwidth allocation and
                                  wavelength assignment method in WDM EPON ??
                 Yuhoing Li and   
                   Liang Yu and   
                     Tao Li and   
                  Yishan Li and   
                        Yan Shi   Utility-based resource allocation in
                                  heterogeneous wireless environments
                                  using game theory  . . . . . . . . . . . ??
               Feilong Tang and   
                  Ilsun You and   
                    Shui Yu and   
                 Huakang Li and   
                    Cho-Li Wang   Grid transaction management and an
                                  efficient development kit  . . . . . . . ??
                     Yu Han and   
                 Naigao Jin and   
                Guangwei Xu and   
                    Kangbin Yim   A new iterative learning control scheme
                                  using the geometric rotation for
                                  discrete time systems  . . . . . . . . . ??
               Tingting Liu and   
                    Jie Cui and   
                    Bo Wang and   
                      Gang Chen   Parallelization of normal mode-WKBZ
                                  computation for ocean acoustic field . . ??

International Journal of Computer Systems Science and Engineering
Volume 27, Number 6, 2012

                  Ilsun You and   
                      JinShu Su   Editorial  . . . . . . . . . . . . . . . ??
                    Huachun and   
               Hongke Zhang and   
                       Fei Song   Mobility management analysis of Internet
                                  based on the splitting mechanism . . . . ??
                 Sun-Ho Lee and   
                Kangbin Yim and   
                   In-Yeong Lee   A secure solution with a password
                                  recovery feature for USB flash drives    ??
                Hyunwoo Kim and   
                   Mye Sohn and   
                  Hyun Jung Lee   Personalized recommendation framework
                                  based on CBR and CSP using ontology in a
                                  ubiquitous computing environment . . . . ??
           Hsing-Chung Chen and   
              Yung-Fa Huang and   
               Shu-Hong Lee and   
              Chi-Tung Chen and   
                   Ho-Lung Hung   A mobile location-based with
                                  time-constraint RBAC associated database
                                  management model . . . . . . . . . . . . ??
              Zhenqian Feng and   
                   Bing Bai and   
               Baokang Zhao and   
                      Jinshu Su   ICTree: discovering the underlying
                                  connections of your rental virtual
                                  machines in the public clouds  . . . . . ??
             Jongsuk R. Lee and   
               Don McNickle and   
      Krzysztof Pawlikowski and   
              Hae-Duck J. Jeong   Self-similar properties of malicious
                                  teletraffic  . . . . . . . . . . . . . . ??


International Journal of Computer Systems Science and Engineering
Volume 28, Number 1, 2013

           Nenad Stefanovic and   
               Dusan Stefanovic   Integrated and interactive software
                                  solution for knowledge-based supply
                                  network design . . . . . . . . . . . . . ??
      Xabier Ugarte-Pedrero and   
                Igor Santos and   
             Carlos Laorden and   
                 Borja Sanz and   
               Pablo G. Bringas   Collective Classification for Packed
                                  Executable Identification  . . . . . . . ??
             Mahmoud Khonji and   
               Andrew Jones and   
                  Youssef Iraqi   An Empirical Evaluation for Feature
                                  Selection Methods in Phishing Email
                                  Classification . . . . . . . . . . . . . ??
             Jernej Porenta and   
                 Mojca Ciglaric   Comparing commercial IP reputation
                                  databases to open-source IP reputation
                                  algorithms . . . . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 28, Number 2, 2013

                     Lei Ye and   
               Henry C. B. Chan   B2B magics: a mobile agent-based
                                  Internet commerce system for B2B
                                  e-commerce . . . . . . . . . . . . . . . ??
            K. Bekiropoulos and   
            E. Keramopoulos and   
                    O. Beza and   
                  P. Mouratidis   A list of features that a graphical XML
                                  query language should support  . . . . . ??
                   Song Han and   
              Tharam Dillon and   
                Vidy Potdar and   
                Elizabeth Chang   RFID mutual authentication protocols for
                                  tags and readers with and without a
                                  server . . . . . . . . . . . . . . . . . ??
                 Jun-Im Won and   
                  Hyun Back and   
               Jee-Hee Yoon and   
              Sanghyun Park and   
                  Sang-Wook Kim   One-dimensional spatial join processing
                                  using a DOT-based index structure  . . . ??
            Alexander Thomasian   Improved storage system performance by
                                  disk scheduling  . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 28, Number 3, 2013

