Last update:
Sat Mar 30 12:06:52 MDT 2019
Gianni Amati and Iadh Ounis Conceptual Graphs and First Order Logic 1--12 Jeremy M. R. Martin A Tool for Checking the CSP \bf sat Property . . . . . . . . . . . . . . . . 13--23 A. D. Pengelly and D. C. Ince Quotient Machines, the Interface Equation and Protocol Conversion . . . . 24--39 John Ellis and Minko Markov In situ, Stable Merging by Way of the Perfect Shuffle . . . . . . . . . . . . 40--53 Simon Y. Berkovich and Eyas El-Qawasmeh Reversing the Error-Correction Scheme for a Fault-Tolerant Indexing . . . . . 54--64 Kam-yiu Lam and Tei-Wei Kuo and Wai-Hung Tsang and Gary C. K. Law The Reduced Ceiling Protocol for Concurrency Control in Real-time Databases with Mixed Transactions . . . 65--80 Suk-Kyu Song and Narasimhaiah Gorla A Genetic Algorithm for Vertical Fragmentation and Access Path Selection 81--93
Brian Randell Turing Memorial Lecture: Facing Up to Faults . . . . . . . . . . . . . . . . . 95--106 Fionn Murtagh and Jean-Luc Starck and Michael W. Berry Overcoming the Curse of Dimensionality in Clustering by Means of the Wavelet Transform . . . . . . . . . . . . . . . 107--120 F. Luccio and M. Mahafzah and M. Omari and L. Pagli Masked Interval Routing: a New Routing Scheme . . . . . . . . . . . . . . . . . 121--129 Marina Papatriantafilou and Phillippas Tsigas Wait-Free Handshaking Using Rainbow Colouring . . . . . . . . . . . . . . . 130--137 Lizy Kurian John Data Placement Schemes to Reduce Conflicts in Interleaved Memories . . . 138--151 Imtiaz Ahmad and Muhammad K. Dhodhi and Faridah M. Ali TLS: a Tabu Search Based Scheduling Algorithm for Behavioral Synthesis of Functional Pipelines . . . . . . . . . . 152--166
Ian Holyer and Hüseyin Pehlivan A Recovery Mechanism for Shells . . . . 168--176 Tatiana Tambouratzis Counter-clustering for Training Pattern Selection . . . . . . . . . . . . . . . 177--190 Cinzia Bernardeschi and Alessandro Fantechi and Luca Simoncini Formally Verifying Fault Tolerant System Designs . . . . . . . . . . . . . . . . 191--205 Samir M. Koriem A Fuzzy Petri Net Tool For Modeling and Verification of Knowledge-Based Systems 206--223 Sòren Christensen and Laure Petrucci Modular Analysis of Petri Nets . . . . . 224--242 Cyril Gavoille On the Dilation of Interval Routing . . 243--249
Hugh Glaser and Pieter H. Hartel and Paul W. Garratt Programming by Numbers: a Programming Method for Novices . . . . . . . . . . . 252--265 S. Zeadally Implementation and Performance of QoS-aware Java Applications over ATM Networks . . . . . . . . . . . . . . . . 266--273 Tijn Borghuis and Loe Feijs A Constructive Logic for Services and Information Flow in Computer Networks 274--289 Limin Xiang and Kazuo Ushijima and Selim G. Akl Generating Regular $k$-ary Trees Efficiently . . . . . . . . . . . . . . 290--300 Eleni Tousidou and Alex Nanopoulos and Yannis Manolopoulos Improved Methods for Signature-Tree Construction . . . . . . . . . . . . . . 301--314 Kuo-Liang Chung and Hsiu-Niang Chen A Neighbor-finding Algorithm for Bincode-based Images on Reconfigurable Meshes . . . . . . . . . . . . . . . . . 315--324 Theodoros Tzouramanis and Michael Vassilakopoulos and Yannis Manolopoulos Overlapping Linear Quadtrees and Spatio-Temporal Query Processing . . . . 325--324
Sourav S. Bhowmick and Sanjay Madria and Wee Keong Ng and Ee-Peng Lim Data Visualization Operators for WHOWEDA 364--385 Sheng-Tzong Cheng and Chia-Mei Chen Dynamic Round-based Resource Management for On-demand Multimedia Servers . . . . 386--395 Duen-Ren Liu and Chen-Hsien Lin and Jing-Jang Hwang Classifying Video Documents by Hierarchical Structure of Video Contents 396--410 H. Sarbazi-Azad and M. Ould-Khaoua and L. M. Mackenzie Message Latency in Hypercubes in the Presence of Matrix-Transpose Traffic . . 411--419 Antigoni Manousaka and Yannis Manolopoulos Fringe Analysis of $2$-$3$ Trees with Lazy Parent Split . . . . . . . . . . . 420--429 Willy Susilo and Rei Safavi-Naini and Marc Gysin and Jennifer Seberry A New and Efficient Fail-stop Signature Scheme . . . . . . . . . . . . . . . . . 430--437
James Noble Arguments and Results . . . . . . . . . 439--450 K. Lano and R. France and J.-M. Bruel A Semantic Comparison of Fusion and Syntropy . . . . . . . . . . . . . . . . 451--468 Konstantin Läufer and Gerald Baumgartner and Vincent F. Russo Safe Structural Conformance for Java . . 469--481 Houman Younessi An Algorithm for Automatic Construction of Class Diagrams . . . . . . . . . . . 482--490 Suad Alagi\'c Temporal Object-Oriented Programming . . 491--511 Eun-Sun Cho and Hyoung-Joo Kim Interface/implementation Separation Mechanism for Integrating Object-oriented Management Systems and General-purpose Programming Languages 512--523 Jung-Ho Ahn and Hyoung-Joo Kim Dynamic SEOF: An Adaptable Object Prefetch Policy for Object-oriented Database Systems . . . . . . . . . . . . 524--537
Michael Luck and Mark d'Inverno A Conceptual Framework for Agent Definition and Development . . . . . . . 1--20 Giuseppe Anastasi and Alberto Bartoli and Nicoletta De Francesco and Antonella Santone Efficient Verification of a Multicast Protocol for Mobile Computing . . . . . 21--30 Sijing Zhang and E. Stewart Lee and Alan Burns Determining the Worst-case Synchronous Message Response Time in FDDI Networks 31--41 Juha Puustjärvi Workflow Concurrency Control . . . . . . 42--53 Jason Crampton and George Loizou and Greg O'Shea A Logic of Access Control . . . . . . . 54--66
Nick Donofrio Turing Memorial Lecture . . . . . . . . 67--74 Evaggelia Pitoura and Ioannis Fudos Distributed Location Databases for Tracking Highly Mobile Objects . . . . . 75--91 Roberto Baldoni and Francesco Quaglia and Michel Raynal Consistent Checkpointing for Transaction Systems . . . . . . . . . . . . . . . . 92--100 F. C. M. Lau and P. K. W. Cheng and S. S. H. Tse An Algorithm for the $2$-Median Problem on Two-Dimensional Meshes . . . . . . . 101--108 N. De Francesco and A. Fantechi and S. Gnesi and P. Inverardi Finite Approximations for Model Checking Non-finite-state Processes . . . . . . . 109--123 Daniel Y. Chao and Jose A. Nicdao Liveness for Synchronized Choice Petri Nets . . . . . . . . . . . . . . . . . . 124--136 Jason Crampton and George Loizou and Greg O'Shea A Logic of Access Control . . . . . . . 137--149
Willis H. Ware Introduction to Davies' paper . . . . . 151--151 D. W. Davies An Historical Study of the Beginnings of Packet Switching . . . . . . . . . . . . 152--162 Kostas Politopoulos and George F. Georgakopoulos and Panagiotis Tsanakas Precedence Constrained Scheduling: a Case in P . . . . . . . . . . . . . . . 163--173 A. Stewart and M. Clint BSP-style Computation: a Semantic Investigation . . . . . . . . . . . . . 174--185 Da-Qian Zhang and Kang Zhang and Jiannong Cao A Context-sensitive Graph Grammar Formalism for the Specification of Visual Languages . . . . . . . . . . . . 186--200 SangKeun Lee and Chong-Sun Hwang Unified Protocols of Concurrency Control and Recovery in Distributed Object-based Databases . . . . . . . . . . . . . . . 201--213 C.-H. Lai and C. S. Ierotheou and C. J. Palansuriya and K. A. Pericleous Performance Evaluation of a Distributed Algorithm for an Inverse Heat Conduction Problem . . . . . . . . . . . . . . . . 214--220
Alexis C. Kaporis and Lefteris M. Kirousis and Evangelos Kranakis and Danny Krizanc and Yannis C. Stamatiou and Elias C. Stavropoulos Locating Information with Uncertainty in Fully Interconnected Networks with Applications to World Wide Web Information Retrieval . . . . . . . . . 221--229 H. Bowman and J. W. Bryans and J. Derrick Analysis of a Multimedia Stream using Stochastic Process Algebra . . . . . . . 230--245 H. M. W. Verbeek and T. Basten and W. M. P. van der Aalst Diagnosing Workflow Processes using Woflan . . . . . . . . . . . . . . . . . 246--279 Yuke Wang and Carl McCrosky and Xiaoyu Song Single-faced Boolean Functions and their Minimization . . . . . . . . . . . . . . 280--291 Limin Xiang and Kazuo Ushijima On $O(1)$ Time Algorithms for Combinatorial Generation . . . . . . . . 292--302 M. Amor and F. Argüello and J. López and O. Plata and E. L. Zapata A Data-Parallel Formulation for Divide and Conquer Algorithms . . . . . . . . . 303--320 Erkki Mäkinen Comment on `A Framework for Modelling Trojans and Computer Virus Infection' 321--323 H. Thimbleby and S. O. Anderson and P. A. Cairns Reply to ``Comment on `A Framework for Modelling Trojans and Computer Virus Infection' by E. Mäkinen'' . . . . . . . 324--325 Fred Cohen Reply to ``Comment on `A Framework for Modelling Trojans and Computer Virus Infection' by E. Mäkinen'' . . . . . . . 326--327
Xiaohua Jia and Deying Li and Xiaodong Hu and DingZhu Du Optimal Placement of Web Proxies for Replicated Web Servers in the Internet 329--339 Aline Baggio and Gerco Ballintijn and Maarten van Steen and Andrew S. Tanenbaum Efficient Tracking of Mobile Objects in Globe . . . . . . . . . . . . . . . . . 340--353 San-Yuan Wang and Yu-Chee Tseng and Ching-Sung Shiu and Jang-Ping Sheu Balancing Traffic Load for Multi-Node Multicast in a Wormhole $2$-D Torus/Mesh 354--367 J. Al-Sadi and K. Day and M. Ould-Khaoua Probability-based Fault-tolerant Routing in Hypercubes . . . . . . . . . . . . . 368--373 Guihai Chen and Francis C. M. Lau Layout of the Cube-connected Cycles without Long Wires . . . . . . . . . . . 374--383 Jitian Xiao and Yanchun Zhang and Xiaohua Jia Clustering Non-uniform-sized Spatial Objects to Reduce I/O Cost for Spatial-join Processing . . . . . . . . 384--397 Ngoc Thanh Nguyen Consensus-based Timestamps in Distributed Temporal Databases . . . . . 398--409 David E. Losada and Alvaro Barreiro A Logical Model for Information Retrieval based on Propositional Logic and Belief Revision . . . . . . . . . . 410--424 Robert W. P. Luk Compact Morphic Directed Acyclic Word Graphs . . . . . . . . . . . . . . . . . 425--434 Ousmane Koné A Local Approach to the Testing of Real-time Systems . . . . . . . . . . . 435--447 C. Canal and L. Fuentes and E. Pimentel and J. M. Troya and A. Vallecillo Extending CORBA Interfaces with Protocols . . . . . . . . . . . . . . . 448--462 Gwoboa Horng An Efficient and Secure Protocol for Multi-party Key Establishment . . . . . 463--470
Ing-Ray Chen Special Issue Editorial. High Assurance Systems . . . . . . . . . . . . . . . . 471--472 Tadashi Dohi and Katerina Go\vseva-Popstojanova and Kishor Trivedi Estimating Software Rejuvenation Schedules in High-Assurance Systems . . 473--485 Steve Goddard and Kevin Jeffay Managing Latency and Buffer Requirements in Processing Graph Chains . . . . . . . 486--503 Jeffrey J. P. Tsai and Eric Y. T. Juan Modeling and Verification of High-Assurance Properties of Safety-Critical Systems . . . . . . . . 504--530 Iain Bate and Philippa Conmy and Tim Kelly and John McDermid Use of Modern Processors in Safety-Critical Applications . . . . . . 531--543 F. Grandoni and S. Chiaradonna and F. Di Giandomenico and A. Bondavalli Evaluation of Fault-Tolerant Multiprocessor Systems for High Assurance Applications . . . . . . . . . 544--556 Zhiwei Xu and Taghi M. Khoshgoftaar Software Quality Prediction for High-Assurance Network Telecommunications Systems . . . . . . . 557--568 Alessandro F. Garcia and Delano M. Beder and Cecília M. F. Rubira A Unified Meta-Level Software Architecture for Sequential and Concurrent Exception Handling . . . . . 569--587
