Table of contents for issues of The Computer Journal

Last update: Fri Jan 5 06:05:18 MST 2018                Valid HTML 3.2!

Volume 23, Number 1, February, 1980
Volume 23, Number 2, May, 1980
Volume 23, Number 3, August, 1980
Volume 23, Number 4, November, 1980
Volume 24, Number 1, February, 1981
Volume 24, Number 2, May, 1981
Volume 24, Number 3, August, 1981
Volume 24, Number 4, November, 1981
Volume 25, Number 1, February, 1982
Volume 25, Number 2, May, 1982
Volume 25, Number 3, August, 1982
Volume 25, Number 4, November, 1982
Volume 26, Number 1, February, 1983
Volume 26, Number 2, May, 1983
Volume 26, Number 3, August, 1983
Volume 26, Number 4, November, 1983
Volume 27, Number 1, February, 1984
Volume 27, Number 2, May, 1984
Volume 27, Number 3, August, 1984
Volume 27, Number 4, November, 1984
Volume 28, Number 1, February, 1985
Volume 28, Number 2, May, 1985
Volume 28, Number 3, July, 1985
Volume 28, Number 4, August, 1985
Volume 28, Number 5, November, 1985
Volume ??, Number ??, August, 1985
Volume 29, Number 1, February, 1986
Volume 29, Number 2, April, 1986
Volume 29, Number 3, June, 1986
Volume 29, Number 4, August, 1986
Volume 29, Number 5, October, 1986
Volume 29, Number 6, December, 1986
Volume 30, Number 1, 1987
Volume 30, Number 2, April, 1987
Volume 30, Number 3, June, 1987
Volume 30, Number 4, August, 1987
Volume 30, Number 5, October, 1987
Volume 30, Number 6, December, 1987
Volume 31, Number 1, February, 1988
Volume 31, Number 2, April, 1988
Volume 31, Number 3, June, 1988
Volume 31, Number 4, August, 1988
Volume 31, Number 5, October, 1988
Volume 31, Number 6, December, 1988
Volume 32, Number 1, February, 1989
Volume 32, Number 2, 1989
Volume 32, Number 3, 1989
Volume 32, Number 4, 1989
Volume 32, Number 5, 1989
Volume 32, Number 6, December, 1989
Volume 22, Number 2, May, 1979


The Computer Journal
Volume 23, Number 1, February, 1980

                  P. Hammersley   Corporate Systems analysis --- a
                                  personal editorial . . . . . . . . . . . 2--2
               H. W. G. Gearing   New approaches to systems analysis and
                                  design. Welcome  . . . . . . . . . . . . 3--3
                     F. F. Land   Chairman's introduction  . . . . . . . . 3--5
                   Enid Mumford   Social aspects of systems analysis . . . 5--7
                  P. Hammersley   The impact of changing technology  . . . 7--9
                      P. Prowse   The data base approach . . . . . . . . . 9--12
               J. N. G. Brittan   Design for a changing environment  . . . 13--19
              J. N. G. Brittain   Design for a changing environment  . . . 13--22
                     K. Nygaard   The impact of social movements . . . . . 19--22
               P. H. Prowse and   
                  R. G. Johnson   A Natural Language Data Base Interface
                                  to the User  . . . . . . . . . . . . . . 22--25
                    E. B. James   The user interface . . . . . . . . . . . 25--28
                       K. Watts   Discussion on `New approaches to systems
                                  analysis and design' . . . . . . . . . . 28--33
                      Anonymous   Calls for papers . . . . . . . . . . . . 33--33
                   H. G. Perros   A regression model for predicting the
                                  response time of a disc I/O system . . . 34--36
                      Anonymous   International conference on data bases   36--36
                  N. Zvegintzov   Partial-Match Retrieval in an Index
                                  Sequential Directory . . . . . . . . . . 37--40
              Jay Louise Weldon   Using Data Base Abstractions for Logical
                                  Design . . . . . . . . . . . . . . . . . 41--45
                    R. K. Baker   Book Review  . . . . . . . . . . . . . . 45--45
                       M. Wells   Book Review  . . . . . . . . . . . . . . 45--45
                 R. A. Earnshaw   Line Tracking for Incremental Plotters   46--52
                R. M. De Morgan   Book Review  . . . . . . . . . . . . . . 52--52
        E. J. Yannakoudakis and   
                F. H. Ayres and   
               J. A. W. Huggill   Character coding for bibliographical
                                  record control . . . . . . . . . . . . . 53--60
                  P. M. D. Gray   Book Review  . . . . . . . . . . . . . . 60--60
                   B. S. Walker   Book Review  . . . . . . . . . . . . . . 60--60
                K. L. Clark and   
                  J. Darlington   Algorithm classification through
                                  synthesis  . . . . . . . . . . . . . . . 61--65
                   M. J. Blythe   Book Review  . . . . . . . . . . . . . . 65--65
                D. J. Evans and   
            Shirley A. Williams   Analysis and Detection of Parallel
                                  Processable Code . . . . . . . . . . . . 66--72
                    Y. Igarashi   The size of arrays for a prime implicant
                                  generating algorithm . . . . . . . . . . 73--77
                   I. H. Witten   Algorithms for adaptive linear
                                  prediction . . . . . . . . . . . . . . . 78--84
                   D. L. Fisher   Book Review  . . . . . . . . . . . . . . 84--84
                     D. H. Rees   Book Review  . . . . . . . . . . . . . . 84--84
                   J. O. Thomas   Book Review  . . . . . . . . . . . . . . 84--84
                      M. Thomas   Book Review  . . . . . . . . . . . . . . 84--84
                   J. P. Abbott   Algorithm 110: Computing solution arcs
                                  of nonlinear equations with a parameter  85--89
                      Anonymous   Algorithms supplement  . . . . . . . . . 85--89
                   M. J. Denham   Book review: \booktitleSystems
                                  Decomposition, Optimisation and Control,
                                  by M. G. Singh and A. Titli  . . . . . . 89--89
                   M. J. Denham   Book Review  . . . . . . . . . . . . . . 89--89
                N. L. Sarda and   
                    J. R. Isaac   Discussion and correspondence: Automatic
                                  analysis and design of information
                                  processing systems . . . . . . . . . . . 90--94
                     I. D. Hill   Correspondence: Jumping to some purpose  94--94

The Computer Journal
Volume 23, Number 2, May, 1980

               J. V. Hansen and   
                 Lynn J. McKell   A computer aid for the analysis of
                                  complex systems  . . . . . . . . . . . . 98--106
                   C. T. Burton   Book review: \booktitleArtificial
                                  Intelligence, Volume 1 by P. H. Winston
                                  and R. H. Brown  . . . . . . . . . . . . 106--106
                   C. T. Burton   Book Review  . . . . . . . . . . . . . . 106--106
                 R. E. Griswold   The use of character sets and character
                                  mappings in Icon . . . . . . . . . . . . 107--114
                  C. D. Easteal   Book Review  . . . . . . . . . . . . . . 114--114
              P. B. Fellget and   
                  C. D. Easteal   Book reviews: \booktitleThe Phenomenon
                                  of Science: A Cybernetic Approach to
                                  Human Evolution, by V. F. Turchin, 1977;
                                  \booktitleBusiness Systems Handbook, by
                                  Robert W. Gilmour, 1979  . . . . . . . . 114--114
                 P. B. Fellgett   Book Review  . . . . . . . . . . . . . . 114--114
               J. M. Bishop and   
                   D. W. Barron   Procedure calling and structured
                                  architecture . . . . . . . . . . . . . . 115--123
                  R. W. Paulson   Book review: \booktitleAn Introduction
                                  to Computational Fluid Mechanics, by
                                  Chuen-Yen Chow, 1979 . . . . . . . . . . 123--123
                  R. W. Paulson   Book Review  . . . . . . . . . . . . . . 123--123
                     S. A. Kent   A minicomputer based high level network
                                  control language . . . . . . . . . . . . 124--131
                      Anonymous   Joint BCS ACM Symposium on Research and
                                  Development in Information Retrieval . . 131--131
                   Deborah Hart   Joint BCS ACM symposium on Research and
                                  Development in Information Retrieval . . 131--131
                 R. Haskell and   
                 P. G. Harrison   System Conventions for Non Procedural
                                  Languages  . . . . . . . . . . . . . . . 132--141
            D. L. A. Barber and   
                    J. M. Brady   Book Review: \booktitleData
                                  Communications and Teleprocessing
                                  Systems, by T. Horsley, 1979;
                                  \booktitleA Technique for Software and
                                  Systems Design, by R. J. Lano, 1979  . . 141--141
                D. L. A. Barber   Book Review  . . . . . . . . . . . . . . 141--141
                    J. M. Brady   Book Review  . . . . . . . . . . . . . . 141--141
              R. H. Perrott and   
                 A. K. Raja and   
                   P. C. O'Kane   A simulation experiment using two
                                  languages  . . . . . . . . . . . . . . . 142--146
                  A. M. Addyman   Book Reviews . . . . . . . . . . . . . . 146--146
                 Brian Ford and   
               David Jacobs and   
                  A. M. Addyman   Book reviews: \booktitleWorkshop on
                                  Reliable Software: Applied Computer
                                  Science, by Peter Raulefs, 1979;
                                  \booktitleReliable Software Through
                                  Composite Design, by G. J. Myers, 1975;
                                  \booktitleFortran, PL/1 and the Algols,
                                  by Brian Meek, 1978  . . . . . . . . . . 146--146
                        B. Ford   Book Reviews . . . . . . . . . . . . . . 146--146
                      D. Jacobs   Book Reviews . . . . . . . . . . . . . . 146--146
                     I. C. Wand   Dynamic resource allocation and
                                  supervision with the programming
                                  language MODULA  . . . . . . . . . . . . 147--152
                   P. H. Prowse   Book Review  . . . . . . . . . . . . . . 152--152
             D. M. Vallance and   
                Peter H. Prowse   Book reviews: \booktitleProgramming in
                                  Standard Fortran 77, by A. Balfour and
                                  D. Marwick, 1979; \booktitleIssues in
                                  Data Base Management, by Herbert Weber
                                  and Anthony I. Wasserman, 1979 . . . . . 152--152
                 D. M. Vallance   Book Review  . . . . . . . . . . . . . . 152--152
                  D. T. Goodwin   Partial Non-Underflow and Non-Overflow
                                  of an Arithmetic Stack . . . . . . . . . 153--160
                 Roy Newton and   
                Harley Quilliam   Book reviews: \booktitleSoftware
                                  Portability: an Advanced Course, edited
                                  by P. J. Brown, 1977; \booktitleThe
                                  Challenge of Microprocessors, by M. G.
                                  Hartley and Anne Buckley, 1979 . . . . . 160--160
                      R. Newton   Book Review  . . . . . . . . . . . . . . 160--160
                    H. Quilliam   Book Review  . . . . . . . . . . . . . . 160--160
               B. Dasarathy and   
                     Cheng Yang   A Transformation on Ordered Trees  . . . 161--164
                   A. Colin Day   Book Review  . . . . . . . . . . . . . . 164--164
                 A. H. Wise and   
                   A. Colin Day   Book reviews: \booktitleMachine and
                                  Assembly Language Programming of the
                                  PDP-11, by Arthur Gill, 1979;
                                  \booktitleAssembly Language
                                  Fundamentals, by Rina Yarmish and J.
                                  Yarmish, 1978  . . . . . . . . . . . . . 164--164
                     A. H. Wise   Book Review  . . . . . . . . . . . . . . 164--164
                   M. Rabel and   
                   D. Dubus and   
                      A. Tosser   Saving of NAND/NOR gates by inhibition
                                  or $d$-Inhibition  . . . . . . . . . . . 165--185
                   D. Westreich   An efficient predictor-corrector
                                  algorithm  . . . . . . . . . . . . . . . 186--186
                 M. D. Atkinson   Permutation groups and set union
                                  algorithms . . . . . . . . . . . . . . . 187--187
                   D. Westreich   Improving polynomial evaluation at an
                                  approximate root . . . . . . . . . . . . 187--187
              J. A. T. Maddison   Fast lookup in hash tables with direct
                                  rehashing  . . . . . . . . . . . . . . . 188--189
               Michael de Smith   Points, polygons, and areas  . . . . . . 189--189
                   N. B. Taylor   Correspondence: Jumping to some purpose  189--190
              Mervyn Bryn-Jones   Correspondence: Points and $n$-sided
                                  irregular figures  . . . . . . . . . . . 190--190
                   R. W. Prowse   Book Review  . . . . . . . . . . . . . . 190--190
                       G. Emery   Book reviews: \booktitleAssociative
                                  networks, edited by N. V. Findler, 1979;
                                  \booktitleThe MU5 Computer System, by
                                  Derrick Morris and Rolland N. Ibbett,
                                  1979; \booktitle Cobol: An Introduction
                                  to Structured Logic and Modular Program
                                  Design, by William Davis and Richard
                                  Fisher, 1979 . . . . . . . . . . . . . . 191--191

The Computer Journal
Volume 23, Number 3, August, 1980

                  J. M. Triance   Structured Programming in COBOL --- the
                                  Current Options  . . . . . . . . . . . . 194--200
                Bernard Colemen   Software Engineering . . . . . . . . . . 200a-200
                    T. G. Gough   Introducing the Electronic Office  . . . 200--200
                  M. A. Jackson   Methodology in Computer Graphics . . . . 200b-200
                     S. M. Deen   A canonical schema for a generalised
                                  data model with local interfaces . . . . 201--206
             M. Hatzopoulos and   
                  J. G. Kollias   Some Rules for Introducing Indexing
                                  Paths in a Primary File  . . . . . . . . 207--211
                 S. K. Robinson   A Programming Metholodology in Compiler
                                  Construction Part I: Concepts  . . . . . 211--211
            R. B. E. Napper and   
                   R. N. Fisher   RCC --- a User-Extensible Systems
                                  Implementation Language  . . . . . . . . 212--222
               F. R. A. Hopgood   Research Directions in Software
                                  Technology . . . . . . . . . . . . . . . 222--222
             R. N. Horspool and   
                     N. Marovac   An approach to the problem of
                                  detranslation of computer programs . . . 223--229
                  I. M. Khabaza   Machine Intelligence . . . . . . . . . . 229--229
                W. T. Jones and   
                     S. A. Kirk   APL as a Software Design Specification
                                  Language . . . . . . . . . . . . . . . . 230--232
             A. F. Eidelson and   
                 I. J. Robinson   Implementation of BEDSOCS: an
                                  Interactive Simulation Language  . . . . 233--236
              G. R. Garside and   
                 P. E. Pintelas   An ALGOL 68 package for implementing
                                  graph algorithms . . . . . . . . . . . . 237--242
                  P. G. Raymont   Automatic Speech and Speaker Recognition 242--242
                   A. J. Thomas   Computer Security  . . . . . . . . . . . 242a-242
               D. F. Cowell and   
              D. F. Gillies and   
                   A. A. Kaposi   Synthesis and Structural Analysis of
                                  Abstract Programs  . . . . . . . . . . . 243--247
                 T. Ottmann and   
                        D. Wood   $1-2$ brother trees or AVL trees
                                  revisited  . . . . . . . . . . . . . . . 248--255
                J. J. Florentin   Speech Communication with Computers  . . 255b-255
                  M. A. Jackson   Structured Programming . . . . . . . . . 255--255
                  M. A. Jackson   Structured Systems Analysis: Tools and
                                  Techniques . . . . . . . . . . . . . . . 255a-255
                  A. Albano and   
                      R. Orsini   A tree search approach to the
                                  ${M}$-partition and Knapsack problems    256--261
                    G. Marshall   Computer Security  . . . . . . . . . . . 261--261
                     R. K. Lutz   An algorithm for the real time analysis
                                  of digitised images  . . . . . . . . . . 262--269
                   J. C. Cluley   Digital Circuits for Binary Arithmetic   269--269
             A. J. T. Colin and   
           A. D. McGettrick and   
                    P. D. Smith   Sorting Trains . . . . . . . . . . . . . 270--273
                    P. C. Capon   Understanding and Writing Compilers  . . 273--273
              I. J. Riddell and   
                   L. M. Delves   The comparison of routines for solving
                                  Fredholm integral equations of the
                                  second kind  . . . . . . . . . . . . . . 274--285
                     Jim Inglis   Learning to Program in Structured Cobol;
                                  Structured Analysis and System
                                  Specification  . . . . . . . . . . . . . 285a-285
                      R. M. Lea   Digital Networks and Computer Systems
                                  2nd Edition  . . . . . . . . . . . . . . 285b-285
                 I. R. Williams   Information Management Systems/Virtual
                                  Storage  . . . . . . . . . . . . . . . . 285--285
                  W. A. Zaremba   Discussion and correspondence: An
                                  alternative for the `completer' function 286--287
                    M. K. Crowe   Porting Virtual Object Files . . . . . . 287--288
                 G. L. Robinson   Correspondence: Jumping to some purpose  288--288

The Computer Journal
Volume 23, Number 4, November, 1980

                      L. Lipsky   A study of time sharing systems
                                  considered as queueing networks of
                                  exponential servers  . . . . . . . . . . 290--297
                   C. M. Reeves   Free store distribution under random fit
                                  allocation: Part 2 . . . . . . . . . . . 298--306
                 G. Schmidt and   
              T. Ströhlein   Timetable Construction --- an Annotated
                                  Bibliography . . . . . . . . . . . . . . 307--316
              A. Boccalatte and   
                    M. Di Manzo   An approach to the detection of semantic
                                  errors . . . . . . . . . . . . . . . . . 317--323
                 D. Y. Feng and   
               R. F. Riesenfeld   Some New Surface Forms for Computer
                                  Aided Geometric Design . . . . . . . . . 324--331
               T. I. Fenner and   
                      G. Loizou   A binary tree representation and related
                                  algorithms for generating integer
                                  partitions . . . . . . . . . . . . . . . 332--337
                  A. Albano and   
                      R. Orsini   A heuristic solution of the rectangular
                                  cutting stock problem  . . . . . . . . . 338--343
                    Y. L. Varol   On a subset of all the permutations of
                                  $n$ marks  . . . . . . . . . . . . . . . 344--346
                   M. A. Bramer   Correct and optimal strategies in game
                                  playing programs . . . . . . . . . . . . 347--352
                  I. Bratko and   
                      D. Michie   An advice program for a complex chess
                                  programming task . . . . . . . . . . . . 353--359
                       J. Mottl   Description of a program for nonlinear
                                  programming: special problem of bivalent
                                  nonlinear programming  . . . . . . . . . 360--368
                      D. Michie   Expert systems . . . . . . . . . . . . . 369--376
                    R. S. Lemos   Discussion and correspondence: Measuring
                                  students' attitudes towards structured
                                  walk-throughs  . . . . . . . . . . . . . 377--380
              S. N. Johnson and   
                     Jay Louise   Correspondence: Using data abstraction
                                  for logical design . . . . . . . . . . . 380--380
                   Martyn Thoma   Correspondence: The unconditional branch
                                  --- a modest proposal  . . . . . . . . . 380--381
                      R. Reeves   Correspondence: Using data abstraction
                                  for logical design . . . . . . . . . . . 381--382
                       J. Snell   Correspondence: On ``An efficient
                                  predictor-corrector algorithm''  . . . . 382--382
              D. K. Messham and   
                     A. Elliott   Correspondence: Procedure calling and
                                  structured architecture  . . . . . . . . 382--383
                      Anonymous   Erratum: ``An efficient
                                  predictor-corrector algorithm''  . . . . 383--383


