Last update:
Sat Mar 30 12:06:52 MDT 2019
Gianni Amati and
Iadh Ounis Conceptual Graphs and First Order Logic 1--12
Jeremy M. R. Martin A Tool for Checking the CSP \bf sat
Property . . . . . . . . . . . . . . . . 13--23
A. D. Pengelly and
D. C. Ince Quotient Machines, the Interface
Equation and Protocol Conversion . . . . 24--39
John Ellis and
Minko Markov In situ, Stable Merging by Way of the
Perfect Shuffle . . . . . . . . . . . . 40--53
Simon Y. Berkovich and
Eyas El-Qawasmeh Reversing the Error-Correction Scheme
for a Fault-Tolerant Indexing . . . . . 54--64
Kam-yiu Lam and
Tei-Wei Kuo and
Wai-Hung Tsang and
Gary C. K. Law The Reduced Ceiling Protocol for
Concurrency Control in Real-time
Databases with Mixed Transactions . . . 65--80
Suk-Kyu Song and
Narasimhaiah Gorla A Genetic Algorithm for Vertical
Fragmentation and Access Path Selection 81--93
Brian Randell Turing Memorial Lecture: Facing Up to
Faults . . . . . . . . . . . . . . . . . 95--106
Fionn Murtagh and
Jean-Luc Starck and
Michael W. Berry Overcoming the Curse of Dimensionality
in Clustering by Means of the Wavelet
Transform . . . . . . . . . . . . . . . 107--120
F. Luccio and
M. Mahafzah and
M. Omari and
L. Pagli Masked Interval Routing: a New Routing
Scheme . . . . . . . . . . . . . . . . . 121--129
Marina Papatriantafilou and
Phillippas Tsigas Wait-Free Handshaking Using Rainbow
Colouring . . . . . . . . . . . . . . . 130--137
Lizy Kurian John Data Placement Schemes to Reduce
Conflicts in Interleaved Memories . . . 138--151
Imtiaz Ahmad and
Muhammad K. Dhodhi and
Faridah M. Ali TLS: a Tabu Search Based Scheduling
Algorithm for Behavioral Synthesis of
Functional Pipelines . . . . . . . . . . 152--166
Ian Holyer and
Hüseyin Pehlivan A Recovery Mechanism for Shells . . . . 168--176
Tatiana Tambouratzis Counter-clustering for Training Pattern
Selection . . . . . . . . . . . . . . . 177--190
Cinzia Bernardeschi and
Alessandro Fantechi and
Luca Simoncini Formally Verifying Fault Tolerant System
Designs . . . . . . . . . . . . . . . . 191--205
Samir M. Koriem A Fuzzy Petri Net Tool For Modeling and
Verification of Knowledge-Based Systems 206--223
Sòren Christensen and
Laure Petrucci Modular Analysis of Petri Nets . . . . . 224--242
Cyril Gavoille On the Dilation of Interval Routing . . 243--249
Hugh Glaser and
Pieter H. Hartel and
Paul W. Garratt Programming by Numbers: a Programming
Method for Novices . . . . . . . . . . . 252--265
S. Zeadally Implementation and Performance of
QoS-aware Java Applications over ATM
Networks . . . . . . . . . . . . . . . . 266--273
Tijn Borghuis and
Loe Feijs A Constructive Logic for Services and
Information Flow in Computer Networks 274--289
Limin Xiang and
Kazuo Ushijima and
Selim G. Akl Generating Regular $k$-ary Trees
Efficiently . . . . . . . . . . . . . . 290--300
Eleni Tousidou and
Alex Nanopoulos and
Yannis Manolopoulos Improved Methods for Signature-Tree
Construction . . . . . . . . . . . . . . 301--314
Kuo-Liang Chung and
Hsiu-Niang Chen A Neighbor-finding Algorithm for
Bincode-based Images on Reconfigurable
Meshes . . . . . . . . . . . . . . . . . 315--324
Theodoros Tzouramanis and
Michael Vassilakopoulos and
Yannis Manolopoulos Overlapping Linear Quadtrees and
Spatio-Temporal Query Processing . . . . 325--324
Sourav S. Bhowmick and
Sanjay Madria and
Wee Keong Ng and
Ee-Peng Lim Data Visualization Operators for WHOWEDA 364--385
Sheng-Tzong Cheng and
Chia-Mei Chen Dynamic Round-based Resource Management
for On-demand Multimedia Servers . . . . 386--395
Duen-Ren Liu and
Chen-Hsien Lin and
Jing-Jang Hwang Classifying Video Documents by
Hierarchical Structure of Video Contents 396--410
H. Sarbazi-Azad and
M. Ould-Khaoua and
L. M. Mackenzie Message Latency in Hypercubes in the
Presence of Matrix-Transpose Traffic . . 411--419
Antigoni Manousaka and
Yannis Manolopoulos Fringe Analysis of $2$-$3$ Trees with
Lazy Parent Split . . . . . . . . . . . 420--429
Willy Susilo and
Rei Safavi-Naini and
Marc Gysin and
Jennifer Seberry A New and Efficient Fail-stop Signature
Scheme . . . . . . . . . . . . . . . . . 430--437
James Noble Arguments and Results . . . . . . . . . 439--450
K. Lano and
R. France and
J.-M. Bruel A Semantic Comparison of Fusion and
Syntropy . . . . . . . . . . . . . . . . 451--468
Konstantin Läufer and
Gerald Baumgartner and
Vincent F. Russo Safe Structural Conformance for Java . . 469--481
Houman Younessi An Algorithm for Automatic Construction
of Class Diagrams . . . . . . . . . . . 482--490
Suad Alagi\'c Temporal Object-Oriented Programming . . 491--511
Eun-Sun Cho and
Hyoung-Joo Kim Interface/implementation Separation
Mechanism for Integrating
Object-oriented Management Systems and
General-purpose Programming Languages 512--523
Jung-Ho Ahn and
Hyoung-Joo Kim Dynamic SEOF: An Adaptable Object
Prefetch Policy for Object-oriented
Database Systems . . . . . . . . . . . . 524--537
Michael Luck and
Mark d'Inverno A Conceptual Framework for Agent
Definition and Development . . . . . . . 1--20
Giuseppe Anastasi and
Alberto Bartoli and
Nicoletta De Francesco and
Antonella Santone Efficient Verification of a Multicast
Protocol for Mobile Computing . . . . . 21--30
Sijing Zhang and
E. Stewart Lee and
Alan Burns Determining the Worst-case Synchronous
Message Response Time in FDDI Networks 31--41
Juha Puustjärvi Workflow Concurrency Control . . . . . . 42--53
Jason Crampton and
George Loizou and
Greg O'Shea A Logic of Access Control . . . . . . . 54--66
Nick Donofrio Turing Memorial Lecture . . . . . . . . 67--74
Evaggelia Pitoura and
Ioannis Fudos Distributed Location Databases for
Tracking Highly Mobile Objects . . . . . 75--91
Roberto Baldoni and
Francesco Quaglia and
Michel Raynal Consistent Checkpointing for Transaction
Systems . . . . . . . . . . . . . . . . 92--100
F. C. M. Lau and
P. K. W. Cheng and
S. S. H. Tse An Algorithm for the $2$-Median Problem
on Two-Dimensional Meshes . . . . . . . 101--108
N. De Francesco and
A. Fantechi and
S. Gnesi and
P. Inverardi Finite Approximations for Model Checking
Non-finite-state Processes . . . . . . . 109--123
Daniel Y. Chao and
Jose A. Nicdao Liveness for Synchronized Choice Petri
Nets . . . . . . . . . . . . . . . . . . 124--136
Jason Crampton and
George Loizou and
Greg O'Shea A Logic of Access Control . . . . . . . 137--149
Willis H. Ware Introduction to Davies' paper . . . . . 151--151
D. W. Davies An Historical Study of the Beginnings of
Packet Switching . . . . . . . . . . . . 152--162
Kostas Politopoulos and
George F. Georgakopoulos and
Panagiotis Tsanakas Precedence Constrained Scheduling: a
Case in P . . . . . . . . . . . . . . . 163--173
A. Stewart and
M. Clint BSP-style Computation: a Semantic
Investigation . . . . . . . . . . . . . 174--185
Da-Qian Zhang and
Kang Zhang and
Jiannong Cao A Context-sensitive Graph Grammar
Formalism for the Specification of
Visual Languages . . . . . . . . . . . . 186--200
SangKeun Lee and
Chong-Sun Hwang Unified Protocols of Concurrency Control
and Recovery in Distributed Object-based
Databases . . . . . . . . . . . . . . . 201--213
C.-H. Lai and
C. S. Ierotheou and
C. J. Palansuriya and
K. A. Pericleous Performance Evaluation of a Distributed
Algorithm for an Inverse Heat Conduction
Problem . . . . . . . . . . . . . . . . 214--220
Alexis C. Kaporis and
Lefteris M. Kirousis and
Evangelos Kranakis and
Danny Krizanc and
Yannis C. Stamatiou and
Elias C. Stavropoulos Locating Information with Uncertainty in
Fully Interconnected Networks with
Applications to World Wide Web
Information Retrieval . . . . . . . . . 221--229
H. Bowman and
J. W. Bryans and
J. Derrick Analysis of a Multimedia Stream using
Stochastic Process Algebra . . . . . . . 230--245
H. M. W. Verbeek and
T. Basten and
W. M. P. van der Aalst Diagnosing Workflow Processes using
Woflan . . . . . . . . . . . . . . . . . 246--279
Yuke Wang and
Carl McCrosky and
Xiaoyu Song Single-faced Boolean Functions and their
Minimization . . . . . . . . . . . . . . 280--291
Limin Xiang and
Kazuo Ushijima On $O(1)$ Time Algorithms for
Combinatorial Generation . . . . . . . . 292--302
M. Amor and
F. Argüello and
J. López and
O. Plata and
E. L. Zapata A Data-Parallel Formulation for Divide
and Conquer Algorithms . . . . . . . . . 303--320
Erkki Mäkinen Comment on `A Framework for Modelling
Trojans and Computer Virus Infection' 321--323
H. Thimbleby and
S. O. Anderson and
P. A. Cairns Reply to ``Comment on `A Framework for
Modelling Trojans and Computer Virus
Infection' by E. Mäkinen'' . . . . . . . 324--325
Fred Cohen Reply to ``Comment on `A Framework for
Modelling Trojans and Computer Virus
Infection' by E. Mäkinen'' . . . . . . . 326--327
Xiaohua Jia and
Deying Li and
Xiaodong Hu and
DingZhu Du Optimal Placement of Web Proxies for
Replicated Web Servers in the Internet 329--339
Aline Baggio and
Gerco Ballintijn and
Maarten van Steen and
Andrew S. Tanenbaum Efficient Tracking of Mobile Objects in
Globe . . . . . . . . . . . . . . . . . 340--353
San-Yuan Wang and
Yu-Chee Tseng and
Ching-Sung Shiu and
Jang-Ping Sheu Balancing Traffic Load for Multi-Node
Multicast in a Wormhole $2$-D Torus/Mesh 354--367
J. Al-Sadi and
K. Day and
M. Ould-Khaoua Probability-based Fault-tolerant Routing
in Hypercubes . . . . . . . . . . . . . 368--373
Guihai Chen and
Francis C. M. Lau Layout of the Cube-connected Cycles
without Long Wires . . . . . . . . . . . 374--383
Jitian Xiao and
Yanchun Zhang and
Xiaohua Jia Clustering Non-uniform-sized Spatial
Objects to Reduce I/O Cost for
Spatial-join Processing . . . . . . . . 384--397
Ngoc Thanh Nguyen Consensus-based Timestamps in
Distributed Temporal Databases . . . . . 398--409
David E. Losada and
Alvaro Barreiro A Logical Model for Information
Retrieval based on Propositional Logic
and Belief Revision . . . . . . . . . . 410--424
Robert W. P. Luk Compact Morphic Directed Acyclic Word
Graphs . . . . . . . . . . . . . . . . . 425--434
Ousmane Koné A Local Approach to the Testing of
Real-time Systems . . . . . . . . . . . 435--447
C. Canal and
L. Fuentes and
E. Pimentel and
J. M. Troya and
A. Vallecillo Extending CORBA Interfaces with
Protocols . . . . . . . . . . . . . . . 448--462
Gwoboa Horng An Efficient and Secure Protocol for
Multi-party Key Establishment . . . . . 463--470
Ing-Ray Chen Special Issue Editorial. High Assurance
Systems . . . . . . . . . . . . . . . . 471--472
Tadashi Dohi and
Katerina Go\vseva-Popstojanova and
Kishor Trivedi Estimating Software Rejuvenation
Schedules in High-Assurance Systems . . 473--485
Steve Goddard and
Kevin Jeffay Managing Latency and Buffer Requirements
in Processing Graph Chains . . . . . . . 486--503
Jeffrey J. P. Tsai and
Eric Y. T. Juan Modeling and Verification of
High-Assurance Properties of
Safety-Critical Systems . . . . . . . . 504--530
Iain Bate and
Philippa Conmy and
Tim Kelly and
John McDermid Use of Modern Processors in
Safety-Critical Applications . . . . . . 531--543
F. Grandoni and
S. Chiaradonna and
F. Di Giandomenico and
A. Bondavalli Evaluation of Fault-Tolerant
Multiprocessor Systems for High
Assurance Applications . . . . . . . . . 544--556
Zhiwei Xu and
Taghi M. Khoshgoftaar Software Quality Prediction for
High-Assurance Network
Telecommunications Systems . . . . . . . 557--568
Alessandro F. Garcia and
Delano M. Beder and
Cecília M. F. Rubira A Unified Meta-Level Software
Architecture for Sequential and
Concurrent Exception Handling . . . . . 569--587
Faron G. Moller Editorial: Formal Methods in Computation 1--1