Faron G. Moller Editorial: Formal Methods in Computation 1--1 Howard Barringer and Donal Fellows and Graham Gough and Alan Williams Rainbow: Development, Simulation and Analysis Tools for Asynchronous Micropipeline Hardware Design . . . . . 2--11 Doug Edwards and Andrew Bardsley Balsa: An Asynchronous Hardware Synthesis Language . . . . . . . . . . . 12--18 Steve Furber Validating the AMULET Microprocessors 19--26 Michael J. C. Gordon Relating Event and Trace Semantics of Hardware Description Languages . . . . . 27--36 Michael Norrish and Konrad Slind A Thread of HOL Development . . . . . . 37--45 Susan Older and Shiu-Kai Chin Formal Methods for Assuring Security of Protocols . . . . . . . . . . . . . . . 46--54 M. Calder and S. Maharaj and C. Shankland A Modal Logic for Full LOTOS based on Symbolic Transition Systems . . . . . . 55--61 C. Tofts Traffic Modelling and Probabilistic Process Abstraction . . . . . . . . . . 62--67 J. V. Tucker and Sergei Vorobyov and Chris Tofts Book Reviews . . . . . . . . . . . . . . 68--71 Chung-Ming Huang and Yu-Chang Chao Differentiated Information Presentations for Heterogeneous I/O Devices using a Single Mark-up Language Approach . . . . 72--87 Ali Shatnawi and M. O. Ahmad and M. N. S. Swamy Optimal Scheduling of Digital Signal Processing Data-flow Graphs using Shortest-path Algorithms . . . . . . . . 88--100 Shih-Lin Wu and Yu-Chee Tseng and Chih-Yu Lin and Jang-Ping Sheu A Multi-channel MAC Protocol with Power Control for Multi-hop Mobile Ad Hoc Networks . . . . . . . . . . . . . . . . 101--110 Xudong He and Yi Deng A Framework for Developing and Analyzing Software Architecture Specifications in SAM . . . . . . . . . . . . . . . . . . 111--128
Syed Masud Mahmud and L. Tissa Samaratunga and Shilpa Kommidi Fault-Tolerant Hierarchical Networks for Shared Memory Multiprocessors and their Bandwidth Analysis . . . . . . . . . . . 147--161 Xiao Jun Chen and Hasan Ural Construction of Deadlock-free Designs of Communication Protocols from Observations . . . . . . . . . . . . . . 162--173 Tien-Tai Pan and Shun-Shii Lin Constant-time Algorithms for Minimum Spanning Tree and Related Problems on Processor Array with Reconfigurable Bus Systems . . . . . . . . . . . . . . . . 174--186 Fairouz Kamareddine and Alejandro Ríos Pure Type Systems with de Bruijn Indices 187--201 N. Parimala Explicit Operation Specification for Component Databases . . . . . . . . . . 202--212 Alan Gibbons and Ida Pu and Muthu Muthukrishnan Exact Analyses of a Simple Heuristic Employed in Array Compression . . . . . 213--220 Alexey Stakhov Brousentsov's Ternary Principle, Bergman's Number System and Ternary Mirror-symmetrical Arithmetic . . . . . 221--236 Vladimir B. Balakirsky A New Coding Algorithm for Trees . . . . 237--242 Vladimir B. Balakirsky Block Codes for Asynchronous Data Transmission Designed from Binary Trees 243--248 S. Conrad and W. Hasselbring and A. James and D. Kambur and R.-D. Kutsche and P. Thiran Report on the EFIS 2001 Workshop . . . . 249--251 Ananda Amatya Book Review . . . . . . . . . . . . . . 252--252 Edward Smith Book Review . . . . . . . . . . . . . . 252--253 Marco Locatelli Book Review . . . . . . . . . . . . . . 253--253 R. A. O'Keefe Book Review . . . . . . . . . . . . . . 253--254 Wai-hung Chan Book Review . . . . . . . . . . . . . . 254--255 Claude Kirchner Book Review . . . . . . . . . . . . . . 255--256 Carl Pomerance Book Review . . . . . . . . . . . . . . 256--256
Fionn Murtagh Editorial: Statistics and Trends . . . . 259--259 Gábor Huszerl and István Majzik and András Pataricza and Konstantinos Kosmidis and Mario Dal Cin Quantitative Analysis of UML Statechart Models of Dependable Systems . . . . . . 260--277 Liu Zhenglin and Xu Chongyang An Analytical Model for the Performance of the DOCSIS CATV Network . . . . . . . 278--284 G. E. Farr and C. S. Wallace The Complexity of Strict Minimum Message Length Inference . . . . . . . . . . . . 285--292 Goichiro Hanaoka and Tsuyoshi Nishioka and Yuliang Zheng and Hideki Imai A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks . . . . . . . . . . . . . . . . 293--303 Ing-Ray Chen and Baoshan Gu A Comparative Cost Analysis of Degradable Location Management Algorithms in Wireless Networks . . . . 304--319 Theo Ungerer and Borut Robi\vc and Jurij \vSilc Multithreaded Processors . . . . . . . . 320--348 Jie Wu A Fault-tolerant Adaptive and Minimal Routing Scheme in $n$-D Meshes . . . . . 349--363 James F. Korsh and Paul LaFollette Loopless Generation of Trees with Specified Degrees . . . . . . . . . . . 364--372 Hiroo Iwata Book Review . . . . . . . . . . . . . . 373--373 Barry Munro Book Review . . . . . . . . . . . . . . 373--373 Rowan Limb Book Review . . . . . . . . . . . . . . 373--374 Simon Berry Book Review . . . . . . . . . . . . . . 374--374 David Menzies Book Review . . . . . . . . . . . . . . 374--375 Arvind Aggarwal Book Review . . . . . . . . . . . . . . 375--375 Margherita Napoli Book Review . . . . . . . . . . . . . . 375--376 Geoffrey Archenhold Book Review . . . . . . . . . . . . . . 376--377 Scott W. Ambler Book Review . . . . . . . . . . . . . . 377--377
Anonymous Capsule Reviews . . . . . . . . . . . . 379--380 Hazem T. El-Khatib and M. Howard Williams and David H. Marwick and Lachlan M. Mackinnon Using a Distributed Approach to Retrieve and Integrate Information from Heterogeneous Distributed Databases . . 381--394 Daeyoung Kim and Yann-Hang Lee Periodic and Aperiodic Task Scheduling in Strongly Partitioned Integrated Real-time Systems . . . . . . . . . . . 395--409 Victor C. S. Lee and Kwok-Wa Lam and Sang H. Son Concurrency Control Using Timestamp Ordering in Broadcast Environments . . . 410--422 Alan Roberts and Antonios Symvonis and David R. Wood Lower Bounds for One-to-one Packet Routing on Trees using Hot-Potato Algorithms . . . . . . . . . . . . . . . 423--435 Yang Jun and Greg Michaelson and Phil Trinder Explaining Polymorphic Types . . . . . . 436--452 Constantinos Papadopoulos An Extended Temporal Logic for CSCW . . 453--472 Claudio Fornaro Book Review . . . . . . . . . . . . . . 473--473 Daniel D. G. Moth Book Review . . . . . . . . . . . . . . 473--474 Matthew Outram Book Review . . . . . . . . . . . . . . 474--474 Andrea Sanna Book Review . . . . . . . . . . . . . . 474--474 André Grosse Book Review . . . . . . . . . . . . . . 475--475 Paolo Montuschi Book Review . . . . . . . . . . . . . . 475--475 Angela Bonifati Book Review . . . . . . . . . . . . . . 476--476 Giuseppe Decandia Book Review . . . . . . . . . . . . . . 476--476 Ing. Felice Tartaro Book Review . . . . . . . . . . . . . . 476--477 Ananda Amatya Book Review . . . . . . . . . . . . . . 477--477
Anonymous Capsule Reviews . . . . . . . . . . . . 479--480 Janne Skyt and Christian S. Jensen Persistent Views --- A Mechanism for Managing Ageing Data . . . . . . . . . . 481--493 B. John Oommen and Luis G. Rueda The Efficiency of Histogram-like Techniques for Database Query Optimization . . . . . . . . . . . . . . 494--510 Victoria S. Uren and Thomas R. Addis How Weak Categorizers Based Upon Different Principles Strengthen Performance . . . . . . . . . . . . . . 511--524 Irina Kozatchok and Samuel Pierre User Tracking and Mobility Management Algorithm for Wireless Networks . . . . 525--539 Wei Jie and Wentong Cai and Stephen J. Turner POEMS: a Parallel Object-oriented Environment for Multi-computer Systems 540--560 Peter Sanders Randomized Receiver Initiated Load-balancing Algorithms for Tree-shaped Computations . . . . . . . . 561--573 Giuseppe Prencipe Book Review . . . . . . . . . . . . . . 574--575 Elizabeth F. Churchill Book Review . . . . . . . . . . . . . . 575--577 Michele Zito Book Review . . . . . . . . . . . . . . 577--578 Daniel Berleant Book Review . . . . . . . . . . . . . . 578--579 Paolo Montuschi Book Review . . . . . . . . . . . . . . 579--579
Anonymous Capsule Reviews . . . . . . . . . . . . 581--582 Anna Formica and Michele Missikoff Concept Similarity in SymOntos: An Enterprise Ontology Management Tool . . 583--594 Paolo Bellavista and Antonio Corradi and Cesare Stefanelli Java for On-line Distributed Monitoring of Heterogeneous Systems and Services 595--607 Jonathan J. Cook Reverse Execution of Java Bytecode . . . 608--619 John Aycock and R. Nigel Horspool Practical Earley Parsing . . . . . . . . 620--630 John W. Raymond and Eleanor J. Gardiner and Peter Willett RASCAL: Calculation of Graph Similarity using Maximum Common Edge Subgraphs . . 631--644 M. C. Little and S. K. Shrivastava and N. A. Speirs Using Bloom Filters to Speed-up Name Lookup in Distributed Systems . . . . . 645--652 Jarmo Siltaneva and Erkki Mäkinen A Comparison of Random Binary Tree Generators . . . . . . . . . . . . . . . 653--660 Masayuki Abe and Masayuki Kanda A Key Escrow Scheme with Time-Limited Monitoring for One-way Communication . . 661--671 Wen-Shenq Juang and Chin-Laung Lei and Horng-Twu Liaw A Verifiable Multi-Authority Secret Election Allowing Abstention from Voting 672--682 Massimo Franceschet and Angelo Montanari Book Review . . . . . . . . . . . . . . 683--685 M. J. Pont Book Review . . . . . . . . . . . . . . 685--686 Andrea Valente Book Review . . . . . . . . . . . . . . 686--687 Marco Botta Book Review . . . . . . . . . . . . . . 687--688 Andrea Bobbio Book Review . . . . . . . . . . . . . . 688
Anonymous Capsule Reviews . . . . . . . . . . . . 1--2 Giuseppe Anastasi and Marco Conti and Willy Lapenna A Power-Saving Network Architecture for Accessing the Internet from Mobile Computers: Design, Implementation and Measurements . . . . . . . . . . . . . . 3--15 Kim Potter Kihlstrom and Louise E. Moser and P. M. Melliar-Smith Byzantine Fault Detectors for Solving Consensus . . . . . . . . . . . . . . . 16--35 Sotirios G. Ziavras and Qian Wang and Paraskevi Papathanasiou Viable Architectures for High-Performance Computing . . . . . . . 36--54 Henning Pagnia and Holger Vogt and Felix C. Gärtner Fair Exchange . . . . . . . . . . . . . 55--75 Frederic Paik Schoenberg and Thomas Ferguson and Cheng Li Inverting Dirichlet Tessellations . . . 76--83 Juan A. Carrasco Transient Analysis of Rewarded Continuous Time Markov Models by Regenerative Randomization with Laplace Transform Inversion . . . . . . . . . . 84--99 Hsien-Wen Tseng and Chin-Chen Chang Construction of Symmetrical Reversible Variable Length Codes Using Backtracking 100--105 James F. Korsh and Paul S. LaFollette Loopless Generation of Schröder Trees . . 106--113 Matteo Sereno Book Review . . . . . . . . . . . . . . 114--114 James J. Hunt Book Review . . . . . . . . . . . . . . 115--115 Adrian Hibbert Book Review . . . . . . . . . . . . . . 115--115 Enrico Macii Book Review . . . . . . . . . . . . . . 115--116 M. L. Sapino Book Review . . . . . . . . . . . . . . 116--116 Marco Botta Book Review . . . . . . . . . . . . . . 117--117 Vincenzo Lombardo Book Review . . . . . . . . . . . . . . 117--119