The Computer Journal
Volume 24, Number 1, February, 1981

                      Anonymous   The Wilkes Prize . . . . . . . . . . . . 1--1
                  P. Hammersley   Editorial  . . . . . . . . . . . . . . . 1--1
                      Anonymous   Information for authors  . . . . . . . . 2--2
                      M. Healey   The possible impact of minicomputers and
                                  microprocessors on mainframe computer
                                  manufacturers  . . . . . . . . . . . . . 3--8
                      Anonymous   Books reviewed in this issue . . . . . . 8--8
                    E. B. James   Microelectronics: the impact on computer
                                  centres  . . . . . . . . . . . . . . . . 9--13
                  P. Hammersley   The impact of microcomputer systems on
                                  commercial data processing . . . . . . . 14--16
                      Anonymous   Call for registration: First British
                                  National Conference on Databases . . . . 16--16
               K. Ekanadham and   
                     A. Mahjoub   Microcomputer Networks . . . . . . . . . 17--24
                  M. E. Brinson   Book Review  . . . . . . . . . . . . . . 24--24
             J. C. Cavouras and   
                    R. H. Davis   Simulation Tools in Computer System
                                  Design Methodologies . . . . . . . . . . 25--28
                    T. G. Gough   Book Review  . . . . . . . . . . . . . . 28--28
              J. G. Kollias and   
                 M. Hatzopoulos   Criteria to aid in solving the problem
                                  of allocating copies of a file in a
                                  computer network . . . . . . . . . . . . 29--30
                R. A. Davenport   Design of Distributed Data Base Systems  31--41
                      R. Lovett   Book Review  . . . . . . . . . . . . . . 41--41
                       N. Riley   Book Review  . . . . . . . . . . . . . . 41--41
                 M. J. R. Shave   Entities, Functions, and Binary
                                  Relations: Steps to a Conceptual Schema  42--47
                     J. Lindley   Book Review  . . . . . . . . . . . . . . 47--47
                 I. M. C. Shand   Book Review  . . . . . . . . . . . . . . 47--47
             Naveen Prakash and   
              P. Sadanandan and   
                S. M. Desai and   
                K. Rama Rao and   
                    P. N. Gejji   Samhita --- a Data Base Management
                                  System . . . . . . . . . . . . . . . . . 48--51
                K. G. Beauchamp   Book Review  . . . . . . . . . . . . . . 51--51
                 Wendy J. Milne   A framework for the investigation of a
                                  spatial data base  . . . . . . . . . . . 52--55
               Amilcar Sernadas   SYSTEMATICS: its syntax and semantics as
                                  a query language . . . . . . . . . . . . 56--61
               I. H. Witten and   
                       Y. H. Ng   An ideographic language front end
                                  processor for accessing English language
                                  computer systems . . . . . . . . . . . . 62--70
                     J. M. Ross   Book Review  . . . . . . . . . . . . . . 70--70
                K. Ewusi-Mensah   Computer Network Usage Control Through
                                  Peak Load Pricing  . . . . . . . . . . . 71--77
           A. A. Moelwyn-Hughes   Book Review  . . . . . . . . . . . . . . 77--77
                D. T. Muxworthy   Book Review  . . . . . . . . . . . . . . 77--77
                     A. H. Wise   Book Review  . . . . . . . . . . . . . . 77--77
                A. Silberschatz   Port Directed Communication  . . . . . . 78--82
                Y. L. Varol and   
                       D. Rotem   An algorithm to generate all topological
                                  sorting arrangements . . . . . . . . . . 83--84
               R. D. Dutton and   
                  R. C. Brigham   A New Graph Colouring Algorithm  . . . . 85--86
                      Anonymous   Algorithms Supplement  . . . . . . . . . 87--90
                 S. Incerti and   
                 F. Zirilli and   
                      V. Parisi   Algorithm 111: a FORTRAN subroutine for
                                  solving systems of nonlinear
                                  simultaneous equations . . . . . . . . . 87--91
                 A. G. Bell and   
                      R. Lovett   Book reviews: \booktitleSoftware
                                  Reliability Guidebook, by Robert L.
                                  Glass, 1979; \booktitleFoundations of
                                  Computer Science, by M. S. Carberry, H.
                                  M. Khalil and J. F. Leathrum and L. S.
                                  Levy, 1979 . . . . . . . . . . . . . . . 91--91
                     P. R. Bird   Discussion and correspondence: Data
                                  structures for catalogues of sound
                                  recordings . . . . . . . . . . . . . . . 92--94
               Nickolia Kiossev   Correspondence: Points and polygons  . . 94--95
                 A. A. Cr0xf0rd   Correspondence: Os, zeros, thetas, and
                                  pis  . . . . . . . . . . . . . . . . . . 95--95
                     J. G. Hunt   Correspondence: Premature termination    95--95
                   D. J. Taylor   Correspondence: GOTOs in practice  . . . 95--95
                    R. P. Brent   Correspondence: Comments on papers by
                                  Maddison and Westreich . . . . . . . . . 95--96
               D. J. Cairns and   
                  P. R. Freeman   Book reviews: \booktitleTheory and
                                  Design of Digital Computer Systems, 2nd
                                  ed., by Douglas Lewin, 1980;
                                  \booktitleStatistical Computing, by W.
                                  J. Kennedy and J. E. Gentle, 1980  . . . 96--96
                  P. R. Freeman   Book Review  . . . . . . . . . . . . . . 96--96

The Computer Journal
Volume 24, Number 2, May, 1981

                 P. Stecher and   
              Volker Allenstein   The application controller concept: a
                                  first experience . . . . . . . . . . . . 97--106
                  I. Aleksander   Book Review  . . . . . . . . . . . . . . 106--106
                    R. E. Small   Book Review  . . . . . . . . . . . . . . 106--106
                P. D. Smith and   
                    S. Y. Steen   A prototype crossword compiler . . . . . 107--111
                      Anonymous   Calls for registration: \booktitleThe
                                  Computer Journal Seminars  . . . . . . . 111--111
                S. Alagi\'c and   
                 A. Kulenovi\'c   Relational Pascal Data Base Interface    112--117
                  A. H. Bridges   Book Review  . . . . . . . . . . . . . . 117--117
               J. N. G. Brittan   Book Review  . . . . . . . . . . . . . . 117--117
                        P. King   Book Review  . . . . . . . . . . . . . . 117--117
                    K. W. Short   Protection in Data Type Abstractions
                                  Using Constraints on Data Values . . . . 118--124
               Amilcar Sernadas   SYSTEMATICS: Its syntax and semantics as
                                  a query language (2) . . . . . . . . . . 125--129
                   W. B. Samson   Hash Table Collision Handling on Storage
                                  Devices with Latency . . . . . . . . . . 130--131
             W. T. Graybeal and   
                    U. W. Pooch   The design of calibration experiments
                                  for synthetic jobs . . . . . . . . . . . 132--138
                      Anonymous   Books reviewed in this issue . . . . . . 138--138
             Tony P. Lucido and   
            Rahul Chattergy and   
                   Udo W. Pooch   Survey of Microprogram Verification and
                                  Validation Methods . . . . . . . . . . . 139--142
                S. H. Lavington   Book Review  . . . . . . . . . . . . . . 142--142
                    H. Quilliam   Book Review  . . . . . . . . . . . . . . 142--142
                    F. G. Pagan   Style for Writing the Syntactic Portions
                                  of Complete Definitions of Programming
                                  Languages  . . . . . . . . . . . . . . . 143--147
                  K. Brinck and   
                      N. Y. Foo   Analysis of Algorithms on Threaded Trees 148--155
                      Anonymous   Corrigenda . . . . . . . . . . . . . . . 155--155
             M. A. Harrison and   
                     A. Yehudai   Eliminating Null Rules in Linear Time    156--161
                      A. Bowyer   Computing Dirichlet tessellations  . . . 162--166
                   D. F. Watson   Computing the $n$-dimensional Delaunay
                                  tessellation with application to
                                  Vorono\uì polytopes . . . . . . . . . . . 167--172
                  P. R. Freeman   Book Review  . . . . . . . . . . . . . . 172--172
                      J. Inglis   Book Review  . . . . . . . . . . . . . . 172--172
                     D. Simpson   Book Review  . . . . . . . . . . . . . . 172--172
            Yaakov L. Varol and   
                    Doron Rotem   Some Experiences with the
                                  Johnson-Trotter Permutation Generation
                                  Algorithm  . . . . . . . . . . . . . . . 173--176
             W. A. Sentance and   
                    I. P. Cliff   The Determination of Eigenvalues of
                                  Symmetric Quindiagonal Matrices  . . . . 177--179
         S. O. Bateman, Jr. and   
            S. D. Danielopoulos   Computerised Analytic Solutions of
                                  Second Order Differential Equations  . . 180--183
               L. M. Delves and   
             L. F. Abd-Elal and   
                   J. A. Hendry   Set of Modules for the Solution of
                                  Integral Equations . . . . . . . . . . . 184--190
                   S. Jones and   
                   C. M. Reeves   Book reviews: \booktitlePrinciples of
                                  Database Systems, by J. D. Ullman, 1980;
                                  \booktitleMathematical Methods in
                                  Computer Graphics and Design, edited by
                                  K. W. Brodie, 1980 . . . . . . . . . . . 190--190
                       S. Jones   Book Review  . . . . . . . . . . . . . . 190--190
                   C. M. Reeves   Book Review  . . . . . . . . . . . . . . 190--190
                        D. Bell   Correspondance . . . . . . . . . . . . . 191--191
                    D. Bell and   
                  Donald Michie   Correspondence: Expert systems . . . . . 191--191
              J. Stephenson and   
                       G. Brown   Correspondence: Implementation of
                                  BEDSOCS: An interactive simulation
                                  language . . . . . . . . . . . . . . . . 191--192
                      Anonymous   Announcement . . . . . . . . . . . . . . 192--192
                  D. F. Hartley   Correspondance . . . . . . . . . . . . . 192--192
              D. F. Hartley and   
                     The Editor   Correspondence: The Wilkes Award . . . . 192--192
                     J. D. Wigg   Correspondance . . . . . . . . . . . . . 192--192
                     J. D. Wigg   Correspondence: Unconditional branches   192--192

The Computer Journal
Volume 24, Number 3, August, 1981

                   F. S. Zahran   Universal Data Model Holder for Data
                                  Dictionary Systems . . . . . . . . . . . 193--199
                      C. Potter   Book Review  . . . . . . . . . . . . . . 199--199
                     J. M. Ross   Book Review  . . . . . . . . . . . . . . 199--199
                 I. M. C. Shand   Book Review  . . . . . . . . . . . . . . 199--199
                 S. M. Deen and   
                 D. Nikodem and   
                   A. Vashishta   The design of a canonical database
                                  system (Preci) . . . . . . . . . . . . . 200--209
               J. M. Bishop and   
                   D. W. Barron   Principles of Descriptors  . . . . . . . 210--221
                   S. C. Holden   Book Review  . . . . . . . . . . . . . . 221--221
                        P. Kent   Book Review  . . . . . . . . . . . . . . 221--221
             L. V. Atkinson and   
             J. J. McGregor and   
                    S. D. North   Context Sensitive Editing as an Approach
                                  to Incremental Compilation . . . . . . . 222--229
                       C. Lazos   Increasing Computer System Productivity
                                  Software and Hardware Methods: a
                                  Comparative Study  . . . . . . . . . . . 230--234
                   P. A. Clarke   Book Review  . . . . . . . . . . . . . . 234--234
                    R. E. Evans   Book Review  . . . . . . . . . . . . . . 234--234
                    M. E. Falla   The Gamma software engineering system    235--242
                   H. Wettstein   Locking Operations for Maximum
                                  Concurrency  . . . . . . . . . . . . . . 243--248
               D. B. G. Edwards   Book Review  . . . . . . . . . . . . . . 248--248
                      G. Radley   Book Review  . . . . . . . . . . . . . . 248--248
                H. W. Thimbleby   A word boundary algorithm for text
                                  processing . . . . . . . . . . . . . . . 249--255
                      Anonymous   Books reviewed in this issue . . . . . . 255--255
               G. F. Butler and   
                        J. Pike   A free-format data input scheme written
                                  in standard Fortran (Ansi 66)  . . . . . 256--257
                  A. C. Kilgour   Book review: \booktitleILP: Intermediate
                                  Language for Pictures, by P. J. W. ten
                                  Hagen, T. Hagen, P. Klint, H. Noot, N.
                                  J. Sint, and A. H. Veen, 1981  . . . . . 257--257
                  A. C. Kilgour   Book Review  . . . . . . . . . . . . . . 257--257
          Ronald E. Prather and   
             Shirla G. Giulieri   Decomposition of Flowchart Schemata  . . 258--262
                 Z. Zdrahal and   
                  I. Bratko and   
                     A. Shapiro   Recognition of Complex Patterns Using
                                  Cellular Arrays  . . . . . . . . . . . . 263--270
                      Anonymous   Forthcoming Meeting  . . . . . . . . . . 270--270
                  C. G. Breiner   Correspondence . . . . . . . . . . . . . 270--270
                      D. Harris   Correspondence . . . . . . . . . . . . . 270--270
                     M. Wakeman   Correspondence . . . . . . . . . . . . . 270--270
            Brian A. Barsky and   
              Spencer W. Thomas   TRANSPLINE --- a System for Representing
                                  Curves Using Transformations Among Four
                                  Spline Formulations  . . . . . . . . . . 271--277
                  Donald Michie   A Theory of Evaluative Comments in Chess
                                  with a Note on Minimaxing  . . . . . . . 278--286
                 I. P. Page and   
                     R. T. Wood   A shaded-picture scanning attachment for
                                  incremental plotters . . . . . . . . . . 287--287
             Edward M. Reingold   A comment on the evaluation of Polish
                                  postfix expressions  . . . . . . . . . . 288--288

The Computer Journal
Volume 24, Number 4, November, 1981

                 A. D. Chambers   Current Strategies for Computer Auditing
                                  Within an Organisation . . . . . . . . . 290--294
              Donald Millington   Structured Systems Analysis and Design
                                  Using Standard Flowcharting Symbols  . . 295--300
                W. T. Izatt and   
                  E. A. Schmitz   Data Structures and Descriptors in the
                                  ICL 2900 Series and Beyond . . . . . . . 301--307
                    J. R. Jones   Book Review  . . . . . . . . . . . . . . 307--307
           F. Warren Burton and   
                 Brian J. Lings   Abstract Data Types, Subtypes and Data
                                  Independence . . . . . . . . . . . . . . 308--311
                 Ian A. Macleod   Relational Model as a Basis for Document
                                  Retrieval System Design  . . . . . . . . 312--315
                  D. M. R. Bell   Book Review  . . . . . . . . . . . . . . 315--315
           Steven J. Harrington   Space Efficient Copying Storage Recovery 316--319
              Alison M. Pringle   Justification with Fewer Hyphens . . . . 320--323
                        J. Pike   Text Compression Using a $4$-Bit Coding
                                  Scheme . . . . . . . . . . . . . . . . . 324--330
                   J. C. Cluley   Book Review  . . . . . . . . . . . . . . 330--330
                      L. Corner   Book Review  . . . . . . . . . . . . . . 330--330
                      K. Hopper   Retained Objects and Operating System
                                  Interfaces . . . . . . . . . . . . . . . 331--338
                 I. P. Page and   
                     R. T. Wood   Empirical Analysis of a Moving Head Disc
                                  Model with Two Heads Separated by a
                                  Fixed Number of Tracks . . . . . . . . . 339--342
                    J. Anderson   Book Review  . . . . . . . . . . . . . . 342--342
                   R. E. Thomas   Book Review  . . . . . . . . . . . . . . 342--342
                   B. S. Walker   Book Review  . . . . . . . . . . . . . . 342--342
                  N. P. Wootton   Book Review  . . . . . . . . . . . . . . 342--342
              A. D. Elliman and   
                A. R. Sudhindra   Performances of Two Microprocessor-Based
                                  Multiplexor Techniques . . . . . . . . . 343--346
                   F. H. George   Book Review  . . . . . . . . . . . . . . 346--346
                      M. Lehman   Book Review  . . . . . . . . . . . . . . 346--346
                  E. Foxley and   
                      O. Salman   Validation of an Analytic Model of
                                  Computer Performance . . . . . . . . . . 347--352
              Adrian Bowyer and   
           Philip J. Willis and   
               John R. Woodwark   A Multiprocessor Architecture for
                                  Solving Spatial Problems . . . . . . . . 353--357
                       H. Gomaa   A hybrid simulation/regression model of
                                  a virtual storage system . . . . . . . . 358--366
                  P. A. Bennett   Book Review  . . . . . . . . . . . . . . 366--366
                  A. S. Radford   Book Review  . . . . . . . . . . . . . . 366--366
                James K. Mullin   Change Area B-Trees: a Technique to Aid
                                  Error Recovery . . . . . . . . . . . . . 367--373
                      Anonymous   Forthcoming meetings . . . . . . . . . . 373--373
            I. Sklená\vr   Affine Slices  . . . . . . . . . . . . . 374--377
                      Anonymous   Report . . . . . . . . . . . . . . . . . 377--377
                     J. English   Correspondence . . . . . . . . . . . . . 377--377
                     I. D. Hill   Correspondence . . . . . . . . . . . . . 377--377
                     J. G. Hunt   Correspondence . . . . . . . . . . . . . 377--377
                   R. N. Ibbett   Correspondence . . . . . . . . . . . . . 377--377
               Robin Sibson and   
              Graeme D. Thomson   A seamed quadratic element for
                                  contouring . . . . . . . . . . . . . . . 378--382
                      Anonymous   Books reviewed in this issue . . . . . . 382--382
                      Anonymous   Algorithms supplement  . . . . . . . . . 383--384
                    R. A. Frost   Algorithm 112: Dumping the index of a
                                  dynamic hash table . . . . . . . . . . . 383--384
                  A. M. Addyman   Book Review  . . . . . . . . . . . . . . 384--384
                    C. C. Chang   Book Review  . . . . . . . . . . . . . . 384--384
               R. W. Newton and   
                F. Panzieri and   
                C. C. Chang and   
                  A. M. Addyman   Book reviews: \booktitleProgramming
                                  Language Standardisation, edited by I.
                                  D. Hill and B. L. Meek, 1980;
                                  \booktitleProblem Solving and Structured
                                  Programming, by E. B. Koffmann, 1981;
                                  \booktitleData Base: Structured
                                  Techniques for Design, Performance and
                                  Management, by S. Atre, 1980;
                                  \booktitlePascal --- The Language and
                                  its Implementation, edited by D. W.
                                  Barron, 1981 . . . . . . . . . . . . . . 384--384
                   R. W. Newton   Book Review  . . . . . . . . . . . . . . 384--384
                    F. Panzieri   Book Review  . . . . . . . . . . . . . . 384--384