Howard Barringer and
Donal Fellows and
Graham Gough and
Alan Williams Rainbow: Development, Simulation and
Analysis Tools for Asynchronous
Micropipeline Hardware Design . . . . . 2--11
Doug Edwards and
Andrew Bardsley Balsa: An Asynchronous Hardware
Synthesis Language . . . . . . . . . . . 12--18
Steve Furber Validating the AMULET Microprocessors 19--26
Michael J. C. Gordon Relating Event and Trace Semantics of
Hardware Description Languages . . . . . 27--36
Michael Norrish and
Konrad Slind A Thread of HOL Development . . . . . . 37--45
Susan Older and
Shiu-Kai Chin Formal Methods for Assuring Security of
Protocols . . . . . . . . . . . . . . . 46--54
M. Calder and
S. Maharaj and
C. Shankland A Modal Logic for Full LOTOS based on
Symbolic Transition Systems . . . . . . 55--61
C. Tofts Traffic Modelling and Probabilistic
Process Abstraction . . . . . . . . . . 62--67
J. V. Tucker and
Sergei Vorobyov and
Chris Tofts Book Reviews . . . . . . . . . . . . . . 68--71
Chung-Ming Huang and
Yu-Chang Chao Differentiated Information Presentations
for Heterogeneous I/O Devices using a
Single Mark-up Language Approach . . . . 72--87
Ali Shatnawi and
M. O. Ahmad and
M. N. S. Swamy Optimal Scheduling of Digital Signal
Processing Data-flow Graphs using
Shortest-path Algorithms . . . . . . . . 88--100
Shih-Lin Wu and
Yu-Chee Tseng and
Chih-Yu Lin and
Jang-Ping Sheu A Multi-channel MAC Protocol with Power
Control for Multi-hop Mobile Ad Hoc
Networks . . . . . . . . . . . . . . . . 101--110
Xudong He and
Yi Deng A Framework for Developing and Analyzing
Software Architecture Specifications in
SAM . . . . . . . . . . . . . . . . . . 111--128
Syed Masud Mahmud and
L. Tissa Samaratunga and
Shilpa Kommidi Fault-Tolerant Hierarchical Networks for
Shared Memory Multiprocessors and their
Bandwidth Analysis . . . . . . . . . . . 147--161
Xiao Jun Chen and
Hasan Ural Construction of Deadlock-free Designs of
Communication Protocols from
Observations . . . . . . . . . . . . . . 162--173
Tien-Tai Pan and
Shun-Shii Lin Constant-time Algorithms for Minimum
Spanning Tree and Related Problems on
Processor Array with Reconfigurable Bus
Systems . . . . . . . . . . . . . . . . 174--186
Fairouz Kamareddine and
Alejandro Ríos Pure Type Systems with de Bruijn Indices 187--201
N. Parimala Explicit Operation Specification for
Component Databases . . . . . . . . . . 202--212
Alan Gibbons and
Ida Pu and
Muthu Muthukrishnan Exact Analyses of a Simple Heuristic
Employed in Array Compression . . . . . 213--220
Alexey Stakhov Brousentsov's Ternary Principle,
Bergman's Number System and Ternary
Mirror-symmetrical Arithmetic . . . . . 221--236
Vladimir B. Balakirsky A New Coding Algorithm for Trees . . . . 237--242
Vladimir B. Balakirsky Block Codes for Asynchronous Data
Transmission Designed from Binary Trees 243--248
S. Conrad and
W. Hasselbring and
A. James and
D. Kambur and
R.-D. Kutsche and
P. Thiran Report on the EFIS 2001 Workshop . . . . 249--251
Ananda Amatya Book Review . . . . . . . . . . . . . . 252--252
Edward Smith Book Review . . . . . . . . . . . . . . 252--253
Marco Locatelli Book Review . . . . . . . . . . . . . . 253--253
R. A. O'Keefe Book Review . . . . . . . . . . . . . . 253--254
Wai-hung Chan Book Review . . . . . . . . . . . . . . 254--255
Claude Kirchner Book Review . . . . . . . . . . . . . . 255--256
Carl Pomerance Book Review . . . . . . . . . . . . . . 256--256
Fionn Murtagh Editorial: Statistics and Trends . . . . 259--259
Gábor Huszerl and
István Majzik and
András Pataricza and
Konstantinos Kosmidis and
Mario Dal Cin Quantitative Analysis of UML Statechart
Models of Dependable Systems . . . . . . 260--277
Liu Zhenglin and
Xu Chongyang An Analytical Model for the Performance
of the DOCSIS CATV Network . . . . . . . 278--284
G. E. Farr and
C. S. Wallace The Complexity of Strict Minimum Message
Length Inference . . . . . . . . . . . . 285--292
Goichiro Hanaoka and
Tsuyoshi Nishioka and
Yuliang Zheng and
Hideki Imai A Hierarchical Non-interactive
Key-Sharing Scheme with Low Memory Size
and High Resistance against Collusion
Attacks . . . . . . . . . . . . . . . . 293--303
Ing-Ray Chen and
Baoshan Gu A Comparative Cost Analysis of
Degradable Location Management
Algorithms in Wireless Networks . . . . 304--319
Theo Ungerer and
Borut Robi\vc and
Jurij \vSilc Multithreaded Processors . . . . . . . . 320--348
Jie Wu A Fault-tolerant Adaptive and Minimal
Routing Scheme in $n$-D Meshes . . . . . 349--363
James F. Korsh and
Paul LaFollette Loopless Generation of Trees with
Specified Degrees . . . . . . . . . . . 364--372
Hiroo Iwata Book Review . . . . . . . . . . . . . . 373--373
Barry Munro Book Review . . . . . . . . . . . . . . 373--373
Rowan Limb Book Review . . . . . . . . . . . . . . 373--374
Simon Berry Book Review . . . . . . . . . . . . . . 374--374
David Menzies Book Review . . . . . . . . . . . . . . 374--375
Arvind Aggarwal Book Review . . . . . . . . . . . . . . 375--375
Margherita Napoli Book Review . . . . . . . . . . . . . . 375--376
Geoffrey Archenhold Book Review . . . . . . . . . . . . . . 376--377
Scott W. Ambler Book Review . . . . . . . . . . . . . . 377--377
Anonymous Capsule Reviews . . . . . . . . . . . . 379--380
Hazem T. El-Khatib and
M. Howard Williams and
David H. Marwick and
Lachlan M. Mackinnon Using a Distributed Approach to Retrieve
and Integrate Information from
Heterogeneous Distributed Databases . . 381--394
Daeyoung Kim and
Yann-Hang Lee Periodic and Aperiodic Task Scheduling
in Strongly Partitioned Integrated
Real-time Systems . . . . . . . . . . . 395--409
Victor C. S. Lee and
Kwok-Wa Lam and
Sang H. Son Concurrency Control Using Timestamp
Ordering in Broadcast Environments . . . 410--422
Alan Roberts and
Antonios Symvonis and
David R. Wood Lower Bounds for One-to-one Packet
Routing on Trees using Hot-Potato
Algorithms . . . . . . . . . . . . . . . 423--435
Yang Jun and
Greg Michaelson and
Phil Trinder Explaining Polymorphic Types . . . . . . 436--452
Constantinos Papadopoulos An Extended Temporal Logic for CSCW . . 453--472
Claudio Fornaro Book Review . . . . . . . . . . . . . . 473--473
Daniel D. G. Moth Book Review . . . . . . . . . . . . . . 473--474
Matthew Outram Book Review . . . . . . . . . . . . . . 474--474
Andrea Sanna Book Review . . . . . . . . . . . . . . 474--474
André Grosse Book Review . . . . . . . . . . . . . . 475--475
Paolo Montuschi Book Review . . . . . . . . . . . . . . 475--475
Angela Bonifati Book Review . . . . . . . . . . . . . . 476--476
Giuseppe Decandia Book Review . . . . . . . . . . . . . . 476--476
Ing. Felice Tartaro Book Review . . . . . . . . . . . . . . 476--477
Ananda Amatya Book Review . . . . . . . . . . . . . . 477--477
Anonymous Capsule Reviews . . . . . . . . . . . . 479--480
Janne Skyt and
Christian S. Jensen Persistent Views --- A Mechanism for
Managing Ageing Data . . . . . . . . . . 481--493
B. John Oommen and
Luis G. Rueda The Efficiency of Histogram-like
Techniques for Database Query
Optimization . . . . . . . . . . . . . . 494--510
Victoria S. Uren and
Thomas R. Addis How Weak Categorizers Based Upon
Different Principles Strengthen
Performance . . . . . . . . . . . . . . 511--524
Irina Kozatchok and
Samuel Pierre User Tracking and Mobility Management
Algorithm for Wireless Networks . . . . 525--539
Wei Jie and
Wentong Cai and
Stephen J. Turner POEMS: a Parallel Object-oriented
Environment for Multi-computer Systems 540--560
Peter Sanders Randomized Receiver Initiated
Load-balancing Algorithms for
Tree-shaped Computations . . . . . . . . 561--573
Giuseppe Prencipe Book Review . . . . . . . . . . . . . . 574--575
Elizabeth F. Churchill Book Review . . . . . . . . . . . . . . 575--577
Michele Zito Book Review . . . . . . . . . . . . . . 577--578
Daniel Berleant Book Review . . . . . . . . . . . . . . 578--579
Paolo Montuschi Book Review . . . . . . . . . . . . . . 579--579
Anonymous Capsule Reviews . . . . . . . . . . . . 581--582
Anna Formica and
Michele Missikoff Concept Similarity in SymOntos: An
Enterprise Ontology Management Tool . . 583--594
Paolo Bellavista and
Antonio Corradi and
Cesare Stefanelli Java for On-line Distributed Monitoring
of Heterogeneous Systems and Services 595--607
Jonathan J. Cook Reverse Execution of Java Bytecode . . . 608--619
John Aycock and
R. Nigel Horspool Practical Earley Parsing . . . . . . . . 620--630
John W. Raymond and
Eleanor J. Gardiner and
Peter Willett RASCAL: Calculation of Graph Similarity
using Maximum Common Edge Subgraphs . . 631--644
M. C. Little and
S. K. Shrivastava and
N. A. Speirs Using Bloom Filters to Speed-up Name
Lookup in Distributed Systems . . . . . 645--652
Jarmo Siltaneva and
Erkki Mäkinen A Comparison of Random Binary Tree
Generators . . . . . . . . . . . . . . . 653--660
Masayuki Abe and
Masayuki Kanda A Key Escrow Scheme with Time-Limited
Monitoring for One-way Communication . . 661--671
Wen-Shenq Juang and
Chin-Laung Lei and
Horng-Twu Liaw A Verifiable Multi-Authority Secret
Election Allowing Abstention from Voting 672--682
Massimo Franceschet and
Angelo Montanari Book Review . . . . . . . . . . . . . . 683--685
M. J. Pont Book Review . . . . . . . . . . . . . . 685--686
Andrea Valente Book Review . . . . . . . . . . . . . . 686--687
Marco Botta Book Review . . . . . . . . . . . . . . 687--688
Andrea Bobbio Book Review . . . . . . . . . . . . . . 688
Anonymous Capsule Reviews . . . . . . . . . . . . 1--2
Giuseppe Anastasi and
Marco Conti and
Willy Lapenna A Power-Saving Network Architecture for
Accessing the Internet from Mobile
Computers: Design, Implementation and
Measurements . . . . . . . . . . . . . . 3--15
Kim Potter Kihlstrom and
Louise E. Moser and
P. M. Melliar-Smith Byzantine Fault Detectors for Solving
Consensus . . . . . . . . . . . . . . . 16--35
Sotirios G. Ziavras and
Qian Wang and
Paraskevi Papathanasiou Viable Architectures for
High-Performance Computing . . . . . . . 36--54
Henning Pagnia and
Holger Vogt and
Felix C. Gärtner Fair Exchange . . . . . . . . . . . . . 55--75
Frederic Paik Schoenberg and
Thomas Ferguson and
Cheng Li Inverting Dirichlet Tessellations . . . 76--83
Juan A. Carrasco Transient Analysis of Rewarded
Continuous Time Markov Models by
Regenerative Randomization with Laplace
Transform Inversion . . . . . . . . . . 84--99
Hsien-Wen Tseng and
Chin-Chen Chang Construction of Symmetrical Reversible
Variable Length Codes Using Backtracking 100--105
James F. Korsh and
Paul S. LaFollette Loopless Generation of Schröder Trees . . 106--113
Matteo Sereno Book Review . . . . . . . . . . . . . . 114--114
James J. Hunt Book Review . . . . . . . . . . . . . . 115--115
Adrian Hibbert Book Review . . . . . . . . . . . . . . 115--115
Enrico Macii Book Review . . . . . . . . . . . . . . 115--116
M. L. Sapino Book Review . . . . . . . . . . . . . . 116--116
Marco Botta Book Review . . . . . . . . . . . . . . 117--117
Vincenzo Lombardo Book Review . . . . . . . . . . . . . . 117--119
Anonymous Capsule Reviews . . . . . . . . . . . . 121--122
J. M. Alvarez and
M. Diaz and
L. Llopis and
E. Pimentel and
J. M. Troya An Object-oriented Methodology for
Embedded Real-time Systems . . . . . . . 123--145
Giuseppe Anastasi and
Alberto Bartoli On the Structuring of Reliable Multicast
Protocols for Distributed Mobile Systems 146--160
Jun Wu and
Tei-Wei Kuo and
Chih-wen Hsueh R.C.P.C.P.: a Ceiling-based Protocol for
Multiple-disk Environments . . . . . . . ??