Anonymous Capsule Reviews . . . . . . . . . . . . 121--122 J. M. Alvarez and M. Diaz and L. Llopis and E. Pimentel and J. M. Troya An Object-oriented Methodology for Embedded Real-time Systems . . . . . . . 123--145 Giuseppe Anastasi and Alberto Bartoli On the Structuring of Reliable Multicast Protocols for Distributed Mobile Systems 146--160 Jun Wu and Tei-Wei Kuo and Chih-wen Hsueh R.C.P.C.P.: a Ceiling-based Protocol for Multiple-disk Environments . . . . . . . ?? Tei-Wei Kuo and Yen-Hsi Hou and Kam-Yiu Lam The Impacts of Write-Through Procedures and Checkpointing on Real-Time Concurrency Control . . . . . . . . . . 174--192 Hung-Yu Chien and Jinn-Ke Jan Robust and Simple Authentication Protocol . . . . . . . . . . . . . . . . 193--201 Carlo Blundo and Clemente Galdi Hiding Information in Image Mosaics . . 202--212 Jixin Ma and Brian Knight Representing The Dividing Instant . . . 213--222 Rosa Meo Book Review . . . . . . . . . . . . . . 223--223 Antonio Lioy Book Review . . . . . . . . . . . . . . 223--224 Juan Carlos De Martin Book Review . . . . . . . . . . . . . . 224
Fionn Murtagh In Memoriam: Roger Needham . . . . . . . 227--227 Anonymous Capsule Reviews . . . . . . . . . . . . 227--228 Sourav S. Bhowmick and Sanjay Madria and Wee Keong Ng Representation of Web Data in a Web Warehouse . . . . . . . . . . . . . . . 229--262 Mirko Viroli A Type-Passing Approach for the Implementation of Parametric Methods in Java . . . . . . . . . . . . . . . . . . 263--294 Florentin Ipate On the Minimality of Stream X-machines 295--306 R. M. Hierons Generating Candidates When Testing a Deterministic Implementation against a Non-deterministic Finite-state Machine 307--318 Panayiotis Bozanis and Alexandros Nanopoulos and Yannis Manolopoulos LR-tree: a Logarithmic Decomposable Spatial Index Method . . . . . . . . . . 319--331 Ingo Wegener Book Review . . . . . . . . . . . . . . 332--332 Georg Glaeser Book Review . . . . . . . . . . . . . . 332 Luigi Portinale Book Review . . . . . . . . . . . . . . 332--333 Luigi Portinale Book Review . . . . . . . . . . . . . . 333--334 Emilio Leonardi Book Review . . . . . . . . . . . . . . 334--334 Juraj Hromkovic Book Review . . . . . . . . . . . . . . 334--335
Anonymous Capsule Reviews . . . . . . . . . . . . 337--339 Fabio Patern\`o and Carmen Santoro Support for Reasoning about Interactive Systems through Human-Computer Interaction Designers' Representations 340--357 Randeep Bhatia and Rakesh K. Sinha and Chung-Min Chen A Hierarchical Technique for Constructing Efficient Declustering Schemes for Range Queries . . . . . . . 358--377 Xiaohua Jia and Deying Li and Xiaodong Hu and Weili Wu and Dingzhu Du Placement of Web-Server Proxies with Consideration of Read and Update Operations on the Internet . . . . . . . 378--390 Alan Gibbons and Aris Pagourtzis and Igor Potapov and Wojciech Rytter Coarse-Grained Parallel Transitive Closure Algorithm: Path Decomposition Technique . . . . . . . . . . . . . . . 391--400 Christian Rinderknecht An Algorithm for Validating ASN.1 (X.680) Specifications using Set Constraints . . . . . . . . . . . . . . 401--420 Ay\csegül Gençata and Feza Buzluca Determining the Asynchronous Threshold Values of the Timed Token Medium Access Protocol . . . . . . . . . . . . . . . . 421--426 Tak-Ming Chan and Sam Kwong and K. F. Man Solving the Converter Placement Problem in WDM Ring Networks using Genetic Algorithms . . . . . . . . . . . . . . . 427--448 Chang N. Zhang and Hua Li Design of Reconfigurable VLSI Architecture for Hybrid Arithmetic in $GF(2^m)$ . . . . . . . . . . . . . . . 449--460 Pascal Zimmer Book Review . . . . . . . . . . . . . . 461--461 Sinan Si Alhir Book Review . . . . . . . . . . . . . . 461--462 Aladdin Ayesh Book Review . . . . . . . . . . . . . . 462--462 John Hunt Book Review . . . . . . . . . . . . . . 462--463 Viviana Bono Book Review . . . . . . . . . . . . . . 463--464
Anonymous Capsule Reviews . . . . . . . . . . . . 465--466 Sameer Bataineh and Ghassan E. Qanzu'a Reliable Omega Interconnected Network for Large-Scale Multiprocessor Systems 467--475 Siddhartha Rai and Priti Shankar Efficient Statistical Modeling for the Compression of Tree Structured Intermediate Code . . . . . . . . . . . 476--486 S. T. Klein and Y. Wiseman Parallel Huffman Decoding with Applications to JPEG Files . . . . . . . 487--497 Alexandros V. Gerbessiotis and Constantinos J. Siniolakis Increasing the Efficiency of Existing Sorting Algorithms by Using Randomized Wrappers . . . . . . . . . . . . . . . . 498--504 Daniel Yuh Chao Extended Synchronized Choice Nets . . . 505--523 Antonio Lioy Book Review . . . . . . . . . . . . . . 524--524 Jon Timmis Book Review . . . . . . . . . . . . . . 524--525 Greg Michaelson Book Review . . . . . . . . . . . . . . 525--525 Ferruccio Damiani Book Review . . . . . . . . . . . . . . 525--526 Frank Land Book Review . . . . . . . . . . . . . . 526--526 Awais Rashid and Lynne Blair Editorial: Aspect-oriented Programming and Separation of Crosscutting Concerns 527--528 Marcelo Sihman and Shmuel Katz Superimpositions and Aspect-oriented Programming . . . . . . . . . . . . . . 529--541 David H. Lorenz Karl Lieberherr and Johan Ovlinger Aspectual Collaborations: Combining Modules and Aspects . . . . . . . . . . 542--565 Tony Clark and Andy Evans and Stuart Kent Aspect-oriented Metamodelling . . . . . 566--577 Ian S. Welch and Robert J. Stroud Re-engineering Security as a Crosscutting Concern . . . . . . . . . . 578--589
Anonymous Capsule Reviews . . . . . . . . . . . . 591--592 Caroline Kovac Computing in the Age of the Genome . . . 593--597 Ray J. Solomonoff The Kolmogorov Lecture: The Universal Distribution and Machine Learning . . . 598--601 Vesper Owei Development of a Conceptual Query Language: Adopting the User-Centered Methodology . . . . . . . . . . . . . . 602--624 Keqin Li Speed-up of Parallel Processing of Divisible Loads on $k$-dimensional Meshes and Tori . . . . . . . . . . . . 625--631 Volker Heun and Ernst W. Mayr Efficient Embeddings into Hypercube-like Topologies . . . . . . . . . . . . . . . 632--644 Ing-Ray Chen and Naresh Verma A Cost-Based Admission Control Algorithm for Digital Library Multimedia Systems Storing Heterogeneous Objects . . . . . 645--659 Alok Mishra Book Review . . . . . . . . . . . . . . 660--660 Richard Baskerville Book Review . . . . . . . . . . . . . . 660--660 Liquori Luigi Book Review . . . . . . . . . . . . . . 661--661 Rosa Meo Book Review . . . . . . . . . . . . . . 661--661 Yannis Manolopoulos Introduction to the Special Section on Spatiotemporal Databases . . . . . . . . 662--663 Stéphane Grumbach and Philippe Rigaux and Luc Segoufin Handling Interpolated Data . . . . . . . 664--679 José Antonio Cotelo Lema and Luca Forlizzi and Ralf Hartmut Güting and Enrico Nardelli and Markus Schneider Algorithms for Moving Objects Databases 680--712 Yannis Theodoridis Ten Benchmark Database Queries for Location-based Services . . . . . . . . 713--725
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1--3 Peter Wegner New Models of Computation . . . . . . . 4 George F. Georgakopoulos Generalized Template Splay: a Basic Theory and Calculus . . . . . . . . . . 10 Amir Sapir The Tower of Hanoi with Forbidden Moves 20 Roberto Barbuti Analyzing Information Flow Properties in Assembly Code by Abstract Interpretation 25 Ziya Arnavut Inversion Coding . . . . . . . . . . . . 46 Masayuki Abe Combining Encryption and Proof of Knowledge in the Random Oracle Model . . 58 Ying Xu Model Checking for a First-Order Temporal Logic Using Multiway Decision Graphs (MDGs) . . . . . . . . . . . . . 71 L. C. P. Albini Diagnosis of Symmetric Graphs Under the BGM Model . . . . . . . . . . . . . . . 85 Ahmad A. Hiasat A Suggestion for a Fast Residue Multiplier for a Family of Moduli of the Form $(2 n - (2 p \pm 1))$ . . . . . . . 93 Zhongqiang Chen Building Footprint Simplification Techniques and Their Effects on Radio Propagation Predictions . . . . . . . . 103 Erik Reinhard Tomas Akenine-Möller and Eric Haines: Real-Time Rendering, 2nd edition . . . . 134 Adrian Colyer Ramnivas Laddad: AspectJ in Action-Practical Aspect-Oriented Programming . . . . . . . . . . . . . . 134--135 Jean-Pierre Jouannaud Terese: Term Rewriting Systems . . . . . 135
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 137--139 Chian Wang and Chung-Ming Huang Synchronization Schemes for Controlling VCR-Like User Interactions in Interactive Multimedia-on-Demand (MOD) Systems . . . . . . . . . . . . . . . . 140--152 Sheau-Ru Tong and Yuan-Tse Yu and Chung-Ming Huang Efficient Region Layouts for Region-based Video Servers Employing Multi-zone Disks . . . . . . . . . . . . 153--168 Ting-Yu Lin and Yu-Chee Tseng and Yuan-Ting Lu An Efficient Link Polling Policy by Pattern Matching for Bluetooth Piconets 169--178 Ahmad R. Sharafat and Mehran S. Fallah A Framework for the Analysis of Denial of Service Attacks . . . . . . . . . . . 179--192 Hans L. Bodlaender and Ton Kloks and Richard B. Tan and Jan Van Leeuwen Approximations for $\lambda$-Colorings of Graphs . . . . . . . . . . . . . . . 193--204 Aleksander Laurentowski and Krzysztof Zieli\'nski Experiences from Implementation and Evaluation of Event Processing and Distribution of Notifications in an Object Monitoring Service . . . . . . . 205--220 Qiang Zhu and Brian Dunkel and Wing Lau and Suyun Chen and Berni Schiefer Piggyback Statistics Collection for Query Optimization: Towards a Self-Maintaining Database Management System . . . . . . . . . . . . . . . . . 221--244 Hans Vandierendonck and Koen De Bosschere On Generating Set Index Functions for Randomized Caches . . . . . . . . . . . 245--258 Joan M. Lucas Untangling Binary Trees via Rotations 259--269 Mika Hirvensalo Book Review: Quantum Computation: A Grand Mathematical Challenge for the Twenty-First Century and the Millennium, by Samuel J. Lomonaco, Jr. (ed.) . . . . 270--270 Simona Ronchi Della Rocca Book Review: Abstract State Machines --- A Method for High-Level System Design and Analysis, by Egon Boerger and Robert Staerk . . . . . . . . . . . . . . . . . 270--271 Niels Bjòrn-Andersen Book Review: Redesigning Human Systems --- InfoSCI 2003 by Enid Mumford . . . . 271--271 Miguel A. Vega-Rodriguez Book Review: Feature Extraction and Image Processing, by Mark S. Nixon and Alberto S. Aguado . . . . . . . . . . . 271--272 Jochen Schiller Book Review: Mobile Commerce and Wireless Computing Systems by Nigel Phillips and Geoffrey Elliott . . . . . 272--273
Anonymous Capsule Reviews . . . . . . . . . . . . 275--277 Alvin T. S. Chan and Siu-Nam Chuang and Jiannong Cao and Hong-Va Leong An Event-Driven Middleware for Mobile Context Awareness . . . . . . . . . . . 278--288 Ajoy K. Datta and Maria Gradinariu and Sébastien Tixeuil Self-Stabilizing Mutual Exclusion Under Arbitrary Scheduler* . . . . . . . . . . 289--298 G. Latif-Shabgahi and J. M. Bass and S. Bennett Multiple Error Filtering in Cyclic Systems . . . . . . . . . . . . . . . . 299--308 S. Perkins and D. H. Smith and A. Ryley Robust Data Compression: Consistency Checking in the Synchronization of Variable Length Codes . . . . . . . . . 309--319 Hua Li and Chang N. Zhang A Cellular Automata Based Reconfigurable Architecture for Hybrid Cryptosystems 320--328 Christoforos N. Hadjicostis Coding Techniques for Fault-Tolerant Parallel Prefix Computations in Abelian Groups . . . . . . . . . . . . . . . . . 329--341 Luis Iribarne and José M. Troya and Antonio Vallecillo A Trading Service for COTS Components 342--357 Evelina Lamma and Paola Mello and Fabrizio Riguzzi A System for Measuring Function Points from an ER-DFD Specification . . . . . . 358--372 Lih Chyun Shu and John A. Stankovic and Sang H. Son Achieving Bounded and Predictable Recovery using Real-Time Logging . . . . 373--394 Andreas Kerren Book Review: \booktitleSoftware Visualization --- From Theory to Practice, by Kang Zhang . . . . . . . . 395--395 Geraldine Fitzpatrick Book Review: \booktitleDesigning Collaborative Systems: A Practical Guide to Ethnography, by Andy Crabtree . . . . 395--396 Cdric Lhoussaine Book Review: \booktitleThe Pi-Calculus --- A Theory of Mobile Processes, by D. Sangiorgi and D. Walker . . . . . . . . 396--396 Priya Seetharaman Book Review: \booktitleBeyond Fear --- Thinking Sensibly About Security in an Uncertain World, by Bruce Schneier . . . 397--397