The Computer Journal
Volume 25, Number 1, February, 1982

                  P. Hammersley   Editorial  . . . . . . . . . . . . . . . 1--1
                    F. W. Allen   A file index for document storage and
                                  retrieval utilizing descriptor fragments 2--6
                  I. P. Schagen   Automatic Contouring from Scattered Data
                                  Points . . . . . . . . . . . . . . . . . 7--11
          A. T. Wood-Harper and   
                  G. Fitzgerald   A Taxonomy of Current Approaches to
                                  Systems Analysis . . . . . . . . . . . . 12--16
           Richard Kieburtz and   
           Abraham Silberschatz   On the Static Access-Control Mechanism
                                  in Concurrent Pascal . . . . . . . . . . 17--21
                  Nenad Marovac   The rotating bus as a basis for
                                  interprocess communication in
                                  distributed systems  . . . . . . . . . . 22--31
                     I. P. Page   Optimal Fit of Arbitrary Sized Segments  32--33
           Abraham Silberschatz   Priority and Queuing Specification in
                                  `Distributed Processes'  . . . . . . . . 34--36
                A. J. B. Travis   An Aid to Pattern Recognition  . . . . . 37--44
           Anibal O. Caride and   
              Susana I. Zanette   On the Process of Bisection to Calculate
                                  the Eigenvalues of Quindiagonal Matrices 44--44
                  M. D. McIlroy   A Program for Generating Word Squares    44a-44
              Jarmo Ernvall and   
                Olli Nevalainen   An Algorithm for Unbiased Random
                                  Sampling . . . . . . . . . . . . . . . . 45--47
             E. Skordalakis and   
            G. Papakonstantinou   A control structure for a variable
                                  number of nested loops . . . . . . . . . 48--51
                 J. J. Cocu and   
                R. E. Devillers   On a Class of Allocation Strategies
                                  Inducing Bounded Delays Only . . . . . . 52--55
               R. H. Barlow and   
                    D. J. Evans   Parallel Algorithms for the Iterative
                                  Solution to Linear Systems . . . . . . . 56--60
              Charles B. Dunham   The Necessity of Publishing Programs . . 61--62
                 Frank G. Pagan   Semantic specification using two-level
                                  grammars: labels and GOTO statements . . 63--67
          C. Robert Carlson and   
            Adarsh K. Arora and   
Miroslava Milosavljevic Carlson   The application of functional dependency
                                  theory to relational databases . . . . . 68--73
            R. J. T. Morris and   
                  J. S. Kaufman   Performance Comparison of I/O Access
                                  Disciplines for Transaction-Processing
                                  Systems  . . . . . . . . . . . . . . . . 74--83
                       S. Jones   Effective Data Base Design . . . . . . . 83--83
                      C. Potter   Fundamentals of Systems Analysis . . . . 83a-83
                     B. Schmidt   Simulation of Discrete Systems Using
                                  GPSS-Fortran . . . . . . . . . . . . . . 84--86
                M. Bozyigit and   
                       Y. Paker   A topology reconfiguration mechanism for
                                  distributed computer systems . . . . . . 87--92
                   M. C. Er and   
                B. G. T. Lowden   The theory and practice of constructing
                                  an optimal polyphase sort  . . . . . . . 93--101
                C. M. McCulloch   Quickshunt --- a Distributive Sorting
                                  Algorithm  . . . . . . . . . . . . . . . 102--104
                  Donald Michie   Experiments on the mechanization of
                                  game-learning. II. Rule-based learning
                                  and the human window . . . . . . . . . . 105--113
          M. L. V. Pitteway and   
                 A. J. R. Green   Bresenham's Algorithm with Run Line
                                  Coding Shortcut  . . . . . . . . . . . . 114--115
              Jack E. Bresenham   Incremental Line Compaction  . . . . . . 116--120
                J. L. Keedy and   
               J. Rosenberg and   
               K. Ramamohanarao   On Synchronizing Readers and Writers
                                  with Semaphores  . . . . . . . . . . . . 121--125
             M. Hatzopoulos and   
                  J. G. Kollias   The determination of the optimum
                                  database maintenance points  . . . . . . 126--129
                  Peter Radford   Petri Net Theory and the Modeling of
                                  Systems  . . . . . . . . . . . . . . . . 129--129
                    K. P. Teare   Eurographics 80  . . . . . . . . . . . . 129a-129
                 Julie Scoltock   A Survey of the Literature of Cluster
                                  Analysis . . . . . . . . . . . . . . . . 130--134
            R. W. A. Hudson and   
                     J. A. Self   A Dialogue System to Teach Database
                                  Concepts . . . . . . . . . . . . . . . . 135--139
               A. J. Wilkes and   
                  N. E. Wiseman   A Soft-edged Character Set and its
                                  Derivation . . . . . . . . . . . . . . . 140--147
               R. C. Thomas and   
                       A. Burns   The Case for Distributed Decision Making
                                  Systems  . . . . . . . . . . . . . . . . 148--152
            Philip C. Treleaven   Workshop report: VLSI Machine
                                  Architectures and Very High Level
                                  Languages  . . . . . . . . . . . . . . . 153--157
                R. A. Frost and   
                 M. M. Peterson   A Short Note on Binary Search Trees  . . 158--158
            D. Julian M. Davies   A note on sparsely filled dynamically
                                  allocated memory . . . . . . . . . . . . 159--159
                    C. C. Chang   Data Base Administration . . . . . . . . 160--160
                    R. Fletcher   Combinatorial Methods of Discrete
                                  Programming  . . . . . . . . . . . . . . 160b-160
                C. D. F. Miller   Programming in Pascal with Pascal/1000   160a-160

The Computer Journal
Volume 25, Number 2, May, 1982

                     B. Shackel   The BLEND system: programme for the
                                  study of some `electronic journals'  . . 161--168
              J. S. Johnson and   
                  D. B. Webster   Updating an Inverted Index --- a
                                  Performance Comparison of Two Techniques 169--175
                     Graham Lee   DOPLs: a New Style of Programming  . . . 176--182
        E. J. Yannakoudakis and   
                    A. K. P. Wu   Quasi-Equifrequent Group Generation and
                                  Evaluation . . . . . . . . . . . . . . . 183--187
               Reginald Muchsel   Performance Measurements --- a Practical
                                  Example from a German University
                                  Computing Centre . . . . . . . . . . . . 188--192
                 C. H. C. Leung   A simple model for the performance
                                  analysis of disc storage fragmentation   193--198
                 C. H. C. Leung   An Improved Optimal-Fit Procedure for
                                  Dynamic Storage Allocation . . . . . . . 199--206
        Philip C. Treleaven and   
         Richard P. Hopkins and   
             Paul W. Rautenbach   Combining Data Flow and Control Flow
                                  Computing  . . . . . . . . . . . . . . . 207--217
                   N. E. Goller   Triodic Logic and its Use in Structured
                                  Program Design . . . . . . . . . . . . . 218--226
              William E. Wright   Single Versus Double Buffering in
                                  Constrained Merging  . . . . . . . . . . 227--230
                       A. Blake   Fixed Point Solutions of Recursive
                                  Operations on Boolean Arrays . . . . . . 231--234
                 J. R. Woodwark   The Explicit Quad Tree As a Structure
                                  for Computer Graphics  . . . . . . . . . 235--238
            G. Papakonstantinou   Optimal Evaluation of Queries  . . . . . 239--241
              J. R. Lin Sin Cho   Automatic Report Formatting from a
                                  Report Specimen  . . . . . . . . . . . . 242--247
                 B. A. Wichmann   A comparison of PASCAL and Ada . . . . . 248--252
                 P. A. Dearnley   Software Development for Microcomputer
                                  Data Processing Systems  . . . . . . . . 253--256
                    R. W. Topor   Functional Programs for Generating
                                  Permutations . . . . . . . . . . . . . . 257--263
                 P. G. Harrison   Efficient Storage Management for
                                  Functional Languages . . . . . . . . . . 264--271
              Chris Corbett and   
                  Ian H. Witten   On the Inclusion and Placement of
                                  Documentation Graphics in Computer
                                  Typesetting  . . . . . . . . . . . . . . 272--277
                      Anonymous   Algorithms supplement  . . . . . . . . . 278--282
                Robert Piessens   Algorithm 113: Inversion of the Laplace
                                  transform  . . . . . . . . . . . . . . . 278--282
                     F. F. Land   Tutorial . . . . . . . . . . . . . . . . 283--285
                      Anonymous   Call for registration  . . . . . . . . . 286--286
              Marek Missala and   
                 Piotr Rudnicki   Correspondence: Jumping to some purpose  286--286
                        J. Watt   Correspondence: The possible impact of
                                  minicomputers and microprocessors [on]
                                  mainframe computer manufacturers . . . . 286--286
            D. J. G. Farlie and   
         Mildred L. G. Shaw and   
             B. A. Wichmann and   
                S. H. Lavington   Book reviews: W. M. Brelsford and R. A.
                                  Relles, \booktitleSTATLILB: A
                                  Statistical Computing Laboratory, 1981;
                                  N. Rushby (ed.), \booktitleSelected
                                  Readings in Computer-Based Learning,
                                  1981; R. D. Tennent,
                                  \booktitlePrinciples of Programming
                                  Languages, 1981; D. Hutchison,
                                  \booktitleFundamentals of Computer
                                  Logic, 1981  . . . . . . . . . . . . . . 287--287
                      Anonymous   Information for Authors  . . . . . . . . 288--288

The Computer Journal
Volume 25, Number 3, August, 1982

                 M. H. Williams   The programming language BPL . . . . . . 289--306
               C. J. Rosenquist   Entity life cycle models and their
                                  applicability to information systems
                                  development life cycles, a framework for
                                  information systems design and
                                  implementation . . . . . . . . . . . . . 307--315
           Dusan M. Velasevi\'c   Right-to-Left Code Generation for
                                  Arithmetic Expressions . . . . . . . . . 316--326
                  K. P. Tan and   
                      L. S. Hsu   Block sorting of a large file in
                                  external storage by a $2$-component key  327--330
              A. Boccalatte and   
                M. Di Manzo and   
                     D. Sciarra   Error Recovery with Attribute Grammars   331--337
                  T. M. Barnard   Simplified Accounting for the Computer
                                  Industry . . . . . . . . . . . . . . . . 337--337
                  P. A. Bennett   Practical Reliability Engineering  . . . 337c-337
                  P. G. Raymont   Apl80  . . . . . . . . . . . . . . . . . 337b-337
                       M. Wells   Computer Networks  . . . . . . . . . . . 337a-337
            Charles J. Colbourn   Computing the Chromatic Index of Steiner
                                  Triple Systems . . . . . . . . . . . . . 338--339
          R. Nigel Horspool and   
          Laurence W. Dunkelman   Analysis and Optimization of Set
                                  Expressions  . . . . . . . . . . . . . . 340--346
           Per-Åke Larson   Expected Worst-Case Performance of Hash
                                  Files  . . . . . . . . . . . . . . . . . 347--352
           Bengt Erik Bengtsson   Packing Rectangular Pieces --- a
                                  Heuristic Approach . . . . . . . . . . . 353--357
                    R. A. Frost   Binary-Relational Storage Structures . . 358--367
                Arvola Chan and   
                  Bahram Niamir   On Estimating the Cost of Accessing
                                  Records in Blocked Database
                                  Organizations  . . . . . . . . . . . . . 368--374
             Peter J. L. Wallis   The preparation of guidelines for
                                  portable programming in high-level
                                  languages  . . . . . . . . . . . . . . . 375--378
                     G. Oulsnam   Unravelling Unstructured Programs  . . . 379--387
                  M. D. McIlroy   The Number of States of a Dynamic
                                  Storage Allocation System  . . . . . . . 388--392
                 M. H. Williams   A Comment on the Decomposition of
                                  Flowchart Schemata . . . . . . . . . . . 393--396
                  P. A. Bennett   Elements of Computer Process Control . . 396b-396
                  P. R. Freeman   Basic-Pack Statistics Programs for Small
                                  Computers  . . . . . . . . . . . . . . . 396--396
                       G. Mitra   Computer Scheduling of Public Transport  396a-396
                       M. C. Er   A Note on Computing Precedence Functions 397--398
               J. M. Bishop and   
                   D. W. Barron   Mu5 Descriptors  . . . . . . . . . . . . 399a-399
                     Roger Hart   Implementation of BEDSOCS: an
                                  interactive simulation language  . . . . 399--399
              Geoffrey J. Baker   Database Security and Integrity  . . . . 400b-400
                  P. A. Bennett   Software Metrics . . . . . . . . . . . . 400a-400
                 Derrick Grover   Cryptography: a Primer . . . . . . . . . 400c-400
                     A. H. Wise   Book Review: \booktitleAdvances in Data
                                  Processing Management --- Vol.1  . . . . 400--400
              Geoffrey J. Baker   An End-User's Guide to Data Base . . . . 400--e-400
                  P. A. Bennett   Fault Tolerance: Principles and Practice 400--d-400

The Computer Journal
Volume 25, Number 4, November, 1982

                      A. Parkin   Data Analysis and System Design by
                                  Entity-Relationship Modelling --- a
                                  Practical Example  . . . . . . . . . . . 401--409
               C. R. Symons and   
                      P. Tijsma   A Systematic and Practical Approach to
                                  the Definition of Data . . . . . . . . . 410--422
                     A. G. Bell   Book Review: James Martin,
                                  \booktitleTelematic Society  . . . . . . 422a-422
                     J. Brittan   Book Review: D. Millington,
                                  \booktitleSystems Analysis and Design
                                  for Computer Applications  . . . . . . . 422--422
                       P. Giles   Book Review: P. Calingaert,
                                  \booktitleOperating System Elements ---
                                  a User Perspective . . . . . . . . . . . 422b-422
                     M. Mor and   
                 A. S. Fraenkel   Permutation Generation on Vector
                                  Processors . . . . . . . . . . . . . . . 423--428
                D. J. Tomlinson   An aid to hidden surface removal in real
                                  time CGI systems . . . . . . . . . . . . 429--441
                       M. C. Er   A representation approach to the Tower
                                  of Hanoi problem . . . . . . . . . . . . 442--447
                  R. A. Brooker   A `database' subsystem for BCPL  . . . . 448--464
              Elaine J. Weyuker   On Testing Non-Testable Programs . . . . 465--470
                 R. Sacks-Davis   Applications of Redundant Number
                                  Representations to Decimal Arithmetic    471--477
           K. Ramamohanarao and   
                  John W. Lloyd   Dynamic Hashing Schemes  . . . . . . . . 478--485
                      Anonymous   Forthcoming Meetings . . . . . . . . . . 485--485
                 D. A. Bell and   
                     S. M. Deen   Key Space Compression and Hashing in
                                  PRECI  . . . . . . . . . . . . . . . . . 486--492
                  M. M. Barritt   Book Review: Michael Shave,
                                  \booktitleData Structures  . . . . . . . 492b-492
                     I. D. Hill   Book Review: R. E. Berry,
                                  \booktitleProgramming Language
                                  Translation  . . . . . . . . . . . . . . 492a-492
                C. D. F. Miller   Book Review: E. W. Martin and W. C.
                                  Perkins, \booktitleFortran for Business
                                  Students: a Programmed Instruction
                                  Approach . . . . . . . . . . . . . . . . 492--492
               J. Shanehchi and   
                    D. J. Evans   A modified bisection algorithm for the
                                  determination of the eigenvalues of a
                                  symmetric quindiagonal matrix  . . . . . 493--494
                  P. A. Bennett   Book Review: Caxton C. Foster,
                                  \booktitleReal-Time Programming ---
                                  Neglected Topics . . . . . . . . . . . . 494b-494
                 B. K. F. Cheng   Book Review: L. L. Lapin,
                                  \booktitleQuantitative Methods for
                                  Business Decisions (2nd Edn) . . . . . . 494a-494
                 I. M. C. Shand   Book Review: F. F. Kuo (editor),
                                  \booktitleProtocols and Techniques for
                                  Data Communication Networks  . . . . . . 494--494
                     Jim Inglis   Jumping to Some Purpose  . . . . . . . . 495a-495
         A. Shafibegly-Gray and   
                   R. W. Whitty   Decomposition of Flowchart Schemata  . . 495--495
                  P. A. Bennett   Digital Control Using Microprocessors    496a-496
                David J. Cairns   Invitation to Pascal . . . . . . . . . . 496--496