Tei-Wei Kuo and
Yen-Hsi Hou and
Kam-Yiu Lam The Impacts of Write-Through Procedures
and Checkpointing on Real-Time
Concurrency Control . . . . . . . . . . 174--192
Hung-Yu Chien and
Jinn-Ke Jan Robust and Simple Authentication
Protocol . . . . . . . . . . . . . . . . 193--201
Carlo Blundo and
Clemente Galdi Hiding Information in Image Mosaics . . 202--212
Jixin Ma and
Brian Knight Representing The Dividing Instant . . . 213--222
Rosa Meo Book Review . . . . . . . . . . . . . . 223--223
Antonio Lioy Book Review . . . . . . . . . . . . . . 223--224
Juan Carlos De Martin Book Review . . . . . . . . . . . . . . 224
Fionn Murtagh In Memoriam: Roger Needham . . . . . . . 227--227
Anonymous Capsule Reviews . . . . . . . . . . . . 227--228
Sourav S. Bhowmick and
Sanjay Madria and
Wee Keong Ng Representation of Web Data in a Web
Warehouse . . . . . . . . . . . . . . . 229--262
Mirko Viroli A Type-Passing Approach for the
Implementation of Parametric Methods in
Java . . . . . . . . . . . . . . . . . . 263--294
Florentin Ipate On the Minimality of Stream X-machines 295--306
R. M. Hierons Generating Candidates When Testing a
Deterministic Implementation against a
Non-deterministic Finite-state Machine 307--318
Panayiotis Bozanis and
Alexandros Nanopoulos and
Yannis Manolopoulos LR-tree: a Logarithmic Decomposable
Spatial Index Method . . . . . . . . . . 319--331
Ingo Wegener Book Review . . . . . . . . . . . . . . 332--332
Georg Glaeser Book Review . . . . . . . . . . . . . . 332
Luigi Portinale Book Review . . . . . . . . . . . . . . 332--333
Luigi Portinale Book Review . . . . . . . . . . . . . . 333--334
Emilio Leonardi Book Review . . . . . . . . . . . . . . 334--334
Juraj Hromkovic Book Review . . . . . . . . . . . . . . 334--335
Anonymous Capsule Reviews . . . . . . . . . . . . 337--339
Fabio Patern\`o and
Carmen Santoro Support for Reasoning about Interactive
Systems through Human-Computer
Interaction Designers' Representations 340--357
Randeep Bhatia and
Rakesh K. Sinha and
Chung-Min Chen A Hierarchical Technique for
Constructing Efficient Declustering
Schemes for Range Queries . . . . . . . 358--377
Xiaohua Jia and
Deying Li and
Xiaodong Hu and
Weili Wu and
Dingzhu Du Placement of Web-Server Proxies with
Consideration of Read and Update
Operations on the Internet . . . . . . . 378--390
Alan Gibbons and
Aris Pagourtzis and
Igor Potapov and
Wojciech Rytter Coarse-Grained Parallel Transitive
Closure Algorithm: Path Decomposition
Technique . . . . . . . . . . . . . . . 391--400
Christian Rinderknecht An Algorithm for Validating ASN.1
(X.680) Specifications using Set
Constraints . . . . . . . . . . . . . . 401--420
Ay\csegül Gençata and
Feza Buzluca Determining the Asynchronous Threshold
Values of the Timed Token Medium Access
Protocol . . . . . . . . . . . . . . . . 421--426
Tak-Ming Chan and
Sam Kwong and
K. F. Man Solving the Converter Placement Problem
in WDM Ring Networks using Genetic
Algorithms . . . . . . . . . . . . . . . 427--448
Chang N. Zhang and
Hua Li Design of Reconfigurable VLSI
Architecture for Hybrid Arithmetic in
$GF(2^m)$ . . . . . . . . . . . . . . . 449--460
Pascal Zimmer Book Review . . . . . . . . . . . . . . 461--461
Sinan Si Alhir Book Review . . . . . . . . . . . . . . 461--462
Aladdin Ayesh Book Review . . . . . . . . . . . . . . 462--462
John Hunt Book Review . . . . . . . . . . . . . . 462--463
Viviana Bono Book Review . . . . . . . . . . . . . . 463--464
Anonymous Capsule Reviews . . . . . . . . . . . . 465--466
Sameer Bataineh and
Ghassan E. Qanzu'a Reliable Omega Interconnected Network
for Large-Scale Multiprocessor Systems 467--475
Siddhartha Rai and
Priti Shankar Efficient Statistical Modeling for the
Compression of Tree Structured
Intermediate Code . . . . . . . . . . . 476--486
S. T. Klein and
Y. Wiseman Parallel Huffman Decoding with
Applications to JPEG Files . . . . . . . 487--497
Alexandros V. Gerbessiotis and
Constantinos J. Siniolakis Increasing the Efficiency of Existing
Sorting Algorithms by Using Randomized
Wrappers . . . . . . . . . . . . . . . . 498--504
Daniel Yuh Chao Extended Synchronized Choice Nets . . . 505--523
Antonio Lioy Book Review . . . . . . . . . . . . . . 524--524
Jon Timmis Book Review . . . . . . . . . . . . . . 524--525
Greg Michaelson Book Review . . . . . . . . . . . . . . 525--525
Ferruccio Damiani Book Review . . . . . . . . . . . . . . 525--526
Frank Land Book Review . . . . . . . . . . . . . . 526--526
Awais Rashid and
Lynne Blair Editorial: Aspect-oriented Programming
and Separation of Crosscutting Concerns 527--528
Marcelo Sihman and
Shmuel Katz Superimpositions and Aspect-oriented
Programming . . . . . . . . . . . . . . 529--541
David H. Lorenz Karl Lieberherr and
Johan Ovlinger Aspectual Collaborations: Combining
Modules and Aspects . . . . . . . . . . 542--565
Tony Clark and
Andy Evans and
Stuart Kent Aspect-oriented Metamodelling . . . . . 566--577
Ian S. Welch and
Robert J. Stroud Re-engineering Security as a
Crosscutting Concern . . . . . . . . . . 578--589
Anonymous Capsule Reviews . . . . . . . . . . . . 591--592
Caroline Kovac Computing in the Age of the Genome . . . 593--597
Ray J. Solomonoff The Kolmogorov Lecture: The Universal
Distribution and Machine Learning . . . 598--601
Vesper Owei Development of a Conceptual Query
Language: Adopting the User-Centered
Methodology . . . . . . . . . . . . . . 602--624
Keqin Li Speed-up of Parallel Processing of
Divisible Loads on $k$-dimensional
Meshes and Tori . . . . . . . . . . . . 625--631
Volker Heun and
Ernst W. Mayr Efficient Embeddings into Hypercube-like
Topologies . . . . . . . . . . . . . . . 632--644
Ing-Ray Chen and
Naresh Verma A Cost-Based Admission Control Algorithm
for Digital Library Multimedia Systems
Storing Heterogeneous Objects . . . . . 645--659
Alok Mishra Book Review . . . . . . . . . . . . . . 660--660
Richard Baskerville Book Review . . . . . . . . . . . . . . 660--660
Liquori Luigi Book Review . . . . . . . . . . . . . . 661--661
Rosa Meo Book Review . . . . . . . . . . . . . . 661--661
Yannis Manolopoulos Introduction to the Special Section on
Spatiotemporal Databases . . . . . . . . 662--663
Stéphane Grumbach and
Philippe Rigaux and
Luc Segoufin Handling Interpolated Data . . . . . . . 664--679
José Antonio Cotelo Lema and
Luca Forlizzi and
Ralf Hartmut Güting and
Enrico Nardelli and
Markus Schneider Algorithms for Moving Objects Databases 680--712
Yannis Theodoridis Ten Benchmark Database Queries for
Location-based Services . . . . . . . . 713--725
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1--3
Peter Wegner New Models of Computation . . . . . . . 4
George F. Georgakopoulos Generalized Template Splay: a Basic
Theory and Calculus . . . . . . . . . . 10
Amir Sapir The Tower of Hanoi with Forbidden Moves 20
Roberto Barbuti Analyzing Information Flow Properties in
Assembly Code by Abstract Interpretation 25
Ziya Arnavut Inversion Coding . . . . . . . . . . . . 46
Masayuki Abe Combining Encryption and Proof of
Knowledge in the Random Oracle Model . . 58
Ying Xu Model Checking for a First-Order
Temporal Logic Using Multiway Decision
Graphs (MDGs) . . . . . . . . . . . . . 71
L. C. P. Albini Diagnosis of Symmetric Graphs Under the
BGM Model . . . . . . . . . . . . . . . 85
Ahmad A. Hiasat A Suggestion for a Fast Residue
Multiplier for a Family of Moduli of the
Form $(2 n - (2 p \pm 1))$ . . . . . . . 93
Zhongqiang Chen Building Footprint Simplification
Techniques and Their Effects on Radio
Propagation Predictions . . . . . . . . 103
Erik Reinhard Tomas Akenine-Möller and Eric Haines:
Real-Time Rendering, 2nd edition . . . . 134
Adrian Colyer Ramnivas Laddad: AspectJ in
Action-Practical Aspect-Oriented
Programming . . . . . . . . . . . . . . 134--135
Jean-Pierre Jouannaud Terese: Term Rewriting Systems . . . . . 135
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 137--139
Chian Wang and
Chung-Ming Huang Synchronization Schemes for Controlling
VCR-Like User Interactions in
Interactive Multimedia-on-Demand (MOD)
Systems . . . . . . . . . . . . . . . . 140--152
Sheau-Ru Tong and
Yuan-Tse Yu and
Chung-Ming Huang Efficient Region Layouts for
Region-based Video Servers Employing
Multi-zone Disks . . . . . . . . . . . . 153--168
Ting-Yu Lin and
Yu-Chee Tseng and
Yuan-Ting Lu An Efficient Link Polling Policy by
Pattern Matching for Bluetooth Piconets 169--178
Ahmad R. Sharafat and
Mehran S. Fallah A Framework for the Analysis of Denial
of Service Attacks . . . . . . . . . . . 179--192
Hans L. Bodlaender and
Ton Kloks and
Richard B. Tan and
Jan Van Leeuwen Approximations for $\lambda$-Colorings
of Graphs . . . . . . . . . . . . . . . 193--204
Aleksander Laurentowski and
Krzysztof Zieli\'nski Experiences from Implementation and
Evaluation of Event Processing and
Distribution of Notifications in an
Object Monitoring Service . . . . . . . 205--220
Qiang Zhu and
Brian Dunkel and
Wing Lau and
Suyun Chen and
Berni Schiefer Piggyback Statistics Collection for
Query Optimization: Towards a
Self-Maintaining Database Management
System . . . . . . . . . . . . . . . . . 221--244
Hans Vandierendonck and
Koen De Bosschere On Generating Set Index Functions for
Randomized Caches . . . . . . . . . . . 245--258
Joan M. Lucas Untangling Binary Trees via Rotations 259--269
Mika Hirvensalo Book Review: Quantum Computation: A
Grand Mathematical Challenge for the
Twenty-First Century and the Millennium,
by Samuel J. Lomonaco, Jr. (ed.) . . . . 270--270
Simona Ronchi Della Rocca Book Review: Abstract State Machines ---
A Method for High-Level System Design
and Analysis, by Egon Boerger and Robert
Staerk . . . . . . . . . . . . . . . . . 270--271
Niels Bjòrn-Andersen Book Review: Redesigning Human Systems
--- InfoSCI 2003 by Enid Mumford . . . . 271--271
Miguel A. Vega-Rodriguez Book Review: Feature Extraction and
Image Processing, by Mark S. Nixon and
Alberto S. Aguado . . . . . . . . . . . 271--272
Jochen Schiller Book Review: Mobile Commerce and
Wireless Computing Systems by Nigel
Phillips and Geoffrey Elliott . . . . . 272--273
Anonymous Capsule Reviews . . . . . . . . . . . . 275--277
Alvin T. S. Chan and
Siu-Nam Chuang and
Jiannong Cao and
Hong-Va Leong An Event-Driven Middleware for Mobile
Context Awareness . . . . . . . . . . . 278--288
Ajoy K. Datta and
Maria Gradinariu and
Sébastien Tixeuil Self-Stabilizing Mutual Exclusion Under
Arbitrary Scheduler* . . . . . . . . . . 289--298
G. Latif-Shabgahi and
J. M. Bass and
S. Bennett Multiple Error Filtering in Cyclic
Systems . . . . . . . . . . . . . . . . 299--308
S. Perkins and
D. H. Smith and
A. Ryley Robust Data Compression: Consistency
Checking in the Synchronization of
Variable Length Codes . . . . . . . . . 309--319
Hua Li and
Chang N. Zhang A Cellular Automata Based Reconfigurable
Architecture for Hybrid Cryptosystems 320--328
Christoforos N. Hadjicostis Coding Techniques for Fault-Tolerant
Parallel Prefix Computations in Abelian
Groups . . . . . . . . . . . . . . . . . 329--341
Luis Iribarne and
José M. Troya and
Antonio Vallecillo A Trading Service for COTS Components 342--357
Evelina Lamma and
Paola Mello and
Fabrizio Riguzzi A System for Measuring Function Points
from an ER-DFD Specification . . . . . . 358--372
Lih Chyun Shu and
John A. Stankovic and
Sang H. Son Achieving Bounded and Predictable
Recovery using Real-Time Logging . . . . 373--394
Andreas Kerren Book Review: \booktitleSoftware
Visualization --- From Theory to
Practice, by Kang Zhang . . . . . . . . 395--395
Geraldine Fitzpatrick Book Review: \booktitleDesigning
Collaborative Systems: A Practical Guide
to Ethnography, by Andy Crabtree . . . . 395--396
Cdric Lhoussaine Book Review: \booktitleThe Pi-Calculus
--- A Theory of Mobile Processes, by D.
