Last update:
Wed Mar 10 06:19:43 MST 2021
Anonymous Editorial --- Databases . . . . . . . . 1--1 K. H. Baik and L. L. Miller Topological Approach for Testing Equivalence in Heterogeneous Relational Databases . . . . . . . . . . . . . . . 2--10 Anonymous Announcement . . . . . . . . . . . . . . 10--10 N. L. Sarda Algebra and Query Language for A Historical Data Model . . . . . . . . . 11--18 M. Levene and G. Loizou The nested relation type model: an application of domain theory to databases . . . . . . . . . . . . . . . 19--30 Anonymous Announcement . . . . . . . . . . . . . . 30--30 M. Azmoodeh BRMQ: a database interface facility based on graph traversals and extended relationships on groups of entities . . 31--39 D. A. Bell and J. Shao and M. Elizabeth C. Hull Integrated Deductive Database System Implementation. A Systematic Study . . . 40--48 Anonymous Announcements . . . . . . . . . . . . . 48--48 M. C. Taylor Logical optimisation of distributed knowledge base queries . . . . . . . . . 49--60 T. P. Martin and K. H. Lam and Judy I. Russell An Evaluation of Site Selection Algorithms for Distributed Query Processing . . . . . . . . . . . . . . . 61--70 Anonymous Announcement . . . . . . . . . . . . . . 70--70 D. Agrawal and A. El Abbadi Integrating Security with Fault-tolerant Distributed Databases . . . . . . . . . 71--78 Anonymous Announcements . . . . . . . . . . . . . 78--78 R. Mukkamala and S. C. Bruell Efficient schemes to evaluate transaction performance in distributed database systems . . . . . . . . . . . . 79--89 D. A. Kemp Correspondence . . . . . . . . . . . . . 90--91 P. J. Marcer Correspondence . . . . . . . . . . . . . 91--92 G. J. Chaitin Correspondence . . . . . . . . . . . . . 92--92 B. G. Gooch Correspondence . . . . . . . . . . . . . 92--92 T. Stonier Correspondence . . . . . . . . . . . . . 92--93 Anonymous Announcement . . . . . . . . . . . . . . 93--93 G. G. Scarrott Correspondence . . . . . . . . . . . . . 93--93
Anonymous Editorial --- Procedural Programming . . 97--97 R. E. Griswold String Scanning in the Icon Programming Language . . . . . . . . . . . . . . . . 98--107 P. C. Philbrow and M. P. Atkinson Events and exception handling in PS-Algol . . . . . . . . . . . . . . . . 108--125 Anonymous Announcements . . . . . . . . . . . . . 125--125 R. G. Dromey and T. A. Chorvat Structure Clashes --- An Alternative to Program Inversion . . . . . . . . . . . 126--132 M. O. Jokinen Parameter Transmission Abstractions . . 133--139 Anonymous Announcements . . . . . . . . . . . . . 139--139 G. Whale Identification of Program Similarity in Large Populations . . . . . . . . . . . 140--146 Anonymous Announcements . . . . . . . . . . . . . 146--146 G. L. Davies and A. Burns The Teaching Language Pascal-FC . . . . 147--154 Anonymous Announcements . . . . . . . . . . . . . 154--154 C. F. Reynolds CODIL: The Architecture of an Information Language . . . . . . . . . . 155--163 Anonymous Announcement . . . . . . . . . . . . . . 163--163 Anonymous Wilkes Award . . . . . . . . . . . . . . 163--163 Gerald D. P. Dueck and Gordon V. Cormack Modular Attribute Grammars . . . . . . . 164--172 Marian Petre and R. Winder On Languages, Models and Programming Styles . . . . . . . . . . . . . . . . . 173--180 H. Berghel and R. Rankin A Proposed Standard for Measuring Crossword Compilation Efficiency . . . . 181--184 Anonymous Announcements . . . . . . . . . . . . . 184--184 R. Govindarajan and L. M. Patnaik Short Notes: Lenient Execution and Concurrent Execution of Re-entrant Routines: Efficient Implementation in Data Flow Systems . . . . . . . . . . . 185--187 Anonymous Announcements . . . . . . . . . . . . . 187--187 K. Brokate Correspondence . . . . . . . . . . . . . 188--188 C. G. Burgess Correspondence . . . . . . . . . . . . . 188--188 S. Dvorák Correspondence . . . . . . . . . . . . . 188--188 S. W. Palmer Correspondence . . . . . . . . . . . . . 188--188
H. Liddell Editorial --- Parallel Computing . . . . 193--193 O. G. Plata and J. D. Bruguera and F. F. Rivera and R. Doallo and E. L. Zapata ACLE: a Software Package for SIMD Computer Simulation . . . . . . . . . . 194--203 S. Gulati and S. S. Iyengar and J. Barhen The Pebble-crunching Model for Fault-tolerant Load Balancing in Hypercube Ensembles . . . . . . . . . . 204--214 Anonymous Announcements . . . . . . . . . . . . . 214--214 K. W. Ng and H. F. Leung Competition: a Model of AND-Parallel Execution of Logic Programs . . . . . . 215--218 Camille C. Price and M. A. Salama Scheduling of Precedence-Constrained Tasks on Multiprocessors . . . . . . . . 219--229 Anonymous Announcements . . . . . . . . . . . . . 229--229 D. Abramson and G. Egan The RMIT Data Flow Computer: a Hybrid Architecture . . . . . . . . . . . . . . 230--240 S. Dey and P. K. Srimani A New Parallel Sorting Algorithm and its Efficient VLSI Implementation . . . . . 241--246 Anonymous Announcements . . . . . . . . . . . . . 246--246 P. Chaudhuri Finding and updating depth-first spanning trees of acyclic digraphs in parallel . . . . . . . . . . . . . . . . 247--251 F.-. C. Lin and K. Chen On the design of an integrated systolic array for solving simultaneous linear equations . . . . . . . . . . . . . . . 252--260 G. M. Megson An efficient double pipe systolic array for matrix product . . . . . . . . . . . 261--265 Anonymous Announcements . . . . . . . . . . . . . 265--265 H. Wills Fundamentals of Pricing and Scheduling Computer Services and Investment in Computer Equipment . . . . . . . . . . . 266--273 Anonymous Announcements . . . . . . . . . . . . . 273--273 J. S. Rohl Reversing is not inherent in lexicographical permutation generation 274--278 Anonymous Announcements . . . . . . . . . . . . . 278--278 F. W. Burton and J. G. Kollias and D. G. Matsakis and V. G. Kollias Short Note: Implementation of Overlapping B-Trees for Time and Space Efficient Representation of Collections of Similar Files . . . . . . . . . . . . 279--280 Anonymous Announcements . . . . . . . . . . . . . 280--280 G. Xunrang and Z. Yuzhang Short Note: a new HEAPSORT Algorithm and the Analysis of its Complexity . . . . . 281--282 Anonymous Announcements . . . . . . . . . . . . . 282--282
A. Jordan Editorial --- Communications . . . . . . 289--289 C. Mitchell and D. Rush and M. Walker A Secure Messaging Architecture Implementing the X.400-1988 Security Features . . . . . . . . . . . . . . . . 290--295 A. S. Fraenkel and S. T. Klein Bidirectional Huffman Coding . . . . . . 296--307 R. L. Bailey and R. Mukkamala Pipelining Data Compression Algorithms 308--313 Anonymous Announcements . . . . . . . . . . . . . 313--313 P. Fenwick Performance Measurements on a 39 km Extended Ethernet . . . . . . . . . . . 314--322 Y. Pan and R. Melhem Short circuits in buffered multi-stage interconnection networks . . . . . . . . 323--329 Anonymous Announcement . . . . . . . . . . . . . . 329--329 F. W. Burton and G. P. McKeown and V. J. Rayward-Smith Applications of UET scheduling theory to the implementation of declarative languages . . . . . . . . . . . . . . . 330--336 D. Alcock and D. Brown PRAXIS: a Program for Reproducing Proforma Design Calculations . . . . . . 337--343 M. Ancona and L. De Floriani and J. S. Deogun Structured Spanning Trees . . . . . . . 344--355 Anonymous Announcement . . . . . . . . . . . . . . 355--355 R. Feldman and M. C. Golumbic Optimization algorithms for student scheduling via constraint satisfiability 356--364 Anonymous Announcement . . . . . . . . . . . . . . 364--364 B. K. Haddon Cycle-Sort: a Linear Sorting Method . . 365--367 B. J. Oommen and D. T. H. Ng On Generating Random Permutations with Arbitrary Distributions . . . . . . . . 368--374 Anonymous Announcement . . . . . . . . . . . . . . 374--374 H. Miyakoshi A Literal Code Method for Minimizing Boolean Functions . . . . . . . . . . . 375--380 T. H. Merrett Short Note: Scoping is not Orthogonal to Completeness . . . . . . . . . . . . . . 381--381 T. H. Merrett Scoping is not orthogonal to completeness . . . . . . . . . . . . . . 381--381 J. Won Park and S. R. Maeng and J. Wan Cho Correspondence . . . . . . . . . . . . . 382--382
J. Landsdown Editorial --- Communications . . . . . . 385--385 S. B. M. Bell and D. C. Mason Tesseral Quaternions for the Octtree . . 386--397 A. Hunter and P. J. Willis A Note on the Optimal Labelling of Quadtree Nodes . . . . . . . . . . . . . 398--401 K. G. Suffern Quadtree Algorithms for Contouring Functions of Two Variables . . . . . . . 402--407 L. R. Neal and M. L. V. Pitteway Yet More Circle Generators . . . . . . . 408--411 B. Pham Algorithms for calculating cubic Beta-splines . . . . . . . . . . . . . . 412--416 Anonymous Announcements . . . . . . . . . . . . . 416--416 P. Puliti and G. Tascini Interpreting Technical Drawings . . . . 417--423 F. Dehne and L. Ficocelli An efficient computational geometry method for detecting dotted lines in noisy images . . . . . . . . . . . . . . 424--428 L. Moltedo and A. Noferini An Implementation of $7$-bit Character Encoding for Standard Computer Graphics Environments . . . . . . . . . . . . . . 429--436 N. E. Wiseman Book Review . . . . . . . . . . . . . . 436--436 F. Neelamkavil and O. Mullarney Separating Graphics from Application in the Design of User Interfaces . . . . . 437--443 M. Bilodeau and D. Laguitton Development of Screen Management Subroutines Compatible with Microsoft FORTRAN Compiler . . . . . . . . . . . . 444--452 K. Bowden Kron's method of tearing on a Transputer Array . . . . . . . . . . . . . . . . . 453--459 L. Allison Continuations Implement Generators and Streams . . . . . . . . . . . . . . . . 460--465 Anonymous Announcement . . . . . . . . . . . . . . 465--465 T. H. Axford Reference Counting of Cyclic Graphs for Functional Programs . . . . . . . . . . 466--470 A. Andersson Short Note: a Note on the Expected Behaviour of Binary Tree Traversals . . 471--472 G. Alia and E. Martinelli Short note: VLSI Binary-Residue Converters for Pipelined Processing . . 473--475 B. E. P. Clement Correspondence . . . . . . . . . . . . . 475--475 Anonymous Announcements . . . . . . . . . . . . . 476--477
S. Gregory Editorial --- Concurrent Logic Programming . . . . . . . . . . . . . . 481--481 K. L. Clark Parallel Logic Programming . . . . . . . 482--493 Kazunori Ueda and Takashi C. Chikayama Design of the kernel language for the parallel inference machine . . . . . . . 494--500 Anonymous Announcements . . . . . . . . . . . . . 500--500 I. Foster and C. Kesselman and S. Taylor Concurrency: Simple Concepts and Powerful Tools . . . . . . . . . . . . . 501--507 Anonymous Announcements . . . . . . . . . . . . . 507--507 I. Shizgal The Amoeba-Prolog System . . . . . . . . 508--517 Anonymous Announcements . . . . . . . . . . . . . 517--517 J. G. Wolff Simplicity and Power --- Some Unifying Ideas in Computing . . . . . . . . . . . 518--534 K. G. Waugh and M. H. Williams and Q. Kong and S. Salvini and G. Chen Designing SQUIRREL: an extended SQL for a deductive database system . . . . . . 535--546 Anonymous Announcements . . . . . . . . . . . . . 546--546 N. W. Paton and P. M. D. Gray Optimising and executing DAPLEX queries using Prolog . . . . . . . . . . . . . . 547--555 H. J. Roberts Expert Systems Clubs: Design Methods . . 556--561 Anonymous Announcements . . . . . . . . . . . . . 561--561 G. M. Megson and D. J. Evans A Systolic Array Solution for the Assignment Problem . . . . . . . . . . . 562--569 T. Y. Chen On the Consistency of Multi-valued Functions . . . . . . . . . . . . . . . 570--572 Anonymous Announcements . . . . . . . . . . . . . 572--572
M. Thomas Editorial --- Term Rewriting . . . . . . 1--1 A. J. J. Dick An Introduction to Knuth--Bendix Completion . . . . . . . . . . . . . . . 2--15 J. A. Vince Book Review . . . . . . . . . . . . . . 15--15 A. J. J. Dick and P. Watson Order-sorted Term Rewriting . . . . . . 16--19 M. Hermann and C. Kirchner and H. Kirchner Implementations of Term Rewriting Systems . . . . . . . . . . . . . . . . 20--33 T. Nipkow Constructive Rewriting . . . . . . . . . 34--41 T. Drapkin Book Review . . . . . . . . . . . . . . 41--41 P. Padawitz Reduction and Narrowing for Horn Clause Theories . . . . . . . . . . . . . . . . 42--51 P. Kacsuk A Parallel Prolog Abstract Machine and its Multi-Transputer Implementation . . 52--63 J. Paakki Prolog in Practical Compiler Writing . . 64--72 B. Dwyer Correspondence . . . . . . . . . . . . . 72--72 L. Orman Constraint Maintenance as a Data Model Design Criterion . . . . . . . . . . . . 73--79 F. B. Bastani and I.-R. Chen and W. Hilal A model for the stability analysis of maintenance strategies for linear list 80--87 Anonymous Announcements . . . . . . . . . . . . . 87--87 M. A. Weiss Short Note: Empirical study of the expected running time of Shellsort . . . 88--91 Anonymous Announcements . . . . . . . . . . . . . 91--91 J.-L. Wu and S.-T. Cheng Short Note: a Neural Network Simulating System . . . . . . . . . . . . . . . . . 92--93
C. J. Theaker Editorial . . . . . . . . . . . . . . . 97--97 D. E. Avison and A. T. Wood-Harper Information systems development research: an exploration of ideas in practice . . . . . . . . . . . . . . . . 98--112 Anonymous Wilkes Award . . . . . . . . . . . . . . 112--112 F. Noble Seven Ways to Develop Office Systems: a Managerial Comparison of Office System Development Methodologies . . . . . . . 113--121 Anonymous Announcement . . . . . . . . . . . . . . 121--121 C.-C. D. Poo Representing business policies in the Jackson system development method . . . 122--131 A. G. Sutcliffe and I. Wang Integrating human computer interaction with Jackson system development . . . . 132--142 Anonymous Announcement . . . . . . . . . . . . . . 142--142 T. H. Tse and L. Pong An examination of requirements specification languages . . . . . . . . 143--152 Anonymous Announcement . . . . . . . . . . . . . . 152--152 J. Trenouth A Survey of Exploratory Software Development . . . . . . . . . . . . . . 153--163 Anonymous Announcement . . . . . . . . . . . . . . 163--163 M. Elizabeth C. Hull and P. G. O'Donoghue and B. J. Hagan Development Methods for Real-Time Systems . . . . . . . . . . . . . . . . 164--172 A. Burns and A. M. Lister A Framework for Building Dependable Systems . . . . . . . . . . . . . . . . 173--181 Anonymous Announcement . . . . . . . . . . . . . . 181--181 P. Hammersley Information Systems Design Methodologies --- Book Reviews . . . . . . . . . . . . 182--185 Anonymous Announcement . . . . . . . . . . . . . . 185--185 D. Campbell and T. McNeill Finding a Majority When Sorting is Not Available . . . . . . . . . . . . . . . 186--186 D. Campbell and T. McNeill Short Note: Finding a majority when sorting is not available . . . . . . . . 186--186