The Computer Journal
Volume 26, Number 1, February, 1983

                   Philip Leith   Hierarchically Structured Production
                                  Rules  . . . . . . . . . . . . . . . . . 1--5
               R. H. Barlow and   
                D. J. Evans and   
                   J. Shanehchi   Parallel Multisection Applied to the
                                  Eigenvalue Problem . . . . . . . . . . . 6--9
             C. H. C. Leung and   
                   K. Wolfenden   Disc Database Efficiency: a Scheme for
                                  Detailed Assessment Based on Semi-Markov
                                  Models . . . . . . . . . . . . . . . . . 10--14
             S. O. Anderson and   
            R. C. Backhouse and   
                E. H. Bugge and   
                 C. P. Stirling   An Assessment of Locally Least-Cost
                                  Error Recovery . . . . . . . . . . . . . 15--24
                   C. M. Reeves   Free Store Distribution Under Random Fit
                                  Allocation: Part 3 . . . . . . . . . . . 25--35
             P. A. Dearnley and   
                   P. J. Mayhew   In Favour of System Prototypes and Their
                                  Integration into the Systems Development
                                  Cycle  . . . . . . . . . . . . . . . . . 36--42
              William E. Wright   Some File Structure Considerations
                                  Pertaining to Magnetic Bubble Memory . . 43--51
                   N. H. Gehani   High Level Form Definition in Office
                                  Information Systems  . . . . . . . . . . 52--59
                  J. M. Triance   The proposed COBOL Standard --- its
                                  significance . . . . . . . . . . . . . . 60--67
            D. G. N. Hunter and   
                 A. R. McKenzie   Experiments with Relaxation Algorithms
                                  for Breaking Simple Substitution Ciphers 68--71
              S. B. Wampler and   
                 R. E. Griswold   Co-expressions in Icon . . . . . . . . . 72--78
          A. T. Wood-Harper and   
                    D. J. Flynn   Action Learning for Teaching Information
                                  Systems  . . . . . . . . . . . . . . . . 79--82
               M. A. Oliver and   
                  N. E. Wiseman   Operations on Quadtree Encoded Images    83--91
                   J. M. Wilson   Algorithm 114: Interrupted permutations
                                  in lexicographic order . . . . . . . . . 92--92
                   J. M. Wilson   Algorithms Supplement  . . . . . . . . . 92--92
                 R. A. Reynolds   Short Note: Human Performance in
                                  Interactive Graphics Operations  . . . . 93--94
                   P. J. Coates   Correspondence . . . . . . . . . . . . . 95--95
                      D. Harper   Correspondence . . . . . . . . . . . . . 95--95
                 G. L. Robinson   Correspondance . . . . . . . . . . . . . 95--95

The Computer Journal
Volume 26, Number 2, May, 1983

             Phalguni Gupta and   
            G. P. Bhattacharjee   Parallel Generation of Permutations  . . 97--105
           Gaston H. Gonnet and   
      Henk J. Olivié and   
                    Derick Wood   Height-Ratio-Balanced Trees  . . . . . . 106--108
                  C. G. Broyden   A Mark-Scaling Algorithm . . . . . . . . 109--112
                 C. H. C. Leung   Analysis of Disc Fragmentation Using
                                  Markov Chains  . . . . . . . . . . . . . 113--116
                  J. G. Kollias   The Effect of Missing, Retroactive,
                                  Erroneous and/or Late Data in Designing
                                  Accounting Applications  . . . . . . . . 117--123
                R. A. Frost and   
                   S. Whittaker   A step towards the automatic maintenance
                                  of the semantic integrity of databases   124--133
               John C. Cavouras   Computer System Evaluation Through
                                  Supervisor Replication . . . . . . . . . 134--141
              David A. Watt and   
            Ole Lehrmann Madsen   Extended Attribute Grammars  . . . . . . 142--153
                    R. Lesuisse   Some Lessons Drawn from the History of
                                  the Binary Search Algorithm  . . . . . . 154--163
                  Lloyd Allison   Programming Denotational Semantics . . . 164--174
             R. E. Griswold and   
                  Michael Novak   Programmer-Defined Control Operations    175--183
                 N. N. Chan and   
                    Kim-Hung Li   Algorithm 115: a FORTRAN subroutine for
                                  finding a real symmetric matrix with
                                  prescribed diagonal elements and
                                  eigenvalues  . . . . . . . . . . . . . . 184--186
                 N. N. Chan and   
                        K-H. Li   Algorithms Supplement  . . . . . . . . . 184--186
              C. J. Prosser and   
                  A. C. Kilgour   Short Notes: a Note on Computing the
                                  Square Root of an Integer  . . . . . . . 187--187
                  C. J. Prosser   A note on computing the square root of
                                  an integer . . . . . . . . . . . . . . . 187--188
           F. Warren Burton and   
                  J. G. Kollias   Comment on ``The explicit quad tree as a
                                  structure for computer graphics''  . . . 188--188
               F. W. Burton and   
                  J. G. Kollias   Short Notes: Comment on `The Explicit
                                  Quad Tree as a Structure for Computer
                                  Graphics'  . . . . . . . . . . . . . . . 188--188
               R. H. Barlow and   
                    S. MacQueen   Correspondence . . . . . . . . . . . . . 189--189
                   Bill Findlay   Correspondence . . . . . . . . . . . . . 189--189
                I. R. MacCallum   Correspondence . . . . . . . . . . . . . 189--189
                   D. J. Cairns   Correspondence . . . . . . . . . . . . . 189--190
                       P. Giles   Book Review  . . . . . . . . . . . . . . 190--190
                      I. Mearns   Correspondence . . . . . . . . . . . . . 190--190
                   I. Aitchison   Book Review  . . . . . . . . . . . . . . 190--191
                   J. E. Parkin   Book Review  . . . . . . . . . . . . . . 191--191
                   J. E. Parkin   Book Review  . . . . . . . . . . . . . . 191--191
                    I. Williams   Book Review  . . . . . . . . . . . . . . 191--191
                    I. Williams   Book Review  . . . . . . . . . . . . . . 191--191
                   Barry Barber   Book Review  . . . . . . . . . . . . . . 191--192
                      Anonymous   Conferences  . . . . . . . . . . . . . . 192--192
                      Anonymous   Second International Conference on
                                  Databases  . . . . . . . . . . . . . . . 192--192

The Computer Journal
Volume 26, Number 3, August, 1983

                D. J. Evans and   
               F. Abdollahzadeh   Efficient Construction of Balanced
                                  Binary Trees . . . . . . . . . . . . . . 193--195
                 C. H. C. Leung   A Model for Disc Locality Referencing    196--198
             A. M. R. Smith and   
                  L. S. Lee and   
                     D. J. Hand   Interactive User-Friendly Interfaces to
                                  Statistical Packages . . . . . . . . . . 199--204
                       M. C. Er   A note on generating well-formed
                                  parenthesis strings lexicographically    205--207
                J. V. Woods and   
                 A. J. T. Wheen   Mu6P: an Advanced Microprocessor
                                  Architecture . . . . . . . . . . . . . . 208--217
              Jan Schlörer   Information Loss in Partitioned
                                  Statistical Databases  . . . . . . . . . 218--223
                       M. C. Er   Fast Algorithm for Computing Order-${K}$
                                  Fibonacci Numbers  . . . . . . . . . . . 224--227
                    R. A. Frost   SCHEMAL: Yet Another Conceptual Schema
                                  Definition Language  . . . . . . . . . . 228--234
             B. E. J. Clark and   
                 S. K. Robinson   A Graphically Interacting Program
                                  Monitor  . . . . . . . . . . . . . . . . 235--238
              A. F. Smeaton and   
           C. J. van Rijsbergen   The retrieval effects of query expansion
                                  on a feedback document retrieval system  239--246
                 B. Shackel and   
            D. J. Pullinger and   
                T. I. Maude and   
                     W. P. Dodd   The BLEND-LINC project on `electronic
                                  journals' after two years  . . . . . . . 247--254
                  J. R. Quinlan   INFERNO: a cautious approach to
                                  uncertain interference . . . . . . . . . 255--269
                 M. H. Williams   Flowchart Schemata and the Problem of
                                  Nomenclature . . . . . . . . . . . . . . 270--276
          Eric C. R. Hehner and   
             Brad A. Silverberg   Programming with Grammars: an Exercise
                                  in Methodology-Directed Language Design  277--281
             B. J. McKenzie and   
                     T. Takaoka   Short note: a Control Structure for a
                                  Variable Number of Nested Loops  . . . . 282--283
                  M. J. Cookson   Taxonomic studies on current approaches
                                  to systems analysis  . . . . . . . . . . 283--284

The Computer Journal
Volume 26, Number 4, November, 1983

                Pierre Lescanne   Behavioural Categoricity of Abstract
                                  Data Type Specifications . . . . . . . . 289--292
                       M. C. Er   A Parallel Computation Approach to
                                  Topological Sorting  . . . . . . . . . . 293--295
                    P. D. Smith   XENO: Computer-Assisted Compilation of
                                  Crossword Puzzles  . . . . . . . . . . . 296--302
              John A. Llewellyn   Finite State Models in the Study of
                                  Comma-Free Codes . . . . . . . . . . . . 303--311
                P. K. Ghosh and   
                    S. P. Mudur   Parametric Curves for Graphic Design
                                  Systems  . . . . . . . . . . . . . . . . 312--319
                   J. S. Deogun   On Scheduling with Ready Times to
                                  Minimize Mean Flow Time  . . . . . . . . 320--328
             Naveen Prakash and   
                Parimala N. and   
                     N. Bolloju   Data Definition Facilities in Admin  . . 329--335
        Aviezri S. Fraenkel and   
                      Moshe Mor   Combinatorial Compression and
                                  Partitioning of Large Dictionaries . . . 336--343
              John K. Slape and   
             Peter J. L. Wallis   Conversion of Fortran to Ada Using an
                                  Intermediate Tree Representation . . . . 344--353
                     F. Murtagh   A survey of recent advances in
                                  hierarchical clustering algorithms . . . 354--359
             M. P. Atkinson and   
               P. J. Bailey and   
             K. J. Chisholm and   
            P. W. Cockshott and   
                    R. Morrison   An Approach to Persistent Programming    360--365
                    R. T. House   A proposal for an extended form of type
                                  checking of expressions  . . . . . . . . 366--374
               M. A. Oliver and   
                  N. E. Wiseman   Operations on Quadtree Leaves and
                                  Related Image Areas  . . . . . . . . . . 375--380
                      B. Barber   Dynamic Programming-Models & Applications 381c-381
                   D. L. Fisher   A Structured Approach to Fortran 77
                                  Programming  . . . . . . . . . . . . . . 381a-381
                      J. Inglis   Advanced Cobol . . . . . . . . . . . . . 381b-381
                   Murray Laver   Language as a Cognitive Process  . . . . 381--381
                   Philip Giles   Computer Networks and Simulation 11  . . 381--d-382
                   J. A. Bowles   Data Acquisition Systems . . . . . . . . 382c-382
                       S. Evans   Spss Introductory Guide  . . . . . . . . 382--382
                     M. Horwood   Theory and Practice of Microprocessor    382b-382
                       S. Vajda   Nonlinear Optimization 1981  . . . . . . 382a-382
                    J. L. Bogod   CAD/CAM as a Basis for the Development
                                  of Technology in Developing Nations  . . 383c-383
                 Rodney Coleman   Queueing Theory: a Problem Solving
                                  Approach . . . . . . . . . . . . . . . . 383--383
                    Peter Haine   Automated Tools for Information Systems
                                  Design . . . . . . . . . . . . . . . . . 383b-383
                   J. M. Spivey   Logic Programming  . . . . . . . . . . . 383a-383
                       P. Giles   Operating System Elements --- a User
                                  Perspective  . . . . . . . . . . . . . . 383--d-383
                      Anonymous   Announcements  . . . . . . . . . . . . . 384a-384
                     I. D. Hill   Programming Language Translation . . . . 384--384


The Computer Journal
Volume 27, Number 1, February, 1984

                  P. Hammersley   Editorial  . . . . . . . . . . . . . . . 1--2
              Maurice V. Wilkes   Security Management and Protection --- a
                                  Personal Approach  . . . . . . . . . . . 3--7
            William A. Gale and   
                  Roger Koenker   Pricing Interactive Computer Services    8--17
                     I. P. Page   Analysis of a Cyclic Placement Scheme    18--26
                 P. G. Harrison   The Distribution of Cycle Times in
                                  Tree-Like Networks of Queues . . . . . . 27--36
                 D. H. J. Brown   Transitions to Ada: an Incremental
                                  Approach . . . . . . . . . . . . . . . . 37--41
                 L. V. Atkinson   Jumping About and Getting into a State   42--46
               David M. Harland   User-Defined Types in a Polymorphic
                                  Language . . . . . . . . . . . . . . . . 47--56
            Adarsh K. Arora and   
                  C. R. Carlson   Normalization Could Be Useful  . . . . . 57--61
                Parimala N. and   
             Naveen Prakash and   
                     N. Bolloju   Concurrency Control in Admin . . . . . . 62--66
                     K. T. Fung   A reorganization model based on the
                                  database entropy concept . . . . . . . . 67--71
                   C. M. Reeves   Complexity Analyses of Event Set
                                  Algorithms . . . . . . . . . . . . . . . 72--79
                       M. C. Er   The colour Towers of Hanoi: a
                                  generalization . . . . . . . . . . . . . 80--82
                       C. J. Lo   Short Notes: Unifying Multiple Semantic
                                  Intentions for a Syntactic Construct . . 83--84
            R. J. Macmillan and   
                J. H. Davenport   Short Notes: Factoring Medium-Sized
                                  Integers . . . . . . . . . . . . . . . . 84--85
              G. N. Buckley and   
                A. Silberschatz   Short Notes: on the Heterogeneous Guard
                                  Locking Protocol . . . . . . . . . . . . 86--87
                   T. Agmon and   
                    I. Borovits   Short Notes: Dynamic and Uncertainty
                                  Considerations in the Selection and the
                                  Acquisition of an Information System: an
                                  Adoption of a Break-Even Analysis to
                                  Investment Decisions . . . . . . . . . . 87--89
                    R. J. Heard   Correspondence . . . . . . . . . . . . . 90--90
                  G. Phillpotts   Correspondence . . . . . . . . . . . . . 90--90
                      J. Reeves   Correspondence . . . . . . . . . . . . . 90--91

The Computer Journal
Volume 27, Number 2, May, 1984

                Donald E. Knuth   Literate Programming . . . . . . . . . . 97--111
               A. J. Wilkes and   
               D. W. Singer and   
              J. J. Gibbons and   
                 T. R. King and   
                P. Robinson and   
                  N. E. Wiseman   The Rainbow Workstation  . . . . . . . . 112--120
            John A. Mariani and   
            Douglas R. McGregor   VULCAN: a Modified Viewdata System with
                                  Improved Indexing and Formal Hierarchy
                                  Definition Language  . . . . . . . . . . 121--126
                 P. Corsini and   
                 G. Frosini and   
                    L. Lopriore   The implementation of abstract objects
                                  in a capability based addressing
                                  architecture . . . . . . . . . . . . . . 127--134
                   C. M. Reeves   A Lumped-state Model of Clustering in
                                  Dynamic Storage Allocation . . . . . . . 135--142
                R. H. Davis and   
                     P. Coumpas   A Dynamic File Organization Model  . . . 143--150
                  Keld Helsgaun   Backtrack Programming with SIMULA  . . . 151--158
                      D. Barton   Problem with Algebra Systems ---
                                  Revisited  . . . . . . . . . . . . . . . 159--164
             M. H. Williams and   
                    K. T. Milne   The performance of algorithms for
                                  colouring planar graphs  . . . . . . . . 165--170
                       M. C. Er   The Cyclic Towers of Hanoi: a
                                  Representation Approach  . . . . . . . . 171--175
             Alan D. Kalvin and   
                Yaakov L. Varol   On Two Problems Reducible to Topological
                                  Sorting  . . . . . . . . . . . . . . . . 176--177
                   D. J. Hatter   Algorithm 116: a generalized
                                  non-recursive binary tree traversal
                                  algorithm  . . . . . . . . . . . . . . . 178--179
                      Anonymous   Algorithms Supplement  . . . . . . . . . 178--187
           J. D. Henstridge and   
                R. W. Payne and   
                    R. J. Baker   Algorithm 117: Buffered output in
                                  FORTRAN  . . . . . . . . . . . . . . . . 179--184
                   B. Jones and   
                M. Banerjee and   
                       L. Jones   Algorithm 118: Root isolation for
                                  transcendental equations . . . . . . . . 184--187
                      Anonymous   Statement of Policy  . . . . . . . . . . 187--187

The Computer Journal
Volume 27, Number 3, August, 1984

               A. El Sayed Noor   A framework for the creation and
                                  management of national computing
                                  strategies in developing countries . . . 193--200
                     A. Mahjoub   On the Static Evaluation of Distributed
                                  Systems Performance  . . . . . . . . . . 201--208
             Naveen Prakash and   
                N. Parimala and   
                     N. Bolloju   Specifying integrity constraints in a
                                  network DBMS . . . . . . . . . . . . . . 209--217
                 D. A. Bell and   
                     S. M. Deen   Hash Trees Versus B-Trees  . . . . . . . 218--224
                 J. R. Woodwark   Compressed Quad Trees  . . . . . . . . . 225--229
                        Art Lew   Proof of Correctness of Decision Table
                                  Programs . . . . . . . . . . . . . . . . 230--232
                  G. Adorni and   
              A. Boccalatte and   
                    M. Di Manzo   Top-Down Semantic Analysis . . . . . . . 233--237
            Richard B. Bunt and   
             Jennifer M. Murphy   The measurement of locality and the
                                  behaviour of programs  . . . . . . . . . 238--245
                 R. K. Ward and   
                    M. Tabandeh   Error Correction and Detection, a
                                  Geometric Approach . . . . . . . . . . . 246--253
           M. P. Papazoglou and   
           P. I. Georgiadis and   
                 D. G. Maritsas   Architectural considerations of the
                                  parallel SIMULA machine  . . . . . . . . 254--259
                 F. S. Wong and   
                      M. R. Ito   Parallel Sorting on a Re-Circulating
                                  Systolic Sorter  . . . . . . . . . . . . 260--269
                  H. W. Six and   
                      L. Wegner   Sorting a Random Access File in Situ . . 270--275
               Hannu Erkiö   The worst case permutation for
                                  median-of-three quicksort  . . . . . . . 276--277
                       M. C. Er   The Generalized Colour Towers of Hanoi:
                                  an Iterative Algorithm . . . . . . . . . 278--282
                  H. D. Baecker   On instruction set encoding  . . . . . . 283--283
                  H. D. Baecker   Short Note: on Instruction Set Encoding  283--283
                   Enid Mumford   Participative systems design . . . . . . 283--283
                     E. Mumford   Short Note: Participative Systems Design 283--283
                    R. H. Davis   A note on dynamic file organization
                                  models . . . . . . . . . . . . . . . . . 284--284
                    R. H. Davis   Short Note: a Note on Dynamic File
                                  Organization Models  . . . . . . . . . . 284--284
                       M. C. Er   Correspondence . . . . . . . . . . . . . 285--285
                  D. Holdsworth   Correspondence . . . . . . . . . . . . . 285--285
                        W. List   Correspondence . . . . . . . . . . . . . 285--285
                  J. G. Crookes   Correspondence . . . . . . . . . . . . . 286--286
                       M. Wells   Book Review  . . . . . . . . . . . . . . 286--286
                       M. Wells   Book Review  . . . . . . . . . . . . . . 286--286
                  J. O. Jenkins   Book Review  . . . . . . . . . . . . . . 286--287
               F. R. A. Hopgood   Book Review  . . . . . . . . . . . . . . 287--287
                    G. N. Lance   Book Review  . . . . . . . . . . . . . . 287--287
                   D. Muxworthy   Book Review  . . . . . . . . . . . . . . 287--287
                      Anonymous   Announcement . . . . . . . . . . . . . . 288--288
                      Anonymous   Corrigendum  . . . . . . . . . . . . . . 288--288
                      Anonymous   Call for Papers  . . . . . . . . . . . . 288--288
                      Anonymous   Forthcoming Events . . . . . . . . . . . 288--288