Sangiorgi and D. Walker . . . . . . . . 396--396
Priya Seetharaman Book Review: \booktitleBeyond Fear ---
Thinking Sensibly About Security in an
Uncertain World, by Bruce Schneier . . . 397--397
Jack Dongarra The Boole Lecture: Trends in High
Performance Computing . . . . . . . . . 399--403
Ing-Ray Chen and
Luiz DaSilva and
Scott Midkiff Editorial: Mobile and Pervasive
Computing . . . . . . . . . . . . . . . 404
Vincent W.-S. Feng and
Lin-Yi Wu and
Yi-Bing Lin and
Whai-En Chen WGSN: WLAN-based GPRS Support Node with
Push Mechanism . . . . . . . . . . . . . 405--417
K. L. Eddie Law and
Sunny So Pervasive Computing on Active Networks 418--431
Christian Bettstetter On the Connectivity of Ad Hoc Networks 432--447
Yu-Chee Tseng and
Sheng-Po Kuo and
Hung-Wei Lee and
Chi-Fu Huang Location Tracking in a Wireless Sensor
Network by Mobile Agents and Its Data
Fusion Strategies . . . . . . . . . . . 448--460
Georgia Koloniari and
Evaggelia Pitoura Filters for XML-based Service Discovery
in Pervasive Computing . . . . . . . . . 461--474
Porlin Kang and
Cristian Borcea and
Gang Xu and
Akhilesh Saxena and
Ulrich Kremer and
Liviu Iftode Smart Messages: a Distributed Computing
Platform for Networks of Embedded
Systems . . . . . . . . . . . . . . . . 475--494
Dejan Raskovic and
Thomas Martin and
Emil Jovanov Medical Monitoring Applications for
Wearable Computing . . . . . . . . . . . 495--504
Gustavo Alonso Book Review: \booktitlePerspectives on
Web Services --- Applying SOAP, WSDL and
UDDI to Real-World Projects, by O.
Zimmermann and M. Tomlinson and S.
Peuser . . . . . . . . . . . . . . . . . 505--505
Luís C. Lamb Book Review: \booktitleLogics for
Emerging Applications of Databases,
edited by J. Chomicki and R. van der
Meyden and G. Saake . . . . . . . . . . 505--506
Javier Farreres De La Morena Book Review: \booktitleThe Functional
Approach to Data Management-Modeling,
Analyzing and Integrating Heterogeneous
Data, edited by P. M. D. Gray and L.
Kerschberg and P. J. H. King and A.
Poulovassilis . . . . . . . . . . . . . 506--507
Alok Mishra Book Review: \booktitleUML Xtra-Light
--- How to Specify Your Software
Requirements, by M. Kratochvíl and B.
McGibbon . . . . . . . . . . . . . . . . 507--507
Luis M. Contreras Book Review: \booktitleData Networks, IP
and the Internet: Protocols, Design and
Operation, by M. P. Clark . . . . . . . 507
Anonymous Capsule Reviews . . . . . . . . . . . . 509--510
Luigi Catuogno and
Ivan Visconti An Architecture for Kernel-Level
Verification of Executables at Run Time 511--526
Kamilla Klonowska and
Lars Lundberg and
Håkan Lennerstad and
Magnus Broberg Comparing the Optimal Performance of
Parallel Architectures . . . . . . . . . 527--544
N. Glinos and
D. B. Hoang and
C. Nguyen and
A. Symvonis Video-on-Demand Based on
Delayed-Multicast: Algorithmic Support 545--559
Hsung-Pin and
Chang and
Ray-I Chang and
Wei-Kuan Shih and
Ruei-Chuan Chang Cache-Aware Real-Time Disk Scheduling 560--578
Chia-Mei Chen and
Huey-Min Sun and
LihChyun Shu Optimizing Object-based Multimedia
Delivery Across Bandwidth Constrained
Networks . . . . . . . . . . . . . . . . 579--590
Anna Formica Legality of XML-Schema Type Hierarchies 591--601
Shan-Tai Chen and
Shun-Shii Lin Optimal Algorithms for $2 \times n$
Mastermind Games --- a Graph-Partition
Approach . . . . . . . . . . . . . . . . 602--611
James F. Korsh and
Paul S. LaFollette Loopless Array Generation of Multiset
Permutations . . . . . . . . . . . . . . 612--621
Nigel Phillips Book Review: \booktitleMobile
Communications, by Jochen Schiller . . . 622--622
Isa Servan Uzun Book Review: \booktitleCryptographic
Security Architecture --- Design and
Verification, by Peter Gutmann . . . . . 622--623
Satish K. Sehgal Book Review: \booktitleUnderstanding
Agent Systems, by Mark d'Inverno and
Michael Luck . . . . . . . . . . . . . . 623--623
Lin-Yi Wu Corrigendum: ``WGSN: WLAN-based GPRS
Support Node with Push Mechanism'' . . . 624--624
Anonymous Capsule Reviews . . . . . . . . . . . . 625--626
Zhihong Zuo and
Mingtian Zhou Some Further Theoretical Results about
Computer Viruses . . . . . . . . . . . . 627--633
Andrea Bondavalli and
Roberto Filippini Modeling and Analysis of a Scheduled
Maintenance System: a DSPN Approach . . 634--650
José De Oliveira Guimar The Green Language Exception System . . 651--661
Hui Wang and
David Bell Extended $k$-Nearest Neighbours based on
Evidence Theory . . . . . . . . . . . . 662--672
Byung Suk Lee and
Li Chen and
Jeff Buzas and
Vinod Kannoth Regression-Based Self-Tuning Modeling of
Smooth User-Defined Function Costs for
an Object-Relational Database Management
System Query Optimizer . . . . . . . . . 673--693
Ling Chen and
Yi Pan and
Yixin Chen and
Xiao-hua Xu Efficient Parallel Algorithms for
Euclidean Distance Transform . . . . . . 694--700
Hsien-Wen Tseng and
Chin-Chen Chang A Branch-and-Bound Algorithm for the
Construction of Reversible Variable
Length Codes . . . . . . . . . . . . . . 701--707
David G. Elliman and
Sherin M. Youssef A New Intelligent Agent-based Strategy
for Constrained Multiple Destination
Routing Problems . . . . . . . . . . . . 708--727
Alok Mishra Book Review: \booktitleSoftware Quality
Assurance --- From Theory to
Implementation, by D. Galin . . . . . . 728--728
B. Kelleher Book Review: \booktitleShaping the IT
Organization: The Impact of Outsourcing
and the New Business Model, by I. Gouge 728--729
Anonymous Capsule Reviews . . . . . . . . . . . . 1--3
Vladimir B. Balakirsky Hashing of Databases with the Use of
Metric Properties of the Hamming Space 4--16
Andrew Rae and
Colin Fidge Information Flow Analysis for
Fail-Secure Devices . . . . . . . . . . 17--26
Hung-Yu Chien and
Ren-Chiun Wang and
Chou-Chen Yang Note on Robust and Simple Authentication
Protocol . . . . . . . . . . . . . . . . 27--29
Wei Yi Liu and
Ning Song and
Hong Yao Temporal Functional Dependencies and
Temporal Nodes Bayesian Networks . . . . 30--41
Andrew McGettrick and
Roger Boyle and
Roland Ibbett and
John Lloyd and
Gillian Lovegrove and
Keith Mander Grand Challenges in Computing: Education
--- a Summary . . . . . . . . . . . . . 42--48
Tony Hoare and
Robin Milner Grand Challenges for Computing Research 49--52
Chung-Ming Huang and
Tz-Heng Hsu A Resource Exchange Architecture for
Peer-to-Peer File Sharing Applications 53--71
Jean-Pierre Ebert and
Daniel Hollos and
Holger Karl and
Marc Löbbers Does Multi-Hop Communication Reduce
Electromagnetic Exposure? . . . . . . . 72--83
Kam-Yiu Lam and
BiYu Liang and
ChuanLin Zhang On Using Handoff Statistics and Velocity
for Location Management in Cellular
Wireless Networks . . . . . . . . . . . 84--100
Guang-Ho Cha The Segment-Page Indexing Method for
Large Multidimensional Queries . . . . . 101--114
Brian J. D'Auriol and
Rajesh Molakaseema A Parameterized Linear Array with a
Reconfigurable Pipelined Bus System:
LARPBS(p) . . . . . . . . . . . . . . . 115--125
Alison Holt Book Review: \booktitleMOF, A Pocket
Guide-IT Service Operations Management,
by D. Pultorak, P. Quagliarello, R.