              Jywe-Fei Fang and   
               Chien-Hung Huang   Algorithmic bipanpath connectivity of
                                  the hypercube  . . . . . . . . . . . . . ??
     Mohd Yamani Idna Idris and   
         Moraali Sivalingam and   
           Emran Mohd Tamil and   
                Zaidi Razak and   
         Noorzaily Mohamed Noor   Emergency vehicle preemption system
                                  based on global positioning system
                                  (GPS), A-star (A*) algorithm and FPGA    ??
          Apolinar Gonzalez and   
                Walter Mata and   
              Alfons Crespo and   
             Miguel Masmano and   
   José Félix and   
                  Alvaro Aburto   A hypervisor based platform to support
                                  real-time safety critical embedded Java
                                  applications . . . . . . . . . . . . . . ??
                     Lei Ye and   
              Adam S. K. Ho and   
        Solomon K. S. Leung and   
               Henry C. B. Chan   A business-to-business e-commerce system
                                  using software agents and RFID . . . . . ??
                    Tarek Helmy   Priority-based scheduling for dependent
                                  processes using random selection of
                                  resource holders . . . . . . . . . . . . ??
           J. Daniel Garcia and   
            Jesus Carretero and   
              Javier Garcia and   
        Luis Miguel Sanchez and   
                   Felix Garcia   by using partial replication . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 28, Number 4, 2013

                   P. Prema and   
                B. Ramadoss and   
             S. R. Balasundaram   An algorithm for merging two
                                  classification trees for test case
                                  generation . . . . . . . . . . . . . . . ??
                  Vimala S. and   
         Khanna Nehemiah H. and   
                 Saranya G. and   
                      Kannan A.   Analysis and modeling of multivalued
                                  attributes in entity relationship
                                  modeling: an approach for improved
                                  database design  . . . . . . . . . . . . ??
Marisol García-Valls and   
              Alfons Crespo and   
                      Joan Vila   Resource management for mobile operating
                                  systems based on the active object model ??
               Shinya Kondo and   
           Akimitsu Kanzaki and   
              Takahiro Hara and   
                 Shojiro Nishio   Integration of traffic reduction and
                                  sleep scheduling for energy-efficient
                                  data gathering in wireless sensor
                                  networks . . . . . . . . . . . . . . . . ??
               Mahmoud O. Elish   object-oriented software . . . . . . . . ??
             Wen-Feng Hsiao and   
                   Te-Min Chang   Term expansion on the categorization of
                                  summarized documents . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 28, Number 5, 2013

               ChaoYong Qin and   
                   Chenhan Liao   Session identification based on linked
                                  referrers and Web log indexing . . . . . ??
   A. J. Dinusha Rathnayaka and   
       Vidyasagar M. Potdar and   
              Tharam Dillon and   
               Omar Hussain and   
                Samitha Kuruppu   Prosumer recruitment framework for
                                  prosumer community groups in smart-grid  ??
                    Kun Yue and   
                 Wei-Yi Liu and   
               Wen-Hua Qian and   
                 Xiao-Feng Wang   Discovering semantic associations
                                  between Web services based on the
                                  electrostatic force theory . . . . . . . ??
Marisol García-Valls and   
          Pablo Basanta-Val and   
               Marga Marcos and   
        Elisabet Estévez   A bi-dimensional QoS model for SOA and
                                  real-time middleware . . . . . . . . . . ??
                  R. Anitha and   
                  K. Duraiswamy   Application of digital image processing
                                  in the determination of mass of the
                                  diamonds . . . . . . . . . . . . . . . . ??
    Javier Fernández and   
  Alejandro Calderón and   
 Félix García and   
         Jesús Carretero   Enhancing multimedia caching algorithms
                                  for variable-bandwidth streams using
                                  adaptive and smoothing techniques  . . . ??