The Computer Journal
Volume 27, Number 4, November, 1984

       M. Elizabeth C. Hull and   
                   R. M. McKeag   Concurrency in the Design of Data
                                  Processing Systems . . . . . . . . . . . 289--293
                David S. Bowers   A Database Architecture for
                                  Aggregate-Incomplete Data  . . . . . . . 294--300
                   Steve Talbot   An investigation into logical
                                  optimization of relational query
                                  languages  . . . . . . . . . . . . . . . 301--309
                N. Parimala and   
             Naveen Prakash and   
                     N. Bolloju   New Corecs and New Cosets in Admin . . . 310--314
                  David A. Bell   Difficult Data Placement Problems  . . . 315--320
            D. D. Kouvatsos and   
                     S. K. Wong   On Optimal Blocking of Sequential Files  321--327
                   G. Ch. Pflug   Dynamic Memory Allocation --- a
                                  Markovian Analysis . . . . . . . . . . . 328--333
        Wlodzimierz Dobosiewicz   Replacement Selection in $3$-Level
                                  Memories . . . . . . . . . . . . . . . . 334--339
              Ronald E. Prather   An Axiomatic Theory of Software
                                  Complexity Measure . . . . . . . . . . . 340--347
                    P. J. Brown   Embedded Macro Processors  . . . . . . . 348--353
                 Michael Stubbs   An examination of the resolution of
                                  structure clashes by structure inversion 354--361
                A. J. B. Travis   An Aid to Pattern Recognition. Part 2    362--367
                      Anonymous   Algorithms Supplement  . . . . . . . . . 368--372
                  Ahmed S. Zaki   Algorithm 119: a space saving insertion
                                  algorithm for $2$-$3$ trees  . . . . . . 368--372
               Robert W. Irving   Short Notes: Permutation Backtracking in
                                  Lexicographic Order  . . . . . . . . . . 373--375
               F. W. Burton and   
              V. J. Kollias and   
                  J. G. Kollias   Short Notes: Consistency in
                                  Point-in-Polygon Tests . . . . . . . . . 375--376
                Alan Hutchinson   Short notes: the Halting Problem Does
                                  Not Matter . . . . . . . . . . . . . . . 376--376
                H. R. J. Grosch   Correspondence . . . . . . . . . . . . . 377--377
                  A. C. Kilgour   Correspondence . . . . . . . . . . . . . 377--377
                   M. J. Mepham   Correspondence . . . . . . . . . . . . . 377--378
                  P. Rechenberg   Correspondence . . . . . . . . . . . . . 378--378
                    P. Fellgett   Correspondence . . . . . . . . . . . . . 378--379


The Computer Journal
Volume 28, Number 1, February, 1985

                T. I. Maude and   
                D. J. Pullinger   Software for reading, refereeing and
                                  browsing in the BLEND system . . . . . . 1--4
             Nicola Santoro and   
                   Ramez Khatib   Labelling and Implicit Routing in
                                  Networks . . . . . . . . . . . . . . . . 5--8
                  D. T. Goodwin   Further Study of a Stack-Length Model    9--16
                 D. Crookes and   
                   C. J. Devlin   An Algorithm for Optimal Procedural
                                  Nesting  . . . . . . . . . . . . . . . . 17--21
                J. Robinson and   
                       A. Burns   A dialogue development system for the
                                  design and implementation of user
                                  interfaces in Ada  . . . . . . . . . . . 22--28
                  P. J. Layzell   The history of macro processors in
                                  programming language extensibility . . . 29--33
              J. M. Triance and   
                  P. J. Layzell   Macro Processors for Enhancing
                                  High-Level Languages --- Some Design
                                  Principles . . . . . . . . . . . . . . . 34--43
                   N. E. Goller   Hybrid Data Structures Defined by
                                  Indirection  . . . . . . . . . . . . . . 44--53
              G. V. Cormack and   
          R. N. S. Horspool and   
                M. Kaiserswerth   Practical Perfect Hashing  . . . . . . . 54--58
              A. L. Furtado and   
               T. S. E. Maibaum   An informal approach to formal
                                  (algebraic) specifications . . . . . . . 59--67
                B. A. Styne and   
                 T. R. King and   
                  N. E. Wiseman   Pad Structures for the Rainbow
                                  Workstation  . . . . . . . . . . . . . . 68--72
                     D. J. Abel   Some Elemental Operations on Linear
                                  Quadtrees for Geographic Information
                                  Systems  . . . . . . . . . . . . . . . . 73--77
                 M. H. Williams   A Linear Algorithm for Colouring Planar
                                  Graphs with Five Colours . . . . . . . . 78--81
                     F. Murtagh   A Survey of Algorithms for
                                  Contiguity-Constrained Clustering and
                                  Related Problems . . . . . . . . . . . . 82--88
                       J. Mottl   Description of a Program for Nonlinear
                                  Programming: the Centroid Program  . . . 89--94
                      Anonymous   Announcement . . . . . . . . . . . . . . 95--95
                  P. Shackelton   Correspondence . . . . . . . . . . . . . 95--95

The Computer Journal
Volume 28, Number 2, May, 1985

                   Enid Mumford   Defining System Requirements to Meet
                                  Business Needs: a Case Study Example . . 97--104
                      Anonymous   Announcements  . . . . . . . . . . . . . 104--104
                      Anonymous   Conference . . . . . . . . . . . . . . . 104--104
                      Anonymous   Call for Papers  . . . . . . . . . . . . 104--104
          Julian R. Ullmann and   
         Robert M. Haralick and   
               Linda G. Shapiro   Computer Architecture for Solving
                                  Consistent Labelling Problems  . . . . . 105--110
              D. J. Colwell and   
                  J. R. Gillett   Short Notes: a Note on Broyden's Mark
                                  Scaling Algorithm  . . . . . . . . . . . 111--111
                    R. A. Frost   Using Semantic Concepts to Characterise
                                  Various Knowledge Representation
                                  Formalisms: a Method of Facilitating the
                                  Interface of Knowledge Base System
                                  Components . . . . . . . . . . . . . . . 112--116
                    F. J. Dixon   Simplifying Screen Specifications ---
                                  the `Full Screen Manager' Interface and
                                  `Screen Form' Generating Routines  . . . 117--127
              J. M. Triance and   
                  P. J. Layzell   Language Enhancement Facility for COBOL
                                  --- its Design and Implementation  . . . 128--133
             M. H. Williams and   
                        G. Chen   Restructuring Pascal programs containing
                                  GOTO statements  . . . . . . . . . . . . 134--137
                Peter R. Benyon   Exploiting Vector Computers by
                                  Replication  . . . . . . . . . . . . . . 138--141
                   David Barton   Parallelism in Simple Algebra Systems    142--147
               L. M. Delves and   
                 S. C. Mawdsley   DAP-Algol: a Development System for
                                  Parallel Algorithms  . . . . . . . . . . 148--153
               T. S. E. Maibaum   Database Instances, Abstract Data Types
                                  and Database Specification . . . . . . . 154--161
                  R. Turner and   
                B. G. T. Lowden   An introduction to the formal
                                  specification of relational query
                                  languages  . . . . . . . . . . . . . . . 162--169
                   Yuksel Uckan   A relational schema description and
                                  manipulation facility  . . . . . . . . . 170--178
             C. H. C. Leung and   
                   K. Wolfenden   Mathematical Models of File Growth . . . 179--183
                  Philippe Kent   An efficient new way to represent
                                  multi-dimensional data . . . . . . . . . 184--190

The Computer Journal
Volume 28, Number 3, July, 1985

                  R. K. Stamper   Towards a Theory of Information.
                                  Information: Mystical Fluid or a Subject
                                  for Scientific Enquiry?  . . . . . . . . 195--199
                 George Rzevski   On Criteria for Assessing an Information
                                  Theory . . . . . . . . . . . . . . . . . 200--202
                 G. G. Scarrott   Information, the Life Blood of
                                  Organisation . . . . . . . . . . . . . . 203--205
                    C. J. Tully   Information, Human Activity and the
                                  Nature of Relevant Theories  . . . . . . 206--210
                     Frank Land   Is an Information Theory Enough? . . . . 211--215
              D. H. Marwick and   
            C. R. G. B. Rinaldi   The Tattoo on a micro-computer . . . . . 216--222
              G. Fitzgerald and   
                  N. Stokes and   
                  J. R. G. Wood   Feature Analysis of Contemporary
                                  Information Systems Methodologies  . . . 223--230
               R. N. Ibbett and   
              D. A. Edwards and   
              T. P. Hopkins and   
              C. K. Cadogan and   
                    D. A. Train   Centrenet --- a High Performance Local
                                  Area Network . . . . . . . . . . . . . . 231--242
                    S. Muir and   
               D. Hutchison and   
                    D. Shepherd   ARCA: a Local Network File Server  . . . 243--249
                 M. H. Williams   Structuring Two-Level Grammar
                                  Specifications . . . . . . . . . . . . . 250--256
                  D. T. Goodwin   The Computability of Stack Non-Underflow 257--263
             Sakti Pramanik and   
                  Chung-Ta King   A Hardware Pattern Matching Algorithm on
                                  a Dataflow . . . . . . . . . . . . . . . 264--269
             R. N. Maddison and   
                A. J. Gawronski   A Data Dictionary for Learning Data
                                  Analysis . . . . . . . . . . . . . . . . 270--281
                 S. M. Deen and   
                 R. R. Amin and   
        G. O. Ofori-Dwumfuo and   
                   M. C. Taylor   Architecture of a Generalised
                                  Distributed Database System --- PRECI    282--290
                 S. Misbah Deen   A Tuple Placement Technique for
                                  Databases  . . . . . . . . . . . . . . . 291--297
               T. D. Kimura and   
              W. D. Gillett and   
                 J. R. Cox, Jr.   A design of a data model based on
                                  abstraction of symbols . . . . . . . . . 298--308
               W. B. Samson and   
                     A. Bendell   Rank Order Distributions and Secondary
                                  Key Indexing . . . . . . . . . . . . . . 309--312
                    Gordon Lyon   Achieving Hash Table Searches in One or
                                  Two Bucket Probes  . . . . . . . . . . . 313--318
           Per-Åke Larson   Performance Analysis of a Single-File
                                  Version of Linear Hashing  . . . . . . . 319--329
                James K. Mullin   Spiral Storage: Efficient Dynamic
                                  Hashing with Constant Performance  . . . 330--334
                       A. Oxley   Surface Fitting By Triangulation . . . . 335--339
                   M. Clint and   
                    C. Holt and   
              R. H. Perrott and   
                     A. Stewart   Algorithm 120: A DAP FORTRAN subroutine
                                  for the eigensolution of real symmetric
                                  matrices . . . . . . . . . . . . . . . . 340--342
                D. G. N. Hunter   Algorithm 121: RSA key calculation in
                                  Ada  . . . . . . . . . . . . . . . . . . 343--348

The Computer Journal
Volume 28, Number 4, August, 1985

                     K. T. Fung   An entropy approach to solving some
                                  network reliability problems . . . . . . 353--356
         Jovan Djordjevi\'c and   
             Mario Barbacci and   
                    Brad Hosler   A PMS Level Notation for the Description
                                  and Simulation of Digital Systems  . . . 357--365
                M. L. Schneider   Weighted Decision Tables --- an
                                  Alternative Solution for Ambiguity . . . 366--371
              Kazimierz Subieta   A Simple Method of Data Correction . . . 372--374
                   Allan Ramsay   On Efficient Context Switching . . . . . 375--378
              John A. Llewellyn   The Construction of Variable-length
                                  Comma-Free Codes . . . . . . . . . . . . 379--390
                F. Cesarini and   
                        G. Soda   Design and Implementation of a
                                  Relational DBMS for Microcomputers . . . 391--397
                 R. Bonanno and   
                    D. Maio and   
                     P. Tiberio   An Approximation Algorithm for Secondary
                                  Index Selection in Relational Database
                                  Physical Design  . . . . . . . . . . . . 398--405
        Michael Hatzopoulos and   
           J. (Yiannis) Kollias   On the Selection of a Reduced Set of
                                  Indexes  . . . . . . . . . . . . . . . . 406--408
             C. H. C. Leung and   
                   K. Wolfenden   Estimating Disc Access Patterns Using
                                  Diffusion Models . . . . . . . . . . . . 409--411
                Matti Jakobsson   Sampling without Replacement in Linear
                                  Time . . . . . . . . . . . . . . . . . . 412--413
           F. Warren Burton and   
        Matthew M. Huntbach and   
        J. (Yiannis) G. Kollias   Multiple Generation Text Files Using
                                  Overlapping Tree Structures  . . . . . . 414--416
               Nivio Zivani and   
      Henk J. Olivié and   
               Gaston H. Gonnet   The Analysis of an Improved Symmetric
                                  Binary B-Tree Algorithm  . . . . . . . . 417--425
                   Keith Brinck   The Expected Performance of Traversal
                                  Algorithms in Binary Trees . . . . . . . 426--432
                   David McLean   A Method of Generating Surfaces as a
                                  Composite of Cyclide Patches . . . . . . 433--438
                 D. J. Abel and   
                 W. T. Williams   A Re-examination of Four Classificatory
                                  Fusion Strategies  . . . . . . . . . . . 439--443
               Enrico Spoletini   Algorithm 122: Generation of
                                  permutations in direct lexicographic
                                  ordering by arithmetic methods . . . . . 444--445
                      Anonymous   Announcements  . . . . . . . . . . . . . 446--446
                      Anonymous   Call for Papers  . . . . . . . . . . . . 446--446
                      Anonymous   Forthcoming Events . . . . . . . . . . . 446--446
                 N. M. Maclaren   Correspondence . . . . . . . . . . . . . 446--446

The Computer Journal
Volume 28, Number 5, November, 1985

                  M. W. Shields   Concurrent Machines  . . . . . . . . . . 449--465
                    K. Kant and   
                A. Silberschatz   Error Propagation and Recovery in
                                  Concurrent Environments  . . . . . . . . 466--473
                      Anonymous   Announcements  . . . . . . . . . . . . . 473--473
                      Anonymous   Conference . . . . . . . . . . . . . . . 473--473
            Lawrence C. Paulson   Lessons Learned from LCF: a Survey of
                                  Natural Deduction Proofs . . . . . . . . 474--479
                  Lloyd Allison   Programming denotational semantics. II   480--486
                 Z. Markusz and   
                   A. A. Kaposi   Complexity Control in Logic-Based
                                  Programming  . . . . . . . . . . . . . . 487--495
                  R. M. O'Keefe   Comment on `Complexity analyses of event
                                  set algorithms'  . . . . . . . . . . . . 496--497
                  Nader Shebini   FEDOS: a Finite Element Database of
                                  Offshore Structures  . . . . . . . . . . 498--500
              P. M. D. Gray and   
                   P. Esslemont   The performance of a relational
                                  interface to a Codasyl database  . . . . 501--507
                      Anonymous   The Wilkes Award 1984  . . . . . . . . . 507--507
                D. J. Flynn and   
               A. H. F. Laender   Mapping from a Conceptual Schema to a
                                  Target Internal Schema . . . . . . . . . 508--517
                      Anonymous   Conference . . . . . . . . . . . . . . . 517--517
             C. H. C. Leung and   
                   K. Wolfenden   Analysis and Optimisation of Data
                                  Currency and Consistency in Replicated
                                  Distributed Databases  . . . . . . . . . 518--523
       Michalis Hatzopoulos and   
                  J. G. Kollias   Towards the Optimal Secondary Index
                                  Organisation and Secondary Index
                                  Selection  . . . . . . . . . . . . . . . 524--529
                      Anonymous   Announcements  . . . . . . . . . . . . . 529--529
                  A. J. Compton   An algorithm for the even distribution
                                  of entities in one dimension . . . . . . 530--537
                       M. C. Er   Enumerating Ordered Trees
                                  Lexicographically  . . . . . . . . . . . 538--542
                    R. J. Heard   Correspondence . . . . . . . . . . . . . 543--543
                       M. C. Er   Correspondence . . . . . . . . . . . . . 543--544
                      Anonymous   Announcement . . . . . . . . . . . . . . 544--544


The Computer Journal
Volume ??, Number ??, August, 1985

                  James Bradley   Use of Mean Distance between Overflow
                                  Records to Compute Average Search
                                  Lengths in Hash files with Open
                                  Addressing . . . . . . . . . . . . . . . ??