Jack Dongarra The Boole Lecture: Trends in High Performance Computing . . . . . . . . . 399--403 Ing-Ray Chen and Luiz DaSilva and Scott Midkiff Editorial: Mobile and Pervasive Computing . . . . . . . . . . . . . . . 404 Vincent W.-S. Feng and Lin-Yi Wu and Yi-Bing Lin and Whai-En Chen WGSN: WLAN-based GPRS Support Node with Push Mechanism . . . . . . . . . . . . . 405--417 K. L. Eddie Law and Sunny So Pervasive Computing on Active Networks 418--431 Christian Bettstetter On the Connectivity of Ad Hoc Networks 432--447 Yu-Chee Tseng and Sheng-Po Kuo and Hung-Wei Lee and Chi-Fu Huang Location Tracking in a Wireless Sensor Network by Mobile Agents and Its Data Fusion Strategies . . . . . . . . . . . 448--460 Georgia Koloniari and Evaggelia Pitoura Filters for XML-based Service Discovery in Pervasive Computing . . . . . . . . . 461--474 Porlin Kang and Cristian Borcea and Gang Xu and Akhilesh Saxena and Ulrich Kremer and Liviu Iftode Smart Messages: a Distributed Computing Platform for Networks of Embedded Systems . . . . . . . . . . . . . . . . 475--494 Dejan Raskovic and Thomas Martin and Emil Jovanov Medical Monitoring Applications for Wearable Computing . . . . . . . . . . . 495--504 Gustavo Alonso Book Review: \booktitlePerspectives on Web Services --- Applying SOAP, WSDL and UDDI to Real-World Projects, by O. Zimmermann and M. Tomlinson and S. Peuser . . . . . . . . . . . . . . . . . 505--505 Luís C. Lamb Book Review: \booktitleLogics for Emerging Applications of Databases, edited by J. Chomicki and R. van der Meyden and G. Saake . . . . . . . . . . 505--506 Javier Farreres De La Morena Book Review: \booktitleThe Functional Approach to Data Management-Modeling, Analyzing and Integrating Heterogeneous Data, edited by P. M. D. Gray and L. Kerschberg and P. J. H. King and A. Poulovassilis . . . . . . . . . . . . . 506--507 Alok Mishra Book Review: \booktitleUML Xtra-Light --- How to Specify Your Software Requirements, by M. Kratochvíl and B. McGibbon . . . . . . . . . . . . . . . . 507--507 Luis M. Contreras Book Review: \booktitleData Networks, IP and the Internet: Protocols, Design and Operation, by M. P. Clark . . . . . . . 507
Anonymous Capsule Reviews . . . . . . . . . . . . 509--510 Luigi Catuogno and Ivan Visconti An Architecture for Kernel-Level Verification of Executables at Run Time 511--526 Kamilla Klonowska and Lars Lundberg and Håkan Lennerstad and Magnus Broberg Comparing the Optimal Performance of Parallel Architectures . . . . . . . . . 527--544 N. Glinos and D. B. Hoang and C. Nguyen and A. Symvonis Video-on-Demand Based on Delayed-Multicast: Algorithmic Support 545--559 Hsung-Pin and Chang and Ray-I Chang and Wei-Kuan Shih and Ruei-Chuan Chang Cache-Aware Real-Time Disk Scheduling 560--578 Chia-Mei Chen and Huey-Min Sun and LihChyun Shu Optimizing Object-based Multimedia Delivery Across Bandwidth Constrained Networks . . . . . . . . . . . . . . . . 579--590 Anna Formica Legality of XML-Schema Type Hierarchies 591--601 Shan-Tai Chen and Shun-Shii Lin Optimal Algorithms for $2 \times n$ Mastermind Games --- a Graph-Partition Approach . . . . . . . . . . . . . . . . 602--611 James F. Korsh and Paul S. LaFollette Loopless Array Generation of Multiset Permutations . . . . . . . . . . . . . . 612--621 Nigel Phillips Book Review: \booktitleMobile Communications, by Jochen Schiller . . . 622--622 Isa Servan Uzun Book Review: \booktitleCryptographic Security Architecture --- Design and Verification, by Peter Gutmann . . . . . 622--623 Satish K. Sehgal Book Review: \booktitleUnderstanding Agent Systems, by Mark d'Inverno and Michael Luck . . . . . . . . . . . . . . 623--623 Lin-Yi Wu Corrigendum: ``WGSN: WLAN-based GPRS Support Node with Push Mechanism'' . . . 624--624
Anonymous Capsule Reviews . . . . . . . . . . . . 625--626 Zhihong Zuo and Mingtian Zhou Some Further Theoretical Results about Computer Viruses . . . . . . . . . . . . 627--633 Andrea Bondavalli and Roberto Filippini Modeling and Analysis of a Scheduled Maintenance System: a DSPN Approach . . 634--650 José De Oliveira Guimar The Green Language Exception System . . 651--661 Hui Wang and David Bell Extended $k$-Nearest Neighbours based on Evidence Theory . . . . . . . . . . . . 662--672 Byung Suk Lee and Li Chen and Jeff Buzas and Vinod Kannoth Regression-Based Self-Tuning Modeling of Smooth User-Defined Function Costs for an Object-Relational Database Management System Query Optimizer . . . . . . . . . 673--693 Ling Chen and Yi Pan and Yixin Chen and Xiao-hua Xu Efficient Parallel Algorithms for Euclidean Distance Transform . . . . . . 694--700 Hsien-Wen Tseng and Chin-Chen Chang A Branch-and-Bound Algorithm for the Construction of Reversible Variable Length Codes . . . . . . . . . . . . . . 701--707 David G. Elliman and Sherin M. Youssef A New Intelligent Agent-based Strategy for Constrained Multiple Destination Routing Problems . . . . . . . . . . . . 708--727 Alok Mishra Book Review: \booktitleSoftware Quality Assurance --- From Theory to Implementation, by D. Galin . . . . . . 728--728 B. Kelleher Book Review: \booktitleShaping the IT Organization: The Impact of Outsourcing and the New Business Model, by I. Gouge 728--729
Anonymous Capsule Reviews . . . . . . . . . . . . 1--3 Vladimir B. Balakirsky Hashing of Databases with the Use of Metric Properties of the Hamming Space 4--16 Andrew Rae and Colin Fidge Information Flow Analysis for Fail-Secure Devices . . . . . . . . . . 17--26 Hung-Yu Chien and Ren-Chiun Wang and Chou-Chen Yang Note on Robust and Simple Authentication Protocol . . . . . . . . . . . . . . . . 27--29 Wei Yi Liu and Ning Song and Hong Yao Temporal Functional Dependencies and Temporal Nodes Bayesian Networks . . . . 30--41 Andrew McGettrick and Roger Boyle and Roland Ibbett and John Lloyd and Gillian Lovegrove and Keith Mander Grand Challenges in Computing: Education --- a Summary . . . . . . . . . . . . . 42--48 Tony Hoare and Robin Milner Grand Challenges for Computing Research 49--52 Chung-Ming Huang and Tz-Heng Hsu A Resource Exchange Architecture for Peer-to-Peer File Sharing Applications 53--71 Jean-Pierre Ebert and Daniel Hollos and Holger Karl and Marc Löbbers Does Multi-Hop Communication Reduce Electromagnetic Exposure? . . . . . . . 72--83 Kam-Yiu Lam and BiYu Liang and ChuanLin Zhang On Using Handoff Statistics and Velocity for Location Management in Cellular Wireless Networks . . . . . . . . . . . 84--100 Guang-Ho Cha The Segment-Page Indexing Method for Large Multidimensional Queries . . . . . 101--114 Brian J. D'Auriol and Rajesh Molakaseema A Parameterized Linear Array with a Reconfigurable Pipelined Bus System: LARPBS(p) . . . . . . . . . . . . . . . 115--125 Alison Holt Book Review: \booktitleMOF, A Pocket Guide-IT Service Operations Management, by D. Pultorak, P. Quagliarello, R. Akker and J. van Bon . . . . . . . . . . 126--126 Vladimir Geroimenko Book Review: \booktitleA Semantic Web Primer, by G. Antoniou and F. van Harmelen . . . . . . . . . . . . . . . . 126--126
Capsule reviews Capsule Reviews . . . . . . . . . . . . 127--129 Mercedes Gómez-Albarrán The Teaching and Learning of Programming: a Survey of Supporting Software Tools . . . . . . . . . . . . . 130--144 Fred Piper Turing Lecture: Cyberworld Security --- the Good, the Bad and the Ugly . . . . . 145--156 Florentin Ipate On the Minimality of Finite Automata and Stream X-machines for Finite Languages 157--167 Chin-Chen Chang and Chih-Yang Lin Perfect Hashing Schemes for Mining Association Rules . . . . . . . . . . . 168--179 Valentin E. Brimkov and Reneta P. Barneva Analytical Honeycomb Geometry for Raster and Volume Graphics . . . . . . . . . . 180--199 Ghada Hany Badr and B. John Oommen Self-Adjusting of Ternary Search Tries Using Conditional Rotations and Randomized Heuristics . . . . . . . . . 200--219 Antonio Corral and Michael Vassilakopoulos On Approximate Algorithms for Distance-Based Queries using R-trees . . 220--238 Sébastien Cantarell and Ajoy K. Datta and Franck Petit and Vincent Villain Group Mutual Exclusion in Token Rings 239--252 Peter Mares Book Review: \booktitleArt of Java Web Development, by N. Ford . . . . . . . . 253--253 Anonymous Acknowledgement of Referees . . . . . . 254--256
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 257--258 K. Subramani A Comprehensive Framework for Specifying Clairvoyance, Constraints and Periodicity in Real-Time Scheduling . . 259--272 Güray Yilmaz and Nadia Erdogan DCOBE: Distributed Composite Object-Based Environment . . . . . . . . 273--291 Alexander Thomasian and Chunqi Han Affinity-Based Routing in Zoned Mirrored Disks . . . . . . . . . . . . . . . . . 292--299 Atakan Dogan and Füsun Özgüner Biobjective Scheduling Algorithms for Execution Time--Reliability Trade-off in Heterogeneous Computing Systems . . . . 300--314 S. Perkins and D. H. Smith Robust Data Compression: Variable Length Codes and Burst Errors . . . . . . . . . 315--322 Aad P. A. van Moorsel Grid, Management and Self-Management . . 325--332 Mohammed H. Haji and Iain Gourlay and Karim Djemame and Peter M. Dew A SNAP-Based Community Resource Broker Using a Three-Phase Commit Protocol: a Performance Study . . . . . . . . . . . 333--346 D. P. Spooner and J. Cao and S. A. Jarvis and L. He and G. R. Nudd Performance-Aware Workflow Management for Grid Computing . . . . . . . . . . . 347--357 Andrew Stephen McGough and Ali Afzal and John Darlington and Nathalie Furmento and Anthony Mayer and Laurie Young Making the Grid Predictable through Reservations and Performance Modelling 358--368 A. Benoit and M. Cole and S. Gilmore and J. Hillston Scheduling Skeleton-Based Grid Applications Using PEPA and NWS . . . . 369--378 Nigel Thomas Editorial: Grid Performability . . . . . 323--324 Paul Hulse Review: \booktitleBeowulf Cluster Computing with Linux, Second Edition . . 379--380 Haoyang Che Review: \booktitleFrom P2P to Web Services and Grids: Peers in a Client/Server World . . . . . . . . . . 379