Akker and J. van Bon . . . . . . . . . . 126--126
Vladimir Geroimenko Book Review: \booktitleA Semantic Web
Primer, by G. Antoniou and F. van
Harmelen . . . . . . . . . . . . . . . . 126--126
Capsule reviews Capsule Reviews . . . . . . . . . . . . 127--129
Mercedes Gómez-Albarrán The Teaching and Learning of
Programming: a Survey of Supporting
Software Tools . . . . . . . . . . . . . 130--144
Fred Piper Turing Lecture: Cyberworld Security ---
the Good, the Bad and the Ugly . . . . . 145--156
Florentin Ipate On the Minimality of Finite Automata and
Stream X-machines for Finite Languages 157--167
Chin-Chen Chang and
Chih-Yang Lin Perfect Hashing Schemes for Mining
Association Rules . . . . . . . . . . . 168--179
Valentin E. Brimkov and
Reneta P. Barneva Analytical Honeycomb Geometry for Raster
and Volume Graphics . . . . . . . . . . 180--199
Ghada Hany Badr and
B. John Oommen Self-Adjusting of Ternary Search Tries
Using Conditional Rotations and
Randomized Heuristics . . . . . . . . . 200--219
Antonio Corral and
Michael Vassilakopoulos On Approximate Algorithms for
Distance-Based Queries using R-trees . . 220--238
Sébastien Cantarell and
Ajoy K. Datta and
Franck Petit and
Vincent Villain Group Mutual Exclusion in Token Rings 239--252
Peter Mares Book Review: \booktitleArt of Java Web
Development, by N. Ford . . . . . . . . 253--253
Anonymous Acknowledgement of Referees . . . . . . 254--256
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 257--258
K. Subramani A Comprehensive Framework for Specifying
Clairvoyance, Constraints and
Periodicity in Real-Time Scheduling . . 259--272
Güray Yilmaz and
Nadia Erdogan DCOBE: Distributed Composite
Object-Based Environment . . . . . . . . 273--291
Alexander Thomasian and
Chunqi Han Affinity-Based Routing in Zoned Mirrored
Disks . . . . . . . . . . . . . . . . . 292--299
Atakan Dogan and
Füsun Özgüner Biobjective Scheduling Algorithms for
Execution Time--Reliability Trade-off in
Heterogeneous Computing Systems . . . . 300--314
S. Perkins and
D. H. Smith Robust Data Compression: Variable Length
Codes and Burst Errors . . . . . . . . . 315--322
Aad P. A. van Moorsel Grid, Management and Self-Management . . 325--332
Mohammed H. Haji and
Iain Gourlay and
Karim Djemame and
Peter M. Dew A SNAP-Based Community Resource Broker
Using a Three-Phase Commit Protocol: a
Performance Study . . . . . . . . . . . 333--346
D. P. Spooner and
J. Cao and
S. A. Jarvis and
L. He and
G. R. Nudd Performance-Aware Workflow Management
for Grid Computing . . . . . . . . . . . 347--357
Andrew Stephen McGough and
Ali Afzal and
John Darlington and
Nathalie Furmento and
Anthony Mayer and
Laurie Young Making the Grid Predictable through
Reservations and Performance Modelling 358--368
A. Benoit and
M. Cole and
S. Gilmore and
J. Hillston Scheduling Skeleton-Based Grid
Applications Using PEPA and NWS . . . . 369--378
Nigel Thomas Editorial: Grid Performability . . . . . 323--324
Paul Hulse Review: \booktitleBeowulf Cluster
Computing with Linux, Second Edition . . 379--380
Haoyang Che Review: \booktitleFrom P2P to Web
Services and Grids: Peers in a
Client/Server World . . . . . . . . . . 379
Fionn Murtagh Editorial . . . . . . . . . . . . . . . 381
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 382--384
Jane Hillston Tuning Systems: From Composition to
Performance . . . . . . . . . . . . . . 385--400
Mónica Pinto and
Lidia Fuentes and
José María Troya A Dynamic Component and Aspect-Oriented
Platform . . . . . . . . . . . . . . . . 401--420
R. M. Hierons and
M. Harman and
C. J. Fox Branch-Coverage Testability
Transformation for Unstructured Programs 421--436
Hyung-Kyu Choi and
Yoo C. Chung and
Soo-Mook Moon Java Memory Allocation with Lazy Worst
Fit for Small Objects . . . . . . . . . 437--442
Santanu Chattopadhyay Area Conscious State Assignment with
Flip-Flop and Output Polarity Selection
for Finite State Machine Synthesis --- a
Genetic Algorithm Approach . . . . . . . 443--450
Lieven Eeckhout and
Yue Luo and
Koen De Bosschere and
Lizy K. John BLRL: Accurate and Efficient Warmup for
Sampled Processor Simulation . . . . . . 451--459
Paul O'Neill and
Karl Fraser and
Zidong Wang and
Paul Kellam and
Joost N. Kok and
Xiaohui Liu Pyramidic Clustering of Large-Scale
Microarray Images . . . . . . . . . . . 466--479
Yuh-Min Tseng A Robust Multi-Party Key Agreement
Protocol Resistant to Malicious
Participants . . . . . . . . . . . . . . 480--487
James F. Korsh Generating $T$-ary Trees in Linked
Representation . . . . . . . . . . . . . 488--497
Nikolaj A. Kuznetsov The Science of Infocommunications . . . 460--465
Daniel O'Leary Review: \booktitleOntologies: A Silver
Bullet for Knowledge Management and
Electronic Commerce . . . . . . . . . . 498
Yi Pan Review: \booktitleActive Services:
Concepts, Architecture and
Implementation . . . . . . . . . . . . . 498--499
J. Sethuraman Review: \booktitleNetwork Recovery:
Protection and Restoration of Optical,
SONET-SDH, IP, and MPLS . . . . . . . . 499--500
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 501
Marios C. Angelides Editorial: Working with Multimedia
Standards: MPEG-7, MPEG-21 and H.264 . . 502--503
Hari Kalva and
Borko Furht Complexity Estimation of the H.264 Coded
Video Bitstreams . . . . . . . . . . . . 504--513
Herbert Van de Sompel and
Jeroen Bekaert and
Xiaoming Liu and
Luda Balakireva and
Thorsten Schwander aDORe: a Modular, Standards-Based
Digital Object Repository . . . . . . . 514--535
William Grosky and
Nilesh Patel and
Xin Li and
Farshad Fotouhi Dynamically Emerging Semantics in an
MPEG-7 Image Database . . . . . . . . . 536--544
Harry Agius and
Marios C. Angelides COSMOS-7: Video-Oriented MPEG-7 Scheme
for Modelling and Filtering of Semantic
Content . . . . . . . . . . . . . . . . 545--562
Anastasis Sofokleous Review: \booktitleH.264 and MPEG-4 Video
Compression: Video Coding for
Next-generation Multimedia . . . . . . . 563
Minaz Parmar Review: \booktitleDistributed Multimedia
Database Technologies Supported by
MPEG-7 and MPEG-21 . . . . . . . . . . . 563--564
Elizabeth Scott and
Adrian Johnstone Generalized Bottom Up Parsers With
Reduced Stack Activity . . . . . . . . . 565--587
Xinmin Tian and
Milind Girkar and
Aart Bik and
Hideki Saito Practical Compiler Techniques on
Efficient Multithreaded Code Generation
for OpenMP Programs . . . . . . . . . . 588--601
René Meier and
Vinny Cahill Taxonomy of Distributed Event-Based
Programming Systems . . . . . . . . . . 602--626
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 627--629
J. Djordjevic and
B. Nikolic and
M. Mitrovic A Memory System for Education . . . . . 630--641
Leonid A. Levin Aperiodic Tilings: Breaking
Translational Symmetry . . . . . . . . . 642--645
Martin Campbell-Kelly Celebration of David Wheeler
(1927--2004) . . . . . . . . . . . . . . 646--648
David W. Barron David Wheeler: a Personal Memoir . . . . 650--651
Lefteris Moussiades and
Athena Vakali PDetect: a Clustering Approach for
Detecting Plagiarism in Source Code
Datasets . . . . . . . . . . . . . . . . 651--661
Charlie Daly and
Jane Horgan A Technique for Detecting Plagiarism in
Computer Code . . . . . . . . . . . . . 662--666
Fei He and
Ming Gu and
Xiaoyu Song and
Zhiwei Tang and
Guowu Yang and
Lerong Cheng Probabilistic Estimation for Routing
Space . . . . . . . . . . . . . . . . . 667--676
Dana Shapira and
James A. Storer In Place Differential File Compression 677--691
Li Jiao and
To-Yat Cheung and
Weiming Lu Handling Synchronization Problem in
Petri Net-Based System Design by
Property-Preserving Transition-Reduction 692--701
Alexander Thomasian Clustered RAID Arrays and Their Access
Costs . . . . . . . . . . . . . . . . . 702--713
Manuel Torres and
José Samos A Methodology to Define External Schemas
in ODMG Databases . . . . . . . . . . . 714--736
Sebastian Danicic and
Chris Fox and
Mark Harman and
Rob Hierons and
John Howroyd and
Michael R. Laurence Static Program Slicing Algorithms are
Minimal for Free Liberal Program Schemas 737--748
T. M. Chan and
K. F. Man and
K. S. Tang and
S. Kwong A Jumping Gene Algorithm for
Multiobjective Resource Management in
Wideband CDMA Systems . . . . . . . . . 749--768
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1--3
Robert M. Colomb Formal versus Material Ontologies for
Information Systems Interoperation in
the Semantic Web . . . . . . . . . . . . 4--19
Duncan Martin and
Helen Ashman Atomic Hypermedia . . . . . . . . . . . 20--31
Jixin Ma and
Pat Hayes Primitive Intervals versus Point-Based
Intervals: Rivals or Allies? . . . . . . 32--41
Gianluca Dini and
Giuseppe Lettieri and
Lanfranco Lopriore Caching and prefetching algorithms for
programs with looping reference patterns 42--61
Nikos A. Lorentzos and
Jose R. R. Viqueira Relational Formalism for the Management
of Spatial Data . . . . . . . . . . . . 62--81
Miguel Correia and
Nuno Ferreira Neves and
Paulo Veríssimo From Consensus to Atomic Broadcast:
Time-Free Byzantine-Resistant Protocols
without Signatures . . . . . . . . . . . 82--96
S. Cimato and
R. De Prisco and
A. De Santis Probabilistic Visual Cryptography
Schemes . . . . . . . . . . . . . . . . 97--107
Alexei Vernitski Can Unbreakable Mean Incomputable? . . . 108--112
Pablo H. Ibargüengoytia and
Sunil Vadera and
L. Enrique Sucar A Probabilistic Model for Information
and Sensor Validation . . . . . . . . . 113--126
Jaime Gomez Book Review: Stefano Ceri, Piero
Fraternali, Aldo Bongio, Marco
Brambilla, Sara Comai and Maristella
Matera, \booktitleDesigning
Data-Intensive Web Applications, Morgan
Kaufmann Publishers (2003). ISBN
1-55860-843-5. \$59.95/ 58.90. 562 pp.
Softbound} . . . . . . . . . . . . . . . 127
Lech Polkowski Book Review: Una-May O'Reilly, Tina Yu,
Rick Riolo and Bill Worzel (eds),
\booktitleGenetic Programming Theory and
Practice II, Springer Science+Business
Media, Inc. (2005). ISBN 0-387-23253-2.
\$129.00. 320 pp. Hardbound} . . . . . . 127--128
Mark Levene Book Review: A. Spink and B. J. Jansen,
\booktitleWeb Search: Public Searching
of the Web. Information Science &
Knowledge Management, Vol. 6. Kluwer
Academic Publishers (2004). ISBN
1-4020-2268-9. 100. 199 pp. Hardcover 128--129
Anas N. Al-Rabadi Book Review: Lee Spector,
\booktitleAutomatic Quantum Computer
Programming: A Genetic Programming
Approach, Kluwer Academic Publishers
(2004). ISBN 1-4020-7894-3. 153 pp . . . 129--130
Felice Cardone Book Review: Benjamin C. Pierce (ed.),
\booktitleAdvanced Topics in Types and
Programming Languages, The MIT Press
(2005) ISBN 0-262-16228-8. \pounds
39.95. 574 pp. Hardbound . . . . . . . . 130--131
Iman Hafiz Poernomo Book Review: Yves Bertot and Pierre
Castéran, \booktitleInteractive Theorem
Proving and Program Development
(Coq'Art: The Calculus of Inductive
Constructions). Texts in Theoretical
Computer Science. An EATCS Series.
(2004). ISBN 3-540-20854-2. 469pp.
Hardcover . . . . . . . . . . . . . . . 130--131
Anonymous Capsule Reviews . . . . . . . . . . . . 133--133
Fionn Murtagh Editorial . . . . . . . . . . . . . . . 134--135
Erol Gelenbe Editorial: Building Adaptivity into
Computer Networks . . . . . . . . . . . 136--136
Gerardo Rubino and
Martín Varela and
Jean-Marie Bonnin Controlling Multimedia QoS in the Future
Home Network Using the PSQA Metric . . . 137--155
Jeremy Pitt and
Lloyd Kamara and
Marek Sergot and
Alexander Artikis Voting in Multi-Agent Systems . . . . . 156--170
Ricardo Lent Design of a MANET Testbed Management
System . . . . . . . . . . . . . . . . . 171--179
András György and
György Ottucsák Adaptive Routing Using Expert Advice . . 180--189
Taskin Kocak A Hybrid Network Processor with Support
for High-Speed Execution of CPN and
Upper Layer IP Protocols . . . . . . . . 190--200
M. Amor and
M. Bóo and
E. J. Padrón and
D. Bartz Hardware Oriented Algorithms for
Rendering Order-Independent Transparency 201--210
Kostas Bousias and
Nabil Hasasneh and
Chris Jesshope Instruction Level Parallelism through
Microthreading --- a Scalable Approach
to Chip Multiprocessors . . . . . . . . 211--233
C. Bernardeschi and
G. Lettieri and
L. Martini and
P. Masci Using Control Dependencies for
Space-Aware Bytecode Verification . . . 234--248
Mark Burgin Book Review: Juraj Hromkovi\vc, Design
and Analysis of Randomized Algorithms:
Introduction to Design Paradigms.
Series: Texts in Theoretical Computer
Science. An EATCS Series. Springer
(2005). ISBN 3-540-23949-9. \pounds
30.50/\pounds 39.95/\$49.95. 274 pp.
Hardbound} . . . . . . . . . . . . . . . 249--250
Mostafa Azizi Book Review: John Hunt and Chris Loftus,
Guide to J2EE: Enterprise Java. Series
Springer Professional Computing.
Springer (2003). ISBN 1-85233-704-4.
\$79.95\slash \pounds 45.00\slash
\pounds 69.95. 672 pp} . . . . . . . . . 250--251
Pierre Castéran Book Review: Iman Hafiz Poernomo, John
Newsome Crossley and Martin Wirsing,
\booktitleAdapting Proofs-as-Programs
--- The Curry--Howard Protocol. Springer
(2005). ISBN 0-387-23759-3.
\$79.95/\pounds 50.00/ 64.95. 420 pp.
Hardbound} . . . . . . . . . . . . . . . 251--252
Ronald Morrison Book Review: K. C. Tan, E. F. Khor and
T. H. Lee, Multiobjective Evolutionary
Algorithms and Applications. Series:
Advanced Information & Knowledge
Processing. Springer-Verlag (2005). ISBN
1-85233-836-9. \$89.95\slash
\$99.95/\pounds 50.00. 295 pp. Hardbound 252--253
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 255--257
Mehmet Savsar and
Fawaz S. Al-Anzi Reliability of Data Allocation on a
Centralized Service Configuration with
Distributed Servers . . . . . . . . . . 258--267
Alain Cournier and
Stéphane Devismes and
Franck Petit and
Vincent Villain Snap-Stabilizing Depth-First Search on
Arbitrary Networks . . . . . . . . . . . 268--280
Apostolos N. Papadopoulos and
Alexandros Nanopoulos and
Yannis Manolopoulos Processing Distance Join Queries with
Constraints . . . . . . . . . . . . . . 281--296
Moses Reuven and
Yair Wiseman Medium-Term Scheduler as a Solution for
the Thrashing Effect . . . . . . . . . . 297--309
Goichiro Hanaoka and
Junji Shikata and
Yumiko Hanaoka and
Hideki Imai Unconditionally Secure Anonymous
Encryption and Group Authentication . . 310--321
Javier Herranz Deterministic Identity-Based Signatures
for Partial Aggregation . . . . . . . . 322--330
Karnig Derderian and
Robert M. Hierons and
Mark Harman and
Qiang Guo Automated Unique Input Output Sequence
Generation for Conformance Testing of
FSMs . . . . . . . . . . . . . . . . . . 331--344
Per Martin-Löf 100 years of Zermelo's Axiom of Choice:
what was the problem with it? . . . . . 345--350
James F. Korsh Skarbek's Algorithm for $t$-Ary Trees 351--357
Sung Eun Bae and
Tadao Takaoka Improved Algorithms for the $K$-Maximum
Subarray Problem . . . . . . . . . . . . 358--374
Ricardo Jasinski Book Review: S. Ivarama and P. D.