M. V. Wilkes Editorial --- the Maturing of VLSI --- and its Consequences for the Computer Industry . . . . . . . . . . . . . . . . 193--194 C. Hankins Book Review . . . . . . . . . . . . . . 194--194 J. Jagiello Book Review . . . . . . . . . . . . . . 194--194 M. Ancona and A. Clematis and L. De Floriani and E. Puppo HIDEL: a Language for Hierarchical VLSI Design . . . . . . . . . . . . . . . . . 195--206 W. S. Elliot Correspondence . . . . . . . . . . . . . 206--206 B. Wilkinson Comparative Performance of Overlapping Connectivity Multiprocessor Interconnection Networks . . . . . . . . 207--214 A. Olerup Design Approaches: a Comparative Study of Information System Design and Architectural Design . . . . . . . . . . 215--224 M. H. O'Docherty and C. N. Daskalakis Multimedia Information Systems --- The Management and Semantic Retrieval of all Electronic Data Types . . . . . . . . . 225--238 Anonymous Announcements . . . . . . . . . . . . . 238--238 P. King and C. Small Default Databases and Incomplete Information . . . . . . . . . . . . . . 239--244 Anonymous Announcements . . . . . . . . . . . . . 244--244 R. Marshall Manipulating Full-text Scientific Databases: a Logic-based Se\-man\-tico-prag\-matic Approach . . . 245--253 I. A. Macleod A Query Language for Retrieving Information from Hierarchic Text Structures . . . . . . . . . . . . . . . 254--264 I. W. Merry Correspondence . . . . . . . . . . . . . 264--264 K. Morgan and R. L. Morris and S. Gibbs When does a mouse become a rat? or \ldotsComparing performance and preferences in direct manipulation and command line environment . . . . . . . . 265--271 Anonymous Announcements . . . . . . . . . . . . . 271--271 The Rt. Hon. The Earl of Halsbury `Innovation for Failure --- Some Reflections on the Work of the NRDC Relevant to the Early History of the Computer Industry in the UK' . . . . . . 272--274 The Rt. Hon. The Earl of Halsbury Ten Years of Computer Development . . . 275--279 V. Akman Short notes: Implementation of Karp--Luby Monte Carlo method: an exercise in approximate counting . . . . 279--282 K. Wicovsky and P. F. Thanisch and M. H. Williams Short Notes: Improved Recursion Handling through Integrity Constraints . . . . . 282--285
Ian Watson Editorial --- Concurrent Programming . . 289--289 H. Kingdon and D. R. Lester and G. L. Burn The HDG-Machine: a Highly Distributed Graph-Reducer for a Transputer Network 290--301 D. B. Skillicorn Practical Concurrent Programming for Parallel Machines . . . . . . . . . . . 302--310 J. Henderson Correspondence . . . . . . . . . . . . . 310--310 J. Padget and R. Bradford and J. Fitch Concurrent Object-Oriented Programming in Lisp . . . . . . . . . . . . . . . . 311--319 A. S. Douglas Book Review . . . . . . . . . . . . . . 319--319 A. S. Douglas Book Review . . . . . . . . . . . . . . 319--319 M.-C. Pong I-Pigs: an Interactive Graphical Environment for Concurrent Programming 320--330 E. J. Yannakoudakis and A. A. Shahid A Controlled Environment for Meta-Message Processing . . . . . . . . 331--344 Anonymous Announcement . . . . . . . . . . . . . . 344--344 K-B. Yue and R. T. Jacob An Efficient Starvation-Free Semaphore Solution for the Graphical Mutual Exclusion Problem . . . . . . . . . . . 345--349 S. Khanna Logic Programming for Software Verification and Testing . . . . . . . . 350--357 M. L. V. Pitteway Book Review . . . . . . . . . . . . . . 357--357 J. Vanthienen Algorithm 124: a Longest Path Algorithm to Display Decision Tables . . . . . . . 358--362 Anonymous Algorithms Supplement . . . . . . . . . 358--379 A. P. Hammersley Algorithm 125: Efficient Two-Dimensional Fast Fourier Transform Subroutines for Real-Valued or Hermitian data . . . . . 362--370 W. Dobosiewicz Algorithm 126: Linear Probing Sort . . . 370--373 J. K. Slape and P. J. L. Wallis Algorithm 127: a modification of Sale's algorithm to accommodate FORTRAN 77 . . 373--376 A. Stewart and C. Holt and M. Clint and R. Perrott Algorithm 128: a DAP FORTRAN subroutine for thinning digitised pictures . . . . 377--379 E. Makinen Efficient Generation of Rotational-Admissible Codewords for Binary Trees . . . . . . . . . . . . . . 379--379 E. Mäkinen Short Notes . . . . . . . . . . . . . . 379--379 C. Brink and I. M. Rewitzky and R. A. Schmidt Short Notes: Autodescriptivity: beware! 380--381 Anonymous Announcement . . . . . . . . . . . . . . 381--381
D. Giles Editorial --- Data Structures . . . . . 385--385 David Watson Editorial: Data Structures . . . . . . . 385--385 D. J. Challab Implementation of Flexible Arrays Using Balanced Trees . . . . . . . . . . . . . 386--396 K. Bhaskar Book Review . . . . . . . . . . . . . . 396--396 B. Srinivasan An adaptive overflow technique to defer splitting in B-trees . . . . . . . . . . 397--405 F. Hussain and M. L. V. Pitteway Correspondence . . . . . . . . . . . . . 405--405 W. F. Smyth Mu-balancing M-way Search Trees . . . . 406--414 Anonymous Announcements . . . . . . . . . . . . . 414--414 S. P. Dandamudi and P. G. Sorenson Improved Partial-Match Search Algorithms for BD Trees . . . . . . . . . . . . . . 415--422 S. Maybank Book Review . . . . . . . . . . . . . . 422--422 B. Wichmann Book Review . . . . . . . . . . . . . . 422--422 S. Olariu and C. M. Overstreet and Z. Wenn A Mergeable Double-ended Priority Queue 423--427 C. T. Bhunia Correspondence . . . . . . . . . . . . . 427--427 D. Naor and C. U. Martel and N. S. Matloff Performance of Priority Queue Structures in a Virtual Memory Environment . . . . 428--437 Anonymous Announcement . . . . . . . . . . . . . . 437--437 E. Mäkinen A Survey on Binary Tree Codings . . . . 438--443 G. Argo Weighting Without Waiting: the Weighted Path Length Tree . . . . . . . . . . . . 444--449 P. M. Fenwick A New Technique for Self-Organising Linear Searches . . . . . . . . . . . . 450--454 Anonymous Announcement . . . . . . . . . . . . . . 454--454 Seng Fat Ou and Alan L. Tharp High Storage Utilisation for Single-Probe Retrieval Linear Hashing 455--468 Anonymous Announcement . . . . . . . . . . . . . . 468--468 E. Oxborrow Book Review . . . . . . . . . . . . . . 468--468 C. C. Chang and C. Y. Chen and J. K. Jan On the Design of a Machine-Independent Perfect Hashing Scheme . . . . . . . . . 469--474 D. Shepherd Book Review . . . . . . . . . . . . . . 474--474 P. Ru\vzi\vcka Short Note: a Note on the Efficiency of an Interval Routing Algorithm . . . . . 475--476 Anonymous Announcement . . . . . . . . . . . . . . 476--476
Andrew Herbert Editorial: Distributed Systems . . . . . 481--481 W. B. Daszczuk A Structured Semantic Design of Distributed Operating Systems . . . . . 482--492 Anonymous Announcements . . . . . . . . . . . . . 492--492 N. T. Son and Y. Paker Adaptive deadlock-free packet routing in transputer-based multiprocessor interconnection networks . . . . . . . . 493--502 P. A. Kalinchenko Does a Point Belong to a Polygon? . . . 502--502 L. Mancini and S. K. Shrivastava Fault-Tolerant Reference Counting for Garbage Collection in Distributed Systems . . . . . . . . . . . . . . . . 503--513 M. C. Er A Note on the Optimality of a Reve Algorithm . . . . . . . . . . . . . . . 513--513 J. Dollimore and E. Miranda and Wang Xu The Design of a System for Distributing Shared Objects . . . . . . . . . . . . . 514--521 I. D. Hill Book Review: Valerie Illingworth (editor), \booktitleDictionary of Computing (third edition) . . . . . . . 521--521 M. S. Verrall Unity Doesn't Imply Unification or Overcoming Heterogeneity Problems in Distributed Software Engineering Environments . . . . . . . . . . . . . . 522--533 Andrew Dillon Abstracts in Human Computer Interaction 533--533 D. Agrawal and A. Malpani Efficient Dissemination of Information in Computer Networks . . . . . . . . . . 534--541 Anonymous Announcements . . . . . . . . . . . . . 541--541 L. H. Geesink The Coordination of Distributed Active Messages in a Dynamic Network Topology 542--550 Anonymous Announcements . . . . . . . . . . . . . 550--550 P. Bodorik and J. S. Riordon Threshold Values for Processing Distributed Queries . . . . . . . . . . 551--558 Anonymous Announcements . . . . . . . . . . . . . 558--558 D. Michie Methodologies from Machine Learning in Data Analysis and Software . . . . . . . 559--565 Anonymous Announcement . . . . . . . . . . . . . . 565--565 Lu Lahodynskyj Structure Clashes . . . . . . . . . . . 566--568 J. S. Rohl Ord-Smith's pseudo-lexicographical permutation procedure is the Tompkins-Paige algorithm . . . . . . . . 569--570 Anonymous Additional Papers . . . . . . . . . . . 571--572 G. M. Megson Book Review: D. Gassilloud and J. C. Grossetie (eds), \booktitleComputing with Parallel Architectures --- T. Node 573b-573 Chris Osborne Book Review: Helene G. Kershner, \booktitleIntroduction to Computer Literacy . . . . . . . . . . . . . . . . 573--573 Chris Osborne Book Review: Ernest S. Colantonio, \booktitleA Laboratory Course in DOS, Wordperfect 5.0, Lotus 1-2-3, dBASE IV 573a-573 V. S. Alagar and P. Goyal and P. S. Nair and F. Sadri Integrated magic set method: a rule rewrite scheme for optimising linear datalog programs . . . . . . . . . . . . A121--A129 S. Dvorak and B. Durian Decomposition merging with symmetric exchanges . . . . . . . . . . . . . . . A029--A033 A. Ghafoor and F. Y. Farhat Dynamic concurrency control algorithms for large distributed database systems A095--A104 V. Goel and Y. V. Venkatesh On an optimal and faster construction of linear quadtrees from raster-scanned images . . . . . . . . . . . . . . . . . A073--A083 K. K. Lau Top-down synthesis of sorting algorithm A001--A007 W. W. L. Lee and D. S. Bowers A relational database simulator . . . . A061--A072 R. Marshall Discourse and natural-language text analysis: functional grammar approach A035--A060 B. J. Oommen and D. C. Y. Ma Stochastic automata solutions to the object partitioning problem . . . . . . A105--A120 W. Wah and S. G. Akl Simulating multiple memory accesses in logarithmic time and linear space . . . A085--A088 C. J. Wang and C. H. Wu and V. P. Nelson A study of the generalized multiple bus-connected parallel computer . . . . A089--A094 D. A. Watt Modular description of programming languages . . . . . . . . . . . . . . . A009--A028
G. Tredoux Mechanizing Execution Sequence Semantics in HOL . . . . . . . . . . . . . . . . . 81--86
Brian Wichmann and Philip Giles Editorial . . . . . . . . . . . . . . . 1--2 A. Burns and J. McDermid and J. Dobson On the Meaning of Safety and Security 3--15 Rachel Burnett Yearbook of Law Computers and Technology, Volume 5 . . . . . . . . . . 15--15 J.-J. Hwang and B.-M. Shao and P. C. Wang A new access control method using prime factorisation . . . . . . . . . . . . . 16--20 M. V. D. Burmester and Y. G. Desmedt and T. Beth Efficient Zero-Knowledge Identification Schemes for Smart Cards . . . . . . . . 21--29 Mildred L. G. Shaw Human Factors for Informatics Usability 29--29 R. de Lemos and A. Saeed and T. Anderson A Train Set as a Case Study for the Requirements Analysis of Safety-Critical Systems . . . . . . . . . . . . . . . . 30--40 Christopher Hankins and John Vince Book reviews: \booktitleThe SGML Handbook, by Charles Goldfarb, 1990; \booktitleFractal Creations, by Timothy Wegner and Mark Peterson, 1991 . . . . . 40--40 John Vince Fractal Creations . . . . . . . . . . . 40a-40 B. A. Wichmann A Note on the Use of Floating Point in Critical Systems . . . . . . . . . . . . 41--44 M. Ho Kim and S. Pramanik Optimizing Database Accesses for Parallel Processing of Multikey Range Searches . . . . . . . . . . . . . . . . 45--51 Anonymous Announcement . . . . . . . . . . . . . . 51--51 I. F. Akyildiz Performance Analysis of a Multiprocessor System Model with Process Communication 52--61 Anonymous Announcement . . . . . . . . . . . . . . 61--61 R. G. Börn and J. R. Kenevan Theoretical Performance-Based Cost-Effectiveness of Multicomputers . . 62--70 Faith Noble Office Information Systems . . . . . . . 70--70 H. Shen Self-adjusting Mapping: a Heuristic Mapping Algorithm for Mapping Parallel Programs on to Transputer Networks . . . 71--80 Peter Wallis Mathematical Structures for Software Engineering . . . . . . . . . . . . . . 80--80 D. Kaur Hierarchical Hypernet for Pipelining . . 81--87 M. Vassallo and A. Ralston Algorithms for De Bruijn Sequences --- A Case Study in the Empirical Analysis of Algorithms . . . . . . . . . . . . . . . 88--90 A. van de Liefvoort An Iterative Algorithm for the Reve's Puzzle . . . . . . . . . . . . . . . . . 91--92 Anonymous Additional Papers . . . . . . . . . . . 93--93
Anonymous Editorial . . . . . . . . . . . . . . . 97--97 W. Sun and W. Meng and C. Yu Query Optimisation in Distributed Object-Oriented Database Systems . . . . 98--107 Anonymous Announcements . . . . . . . . . . . . . 107--107 Anonymous Erratum . . . . . . . . . . . . . . . . 107a-107 J. A. Mariani Oggetto: An Object Oriented Database Layered on a Triple Store . . . . . . . 108--118 G. Scarrott Logic and Information . . . . . . . . . 118--118 A. Poulovassilis The Implementation of FDL, a Functional Database Language . . . . . . . . . . . 119--128 I. D. Hill Book Review: B. Samways and T. Byrne-Jones, \booktitleCollins Gem Basic Facts: Computers, 3rd edn . . . . . . . 128--128 J. S. H. Yang and Y. H. Chin and C. G. Chung Many-Sorted First-Order Logic Database Language . . . . . . . . . . . . . . . . 129--137 Anonymous Announcements . . . . . . . . . . . . . 137--137 P. G. Harrison and H. Khoshnevisan The Mechanical Transformation of Data Types . . . . . . . . . . . . . . . . . 138--147 D. Ince Formal Specification using Z . . . . . . 147a-147 N. Obeid Nonmonotonic Reasoning: Logical Foundation of Commonsense . . . . . . . 147--147 Th. P. Van Der Weide and A. H. M. Ter Hofstede and P. Van Bommel Uniquest: Determining the Semantics of Complex Uniqueness Constraints . . . . . 148--156 L. Paulson Logical Frameworks . . . . . . . . . . . 156--156 T. Conlon and S. Gregory Debugging Tools for Concurrent Logic Programming . . . . . . . . . . . . . . 157--169 S. J. Thompson and R. D. Lins The Categorical Multi-Combinator Machine: CMCM . . . . . . . . . . . . . 170--176 Ken Moody An Introduction to Formal Languages and Automata . . . . . . . . . . . . . . . . 176--176 O. Nevalainen and T. Raita An Internal Hybrid Sort Algorithm Revisited . . . . . . . . . . . . . . . 177--183 I. Shearer Retrospective Update: Data as it was Believed to be . . . . . . . . . . . . . 184--184 T. D. Gedeon The Reve's Puzzle: an Iterative Solution Produced by Transformation . . . . . . . 186--186 Anonymous Additional Papers . . . . . . . . . . . 188--188
Keith Van Rijsbergen and Maristella Agosti Editorial --- the Context of Information Retrieval . . . . . . . . . . . . . . . 193--193 Maristella Agosti and Pier Giorgio Marchetti User Navigation in the IRS Conceptual Structure through a Semantic Association Function . . . . . . . . . . . . . . . . 194--199 D. C. Blair Information Retrieval and the Philosophy of Language . . . . . . . . . . . . . . 200--207 A. Gilles The Art of Computer Systems Performance Analysis (Techniques for Experimental Design, Measurement, Simulation, and Modeling) . . . . . . . . . . . . . . . 207--207 P. D. Bruza and T. P. Van Der Weide Stratified Hypermedia Structures for Information Disclosure . . . . . . . . . 208--220 Anonymous Announcement . . . . . . . . . . . . . . 220--220 Alison Cawsey and Julia Galliers and Steven Reece and Karen Sparck Jones Automating the Librarian: Belief Revision as a Base for System Action and Communication with the User . . . . . . 221--232 Y. Chiaramella and J. P. Chevallet About Retrieval Models and Logic . . . . 233--242 Anonymous Announcement . . . . . . . . . . . . . . 242--242 Norbert Fuhr Probabilistic Models in Information Retrieval . . . . . . . . . . . . . . . 243--255 Judy Bishop Introduction to Pascal and Structured Design; Pascal plus Data Structures, Algorithms and Advanced Programming . . 255--255 David J. Harper and Andrew D. M. Walker ECLAIR: an Extensible Class Library for Information Retrieval . . . . . . . . . 256--267 Alan F. Smeaton Progress in the Application of Natural Language Processing to Information Retrieval Tasks . . . . . . . . . . . . 268--278 Anonymous Announcement . . . . . . . . . . . . . . 278a-278 Mark Sanderson Conceptual Information Retrieval --- a Case Study in Adaptive Partial Parsing 278--278 Howard R. Turtle and W. Bruce Croft A Comparison of Text Retrieval Models 279--290 Anonymous Erratum . . . . . . . . . . . . . . . . 290a-290 M. A. Turega Neural Networks . . . . . . . . . . . . 290--290 C. J. van Rijsbergen Probabilistic Retrieval Revisited . . . 291--298 Anonymous Correspondence . . . . . . . . . . . . . 298--298 David Gries Correspondence: On ``Finding a Majority When Sorting is Not Available'' . . . . 298--298 C. C. Chang and H. Y. Chen and C. Y. Chen Symbolic Gray Code As a Data Allocation Scheme for Two-Disc Systems . . . . . . 299--305 Anonymous Announcement . . . . . . . . . . . . . . 305--305 M. C. Er Efficient Generation of $k$-ary Trees in Natural Order . . . . . . . . . . . . . 306--308 W. R. Dufrene, Jr. and F. C. Lin An Efficient External Sort Algorithm with no Additional Space . . . . . . . . 308--310 Anonymous Announcements . . . . . . . . . . . . . 310--310 Anonymous Additional Papers . . . . . . . . . . . 311--312 Feliks Kluzniak and Stanislaw Szpakowicz Correspondence . . . . . . . . . . . . . 313--313