Fionn Murtagh Editorial . . . . . . . . . . . . . . . 381 Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 382--384 Jane Hillston Tuning Systems: From Composition to Performance . . . . . . . . . . . . . . 385--400 Mónica Pinto and Lidia Fuentes and José María Troya A Dynamic Component and Aspect-Oriented Platform . . . . . . . . . . . . . . . . 401--420 R. M. Hierons and M. Harman and C. J. Fox Branch-Coverage Testability Transformation for Unstructured Programs 421--436 Hyung-Kyu Choi and Yoo C. Chung and Soo-Mook Moon Java Memory Allocation with Lazy Worst Fit for Small Objects . . . . . . . . . 437--442 Santanu Chattopadhyay Area Conscious State Assignment with Flip-Flop and Output Polarity Selection for Finite State Machine Synthesis --- a Genetic Algorithm Approach . . . . . . . 443--450 Lieven Eeckhout and Yue Luo and Koen De Bosschere and Lizy K. John BLRL: Accurate and Efficient Warmup for Sampled Processor Simulation . . . . . . 451--459 Paul O'Neill and Karl Fraser and Zidong Wang and Paul Kellam and Joost N. Kok and Xiaohui Liu Pyramidic Clustering of Large-Scale Microarray Images . . . . . . . . . . . 466--479 Yuh-Min Tseng A Robust Multi-Party Key Agreement Protocol Resistant to Malicious Participants . . . . . . . . . . . . . . 480--487 James F. Korsh Generating $T$-ary Trees in Linked Representation . . . . . . . . . . . . . 488--497 Nikolaj A. Kuznetsov The Science of Infocommunications . . . 460--465 Daniel O'Leary Review: \booktitleOntologies: A Silver Bullet for Knowledge Management and Electronic Commerce . . . . . . . . . . 498 Yi Pan Review: \booktitleActive Services: Concepts, Architecture and Implementation . . . . . . . . . . . . . 498--499 J. Sethuraman Review: \booktitleNetwork Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS . . . . . . . . 499--500
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 501 Marios C. Angelides Editorial: Working with Multimedia Standards: MPEG-7, MPEG-21 and H.264 . . 502--503 Hari Kalva and Borko Furht Complexity Estimation of the H.264 Coded Video Bitstreams . . . . . . . . . . . . 504--513 Herbert Van de Sompel and Jeroen Bekaert and Xiaoming Liu and Luda Balakireva and Thorsten Schwander aDORe: a Modular, Standards-Based Digital Object Repository . . . . . . . 514--535 William Grosky and Nilesh Patel and Xin Li and Farshad Fotouhi Dynamically Emerging Semantics in an MPEG-7 Image Database . . . . . . . . . 536--544 Harry Agius and Marios C. Angelides COSMOS-7: Video-Oriented MPEG-7 Scheme for Modelling and Filtering of Semantic Content . . . . . . . . . . . . . . . . 545--562 Anastasis Sofokleous Review: \booktitleH.264 and MPEG-4 Video Compression: Video Coding for Next-generation Multimedia . . . . . . . 563 Minaz Parmar Review: \booktitleDistributed Multimedia Database Technologies Supported by MPEG-7 and MPEG-21 . . . . . . . . . . . 563--564 Elizabeth Scott and Adrian Johnstone Generalized Bottom Up Parsers With Reduced Stack Activity . . . . . . . . . 565--587 Xinmin Tian and Milind Girkar and Aart Bik and Hideki Saito Practical Compiler Techniques on Efficient Multithreaded Code Generation for OpenMP Programs . . . . . . . . . . 588--601 René Meier and Vinny Cahill Taxonomy of Distributed Event-Based Programming Systems . . . . . . . . . . 602--626
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 627--629 J. Djordjevic and B. Nikolic and M. Mitrovic A Memory System for Education . . . . . 630--641 Leonid A. Levin Aperiodic Tilings: Breaking Translational Symmetry . . . . . . . . . 642--645 Martin Campbell-Kelly Celebration of David Wheeler (1927--2004) . . . . . . . . . . . . . . 646--648 David W. Barron David Wheeler: a Personal Memoir . . . . 650--651 Lefteris Moussiades and Athena Vakali PDetect: a Clustering Approach for Detecting Plagiarism in Source Code Datasets . . . . . . . . . . . . . . . . 651--661 Charlie Daly and Jane Horgan A Technique for Detecting Plagiarism in Computer Code . . . . . . . . . . . . . 662--666 Fei He and Ming Gu and Xiaoyu Song and Zhiwei Tang and Guowu Yang and Lerong Cheng Probabilistic Estimation for Routing Space . . . . . . . . . . . . . . . . . 667--676 Dana Shapira and James A. Storer In Place Differential File Compression 677--691 Li Jiao and To-Yat Cheung and Weiming Lu Handling Synchronization Problem in Petri Net-Based System Design by Property-Preserving Transition-Reduction 692--701 Alexander Thomasian Clustered RAID Arrays and Their Access Costs . . . . . . . . . . . . . . . . . 702--713 Manuel Torres and José Samos A Methodology to Define External Schemas in ODMG Databases . . . . . . . . . . . 714--736 Sebastian Danicic and Chris Fox and Mark Harman and Rob Hierons and John Howroyd and Michael R. Laurence Static Program Slicing Algorithms are Minimal for Free Liberal Program Schemas 737--748 T. M. Chan and K. F. Man and K. S. Tang and S. Kwong A Jumping Gene Algorithm for Multiobjective Resource Management in Wideband CDMA Systems . . . . . . . . . 749--768
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1--3 Robert M. Colomb Formal versus Material Ontologies for Information Systems Interoperation in the Semantic Web . . . . . . . . . . . . 4--19 Duncan Martin and Helen Ashman Atomic Hypermedia . . . . . . . . . . . 20--31 Jixin Ma and Pat Hayes Primitive Intervals versus Point-Based Intervals: Rivals or Allies? . . . . . . 32--41 Gianluca Dini and Giuseppe Lettieri and Lanfranco Lopriore Caching and prefetching algorithms for programs with looping reference patterns 42--61 Nikos A. Lorentzos and Jose R. R. Viqueira Relational Formalism for the Management of Spatial Data . . . . . . . . . . . . 62--81 Miguel Correia and Nuno Ferreira Neves and Paulo Veríssimo From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures . . . . . . . . . . . 82--96 S. Cimato and R. De Prisco and A. De Santis Probabilistic Visual Cryptography Schemes . . . . . . . . . . . . . . . . 97--107 Alexei Vernitski Can Unbreakable Mean Incomputable? . . . 108--112 Pablo H. Ibargüengoytia and Sunil Vadera and L. Enrique Sucar A Probabilistic Model for Information and Sensor Validation . . . . . . . . . 113--126 Jaime Gomez Book Review: Stefano Ceri, Piero Fraternali, Aldo Bongio, Marco Brambilla, Sara Comai and Maristella Matera, \booktitleDesigning Data-Intensive Web Applications, Morgan Kaufmann Publishers (2003). ISBN 1-55860-843-5. \$59.95/ 58.90. 562 pp. Softbound} . . . . . . . . . . . . . . . 127 Lech Polkowski Book Review: Una-May O'Reilly, Tina Yu, Rick Riolo and Bill Worzel (eds), \booktitleGenetic Programming Theory and Practice II, Springer Science+Business Media, Inc. (2005). ISBN 0-387-23253-2. \$129.00. 320 pp. Hardbound} . . . . . . 127--128 Mark Levene Book Review: A. Spink and B. J. Jansen, \booktitleWeb Search: Public Searching of the Web. Information Science & Knowledge Management, Vol. 6. Kluwer Academic Publishers (2004). ISBN 1-4020-2268-9. 100. 199 pp. Hardcover 128--129 Anas N. Al-Rabadi Book Review: Lee Spector, \booktitleAutomatic Quantum Computer Programming: A Genetic Programming Approach, Kluwer Academic Publishers (2004). ISBN 1-4020-7894-3. 153 pp . . . 129--130 Felice Cardone Book Review: Benjamin C. Pierce (ed.), \booktitleAdvanced Topics in Types and Programming Languages, The MIT Press (2005) ISBN 0-262-16228-8. \pounds 39.95. 574 pp. Hardbound . . . . . . . . 130--131 Iman Hafiz Poernomo Book Review: Yves Bertot and Pierre Castéran, \booktitleInteractive Theorem Proving and Program Development (Coq'Art: The Calculus of Inductive Constructions). Texts in Theoretical Computer Science. An EATCS Series. (2004). ISBN 3-540-20854-2. 469pp. Hardcover . . . . . . . . . . . . . . . 130--131
Anonymous Capsule Reviews . . . . . . . . . . . . 133--133 Fionn Murtagh Editorial . . . . . . . . . . . . . . . 134--135 Erol Gelenbe Editorial: Building Adaptivity into Computer Networks . . . . . . . . . . . 136--136 Gerardo Rubino and Martín Varela and Jean-Marie Bonnin Controlling Multimedia QoS in the Future Home Network Using the PSQA Metric . . . 137--155 Jeremy Pitt and Lloyd Kamara and Marek Sergot and Alexander Artikis Voting in Multi-Agent Systems . . . . . 156--170 Ricardo Lent Design of a MANET Testbed Management System . . . . . . . . . . . . . . . . . 171--179 András György and György Ottucsák Adaptive Routing Using Expert Advice . . 180--189 Taskin Kocak A Hybrid Network Processor with Support for High-Speed Execution of CPN and Upper Layer IP Protocols . . . . . . . . 190--200 M. Amor and M. Bóo and E. J. Padrón and D. Bartz Hardware Oriented Algorithms for Rendering Order-Independent Transparency 201--210 Kostas Bousias and Nabil Hasasneh and Chris Jesshope Instruction Level Parallelism through Microthreading --- a Scalable Approach to Chip Multiprocessors . . . . . . . . 211--233 C. Bernardeschi and G. Lettieri and L. Martini and P. Masci Using Control Dependencies for Space-Aware Bytecode Verification . . . 234--248 Mark Burgin Book Review: Juraj Hromkovi\vc, Design and Analysis of Randomized Algorithms: Introduction to Design Paradigms. Series: Texts in Theoretical Computer Science. An EATCS Series. Springer (2005). ISBN 3-540-23949-9. \pounds 30.50/\pounds 39.95/\$49.95. 274 pp. Hardbound} . . . . . . . . . . . . . . . 249--250 Mostafa Azizi Book Review: John Hunt and Chris Loftus, Guide to J2EE: Enterprise Java. Series Springer Professional Computing. Springer (2003). ISBN 1-85233-704-4. \$79.95\slash \pounds 45.00\slash \pounds 69.95. 672 pp} . . . . . . . . . 250--251 Pierre Castéran Book Review: Iman Hafiz Poernomo, John Newsome Crossley and Martin Wirsing, \booktitleAdapting Proofs-as-Programs --- The Curry--Howard Protocol. Springer (2005). ISBN 0-387-23759-3. \$79.95/\pounds 50.00/ 64.95. 420 pp. Hardbound} . . . . . . . . . . . . . . . 251--252 Ronald Morrison Book Review: K. C. Tan, E. F. Khor and T. H. Lee, Multiobjective Evolutionary Algorithms and Applications. Series: Advanced Information & Knowledge Processing. Springer-Verlag (2005). ISBN 1-85233-836-9. \$89.95\slash \$99.95/\pounds 50.00. 295 pp. Hardbound 252--253
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 255--257 Mehmet Savsar and Fawaz S. Al-Anzi Reliability of Data Allocation on a Centralized Service Configuration with Distributed Servers . . . . . . . . . . 258--267 Alain Cournier and Stéphane Devismes and Franck Petit and Vincent Villain Snap-Stabilizing Depth-First Search on Arbitrary Networks . . . . . . . . . . . 268--280 Apostolos N. Papadopoulos and Alexandros Nanopoulos and Yannis Manolopoulos Processing Distance Join Queries with Constraints . . . . . . . . . . . . . . 281--296 Moses Reuven and Yair Wiseman Medium-Term Scheduler as a Solution for the Thrashing Effect . . . . . . . . . . 297--309 Goichiro Hanaoka and Junji Shikata and Yumiko Hanaoka and Hideki Imai Unconditionally Secure Anonymous Encryption and Group Authentication . . 310--321 Javier Herranz Deterministic Identity-Based Signatures for Partial Aggregation . . . . . . . . 322--330 Karnig Derderian and Robert M. Hierons and Mark Harman and Qiang Guo Automated Unique Input Output Sequence Generation for Conformance Testing of FSMs . . . . . . . . . . . . . . . . . . 331--344 Per Martin-Löf 100 years of Zermelo's Axiom of Choice: what was the problem with it? . . . . . 345--350 James F. Korsh Skarbek's Algorithm for $t$-Ary Trees 351--357 Sung Eun Bae and Tadao Takaoka Improved Algorithms for the $K$-Maximum Subarray Problem . . . . . . . . . . . . 358--374 Ricardo Jasinski Book Review: S. Ivarama and P. D. Andamudi, \booktitleGuide to RISC Processors for Programmers and Engineers, Springer-Verlag (2005). ISBN 0-387-21017-2. \pounds 36.00, US\$46.95, US\$59.95. 387 pp. Hardbound . . . . . . 375 George Pallis Book Review: Robert J. Glushko and T. Im. McGrath, \booktitleDocument Engineering --- Analyzing and Designing Document for Business Informatics and Web Services. The MIT Press (2005). ISBN 0-262-07261-0 . \pounds 21.95. 703 pp. Hardbound . . . . . . . . . . . . . . . 376 Athena Vakali Book Review: S. Bressan, S. Ceri, E. Hunt, Z. G. Ives, Z. Bellahséne, M. Rys and R. Unland, \booktitle(EDS) Database and XML Technologies. Third International XML Database Symposium, XSym 2005, Trondheim, Norway, August 28--29, 2005, Proceedings. Series: Lecture Notes in Computer Science, Vol. 3671. Springer-Verlag (2005). ISBN 3-540-28583-0. 44.94/\pounds 32.50/US\$58.00. 236 pp. Softbound}} . . 376--377 Anonymous Acknowledgement of Referees: Reviewers who have agreed to review between 1 January 2005 and 31 December 2005 for \booktitleThe Computer Journal . . . . . 378--380