International Journal of Computer Systems Science and Engineering
Volume 28, Number 6, 2013

              Alois Ferscha and   
                  Siani Pearson   Editorial  . . . . . . . . . . . . . . . ??
             Tomer Gershoni and   
            Miranda Mowbray and   
                  Siani Pearson   Mechanisms for Protecting Sensitive
                                  Information in Cloud Computing . . . . . ??
               Volkmar Lotz and   
Anderson Santana de Oliveira and   
                   Jakub Sendor   Control as a Means towards Accountable
                                  Services in the Cloud  . . . . . . . . . ??
          D. Davide Lamanna and   
             Flavio Bertini and   
               Giorgia Lodi and   
                Roberto Baldoni   How to Act Without being Observed:
                                  Progressive Privacy Architecture in
                                  Desktop-as-a-Service . . . . . . . . . . ??
              Massimo Ficco and   
      Salvatore Venticinque and   
           Beniamino Di Martino   An Advanced Intrusion Detection
                                  Framework for Cloud Computing  . . . . . ??
   José Simão and   
              Luís Veiga   Adaptability Driven by Quality of
                                  Execution in High Level Virtual Machines
                                  for Shared Cloud Environments  . . . . . ??
          João Paulo and   
                 Pedro Reis and   
        José Pereira and   
           António Sousa   Towards an Accurate Evaluation of
                                  Deduplicated Storage Systems . . . . . . ??
            Debmalya Biswas and   
      Krishnamurthy Vidyasankar   Secure Cloud Transactions  . . . . . . . ??


International Journal of Computer Systems Science and Engineering
Volume 29, Number 1, 2014

              Vidyasagar Potdar   Guest Editor . . . . . . . . . . . . . . ??
         Jaya Bhattacharjee and   
           Anirban Sengupta and   
           Chandan Mazumdar and   
            Mridul Sankar Barik   A two-phase quantitative methodology for
                                  enterprise information security risk
                                  analysis . . . . . . . . . . . . . . . . ??
               Aziz Qaroush and   
              Mahdi Washaha and   
                  Ismail Khater   Efficient spam filtering based on
                                  informative features extracted from the
                                  header fields and the URLs in the
                                  message  . . . . . . . . . . . . . . . . ??
               James Carmichael   Diagnosis of dysarthria subtype via
                                  spectral and waveform analysis . . . . . ??
             Pallavi Khatri and   
                 S. Tapaswi and   
                    U. P. Verma   Trust evaluation in wireless ad-hoc
                                  networks using fuzzy system  . . . . . . ??
             Wuyungerile Li and   
        Shunsuke Saruwatari and   
              Masaki Bandai and   
               Takashi Watanabe   Discussions on trade-offs in data
                                  aggregation in wireless sensor networks  ??
        Supriya Chakraborty and   
                  Nabendu Chaki   Generic organization of semi-structured
                                  data . . . . . . . . . . . . . . . . . . ??
              Ari Raptino H and   
        Shunsuke Saruwatari and   
              Masaki Bandai and   
               Takashi Watanabe   Rate and relay diversity in temporal
                                  spectrum sharing . . . . . . . . . . . . ??
               Zhixiao Wang and   
                Yanxiao Liu and   
                 Wenyao Yan and   
                    Wei Wei and   
                 Junhuai Li and   
                Deyun Zhang and   
                   Omar Alfandi   Cheating detection and cheater
                                  identification in $ (t, n) $ secret
                                  sharing scheme . . . . . . . . . . . . . ??
 Andrés Mejía and   
Reyes Juárez-Ramírez and   
             Sergio Inzunza and   
               Rocio Valenzuela   Implementing adaptive interfaces: a use
                                  model for the development of usability
                                  in interactive systems . . . . . . . . . ??
                 M. Suresha and   
                 Ajit Danti and   
          S. K. Narasimhamurthy   Decision trees to multiclass prediction
                                  for analysis of arecanut data  . . . . . ??
                   Atsushi Kato   Software industry in Okinawa: is
                                  ``domestic offshore outsourcing'' scheme
                                  feasible?  . . . . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 29, Number 2, 2014

        Muhamman Ali Ismail and   
            Shahid H. Mirza and   
                    Talat Altaf   `LogN+1' and `LogN' model: a binary tree
                                  based multi-level cache system for
                                  multi-core processors  . . . . . . . . . ??
              A. M. Kalpana and   
              K. Tamizarasu and   
          A. Ebenezer Jeyakumar   A fuzzy logic based framework for
                                  assessing the maturity level of Indian
                                  small scale software organizations . . . ??
                Yangjie Cao and   
               Hongyang Sun and   
                 Depei Qian and   
                      Weiguo Wu   Scalable hierarchical scheduling for
                                  malleable parallel jobs on
                                  multiprocessor-based systems . . . . . . ??
                Shahzad Ali and   
           Sajjad A. Madani and   
        Atta ur Rehman Khan and   
                 Imran Ali Khan   Routing protocols for mobile sensor
                                  networks: a comparative study  . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 29, Number 3, 2014