Anonymous Editorial --- Models and Architectures 321--321 S. W. Dietrich and M. Brown and E. Cortes-Rello and S. Wunderlin A Practitioner's Introduction to Database Performance Benchmarks and Measurements . . . . . . . . . . . . . . 322--331 Dan Diaper Human-Computer Interaction: Theory and Practice . . . . . . . . . . . . . . . . 331--331 D. H. O. Ling and D. A. Bell Modelling and Managing Time in Database Systems . . . . . . . . . . . . . . . . 332--341 E. Auramäki and R. Hirschheim and K. Lyytinen Modelling offices through discourse analysis: the SAMPO approach . . . . . . 342--352 Anonymous Announcement . . . . . . . . . . . . . . 352--352 M. Turega A Computer Architecture to Support Neural Net Simulation . . . . . . . . . 353--360 R. Männer and O. Stucky Fault-Tolerant Data Transfer in a Multiprocessor System by Forward and Backward Hardware Error Recovery . . . . 361--368 Alan Burns Constructing Predictable Real-Time Systems . . . . . . . . . . . . . . . . 368a-368 Ronald Stamper A Theory of Computer Semiotics . . . . . 368--368 J. Rosenberg and J. L. Keedy and D. Abramson Addressing Mechanisms for Large Virtual Memories . . . . . . . . . . . . . . . . 369--375 R. A. Frost Constructing Programs as Executable Attribute Grammars . . . . . . . . . . . 376--389 C. C. Chang and H. F. Lin and C. Y. Chen Optimality properties of the disc modulo allocation method for $k$-ary multiple key hashing files . . . . . . . . . . . 390--394 Anonymous Announcement . . . . . . . . . . . . . . 394--394 R. Sprugnoli Properties of Binary Trees Related to Position . . . . . . . . . . . . . . . . 395--404 Carl French Computer Science . . . . . . . . . . . . 404--404 B. Parhami Systolic Number Radix Converters . . . . 405--409 S. Carlsson A Note on Heapsort . . . . . . . . . . . 410--411 Anonymous Announcements . . . . . . . . . . . . . 411--411 Anonymous Additional Papers . . . . . . . . . . . 412--413
John Cooke Editorial --- Formal Methods: What? Why? and When? . . . . . . . . . . . . . . . 417--418 J. Cooke Formal methods --- Mathematics, Theory, Recipes or what? . . . . . . . . . . . . 419--423 Anonymous Announcements . . . . . . . . . . . . . 423--423 A. Galton Classical Logic: a Crash Course for Beginners . . . . . . . . . . . . . . . 424--430 D. Ince Case Technology . . . . . . . . . . . . 430--430 P. Thainisch Real-time Transaction Processin . . . . 430a-430 A. Galton Logic as a Formal Method . . . . . . . . 431--440 J. C. P. Woodcock The Rudiments of Algorithm Refinement 441--450 Dave Berry Ml for the Working Programme . . . . . . 450a-450 P. Quinlan Neural Network Parallel Computing . . . 450--450 T. Clement The Role of Data Reification in Program Refinement: Origins, Synthesis and Appraisal . . . . . . . . . . . . . . . 451--459 H. Ehrig and B. Mahr and I. Classen and F. Orejas Introduction to Algebraic Specification. Part 1: Formal Methods for Software Development . . . . . . . . . . . . . . 460--467 Anonymous Special Issue on Spatial Data --- Call for Papers . . . . . . . . . . . . . . . 467--467 H. Ehrig and B. Mahr and F. Orejas Introduction to Algebraic Specification. Part 2: From Classical View to Foundations of System Specifications . . 468--477 Anonymous Announcement . . . . . . . . . . . . . . 477a-477 A. Leeming Informatization in the Public Sector . . 477--477 M. van Sinderen and L. Ferreira Pires and C. A. Vissers Protocol Design and Implementation Using Formal Methods . . . . . . . . . . . . . 478--491 L. C. Paulson Functional Programming with Hope . . . . 491--491 E. Auramäki and R. Hirschheim and K. Lyytinen Modelling Offices Through Discourse Analysis: a Comparison and Evaluation of SAMPO with OSSAD and ICN . . . . . . . . 492--500 Anonymous Announcement . . . . . . . . . . . . . . 500--500 B. Czejdo and M. C. Taylor Integration of Information Systems Using an Object-Oriented Approach . . . . . . 501--513 Anonymous Announcements . . . . . . . . . . . . . 513--513 Harald Sòndergaard and Peter Sestoft Non-Determinism in Functional Languages 514--523 A. A. Bertossi and F. Luccio and L. Pagli and E. Lodi Short notes: a parallel solution to the approximate string matching problem . . 524--526 D. J. Challab Short notes: Flexible arrays: evaluation of the B-tree based system . . . . . . . 527--529 David Furber Short notes: a survey of the teaching of programming to computing undergraduates in U.K. Universities and Polytechnics 530--533 D. T. H. Ng and B. J. Oommen Short notes: a short note on doubly-linked list re-organizing heuristics . . . . . . . . . . . . . . . 533--535 B. Jamison and S. Olariu Short notes: Indexing for multi-attribute retrieval . . . . . . . 535--537 Anonymous Announcement . . . . . . . . . . . . . . 537--537 Anonymous Additional Papers . . . . . . . . . . . 538--538 Anonymous Announcement . . . . . . . . . . . . . . 539a-539 Roy Dyckhoff Book Review . . . . . . . . . . . . . . 539--539 K. N. Dandeker Implementation of parameterised views in relational query languages with a macro processor . . . . . . . . . . . . . . . A425 F. Neelamkavil and S. O'Shea Interfacing Eiffel and PCTE . . . . . . A439 P. W. Oman and K. Van Houten On the use of binary strings to represent tree structures . . . . . . . A463 V. T. H. Paschos and A. N. Stafylopatis Evaluation of the execution cost of recursive definitions . . . . . . . . . A429 F. Sadri Data dependencies in deductive databases A415 E. J. Yannakoudakis and H. A. Attar-Bashi Constructing natural language sentences from database tuples . . . . . . . . . . A445
John Cooke Editorial --- Formal Methods: What? Why? and When? . . . . . . . . . . . . . . . 545--546 E. A. Boiten and H. A. Partsch and D. Tuijnman and N. Völker How to Produce Correct Software --- An Introduction to Formal Specification and Program Development by Transformations 547--554 Anonymous Special Issue on Spatial Data --- Call for Papers . . . . . . . . . . . . . . . 554a-554 R. Moore Programming with VDM . . . . . . . . . . 554--554 P. G. Harrison A Higher-Order Approach to Parallel Algorithms . . . . . . . . . . . . . . . 555--566 P. G. Larsen and N. Plat Standards for Non-Executable Specification Languages . . . . . . . . 567--573 J. Bishop A Compiler Writer's Toolbox . . . . . . 573--573 D. R. Kuhn A Technique for Analyzing the Effects of Changes in Formal Specifications . . . . 574--578 Anonymous Notice . . . . . . . . . . . . . . . . . 578--578 L. M. Barroca and J. A. McDermid Formal methods: use and relevance for the development of safety-critical systems . . . . . . . . . . . . . . . . 579--599 Anonymous Announcement . . . . . . . . . . . . . . 599--599 L. T. Semmens and R. B. France and T. W. G. Docker Integrated structured analysis and formal specification techniques . . . . 600--610 Anonymous Announcement . . . . . . . . . . . . . . 610a-610 R. E. Cooley The Integration of Expert Systems into Mainstream Software . . . . . . . . . . 610--610 V. Mi\vsi\'c and D. Vela\vsevi\'c and B. Lazarevi\'c Formal Specification of a Data Dictionary for an Extended ER Data Model 611--622 G. O'Neill Short note: Automatic translation of VDM specifications into Standard ML programs 623--624 Trevor Clarkson Book review: \booktitleVLSI Design of Neural Networks, by Ulrich Ramacher and Ulrich Ruckert . . . . . . . . . . . . . 624--624 Trevor Clarkson Vlsi Design of Neural Networks . . . . . 624--624 I. Bruha AI Multilanguage System McPOPLOG: The Power of Communication Between its Subsystems . . . . . . . . . . . . . . . 625--629 J. Mak CD-ROMs in Print: an International Guide to CD-ROM, CD-I, CDTV & Electronic Book Product . . . . . . . . . . . . . . . . 629--629 F. Barsi and M. C. Pinotti Adding Flexibility to Hybrid Number Systems . . . . . . . . . . . . . . . . 630--635 Anonymous Announcement . . . . . . . . . . . . . . 635--635 I. J. Davis A Fast Radix Sort . . . . . . . . . . . 636--642 Anonymous Announcement . . . . . . . . . . . . . . 642--642 B.-C. Huang and M. A. Langston Fast stable merging and sorting in constant extra space . . . . . . . . . . 643--650 M. A. H. MacCallum Book Review . . . . . . . . . . . . . . 650a-650 R. E. Massara Book Review . . . . . . . . . . . . . . 650--650 A. P. Robson and D. J. Kinniment Simstrict: a Behavioural Simulator for Use with the Strict Hardware Description Language . . . . . . . . . . . . . . . . 651--654 C. M. Eastman and R. P. Trueblood Occupancy Models for the Estimation of Block Accesses . . . . . . . . . . . . . 654--658 C. H. Lin and C. C. Chang and R. C. T. Lee A Record-Oriented Cryptosystem for Database Sharing . . . . . . . . . . . . 658--660 A. P. Korah and M. R. Kaimal A Short Note on Perfectly Balanced Binary Search Trees . . . . . . . . . . 660--662 Y-C. Hou and J-C. Tsay On Equivalent Systolic Designs of $LU$ Decomposition and its Algebraic Representation . . . . . . . . . . . . . 662--666 Y. Manolopoulos Reverse Chaining for Answering Temporal Logical Queries . . . . . . . . . . . . 666--668 Anonymous Announcement . . . . . . . . . . . . . . 668a-668 Peter Wallis Software Reuse Guidelines and Method . . 668--668 Anonymous Additional Papers . . . . . . . . . . . 669--670 Anonymous Errata . . . . . . . . . . . . . . . . . 670--670 J. K. Mullin Hash functions for hash-based join methods . . . . . . . . . . . . . . . . A499--A503
K. van Rijsbergen Editorial . . . . . . . . . . . . . . . 1--1 Keith van Rijsbergen, Editor-in-Chief Welcome . . . . . . . . . . . . . . . . 1--1 D. Hutchinson Special Issue Editorial: Distributed Multimedia Systems . . . . . . . . . . . 2--3 David Hutchison Special Issue Editorial: Distributed Multimedia Systems . . . . . . . . . . . 2 F. Horn and J. B. Stefani On Programming and Supporting Multimedia Object Synchronisation . . . . . . . . . 4--18 S. Ramanathan and P. Venkat Rangan Feedback techniques for intra-media continuity and inter-media synchronization in distributed multimedia systems . . . . . . . . . . . 19--31 Phillip Lougher and Doug Shepherd The Design of a Storage Server for Continuous Media . . . . . . . . . . . . 32--42 W. Tawbi and F. Horn and E. Horlait and J.-B. Stéfani Video Compression Standards and Quality of Service . . . . . . . . . . . . . . . 43--54 Ian Wakeman Packetized video: options for interaction between the user, the network and the codec . . . . . . . . . 55--67 P. E. Tischer and R. T. Worley and A. J. Maeder and M. Goodwin Context-based Lossless Image Compression 68--77 M. Vazirgiannis and C. Mourlas An object-oriented model for interactive multimedia presentations . . . . . . . . 78--86 H. M. Vin and M.-S. Chen and T. Barzilai Collaboration Management in DiCE . . . . 87--96 S. C. Hui and A. Goh and L. H. Lau A multimedia information system for IC failure analysis . . . . . . . . . . . . 97--105
J. Nievergelt and P. Widmayer Guard Files: Stabbing and Intersection Queries on Fat Spatial Objects . . . . . 107--116 M. F. Challis Two new techniques for computing extremal $h$-bases ${A}_k$ . . . . . . . 117--126 B. Knight Information loss in temporal knowledge representations . . . . . . . . . . . . 127--136 S. S. Yau and J. V. Gore Paradigm lost: discovering the intersection of assertion-guided program construction and constraint-driven re-evaluation . . . . . . . . . . . . . 137--142 N. Pliskin and T. Romm and A. S. Lee and Y. Weber Presumed versus actual organizational culture: managerial implications for implementation of information systems 143--152 M. Elizabeth C. Hull and P. G. O'Donoghue Family relationships between requirements and design specification methods . . . . . . . . . . . . . . . . 153--167 C. Burdorf and J. Marti Load balancing strategies for Time Warp on multi-user workstations . . . . . . . 168--176 V. Catania and A. Puliafito and L. Vita A model for performance evaluation of gracefully degrading systems . . . . . . 177--185 R. J. Millar and M. Elizabeth C. Hull and J. H. Frazer The Millar Polyhedron and its use in the construction of octrees . . . . . . . . 186--194 A. Poulovassilis A Pattern-Matching Algorithm for Functional Databases . . . . . . . . . . 195--199 C. C. Charlton and P. E. Dunne and K. Halewood and P. H. Leng An algorithm to generate random large combinational circuits . . . . . . . . . 200--206 M. Er Correspondence . . . . . . . . . . . . . 207--207
J. van Leeuwen and D. Wood Interval Heaps . . . . . . . . . . . . . 209--216 G. Rossi Programs as Data in an Extended Prolog 217--226 M. Zviran and W. J. Haga A comparison of password techniques for multilevel authentication mechanisms . . 227--237 G. Hains and L. M. R. Mullin Parallel Functional Programming with Arrays . . . . . . . . . . . . . . . . . 238--245 S. J. Horng Constant time algorithm for template matching on a reconfigurable array of processors . . . . . . . . . . . . . . . 246--253 I. P. de Guzmán and P. G. Harrison and E. Medina Pipelines for Divide-and-Conquer Functions . . . . . . . . . . . . . . . 254--268 W. Appelt and N. Tetteh-Lartey The formal specification of the ISO open document architecture (ODA) standard . . 269--279 M. A. Weiss On Finding the Height of a Binary Search Tree . . . . . . . . . . . . . . . . . . 280--281 B. J. Oommen Transforming ill-conditioned constrained problems using projections . . . . . . . 282--285 I. Wegener A simple modification of Xunrang and Yuzhang's HEAPSORT variant improving its complexity significantly . . . . . . . . 286--288 M. Thomas Book Review . . . . . . . . . . . . . . 289--289 A. Solomon Book Review . . . . . . . . . . . . . . 289--290 I. R. MacCallum Book Review . . . . . . . . . . . . . . 290--290 M. Turega Book Review . . . . . . . . . . . . . . 290--291 C. Davies Book Review . . . . . . . . . . . . . . 291--292 G. I. Parkin Book Review . . . . . . . . . . . . . . 292--292 Anonymous Book Review . . . . . . . . . . . . . . 292--293 V. J. Rayward-Smith Book Review . . . . . . . . . . . . . . 293--294 S. Gregory Book Review . . . . . . . . . . . . . . 294--294 I. R. Murray Book Review . . . . . . . . . . . . . . 294--295 N. Alm Book Review . . . . . . . . . . . . . . 295--296 D. Gollmann Book Review . . . . . . . . . . . . . . 296--296