Andamudi, \booktitleGuide to RISC
Processors for Programmers and
Engineers, Springer-Verlag (2005). ISBN
0-387-21017-2. \pounds 36.00, US\$46.95,
US\$59.95. 387 pp. Hardbound . . . . . . 375
George Pallis Book Review: Robert J. Glushko and T.
Im. McGrath, \booktitleDocument
Engineering --- Analyzing and Designing
Document for Business Informatics and
Web Services. The MIT Press (2005). ISBN
0-262-07261-0 . \pounds 21.95. 703 pp.
Hardbound . . . . . . . . . . . . . . . 376
Athena Vakali Book Review: S. Bressan, S. Ceri, E.
Hunt, Z. G. Ives, Z. Bellahséne, M. Rys
and R. Unland, \booktitle(EDS) Database
and XML Technologies. Third
International XML Database Symposium,
XSym 2005, Trondheim, Norway, August
28--29, 2005, Proceedings. Series:
Lecture Notes in Computer Science, Vol.
3671. Springer-Verlag (2005). ISBN
3-540-28583-0. 44.94/\pounds
32.50/US\$58.00. 236 pp. Softbound}} . . 376--377
Anonymous Acknowledgement of Referees: Reviewers
who have agreed to review between 1
January 2005 and 31 December 2005 for
\booktitleThe Computer Journal . . . . . 378--380
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 381--382
Robin Milner Ubiquitous Computing: Shall we
Understand It? . . . . . . . . . . . . . 383--389
Anonymous Discussion on Robin Milner's First
\booktitleComputer Journal Lecture:
Ubiquitous Computing: Shall We
Understand It? . . . . . . . . . . . . . 390--399
Chung-Ming Huang and
Ching-Hsien Tsai and
Ming-Chi Tsai Design and Implementation of Video
Streaming Hot-plug between Wired and
Wireless Networks Using SCTP . . . . . . 400--417
T. Y. Wong and
K. T. Law and
John C. S. Lui and
M. H. Wong An Efficient Distributed Algorithm to
Identify and Traceback DDoS Traffic . . 418--442
Barry Doyle and
Stuart Bell and
Alan F. Smeaton and
Kealan McCusker and
Noel E. O'Connor Security Considerations and Key
Negotiation Techniques for Power
Constrained Sensor Networks . . . . . . 443--453
Juan Fernández and
Eitan Frachtenberg and
Fabrizio Petrini and
José-Carlos Sancho An Abstract Interface for System
Software on Large-Scale Clusters . . . . 454--469
Daniel Yuh Chao Computation of Elementary Siphons in
Petri Nets For Deadlock Control . . . . 470--479
Alan Bundy A Very Mathematical Dilemma . . . . . . 480--486
Patrick Martin and
Wendy Powley and
Xiaoyi Xu and
Wenhu Tian Automated Configuration of Multiple
Buffer Pools . . . . . . . . . . . . . . 487--499
Keith Duddy Book Review: Kevin Lano, Advanced
Systems Design with Java, UML and MDA.
Elsevier (2005). ISBN 0-7506-6496-7.
\pounds 27.99/US\$44.95. 378 pp.
Softbound} . . . . . . . . . . . . . . . 500--501
Judit Bar-Ilan Book Review: Mark Levene, An
Introduction to Search Engines and Web
Navigation. Addison Wesley, Pearson
Education (2006). ISBN 0-321-30677-5.
\pounds 39.99. 365 pp. Softbound . . . . 500
George Pallis Book Review: Xiaofang Zhou, Stanley Su,
Mike P. Papazoglou, Maria E. Orlowska
and Keith G. Jeffery, Web Information
Systems Engineering --- WISE 2004.
Springer-Proceedings Series: Lecture
Notes in Computer Science, Vol. 3306
(2004). ISBN 3-540-23894-8. \pounds
34.55/US\$117.00. 745 pp. Softbound} . . 501
Mark Burgin Book Review: Kimiz Dalkir, Knowledge
Management in Theory and Practice.
Butterworth Heinemann (2005). ISBN
0-7506-7864-X. EUR 44.95/\$49.95\slash
\pounds 29.99. 368 pp. Hardbound} . . . 501--503
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 505--506
Ing-Ray Chen and
Bojan Cukic High Assurance Software Systems . . . . 507--508
Jinchun Xia and
Carl K. Chang and
Jeff Wise and
Yujia Ge An Empirical Performance Study on PSIM 509--526
Guohui Li and
LihChyun Shu Design and Evaluation of a Low-Latency
Checkpointing Scheme for Mobile
Computing Systems . . . . . . . . . . . 527--540
Qizhi Ye and
Yu Lei and
David Kung A Blocking-based Approach to Protocol
Validation . . . . . . . . . . . . . . . 541--553
Engin Kirda and
Christopher Kruegel Protecting Users against Phishing
Attacks . . . . . . . . . . . . . . . . 554--561
José Luis Sierra and
Alfredo Fernández-Valmayor and
Baltasar Fernández-Manjón A Document-Oriented Paradigm for the
Construction of Content-Intensive
Applications . . . . . . . . . . . . . . 562--584
Tiziana Calamoneri The $L(h,k)$-Labelling Problem: a Survey
and Annotated Bibliography . . . . . . . 585--608
Alexander Thomasian and
Lijuan Zhang The Stepwise Dimensionality Increasing
(SDI) Index for High-Dimensional Data 609--618
Apostolos Syropoulos Fuzzifying $P$ Systems . . . . . . . . . 619--628
Ali Mahdoum Book Review: Franz Rothlauf,
Representations for Genetic and
Evolutionary Algorithms. Springer-Verlag
(2006, second edition). ISBN
3-540-25059-X. \$103.95/\$129.00/\pounds
77.00. 325 pp. Hardbound . . . . . . . . 629
Boran Gazi Book Review: W. Van Wezel, R. J. Jorna
and A. M. Meystel, Planning in
Intelligent Systems: Aspects,
Motivations, and Methods. John Wiley and
Sons, Inc. (2006). ISBN 0-471-73427-6.
\pounds 64.95/ 91.70/US \$110.00. 592
pp. Hardbound} . . . . . . . . . . . . . 629--630
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 631--633
Yi-Sheng Huang Design of Traffic Light Control Systems
Using Statecharts . . . . . . . . . . . 634--649
Frank Land Leo II and the Model T Ford . . . . . . 650--656
J. Rissanen The Structure Function and
Distinguishable Models of Data . . . . . 657--664
D. Den Hertog and
P. B. Hulshof Solving Rummikub Problems by Integer
Linear Programming . . . . . . . . . . . 665--669
Alexander Thomasian and
Lijuan Zhang Persistent Semi-Dynamic Ordered
Partition Index . . . . . . . . . . . . 670--684
Samir M. Koriem Development, Analysis and Evaluation of
Performance Models for Mobile
Multi-Agent Networks . . . . . . . . . . 685--709
Vlad Rusu Verifying an ATM Protocol Using a
Combination of Formal Techniques . . . . 710--730
Betul Demiroz and
Haluk Rahmi Topcuoglu Static Task Scheduling with a Unified
Objective on Time and Resource Domains 731--743
Carlos A. G. Assis and
Edil S. T. Fernandes and
Valmir C. Barbosa Modeling the Input History of Programs
for Improved Instruction-Memory
Performance . . . . . . . . . . . . . . 744--761
Klaus Schneider Book Review: R. Kurki-Suonio,
\booktitleA Practical Theory of Reactive
Systems. Springer-Verlag (2005). ISBN
3-540-23342-3. 49.95/\pounds 38.50. 418
pp. Hardbound . . . . . . . . . . . . . 762
Marc L. Smith Book Review: Mark Burgin,
\booktitleSuper-Recursive Algorithms.
Series: Monographs in Computer Science.
Springer-Verlag (2005). ISBN
0-387-95569-0. \$79.95\slash \pounds
61.50. 304 pp. Hardbound} . . . . . . . 762--763
Elizabeth Harrin and
MBCS Book Review: Robert S Coble and Shel
Israel, \booktitleNaked Conversations:
How Blogs are Changing the Way
Businesses Talk with Customers, John
Wiley & Sons (2006). ISBN 0-471-74719-X.
\pounds 16.99. 251 pp. Hardcover . . . . 764
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1--3
Anonymous Editorial on the Occasion of Volume 50
of \booktitleThe Computer Journal . . . 4--6
Zhongqiang Chen and
Zhongrong Chen and
Alex Delis An Inline Detection and Prevention
Framework for Distributed Denial of
Service Attacks . . . . . . . . . . . . 7--40
Yuh-Min Tseng A secure authenticated group key
agreement protocol for resource-limited
mobile devices . . . . . . . . . . . . . 41--52
Rachid Guerraoui and
Michel Raynal The Alpha of Indulgent Consensus . . . . 53--67
Kil Hong Joo and
Won Suk Lee An Adaptive Materialization Method for
Globally Optimized Query Evaluation in a
Hierarchical Mediator System . . . . . . 68--80
Hooman Nikmehr and
Braden Phillips and
Cheng-Chew Lim A Fast Radix-4 Floating-Point Divider
with Quotient Digit Selection by
Comparison Multiples . . . . . . . . . . 81--92
Ralf Gitzel and
Ingo Ott and
Martin Schader Ontological Extension to the MOF
Metamodel as a Basis for Code Generation 93--115
Jesús M. Almendros-Jiménez and
Luis Iribarne Describing Use-Case Relationships with
Sequence Diagrams . . . . . . . . . . . 116--128
Elizabeth Harrin Book Review: Susan Snedaker, IT Security
Project Management Handbook. Syngress
(2006). ISBN 1-59749-076-8.
47.95/\pounds 32.99/\$59.95. 612 pp.
Softbound} . . . . . . . . . . . . . . . 129
Lutz Schröder Book Review: L. M. G. Feijs and H. B. M.
Jonkers, \booktitleFormal Specification
and Design. Cambridge University Press
(2005). ISBN-13 978-0-521-43592-5,
ISBN-10 0-521-43592-7. \pounds
29.00/\$50.00. Softbound} . . . . . . . 129--130
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 131--133
Roland Rüdiger Quantum Programming Languages: An
Introductory Overview . . . . . . . . . 134--150
Alexander Gammerman and
Vladimir Vovk Hedging Predictions in Machine Learning:
The Second \booktitleComputer Journal
Lecture . . . . . . . . . . . . . . . . 151--163
Anonymous Discussion on ``Hedging Predictions in
Machine Learning'' by A. Gammerman and
V. Vovk . . . . . . . . . . . . . . . . 164--172
Alexander Gammerman and
Vladimir Vovk Rejoinder: ``Hedging Predictions in
Machine Learning'' . . . . . . . . . . . 173--177
A. Bakalis and
C. S. Iliopoulos and
C. Makris and
S. Sioutas and
E. Theodoridis and
A. Tsakalidis and
K. Tsichlas Locating Maximal Multirepeats in
Multiple Strings Under Various
Constraints . . . . . . . . . . . . . . 178--185
Abdelrahman Amer and
B. J. Oommen A Novel Framework for Self-Organizing
Lists in Environments with Locality of
Reference: Lists-on-Lists . . . . . . . 186--196
Doina Bein and
Ajoy K. Datta and
Vincent Villain Self-Stabilizing Local Routing in Ad Hoc
Networks . . . . . . . . . . . . . . . . 197--203
Sheng-Tzong Cheng and
Ming-Hung Tao A Scheduling-Based Medium Access Control
Protocol for Supporting Multi-class
Services in Wireless Networks . . . . . 204--216
Alexander Thomasian and
Gang Fu and
Spencer W. Ng Analysis of Rebuild Processing in RAID5
Disk Arrays . . . . . . . . . . . . . . 217--231
Paul Cockshott and
Greg Michaelson Are There New Models of Computation?
Reply to Wegner and Eberbach . . . . . . 232--247
Ricardo Jasinski Fault-Tolerance Techniques for
SRAM-Based FPGAs . . . . . . . . . . . . 248
Carlos Caldeira The Microsoft Data Warehouse Toolkit . . 249
Marino Segnan Web Data Management Practices ---
Emerging Techniques and Technologies . . 249--250
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 251--253
Tony Hoare The Ideal of Program Correctness: Third
\booktitleComputer Journal Lecture . . . 254--260
Anonymous Discussion on ``The Ideal of Program
Correctness'' by Tony Hoare . . . . . . 261--268
Anonymous Discussion on ``The Ideal of Program
Correctness'': Responses from Tony Hoare 269--273
Chris Mairs Inclusion and Exclusion in the Digital
World: Turing Lecture 2006 . . . . . . . 274--280
Ing-Ray Chen and
Weiping He and
Baoshan Gu Proxy-based Regional Registration for
Integrated Mobility and Service
Management in Mobile IP Systems . . . . 281--293
H. M. W. Verbeek and
W. M. P. van der Aalst and
A. H. M. ter Hofstede Verifying Workflows with Cancellation
Regions and OR-joins: An Approach Based
on Relaxed Soundness and Invariants . . 294--314
Monika Kapus-Kolar Testing as Collecting of Evidence: An
Integrated Approach to Test Generation
for Finite State Machines . . . . . . . 315--331
Doina Bein and
Ajoy K. Datta and
Mehmet Hakan Karaata An Optimal Snap-Stabilizing Multi-Wave
Algorithm . . . . . . . . . . . . . . . 332--340
Tzong-Jye Liu and
Chia-Lin Lee State-Optimal Alternator for Uniform
Synchronous Rings . . . . . . . . . . . 341--347
George F. Georgakopoulos and
Kostas Politopoulos MAX-DENSITY Revisited: a Generalization
and a More Efficient Algorithm . . . . . 348--356
William Chung-Kung Yen Edge-Orienting on Split, Planar and
Treelike Graphs . . . . . . . . . . . . 357--368
Peter Grünwald Book Review: Christopher S. Wallace,
\booktitleStatistical and Inductive
Inference by Minimum Message Length,
Springer (2005). ISBN 038723795X.