   Marian Zomorodi Moghadam and   
                Keivan Navi and   
               Mahmood Kalemati   A novel reversible design for double
                                  edge triggered flip-flops and new
                                  designs of reversible sequential
                                  circuits . . . . . . . . . . . . . . . . ??
          Carmelo Militello and   
             Vincenzo Conti and   
           Filippo Sorbello and   
             Salvatore Vitabile   A fast fusion technique for fingerprint
                                  and iris spatial descriptors in
                                  multimodal biometric systems . . . . . . ??
                Hasan Guler and   
                     Fikret Ata   Design of a fuzzy-labview-based
                                  mechanical ventilator  . . . . . . . . . ??
               Lucas Grossi and   
          Jose A. Calvo-Manzano   A systematic review in the decision
                                  analysis of selecting an IT outsourcing
                                  supplier . . . . . . . . . . . . . . . . ??
    Rerkchai Fooprateepsiri and   
                   Pichet Mareo   A highly robust approach to face
                                  authentication based on trace-fuzzy ART
                                  combination  . . . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 29, Number 4, 2014

                   Kequi Li and   
                        Heng Qi   Special Issue: Multimedia Information
                                  Processing and Retrieval . . . . . . . . ??
                   Kequi Li and   
                        Heng Qi   Preface  . . . . . . . . . . . . . . . . ??
             Guan-Wen Zhang and   
                  Jien Kato and   
                    Yu Wang and   
                     Kenji Mase   Multi-stage deep convolutional learning
                                  for people re-identification . . . . . . ??
                 Zhiyang Li and   
                   Wenyu Qu and   
                   Yujie Xu and   
                 Junjie Cao and   
                      Zhixun Su   Efficient shape representation and
                                  retrieval in large database  . . . . . . ??
          Cuong Xuan Nguyen and   
           Hung-Hsuan Huang and   
                  Kyoji Kawagoe   Implementation and evaluations of
                                  graphical password using object-based
                                  image ranking  . . . . . . . . . . . . . ??
                    Heng Qi and   
                  Guoyu Lan and   
                       Kequi Li   A hierarchical kernel for image
                                  classification based on layered
                                  representation . . . . . . . . . . . . . ??
                  Wei Jiang and   
                  Cong Wang and   
                Yong-Qing Zhang   Multiple graph regularization
                                  constrained nonnegative matrix
                                  factorization  . . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 29, Number 5, 2014

Marisol García-Valls and   
          Pablo Basanta-Val and   
               Marga Marcos and   
        Elisabet Estévez   A bi-dimensional QoS model for SOA and
                                  real-time middleware . . . . . . . . . . ??
              Manoj K. Raut and   
                 Arindama Singh   A survey on computing prime implicants
                                  and implicates in classical and
                                  non-classical logics . . . . . . . . . . ??
               Se Jung Shin and   
                    Won Suk Lee   Interactive discovery of association
                                  rules over data streams  . . . . . . . . ??
                  R. Anitha and   
                  K. Duraiswamy   Application of digital image processing
                                  in the determination of mass of the
                                  diamonds . . . . . . . . . . . . . . . . ??
      Mohammad Osiur Rahman and   
               Aini Hussain and   
              Edgar Scavino and   
               M. A. Hannan and   
                   Hassan Basri   DNA computation algorithm for recyclable
                                  waste paper sorting  . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 29, Number 6, 2014

              Jianfeng Guan and   
                   Wei Quan and   
                  Lili Wang and   
               Changqiao Xu and   
               Feilong Tang and   
                   Hongke Zhang   Modeling and analysis of mobility
                                  stochastic properties in cognitive radio
                                  networks . . . . . . . . . . . . . . . . ??
                    C. Mala and   
                      B. Nithya   Performance evaluation of IEEE 802.11
                                  contention control mechanisms using
                                  polygonal sequences  . . . . . . . . . . ??
              Wei Kuang Lai and   
                Yi-Uan Chen and   
                  Tin-Yu Wu and   
                    Ya-Yin Chen   Dual migration for mobile cloud service
                                  in 4G/LTE network  . . . . . . . . . . . ??
              Yong-Hwan Lee and   
                  Bonam Kim and   
                  Youngseop Kim   AAM-based emotion recognition using
                                  variance of facial feature points on
                                  mobile video stream  . . . . . . . . . . ??
               Ho-Seok Kang and   
                   Tran Tin and   
                  Sung-Ryul Kim   Design and experiments of new IP
                                  traceback method based on offline
                                  analysis . . . . . . . . . . . . . . . . ??