P. Hammersley Editorial . . . . . . . . . . . . . . . 297--298 Peter Hammersley Special Issue Editorial: Computing Curricula . . . . . . . . . . . . . . . 297 Anthony Finkelstein European computing curricula: a guide and comparative analysis . . . . . . . . 299--319 Anthony Finkelstein and Jeff Kramer and Samson Abramsky and Krysia Broda and Sophia Drossopoulou and Susan Eisenbach An Integrated Engineering Study Scheme in Computing . . . . . . . . . . . . . . 320--334 Jonathan D. Pemberton and Joanne M. Smailes Educating the Masses --- is IT a Tricky Business? . . . . . . . . . . . . . . . 335--342 Chris Osborne Planning for IT literacy in an institution of higher education: a case study . . . . . . . . . . . . . . . . . 343--350 P. Naur Understanding Turing's universal machine --- personal style in program description . . . . . . . . . . . . . . 351--372 Doug Goldson and Steve Reeves and Richard Bornat A review of several programs for the teaching of logic . . . . . . . . . . . 373--386 Andrew Ireland On exploiting the structure of Martin-Lof's Theory of Types . . . . . . 387--398
Hoon Hong Special Issue Editorial: Computational Quantifier Elimination . . . . . . . . . 399--399 Felipe Cucker On the complexity of quantifier elimination: the structural approach . . 400--408 John Canny Improved algorithms for sign determination and existential quantifier elimination . . . . . . . . . . . . . . 409--418 Devdatt P. Dubhashi Quantifier Elimination in $p$-adic Fields . . . . . . . . . . . . . . . . . 419--426 Joos Heintz and Marie-Françoise Roy and Pablo Solernó On the theoretical and practical complexity of the existential theory of reals . . . . . . . . . . . . . . . . . 427--431 Scott McCallum Solving polynomial strict inequalities using cylindrical algebraic decomposition . . . . . . . . . . . . . 432--438 Hoon Hong Quantifier elimination for formulas constrained by quadratic equations via slope resultants . . . . . . . . . . . . 439--449 Rüdiger Loos and Volker Weispfenning Applying Linear Quantifier Elimination 450--462 Vijay Chandru Variable Elimination in Linear Constraints . . . . . . . . . . . . . . 463--472 Jean-Louis Imbert Variable elimination for disequations in generalized linear constraint systems 473--484 Dinesh Manocha Efficient Algorithms for MultiPolynomial Resultant . . . . . . . . . . . . . . . 485--496 Richard Liska and Stanly Steinberg Applying quantifier elimination to stability analysis of difference schemes 497--503 John Canny Computing Roadmaps of General Semi-Algebraic Sets . . . . . . . . . . 504--514 M. J. González-López and T. Recio Path Tracking in Motion Planning . . . . 515--524
Abraham Mehrez and Geoffry S. Howard and Yaakov Lugassi and Peretz Shoval Information system planning and selection: a multiattribute theoretic approach . . . . . . . . . . . . . . . . 525--541 B. John Oommen and Chris Fothergill Fast learning automaton-based image examination and retrieval . . . . . . . 542--553 Daniel Y. Chao and David T. Wang and Douglas D. C. Hung Convergence time and memory capacity of higher-order Hopfield associative memory with multi-valued neurons . . . . . . . 554--561 L. A. Breene Quadtrees and hypercubes: grid embedding strategies based on spatial data structure addressing . . . . . . . . . . 562--569 Henry Ker-Chang Chang and Shing Hong Chen A new locally adaptive data compression scheme using multilist structure . . . . 570--578 Zbigniew J. Czech and Bohdan S. Majewski A Linear Time Algorithm for Finding Minimal Perfect Hash Functions . . . . . 579--587 C. M. Khoong Shortest-Path Reconstruction Algorithms 588--592 M. D. Atkinson Uniform generation of rooted ordered trees with prescribed degrees . . . . . 593--594 P. Hall Book Review . . . . . . . . . . . . . . 595--595 P. Strain-Clark Book Review . . . . . . . . . . . . . . 595--596 D. Ince Book Review . . . . . . . . . . . . . . 596--596 P. Hall Book Review . . . . . . . . . . . . . . 596--597 P. Hall Book Review . . . . . . . . . . . . . . 597--597 H. Robinson Book Review . . . . . . . . . . . . . . 597--598 M. Newton Book Review . . . . . . . . . . . . . . 598--598 M. Field Book Review . . . . . . . . . . . . . . 598--599 M. Woodman Book Review . . . . . . . . . . . . . . 599--599 D. Lyons Book Review . . . . . . . . . . . . . . 599--600 M. S. Joy Book Review . . . . . . . . . . . . . . 600--600 M. S. Joy Book Review . . . . . . . . . . . . . . 600--601 I. Craig Book Review . . . . . . . . . . . . . . 601--601 M. S. Joy Book Review . . . . . . . . . . . . . . 601--601 A. Solomon Book Review . . . . . . . . . . . . . . 602--602 M. Turega Book Review . . . . . . . . . . . . . . 602--602 P. A. S. Veloso Book Review . . . . . . . . . . . . . . 603--603 K. Dudman Book Review . . . . . . . . . . . . . . 603--604 D. Corne Book Review . . . . . . . . . . . . . . 604--605
Jukka Teuhola and Timo Raita Application of a Finite-State Model to Text Compression . . . . . . . . . . . . 607--614 Pasi Fränti and Olli Nevalainen A two-stage modelling method for compressing binary images by arithmetic coding . . . . . . . . . . . . . . . . . 615--622 Robert R. Goldberg Finite State Automata from Regular Expression Trees . . . . . . . . . . . . 623--630 Min Sheng Lin and Deng Jyi Chen General reduction methods for the reliability analysis of distributed computing systems . . . . . . . . . . . 631--644 Tim B. Cooper and Jeffrey H. Kingston The solution of real instances of the timetabling problem . . . . . . . . . . 645--653 D. J. Pavey and L. A. Winsborrow Demonstrating equivalence of source code and PROM contents . . . . . . . . . . . 654--667 A. S. Fraenkel and S. T. Klein Bounding the Depth of Search Trees . . . 668--678 V. Dancík Book Review . . . . . . . . . . . . . . 679--679 M. Thomas Book Review . . . . . . . . . . . . . . 679--680 A. Bowyer and R. Martin and J. Woodwark Correspondence . . . . . . . . . . . . . 681--681 W. M. Waite Correspondence . . . . . . . . . . . . . 681--681
Thomas Schwederski and Rudolph Kober Special Issue Editorial: Parallel Processing . . . . . . . . . . . . . . . 683--683 T. Schwederski and R. Kober Editorial . . . . . . . . . . . . . . . 683--684 M. Schneider and U. Wever and Q. Zheng Solving large and sparse linear equations in analog circuit simulation on a cluster of workstations . . . . . . 685--689 D. A. Clark and C. J. Rawlings and J. Shirazi and L.-L. Li and K. Schuerman and M. Reeve and A. Véron Solving large combinatorial problems in molecular biology using the ElipSys parallel constraint logic programming system . . . . . . . . . . . . . . . . . 690--701 U. Geuder and M. Härdtner and A. Reuter and B. Wörner and R. Zink GRIDS --- a parallel programming system for grid-based algorithms . . . . . . . 702--711 V. B. Muchnick and A. V. Shafarenko and C. D. Sutton $F$-code and its Implementation: a Portable Software Platform for Data Parallelism . . . . . . . . . . . . . . 712--722 Neil Berrington and David De Roure and Julian Padget Guaranteeing unpredictability (programming model) . . . . . . . . . . 723--733 B. Bergsten and M. Couprie and P. Valduriez Overview of Parallel Architectures for Databases . . . . . . . . . . . . . . . 734--740 Hermann Hellwagner Design Considerations for Scalable Parallel File Systems . . . . . . . . . 741--755 F. Abolhassan and R. Drefenstedt and J. Keller and W. J. Paul and D. Scheerer On the Physical Design of PRAMs . . . . 756--762 C. R. Jesshope and C. Izu The MP1 network chip and its application to parallel computers . . . . . . . . . 763--777 Peter Thompson Concurrent Interconnect for Parallel Systems . . . . . . . . . . . . . . . . 778--784
Jurg Nievergelt and Mike Freeston Special Issue Editorial: Spatial data: applications, concepts, techniques . . . 1--2 D. A. Varley and M. Visvalingam Road extraction and topographic data validation using area topology . . . . . 3--15 Oliver Günther and Johannes Lamberts Object-oriented Techniques for the Management of Geographic and Environmental Data . . . . . . . . . . . 16--25 Michael F. Worboys A Unified Model for Spatial and Temporal Information . . . . . . . . . . . . . . 26--34 Peter Schorn Degeneracy in geometric computation and the perturbation approach . . . . . . . 35--42 Christopher B. Jones and David B. Kidner and J. Mark Ware The implicit triangulated irregular network and multiscale spatial databases 43--57 James Bradley A complete ${L}$-system specification for generating an exact self-affine growth-decay function with a random walk scaling property . . . . . . . . . . . . 58--66 Daniel Y. Chao and Mengchu C. Zhou and David T. Wang Extending the knitting technique to Petri Net synthesis of automated manufacturing systems . . . . . . . . . 67--76 S. Arun-Kumar Book Review . . . . . . . . . . . . . . 77--77 M. Jirotka Book Review . . . . . . . . . . . . . . 77--78 M. Jirotka Book Review . . . . . . . . . . . . . . 77--78
Alan Bundy and Hector MacQueen The New Software Copyright Law . . . . . 79--82 Ian H. Witten and Timothy C. Bell and Alistair Moffat and Craig G. Nevill-Manning and Tony C. Smith and Harold Thimbleby Semantic and generative models for lossy text compression . . . . . . . . . . . . 83--87 Nenad Marovac Link Associated Computation in HyperNet 88--95 Victoria Stavridou Formal Methods and VLSI Engineering Practice . . . . . . . . . . . . . . . . 96--113 Jixin Ma and Brian Knight A General Temporal Theory . . . . . . . 114--123 D. Bhagavathi and C. E. Grosch and S. Olariu A Greedy Hypercube-Labeling Algorithm 124--128 Kwok-Bun Yue and R. T. Jacob An optimal algorithm for reducing edge-solvable mutual exclusion graphs 129--138 Greg A. Wade and Jiang-Hsing Chu Drawability of complete graphs using a minimal slope set . . . . . . . . . . . 139--142 D. Murphy Book Review . . . . . . . . . . . . . . 143--144 D. Murphy Book Review . . . . . . . . . . . . . . 143--144 D. Murphy Book Review . . . . . . . . . . . . . . 143--144 J. A. Dain Book Review . . . . . . . . . . . . . . 144--144 I. Craig Book Review . . . . . . . . . . . . . . 145--145 C. Speed Book Review . . . . . . . . . . . . . . 145--146 P. E. Dunne Book Review . . . . . . . . . . . . . . 146--146 K. Kingman Book Review . . . . . . . . . . . . . . 146--146 C. Speed Book Review . . . . . . . . . . . . . . 146--147 R. Perrott Book Review . . . . . . . . . . . . . . 147--147 R. Hamilton Book Review . . . . . . . . . . . . . . 148--148 J. W. Sanders Book Review . . . . . . . . . . . . . . 148--149 R. M. McKeag Book Review . . . . . . . . . . . . . . 149--150 K. Lucas Book Review . . . . . . . . . . . . . . 150--151 S. Ramesh Book Review . . . . . . . . . . . . . . 151--151 M. Murakami Book Review . . . . . . . . . . . . . . 152--152 M. Smurthwaite Book Review . . . . . . . . . . . . . . 152--152
M. Lamming and P. Brown and K. Carter and M. Eldridge and M. Flynn and G. Louie and P. Robinson and A. Sellen The Design of a Human Memory Prosthesis 153--163 Nikos A. Lorentzos and Alexandra Poulovassilis and Carol Small Implementation of Update Operations for Interval Relations . . . . . . . . . . . 164--176 Doug Goldson A symbolic calculator for non-strict functional programs . . . . . . . . . . 177--187 Kisenchand Ranai and Koon Seng Lim and R. H. Deng Simulating a Multimedia FDDI Backbone Network . . . . . . . . . . . . . . . . 188--198 Yuliang Zheng and T. Hardjono and J. Seberry Reusing Shares in Secret Sharing Schemes 199--205 M. Hamdi and R. W. Hall An efficient class of interconnection networks for parallel computations . . . 206--218 Benjamin Arazi On primality testing using purely divisionless operations . . . . . . . . 219--222 V. Danck Book Review . . . . . . . . . . . . . . 223--223 R. Ramanujam Book Review . . . . . . . . . . . . . . 223--223 I. Craig Book Review . . . . . . . . . . . . . . 224--225 K. Lodaya Book Review . . . . . . . . . . . . . . 225--226 P. Mukherjee Book Review . . . . . . . . . . . . . . 226--226 P. Mukherjee Book Review . . . . . . . . . . . . . . 226--227 M. B. M. Gibson Book Review . . . . . . . . . . . . . . 227--227 C. C. Kirkham Book Review . . . . . . . . . . . . . . 227--228 A. Larner Book Review . . . . . . . . . . . . . . 228--228 A. Larner Book Review . . . . . . . . . . . . . . 228--229 D. Anthony Book Review . . . . . . . . . . . . . . 229--229 P. Green Book Review . . . . . . . . . . . . . . 229--230 P. V. S. Rao Book Review . . . . . . . . . . . . . . 230--231 N. M. Gibbins Book Review . . . . . . . . . . . . . . 231--232 G. R. Martin Book Review . . . . . . . . . . . . . . 232--232
Sòren Christensen and Yoram Hirshfeld and Faron Moller Decidable Subsets of CCS . . . . . . . . 233--242 Jan A. Bergstra and Inge Bethke and Alban Ponse Process Algebra with Iteration and Nesting . . . . . . . . . . . . . . . . 243--258 Wan Fokkink and Hans Zantema Basic process algebra with iteration: completeness of its equational axioms 259--267 S. Mauw and M. A. Reniers An algebraic semantics of basic message sequence charts . . . . . . . . . . . . 269--277 Henri P. Korver A Theory for Simulators . . . . . . . . 279--287 M. A. Bezem and J. F. Groote A Correctness Proof of a One-bit Sliding Window Protocol in $\mu$CRL . . . . . . 289--307 Pasi Fränti and Olli Nevalainen and Timo Kaukoranta Compression of digital images by block truncation coding: a survey . . . . . . 308--332 Wentong Cai and Stephen J. Turner An Approach to the Run-Time Monitoring of Parallel Programs . . . . . . . . . . 333--345 V. Danck Book Review . . . . . . . . . . . . . . 346--346 R. Ramanujam Book Review . . . . . . . . . . . . . . 346--347 I. Craig Book Review . . . . . . . . . . . . . . 347--348 K. Lodaya Book Review . . . . . . . . . . . . . . 348--349 P. Mukherjee Book Review . . . . . . . . . . . . . . 349--349 P. Mukherjee Book Review . . . . . . . . . . . . . . 349--350 M. B. M. Gibson Book Review . . . . . . . . . . . . . . 350--350 C. C. Kirkham Book Review . . . . . . . . . . . . . . 350--351 A. Larner Book Review . . . . . . . . . . . . . . 351--351 A. Larner Book Review . . . . . . . . . . . . . . 351--352 D. Anthony Book Review . . . . . . . . . . . . . . 352--352 P. Green Book Review . . . . . . . . . . . . . . 352--353 P. V. S. Rao Book Review . . . . . . . . . . . . . . 353--354 N. M. Gibbins Book Review . . . . . . . . . . . . . . 354--355 G. R. Martin Book Review . . . . . . . . . . . . . . 355--355