The Computer Journal
Volume 29, Number 1, February, 1986

                M. Anderson and   
                 R. D. Pose and   
                  C. S. Wallace   A Password-Capability System . . . . . . 1--8
             M. H. Williams and   
                     J. Riddall   The Segregation of Incompatible Duties   9--11
                     R. K. Ward   Parity Check Codes for Logic Processors  12--16
                      N. Y. Foo   Dewey Indexing of Prolog Traces  . . . . 17--19
                  A. Hutchinson   Some Practical Principles for Design of
                                  Maintainable Systems . . . . . . . . . . 20--23
            J. Fucík and   
                 J. Král   The Hierarchy of Program Control
                                  Structures . . . . . . . . . . . . . . . 24--32
                  Tadao Takaoka   The Semantics of New While Loop  . . . . 33--35
                  H. M. Mahmoud   The Expected Distribution of Degrees in
                                  Random Binary Search Trees . . . . . . . 36--37
             K. G. Kulkarni and   
                 M. P. Atkinson   EFDM: Extended Functional Data Model . . 38--46
                M. A. Bassiouni   System and Program Models of Storage
                                  Allocation for Reducing Seek Delay . . . 47--51
                   F. Suraweera   Use of Doubly Chained Tree Structures in
                                  File Organisation for Optimal Searching  52--59
                  I. P. Stewart   Quadtrees: Storage and Scan Conversion   60--75
            H. Edelsbrunner and   
                  G. Haring and   
                  David Hilbert   Rectangular Point Location in ${D}$
                                  Dimensions with Applications . . . . . . 76--82
                      L. Capper   A philosophy for the teaching of
                                  computer science and information
                                  technology . . . . . . . . . . . . . . . 83--89
             M. P. Georgeff and   
                    G. K. Gupta   Resources Needed for a University
                                  Computer Science Department  . . . . . . 90--95

The Computer Journal
Volume 29, Number 2, April, 1986

          A. P. Jagodzinski and   
                   D. D. Clarke   A review of methods for measuring and
                                  describing users' attitudes as an
                                  essential constituent of systems
                                  analysis and design  . . . . . . . . . . 97--102
                  J. Jarosz and   
               J. R. Jaworowski   Computer Tree --- the Power of Parallel
                                  Computations . . . . . . . . . . . . . . 103--108
                   N. Natarajan   A distributed synchronisation scheme for
                                  communicating processes  . . . . . . . . 109--117
        K. Viswanathan Iyer and   
                  L. M. Patnaik   Performance Study of a Centralized
                                  Concurrency Control Algorithm for
                                  Distributed Database Systems Using
                                  Simula . . . . . . . . . . . . . . . . . 118--126
               N. M. Pitman and   
               F. W. Burton and   
                   E. W. Haddon   Buddy Systems with Selective Splitting   127--134
                  A. Hutchinson   A data structure and algorithm for a
                                  self-augmenting heuristic program  . . . 135--150
                    D. Ince and   
                     M. Woodman   The Rapid Generation of a Class of
                                  Software Tools . . . . . . . . . . . . . 151--160
             J. T. Boardman and   
                G. C. A. Robson   Towards a Problem-Solving Methodology
                                  for Coping with Increasing Complexity:
                                  an Engineering Approach  . . . . . . . . 161--166
                     J. Bradley   Use of Mean Distance Between Overflow
                                  Records to Compute Average Search
                                  Lengths in Hash Files with Open
                                  Addressing . . . . . . . . . . . . . . . 167--170
                    J. M. Pallo   Enumerating, Ranking and Unranking
                                  Binary Trees . . . . . . . . . . . . . . 171--175
               F. D. Libera and   
                       F. Gosen   Using B-Trees to Solve Geographic Range
                                  Queries  . . . . . . . . . . . . . . . . 176--181
             J. T. Boardman and   
                 C. Garrett and   
                G. C. A. Robson   A Recursive Algorithm for the Optimal
                                  Solution of a Complex Allocation Problem
                                  Using a Dynamic Programming Formulation  182--186
                 J. S. Rohl and   
                   T. D. Gedeon   The Reve's Puzzle  . . . . . . . . . . . 187--188
                     T. Y. Chen   Dynamic Approach Towards Software
                                  Science  . . . . . . . . . . . . . . . . 189--189
                     T. Y. Chen   Short Note: a Dynamic Approach Towards
                                  Software Science . . . . . . . . . . . . 189--189
                  E. F. Ferraby   Correspondence . . . . . . . . . . . . . 190--190
                       M. Laver   Correspondence . . . . . . . . . . . . . 190--190
                     S. Mossige   Correspondence . . . . . . . . . . . . . 190--190

The Computer Journal
Volume 29, Number 3, June, 1986

                  Joan M. Smith   The implications of SGML for the
                                  preparation of scientific publications   193--200
                   H. Thimbleby   Experiences of `Literate Programming'
                                  Using Cweb (a Variant of Knuth's Web)    201--211
                 P. Ein-Dor and   
                       E. Segev   Attitudes, association and success of
                                  MIS: some empirical results from
                                  research in the context of a business
                                  game . . . . . . . . . . . . . . . . . . 212--221
            D. M. Episkopou and   
              A. T. Wood-Harper   Towards a framework to choose
                                  appropriate IS approaches  . . . . . . . 222--228
                J. P. Elloy and   
                        O. Roux   Electre: a Language for Control
                                  Structuring in Real Time . . . . . . . . 229--234
                    I. D. Craig   The Ariadne-1 blackboard system  . . . . 235--240
 George K. Papakonstantinou and   
                    John Kontos   Knowledge Representation with Attribute
                                  Grammars . . . . . . . . . . . . . . . . 241--245
             M. H. Williams and   
                        G. Chen   Translating Pascal for Execution on a
                                  Prolog-Based System  . . . . . . . . . . 246--252
                    R. T. House   Alternative Scope Rules for
                                  Block-Structured Languages . . . . . . . 253--260
                    E. Wong and   
                   W. B. Samson   The specification of a relational
                                  database (PRECI) as an abstract data
                                  type and its realisation in HOPE . . . . 261--268
               D. J. Taylor and   
                    J. P. Black   A Locally Correctable B-Tree
                                  Implementation . . . . . . . . . . . . . 269--276
                C. C. Chang and   
                   R. C. T. Lee   A Letter-oriented Minimal Perfect
                                  Hashing Scheme . . . . . . . . . . . . . 277--281
                G. W. Smith and   
             J. B. H. Du Boulay   The Generation of Cryptic Crossword
                                  Clues  . . . . . . . . . . . . . . . . . 282--284
                      Anonymous   Announcements  . . . . . . . . . . . . . 284--284
                     K. Brokate   Correspondence . . . . . . . . . . . . . 285--285
                   R. G. Elston   Correspondence . . . . . . . . . . . . . 285--286
                      Anonymous   Notices  . . . . . . . . . . . . . . . . 286--286

The Computer Journal
Volume 29, Number 4, August, 1986

            S. J. Mullender and   
                A. S. Tanenbaum   The Design of a Capability-Based
                                  Distributed Operating System . . . . . . 289--299
                     B. Randell   System Design and Structuring  . . . . . 300--306
                    R. G. Stone   On the Choice of Grammar and Parser for
                                  the Compact Analytical Encoding of
                                  Programs . . . . . . . . . . . . . . . . 307--314
                P. A. Luker and   
                       A. Burns   Program Generators and Generation
                                  Software . . . . . . . . . . . . . . . . 315--321
                 G. Cantone and   
                A. Cimitile and   
                  U. De Carlini   Well-formed Conversion of Unstructured
                                  One-in/one-out Schemes for Complexity
                                  Measurement and Program Maintenance  . . 322--329
               N. E. Fenton and   
                   R. W. Whitty   Axiomatic Approach to Software
                                  Metrication Through Program
                                  Decomposition  . . . . . . . . . . . . . 330--339
                S. J. Young and   
                     C. Proctor   UFL: an Experimental Frame Language
                                  Based on Abstract Data Types . . . . . . 340--347
                      Anonymous   Announcement . . . . . . . . . . . . . . 347--347
                 P. Feldman and   
                      D. Miller   Entity Model Clustering: Structuring a
                                  Data Model by Abstraction  . . . . . . . 348--360
                      Anonymous   Announcements  . . . . . . . . . . . . . 360--360
                      J. Carden   The structural stability of corporate
                                  and devolved databases . . . . . . . . . 361--367
            Y. Manolopoulos and   
              J. G. Kollias and   
                 M. Hatzopoulos   Sequential Vs. Binary Batched Searching  368--372
              N. E. Wiseman and   
                    S. Nedunuri   Computing Random Fields  . . . . . . . . 373--377
                     J. Bradley   Short Notes: Join Dependencies in
                                  Relational Databases and the Geometry of
                                  Spatial Grids  . . . . . . . . . . . . . 378--379
                  James Bradley   Join Dependencies in Relational
                                  Databases and the Geometry of Spatial
                                  Grids  . . . . . . . . . . . . . . . . . 378--380
                 D. C. Ince and   
                  S. Hekmatpour   Empirical Evaluation of Random Testing   380--380
                 D. C. Ince and   
                  S. Hekmatpour   Short Notes: an Empirical Evaluation of
                                  Random Testing . . . . . . . . . . . . . 380--380
                    R. J. Heard   Correspondence . . . . . . . . . . . . . 381--381
                     R. M. Baer   Correspondence . . . . . . . . . . . . . 381--382
                     Y. H. Tsin   Correspondence . . . . . . . . . . . . . 382--382

The Computer Journal
Volume 29, Number 5, October, 1986

                      N. Rushby   A knowledge engineering approach to
                                  instructional design . . . . . . . . . . 385--389
                  M. Joseph and   
                      P. Pandya   Finding Response Times in a Real-Time
                                  System . . . . . . . . . . . . . . . . . 390--395
                J. P. Penny and   
               P. J. Ashton and   
                A. L. Wilkinson   Data Recording and Monitoring for
                                  Analysis of System Response Times  . . . 396--403
               H. Barringer and   
                      I. Mearns   A proof system for Ada tasks . . . . . . 404--415
                   J. M. Foster   Validating Microcode Algebraically . . . 416--422
              R. D. Dowsing and   
                     R. Elliott   Programming a Bounded Buffer Using the
                                  Object and Path Expression Constructs of
                                  Path Pascal  . . . . . . . . . . . . . . 423--429
                       M. C. Er   The use of termination indicators in
                                  computer programming . . . . . . . . . . 430--433
                  A. D. Woodall   Techniques of Program Design . . . . . . 434--435
                 W. C. Chen and   
                   J. S. Vitter   Deletion Algorithms for Coalesced
                                  Hashing  . . . . . . . . . . . . . . . . 436--450
                S. Pramanik and   
                     F. Fotouhi   Index Database Machine . . . . . . . . . 451--457
                     S. Jajodia   Recognizing Multivalued Dependencies in
                                  Relation Schemas . . . . . . . . . . . . 458--459
                   A. Blair and   
                 I. Sommerville   DSA --- a Tool for Descriptive Text
                                  Analysis . . . . . . . . . . . . . . . . 460--466
                     M. Rom and   
                     S. Bergman   A new technique for automatic contouring
                                  and contour representation from
                                  machine-readable spatial data  . . . . . 467--471
                F. Fabbrini and   
                     C. Montani   Autumnal Quadtrees . . . . . . . . . . . 472--474
                     B. Shackel   IBM Makes Usability as Important as
                                  Functionality  . . . . . . . . . . . . . 475--476
                   J. M. Wilson   Short Note: a Weighted Mark-Scaling
                                  Algorithm  . . . . . . . . . . . . . . . 477--477
                   J. M. Wilson   A weighted mark-scaling algorithm  . . . 477--477
                      D. Du Feu   Correspondence . . . . . . . . . . . . . 478--478
                   W. F. Lunnon   Correspondence . . . . . . . . . . . . . 478--478

The Computer Journal
Volume 29, Number 6, December, 1986

           C. J. Van Rijsbergen   A Non-Classical Logic for Information
                                  Retrieval  . . . . . . . . . . . . . . . 481--485
                      R. M. Lea   VLSI and WSI Associative String
                                  Processors for Cost-Effective Parallel
                                  Processing . . . . . . . . . . . . . . . 486--494
                 W. F. Clocksin   Automatic Specialisation of Standard
                                  Designs  . . . . . . . . . . . . . . . . 495--499
           M. Elizabeth C. Hull   Implementations of the CSP Notation for
                                  Concurrent Systems . . . . . . . . . . . 500--505
              L. M. Patnaik and   
                     Julie Basu   Two Tools for Interprocess Communication
                                  in Distributed Data-Flow Systems . . . . 506--521
               R. R. Levary and   
                  W. D. Edwards   Analysing the Impact of Adding a New
                                  Software System on Main Memory Usage . . 522--526
                  D. Mackay and   
                    G. Ball and   
                   M. Crowe and   
                  M. Hughes and   
                 D. Jenkins and   
                       C. Nicol   A UNIX-based system for software
                                  configuration management . . . . . . . . 527--530
                  P. Pandya and   
                      M. Joseph   A structure-directed total correctness
                                  proof rule for recursive procedure calls 531--537
                  A. J. Cowling   Type Checking in Polymorphic Languages   538--544
                       P. Leith   Fundamental Errors in Legal Logic
                                  Programming  . . . . . . . . . . . . . . 545--552
                  M. Ancona and   
             L. De Floriani and   
                   J. S. Deogun   Path Problems in Structured Graphs . . . 553--563
            K. J. MacCallum and   
                    J.-M. Zhang   Curve-Smoothing Techniques Using
                                  B-Splines  . . . . . . . . . . . . . . . 564--571
                    R. A. Frost   Short Notes: Improving output from
                                  research (in the domain of knowledge
                                  base systems)  . . . . . . . . . . . . . 572--573
                       V. Akman   Short Notes: Writing Self-replicating
                                  Code . . . . . . . . . . . . . . . . . . 573--574
               C. M. Castle and   
              M. L. V. Pitteway   Correspondence . . . . . . . . . . . . . 574--574


The Computer Journal
Volume 30, Number 1, 1987

                     Leslie Fox   Obituary: Dr. J. H. Wilkinson, F.R.S.    1--1
                  D. Benyon and   
                    S. Skidmore   Towards a Tool Kit for the Systems
                                  Analyst  . . . . . . . . . . . . . . . . 2--7
                H. K. Klein and   
               R. A. Hirschheim   A comparative framework of data
                                  modelling paradigms and approaches . . . 8--15
                  R. H. Gallard   An extension in the definition of a
                                  Petri net execution  . . . . . . . . . . 16--19
                 S. Tsutsui and   
                    Y. Fujimoto   Deadlock Prevention in Process Control
                                  Computer Systems . . . . . . . . . . . . 20--26
            R. C. Backhouse and   
                  A. A. Khamiss   A While-rule in Martin-Löf's Theory of
                                  Types  . . . . . . . . . . . . . . . . . 27--36
                A. G. Middleton   Some Transformations of Relevance to
                                  Report Generation  . . . . . . . . . . . 37--42
                     G. Oulsnam   The algorithmic transformation of
                                  schemas to structured form . . . . . . . 43--51
            J. A. W. Faidhi and   
                 S. K. Robinson   Programmer Experience Level Indicators   52--62
                     D. C. Ince   The Automatic Generation of Test Data    63--69
                     J. S. Rohl   Towers of Hanoi: the Derivation of Some
                                  Iterative Versions . . . . . . . . . . . 70--76
                  P. M. Fenwick   A Fast-Carry Adder with CMOS
                                  Transmission Gates . . . . . . . . . . . 77--79
                       T. Raita   An Automatic System for File Compression 80--86
                     A. J. Cole   Compaction Techniques for Raster Scan
                                  Graphics Using Space-Filling Curves  . . 87--92
                      Anonymous   Announcements  . . . . . . . . . . . . . 93--93
                     J. Rosenne   Correspondence . . . . . . . . . . . . . 93--93

The Computer Journal
Volume 30, Number 2, April, 1987

              A. Verrijn-Stuart   Themes and Trends in Information
                                  Systems: TC8, 1975--1985 . . . . . . . . 97--109
                      Anonymous   Announcement . . . . . . . . . . . . . . 109--109
            L. M. Mackenzie and   
              A. M. Macleod and   
                    D. J. Berry   A multiple microprocessor system for
                                  CPU-bound calculations . . . . . . . . . 110--118
                      Anonymous   Announcements  . . . . . . . . . . . . . 118--118
               I. A. Newman and   
             R. P. Stallard and   
                 M. C. Woodward   A hybrid multiple processor garbage
                                  collection algorithm . . . . . . . . . . 119--127
             I. Sommerville and   
                 R. Welland and   
                        S. Beer   Describing Software Design Methodologies 128--133
                   H. Barringer   Up and Down the Temporal Way . . . . . . 134--148
                J. A. Llewellyn   Data Compression for a Source with
                                  Markov Characteristics . . . . . . . . . 149--156
                 S. M. Deen and   
                 R. R. Amin and   
                   M. C. Taylor   Implementation of a prototype for PRECI* 157--162
                S. Nedunuri and   
                  N. E. Wiseman   Displaying Random Surfaces . . . . . . . 163--167
            C. M. A. Castle and   
              M. L. V. Pitteway   An efficient structural technique for
                                  encoding `best-fit' straight lines . . . 168--175
            A. Unnikrishnan and   
            Y. V. Venkatesh and   
                  Priti Shankar   Connected Component Labelling Using
                                  Quadtrees --- a Bottom-Up Approach . . . 176--182
                     H. Berghel   Crossword Compilation with Horn Clauses  183--188
                 M. J. Jamieson   Short Note: a Note on the Convergence of
                                  an Iterative Scheme for Solving a
                                  Quadratic Equation . . . . . . . . . . . 189--190
                   A. V. Bowker   Correspondence . . . . . . . . . . . . . 191--191
              H. R. A. Townsend   Correspondence . . . . . . . . . . . . . 191--191

The Computer Journal
Volume 30, Number 3, June, 1987

                G. S. Blair and   
              J. A. Mariani and   
                J. R. Nicol and   
                    D. Shepherd   A Knowledge-based Operating System . . . 193--200
                   C. M. Reeves   Chainmail: a Model of First-Fit Memory
                                  Allocation . . . . . . . . . . . . . . . 201--213
               P. C. Burkimsher   Combinator Reduction in a Shared-Memory
                                  Multiprocessor . . . . . . . . . . . . . 214--222
              N. S. Coulter and   
               R. B. Cooper and   
                  M. K. Solomon   Information-theoretic Complexity of
                                  Program Specifications . . . . . . . . . 223--227
               K. A. Redish and   
                    W. F. Smyth   Evaluating Measures of Program Quality   228--232
                 J. K. Navlakha   A Survey of System Complexity Metrics    233--238
                        D. Gray   A Pedagogical Verification Condition
                                  Generator  . . . . . . . . . . . . . . . 239--248
                      Anonymous   Announcement . . . . . . . . . . . . . . 248--248
                    C. C. Chang   An Information Protection Scheme Based
                                  Upon Number Theory . . . . . . . . . . . 249--253
                      Anonymous   Announcement . . . . . . . . . . . . . . 253--253
                      B. Teufel   System design for the remote execution
                                  of library routines  . . . . . . . . . . 254--257
                  C.-L. Wey and   
                    F. Lombardi   On a Novel Self-test Approach to Digital
                                  Testing  . . . . . . . . . . . . . . . . 258--267
                      Anonymous   Announcement . . . . . . . . . . . . . . 267--267
                 J. C. Nash and   
                      S. Shlien   Simple Algorithms for the Partial
                                  Singular Value Decomposition . . . . . . 268--275
                      Anonymous   Announcement . . . . . . . . . . . . . . 275--275
                      Anonymous   Algorithm Supplement . . . . . . . . . . 276--276
                    S. Wade and   
                  J. Henstridge   Note on Algorithm 117: Buffered output
                                  in FORTRAN . . . . . . . . . . . . . . . 276--276
                 B. A. Wichmann   Note on Algorithm 121: RSA key
                                  calculation in Ada . . . . . . . . . . . 276--276
                 I. D. Hill and   
             B. A. Wichmann and   
                  D. R. Woodall   Algorithm 123: Single transferable vote
                                  by Meek's method . . . . . . . . . . . . 277--281
                       M. C. Er   An efficient implementation of
                                  permutation backtracking in
                                  lexicographic order  . . . . . . . . . . 282--282
                       M. C. Er   Short Note: an Efficient Implementation
                                  of Permutation Backtracking in
                                  Lexicographic Order  . . . . . . . . . . 282--282
                     D. Salomon   Short Note: a Design for an Efficient
                                  NOR-gate only, Binary-ripple Adder with
                                  Carry-completion-detection Logic . . . . 283--285
                R. Kowalski and   
                      M. Sergot   Correspondence . . . . . . . . . . . . . 285--285
                 T. J. Froggatt   Correspondence . . . . . . . . . . . . . 285--286
                      Anonymous   Announcements  . . . . . . . . . . . . . 286--286