International Journal of Computer Systems Science and Engineering
Volume 30, Number 1, January, 2015

            Joseph Rafferty and   
                Liming Chen and   
               Chris Nugent and   
                        Jun Liu   Goal lifecycles and ontological models
                                  for intention based assistive living
                                  within smart environments  . . . . . . . ??
            Laura M. McAvoy and   
                Liming Chen and   
           Mark P. Donnelly and   
            Chris D. Nugent and   
              Paul J. McCullagh   Ontological characterization and
                                  representation of context within smart
                                  environments . . . . . . . . . . . . . . ??
           Antonio Coronato and   
            Giovanni Paragliola   An anomalous situation detection system
                                  for cognitive impaired people  . . . . . ??
    Alberto L. Morán and   
     Felipe Orihuela-Espina and   
         Victoria Meza-Kubo and   
            Ana I. Grimaldo and   
Cristina Ramírez-Fernández and   
Eloísa García-Canseco and   
      Juan M. Oropeza-Salas and   
                  Luis E. Sucar   Out of context serious games:
                                  Transversal reutilization of games
                                  across healthcare domains  . . . . . . . ??
         Diego Muñoz and   
     Francisco J. Gutierrez and   
            Sergio F. Ochoa and   
                 Nelson Baloian   Social connector: a ubiquitous system to
                                  ease the social interaction among family
                                  community members  . . . . . . . . . . . ??
Carlos Rodríguez-Domínguez and   
Tomás Ruiz-López and   
   José Luis Garrido and   
             Manuel Noguera and   
                Kawtar Benghazi   A model-driven approach to service
                                  composition on the basis of the
                                  specification of BPMN choreographies . . ??
          Constantin Taivan and   
            Rui José and   
                    Bruno Silva   Web-based applications for open display
                                  networks: developers' perspective  . . . ??

International Journal of Computer Systems Science and Engineering
Volume 30, Number 2, March, 2015

             David E. Singh and   
              Florin Isaila and   
 Félix García and   
         Jesús Carretero   Magio: using mobile agents to enhance
                                  parallel I/O . . . . . . . . . . . . . . ??
               Hai Tanh Mai and   
                  Jaeho Kim and   
                  Myoung Ho Kim   Integrating outlier removal into
                                  existing histogram construction methods
                                  for geographic data  . . . . . . . . . . ??
    Rawaa Dawoud Al-Dabbagh and   
              Saad Mekhilef and   
              Mohd Sapiyan Baba   Parameters' fine tuning of differential
                                  evolution algorithm  . . . . . . . . . . ??
               ChaoYong Qin and   
                   Chenhan Liao   Session identification based on linked
                                  referrers and web log indexing . . . . . ??
         Glaucio H. S. Carvalho   Optimal WiMax backhauling solutions for
                                  WiFi traffic . . . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 30, Number 3, May, 2015

            M'hamed Mataoui and   
              Mohamed Mezghiche   A distance based approach for link
                                  analysis in XML information retrieval    ??
               Hai Tanh Mai and   
                Ki Yong Lee and   
                  Myoung Ho Kim   Dynamic filtering of sensor readings for
                                  approximate query processing in sensor
                                  networks . . . . . . . . . . . . . . . . ??
                  Jijun Cao and   
                      Jinshu Su   Improving application layer multicast
                                  forwarding performance by offloading
                                  multisend operations . . . . . . . . . . ??
             Yan Tang Demey and   
                      Gang Zhao   SDD-matcher: a semantic-driven data
                                  matching framework . . . . . . . . . . . ??
               Chihang Zhao and   
                     Jie He and   
              Xiaoqin Zhang and   
                 Xingzhi Qi and   
                     Aiwen Chen   Recognition of driving postures by
                                  nonsubsampled contourlet transform and
                                  $k$-nearest neighbor classifier  . . . . ??
      Sergio Arévalo and   
     Ernesto Jiménez and   
                  Jian Tang and   
                  Rommel Torres   Set agreement and the loneliness failure
                                  detector in crash-recovery systems . . . ??