Ian Sommerville and Richard Bentley and Tom Rodden and Peter Sawyer Cooperative Systems Design . . . . . . . 357--366 P. A. Firby and D. J. Stone Analysis of the structure and resolution of a graphics device . . . . . . . . . . 367--376 Christophe Poix and Robert Laurini A geometric reasoning tool based on a successive improvement approach . . . . 377--384 A. N. Clark Pattern recognition of noisy sequences of behavioural events using functional combinators . . . . . . . . . . . . . . 385--398 Per Brinch Hansen Interference control in SuperPascal --- a block-structured parallel language . . 399--406 M. Díaz and E. Pimentel and J. M. Troya DROL: a distributed and real-time object-oriented logic environment . . . 407--421 Marie Rose Low and Bruce Christianson Self Authenticating Proxies . . . . . . 422--428 J. P. Giddy and R. Safavi Naini Automated Cryptanalysis of Transposition Ciphers . . . . . . . . . . . . . . . . 429--436 Greg O'Shea On the specification, validation and verification of security in access control systems . . . . . . . . . . . . 437--448 Nancy G. Kinnersley and William M. Kinnersley An efficient polynomial-time algorithm for three-track gate matrix layout . . . 449--462 A. A. K. Majumdar A note on the iterative algorithm for the Reve's puzzle . . . . . . . . . . . 463--464 R. E. Roger Letters: Correspondence. on the Millar polyhedron and its use in the construction of octrees . . . . . . . . 465--466 D. Caminer Book Review . . . . . . . . . . . . . . 467--467 S. Ramani Book Review . . . . . . . . . . . . . . 467--468 M. H. E. Larcombe Book Review . . . . . . . . . . . . . . 468--469 M. Holcombe Book Review . . . . . . . . . . . . . . 469--469 H. Brown Book Review . . . . . . . . . . . . . . 469--470 P. Mukherjee Book Review . . . . . . . . . . . . . . 470--470 B. Wichmann Book Review . . . . . . . . . . . . . . 470--471 M. Joy Book Review . . . . . . . . . . . . . . 471--471 A. Larner Book Review . . . . . . . . . . . . . . 471--472 A. H. Khan Book Review . . . . . . . . . . . . . . 472--472 Y. Merali Book Review . . . . . . . . . . . . . . 472--473 J. C. M. Baeten Special Issue Editorial Process Algebra 474--475
Vinny Cahill and Roland Balter and David Harper and Neville Harris and Xavier Rousset De Pina and Pedro Sousa The Comandos Distributed Application Platform . . . . . . . . . . . . . . . . 477--486 Paul Taylor and Vinny Cahill and Michael Mock Combining object-oriented systems and open transaction processing . . . . . . 487--498 Brendan Tangney and Andrew Condon and Vinny Cahill and Neville Harris Requirements for parallel programming in object-oriented distributed systems . . 499--508 Gerrit Kerber and Helmut Meitner and Friedemann Reim The Comandos toolset for distributed systems management . . . . . . . . . . . 509--518 Roland Balter and Serge Lacourte and Michel Riveill The Guide Language . . . . . . . . . . . 519--530 Pedro Sousa and André Zúquete and Nuno Neves and José Alves Marques Orthogonal persistence in a heterogeneous distributed object-oriented environment . . . . . . 531--541 David C. Dyer Simulation in the Design of Electronic Systems . . . . . . . . . . . . . . . . 542b-543 R. Sobczak Fddi: a High Speed Network . . . . . . . 542a-542 R. Sobczak Token Ring Networks . . . . . . . . . . 542--542 Simon Clippingdale Practical Computer Vision Using C . . . 543--544 Antoni Diller Object-oriented Specification Case Studies . . . . . . . . . . . . . . . . 544a-545 Gerry Wolff Data Abstraction, the Object-Oriented Approach Using C++ . . . . . . . . . . . 544--544 Frank Bott Software Systems Construction with Examples in Ada . . . . . . . . . . . . 545--546 A. Philippou The Art of Parallel Programming & Parallel Programming, an Introduction 546--547 Adrian Larner Software Assistance for Business Re-Engineering . . . . . . . . . . . . . 547--547 D. A. Randell Inductive Logic Programming . . . . . . 547a-548 Mike Joy The Joy of X . . . . . . . . . . . . . . 548a-549 V. Raghunathan Prototyping-oriented Software Developmen 548--548 Mike Joy Introduction to the X Window System . . 549--549 S. P. Mudur Visual and Technical Aspects of Type . . 549a-550 Mathai Joseph The Visual Display of Quantitative Information & Envisioning Information . . 551--552 Roy L. Crole Computation and Reasoning . . . . . . . 552a-553 Mike Joy Book Review: \booktitleAdvanced Motif Programming Technique . . . . . . . . . 552--552 Norman Fenton Derivation and Validation of Software Metri . . . . . . . . . . . . . . . . . 553a-554 Michael Luck Artificial Intelligence . . . . . . . . 553--553 Adrian Larner C for Corporate Programmers . . . . . . 554--554 Adrian Larner Designing Usable Electronic Text . . . . 554a-555 Adrian Larner Introducing Specification Using . . . . 555--555 Ian Parberry Lectures on Parallel Computation . . . . 556a-557 K. Tindell Programming Real-Time Multicomputers for Signal Processing . . . . . . . . . . . 556--556 Iain Craig Constraint Logic Programming: Selected Research & Constraint-Based Reasoning . . 557a-559 S. Rumsby The Evolution of C++ . . . . . . . . . . 557--557 Alistair Kilgour Correspondence . . . . . . . . . . . . . 560--560
J. A. Bakker A semantic approach to enforce correctness of data distribution schemes 561--575 Mostafa A. Bassiouni and Amar Mukherjee and Mark J. Llewellyn Design and implementation of extended Boolean and comparison operators for time-oriented query languages . . . . . 576--587 Brian Knight and Jixin Ma A temporal database model supporting relative and absolute time . . . . . . . 588--597 B. J. Oommen and D. T. H. Ng A New Technique for Enhancing Linked-List Data Retrieval: Reorganize Data Using Artificially Synthesized Queries . . . . . . . . . . . . . . . . 598--609 Lanfranco Lopriore Stack Cache Memory for Block-Structured Programs . . . . . . . . . . . . . . . . 610--620 Noureddine Belkhatir and Walcelio L. Melo Supporting software development processes in Adele 2 . . . . . . . . . . 621--628 I. McFarlane and S. G. Hoggar Optimal Drivers for the `Random' Iteration Algorithm . . . . . . . . . . 629--640 Joseph L. Ganley and Lenwood S. Heath Optimal and Random Partitions of Random Graphs . . . . . . . . . . . . . . . . . 641--643 D. J. Cooke Book Review . . . . . . . . . . . . . . 644--644 A. P. Luff Book Review . . . . . . . . . . . . . . 644--645 T. W. Routen Book Review . . . . . . . . . . . . . . 645--646 A. Larner Book Review . . . . . . . . . . . . . . 646--646 H. P. Haughton Book Review . . . . . . . . . . . . . . 646--647 S. Arun-Kumar Book Review . . . . . . . . . . . . . . 647--647 S. B. Jones Book Review . . . . . . . . . . . . . . 647--648 A. M. Day Book Review . . . . . . . . . . . . . . 649--649 R. Hamilton Book Review . . . . . . . . . . . . . . 649--650 M. Bezem and J. F. Groote Corrigendum to a Correctness Proof of a One-bit Sliding Window Protocol in $\mu$CRL . . . . . . . . . . . . . . . . 651--651
Steve Benford and John Bowers and Lennart E. Fahlén and John Mariani and Tom Rodden Supporting Cooperative Work in Virtual Environments . . . . . . . . . . . . . . 653--668 Danny C. C. Poo and Shwu-Yi Lee An object-oriented systems modelling method based on the Jackson approach . . 669--682 Helen E. Thomson and Pam Mayhew The Software Process: a Perspective on Improvement . . . . . . . . . . . . . . 683--690 K. Tindell and A. Burns Fixed priority scheduling of hard real-time multi-media disk traffic . . . 691--697 Chung-Ming Huang and Jenq-Muh Hsu An Incremental Protocol Verification Method . . . . . . . . . . . . . . . . . 698--710 W. Ken Jackson and F. Warren Burton A definite and unfoldable, partially deterministic language . . . . . . . . . 711--714 Jiang-Hsing Chu and Gary D. Knott An Analysis of Spiral Hashing . . . . . 715--719 S. Matthews Book Review . . . . . . . . . . . . . . 720--720 F. K. Hanna Book Review . . . . . . . . . . . . . . 720--721 C. Brown Book Review . . . . . . . . . . . . . . 721--722 P. Mukherjee Book Review . . . . . . . . . . . . . . 722--722 G. Hayes Book Review . . . . . . . . . . . . . . 722--723 J. Shawe-Taylor Book Review . . . . . . . . . . . . . . 723--725 C. Czarnecki Book Review . . . . . . . . . . . . . . 725--725 K. V. Nori Book Review . . . . . . . . . . . . . . 725--726 J. Jones Book Review . . . . . . . . . . . . . . 726--727 S. J. Mullender Book Review . . . . . . . . . . . . . . 727--727 R. Stroud Book Review . . . . . . . . . . . . . . 727--728 R. Stroud Book Review . . . . . . . . . . . . . . 728--730 C. Czarnecki Book Review . . . . . . . . . . . . . . 730--730 M. Joy Book Review . . . . . . . . . . . . . . 730--731 A. Gupta Book Review . . . . . . . . . . . . . . 731--731 R. C. Johnson Book Review . . . . . . . . . . . . . . 731--731 J. Vytopil Book Review . . . . . . . . . . . . . . 732--732 P. V. S. Rao Book Review . . . . . . . . . . . . . . 732--734
R. A. Sharman Speech recognition in the office: how the technology supports dictation . . . 735--744 Anonymous Editorial Note . . . . . . . . . . . . . 744--744 Graham A. Stephen and Paul Mather What is SP? (theory of computing) . . . 745--752 Sunil Vadera and Farid Meziane From English to Formal Specifications 753--763 Kamyar Jambor-Sadeghi and Mohammad A. Ketabchi and Junjie Chue and M. Ghiassi A Systematic Approach to Corrective Maintenance . . . . . . . . . . . . . . 764--778 Ying Hao and Jyh-Charn S. Liu and Junguk L. Kim An All-sharing Load-balancing Scheme on the CSMA/CD Network and its Analysis . . 779--794 M. P. Ward Reverse engineering through formal transformation: Knuth's ``Polynomial Addition'' algorithm . . . . . . . . . . 795--813 P. B. Ladkin and S. Leue Correspondence: Comments on a Proposed Semantics for Basic Message Sequence Charts . . . . . . . . . . . . . . . . . 814--817 S. Vickers Book Review . . . . . . . . . . . . . . 818--818 M. Fox Book Review . . . . . . . . . . . . . . 818--821 M. K. Srivas Book Review . . . . . . . . . . . . . . 821--823 R. Sobczak Book Review . . . . . . . . . . . . . . 823--824 A. Larner Book Review . . . . . . . . . . . . . . 824--825 A. Larner Book Review . . . . . . . . . . . . . . 825--825 M. Joy Book Review . . . . . . . . . . . . . . 825--826 M. Joy Book Review . . . . . . . . . . . . . . 826--826 K. M. Lucas Book Review . . . . . . . . . . . . . . 826--827
J. W. Patterson and P. J. Willis Computer Assisted Animation: $2$D or not $2$D? . . . . . . . . . . . . . . . . . 829--839 C.-H. Lai Diakoptics, domain decomposition and parallel computing . . . . . . . . . . . 840--846 J. Ma and B. Knight and M. Petridis A revised theory of action and time based on intervals and points . . . . . 847--857 D. K. C. Chan and P. W. Trinder and R. C. Welland Evaluating Object-Oriented Query Languages . . . . . . . . . . . . . . . 858--872 Sridhar Seshadri and Doron Rotem and Arie Segev Optimal arrangements of cartridges in carousel type mass storage systems . . . 873--887 G. Berrisford and M. Burrows Reconciling OO with Turing machines . . 888--906 Ferruccio Barsi and M. Cristina Pinotti Time optimal mixed radix conversion for residue number applications . . . . . . 907--916
Ron Morrison and Richard C. H. Connor and Quintin I. Cutts and Vivienne S. Dunstan and Graham N. C. Kirby Exploiting persistent linkage in software engineering environments . . . 1--16 R. J. Wieringa Combining static and dynamic modelling methods: a comparison of four methods 17--30 D. R. Sutton and P. J. H. King Incomplete Information and the Functional Data Model . . . . . . . . . 31--42 Charles L. A. Clarke and G. V. Cormack and F. J. Burkowski An algebra for structured text search and a framework for its implementation 43--56 John G. Vaughan A Hierarchical Protocol for Decentralising Information Dissemination in Distributed Systems . . . . . . . . . 57--70 R. F. Browne The embedding of meshes and trees into degree four chordal ring networks . . . 71--77 Mike Joy Lambda Calculi: a Guide for Computer Scientists . . . . . . . . . . . . . . . 78a-79 J. C. Shepherdson From Logic to Logic Programming . . . . 78--78 Alan Mycroft Object-Oriented Type Systems . . . . . . 79a-80 S. Sanyal Computer Arithmetic Systems . . . . . . 79--79 J. W. Sanders The Construction of Formal Specifications . . . . . . . . . . . . . 80--81 D. K. G. Campbell Parallel Evolution of Parallel Processors . . . . . . . . . . . . . . . 81--81 Michael Ashton Analysing Systems . . . . . . . . . . . 82--82 Michael Ashton Software Quality Assurance --- a practical approach . . . . . . . . . . . 82a-83 M. Sasikumar Exploring Interior Point Linear Programming: Algorithms and Software . . 83--84 R. Wilson Spatial Vision in Humans and Robots . . 84--84 P. K. Ghosh and S. P. Mudur Three-Dimensional Computer Vision: a Geometric Viewpoint . . . . . . . . . . 85--86 Paul C. Rhodes Essentials of Fuzzy Modelling and Control . . . . . . . . . . . . . . . . 86--87 Simon Bennett Innovations in GIS 1 . . . . . . . . . . 87a-88 P. P. Gupta A New Era in Computation . . . . . . . . 87--87
T. F. Melham Special Issue Editorial: Higher Order Logic Theorem Proving and its Applications . . . . . . . . . . . . . . 89--90 Paul Curzon Tracking design changes with formal machine-checked proof . . . . . . . . . 91--100 Mats Larsson An engineering approach to formal digital system design . . . . . . . . . 101--110 Sofi\`ene Tahar and Ramayya Kumar Formal specification and verification techniques for RISC pipeline conflicts 111--120 Sten Agerholm LCF Examples in HOL . . . . . . . . . . 121--130 Peter V. Homeier and David F. Martin A mechanically verified verification condition generator . . . . . . . . . . 131--141 Elsa Gunter and Savi Maharaj Studying the ML Module System in HOL . . 142--151 Ching-Tsun Chou Mechanical verification of distributed algorithms in higher-order logic . . . . 152--161 John Harrison Binary Decision Diagrams as a HOL Derived Rule . . . . . . . . . . . . . . 162--170 J. von Wright Representing Higher-Order Logic Proofs in HOL . . . . . . . . . . . . . . . . . 171--179
Mark Evered and Axel Schmolitzky and Michael Kölling A flexible object invocation language based on object-oriented language definition . . . . . . . . . . . . . . . 181--192 Linda B. Sherrell and Doris L. Carver FunZ: An Intermediate Specification Language . . . . . . . . . . . . . . . . 193--206 M. J. Kumar and S. Venkatesh and D. Kieronska and L. M. Patnaik Hierarchical directory-based shared memory architecture . . . . . . . . . . 207--216 Hong Shen Efficient Parallel $k$-Set Chain Range-Join in Hypercubes . . . . . . . . 217--226 V. Kapelios and G. Panagopoulou and G. Papamichail and S. Sirmakessis and A. Tsakalidis The `Cross' Rectangle Intersection Problem . . . . . . . . . . . . . . . . 227--235 Imtiaz Ahmad and Muhammad K. Dhodhi On the $m$-Way Graph Partitioning Problem . . . . . . . . . . . . . . . . 237--244 Ing-Ray Ray Chen A Degradable B$^{\rm link}$-Tree with Periodic Data Reorganization . . . . . . 245--252 J. Gerard Wolff `What is Sp?': a Reply . . . . . . . . . 253--256 Anonymous Letters . . . . . . . . . . . . . . . . 257--258 Konstantinos Georgatos Logic and Information Flow . . . . . . . 259--260 D. Peled Temporal Logic: Mathematical Foundations and Computational Aspects, Volume 1 . . 260--261 S. Ramesh A Programming Approach to Formal Methods 261--262 David A. Watt The Structure of Typed Programming Languages . . . . . . . . . . . . . . . 262--263 M. F. Bott Programming and Problem Solving with Ada 263--263 Mike Joy Programming with C: an Introduction . . 263a-264 Adrian Larner Software Quality . . . . . . . . . . . . 264--264 Rajesh K. Mansharamani Parallel Computing Using the Prefix Problem . . . . . . . . . . . . . . . . 264a-265 Colin Isaac User Interface Design & User Interface Evaluation . . . . . . . . . . . . . . . 265b-265 P. Jalote Book Reviews . . . . . . . . . . . . . . 265--265 P. Jalote Introduction to Distributed Algorithms 265a-265 J. Rosbottom The Muse Method for Usability Engineering . . . . . . . . . . . . . . 266--267 Leela Damodaran Studio-Structured User-interface Design for Interaction Optimisation . . . . . . 267--268 K. M. Lucas Building Applications with Pexlib . . . 268--268 Tim Watson Rules of Encounter . . . . . . . . . . . 268a-269 Claire Speed It's Alive! . . . . . . . . . . . . . . 269--269