The Computer Journal
Volume 30, Number 4, August, 1987

                        M. Sowa   A method for speeding up serial
                                  processing in dataflow computers by
                                  means of a program counter . . . . . . . 289--294
                  C. S. Kecskes   A simple method for building up large
                                  computer systems from small computers    295--297
             J. Van Leeuwen and   
                      R. B. Tan   Interval Routing . . . . . . . . . . . . 298--307
              D. J. Challab and   
                  J. D. Roberts   Buddy Algorithms . . . . . . . . . . . . 308--315
                 D. A. Duce and   
              E. V. C. Fielding   Formal Specification --- a Comparison of
                                  Two Techniques . . . . . . . . . . . . . 316--327
          Cristina Sernadas and   
             R. Carapuça   The role of conceptual modelling
                                  abstractions in compiler development . . 328--336
                       P. Leith   A programmed, skeleton formal
                                  specification method: the OUFDM  . . . . 337--342
                   J. K. Mullin   Accessing textual documents using
                                  compressed indexes of arrays of small
                                  Bloom filters  . . . . . . . . . . . . . 343--348
                P. A. Firby and   
                    D. J. Stone   Colour Manipulation of Superposed
                                  Families of Curves . . . . . . . . . . . 349--354
               F. W. Burton and   
              V. J. Kollias and   
                  J. G. Kollias   A general PASCAL program for map overlay
                                  of quadtrees and related problems  . . . 355--361
                  A. I. Verkamo   Performance of Quicksort Adapted for
                                  Virtual Memory Use . . . . . . . . . . . 362--371
           S. Dvorák and   
                      B. Durian   Stable Linear Time Sublinear Space
                                  Merging  . . . . . . . . . . . . . . . . 372--375
                   D. Gault and   
                       M. Clint   Short Notes: a Fast Algorithm for the
                                  Towers of Hanoi Problem  . . . . . . . . 376--378
                      T. H. Tse   Short Notes: Towards a Single Criterion
                                  for Identifying Program
                                  Unstructuredness*  . . . . . . . . . . . 378--380

The Computer Journal
Volume 30, Number 5, October, 1987

                      Anonymous   Editorial  . . . . . . . . . . . . . . . 385--385
                 W. F. Clocksin   Principles of the Delphi Parallel
                                  Inference Machine  . . . . . . . . . . . 386--392
                      Anonymous   Announcement . . . . . . . . . . . . . . 392--392
                  P. Kacsuk and   
                        A. Bale   DAP Prolog: a Set-Oriented Approach to
                                  Prolog . . . . . . . . . . . . . . . . . 393--403
                D. McGregor and   
                 S. McInnes and   
                     M. Henning   An architecture for associative
                                  processing of large knowledge bases
                                  (LKBs) . . . . . . . . . . . . . . . . . 404--412
              B. M. Forrest and   
                  D. Roweth and   
                  N. Stroud and   
              D. J. Wallace and   
                   G. V. Wilson   Implementing Neural Network Models on
                                  Parallel Computers . . . . . . . . . . . 413--419
           A. F. W. Coulson and   
              J. F. Collins and   
                       A. Lyall   Protein and Nucleic Acid Sequence
                                  Database Searching: a Suitable Case for
                                  Parallel Processing  . . . . . . . . . . 420--424
              H. R. Arabnia and   
                   M. A. Oliver   A transputer network for the arbitrary
                                  rotation of digitised images . . . . . . 425--432
                      S. G. Akl   Adaptive and Optimal Parallel Algorithms
                                  for Enumerating Permutations and
                                  Combinations . . . . . . . . . . . . . . 433--436
                   F. W. Burton   Functional programming for concurrent
                                  and distributed computing  . . . . . . . 437--450
               J. M. Foster and   
                   I. F. Currie   Remote Capabilities  . . . . . . . . . . 451--457
                       A. Segev   Optimising Two-Way Joins in Horizontally
                                  Partitioned Database Systems . . . . . . 458--468
                 D. Godfrey and   
                    S. Gong and   
                    R. Hart and   
                N. Koorland and   
                        S. Smit   Project `Clear Skies': teaching computer
                                  science by computer based training and
                                  electronic messaging in China  . . . . . 469--474
                   H. Thimbleby   Optimising Self-Replicating Programs . . 475--476
                      Anonymous   Announcements  . . . . . . . . . . . . . 477--479

The Computer Journal
Volume 30, Number 6, December, 1987

               P. J. Mayhew and   
                 P. A. Dearnley   An Alternative Prototyping
                                  Classification . . . . . . . . . . . . . 481--484
                 M. Ramshaw and   
              A. P. Steward and   
                      D. Stoves   An intelligent retrieval and
                                  presentation system for management
                                  information  . . . . . . . . . . . . . . 485--486
                 Julie Basu and   
              L. M. Patnaik and   
                  A. K. Goswami   Ordered Ports --- a language concept for
                                  high-level distributed programming . . . 487--497
            J. C. M. Baeten and   
             J. A. Bergstra and   
                     J. W. Klop   Ready-Trace Semantics for Concrete
                                  Process Algebra with the Priority
                                  Operator . . . . . . . . . . . . . . . . 498--506
                      T. H. Tse   The Identification of Program
                                  Unstructuredness: a Formal Approach  . . 507--511
                   R. G. Dromey   Derivation of Sorting Algorithms from a
                                  Specification  . . . . . . . . . . . . . 512--518
                  Elisa Bertino   An evaluation of precompilation and
                                  interpretation in distributed database
                                  management systems . . . . . . . . . . . 519--528
            Y. Manolopoulos and   
              D. Kleftouris and   
                      L. Petrou   A model for an ISAM file with multiple
                                  overflow chains  . . . . . . . . . . . . 529--534
                C. C. Chang and   
                     C. Y. Chen   Performance Analysis of the Generalised
                                  Disc Modulo Allocation Method for
                                  Multiple Key Hashing Files on Multi-Disc
                                  Systems  . . . . . . . . . . . . . . . . 535--540
              G. V. Cormack and   
              R. N. S. Horspool   Data Compression Using Dynamic Markov
                                  Modelling  . . . . . . . . . . . . . . . 541--550
                 G. M. Gwei and   
                      E. Foxley   A flexible synonym interface with
                                  application examples in CAL and help
                                  environments . . . . . . . . . . . . . . 551--557
                  J. Parker and   
                 A. Kennard and   
                        D. King   The `Window' Terminal  . . . . . . . . . 558--564
         Y. P. Manolopoulos and   
         J. (Y.) G. Kollias and   
               F. Warren Burton   Batched Interpolation Search . . . . . . 565--568
                       M. C. Er   Lexicographic Listing and Ranking of
                                  ${T}$-Ary Trees  . . . . . . . . . . . . 569--572
                      Anonymous   Announcements  . . . . . . . . . . . . . 573--575


The Computer Journal
Volume 31, Number 1, February, 1988

                H. T. Jankowitz   Detecting Plagiarism in Student Pascal
                                  Programs . . . . . . . . . . . . . . . . 1--8
                     L. Allison   Some Applications of Continuations . . . 9--11
                   M. Razaz and   
              J. L. Schonfelder   Test Procedures for Measurement of
                                  Floating-Point Characteristics of
                                  Computing Environments . . . . . . . . . 12--16
               Martin Davis and   
                 Elaine Weyuker   Metric Space-Based Test-Data Adequacy
                                  Criteria . . . . . . . . . . . . . . . . 17--24
                   R. A. Clarke   Judicial understanding of information
                                  technology: the case of the Wombat ROMs  25--33
                 C. Egyhazy and   
                    K. Triantis   A query processing algorithm for
                                  distributed relational database systems  34--40
                   W. Kiessling   Access Path Selection in Databases with
                                  Intelligent Disc Subsystems  . . . . . . 41--50
             L. J. Henschen and   
                    B. P. Weems   A top-down inference procedure for
                                  template dependencies  . . . . . . . . . 51--55
             W. R. Franklin and   
                       V. Akman   Adaptive Grid for Polyhedral Visibility
                                  in Object Space: an Implementation . . . 56--60
                       M. C. Er   A Simple Algorithm for Generating
                                  Non-Regular Trees in Lexicographic Order 61--64
           I. Stojmenovi\'c and   
                    M. Miyakawa   Applications of a Subset-Generating
                                  Algorithm to Base Enumeration, Knapsack
                                  and Minimal Covering Problems  . . . . . 65--70
               Mirka Miller and   
                        I. Fris   Minimum diameter of diregular digraphs
                                  of degree $2$  . . . . . . . . . . . . . 71--75
                    S. M. Selim   Split Vertices in Vertex Colouring and
                                  Their Application in Developing a
                                  Solution to the Faculty Timetable
                                  Problem  . . . . . . . . . . . . . . . . 76--82
               G. M. Megson and   
                    D. J. Evans   The Unification of Systolic Differencing
                                  Algorithms . . . . . . . . . . . . . . . 83--91
                  M. H. Hubbard   Correspondence . . . . . . . . . . . . . 92--92
                       P. Leith   Correspondence . . . . . . . . . . . . . 92--93
                      Anonymous   Announcements  . . . . . . . . . . . . . 93--96
                      Anonymous   Notice . . . . . . . . . . . . . . . . . 96--96

The Computer Journal
Volume 31, Number 2, April, 1988

                M. Atkinson and   
                 P. Buneman and   
                    R. Morrison   Binding and Type Checking in Database
                                  Programming Languages  . . . . . . . . . 99--109
               D. S. Moffat and   
                  P. M. D. Gray   Perlog: a Prolog with Persistence and
                                  Modules  . . . . . . . . . . . . . . . . 110--115
                Liping Zhao and   
                  S. A. Roberts   An object-oriented data model for
                                  database modelling, implementation and
                                  access . . . . . . . . . . . . . . . . . 116--124
                    Carol Small   The implementation of the Exegesis
                                  system . . . . . . . . . . . . . . . . . 125--132
             M. H. Williams and   
                K. A. Nicholson   An approach to handling incomplete
                                  information in databases . . . . . . . . 133--140
                      Anonymous   Announcement . . . . . . . . . . . . . . 140--140
                     J. Bradley   Polygon Join Dependencies, Closed
                                  Co-Relationship Chains and the
                                  Connection Trap in Relational Databases  141--146
                  J. R. Ullmann   Fast Implementation of Relational
                                  Operations via Inverse Projections . . . 147--154
                      Anonymous   Announcements  . . . . . . . . . . . . . 154--154
            M. M. Owrang O. and   
                   L. L. Miller   Query Translation Based on Hypergraph
                                  Models . . . . . . . . . . . . . . . . . 155--164
                      Anonymous   Announcement . . . . . . . . . . . . . . 164--164
              F. B. Bastani and   
              S. S. Iyengar and   
                     I-Ling Yen   Concurrent Maintenance of Data
                                  Structures in a Distributed Environment  165--174
                      Anonymous   Announcements  . . . . . . . . . . . . . 174--174
                 S. M. Deen and   
               M. C. Taylor and   
               P. A. Ingram and   
                   K. W. Rayner   A distributed directory database system
                                  for telecommunications . . . . . . . . . 175--181
                 Kathleen Spurr   A data dictionary approach to teaching
                                  information systems analysis . . . . . . 182--189
                      Anonymous   Announcements  . . . . . . . . . . . . . 189--189
                      Anonymous   Announcement . . . . . . . . . . . . . . 190--190
                     K. Brokate   Correspondence . . . . . . . . . . . . . 190--190
                     K. Brokate   Correspondence . . . . . . . . . . . . . 190--190
                     J. S. Rohl   Correspondence . . . . . . . . . . . . . 190--190

The Computer Journal
Volume 31, Number 3, June, 1988

                  D. Morris and   
              C. J. Theaker and   
                P. B. Whitehead   Structured Abstract Schematics . . . . . 193--200
                      Anonymous   Announcement . . . . . . . . . . . . . . 200--200
                    F. Lombardi   Analysis of Comparison-Based Diagnosable
                                  Systems Using Temporal Criteria  . . . . 201--208
                      Anonymous   Announcements  . . . . . . . . . . . . . 208--208
          M. Gopalakrishnan and   
                  L. M. Patnaik   Medium Access Control Schemes for Local
                                  Area Networks with Multiple Priority
                                  Function . . . . . . . . . . . . . . . . 209--219
                 R. E. Griswold   Programming with Generators  . . . . . . 220--228
             P. G. Harrison and   
                H. Khoshnevisan   Algebraic Transformation Techniques for
                                  Functional Languages . . . . . . . . . . 229--242
                      Anonymous   Announcements  . . . . . . . . . . . . . 242--242
                   F. W. Burton   Nondeterminism with Referential
                                  Transparency in Functional Programming
                                  Languages  . . . . . . . . . . . . . . . 243--247
                  R. E. Prather   Comparison and Extension of Theories of
                                  Zipf and Halstead  . . . . . . . . . . . 248--252
                 D. A. Bell and   
             F. J. McErlean and   
              P. M. Stewart and   
                    W. Arbuckle   Clustering Related Tuples in Databases   253--257
          Kathryn S. Dawson and   
   Lorraine M. Purgailis Parker   From Entity-relationship Diagrams to
                                  Fourth Normal Form: a Pictorial Aid to
                                  Analysis . . . . . . . . . . . . . . . . 258--268
            T. P. van der Weide   Iterative Tree Traversal Using
                                  Refinements and Pointer Rotation . . . . 269--275
                      Anonymous   Announcements  . . . . . . . . . . . . . 275--275
                    D. Richards   On the Worst-Possible Analysis of
                                  Weighted Comparison-Based Algorithms . . 276--278
           S. Dvorák and   
                      B. Durian   Unstable Linear Time O(1) Space Merging  279--282
                       M. C. Er   A Fast Algorithm for Generating Set
                                  Partitions . . . . . . . . . . . . . . . 283--284
                 K. Subieta and   
                  K. Anacki and   
                     M. Missala   Short Note: Overlay clusters for C
                                  programs . . . . . . . . . . . . . . . . 285--286
                 M. J. Jamieson   Correspondence . . . . . . . . . . . . . 286--286
                      Anonymous   Announcements  . . . . . . . . . . . . . 286--287

The Computer Journal
Volume 31, Number 4, August, 1988

        J.-M. Hélary and   
                N. Plouzeau and   
                      M. Raynal   A Distributed Algorithm for Mutual
                                  Exclusion in an Arbitrary Network  . . . 289--295
                     G. P. Parr   Enhanced Address Resolution in a
                                  Multi-LAN Ethernet Communications System 296--303
                    M. Zaki and   
                 M. M. Elboraey   Analysis of Reliability Models for
                                  Interconnecting MIMD Systems . . . . . . 304--312
                      Anonymous   Announcements  . . . . . . . . . . . . . 312--312
                  W. T. Roberts   A Formal Specification of the QMC
                                  Message System: the Underlying Abstract
                                  Model  . . . . . . . . . . . . . . . . . 313--324
                    Z. Fang and   
                   J. S. Deogun   Closure Properties of Certain Classes of
                                  Languages Under Generalized Morphic
                                  Replication  . . . . . . . . . . . . . . 325--329
                      P. Sipala   Efficient Implementation of Binary Trees
                                  in LISP Systems  . . . . . . . . . . . . 330--335
                       L. Orman   Functional Database Constraints  . . . . 336--343
                O. C. Akinyokun   The experimental study of CODASYL
                                  database/administration at the secondary
                                  storage level  . . . . . . . . . . . . . 344--352
                  C. Anedda and   
                    L. Felician   $P$-Compressed Quadtress for Image
                                  Storing  . . . . . . . . . . . . . . . . 353--357
                      Anonymous   Announcements  . . . . . . . . . . . . . 357--357
                    R. Williams   The Goblin Quadtree  . . . . . . . . . . 358--363
                      Anonymous   Announcements  . . . . . . . . . . . . . 363--363
                   C. Lucas and   
                       G. Mitra   Computer-Assisted Mathematical
                                  Programming (Modelling) Systems: CAMPS   364--375
                     J. Mingers   Comparing Conceptual Models and Data
                                  Flow Diagrams  . . . . . . . . . . . . . 376--379
               D. E. Avison and   
              G. Fitzgerald and   
              A. T. Wood-Harper   Information systems development: a tool
                                  kit is not enough  . . . . . . . . . . . 379--380
                      Anonymous   Announcements  . . . . . . . . . . . . . 380a-382
                  R. T. O. Rees   Termination Indicators in Programming    380--380

The Computer Journal
Volume 31, Number 5, October, 1988

       N. Bjòrn-Andersen   Are `Human factors' Human? . . . . . . . 386--390
                P. N. Le Quesne   Individual and Organisational Factors
                                  and the Design of IPSEs  . . . . . . . . 391--397
              R. Hirschheim and   
                      M. Newman   Information systems and user resistance:
                                  theory and practice  . . . . . . . . . . 398--408
          A. P. Jagodzinski and   
                   D. D. Clarke   A multidimensional approach to the
                                  measurement of human-computer
                                  performance  . . . . . . . . . . . . . . 409--419
                   Susan Harker   The use of prototyping and simulation in
                                  the development of large-scale
                                  applications . . . . . . . . . . . . . . 420--425
                K. D. Eason and   
                   Susan Harker   The supplier's role in the design of
                                  products for organisations . . . . . . . 426--430
                D. A. Tyldesley   Employing usability engineering in the
                                  development of office products . . . . . 431--436
                  D. Morris and   
              C. J. Theaker and   
                R. Phillips and   
                        W. Love   Human-Computer Interface Recording . . . 437--444
                 P. Barnard and   
                  M. Wilson and   
                     A. Maclean   Approximate modelling of cognitive
                                  activity with an expert system: a
                                  theory-based strategy for developing an
                                  interactive design tool  . . . . . . . . 445--456
                  A. Dillon and   
                C. McKnight and   
                  J. Richardson   Reading from Paper versus Reading from
                                  Screen . . . . . . . . . . . . . . . . . 457--464
                  D. Benyon and   
                  Dianne Murray   Experience with Adaptive Interfaces  . . 465--473
                       J. Pachl   Short Note: Two Livelock-free Protocols
                                  for Slotted Rings  . . . . . . . . . . . 474--476
                      Anonymous   Announcements  . . . . . . . . . . . . . 476--476