International Journal of Computer Systems Science and Engineering
Volume 30, Number 4, July, 2015

        S. Varadhaganapathy and   
             V. Krishnaveni and   
                G. Arumugam and   
                R. R. Rajalaxmi   Harmony and bio inspired harmony search
                                  optimization algorithms for feature
                                  selection in classification  . . . . . . ??
                   A. Rebhi and   
                    S. Abid and   
                     F. Fnaiech   Fabric defect localization using line
                                  variances of the local homogeneity
                                  images . . . . . . . . . . . . . . . . . ??
                  Ping Wang and   
              Kuo-Ming Chao and   
                    Chi-Chun Lo   A reputation-based computing approach in
                                  trusted web service provisions . . . . . ??
 Mohammad Ali Zare Chahooki and   
   Nasrollah Moghaddam Charkari   Bridging the semantic gap for automatic
                                  image annotation by learning the
                                  manifold space . . . . . . . . . . . . . ??
   A. J. Dinusha Rathnayaka and   
       Vidyasagar M. Potdar and   
              Tharam Dillon and   
                   Omar Hussain   Prosumer recruitment framework for
                                  prosumer community groups in smart-grid  ??

International Journal of Computer Systems Science and Engineering
Volume 30, Number 5, September, 2015

              Qingyuan Zhou and   
                   Jianjian Luo   Artificial neural network based grid
                                  computing of e-governance scheduling for
                                  emergency management . . . . . . . . . . ??
                 Qingjun Qu and   
                     Yiping Yao   A task distribution algorithm compatible
                                  with background control framework for
                                  parallel simulation  . . . . . . . . . . ??
                    Yan Wei and   
               Shi Songshan and   
              Liu Zhenggang and   
                    Li Guoxiang   Investigation on remote monitoring
                                  system for hybrid electric bulldozer . . ??
               Jin Bao-quan and   
                   Bai Qing and   
            Zhang Hong-juan and   
                  Wang dong and   
                        Gao Yan   Design and analysis of communication
                                  scheduling applied in water inrush
                                  perception layer of mine Internet of
                                  Things . . . . . . . . . . . . . . . . . ??
            Shengqing Zhang and   
                 Jiakuo Zuo and   
                    Li Zhao and   
                    Cairong Zhu   Energy-efficient power allocation for
                                  MIMO two-way cognitive relay networks    ??
            Shunxiang Zhang and   
                     Kui Lu and   
                Wenjuan Liu and   
                 Xiaobo Yin and   
                    Guangli Zhu   Generating associated knowledge flow in
                                  large-scale web pages based on user
                                  interaction  . . . . . . . . . . . . . . ??
                Xiang Zhang and   
            HuaiXiang Zhang and   
                   Yifan Wu and   
                     Guojun Dai   A SoPC design of a real-time
                                  high-definition stereo matching
                                  algorithm  . . . . . . . . . . . . . . . ??
                   Zheng Xu and   
                    Haiyan Chen   The semantic analysis of knowledge map
                                  for the traffic violations from the
                                  surveillance video big data  . . . . . . ??
              Jingsheng Lei and   
                 Teng Jiang and   
                     Kui Wu and   
                 Haizhou Du and   
                        Lin Zhu   Robust local outlier detection with
                                  statistical parameter for big data . . . ??
                   Xiao Wei and   
          Daniel Dajun Zeng and   
                     Wei Wu and   
                     Yeming Dai   Building the concept semantic space for
                                  large text database  . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 30, Number 6, November, 2015

               Weijiang Liu and   
                     Zhiyang Li   ICA3PP/U-Science 2014  . . . . . . . . . ??
                Xiaohua Jia and   
                Jinhai Wang and   
              Chuanhe Huang and   
                    Qin Liu and   
                     Kai He and   
                  Jing Wang and   
                        Peng Li   Dynamic resource allocation based on
                                  energy utility maximization using
                                  virtual machines in cloud environment    ??
                Aiping Zhou and   
                Guang Cheng and   
                Xiaojun Guo and   
             Dinh Tu Truong and   
                   Chengang Zhu   Heavy hitter identification based on
                                  adaptive sampling with mapreduce . . . . ??
                     Xinfeng Ye   Security games for service computing
                                  applications . . . . . . . . . . . . . . ??
                Yandong Guo and   
                  Min Huang and   
                      Qing Wang   Rescheduling rework jobs on
                                  single-machine of original jobs with
                                  release times  . . . . . . . . . . . . . ??
              Tingting Wang and   
               Weijiang Liu and   
                   Yujie Xu and   
                 Mianxiong Dong   QoS oriented task scheduling based on
                                  generic algorithm in cloud computing . . ??