Saurav Chatterjee and Jay Strosnider Distributed pipeline scheduling: a framework for distributed, heterogeneous real-time system design . . . . . . . . 271--285 Scott Dawson and Farnam Jahanian Probing and fault injection of dependable distributed protocols . . . . 286--300 Wolfgang A. Halang and Bernd Krämer and Leszek Trybus Exploiting a graphical programming paradigm to facilitate rigorous verification of embedded software . . . 301--309 Benjamin Macias and Stephen G. Pulman A method for controlling the production of specifications in natural language 310--318 Alexander D. Stoyenko and Thomas J. Marlowe and Mohamed F. Younis A Language for Complex Real-Time Systems 319--338
Andrew Turpin and Alistair Moffat Practical Length-limited Coding for Large Alphabets . . . . . . . . . . . . 339--347 Ing-Ray Chen and I.-Ling Yen Analysis of probabilistic error checking procedures on storage systems . . . . . 348--354 Hu Jun Wang and Yuan-Da Jiang and Hui-Zhong Wu Performance analysis of cluster-based PPMB multiprocessor systems . . . . . . 355--364 A. Shafarenko Symmetries in Data Parallelism . . . . . 365--380 S. M. Eker Associative-Commutative Matching Via Bipartite Graph Matching . . . . . . . . 381--399 M. Campbell-Kelly ICL and the Evolution of the British Mainframe . . . . . . . . . . . . . . . 400--412
Stella Mills To live or drown: when information systems become critical . . . . . . . . 413--417 Harold Thimbleby A New Calculator and Why it is Necessary 418--433 Ing-Ray Chen On applying imprecise computation to real-time AI systems . . . . . . . . . . 434--442 Gavin Lowe Scheduling-Oriented Models for Real-Time Systems . . . . . . . . . . . . . . . . 443--456 Ruey-Liang Ma and Chung-Ping Chung Periodic adaptive branch prediction and its application in superscalar processing in Prolog . . . . . . . . . . 457--470 C. H. C. Leung and E. Currie The effect of failures on the performance of long-duration database transactions . . . . . . . . . . . . . . 471--478 Panayiotis Bozanis and Christos Makris and Athanasios Tsakalidis Parametric Weighted Filter: an Efficient Dynamic Manipulation of Signature Files 479--488
Stephen Gilmore and Jane Hillston Process Algebras and Their Application to Performance Modelling: Proceedings of the Third Workshop on Process Algebra and Performance Modelling . . . . . . . 489--491 Marco Bernardo and Nadia Busi and Roberto Gorrieri A distributed semantics for EMPA based on stochastic contextual nets . . . . . 492--509 Peter Harrison and Jane Hillston Exploiting quasi-reversible structures in Markovian process algebra models . . 510--520 Boudewijn R. Haverkort In search of probability mass: probabilistic evaluation of high-level specified Markov models . . . . . . . . 521--529 Holger Hermanns and Michael Rettelbach and Thorsten Weiss Formal characterisation of immediate actions in SPA with nondeterministic branching . . . . . . . . . . . . . . . 530--541 D. R. W. Holton A PEPA specification of an industrial production cell . . . . . . . . . . . . 542--551 Ed Brinksma and Joost-Pieter Katoen and Rom Langerak and Diego Latella A Stochastic Causality-Based Process Algebra . . . . . . . . . . . . . . . . 552--565 Jane Hillston and Vassilis Mertsiotakis A simple time scale decomposition technique for stochastic process algebras . . . . . . . . . . . . . . . . 566--577 Corrado Priami Stochastic $\pi$-calculus . . . . . . . 578--589 Michael Rettelbach Probabilistic branching in Markovian process algebras . . . . . . . . . . . . 590--599 Marina Ribaudo On the aggregation techniques in stochastic Petri nets and stochastic process algebras . . . . . . . . . . . . 600--611 Isabel Rojas Compositional Construction of SWN models 612--621 Matteo Sereno Towards a product form solution for stochastic process algebras . . . . . . 622--632
Michael Reiter and Li Gong Securing Causal Relationships in Distributed Systems . . . . . . . . . . 633--642 Jian-Yun Nie and Martin Brisebois and Françoise Lepage Information Retrieval as Counterfactual 643--657 Kang Zhang and Gaurav Marwaha Visputer --- a graphical visualization tool for parallel programming . . . . . 658--669 Peter Kirstein and Goli Montasser-Kohsari The C-ODA Project: Experiences and Tools 670--680 Antonios Symvonis Optimal Stable Merging . . . . . . . . . 681--690 C. H. A. Koster and Th. P. Van Der Weide Hairy Search Trees . . . . . . . . . . . 691--694
Simon W. Moore and Brian T. Graham Tagged Up/Down Sorter --- A Hardware Priority Queue . . . . . . . . . . . . . 695--703 Kam-Yiu Lam and Sheung-Lun Hung Concurrency Control for Time-constrained Transactions in Distributed Databases Systems . . . . . . . . . . . . . . . . 704--716 Ing-Ray Chen Stochastic Petri net analysis of deadlock detection algorithms in transaction database systems with dynamic locking . . . . . . . . . . . . 717--733 Weidong He and Chaochen Zhou A Case Study of Optimization . . . . . . 734--746 A. Davie Book Review . . . . . . . . . . . . . . 747--747 P. E. Dunne Book Review . . . . . . . . . . . . . . 747--747 V. Kulkarni Book Review . . . . . . . . . . . . . . 747--748 K. Lucas Book Review . . . . . . . . . . . . . . 748--748 M. Luck Book Review . . . . . . . . . . . . . . 748--749 S. Arun-Kumar Book Review . . . . . . . . . . . . . . 749--750 U. Zwick Book Review . . . . . . . . . . . . . . 750--750 A. Diller Book Review . . . . . . . . . . . . . . 750--751 K. V. Nori Book Review . . . . . . . . . . . . . . 751--752 T. M. Vijayaraman Book Review . . . . . . . . . . . . . . 753--753 T. M. Vijayaraman Book Review . . . . . . . . . . . . . . 753--754
R. N. Ibbett and P. E. Heywood and F. W. Howell HASE: a Flexible Toolset for Computer Architects . . . . . . . . . . . . . . . 755--764 Stephen P. Wilson and John A. McDermid Integrated analysis of complex safety critical systems . . . . . . . . . . . . 765--776 Antonio Ruiz-Delgado and David Pitt and Colin Smythe A review of object-oriented approaches in formal methods . . . . . . . . . . . 777--784 Gavin Lowe and Hussein Zedan Refinement of Complex Systems: a Case Study . . . . . . . . . . . . . . . . . 785--800 Ville Leppänen Performance of work-optimal PRAM simulation algorithms on coated meshes 801--810 Ken Deighton Average time to travel on two-headed, non-linear discs . . . . . . . . . . . . 811--817 Jingsen Chen An efficient construction algorithm for a class of implicit double-ended priority queues . . . . . . . . . . . . 818--821 Frank P. Verdon and Mike Wells Computing in British universities: the Computer Board 1966--1991 . . . . . . . 822--830 A. Makur Book Review . . . . . . . . . . . . . . 831--831 C. L. Hankin Book Review . . . . . . . . . . . . . . 831--832 K. V. Nori Book Review . . . . . . . . . . . . . . 832--833 P. Naur Book Review . . . . . . . . . . . . . . 833--834 M. J. Jamieson Book Review . . . . . . . . . . . . . . 834--835 M. J. Jamieson Book Review . . . . . . . . . . . . . . 835--836 A. Larner Book Review . . . . . . . . . . . . . . 836--836 A. Larner Book Review . . . . . . . . . . . . . . 836--837 S. A. Schneider Book Review . . . . . . . . . . . . . . 837--838
David Jeff Jackson and Wagdy Mahmoud Parallel pipelined fractal image compression using quadtree recomposition 1--13 Qian-Ping Gu and Shietung Peng An efficient algorithm for node-to-node routing in hypercubes with faulty clusters . . . . . . . . . . . . . . . . 14--19 Vincenzo Loia and Michel Quaggetto The OPLA system: designing complex systems in an object-oriented logic programming framework . . . . . . . . . 20--35 Chandran N. Sekharan and John G. Del Greco and Sailesh Rathi Space-time trade-offs in the relative unranking of binary trees . . . . . . . 36--44 T. S. Narayanan A Class of Semi-$X$ Tree-Based Dictionary Machines . . . . . . . . . . 45--51 Egon. Börger and Igor \Dbarur\dbaranovic Correctness of compiling Occam to transputer code . . . . . . . . . . . . 52--92 A. R. Forrest Book Review . . . . . . . . . . . . . . 93--93 C. Johnson Book Review . . . . . . . . . . . . . . 93--93 T. Watson Book Review . . . . . . . . . . . . . . 93--94 C. A. Czarnecki Book Review . . . . . . . . . . . . . . 94--94 M. Mannion Book Review . . . . . . . . . . . . . . 95--95 S. Rogerson Book Review . . . . . . . . . . . . . . 95--96
Linda C. van der Gaag Bayesian Belief Networks: Odds and Ends 97--113 Mark Levene Maintaining Consistency of Imprecise Relations . . . . . . . . . . . . . . . 114--123 Hossein Saiedian and Thomas Spencer An efficient algorithm to compute the candidate keys of a relational database schema . . . . . . . . . . . . . . . . . 124--132 Evangelos Kranakis and Danny Krizanc and S. S. Ravi On Multi-Label Linear Interval Routing Schemes . . . . . . . . . . . . . . . . 133--139 Yi Pan and Mounir Hamdi and Gurdip Singh Selection on $k$-Dimensional Meshes with Multiple Broadcasting . . . . . . . . . 140--144 Stephen Fitzpatrick and M. Clint and T. J. Harmer and P. Kilpatrick The tailoring of abstract functional specifications of numerical algorithms for sparse data structures through automated program derivation and transformation . . . . . . . . . . . . . 145--168 I. Harvey Book Review . . . . . . . . . . . . . . 169--169 J. Malard Book Review . . . . . . . . . . . . . . 169--170 S. Rogerson Book Review . . . . . . . . . . . . . . 170--170 A. C. Kilgour Book Review . . . . . . . . . . . . . . 170--171 C. Stirling Book Review . . . . . . . . . . . . . . 171--172
Carlo Meghini Logical Image Modelling and Retrieval 173--183 Si Pan and R. Geoff Dromey Re-engineering Loops . . . . . . . . . . 184--202 Si Pan and R. Geoff Dromey A Formal Basis For Removing goto Statements . . . . . . . . . . . . . . . 203--214 A. H. M. Ter Hofstede and E. Lippe and P. J. M. Frederiks Conceptual data modelling from a categorical perspective . . . . . . . . 215--231 M. Ould-Khaoua and L. M. MacKenzie and R. Sotudeh Comparative evaluation of hypermesh and multi-stage interconnection networks . . 232--240 Behrooz Parhami Extreme-value search and general selection algorithms for fully parallel associative memories . . . . . . . . . . 241--250 A. Cawsey Book Review . . . . . . . . . . . . . . 251--251 F. Culwin Book Review . . . . . . . . . . . . . . 251--252 M. Joseph Book Review . . . . . . . . . . . . . . 252--252 P. Willett Book Review . . . . . . . . . . . . . . 253--253 A. Larner Book Review . . . . . . . . . . . . . . 253--254
A. H. M. Ter Hofstede and H. A. Proper and Th. P. van der Weide Query formulation as an information retrieval problem . . . . . . . . . . . 255--274 Anthony N. Godwin Building a semantic description for a data modelling language . . . . . . . . 275--290 Jim Grundy Transformational Hierarchical Reasoning 291--302 Howard Barringer and Graham Gough and Brian Monahan and Alan Williams A process algebra foundation for reasoning about Core ELLA . . . . . . . 303--324 R. M. Hierons Extending Test Sequence Overlap by Invertibility . . . . . . . . . . . . . 325--330 Haifeng Qian and Jie Wu Enhanced Fibonacci Cubes . . . . . . . . 331--345 Hu-Jun Wang and Jian Li Bandwidth Analysis for A Class of Bus-Based Systems . . . . . . . . . . . 346--352 T. D. Gedeon The Cyclic Towers of Hanoi: an iterative solution produced by transformation . . 353--356 C. Johnson Book Review . . . . . . . . . . . . . . 357--357 K. Kedem Book Review . . . . . . . . . . . . . . 357--358 F. Crestani Book Review . . . . . . . . . . . . . . 358--358 A. Larner Book Review . . . . . . . . . . . . . . 358--359 E. J. Briscoe Book Review . . . . . . . . . . . . . . 359--360
A. J. Wellings and A. Burns Programming Replicated Systems in Ada 95 361--373 Yasemin Turkan and Özgür Ulusoy An efficient memory management algorithm for client-server database management systems . . . . . . . . . . . . . . . . 374--385 J. P. Geschiere and W. H. F. J. Körver A practical development process for parallel large-scale applications and its underlying formal framework . . . . 386--407 Maarten Fokkinga Expressions That Talk About Themselves 408--412 Tadao Takaoka A left-to-right preprocessing computation for the Boyer--Moore string matching algorithm . . . . . . . . . . . 413--416 Wen-Jing Hsu and Moon Jung Chung and Zejun Hu Gaussian Networks For Scalable Distributed Systems . . . . . . . . . . 417--426 Lucas Chi Kwong Hui and Charles U. Martel Randomized competitive algorithms for successful and unsuccessful search . . . 427--438 Nectarios Koziris and George Papakonstantinou and Panayotis Tsanakas Optimal time and efficient space free scheduling for nested loops . . . . . . 439--448 P. Curzon Book Review . . . . . . . . . . . . . . 449--449 A. Larner Book Review . . . . . . . . . . . . . . 449--452 A. Larner Book Review . . . . . . . . . . . . . . 449--452 R. Anderson Book Review . . . . . . . . . . . . . . 452--453
John A. Mariani and Tom Rodden Cooperative information sharing: developing a shared object service . . . 455--470 D. B. Skillicorn Using distributed hypermedia for collaborative learning in universities 471--482 Jonathan M. Nash and Peter M. Dew and Martin E. Dyer A scalable shared queue on a distributed memory machine . . . . . . . . . . . . . 483--495 Oliver E. Theel and Brett D. Fleisch The boundary-restricted coherence protocol for scalable and highly available distributed shared memory systems . . . . . . . . . . . . . . . . 496--510 Chung-Ming Huang and Ye-In Chang and Duen-Tay Huang Reverse protocol verification: concept, algorithm and application . . . . . . . 511--524 Yen-Min Huang and Chinya V. Ravishankar URPC: a toolkit for prototyping remote procedure calls . . . . . . . . . . . . 525--540 Panayiotis Bozanis and Nectarios Kitsios and Christos Makris and Athanasios Tsakalidis Red--Blue Intersection Reporting for Objects of Non-Constant Size . . . . . . 541--546 Bohdan S. Majewski and Nicholas C. Wormald and George Havas and Zbigniew J. Czech A Family of Perfect Hashing Methods . . 547--554 C. B. Jones Book Review . . . . . . . . . . . . . . 555--555 A. Simpson Book Review . . . . . . . . . . . . . . 556--556 D. K. G. Campbell Book Review . . . . . . . . . . . . . . 556--557 R. P. W. Duin Book Review . . . . . . . . . . . . . . 557--558 R. P. W. Duin Book Review . . . . . . . . . . . . . . 557--558 U. Martin Book Review . . . . . . . . . . . . . . 558--559 H. Evans Book Review . . . . . . . . . . . . . . 559--559 K. Kedem Erratum . . . . . . . . . . . . . . . . 560--560
John M. Taylor, OBE, F. Eng. Special Feature: Forward with Foresight 561--565 Cristina Cifuentes and Anne Fitzgerald Australian recommendations on computer software protection . . . . . . . . . . 566--576 Jukka Paakki and Airi Salminen and Jussi Koskinen Automated Hypertext Support for Software Maintenance . . . . . . . . . . . . . . 577--597 M. P. Ward Program Analysis by Formal Transformation . . . . . . . . . . . . . 598--618 Tsong Yueh Chen and Yuen Tak Yu Constraints for Safe Partition Testing Strategies . . . . . . . . . . . . . . . 619--625 Qian-Ping Gu and Shietung Peng Optimal algorithms for node-to-node fault tolerant routing in hypercubes . . 626--629 Jon Agar History of Computing Feature: The provision of digital computers to British universities up to the Flowers Report (1966) . . . . . . . . . . . . . 630--642 S. Gilmore Book Review . . . . . . . . . . . . . . 643--643 C. Johnson Book Review . . . . . . . . . . . . . . 643--643 T. Watson Book Review . . . . . . . . . . . . . . 644--644 D. K. G. Campbell Book Review . . . . . . . . . . . . . . 644--645 A. Larner Book Review . . . . . . . . . . . . . . 645--646 D. England Book Review . . . . . . . . . . . . . . 646--646 Anonymous Book Reviews . . . . . . . . . . . . . . ??