The Computer Journal
Volume 31, Number 6, December, 1988

                    R. Maes and   
              J. E. M. Van Dijk   On the role of ambiguity and
                                  incompleteness in the design of decision
                                  tables and rule-based systems  . . . . . 481--489
                   P. Goyal and   
                T. S. Narayanan   Dictionary Machine with Improved
                                  Performance  . . . . . . . . . . . . . . 490--495
                    R. Cole and   
                 Clare Foxcroft   An Experiment in Clock Synchronisation   496--502
                      Anonymous   Announcement . . . . . . . . . . . . . . 502--502
                      G. O'Shea   Controlling the dependency of user
                                  access control mechanisms on correctness
                                  of user identification . . . . . . . . . 503--509
                  P. F. Gibbins   VDM: axiomatising its propositional
                                  logic  . . . . . . . . . . . . . . . . . 510--516
                      Anonymous   Announcement . . . . . . . . . . . . . . 516--516
                   M. C. Henson   Higher-order Transformations and Type
                                  Simulations  . . . . . . . . . . . . . . 517--524
                John Kontos and   
                 J. C. Cavouras   Knowledge acquisition from technical
                                  texts using attribute grammars . . . . . 525--530
                   P. A. Bailes   An advanced problem-oriented
                                  introduction to imperative programming
                                  with Modula-2  . . . . . . . . . . . . . 531--539
                  A. Dearle and   
                    A. L. Brown   Safe browsing in a strongly typed
                                  persistent environment . . . . . . . . . 540--544
                    Z. J. Czech   Efficient implementation of detection of
                                  undefined variables  . . . . . . . . . . 545--549
                 G. Guariso and   
                    H. Werthner   A Software Base for Environmental
                                  Studies  . . . . . . . . . . . . . . . . 550--552
         S. Dvo\vrák and   
                    B. \vDurian   Merging by Decomposition Revisited . . . 553--556
                       M. C. Er   A smooth reshuffling algorithm for
                                  solving the Bulterman's problem  . . . . 557--560
               F. Suraweera and   
                  J. M. Al-Anzy   Analysis of a modified address
                                  calculation sorting algorithm  . . . . . 561--563
                       J. Pallo   Short notes: Some Properties of the
                                  Rotation Lattice of Binary Trees . . . . 564--565
                C. C. Chang and   
                    C. Y. Cheng   Short notes: a Recursive Performance
                                  Formula of the Disc Modulo Allocation
                                  Method for Binary Cartesian Product
                                  Files  . . . . . . . . . . . . . . . . . 565--566
               G. M. Megson and   
                    D. J. Evans   Short notes: Improved Matrix Product
                                  Computation using Double-Pipeline
                                  Systolic Arrays  . . . . . . . . . . . . 567--569
         M. H. Rennhackkamp and   
                S. H. von Solms   Short notes: on using an Abstract Model
                                  of Distributed Database Concurrency
                                  Control Methods  . . . . . . . . . . . . 570--572


The Computer Journal
Volume 32, Number 1, February, 1989

                  T. H. Tse and   
                        L. Pong   Towards a formal foundation for DeMarco
                                  data flow diagrams . . . . . . . . . . . 1--12
                      Anonymous   Announcements  . . . . . . . . . . . . . 12--12
                    C. Mitchell   Multi-destination secure electronic mail 13--15
                      Anonymous   Announcement . . . . . . . . . . . . . . 15--15
                    T. Bell and   
                      A. Moffat   A note on the DMC data compression
                                  scheme . . . . . . . . . . . . . . . . . 16--20
                  S. Hekmatpour   A Window Manager for Unix  . . . . . . . 21--23
                      Anonymous   Announcement . . . . . . . . . . . . . . 23--23
              B. Freisleben and   
                    J. L. Keedy   Priority Semaphores  . . . . . . . . . . 24--28
                      Anonymous   Announcement . . . . . . . . . . . . . . 28--28
                 P. Corsini and   
                 G. Frosini and   
                    G. Speranza   The parallel interpretation of logic
                                  programs in distributed architectures    29--35
              B. Edupuganty and   
                   B. R. Bryant   Two-level Grammar as a Functional
                                  Programming Language . . . . . . . . . . 36--44
                 I. P. Page and   
                    R. T. Jacob   The solution of mutual exclusion
                                  problems which can be described
                                  graphically  . . . . . . . . . . . . . . 45--54
                      Anonymous   Announcement . . . . . . . . . . . . . . 54--54
                N. Parimala and   
                 N. Prakash and   
               B. L. N. Rao and   
                     N. Bolloju   A query facility to a network DBMS . . . 55--62
                  A. Hutchinson   Inheritance and kinds of slots . . . . . 63--67
               J. Culberson and   
                    J. I. Munro   Explaining the behaviour of binary
                                  search trees under prolonged updates: a
                                  model and simulations  . . . . . . . . . 68--75
                       M. C. Er   Classes of admissible permutations that
                                  are generatable by depth-first
                                  traversals of ordered trees  . . . . . . 76--85
                      Anonymous   Announcements  . . . . . . . . . . . . . 85--85
              A. R. Halbert and   
              S. J. P. Todd and   
                 J. R. Woodwark   Generalizing active zones for
                                  set-theoretic solid models . . . . . . . 86--89
                      Anonymous   Announcement . . . . . . . . . . . . . . 89--89
                   M. Negri and   
               G. Pelagatti and   
                   L. Sbattella   Short Notes: Semantics and Problems of
                                  Universal Quantification in SQL  . . . . 90--91
                  M. Sideri and   
               S. Efremidis and   
           G. Papa-Konstantinou   Short Notes: Semantically Driven Parsing
                                  of Context-free Languages  . . . . . . . 91--93
                 M. J. Jamieson   Short Notes: Rapidly Converging
                                  Iterative Formulae for Finding Square
                                  Roots and their Computational
                                  Efficiencies . . . . . . . . . . . . . . 93--94
                      Anonymous   Announcement . . . . . . . . . . . . . . 94--94
                      Anonymous   Announcement . . . . . . . . . . . . . . 95--95
                  D. J. Wheeler   Correspondence . . . . . . . . . . . . . 95--95

The Computer Journal
Volume 32, Number 2, 1989

                      P. Wadler   Editorial --- Lazy Functional
                                  Programming  . . . . . . . . . . . . . . 97--97
                      J. Hughes   Why Functional Programming Matters . . . 98--107
                   R. Frost and   
                  J. Launchbury   Constructing natural language
                                  interpreters in a lazy functional
                                  language . . . . . . . . . . . . . . . . 108--121
                     R. S. Bird   Algebraic Identities for Program
                                  Calculation  . . . . . . . . . . . . . . 122--126
              L. Augustsson and   
                    T. Johnsson   The Chalmers Lazy-ML Compiler  . . . . . 127--141
                 S. C. Wray and   
                   J. Fairbairn   Non-Strict Languages --- Programming and
                                  Implementation . . . . . . . . . . . . . 142--151
             Adrienne Bloss and   
                P. R. Hudak and   
                    J. H. Young   An optimising compiler for a modern
                                  functional language  . . . . . . . . . . 152--161
                S. B. Jones and   
                 A. F. Sinclair   Functional Programming and Operating
                                  Systems  . . . . . . . . . . . . . . . . 162--174
          Simon L. Peyton Jones   Parallel Implementations of Functional
                                  Programming Languages  . . . . . . . . . 175--186
                 Xue-Miao M. Lu   Short Note: an Iterative Solution for
                                  the $4$-peg Towers of Hanoi  . . . . . . 187--189

The Computer Journal
Volume 32, Number 3, 1989

                  P. Hammersley   Editorial --- Information and
                                  Information Systems  . . . . . . . . . . 193--193
                  K. P. Tan and   
                 T. S. Chua and   
                      P. T. Lee   AUTO-DFD: an intelligent data flow
                                  processor  . . . . . . . . . . . . . . . 194--201
                      Anonymous   Announcements  . . . . . . . . . . . . . 201--201
               A. N. Godwin and   
                 M. B. Gore and   
                     D. W. Salt   A comparison of JSD and DFD as
                                  descriptive tools  . . . . . . . . . . . 202--211
                      Anonymous   Announcements  . . . . . . . . . . . . . 211--211
             M. A. Shepherd and   
             W. J. Phillips and   
                      C.-K. Chu   A Fixed-Size Bloom Filter for Searching
                                  Textual Documents  . . . . . . . . . . . 212--219
                      Anonymous   Announcements  . . . . . . . . . . . . . 219--219
            A. El-Hamdouchi and   
                     P. Willett   Comparison of hierarchic agglomerative
                                  clustering methods for document
                                  retrieval  . . . . . . . . . . . . . . . 220--227
              J. Katajainen and   
                       T. Raita   An approximation algorithm for
                                  space-optimal encoding of a text . . . . 228--237
                E. Mäkinen   On implementing two adaptive
                                  data-compression schemes . . . . . . . . 238--240
                   K. W. Yu and   
                       T. L. Yu   Data encryption based upon time reversal
                                  transformations  . . . . . . . . . . . . 241--245
                  M. Rahman and   
                 S. Misbahuddin   Effect of a binary symmetric channel on
                                  the synchronisation recovery of variable
                                  length codes . . . . . . . . . . . . . . 246--251
                 L. H. Ngoh and   
                  T. P. Hopkins   Transport Protocol Requirements for
                                  Distributed Multimedia Information
                                  Systems  . . . . . . . . . . . . . . . . 252--261
                      Anonymous   Announcement . . . . . . . . . . . . . . 261--261
                 G. G. Scarrott   The Nature of Information  . . . . . . . 262--266
                      Anonymous   Announcements  . . . . . . . . . . . . . 266--266
                 A. Schiper and   
                   R. Simon and   
              Ph. Desarzens and   
                 J.-A. Sengstag   Efficient Implementation of Rendezvous   267--272
                   J. M. Wilson   Crossword Compilation Using Integer
                                  Programming  . . . . . . . . . . . . . . 273--275
                 H. Berghel and   
                          C. Yi   Crossword Compiler-Compilation . . . . . 276--280
                B. Djoki\'c and   
                M. Miyakawa and   
               S. Sekiguchi and   
                   I. Semba and   
               I. Stojmenovi\'c   Short Note: a Fast Iterative Algorithm
                                  for Generating Set Partitions  . . . . . 281--282
                 N. Apostolatos   Correspondence . . . . . . . . . . . . . 282--282
                  F. Ruskey and   
          D. R. van Baronaigien   Correspondence . . . . . . . . . . . . . 282--283

The Computer Journal
Volume 32, Number 4, 1989

                        S. Cook   Editorial --- Object-Oriented Systems    289--289
                  P. M. Yelland   First steps towards fully abstract
                                  semantics for object-oriented languages  290--296
               D. G. Kafura and   
                      K. H. Lee   Inheritance in actor based concurrent
                                  object-oriented languages  . . . . . . . 297--304
                      Anonymous   Announcement . . . . . . . . . . . . . . 304--304
                     W. R. Cook   A proposal for making Eiffel type-safe   305--311
                  R. K. Raj and   
                     H. M. Levy   A Compositional Model for Software Reuse 312--322
                G. N. Dixon and   
           G. D. Parrington and   
          S. K. Shrivastava and   
                  S. M. Wheater   The treatment of persistent objects in
                                  Arjuna . . . . . . . . . . . . . . . . . 323--332
                 E. Laenens and   
                   F. Staes and   
                     D. Vermeir   Browsing \`a la carte in Object-Oriented
                                  Databases  . . . . . . . . . . . . . . . 333--340
              T. P. Hopkins and   
                  M. I. Wolczko   Writing Concurrent Object-Oriented
                                  Programs using Smalltalk-80  . . . . . . 341--350
                   M. C. Cooper   Formal hierarchical object models for
                                  fast template matching . . . . . . . . . 351--361
               R. G. Melhem and   
            D. M. Chiarulli and   
                  S. P. Levitan   Space Multiplexing of Waveguides in
                                  Optically Interconnected Multiprocessor
                                  Systems  . . . . . . . . . . . . . . . . 362--369
              J. P. Bennett and   
                    G. C. Smith   The Need for Reduced Byte Stream
                                  Instruction Sets . . . . . . . . . . . . 370--373
                    C. Mitchell   Another Postage Stamp Problem  . . . . . 374--376
                       A. Oxley   Short Note: Calculating Earthwords
                                  Volumes --- an Exercise in Geometric
                                  Algorithms . . . . . . . . . . . . . . . 377--379
                  M. H. Hubbard   Correspondence . . . . . . . . . . . . . 379--379
                    C. Mitchell   Correspondence . . . . . . . . . . . . . 379--380
             R. J. Mitchell and   
               P. R. Minchinton   Correspondence . . . . . . . . . . . . . 380--380
               A. J. Wlodarczyk   Correspondence . . . . . . . . . . . . . 380--381
                      Anonymous   Announcements  . . . . . . . . . . . . . 381--382

The Computer Journal
Volume 32, Number 5, 1989

                    B. Wichmann   Editorial --- Formal Methods in
                                  Computing  . . . . . . . . . . . . . . . 385--385
             I. Sommerville and   
                     R. Thomson   An Approach to the Support of Software
                                  Evolution  . . . . . . . . . . . . . . . 386--398
                      Anonymous   Announcement . . . . . . . . . . . . . . 398--398
                  M. W. Shields   Implicit system specification and the
                                  interface equation . . . . . . . . . . . 399--412
                      Anonymous   Announcements  . . . . . . . . . . . . . 412--412
            R. M. Gallimore and   
                 D. Coleman and   
                   V. Stavridou   UMIST OBJ: a language for executable
                                  program specifications . . . . . . . . . 413--421
             C. S. McDonald and   
                     L. Allison   Denotational Semantics of a Command
                                  Interpreter and their Implementation in
                                  Standard ML  . . . . . . . . . . . . . . 422--431
                 B. A. Wichmann   Towards a Formal Specification of
                                  Floating Point . . . . . . . . . . . . . 432--436
                      Anonymous   Announcement . . . . . . . . . . . . . . 436--436
              L. V. Mancini and   
               G. P. Pappalardo   Proving correctness properties of a
                                  replicated synchronous program . . . . . 437--444
                      Anonymous   Announcement . . . . . . . . . . . . . . 444--444
              V. P. Heuring and   
                 U. Kastens and   
              R. G. Plummer and   
                    W. M. Waite   COMAR: a data format for integration of
                                  CFG tools  . . . . . . . . . . . . . . . 445--452
                P. Tsanakas and   
            N. Alexandridis and   
            G. Papakonstantinou   An FP-based Design Methodology for
                                  Problem-oriented Architectures . . . . . 453--460
                D. I. Bevan and   
                 G. L. Burn and   
                R. J. Karia and   
                   J. D. Robson   Principles for the design of a
                                  distributed memory architecture for
                                  parallel graph reduction . . . . . . . . 461--469
                       M. C. Er   A new algorithm for generating binary
                                  trees using rotations  . . . . . . . . . 470--473
                      Anonymous   Announcement . . . . . . . . . . . . . . 473--473
                J. A. Ellis and   
                 P. M. Lepolesa   Short Note: a Las Vegas Graph Colouring
                                  Algorithm  . . . . . . . . . . . . . . . 474--476

The Computer Journal
Volume 32, Number 6, December, 1989

                      Fred Cole   Editorial --- Electronic Publishing  . . 481--481
           D. F. Brailsford and   
                    R. J. Beach   Electronic publishing --- a journal and
                                  its production . . . . . . . . . . . . . 482--493
                      R. Furuta   An Object-Based Taxonomy for Abstract
                                  Structure in Document Models . . . . . . 494--504
                  Heather Brown   Standards for Structured Documents . . . 505--514
                      Anonymous   Announcement . . . . . . . . . . . . . . 515--515
                     I. Ritchie   Hypertext --- Moving Towards Large
                                  Volumes  . . . . . . . . . . . . . . . . 516--523
                   R. A. Morris   Rendering digital type: a historical and
                                  economic view of technology  . . . . . . 524--532
                  Heather Brown   Book Review  . . . . . . . . . . . . . . 532--532
                   P. S. Licker   Computer Management: Human Resource
                                  Management and Business Success in
                                  Small, Hi-Tech Firms: Some Lessons for
                                  Data Processing  . . . . . . . . . . . . 533--540
                      Anonymous   Announcement . . . . . . . . . . . . . . 540--540
             D. A. Umphress and   
                U. W. Pooch and   
                       M. Tanik   Simulation: Fast Prototyping of a
                                  Goal-Oriented Simulation Environment
                                  System . . . . . . . . . . . . . . . . . 541--548
                   J. R. Parker   Computer Graphics: on the Conversion of
                                  Filled Polygonal Regions from Raster to
                                  Vector Representation  . . . . . . . . . 549--553
                      Anonymous   Announcement . . . . . . . . . . . . . . 553--553
                G. H. Kirby and   
             M. Visvalingam and   
                        P. Wade   Computer Graphics: Recognition and
                                  Representation of a Hierarchy of
                                  Polygons with Holes  . . . . . . . . . . 554--562
                    A. Quin and   
                  Y. Yanagisawa   Computer Graphics: on Data Compaction of
                                  Scanning Curves  . . . . . . . . . . . . 563--566
              A. D. Robison and   
               B. J. Hafner and   
                   S. S. Skiena   Computer Games: Eight Pieces Cannot
                                  Cover a Chess Board  . . . . . . . . . . 567--570
                 M. Cosnard and   
                 A. G. Ferreira   Generating permutations on a VLSI
                                  suitable linear network  . . . . . . . . 571--573
                      Anonymous   Announcements  . . . . . . . . . . . . . 573--573


The Computer Journal
Volume 22, Number 2, May, 1979

            A. T. Arblaster and   
                 M. E. Sime and   
                 T. R. G. Green   Jumping to Some Purpose  . . . . . . . . 105--109