International Journal of Computer Systems Science and Engineering
Volume 31, Number 1, January, 2016

                 Yanling Hu and   
                     Anfeng Liu   Improving the quality of mobile target
                                  detection through portion of node with
                                  full duty cycle in WSNs  . . . . . . . . ??
 Mohammad Ali Zare Chahooki and   
   Nasrollah Moghaddam Charkari   Bridging the semantic gap for automatic
                                  image annotation by learning the
                                  manifold space . . . . . . . . . . . . . ??
             Shailey Chawla and   
        Sangeeta Srivastava and   
                     Punam Bedi   Goals and scenarios based web
                                  requirements engineering . . . . . . . . ??
           Hamid Alishvandi and   
      Gholam Hosein Gouraki and   
                   Hamid Parvin   An enhanced dynamic detection of
                                  possible invariants based on best
                                  permutation of test cases  . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 31, Number 2, March, 2016

  Guest Editors: Zhiyang Li and   
                       Nei Kato   Special issue: BDCloud 2015 and FCST
                                  2015 . . . . . . . . . . . . . . . . . . ??
              Wen-Kai Huang and   
            Chang-Dong Wang and   
             Shao-Shu Huang and   
                   Zheng Li and   
             Jian-Huang Lai and   
                     Ling Huang   Long-term revenue maximization pricing
                                  scheme for cloud . . . . . . . . . . . . ??
                    Chen Bo and   
            Duan Cheng YOng and   
                       Gao Xiue   A frequent pattern parallel mining
                                  algorithm based on distributed sliding
                                  window . . . . . . . . . . . . . . . . . ??
              Fengjuan Chen and   
                   Wenyu Qu and   
                  Lihai Nie and   
                 Junfeng Wu and   
                    Yuanyuan Li   Discovering probabilistic frequent
                                  closed itemsets in uncertain database
                                  with tuple uncertainty . . . . . . . . . ??
                 Yifan Chen and   
                 Xiang Zhao and   
               Jiuyang Tang and   
              Weiming Zhang and   
                 Haichuan Shang   Taxi-taking recommendation using
                                  real-time trajectories: an online query
                                  based approach . . . . . . . . . . . . . ??
              Xiaowei Zheng and   
                 Jiaxuan Li and   
                 Yong Zhang and   
                    Qingkun Liu   An optimization model of Hadoop cluster
                                  performance prediction based on Markov
                                  process  . . . . . . . . . . . . . . . . ??
                    En Wang and   
              Yongjian Yang and   
                 Wenbin Liu and   
                       Fan Wang   Clustering routing method based on
                                  social characteristic in campus DTN  . . ??
       Shuchih Ernest Chang and   
              Anne Yenching Liu   Information security in practices:
                                  Exploring privacy and trust in computer
                                  and Internet surveillance  . . . . . . . ??
              Tingting Yang and   
               Zhonghua Sun and   
                    Zhou Su and   
               Hailong Feng and   
                   Ruilong Deng   Towards risk evaluation algorithm of PSC
                                  ship-selecting system based on
                                  hierarchic analysis and grey integrated
                                  clustering method  . . . . . . . . . . . ??
                      Li Fu and   
                       Zhen Liu   Topological separation axioms of soft
                                  rough formal context . . . . . . . . . . ??
                Yangyang Xu and   
                Zhaobin Liu and   
                   Zhonglian Hu   Ascending partition method for
                                  differentially private histogram
                                  publication  . . . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 31, Number 3, May, 2016

       Chiraz Soussi Moumen and   
              Franck Morvan and   
          Abdelkader Hameurlain   Estimation error-aware query
                                  optimization: an overview  . . . . . . . ??
                    Zhe Wei and   
                  Fang Wang and   
                         Le Sun   A practical reliable reputation based
                                  data fusion method for ad-hoc wireless
                                  sensor networks  . . . . . . . . . . . . ??
             Senem Kumova Metin   Neighbour unpredictability measure in
                                  multiword expression extraction  . . . . ??
               Sasa Kresoja and   
             Milos Rackovic and   
              Srdjan Skrbic and   
             Bojana Dimic Surla   A Petri Net extension for formal
                                  modelling of information systems . . . . ??
                         Jun Wu   Energy efficient dual execution mode
                                  scheduling for real-time tasks with
                                  shared resources . . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 31, Number 4, July, 2016