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 381--382 Robin Milner Ubiquitous Computing: Shall we Understand It? . . . . . . . . . . . . . 383--389 Anonymous Discussion on Robin Milner's First \booktitleComputer Journal Lecture: Ubiquitous Computing: Shall We Understand It? . . . . . . . . . . . . . 390--399 Chung-Ming Huang and Ching-Hsien Tsai and Ming-Chi Tsai Design and Implementation of Video Streaming Hot-plug between Wired and Wireless Networks Using SCTP . . . . . . 400--417 T. Y. Wong and K. T. Law and John C. S. Lui and M. H. Wong An Efficient Distributed Algorithm to Identify and Traceback DDoS Traffic . . 418--442 Barry Doyle and Stuart Bell and Alan F. Smeaton and Kealan McCusker and Noel E. O'Connor Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks . . . . . . 443--453 Juan Fernández and Eitan Frachtenberg and Fabrizio Petrini and José-Carlos Sancho An Abstract Interface for System Software on Large-Scale Clusters . . . . 454--469 Daniel Yuh Chao Computation of Elementary Siphons in Petri Nets For Deadlock Control . . . . 470--479 Alan Bundy A Very Mathematical Dilemma . . . . . . 480--486 Patrick Martin and Wendy Powley and Xiaoyi Xu and Wenhu Tian Automated Configuration of Multiple Buffer Pools . . . . . . . . . . . . . . 487--499 Keith Duddy Book Review: Kevin Lano, Advanced Systems Design with Java, UML and MDA. Elsevier (2005). ISBN 0-7506-6496-7. \pounds 27.99/US\$44.95. 378 pp. Softbound} . . . . . . . . . . . . . . . 500--501 Judit Bar-Ilan Book Review: Mark Levene, An Introduction to Search Engines and Web Navigation. Addison Wesley, Pearson Education (2006). ISBN 0-321-30677-5. \pounds 39.99. 365 pp. Softbound . . . . 500 George Pallis Book Review: Xiaofang Zhou, Stanley Su, Mike P. Papazoglou, Maria E. Orlowska and Keith G. Jeffery, Web Information Systems Engineering --- WISE 2004. Springer-Proceedings Series: Lecture Notes in Computer Science, Vol. 3306 (2004). ISBN 3-540-23894-8. \pounds 34.55/US\$117.00. 745 pp. Softbound} . . 501 Mark Burgin Book Review: Kimiz Dalkir, Knowledge Management in Theory and Practice. Butterworth Heinemann (2005). ISBN 0-7506-7864-X. EUR 44.95/\$49.95\slash \pounds 29.99. 368 pp. Hardbound} . . . 501--503
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 505--506 Ing-Ray Chen and Bojan Cukic High Assurance Software Systems . . . . 507--508 Jinchun Xia and Carl K. Chang and Jeff Wise and Yujia Ge An Empirical Performance Study on PSIM 509--526 Guohui Li and LihChyun Shu Design and Evaluation of a Low-Latency Checkpointing Scheme for Mobile Computing Systems . . . . . . . . . . . 527--540 Qizhi Ye and Yu Lei and David Kung A Blocking-based Approach to Protocol Validation . . . . . . . . . . . . . . . 541--553 Engin Kirda and Christopher Kruegel Protecting Users against Phishing Attacks . . . . . . . . . . . . . . . . 554--561 José Luis Sierra and Alfredo Fernández-Valmayor and Baltasar Fernández-Manjón A Document-Oriented Paradigm for the Construction of Content-Intensive Applications . . . . . . . . . . . . . . 562--584 Tiziana Calamoneri The $L(h,k)$-Labelling Problem: a Survey and Annotated Bibliography . . . . . . . 585--608 Alexander Thomasian and Lijuan Zhang The Stepwise Dimensionality Increasing (SDI) Index for High-Dimensional Data 609--618 Apostolos Syropoulos Fuzzifying $P$ Systems . . . . . . . . . 619--628 Ali Mahdoum Book Review: Franz Rothlauf, Representations for Genetic and Evolutionary Algorithms. Springer-Verlag (2006, second edition). ISBN 3-540-25059-X. \$103.95/\$129.00/\pounds 77.00. 325 pp. Hardbound . . . . . . . . 629 Boran Gazi Book Review: W. Van Wezel, R. J. Jorna and A. M. Meystel, Planning in Intelligent Systems: Aspects, Motivations, and Methods. John Wiley and Sons, Inc. (2006). ISBN 0-471-73427-6. \pounds 64.95/ 91.70/US \$110.00. 592 pp. Hardbound} . . . . . . . . . . . . . 629--630
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 631--633 Yi-Sheng Huang Design of Traffic Light Control Systems Using Statecharts . . . . . . . . . . . 634--649 Frank Land Leo II and the Model T Ford . . . . . . 650--656 J. Rissanen The Structure Function and Distinguishable Models of Data . . . . . 657--664 D. Den Hertog and P. B. Hulshof Solving Rummikub Problems by Integer Linear Programming . . . . . . . . . . . 665--669 Alexander Thomasian and Lijuan Zhang Persistent Semi-Dynamic Ordered Partition Index . . . . . . . . . . . . 670--684 Samir M. Koriem Development, Analysis and Evaluation of Performance Models for Mobile Multi-Agent Networks . . . . . . . . . . 685--709 Vlad Rusu Verifying an ATM Protocol Using a Combination of Formal Techniques . . . . 710--730 Betul Demiroz and Haluk Rahmi Topcuoglu Static Task Scheduling with a Unified Objective on Time and Resource Domains 731--743 Carlos A. G. Assis and Edil S. T. Fernandes and Valmir C. Barbosa Modeling the Input History of Programs for Improved Instruction-Memory Performance . . . . . . . . . . . . . . 744--761 Klaus Schneider Book Review: R. Kurki-Suonio, \booktitleA Practical Theory of Reactive Systems. Springer-Verlag (2005). ISBN 3-540-23342-3. 49.95/\pounds 38.50. 418 pp. Hardbound . . . . . . . . . . . . . 762 Marc L. Smith Book Review: Mark Burgin, \booktitleSuper-Recursive Algorithms. Series: Monographs in Computer Science. Springer-Verlag (2005). ISBN 0-387-95569-0. \$79.95\slash \pounds 61.50. 304 pp. Hardbound} . . . . . . . 762--763 Elizabeth Harrin and MBCS Book Review: Robert S Coble and Shel Israel, \booktitleNaked Conversations: How Blogs are Changing the Way Businesses Talk with Customers, John Wiley & Sons (2006). ISBN 0-471-74719-X. \pounds 16.99. 251 pp. Hardcover . . . . 764
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1--3 Anonymous Editorial on the Occasion of Volume 50 of \booktitleThe Computer Journal . . . 4--6 Zhongqiang Chen and Zhongrong Chen and Alex Delis An Inline Detection and Prevention Framework for Distributed Denial of Service Attacks . . . . . . . . . . . . 7--40 Yuh-Min Tseng A secure authenticated group key agreement protocol for resource-limited mobile devices . . . . . . . . . . . . . 41--52 Rachid Guerraoui and Michel Raynal The Alpha of Indulgent Consensus . . . . 53--67 Kil Hong Joo and Won Suk Lee An Adaptive Materialization Method for Globally Optimized Query Evaluation in a Hierarchical Mediator System . . . . . . 68--80 Hooman Nikmehr and Braden Phillips and Cheng-Chew Lim A Fast Radix-4 Floating-Point Divider with Quotient Digit Selection by Comparison Multiples . . . . . . . . . . 81--92 Ralf Gitzel and Ingo Ott and Martin Schader Ontological Extension to the MOF Metamodel as a Basis for Code Generation 93--115 Jesús M. Almendros-Jiménez and Luis Iribarne Describing Use-Case Relationships with Sequence Diagrams . . . . . . . . . . . 116--128 Elizabeth Harrin Book Review: Susan Snedaker, IT Security Project Management Handbook. Syngress (2006). ISBN 1-59749-076-8. 47.95/\pounds 32.99/\$59.95. 612 pp. Softbound} . . . . . . . . . . . . . . . 129 Lutz Schröder Book Review: L. M. G. Feijs and H. B. M. Jonkers, \booktitleFormal Specification and Design. Cambridge University Press (2005). ISBN-13 978-0-521-43592-5, ISBN-10 0-521-43592-7. \pounds 29.00/\$50.00. Softbound} . . . . . . . 129--130
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 131--133 Roland Rüdiger Quantum Programming Languages: An Introductory Overview . . . . . . . . . 134--150 Alexander Gammerman and Vladimir Vovk Hedging Predictions in Machine Learning: The Second \booktitleComputer Journal Lecture . . . . . . . . . . . . . . . . 151--163 Anonymous Discussion on ``Hedging Predictions in Machine Learning'' by A. Gammerman and V. Vovk . . . . . . . . . . . . . . . . 164--172 Alexander Gammerman and Vladimir Vovk Rejoinder: ``Hedging Predictions in Machine Learning'' . . . . . . . . . . . 173--177 A. Bakalis and C. S. Iliopoulos and C. Makris and S. Sioutas and E. Theodoridis and A. Tsakalidis and K. Tsichlas Locating Maximal Multirepeats in Multiple Strings Under Various Constraints . . . . . . . . . . . . . . 178--185 Abdelrahman Amer and B. J. Oommen A Novel Framework for Self-Organizing Lists in Environments with Locality of Reference: Lists-on-Lists . . . . . . . 186--196 Doina Bein and Ajoy K. Datta and Vincent Villain Self-Stabilizing Local Routing in Ad Hoc Networks . . . . . . . . . . . . . . . . 197--203 Sheng-Tzong Cheng and Ming-Hung Tao A Scheduling-Based Medium Access Control Protocol for Supporting Multi-class Services in Wireless Networks . . . . . 204--216 Alexander Thomasian and Gang Fu and Spencer W. Ng Analysis of Rebuild Processing in RAID5 Disk Arrays . . . . . . . . . . . . . . 217--231 Paul Cockshott and Greg Michaelson Are There New Models of Computation? Reply to Wegner and Eberbach . . . . . . 232--247 Ricardo Jasinski Fault-Tolerance Techniques for SRAM-Based FPGAs . . . . . . . . . . . . 248 Carlos Caldeira The Microsoft Data Warehouse Toolkit . . 249 Marino Segnan Web Data Management Practices --- Emerging Techniques and Technologies . . 249--250
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 251--253 Tony Hoare The Ideal of Program Correctness: Third \booktitleComputer Journal Lecture . . . 254--260 Anonymous Discussion on ``The Ideal of Program Correctness'' by Tony Hoare . . . . . . 261--268 Anonymous Discussion on ``The Ideal of Program Correctness'': Responses from Tony Hoare 269--273 Chris Mairs Inclusion and Exclusion in the Digital World: Turing Lecture 2006 . . . . . . . 274--280 Ing-Ray Chen and Weiping He and Baoshan Gu Proxy-based Regional Registration for Integrated Mobility and Service Management in Mobile IP Systems . . . . 281--293 H. M. W. Verbeek and W. M. P. van der Aalst and A. H. M. ter Hofstede Verifying Workflows with Cancellation Regions and OR-joins: An Approach Based on Relaxed Soundness and Invariants . . 294--314 Monika Kapus-Kolar Testing as Collecting of Evidence: An Integrated Approach to Test Generation for Finite State Machines . . . . . . . 315--331 Doina Bein and Ajoy K. Datta and Mehmet Hakan Karaata An Optimal Snap-Stabilizing Multi-Wave Algorithm . . . . . . . . . . . . . . . 332--340 Tzong-Jye Liu and Chia-Lin Lee State-Optimal Alternator for Uniform Synchronous Rings . . . . . . . . . . . 341--347 George F. Georgakopoulos and Kostas Politopoulos MAX-DENSITY Revisited: a Generalization and a More Efficient Algorithm . . . . . 348--356 William Chung-Kung Yen Edge-Orienting on Split, Planar and Treelike Graphs . . . . . . . . . . . . 357--368 Peter Grünwald Book Review: Christopher S. Wallace, \booktitleStatistical and Inductive Inference by Minimum Message Length, Springer (2005). ISBN 038723795X. \pounds 46.00. 432 pp. Hardbound . . . . 369--370 Mark Levene Artificial Intelligence for Games. Series in Interactive $3$D Technology 371 Martinez-Gil Jorge Thinking on the Web: Berners-Lee, Gödel and Turing . . . . . . . . . . . . . . . 371--372