\pounds 46.00. 432 pp. Hardbound . . . . 369--370
Mark Levene Artificial Intelligence for Games.
Series in Interactive $3$D Technology 371
Martinez-Gil Jorge Thinking on the Web: Berners-Lee, Gödel
and Turing . . . . . . . . . . . . . . . 371--372
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 373--374
Anonymous Karen Spärck Jones (1935--2007):
Professor (emeritus) of Computers and
Information, University of Cambridge . . 375--376
Ruqian Lu and
Zhi-Hua Zhou Guest Editorial to the Special Issue on
Advances of Artificial Intelligence and
Knowledge Engineering in China . . . . . 377
Wei Li R-Calculus: An Inference System for
Belief Revision . . . . . . . . . . . . 378--390
Sanjiang Li and
Bernhard Nebel Qualitative Spatial Representation and
Reasoning: a Hierarchical Approach . . . 391--402
Kaile Su and
Abdul Sattar and
Xiangyu Luo Model Checking Temporal Logics of
Knowledge Via OBDDs . . . . . . . . . . 403--420
Hongli Liang and
Jue Wang and
Yiyu Yao User-Oriented Feature Selection for
Machine Learning . . . . . . . . . . . . 421--434
Shan-Tai Chen and
Shun-Shii Lin and
Li-Te Huang A Two-Phase Optimization Algorithm For
Mastermind . . . . . . . . . . . . . . . 435--443
Roberto Baldoni and
Roberto Beraldi and
Leonardo Querzoni and
Antonino Virgillito Efficient Publish/Subscribe Through a
Self-Organizing Broker Overlay and its
Application to SIENA . . . . . . . . . . 444--459
Amit Thawani and
Srividya Gopalan and
V. Sridhar and
Krithi Ramamritham Context-aware Timely Information
Delivery in Mobile Environments . . . . 460--472
Vladimir M. Yanovsky and
Israel A. Wagner and
Alfred M. Bruckstein A Linear-Time Constant-Space Algorithm
for the Boundary Fill Problem . . . . . 473--477
E. Ancillotti and
R. Bruno and
M. Conti and
E. Gregori and
A. Pinizzotto A Layer-2 Framework for Interconnecting
Ad Hoc Networks to Fixed Internet:
Test-bed Implementation and Experimental
Evaluation . . . . . . . . . . . . . . . 478--499
Antonio Izquierdo Manzanares Professional Pen Testing for Web
Applications --- Programmer to
Programmer Series (P2P) . . . . . . . . 500
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 501--504
Dan C. Marinescu and
Gabriela M. Marinescu The Boole Lecture: Quantum Information:
a Glimpse at the Strange and Intriguing
Future of Information . . . . . . . . . 505--521
Mehran S. Fallah and
Ahmad R. Sharafat Service Availability in Concurrent
Systems --- Part I: a Theory of
Hierarchical Services of Interacting
Processes . . . . . . . . . . . . . . . 522--534
Mehran S. Fallah and
Ahmad R. Sharafat Service Availability in Concurrent
Systems --- Part II: Analysis and Case
Studies Using HSIP . . . . . . . . . . . 535--554
Der-Chiang Li and
Fengming M. Chang An In--Out Combined Dynamic Weighted
Round-Robin Method for Network Load
Balancing . . . . . . . . . . . . . . . 555--566
Mark Levene and
Judit Bar-Ilan Comparing Typical Opening Move Choices
Made by Humans and Chess Engines . . . . 567--573
Asep Juarna and
Vincent Vajnovszki Some Generalizations of a
Simion--Schmidt Bijection . . . . . . . 574--580
H. Ahrabian and
A. Nowzari-Dalini Parallel Generation of $t$-Ary Trees in
$A$-order . . . . . . . . . . . . . . . 581--588
Qiang Tang On The Security of a Group Key Agreement
Protocol . . . . . . . . . . . . . . . . 589--590
Kim-Kwang Raymond Choo A Proof of Revised Yahalom Protocol in
the Bellare and Rogaway (1993) Model . . 591--601
Ren-Junn Hwang and
Sheng-Hua Shiau Provably Efficient Authenticated Key
Agreement Protocol for Multi-Servers . . 602--615
Jaesung Lee and
Hyuk-Jae Lee and
Chanho Lee A High-Speed Link Layer Architecture for
Low Latency and Memory Cost Reduction 616--628
Fairouz Kamareddine Capsule reviews . . . . . . . . . . . . 629
Erol Gelenbe and
Andrew Tilbrook and
Richard Vinter Editorial: Introduction to the Special
Issue . . . . . . . . . . . . . . . . . 630--631
Robert Ghanea-Hercock and
E. Gelenbe and
Nicholas R. Jennings and
Oliver Smith and
David N. Allsopp and
Alex Healing and
Hakan Duman and
Simon Sparks and
Nishan C. Karunatillake and
Perukrishnen Vytelingum Hyperion --- Next-Generation Battlespace
Information Services . . . . . . . . . . 632--645
Asher Mahmood and
Philip M. Tudor and
William Oxford and
Robert Hansford and
James D. B. Nelson and
Nicholas G. Kingsbury and
Antonis Katartzis and
M. Petrou and
N. Mitianoudis and
T. Stathaki and
Alin Achim and
David Bull and
Nishan Canagarajah and
Stavri Nikolov and
Artur Loza and
Nedeljko Cvejic Applied Multi-Dimensional Fusion . . . . 646--659
Nikolaos Mitianoudis and
Tania Stathaki Joint Fusion and Blind Restoration for
Multiple Image Scenarios with Missing
Data . . . . . . . . . . . . . . . . . . 660--673
William Ng and
Jack Li and
Simon Godsill and
Sze Kim Pang Multitarget Initiation, Tracking and
Termination Using Bayesian Monte Carlo
Methods . . . . . . . . . . . . . . . . 674--693
Samuel M. Waldron and
John Patrick and
Phillip L. Morgan and
Sophia King Influencing Cognitive Strategy by
Manipulating Information Access . . . . 694--702
Paul R. Smart and
Alistair Russell and
Nigel R. Shadbolt and
m. c. schraefel and
Leslie A. Carr AKTiveSA: a Technical Demonstrator
System For Enhanced Situation Awareness 703--716
Gülay Öke and
Georgios Loukas A Denial of Service Detector based on
Maximum Likelihood Detection and the
Random Neural Network . . . . . . . . . 717--727
Imtiaz Ahmad and
A. Shoba Das Analysis and Detection of Errors in
Implementation of SHA-512 Algorithms on
FPGAs . . . . . . . . . . . . . . . . . 728--738
Chung-Ming Huang and
Jian-Wei Li Efficient and Provably Secure IP
Multimedia Subsystem Authentication for
UMTS . . . . . . . . . . . . . . . . . . 739--757
Jan Peters Computational Intelligence: Principles,
Techniques and Applications . . . . . . 758
Rodney G. Downey and
Michael R. Fellows and
Michael A. Langston \booktitleThe Computer Journal Special
Issue on Parameterized Complexity:
Foreword by the Guest Editors . . . . . 1--6
Falk Hüffner and
Rolf Niedermeier and
Sebastian Wernicke Techniques for Practical Fixed-Parameter
Algorithms . . . . . . . . . . . . . . . 7--25
Michael A. Langston and
Andy D. Perkins and
Arnold M. Saxton and
Jon A. Scharff and
Brynn H. Voy Innovative Computational Methods for
Transcriptomic Data Analysis: a Case
Study in the Use of FPT for Practical
Algorithm Design and Implementation . . 26--38
Jianer Chen and
Jie Meng On Parameterized Intractability:
Hardness and Completeness . . . . . . . 39--59
Dániel Marx Parameterized Complexity and
Approximation Algorithms . . . . . . . . 60--78
Jens Gramm and
Arfst Nickelsen and
Till Tantau Fixed-Parameter Algorithms in
Phylogenetics . . . . . . . . . . . . . 79--101
Leizhen Cai Parameterized Complexity of Cardinality
Constrained Optimization Problems . . . 102--121
Christian Sloper and
Jan Arne Telle An Overview of Techniques for Designing
Parameterized Algorithms . . . . . . . . 122--136
William Gasarch and
Keung Ma Kin Invitation to Fixed-Parameter Algorithms
--- Parameterized Complexity Theory ---
Parameterized Algorithmics: Theory,
Practice and Prospects . . . . . . . . . 137--140
Anonymous The Wilkes Best Paper Award in Volume 49
(2006) . . . . . . . . . . . . . . . . .
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 141--143
Hyeonsang Eom Information-Dynamics-Conscious
Development of Routing Software: a Case
of Routing Software that Improves
Link-State Routing Based on Future
Link-Delay-Information Estimation . . . 144--161
Ye Tian and
Di Wu and
Kam-Wing Ng On Distributed Rating Systems for
Peer-to-Peer Networks . . . . . . . . . 162--180
Manuel A. Martins On the Behavioral Equivalence Between
$k$-data Structures . . . . . . . . . . 181--191
Luk Van Ertvelde and
Filip Hellebaut and
Lieven Eeckhout Accurate and Efficient Cache Warmup for
Sampled Processor Simulation Through
NSL--BLRL . . . . . . . . . . . . . . . 192--206
Guowu Yang and
Xiaoyu Song and
William N. N. Hung and
Marek A. Perkowski Bi-Directional Synthesis of 4-Bit
Reversible Circuits . . . . . . . . . . 207--215
Keqin Li Average-Case Performance Analysis of
Online Non-Clairvoyant Scheduling of
Parallel Tasks with Precedence
Constraints . . . . . . . . . . . . . . 216--226
Silvio Croce and
Francesco Marcelloni and
Massimo Vecchio Reducing Power Consumption in Wireless
Sensor Networks Using a Novel Approach
to Data Aggregation . . . . . . . . . . 227--239
Anna Formica Similarity of XML-Schema Elements: a
Structural and Information Content
Approach . . . . . . . . . . . . . . . . 240--254
Hans L. Bodlaender and
Arie M. C. A. Koster Combinatorial Optimization on Graphs of
Bounded Treewidth . . . . . . . . . . . 255--269
Liming Cai and
Xiuzhen Huang and
Chunmei Liu and
Frances Rosamond and
Yinglei Song Parameterized Complexity and Biopolymer
Sequence Comparison . . . . . . . . . . 270--291
Erik D. Demaine and
MohammadTaghi Hajiaghayi The Bidimensionality Theory and Its
Algorithmic Applications . . . . . . . . 292--302
Georg Gottlob and
Stefan Szeider Fixed-Parameter Algorithms For
Artificial Intelligence, Constraint
Satisfaction and Database Problems . . . 303--325
Petr Hlineny and
Sang-il Oum and
Detlef Seese and
Georg Gottlob Width Parameters Beyond Tree-width and
their Applications . . . . . . . . . . . 326--362
Gregory Gutin and
Anders Yeo Some Parameterized Problems On Digraphs 363--371
Panos Giannopoulos and
Christian Knauer and
Sue Whitesides Parameterized Complexity of Geometric
Problems . . . . . . . . . . . . . . . . 372--384
Iris van Rooij and
Todd Wareham Parameterized Complexity in Cognitive
Modeling: Foundations, Applications and
Opportunities . . . . . . . . . . . . . 385--404
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 405--407
Azlan Iqbal Evaluation of Economy in a Zero-sum
Perfect Information Game . . . . . . . . 408--418
Hung-Yu Chien Selectively Convertible Authenticated
Encryption in the Random Oracle Model 419--434
José Raúl Romero and
José M. Troya and
Antonio Vallecillo Modeling ODP Computational
Specifications Using UML . . . . . . . . 435--450
Paul M. E. Shutler and
Seok Woon Sim and
Wei Yin Selina Lim Analysis of Linear Time Sorting
Algorithms . . . . . . . . . . . . . . . 451--469
D. Cavagnino and
A. E. Werbrouck Efficient Algorithms for Integer
Division by Constants Using
Multiplication . . . . . . . . . . . . . 470--480
J. L. Pastrana and
E. Pimentel and
M. Katrib Composition of Self-Adapting Components
for Customizable Systems . . . . . . . . 481--496
R. M. Hierons and
H. Ural The Effect of the Distributed Test
Architecture on the Power of Testing . . 497--510
Boleslaw K. Szymanski and
Gilbert G. Chen Computing with Time: From Neural
Networks to Sensor Networks . . . . . . 511--522
David L. Dowe Foreword re C. S. Wallace . . . . . . . 523--560
M. H. Brennan Data Processing in the Early Cosmic Ray
Experiments in Sydney . . . . . . . . . 561--565
Ray J. Solomonoff Three Kinds of Probabilistic Induction:
Universal Distributions and Convergence
Theorems . . . . . . . . . . . . . . . . 566--570
Murray A. Jorgensen and
Geoffrey J. McLachlan Wallace's Approach to Unsupervised
Learning: The Snob Program . . . . . . . 571--578
Richard P. Brent Some Comments on C. S. Wallace's Random
Number Generators . . . . . . . . . . . 579--584