                Doohee Song and   
                  Kwangjin Park   Adaptive hierarchical bitmap-based index
                                  for wireless broadcast environments in
                                  an emergency . . . . . . . . . . . . . . ??
           Md. Sarwar Kamal and   
        Sonia Farhana Nimmy and   
                   Sazia Parvin   Performance evaluation comparison for
                                  detecting DNA structural break through
                                  big data analysis  . . . . . . . . . . . ??
              Seungdo Jeong and   
              Sang-Wook Kim and   
                  Byung-Uk Choi   Effective indexing and searching with
                                  dimensionality reduction on
                                  high-dimensional space . . . . . . . . . ??
             Alessio Angius and   
András Horváth and   
            Sami M Halawani and   
               Omar Barukab and   
            Ab Rahman Ahmad and   
               Gianfranco Balbo   Exploiting flow equivalent server in
                                  transient analysis . . . . . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 31, Number 5, September, 2016

     Ahmad Abdullah Alqarni and   
                   Eric Pardede   XML schema matching using early
                                  dissimilarity detection approaches . . . ??
        Alexander Thomasian and   
                         Jun Xu   Data allocation in a Heterogeneous Disk
                                  Array (HDA) with multiple RAID levels
                                  for database applications  . . . . . . . ??
               Petre Anghelescu   FPGA implementation of programmable
                                  cellular automata encryption algorithm
                                  for network communications . . . . . . . ??
       Giuseppe Della Penna and   
          Daniele Magazzeni and   
                 Sergio Orefice   Extending visual information extraction
                                  to biomedical applications . . . . . . . ??

International Journal of Computer Systems Science and Engineering
Volume 31, Number 6, November, 2016

    Guest Editors: Zheng Xu and   
          Vijayan Sugumaran and   
                      Hui Zhang   Special issue: Cyber-Physical
                                  System-related Technologies and
                                  Applications . . . . . . . . . . . . . . ??
                   Qiu Ling and   
                      Qi Linkai   water-related public organizations . . . ??
             Quan-Dong Feng and   
                    Miao Xu and   
                      Xin Zhang   The scalable vocabulary tree based model
                                  for sub-image retrieval  . . . . . . . . ??
                 Liu Ranran and   
               Zheng Enxing and   
                 Chang Shan and   
                 Bei Shaoyi and   
                  Zhang Lanchun   Hierarchical gradient based parameter
                                  identification for non-uniformly
                                  sampling Wiener systems  . . . . . . . . ??
                 Liu Ranran and   
               Zheng Enxing and   
                 Chang Shan and   
                 Bei Shaoyi and   
                  Zhang Lanchun   Hierarchical stochastic gradient
                                  identification for non-uniformly
                                  sampling Hammerstein systems with
                                  colored noise  . . . . . . . . . . . . . ??
                    Tao Guo and   
                 Xiang Fang and   
             Mingshou Zhong and   
                 Huayuan Ma and   
                     Yiming Mao   Research on the effects of blasting
                                  vibration attenuation by pre-split crack
                                  with HHT method  . . . . . . . . . . . . ??
               Zheng Enxing and   
                 Liu Ranran and   
               Jiang Yifeng and   
                  Sun Yuxia and   
                       Ni FuYin   Stochastic gradient identification for
                                  Hammerstein systems with non-uniformly
                                  sampling . . . . . . . . . . . . . . . . ??
                Tian Run Hu and   
              Zhang Yan Bin and   
                      Jia Lixin   The realization of multi agent based
                                  online trading systems based on J2EE
                                  technology . . . . . . . . . . . . . . . ??
              Qingyuan Zhou and   
                       Juan Luo   The service quality evaluation of
                                  ecologic economy systems using
                                  simulation computing . . . . . . . . . . ??
                  Cui-Xia Zhang   The state space model of remanufacturing
                                  carbon footprint for low-carbon  . . . . ??
                 Wenshu Bao and   
               Haiying Zhou and   
                    Wang Lu and   
                       Feng Xie   The system of knowledge management using
                                  web based learning and education
                                  technology . . . . . . . . . . . . . . . ??
                 Yitong Niu and   
             Mingming Xiong and   
                 Jianyi Guo and   
                  Cunli Mao and   
               Yantuan Xian and   
                    Zhengtao Yu   Using cross ambiguity model improves the
                                  effect of Vietnamese word segmentation   ??