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 373--374 Anonymous Karen Spärck Jones (1935--2007): Professor (emeritus) of Computers and Information, University of Cambridge . . 375--376 Ruqian Lu and Zhi-Hua Zhou Guest Editorial to the Special Issue on Advances of Artificial Intelligence and Knowledge Engineering in China . . . . . 377 Wei Li R-Calculus: An Inference System for Belief Revision . . . . . . . . . . . . 378--390 Sanjiang Li and Bernhard Nebel Qualitative Spatial Representation and Reasoning: a Hierarchical Approach . . . 391--402 Kaile Su and Abdul Sattar and Xiangyu Luo Model Checking Temporal Logics of Knowledge Via OBDDs . . . . . . . . . . 403--420 Hongli Liang and Jue Wang and Yiyu Yao User-Oriented Feature Selection for Machine Learning . . . . . . . . . . . . 421--434 Shan-Tai Chen and Shun-Shii Lin and Li-Te Huang A Two-Phase Optimization Algorithm For Mastermind . . . . . . . . . . . . . . . 435--443 Roberto Baldoni and Roberto Beraldi and Leonardo Querzoni and Antonino Virgillito Efficient Publish/Subscribe Through a Self-Organizing Broker Overlay and its Application to SIENA . . . . . . . . . . 444--459 Amit Thawani and Srividya Gopalan and V. Sridhar and Krithi Ramamritham Context-aware Timely Information Delivery in Mobile Environments . . . . 460--472 Vladimir M. Yanovsky and Israel A. Wagner and Alfred M. Bruckstein A Linear-Time Constant-Space Algorithm for the Boundary Fill Problem . . . . . 473--477 E. Ancillotti and R. Bruno and M. Conti and E. Gregori and A. Pinizzotto A Layer-2 Framework for Interconnecting Ad Hoc Networks to Fixed Internet: Test-bed Implementation and Experimental Evaluation . . . . . . . . . . . . . . . 478--499 Antonio Izquierdo Manzanares Professional Pen Testing for Web Applications --- Programmer to Programmer Series (P2P) . . . . . . . . 500
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 501--504 Dan C. Marinescu and Gabriela M. Marinescu The Boole Lecture: Quantum Information: a Glimpse at the Strange and Intriguing Future of Information . . . . . . . . . 505--521 Mehran S. Fallah and Ahmad R. Sharafat Service Availability in Concurrent Systems --- Part I: a Theory of Hierarchical Services of Interacting Processes . . . . . . . . . . . . . . . 522--534 Mehran S. Fallah and Ahmad R. Sharafat Service Availability in Concurrent Systems --- Part II: Analysis and Case Studies Using HSIP . . . . . . . . . . . 535--554 Der-Chiang Li and Fengming M. Chang An In--Out Combined Dynamic Weighted Round-Robin Method for Network Load Balancing . . . . . . . . . . . . . . . 555--566 Mark Levene and Judit Bar-Ilan Comparing Typical Opening Move Choices Made by Humans and Chess Engines . . . . 567--573 Asep Juarna and Vincent Vajnovszki Some Generalizations of a Simion--Schmidt Bijection . . . . . . . 574--580 H. Ahrabian and A. Nowzari-Dalini Parallel Generation of $t$-Ary Trees in $A$-order . . . . . . . . . . . . . . . 581--588 Qiang Tang On The Security of a Group Key Agreement Protocol . . . . . . . . . . . . . . . . 589--590 Kim-Kwang Raymond Choo A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model . . 591--601 Ren-Junn Hwang and Sheng-Hua Shiau Provably Efficient Authenticated Key Agreement Protocol for Multi-Servers . . 602--615 Jaesung Lee and Hyuk-Jae Lee and Chanho Lee A High-Speed Link Layer Architecture for Low Latency and Memory Cost Reduction 616--628
Fairouz Kamareddine Capsule reviews . . . . . . . . . . . . 629 Erol Gelenbe and Andrew Tilbrook and Richard Vinter Editorial: Introduction to the Special Issue . . . . . . . . . . . . . . . . . 630--631 Robert Ghanea-Hercock and E. Gelenbe and Nicholas R. Jennings and Oliver Smith and David N. Allsopp and Alex Healing and Hakan Duman and Simon Sparks and Nishan C. Karunatillake and Perukrishnen Vytelingum Hyperion --- Next-Generation Battlespace Information Services . . . . . . . . . . 632--645 Asher Mahmood and Philip M. Tudor and William Oxford and Robert Hansford and James D. B. Nelson and Nicholas G. Kingsbury and Antonis Katartzis and M. Petrou and N. Mitianoudis and T. Stathaki and Alin Achim and David Bull and Nishan Canagarajah and Stavri Nikolov and Artur Loza and Nedeljko Cvejic Applied Multi-Dimensional Fusion . . . . 646--659 Nikolaos Mitianoudis and Tania Stathaki Joint Fusion and Blind Restoration for Multiple Image Scenarios with Missing Data . . . . . . . . . . . . . . . . . . 660--673 William Ng and Jack Li and Simon Godsill and Sze Kim Pang Multitarget Initiation, Tracking and Termination Using Bayesian Monte Carlo Methods . . . . . . . . . . . . . . . . 674--693 Samuel M. Waldron and John Patrick and Phillip L. Morgan and Sophia King Influencing Cognitive Strategy by Manipulating Information Access . . . . 694--702 Paul R. Smart and Alistair Russell and Nigel R. Shadbolt and m. c. schraefel and Leslie A. Carr AKTiveSA: a Technical Demonstrator System For Enhanced Situation Awareness 703--716 Gülay Öke and Georgios Loukas A Denial of Service Detector based on Maximum Likelihood Detection and the Random Neural Network . . . . . . . . . 717--727 Imtiaz Ahmad and A. Shoba Das Analysis and Detection of Errors in Implementation of SHA-512 Algorithms on FPGAs . . . . . . . . . . . . . . . . . 728--738 Chung-Ming Huang and Jian-Wei Li Efficient and Provably Secure IP Multimedia Subsystem Authentication for UMTS . . . . . . . . . . . . . . . . . . 739--757 Jan Peters Computational Intelligence: Principles, Techniques and Applications . . . . . . 758
Rodney G. Downey and Michael R. Fellows and Michael A. Langston \booktitleThe Computer Journal Special Issue on Parameterized Complexity: Foreword by the Guest Editors . . . . . 1--6 Falk Hüffner and Rolf Niedermeier and Sebastian Wernicke Techniques for Practical Fixed-Parameter Algorithms . . . . . . . . . . . . . . . 7--25 Michael A. Langston and Andy D. Perkins and Arnold M. Saxton and Jon A. Scharff and Brynn H. Voy Innovative Computational Methods for Transcriptomic Data Analysis: a Case Study in the Use of FPT for Practical Algorithm Design and Implementation . . 26--38 Jianer Chen and Jie Meng On Parameterized Intractability: Hardness and Completeness . . . . . . . 39--59 Dániel Marx Parameterized Complexity and Approximation Algorithms . . . . . . . . 60--78 Jens Gramm and Arfst Nickelsen and Till Tantau Fixed-Parameter Algorithms in Phylogenetics . . . . . . . . . . . . . 79--101 Leizhen Cai Parameterized Complexity of Cardinality Constrained Optimization Problems . . . 102--121 Christian Sloper and Jan Arne Telle An Overview of Techniques for Designing Parameterized Algorithms . . . . . . . . 122--136 William Gasarch and Keung Ma Kin Invitation to Fixed-Parameter Algorithms --- Parameterized Complexity Theory --- Parameterized Algorithmics: Theory, Practice and Prospects . . . . . . . . . 137--140 Anonymous The Wilkes Best Paper Award in Volume 49 (2006) . . . . . . . . . . . . . . . . .
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 141--143 Hyeonsang Eom Information-Dynamics-Conscious Development of Routing Software: a Case of Routing Software that Improves Link-State Routing Based on Future Link-Delay-Information Estimation . . . 144--161 Ye Tian and Di Wu and Kam-Wing Ng On Distributed Rating Systems for Peer-to-Peer Networks . . . . . . . . . 162--180 Manuel A. Martins On the Behavioral Equivalence Between $k$-data Structures . . . . . . . . . . 181--191 Luk Van Ertvelde and Filip Hellebaut and Lieven Eeckhout Accurate and Efficient Cache Warmup for Sampled Processor Simulation Through NSL--BLRL . . . . . . . . . . . . . . . 192--206 Guowu Yang and Xiaoyu Song and William N. N. Hung and Marek A. Perkowski Bi-Directional Synthesis of 4-Bit Reversible Circuits . . . . . . . . . . 207--215 Keqin Li Average-Case Performance Analysis of Online Non-Clairvoyant Scheduling of Parallel Tasks with Precedence Constraints . . . . . . . . . . . . . . 216--226 Silvio Croce and Francesco Marcelloni and Massimo Vecchio Reducing Power Consumption in Wireless Sensor Networks Using a Novel Approach to Data Aggregation . . . . . . . . . . 227--239 Anna Formica Similarity of XML-Schema Elements: a Structural and Information Content Approach . . . . . . . . . . . . . . . . 240--254
Hans L. Bodlaender and Arie M. C. A. Koster Combinatorial Optimization on Graphs of Bounded Treewidth . . . . . . . . . . . 255--269 Liming Cai and Xiuzhen Huang and Chunmei Liu and Frances Rosamond and Yinglei Song Parameterized Complexity and Biopolymer Sequence Comparison . . . . . . . . . . 270--291 Erik D. Demaine and MohammadTaghi Hajiaghayi The Bidimensionality Theory and Its Algorithmic Applications . . . . . . . . 292--302 Georg Gottlob and Stefan Szeider Fixed-Parameter Algorithms For Artificial Intelligence, Constraint Satisfaction and Database Problems . . . 303--325 Petr Hlineny and Sang-il Oum and Detlef Seese and Georg Gottlob Width Parameters Beyond Tree-width and their Applications . . . . . . . . . . . 326--362 Gregory Gutin and Anders Yeo Some Parameterized Problems On Digraphs 363--371 Panos Giannopoulos and Christian Knauer and Sue Whitesides Parameterized Complexity of Geometric Problems . . . . . . . . . . . . . . . . 372--384 Iris van Rooij and Todd Wareham Parameterized Complexity in Cognitive Modeling: Foundations, Applications and Opportunities . . . . . . . . . . . . . 385--404
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 405--407 Azlan Iqbal Evaluation of Economy in a Zero-sum Perfect Information Game . . . . . . . . 408--418 Hung-Yu Chien Selectively Convertible Authenticated Encryption in the Random Oracle Model 419--434 José Raúl Romero and José M. Troya and Antonio Vallecillo Modeling ODP Computational Specifications Using UML . . . . . . . . 435--450 Paul M. E. Shutler and Seok Woon Sim and Wei Yin Selina Lim Analysis of Linear Time Sorting Algorithms . . . . . . . . . . . . . . . 451--469 D. Cavagnino and A. E. Werbrouck Efficient Algorithms for Integer Division by Constants Using Multiplication . . . . . . . . . . . . . 470--480 J. L. Pastrana and E. Pimentel and M. Katrib Composition of Self-Adapting Components for Customizable Systems . . . . . . . . 481--496 R. M. Hierons and H. Ural The Effect of the Distributed Test Architecture on the Power of Testing . . 497--510 Boleslaw K. Szymanski and Gilbert G. Chen Computing with Time: From Neural Networks to Sensor Networks . . . . . . 511--522