A. Puliafito and S. Riccobene and M. Scarpa Evaluation of Performability Parameters in Client-Server Environments . . . . . 647--662 Goran Lj. Djordjevi\'c and Milorad B. To\vsi\'c A Compile-Time Scheduling Heuristic for Multiprocessor Architectures . . . . . . 663--674 Joan M. Morrissey and W. T. Bealor Minimizing Data Transfers in Distributed Query Processing: a Comparative Study and Evaluation . . . . . . . . . . . . . 675--687 Xindong Wu A Bayesian Discretizer for Real-Valued Attributes . . . . . . . . . . . . . . . 688--691 Behrooz Parhami Parallel Threshold Voting . . . . . . . 692--700 Emil Sekerinski and Kaisa Sere A Theory of Prioritizing Composition . . 701--712 Shietung Peng and Stanislav Sedukhin Array Processors Design for Division-free Linear System Solving . . 713--722 A. Larner Book Review . . . . . . . . . . . . . . 723--723 D. K. G. Campbell Book Review . . . . . . . . . . . . . . 723--724 Anonymous Book reviews . . . . . . . . . . . . . . 723--730 S. J. J. Kent Book Review . . . . . . . . . . . . . . 724--724 T. Watson Book Review . . . . . . . . . . . . . . 724--725 D. A. Watt Book Review . . . . . . . . . . . . . . 725--725 D. K. G. Campbell Book Review . . . . . . . . . . . . . . 726--726 A. Larner Book Review . . . . . . . . . . . . . . 726--727 A. G. Hamilton Book Review . . . . . . . . . . . . . . 727--728 F. Sebastiani Book Review . . . . . . . . . . . . . . 728--728 F. Crestani Book Review . . . . . . . . . . . . . . 728--729 J. L. DePaul and T. T. Hewett Book Review . . . . . . . . . . . . . . 729--730
P. M. Fenwick The Burrows--Wheeler Transform for block sorting text compression: principles and improvements . . . . . . . . . . . . . . 731--740 K. L. Verco and M. J. Wise Plagiarism \`a la mode: a Comparison of Automated Systems for Detecting Suspected Plagiarism . . . . . . . . . . 741--750 M. Visvalingam and D. Varley and C. Wright A Cognitive Approach to Road Recognition with Novel Feature Indicators . . . . . 751--756 Ing-Ray Chen and Chi-Ming Chen Threshold-based Admission Control Policies for Multimedia Servers . . . . 757--766 I.-R. Chen and D.-C. Wang Analysis of Replicated Data with Repair Dependency . . . . . . . . . . . . . . . 767--779 J. Tubella and A. González and Eduard Elias The Multipath Architecture for Prolog Programs . . . . . . . . . . . . . . . . 780--792 P. van Bommel and P. J. M. Frederiks and Th. P. van der Weide Object-Oriented Modelling based on Logbooks . . . . . . . . . . . . . . . . 793--799 Jixin Ma and Brian Knight A Reified Temporal Logic . . . . . . . . 800--807 G. M. Seed and D. E. R. Clark and J. R. Corney and R. Tuttle and G. Little Object-Oriented Graph-Based Geometric Feature Recognition . . . . . . . . . . 808--811 A. Lunzer Book Review . . . . . . . . . . . . . . 812--813 M. D. Dunlop Book Review . . . . . . . . . . . . . . 813--813 K. Hammond Book Review . . . . . . . . . . . . . . 813--815 K. Hammond Book Review . . . . . . . . . . . . . . 813--815 K. Hammond Book Review . . . . . . . . . . . . . . 813--815 M. Joy Book Review . . . . . . . . . . . . . . 815--815 P. Wright and A. Dearden Book Review . . . . . . . . . . . . . . 815--816 S. Aitken Book Review . . . . . . . . . . . . . . 816--816 T. Ashworth Book Review . . . . . . . . . . . . . . 816--817 M. Joy Book Review . . . . . . . . . . . . . . 817--817
R. Ingram and S. Benford The Application of Legibility Techniques to Enhance Information Visualizations 819--836 C. Du An Interpolation Method for Grid-based Terrain Modelling . . . . . . . . . . . 837--843 N. Zhang and Q. Shi Achieving Non-repudiation of Receipt . . 844--853 A. B. McDonald and T. Znati ARP versus ES-IS: Performance Evaluation of Neighbour-Greeting Protocols . . . . 854--867 J. J. Sarbo Building Sub-knowledge Bases Using Concept Lattices . . . . . . . . . . . . 868--875 M. Díaz and B. Rubio and J. M. Troya Distributed Programming with a Logic Channel Based Coordination Model . . . . 876--889 M. R. Williams Book Review . . . . . . . . . . . . . . 890--891 S. Mills Book Review . . . . . . . . . . . . . . 891--891 M. Joy Book Review . . . . . . . . . . . . . . 891--892 R. Cardell-Oliver Book Review . . . . . . . . . . . . . . 892--892 D. K. G. Campbell Book Review . . . . . . . . . . . . . . 892--893
P. Cochrane From Copper to Glass: the Right Idea, Decisions and Investments at the Right Time\ldots . . . . . . . . . . . . . . . 1--11 D. G. Patrick and P. R. Green and T. A. York Occam- and C-Based Multiprocessor Environments for Unix Clusters . . . . . 12--21 P. Bozanis and N. Kitsios and C. Makris and A. Tsakalidis New Results on Intersection Query Problems . . . . . . . . . . . . . . . . 22--29 W.-J. Tsai and S.-Y. Lee Multi-Partition RAID: a New Method for Improving Performance of Disk Arrays under Failure . . . . . . . . . . . . . 30--42 E. Chan and C. Daoxu and J. Cao and C.-H. Lee Timing Properties of the FDDI-M Medium Access Protocol . . . . . . . . . . . . 43--49 X. Wu Hybrid Interpretation of `No Match' and `Multiple Match' in Induction . . . . . 50--57 P. W. Trinder Book Review . . . . . . . . . . . . . . 58--58 V. Stavridou Book Review . . . . . . . . . . . . . . 58--59 M. Butler Book Review . . . . . . . . . . . . . . 59--61 T. Forster Book Review . . . . . . . . . . . . . . 61--63
A. Moffat Editorial for Special Issue on Lossless Compression . . . . . . . . . . . . . . 65--66 A. Moffat Lossless Compression . . . . . . . . . . 65--66 J. G. Cleary and W. J. Teahan Unbounded Length Contexts for PPM . . . 67--75 S. Bunton Semantically Motivated Improvements for PPM Variants . . . . . . . . . . . . . . 76--93 Hidetoshi Yokoo Data Compression Using a Sort-Based Context Similarity Measure . . . . . . . 94--102 C. G. Nevill-Manning and I. H. Witten Compression and Explanation Using Hierarchical Grammars . . . . . . . . . 103--116 S. T. Klein Efficient Optimal Recompression . . . . 117--126 N. Memon and X. Wu Recent Developments in Context-Based Predictive Techniques for Lossless Image Compression . . . . . . . . . . . . . . 127--136 J. A. Storer and H. Helfgott Lossless Image Compression by Block Matching . . . . . . . . . . . . . . . . 137--145 P. G. Howard Text Image Compression Using Soft Pattern Matching . . . . . . . . . . . . 146--156 B. J. Frey and G. E. Hinton Efficient Stochastic Source Coding and an Application to a Bayesian Network Source Model . . . . . . . . . . . . . . 157--165
Andrew M. Dearden and Michael D. Harrison A Software Engineering Model for Case Memory Systems . . . . . . . . . . . . . 167--182 Alex Delis and Quang LeViet Contemporary Access Structures Under Mixed Workloads . . . . . . . . . . . . 183--193 Fun Ting Chan and Tsong Yueh Chen and Ieng Kei Mark and Shir Ming Shen On Some Properties of the Optimally Refined Proportional Sampling Strategy 194--199 Pranay Chaudhuri An optimal distributed algorithm for computing bridge- connected components 200--207 Fredrick H. Dahlgren and Per Stenström and Marten Björkman Reducing the Read-miss Penalty for Flat COMA Protocols . . . . . . . . . . . . . 208--219 Robert M. Hierons Testing from a Finite-State Machine: Extending Invertibility to Sequences . . 220--230 D. England Book Review . . . . . . . . . . . . . . 231--231 S. Rock Book Review . . . . . . . . . . . . . . 231--232 R. Turner Book Review . . . . . . . . . . . . . . 232--233 A. Larner Book Review . . . . . . . . . . . . . . 233--234
R. M. Colomb Impact of Semantic Heterogeneity on Federating Databases . . . . . . . . . . 235--244 F. de Ferreira Rezende and T. Härder and J. Zielinski Transaction Identifiers in Nested Transactions: Implementation Schemes and Performance . . . . . . . . . . . . . . 245--258 T. Bolognesi Expressive Flexibility of a Constraint-oriented Notation . . . . . . 259--277 L. Xiang and C. Tang and K. Ushijima Grammar-Oriented Enumeration of Binary Trees . . . . . . . . . . . . . . . . . 278--291 Z. Arnavut and S. S. Magliveras Lexical Permutation Sorting Algorithm 292--295 C. Waite Book Review . . . . . . . . . . . . . . 296--296 J. Bowen Book Review . . . . . . . . . . . . . . 296--297 B. C. Pierce Book Review . . . . . . . . . . . . . . 297--298 F. Sebastiani Book Review . . . . . . . . . . . . . . 298--299 S. Rock Book Review . . . . . . . . . . . . . . 299--299
M. Kumar and L. M. Patnaik Automatic Loop Parallelization . . . . . 301--301 Mohan Kumar and L. M. Patnaik Special Issue Editorial: Automatic Loop Parallelization . . . . . . . . . . . . 301--301 Hyuk-Jae Lee and José A. B. Fortes Communication-Minimal Partitioning and Data Alignment for Affine Nested Loops 302--310 Steven Novack and Alexandru Nicolau Resource-Directed Loop Pipelining: Exposing Just Enough Parallelism . . . . 311--321 Jialin Ju and Vipin Chaudhary Unique sets oriented parallelization of loops with non-uniform dependences . . . 322--339 Sharad K. Singhai and Kathryn S. McKinley A Parametrized Loop Fusion Algorithm for Improving Parallelism and Cache Locality 340--355 Michal Cierniak and Mohammed Javeed Zaki and Wei Li Compile-Time Scheduling Algorithms for a Heterogeneous Network of Workstations 356--372 Dattatraya Kulkarni and Micheal Stumm Linear and Extended Linear Transformations for Shared-Memory Multiprocessors . . . . . . . . . . . . 373--387 Balaram Sinharoy Optimized Thread Creation for Processor Multithreading . . . . . . . . . . . . . 388--400
Hong Va Leong and Antonio Si Database Caching Over the Air-Storage 401--415 Evan P. Harris and Kotagiri Ramamohanarao Optimal Clustering of Relations to Improve Sorting and Partitioning for Joins . . . . . . . . . . . . . . . . . 416--434 Yi Pan and Jerry L. Trathan and Ramachandran Vaidyanathan A Scalable and Efficient Algorithm for Computing the City Block Distance Transform on Reconfigurable Meshes . . . 435--440 Kshirasagar Naik Designing Reliable Test Architectures for Communication Protocols . . . . . . 441--456 Marlin H. Mickle An Electrical Circuit and Computer System Analogy . . . . . . . . . . . . . 457--462
Paddy Nixon and Vinny Cahill and Fethi Rabhi Building Parallel and Distributed Systems . . . . . . . . . . . . . . . . 463--464 K. Mandy Chandy and Adam Rikfin Systematic Composition of Distributed Objects: Processes and Sessions . . . . 465--478 Andry Rakotonirainy and Andrew Berry and Stephen Crawley and Zoran Milosevic Describing Open Distributed Systems: a Foundation . . . . . . . . . . . . . . . 479--488 Richard B. Kilgore and Craig M. Chase Testing Distributed Programs Containing Racing Messages . . . . . . . . . . . . 489--498 T. Kunz and J. P. Black and D. J. Taylor and T. Basten Poet: Target-System Independent Visualizations of Complex Distributed-Application Executions . . . 499--512 Vinny Cahill and Paddy Nixon and Brendan Tangney and Fethi Rabhi Object Models for Distributed or Persistent Programming . . . . . . . . . 513--527
S.-W. Lau and J. C. S. Lui Designing a Hierarchical Multimedia Storage Server . . . . . . . . . . . . . 529--540 C.-K. Shene An Analysis of Two In-Place Array Rotation Algorithms . . . . . . . . . . 541--546 P. Fränti and J. Kivijärvi and T. Kaukoranta and O. Nevalainen Genetic Algorithms for Large-Scale Clustering Problems . . . . . . . . . . 547--554 A. Sanna and P. Montuschi and A. Fisone and B. Montrucchio A New Algorithm for the Rendering of CSG Scenes . . . . . . . . . . . . . . . . . 555--564 E. Burke and K. Jackson and J. H. Kingston and R. Weare Automated University Timetabling: the State of the Art . . . . . . . . . . . . 565--571 L. M. G. Feijs and M. A. Reniers Lazy Functional Programs in a Concurrent Environment . . . . . . . . . . . . . . 572--584
David Tresman Caminer, OBE LEO and its applications: the beginning of business computing . . . . . . . . . 585--597 Dag I. K. Sjöberg and Ray Welland and Malcolm P. Atkinson Software Constraints for Large Application Systems . . . . . . . . . . 598--616 Derrick Morris and D. Gareth Evans and Simon Schofield Simulating the behaviour of computer systems: co-simulation of hardware/software . . . . . . . . . . . 617--629 Sanjay Kumar Madria A study of the concurrency control and recovery algorithms in nested transaction environment . . . . . . . . 630--639 Olaf Müller and Konrad Slind Treating Partiality in a Logic of Total Functions . . . . . . . . . . . . . . . 640--651 Anonymous Author index for 1997 . . . . . . . . . ?? Anonymous Subject index for 1997 . . . . . . . . . ??