Glenn Colón-Bonet and
Paul Winterrowd, Jr. Multiplier Evolution: a Family of
Multiplier VLSI Implementations . . . . 585--594
Maurice D. Castro and
Ronald D. Pose and
Carlo Kopp Password-Capabilities and the Walnut
Kernel . . . . . . . . . . . . . . . . . 595--607
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 609--611
Fionn Murtagh Editorial . . . . . . . . . . . . . . . 612--614
Alexander Thomasian and
Jun Xu Reliability and Performance of Mirrored
Disk Organizations . . . . . . . . . . . 615--629
M. Hassaballah and
Saleh Omran and
Youssef B. Mahdy A Review of SIMD Multimedia Extensions
and their Usage in Scientific and
Engineering Applications . . . . . . . . 630--649
Paul Cairns and
Harold Thimbleby Affordance and Symmetry in User
Interfaces . . . . . . . . . . . . . . . 650--661
Qiang Zhu and
Brahim Medjahed and
Anshuman Sharma and
Henry Huang The Collective Index: a Technique for
Efficient Processing of Progressive
Queries . . . . . . . . . . . . . . . . 662--676
Yu-Chen Kuo and
Po-Yao Wu The Availability of Complemental
$k$-Coteries . . . . . . . . . . . . . . 677--687
E. M. Tadjouddine Vertex-ordering Algorithms for Automatic
Differentiation of Computer Codes . . . 688--699
J. E. Rice An Introduction to Reversible Latches 700--709
Ching-Nung Yang and
Chung-Chun Wang and
Tse-Shih Chen Visual Cryptography Schemes with
Reversing . . . . . . . . . . . . . . . 710--722
Erol Gelenbe and
Stelios Timotheou Synchronized Interactions in Spiked
Neuronal Networks . . . . . . . . . . . 723--730
Peter G. Harrison and
Taskin Kocak and
Erol Gelenbe Discussant Contributions for the
\booktitleComputer Journal Lecture by
Erol Gelenbe . . . . . . . . . . . . . . 731--734
S. Furber The Future of Computer Technology and
its Implications for the Computer
Industry . . . . . . . . . . . . . . . . 735--740
Peter Y. K. Cheung and
Alex Yakovlev Comments on the BCS Lecture ``The Future
of Computer Technology and its
Implications for the Computer Industry''
by Professor Steve Furber . . . . . . . 741--742
Baykasoglu Adil Evolutionary Computation for Modeling
and Optimization . . . . . . . . . . . . 743
Elizabeth Harrin Universal Usability: Designing Computer
Interfaces for Diverse Users . . . . . . 743--744
Kim-Kwang Raymond Choo Privacy on the Line: The Politics of
Wiretapping and Encryption, Updated and
Expanded Edition . . . . . . . . . . . . 744
Juan A. Carrasco Corrigendum: ``Transient Analysis of
Rewarded Continuous Time Markov Models
by Regenerative Randomization with
Laplace Transform Inversion'' . . . . . 745
Murat Gevrekci and
Bahadir K. Gunturk and
Yucel Altunbasak Restoration of Bayer-sampled Image
Sequences . . . . . . . . . . . . . . . 1--14
Michael Elad and
Dmitry Datsenko Example-Based Regularization Deployed to
Super-Resolution Reconstruction of a
Single Image . . . . . . . . . . . . . . 15--30
Dirk Robinson and
Sina Farsiu and
Peyman Milanfar Optimal Registration Of Aliased Images
Using Variable Projection With
Applications To Super-Resolution . . . . 31--42
Hayit Greenspan Super-Resolution in Medical Imaging . . 43--63
M. J. Fadili and
J.-L. Starck and
F. Murtagh Inpainting and Zooming Using Sparse
Representations . . . . . . . . . . . . 64--79
Priyam Chatterjee and
Sujata Mukherjee and
Subhasis Chaudhuri and
Guna Seetharaman Application Of Papoulis--Gerchberg
Method In Image Super-Resolution and
Inpainting . . . . . . . . . . . . . . . 80--89
Huanfeng Shen and
Michael K. Ng and
Pingxiang Li and
Liangpei Zhang Super-Resolution Reconstruction
Algorithm To MODIS Remote Sensing Images 90--100
Lyndsey C. Pickup and
David P. Capel and
Stephen J. Roberts and
Andrew Zisserman Bayesian Methods for Image
Super-Resolution . . . . . . . . . . . . 101--113
Jongseong Choi and
Min Kyu Park and
Moon Gi Kang High Dynamic Range Image Reconstruction
with Spatial Resolution Enhancement . . 114--125
Ali Mohammad-Djafari Super-Resolution: a Short Review, A New
Method Based on Hidden Markov Modeling
of HR Image and Future Challenges . . . 126--141
Filip Sroubek and
Jan Flusser and
Gabriel Cristóbal Super-Resolution and Blind Deconvolution
For Rational Factors With an Application
to Color Images . . . . . . . . . . . . 142--152
M. Vega and
J. Mateos and
R. Molina and
A. K. Katsaggelos Super-Resolution of Multispectral Images 153--167
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 169--170
Chung-Ming Huang and
Chung-Wei Lin and
Xin-Ying Lin A Predictive Video-on-Demand Bandwidth
Management Using the Kalman Filter over
Heterogeneous Networks . . . . . . . . . 171--185
Giuseppe Anastasi and
Emilio Ancillotti and
Marco Conti and
Andrea Passarella Design and Performance Evaluation of a
Transport Protocol for Ad hoc Networks 186--209
Abdelgadir Ibrahim and
Liping Zhao Supporting the OSGi Service Platform
with Mobility and Service Distribution
in Ubiquitous Home Environments . . . . 210--239
Tomás Sánchez López and
Daeyoung Kim and
Gonzalo Huerta Canepa and
Koudjo Koumadi Integrating Wireless Sensors and RFID
Tags into Energy-Efficient and Dynamic
Context Networks . . . . . . . . . . . . 240--267
Yamin Li and
Shietung Peng and
Wanming Chu Optimal Algorithms for Finding a Trunk
on a Tree Network and its Applications 268--275
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 277--279
Fei He and
Xiaoyu Song and
Ming Gu and
Jiaguang Sun Heuristic-Guided Abstraction Refinement 280--287
Ricardo Pereira e Silva and
Evandro César Freiberger Metrics to Evaluate the Use of Object
Oriented Frameworks . . . . . . . . . . 288--304
David Power and
Mark Slaymaker and
Andrew Simpson On Formalizing and Normalizing
Role-Based Access Control Systems . . . 305--325
Alex Gammerman and
Volodya Vovk and
Brian Burford and
Ilia Nouretdinov and
Zhiyuan Luo and
Alexey Chervonenkis and
Mike Waterfield and
Rainer Cramer and
Paul Tempst and
Josep Villanueva and
Musarat Kabir and
Stephane Camuzeaux and
John Timms and
Usha Menon and
Ian Jacobs Serum Proteomic Abnormality Predating
Screen Detection of Ovarian Cancer . . . 326--333
Florentin Ipate Test Selection for Hierarchical and
Communicating Finite State Machines . . 334--347
Jesús M. Almendros-Jiménez and
Luis Iribarne UML Modeling of User and Database
Interaction . . . . . . . . . . . . . . 348--367
Jukka Teuhola Tournament Coding of Integer Sequences 368--377
Simon Lavington An Appreciation of Dina St Johnston
(1930--2007) Founder of the UK's First
Software House . . . . . . . . . . . . . 378--387
Get checked abstract Appreciation of Professor Colin Tully
(1936--2007): Professor of Software
Practice, Middlesex University . . . . . 388--391
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 393--394
Aggelos K. Katsaggelos and
Rafael Molina Guest Editorial . . . . . . . . . . . . 395--396
Fabrice Saffre and
Richard Tateson and
José Halloy and
Mark Shackleton and
Jean Louis Deneubourg Aggregation Dynamics in Overlay Networks
and Their Implications for
Self-Organized Distributed Applications 397--412
Anastasis A. Sofokleous and
Marios C. Angelides Dynamic Selection of a Video Content
Adaptation Strategy from a Pareto Front 413--428
Zhongqiang Chen and
Alex Delis and
Peter Wei A Pragmatic Methodology for Testing
Intrusion Prevention Systems . . . . . . 429--460
Natarajan Meghanathan A Location Prediction-Based Reactive
Routing Protocol to Minimize the Number
of Route Discoveries and Hop Count per
Path in Mobile Ad Hoc Networks . . . . . 461--482
Yukiko Yamauchi and
Toshimitsu Masuzawa and
Doina Bein Preserving the Fault-Containment of Ring
Protocols Executed on Trees . . . . . . 483--498
Kuo-Qin Yan and
Shun-Sheng Wang and
Shu-Ching Wang The Agreement Problem in Unreliable
Scale-Free Networks . . . . . . . . . . 499--509
Olav Geil Book Review: Tracey Ho and Desmond S.
Lun, \booktitleNetwork Coding: An
Introduction. Cambridge University Press
(2008). ISBN-13 978-0-521-87310-9. 184
pp. \pounds 30/\$60. Hardcover} . . . . 510
Elizabeth Harrin Book Review: John E. Gibson, William T.
Scherer and William F. Gibson,
\booktitleHow to do Systems Analysis,
Wiley (2007). ISBN-13 978-0-470-00765-5.
\pounds 47.50. 360 pp. Hardcover . . . . 510--511
Hong Zhu and
S. C. Cheung and
Joseph R. Horgan and
J. Jenny Li Guest Editorial to the Special Issue on
Automation of Software Testing . . . . . 513
Leonard Gallagher and
Jeff Offutt Test Sequence Generation For Integration
Testing Of Component Software . . . . . 514--529
Meng-Luo Ji and
Ji Wang and
Shuhao Li and
Zhi-Chang Qi Automated Worst-Case Execution Time
Analysis Based on Program Modes . . . . 530--544
Mingsong Chen and
Xiaokang Qiu and
Wei Xu and
Linzhang Wang and
Jianhua Zhao and
Xuandong Li UML Activity Diagram-Based Automatic
Test Case Generation for Java Programs 545--556
Aynur Abdurazik and
Jeff Offutt Using Coupling-Based Weights for the
Class Integration and Test Order Problem 557--570
Lijun Shan and
Hong Zhu Generating Structurally Complex Test
Cases By Data Mutation: a Case Study Of
Testing An Automated Modelling Tool . . 571--588
Qian Yang and
J. Jenny Li and
David M. Weiss A Survey of Coverage-Based Testing Tools 589--597
Monika Kapus-Kolar Three Generalizations to a Generic
Integrated Test Generation Method for
Finite State Machines . . . . . . . . . 599--625
Jaesung Lee and
Hyuk-Jae Lee and
Chanho Lee A Phase-Based Approach for On-Chip Bus
Architecture Optimization . . . . . . . 626--645
Hung-Yu Chien and
Tzong-Chen Wu Provably Secure Password-Based
Three-Party Key Exchange With Optimal
Message Steps . . . . . . . . . . . . . 646--655
Daniel Lacks and
Mainak Chatterjee and
Taskin Kocak Design and Evaluation of a Distributed
Clustering Algorithm for Mobile ad hoc
Networks . . . . . . . . . . . . . . . . 656--670
Tzu-Chi Huang and
Ce-Kuen Shieh and
Yu-Ben Miao Just-In-Time Cache for Capsule-Based
Active Networks . . . . . . . . . . . . 671--689
Daniel Greenfield and
Simon Moore Implications of Electronics Technology
Trends for Algorithm Design . . . . . . 690--698
Zhongqiang Chen and
Yuan Zhang and
Zhongrong Chen and
Alex Delis A Digest and Pattern Matching-Based
Intrusion Detection Engine . . . . . . . 699--723
Jakub Marecek Book Review: Yves Pochet and Laurence A.
Wolsey, \booktitleProduction Planning
Using Mixed Integer Programming,
Springer (2006). ISBN-13
978-0-387-29959-4. \pounds
38.50/\$59.95. 477 pp. Hardbound} . . . 724--725
Elizabeth Harrin Book Review: Jean Tabaka,
\booktitleCollaboration Explained:
Facilitation Skills for Software Project
Leaders. Addison Wesley (2006). ISBN-13
978-0-321-26877-8. \pounds 31.99. 412
pp. Softbound . . . . . . . . . . . . . 725--725
Mamdouh Refaat Book Review: Colleen Mccue,
\booktitleData Mining and Predictive
Analytics: Intelligence Gathering and
Crime Analysis, Elsevier (2007). ISBN
0-7506-7796-1. 28.99 GBP. 332 pp.
Paperback . . . . . . . . . . . . . . . 725--726
Michael Elad and
Dmitry Datsenko Corrigendum: ``Example-Based
Regularization Deployed to
Super-Resolution Reconstruction of a
Single Image'' . . . . . . . . . . . . . 1131--1131
Harold Thimbleby and
Stuart Anderson and
Paul Cairns A Framework for Modelling Trojans and
Computer Virus Infection . . . . . . . . 445--458
D. J. Wheeler and
R. M. Needham TEA, a tiny encryption algorithm . . . . 363