David L. Dowe Foreword re C. S. Wallace . . . . . . . 523--560 M. H. Brennan Data Processing in the Early Cosmic Ray Experiments in Sydney . . . . . . . . . 561--565 Ray J. Solomonoff Three Kinds of Probabilistic Induction: Universal Distributions and Convergence Theorems . . . . . . . . . . . . . . . . 566--570 Murray A. Jorgensen and Geoffrey J. McLachlan Wallace's Approach to Unsupervised Learning: The Snob Program . . . . . . . 571--578 Richard P. Brent Some Comments on C. S. Wallace's Random Number Generators . . . . . . . . . . . 579--584 Glenn Colón-Bonet and Paul Winterrowd, Jr. Multiplier Evolution: a Family of Multiplier VLSI Implementations . . . . 585--594 Maurice D. Castro and Ronald D. Pose and Carlo Kopp Password-Capabilities and the Walnut Kernel . . . . . . . . . . . . . . . . . 595--607
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 609--611 Fionn Murtagh Editorial . . . . . . . . . . . . . . . 612--614 Alexander Thomasian and Jun Xu Reliability and Performance of Mirrored Disk Organizations . . . . . . . . . . . 615--629 M. Hassaballah and Saleh Omran and Youssef B. Mahdy A Review of SIMD Multimedia Extensions and their Usage in Scientific and Engineering Applications . . . . . . . . 630--649 Paul Cairns and Harold Thimbleby Affordance and Symmetry in User Interfaces . . . . . . . . . . . . . . . 650--661 Qiang Zhu and Brahim Medjahed and Anshuman Sharma and Henry Huang The Collective Index: a Technique for Efficient Processing of Progressive Queries . . . . . . . . . . . . . . . . 662--676 Yu-Chen Kuo and Po-Yao Wu The Availability of Complemental $k$-Coteries . . . . . . . . . . . . . . 677--687 E. M. Tadjouddine Vertex-ordering Algorithms for Automatic Differentiation of Computer Codes . . . 688--699 J. E. Rice An Introduction to Reversible Latches 700--709 Ching-Nung Yang and Chung-Chun Wang and Tse-Shih Chen Visual Cryptography Schemes with Reversing . . . . . . . . . . . . . . . 710--722 Erol Gelenbe and Stelios Timotheou Synchronized Interactions in Spiked Neuronal Networks . . . . . . . . . . . 723--730 Peter G. Harrison and Taskin Kocak and Erol Gelenbe Discussant Contributions for the \booktitleComputer Journal Lecture by Erol Gelenbe . . . . . . . . . . . . . . 731--734 S. Furber The Future of Computer Technology and its Implications for the Computer Industry . . . . . . . . . . . . . . . . 735--740 Peter Y. K. Cheung and Alex Yakovlev Comments on the BCS Lecture ``The Future of Computer Technology and its Implications for the Computer Industry'' by Professor Steve Furber . . . . . . . 741--742 Baykasoglu Adil Evolutionary Computation for Modeling and Optimization . . . . . . . . . . . . 743 Elizabeth Harrin Universal Usability: Designing Computer Interfaces for Diverse Users . . . . . . 743--744 Kim-Kwang Raymond Choo Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition . . . . . . . . . . . . 744 Juan A. Carrasco Corrigendum: ``Transient Analysis of Rewarded Continuous Time Markov Models by Regenerative Randomization with Laplace Transform Inversion'' . . . . . 745
Murat Gevrekci and Bahadir K. Gunturk and Yucel Altunbasak Restoration of Bayer-sampled Image Sequences . . . . . . . . . . . . . . . 1--14 Michael Elad and Dmitry Datsenko Example-Based Regularization Deployed to Super-Resolution Reconstruction of a Single Image . . . . . . . . . . . . . . 15--30 Dirk Robinson and Sina Farsiu and Peyman Milanfar Optimal Registration Of Aliased Images Using Variable Projection With Applications To Super-Resolution . . . . 31--42 Hayit Greenspan Super-Resolution in Medical Imaging . . 43--63 M. J. Fadili and J.-L. Starck and F. Murtagh Inpainting and Zooming Using Sparse Representations . . . . . . . . . . . . 64--79 Priyam Chatterjee and Sujata Mukherjee and Subhasis Chaudhuri and Guna Seetharaman Application Of Papoulis--Gerchberg Method In Image Super-Resolution and Inpainting . . . . . . . . . . . . . . . 80--89 Huanfeng Shen and Michael K. Ng and Pingxiang Li and Liangpei Zhang Super-Resolution Reconstruction Algorithm To MODIS Remote Sensing Images 90--100 Lyndsey C. Pickup and David P. Capel and Stephen J. Roberts and Andrew Zisserman Bayesian Methods for Image Super-Resolution . . . . . . . . . . . . 101--113 Jongseong Choi and Min Kyu Park and Moon Gi Kang High Dynamic Range Image Reconstruction with Spatial Resolution Enhancement . . 114--125 Ali Mohammad-Djafari Super-Resolution: a Short Review, A New Method Based on Hidden Markov Modeling of HR Image and Future Challenges . . . 126--141 Filip Sroubek and Jan Flusser and Gabriel Cristóbal Super-Resolution and Blind Deconvolution For Rational Factors With an Application to Color Images . . . . . . . . . . . . 142--152 M. Vega and J. Mateos and R. Molina and A. K. Katsaggelos Super-Resolution of Multispectral Images 153--167
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 169--170 Chung-Ming Huang and Chung-Wei Lin and Xin-Ying Lin A Predictive Video-on-Demand Bandwidth Management Using the Kalman Filter over Heterogeneous Networks . . . . . . . . . 171--185 Giuseppe Anastasi and Emilio Ancillotti and Marco Conti and Andrea Passarella Design and Performance Evaluation of a Transport Protocol for Ad hoc Networks 186--209 Abdelgadir Ibrahim and Liping Zhao Supporting the OSGi Service Platform with Mobility and Service Distribution in Ubiquitous Home Environments . . . . 210--239 Tomás Sánchez López and Daeyoung Kim and Gonzalo Huerta Canepa and Koudjo Koumadi Integrating Wireless Sensors and RFID Tags into Energy-Efficient and Dynamic Context Networks . . . . . . . . . . . . 240--267 Yamin Li and Shietung Peng and Wanming Chu Optimal Algorithms for Finding a Trunk on a Tree Network and its Applications 268--275
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 277--279 Fei He and Xiaoyu Song and Ming Gu and Jiaguang Sun Heuristic-Guided Abstraction Refinement 280--287 Ricardo Pereira e Silva and Evandro César Freiberger Metrics to Evaluate the Use of Object Oriented Frameworks . . . . . . . . . . 288--304 David Power and Mark Slaymaker and Andrew Simpson On Formalizing and Normalizing Role-Based Access Control Systems . . . 305--325 Alex Gammerman and Volodya Vovk and Brian Burford and Ilia Nouretdinov and Zhiyuan Luo and Alexey Chervonenkis and Mike Waterfield and Rainer Cramer and Paul Tempst and Josep Villanueva and Musarat Kabir and Stephane Camuzeaux and John Timms and Usha Menon and Ian Jacobs Serum Proteomic Abnormality Predating Screen Detection of Ovarian Cancer . . . 326--333 Florentin Ipate Test Selection for Hierarchical and Communicating Finite State Machines . . 334--347 Jesús M. Almendros-Jiménez and Luis Iribarne UML Modeling of User and Database Interaction . . . . . . . . . . . . . . 348--367 Jukka Teuhola Tournament Coding of Integer Sequences 368--377 Simon Lavington An Appreciation of Dina St Johnston (1930--2007) Founder of the UK's First Software House . . . . . . . . . . . . . 378--387 Get checked abstract Appreciation of Professor Colin Tully (1936--2007): Professor of Software Practice, Middlesex University . . . . . 388--391
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 393--394 Aggelos K. Katsaggelos and Rafael Molina Guest Editorial . . . . . . . . . . . . 395--396 Fabrice Saffre and Richard Tateson and José Halloy and Mark Shackleton and Jean Louis Deneubourg Aggregation Dynamics in Overlay Networks and Their Implications for Self-Organized Distributed Applications 397--412 Anastasis A. Sofokleous and Marios C. Angelides Dynamic Selection of a Video Content Adaptation Strategy from a Pareto Front 413--428 Zhongqiang Chen and Alex Delis and Peter Wei A Pragmatic Methodology for Testing Intrusion Prevention Systems . . . . . . 429--460 Natarajan Meghanathan A Location Prediction-Based Reactive Routing Protocol to Minimize the Number of Route Discoveries and Hop Count per Path in Mobile Ad Hoc Networks . . . . . 461--482 Yukiko Yamauchi and Toshimitsu Masuzawa and Doina Bein Preserving the Fault-Containment of Ring Protocols Executed on Trees . . . . . . 483--498 Kuo-Qin Yan and Shun-Sheng Wang and Shu-Ching Wang The Agreement Problem in Unreliable Scale-Free Networks . . . . . . . . . . 499--509 Olav Geil Book Review: Tracey Ho and Desmond S. Lun, \booktitleNetwork Coding: An Introduction. Cambridge University Press (2008). ISBN-13 978-0-521-87310-9. 184 pp. \pounds 30/\$60. Hardcover} . . . . 510 Elizabeth Harrin Book Review: John E. Gibson, William T. Scherer and William F. Gibson, \booktitleHow to do Systems Analysis, Wiley (2007). ISBN-13 978-0-470-00765-5. \pounds 47.50. 360 pp. Hardcover . . . . 510--511
Hong Zhu and S. C. Cheung and Joseph R. Horgan and J. Jenny Li Guest Editorial to the Special Issue on Automation of Software Testing . . . . . 513 Leonard Gallagher and Jeff Offutt Test Sequence Generation For Integration Testing Of Component Software . . . . . 514--529 Meng-Luo Ji and Ji Wang and Shuhao Li and Zhi-Chang Qi Automated Worst-Case Execution Time Analysis Based on Program Modes . . . . 530--544 Mingsong Chen and Xiaokang Qiu and Wei Xu and Linzhang Wang and Jianhua Zhao and Xuandong Li UML Activity Diagram-Based Automatic Test Case Generation for Java Programs 545--556 Aynur Abdurazik and Jeff Offutt Using Coupling-Based Weights for the Class Integration and Test Order Problem 557--570 Lijun Shan and Hong Zhu Generating Structurally Complex Test Cases By Data Mutation: a Case Study Of Testing An Automated Modelling Tool . . 571--588 Qian Yang and J. Jenny Li and David M. Weiss A Survey of Coverage-Based Testing Tools 589--597
Monika Kapus-Kolar Three Generalizations to a Generic Integrated Test Generation Method for Finite State Machines . . . . . . . . . 599--625 Jaesung Lee and Hyuk-Jae Lee and Chanho Lee A Phase-Based Approach for On-Chip Bus Architecture Optimization . . . . . . . 626--645 Hung-Yu Chien and Tzong-Chen Wu Provably Secure Password-Based Three-Party Key Exchange With Optimal Message Steps . . . . . . . . . . . . . 646--655 Daniel Lacks and Mainak Chatterjee and Taskin Kocak Design and Evaluation of a Distributed Clustering Algorithm for Mobile ad hoc Networks . . . . . . . . . . . . . . . . 656--670 Tzu-Chi Huang and Ce-Kuen Shieh and Yu-Ben Miao Just-In-Time Cache for Capsule-Based Active Networks . . . . . . . . . . . . 671--689 Daniel Greenfield and Simon Moore Implications of Electronics Technology Trends for Algorithm Design . . . . . . 690--698 Zhongqiang Chen and Yuan Zhang and Zhongrong Chen and Alex Delis A Digest and Pattern Matching-Based Intrusion Detection Engine . . . . . . . 699--723 Jakub Marecek Book Review: Yves Pochet and Laurence A. Wolsey, \booktitleProduction Planning Using Mixed Integer Programming, Springer (2006). ISBN-13 978-0-387-29959-4. \pounds 38.50/\$59.95. 477 pp. Hardbound} . . . 724--725 Elizabeth Harrin Book Review: Jean Tabaka, \booktitleCollaboration Explained: Facilitation Skills for Software Project Leaders. Addison Wesley (2006). ISBN-13 978-0-321-26877-8. \pounds 31.99. 412 pp. Softbound . . . . . . . . . . . . . 725--725 Mamdouh Refaat Book Review: Colleen Mccue, \booktitleData Mining and Predictive Analytics: Intelligence Gathering and Crime Analysis, Elsevier (2007). ISBN 0-7506-7796-1. 28.99 GBP. 332 pp. Paperback . . . . . . . . . . . . . . . 725--726
Michael Elad and Dmitry Datsenko Corrigendum: ``Example-Based Regularization Deployed to Super-Resolution Reconstruction of a Single Image'' . . . . . . . . . . . . . 1131--1131
Harold Thimbleby and Stuart Anderson and Paul Cairns A Framework for Modelling Trojans and Computer Virus Infection . . . . . . . . 445--458
D. J. Wheeler and R. M. Needham TEA, a tiny encryption algorithm . . . . 363