Ana Cavalcanti and Jim Woodcock A Weakest Precondition Semantics for $Z$ 1--15 Michele Flammini and Jan van Leeuwen and Alberto Marchetti-Spaccamela The Complexity of Interval Routing on Random Graphs . . . . . . . . . . . . . 16--25 Soo-Mook Moon and Kemal Ebcio\uglu The Performance Impact of Exploiting Branch ILP with Tree Representation of ILP Code . . . . . . . . . . . . . . . . 26--44 Giuseppe Alia and Enrico Martinelli Logic Design of a Fast Circuit for Iterative Additions in Redundant Hybrid Number Systems . . . . . . . . . . . . . 45--51 Ding-Ming Kwai and Behrooz Parhami Tight Bounds on the Diameter of Gaussian Cubes . . . . . . . . . . . . . . . . . 52--56 C. Ierotheou and C. H. Lai and C. J. Palansuriya and K. A. Pericleous Simulation of $2$-D metal cutting by means of a distributed algorithm . . . . 57--63 R. Cooper Book Review . . . . . . . . . . . . . . 64--65 C.-H. L. Ong Book Review . . . . . . . . . . . . . . 65--66
Martyn Thomas Myths of the Year 2000 . . . . . . . . . 67--70 Christopher B. Jones and J. Mark Ware Proximity Search with a Triangulated Spatial Model . . . . . . . . . . . . . 71--83 P. Bodorik and D. Jutla Multi-View Memory Support to Operating Systems in Locking for Transaction and Database Systems . . . . . . . . . . . . 84--97 B. F. Jones and D. E. Eyres and H. H. Sthamer A Strategy for using Genetic Algorithms to Automate Branch and Fault-based Testing . . . . . . . . . . . . . . . . 98--107 Akhil Kumar and Noha Adly HPP: a Reliable Causal Broadcast Protocol for Large-Scale Replication in Wide Area Networks . . . . . . . . . . . 108--124 Woei-Jiunn Tsaur and Shi-Jinn Horng Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments . . . . . . . . . . . . . . 125--133 M. D. Dunlop Book Review . . . . . . . . . . . . . . 134--135 H. Barendregt and W. Dekkers Book Review . . . . . . . . . . . . . . 135--135
Roberto De Prisco and Alfredo De Santis On the Data Expansion of the Huffman Compression Algorithm . . . . . . . . . 137--144 Antonino Mazzeo and Nicola Mazzocca and Stefano Russo and Carlo Savy and Valeria Vittorini Formal Specification of Concurrent Systems: a Structured Approach . . . . . 145--162 Anton Biasizzo and Alenka Zuzek and Franc Novak Sequential Diagnosis with Asymmetrical Tests . . . . . . . . . . . . . . . . . 163--170 L. Q. Bai and H. Ebara and H. Nakano and H. Maeda Fault-Tolerant Broadcasting on the Arrangement Graph . . . . . . . . . . . 171--184 Jamel Tayeb and Özgür Ulusoy and Ouri Wolfson A Quadtree-Based Dynamic Attribute Indexing Method . . . . . . . . . . . . 185--200 Alois Panholzer and Helmut Prodinger Towards a More Precise Analysis of an Algorithm to Generate Binary Trees: a Tutorial . . . . . . . . . . . . . . . . 201--204
Jie Wu and Eduardo B. Fernandex and Donglai Dai Optimal Fault-Secure Scheduling . . . . 207--222 Keqin Li Optimizing Average Job Response Time via Decentralized Probabilistic Job Dispatching in Heterogeneous Multiple Computer Systems . . . . . . . . . . . . 223--230 I-Chen Wu and Loon-Been Chen On Detection of Bounded Global Predicates . . . . . . . . . . . . . . . 231--237 Savio S. H. Tse and Francis C. M. Lau More on the Efficiency of Interval Routing . . . . . . . . . . . . . . . . 238--242 Ing-Ray Chen and Tsong-Min Chen and Chiang Lee Performance Evaluation of Forwarding Strategies for Location Management in Mobile Networks . . . . . . . . . . . . 243--253 Shun-Shii Lin and Shan-Tai Chen On Detecting Multiple Faults in Baseline Interconnection Networks . . . . . . . . 254--269 Khaled A. A. Abdel-Ghaffar Detecting Substitutions and Transpositions of Characters . . . . . . 270--277 H. R. A. Townsend Letters . . . . . . . . . . . . . . . . 278--278 M. Fairtlough Book Review . . . . . . . . . . . . . . 279--280 M. Fairtlough Book Review . . . . . . . . . . . . . . 279--280 F. Sebastiani Book Review . . . . . . . . . . . . . . 280--281
W. Paul Cockshott and Douglas McGregor and John Wilson High performance operations using a compressed database architecture . . . . 283--296 Maarten van Steen and Franz J. Hauck and Gerco Ballintijn and Andrew S. Tanenbaum Algorithmic design of the globe wide-area location service . . . . . . . 297--310 Th. P. van der Weide and T. W. C. Huibers and P. van Bommel The incremental searcher satisfaction model for information retrieval . . . . 311--318 Stuart G. Hoggar and Lindsey Menzies Fractal Compression and the Jigsaw Property I . . . . . . . . . . . . . . . 319--336 Roberto Baldoni and Roberto Beraldi and Ravi Prakash Slotted-FIFO communication for asynchronous distributed systems . . . . 337--348 R. M. Hierons Adaptive testing of a deterministic implementation against a nondeterministic finite state machine 349--355
Michael Prasse and Peter Rittgen Why Church's Thesis still holds. Some notes on Peter Wegner's tracts on interaction and computability . . . . . 357--362 Hugh Robinson and Pat Hall and Fiona Hovenden and Janet Rachel Postmodern Software Development . . . . 363--375 Sanjay Kumar Madria Handling of mutual conflicts in distributed databases using timestamps 376--385 Declan P. Kelly ARC: a specification language for communicating systems . . . . . . . . . 386--401 K. W. Chu and S. K. Lam and M. H. Wong An efficient hash-based algorithm for sequence data searching . . . . . . . . 402--415 Zbigniew J. Czech Quasi-perfect Hashing . . . . . . . . . 416--421 E. Mäkinen Binary Tree Code Words as Context-Free Languages . . . . . . . . . . . . . . . 422--424 L. C. Paulson Book Review . . . . . . . . . . . . . . 425--425 B. M. Matthews Book Review . . . . . . . . . . . . . . 426--427 A. Dearden Book Review . . . . . . . . . . . . . . 427--428 F. Crestani Book Review . . . . . . . . . . . . . . 428--428
R. Benjamin and B. Gladman and B. Randell Protecting IT Systems from CyberCrime 429--443 Harold Thimbleby and Stuart Anderson and Paul Cairns A Framework for Modelling Trojans and Computer Virus Infection . . . . . . . . 444--458 Luc Moreau and Wendy Hall On the Expressiveness of Links in Hypertext Systems . . . . . . . . . . . 459--473 Pasi Fränti and Timo Hatakka Context Model Automata for Text Compression . . . . . . . . . . . . . . 474--485 S. E. Mitchell and A. J. Wellings and A. Romanovsky Distributed Atomic Actions in Ada 95 . . 486--502 Andrea Sanna and Paolo Montuschi and Massimo Rossi A Flexible Algorithm for Multiprocessor Ray Tracing . . . . . . . . . . . . . . 503--516
F. Murtagh Clustering and Classification . . . . . 517--517 F. Murtagh Foreword to special issue on clustering and classification . . . . . . . . . . . 517--517 Boris Mirkin Least-Squares Structuring, Clustering and Data Processing Issues . . . . . . . 518--536 Y. H. Li and A. K. Jain Classification of Text Documents . . . . 537--546 Valerie J. Gillet and David J. Wild and Peter Willett and John Bradshaw Similarity and Dissimilarity Methods for Processing Chemical Structure Databases 547--558 Ryuichi Oka Spotting Method for Classification of Real World Data . . . . . . . . . . . . 559--565 Lawrence Hubert and Phipps Arabie and Jacqueline Meulman The Representation of Symmetric Proximity Data: Dimensions and Classifications . . . . . . . . . . . . 566--577 Chris Fraley and Adrian E. Raftery How Many Clusters? Which Clustering Method? Answers Via Model-Based Cluster Analysis . . . . . . . . . . . . . . . . 578--588 Dian I. Witter and Michael W. Berry Downdating the Latent Semantic Indexing Model for Conceptual Information Retrieval . . . . . . . . . . . . . . . 589--601 C. S. Wallace Intrinsic Classification of Spatially Correlated Data . . . . . . . . . . . . 602--611
L. Allison and D. Powell and T. I. Dix Compression and approximate matching . . 1--10 S. Kocberber and F. Can and J. M. Patton Optimization of signature file parameters for databases with varying record lengths . . . . . . . . . . . . . 11--23 M. Choy Consistent implementations of replicated objects . . . . . . . . . . . . . . . . 24--38 G. S. Chinchwadkar and A. Goh An overview of vertical partitioning in object oriented databases . . . . . . . 39--50 Carlo Blundo and P. D'Arco and A. G. Gaggia A $\tau$-restricted key agreement scheme 51--61 S. Loucif and M. Ould-Khaoua and L. M. Mackenzie On the performance merits of bypass channels in hypermeshes and $k$-ary $n$-cubes . . . . . . . . . . . . . . . 62--72
Birgit Schieder and Manfred Broy Adapting Calculational Logic to the Undefined . . . . . . . . . . . . . . . 73--81 Richard F. Paige Integrating a Program Design Calculus and a Subset of UML . . . . . . . . . . 82--99 Ykä Huhtala and Juha Kärkkäinen and Pasi Porkka and Hannu Toivonen TANE: An Efficient Algorithm for Discovering Functional and Approximate Dependencies . . . . . . . . . . . . . . 100--111 Chung-Ming Huang and Ming-Yuhe Jang Interactive Temporal Behaviours and Modelling for Multimedia Presentations in the WWW Environment . . . . . . . . . 112--128 Min-Sheng Lin and Deng-Jyi Chen and Maw-Sheng Horng The Reliability Analysis of Distributed Computing Systems with Imperfect Nodes 129--141 W. F. Wong Source Level Static Branch Prediction 142--149 Jim Rook and Ian J. Lloyd and Kenneth J. Turner Book Reviews . . . . . . . . . . . . . . 150--152
Harry W. Agius and Marios C. Angelides COSMOS-Content Oriented Semantic Modelling Overlay Scheme . . . . . . . . 153--176 Richard Bornat and Bernard Sufrin Animating Formal Proof at the Surface: The Jape Proof Calculator . . . . . . . 177--192 Hugh E. Williams and Justin Zobel Compressing Integers for Fast File Access . . . . . . . . . . . . . . . . . 193--201 Weijia Jia and Jiannong Cao and To-Yat Cheung and Xiaohua Jia A Multicast Protocol Based on a Single Logical Ring Using a Virtual Token and Logical Clocks . . . . . . . . . . . . . 202--220 Kecheng Liu and Tina Ong A Modelling Approach for Handling Business Rules and Exceptions . . . . . 221--231 Ahmad A. Hiasat and Hoda Abdel-Aty-Zohdy Semi-Custom VLSI Design and Implementation of a New Efficient RNS Division Algorithm . . . . . . . . . . . 232--240 Neven Tomov and Euan Dempster and M. Howard Williams and Peter J. B. King and Albert Burger Approximate Estimation of Transaction Response Time . . . . . . . . . . . . . 241--250
Alexander Gammerman and Vladimir Vovk Special Issue Editorial: Kolmogorov Complexity . . . . . . . . . . . . . . . 251--251 Alexander Gammerman and Vladimir Vovk Kolmogorov Complexity: Sources, Theory and Applications . . . . . . . . . . . . 252--255 Ray Solomonoff Two Kinds of Probabilistic Induction . . 256--259 J. Rissanen Hypothesis Selection and Testing by the MDL Principle . . . . . . . . . . . . . 260--269 C. S. Wallace and D. L. Dowe Minimum Message Length and Kolmogorov Complexity . . . . . . . . . . . . . . . 270--283 Leonid. A. Levin Robust Measures of Information . . . . . 284--286 Tao Jiang and Ming Li and Paul Vitányi New Applications of the Incompressibility Method . . . . . . . . 287--293 V. V. V'yugin Algorithmic Complexity and Stochastic Properties of Finite Binary Sequences 294--317 Vladimir Vovk and Alexander Gammerman Complexity Approximation Principle . . . 318--322 A. P. Dawid Discussion of the Papers by Rissanen and by Wallace and Dowe . . . . . . . . . . 323--326 Jorma Rissanen Discussion of paper `Minimum Message Length and Kolmogorov Complexity' by C. S. Wallace and D. L. Dowe . . . . . . . 327--329 C. S. Wallace and D. L. Dowe Refinements of MDL and MML Coding . . . 330--337 B. Clarke Discussion of the Papers by Rissanen, and by Wallace and Dowe . . . . . . . . 338--339 Alexander Shen Discussion on Kolmogorov Complexity and Statistical Analysis . . . . . . . . . . 340--342 Jorma Rissanen Rejoinder . . . . . . . . . . . . . . . 343--344 C. S. Wallace and D. L. Dowe Rejoinder . . . . . . . . . . . . . . . 345--347
A. H. M. ter Hofstede and M. E. Orlowska On the Complexity of Some Verification Problems in Process Control Specifications . . . . . . . . . . . . . 349--359 Norman Ramsey Eliminating Spurious Error Messages Using Exceptions, Polymorphism, and Higher-Order Functions . . . . . . . . . 360--372 Mayez Al-Mouhamed Evolution-Based Scheduling of Computations and Communications on Distributed-Memory Multicomputers . . . 373--390 R. W. P. Luk Near Optimal $\beta$ Heap . . . . . . . 391--399 Tadao Takaoka $O(1)$ Time Algorithms for Combinatorial Generation by Tree Traversal . . . . . . 400--408 Po-Jen Chuang and Huey-Ming Hsu Effective Fault Diagnosis Approaches for Multipath Networks . . . . . . . . . . . 409--421 Miroslav Bojovic and Milo Tomasevic and Jovan Djordjevic The Interactive Development and Testing System for a RISC-Style Processor . . . 422--429 Tsong Yueh Chen and Man Fai Lau On the Completeness of a Test Suite Reduction Strategy . . . . . . . . . . . 430--440
Mohan Kumar Special Issue Editorial: Mobile Computing . . . . . . . . . . . . . . . 441--441 Kevin W. Froese and Richard B. Bunt Cache Management for Mobile File Service 442--454 Cedric C. F. Fong and John C. S. Lui and M. H. Wong Distributed Caching and Broadcast in a Wireless Mobile Computing Environment 455--472 Sajal K. Das and Sanjoy K. Sen Adaptive Location Prediction Strategies Based on a Hierarchical Network Model in a Cellular Mobile Environment . . . . . 473--486 Sihui Zhou and Aruna Seneviratne and Terry Percival An Efficient Location Management Scheme for Hybrid Wireless Asynchronous Transfer Mode Networks . . . . . . . . . 487--500 Ersan Kayan and Özgür Ulusoy An Evaluation of Real-Time Transaction Management Issues in Mobile Database Systems . . . . . . . . . . . . . . . . 501--510 Guan-Chi Chen and Suh-Yin Lee An Analytic Model for Performance Analysis of Concurrency Control Strategies in Mobile Environments . . . 511--521 Kuang-Hwei Chi and Chien-Chao Tseng and Ting-Lu Huang A Framework for Mobile Multicast Using Dynamic Route Reconstructions . . . . . 522--533 Timothy Bickmore and Andreas Girgensohn and Joseph W. Sullivan Web Page Filtering and Re-Authoring for Mobile Users . . . . . . . . . . . . . . 534--546
Mounia Lalmas A Model for Representing and Retrieving Heterogeneous Structured Documents Based on Evidential Reasoning . . . . . . . . 547--568 N. Zhang and Q. Shi and M. Merabti A Flexible Approach to Secure and Fair Document Exchange . . . . . . . . . . . 569--581 Francesca Arcelli Fontana and Ferrante Formato and Remo Pareschi Computational Models for Information Reuse . . . . . . . . . . . . . . . . . 582--591 Wanlei Zhou and Andrzej Goscinski Managing Replicated Remote Procedure Call Transactions . . . . . . . . . . . 592--608 Esther Jennings Distributed Algorithms for Finding Central Paths in Tree Networks . . . . . 609--612 Tatsuhiro Tsuchiya and Tohru Kikuno Availability Evaluation of Quorum-Based Mutual Exclusion Schemes in General Topology Networks . . . . . . . . . . . 613--622 Richard Mitchell and B. de la Iglesia and J. C. W. Debuse and Mark Staples Book Reviews . . . . . . . . . . . . . . 623--625
Alexander Romanovsky On Structuring Cooperative and Competitive Concurrent Systems . . . . . 627--637 Keith M. Martin and Rei Safavi-Naini and Huaxiong Wang Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures . . . . . . . . . . . 638--649 Martin P. Ward and Keith H. Bennett Recursion Removal/Introduction by Formal Transformation: An Aid to Program Development and Program Comprehension 650--673 Kam-Yiu Lam and Chung-Leung Pang and Sang H. Son and Jiannong Cao Resolving Executing-Committing Conflicts in Distributed Real-time Database Systems . . . . . . . . . . . . . . . . 674--692 H. Leung and T. Y. Chen A New Perspective of the Proportional Sampling Strategy . . . . . . . . . . . 693--698 Voon-Yee Vee and Wen-Jing Hsu Applying Cilk in Provably Efficient Task Scheduling . . . . . . . . . . . . . . . 699--712 Mark Sanderson Book Reviews . . . . . . . . . . . . . . 713--715
Erkki Mäkinen Comment on `A Framework for Modelling Trojans and Computer Virus Infection' 321--323 H. Thimbleby and S. O. Anderson and P. A. Cairns Reply to ``Comment on `A Framework for Modelling Trojans and Computer Virus Infection' by E. Mäkinen'' . . . . . . . 324--325 Fred Cohen Reply to ``Comment on `A Framework for Modelling Trojans and Computer Virus Infection' by E. Mäkinen'' . . . . . . . 326--327