default search action
The Computer Journal, Volume 31, 1988
Volume 31, Number 1, 1988
- Hugo T. Jankowitz:
Detecting Plagiarism in Student Pascal Programs. 1-8 - Lloyd Allison:
Some Applications of Continuations. 9-11 - M. Razaz, J. L. Schonfelder:
Test Procedures for Measurement of Floating-Point Characteristics of Computing Environments. 13-16 - Martin D. Davis, Elaine J. Weyuker:
Metric Space- Based Test-Data Adequacy Criteria. 17-24 - Roger A. Clarke:
Judicial Understanding of Information Technology: The Case of the Wombat ROMs. 25-33 - Csaba J. Egyhazy, Konstantinos P. Triantis:
A Query Processing Algorithm for Distributed Relational Database Systems. 34-40 - Werner Kießling:
Access Path Selection in Databases with Intelligent Disc Subsystems. 41-50 - Lawrence J. Henschen, Bob P. Weems:
A Top-Down Inference Procedure for Template Dependencies. 51-55 - Wm. Randolph Franklin, Varol Akman:
Adaptive Grid for Polyhedral Visibility in Object Space: An Implementation. 56-60 - M. C. Er:
A Simple Algorithm for Generating Non-Regular Trees in Lexicographic Order. 61-64 - Ivan Stojmenovic, Masahiro Miyakawa:
Applications of a Subset-Generating Algorithm to Base Enumeration, Knapsack and Minimal Covering Problems. 65-70 - Mirka Miller, Ivan Fris:
Minimum Diameter of Diregular Digraphs of Degree 2. 71-75 - Selim M. Selim:
Split Vertices in Vertex Colouring and Their Application in Developing a Solution to the Faculty Timetable Problem. 76-82 - Graham M. Megson, David J. Evans:
The Unification of Systolic Differencing Algorithms. 83-91
Volume 31, Number 2, 1988
- Malcolm P. Atkinson, Peter Buneman, Ronald Morrison:
Binding and Type Checking in Database Programming Languages. 99-109 - David S. Moffat, Peter M. D. Gray:
Perlog: A Prolog With Persistence and Modules. 110-115 - Liping Zhao, S. A. Roberts:
An Object-Oriented Data Model for Database Modelling, Implementation and Access. 116-124 - Carol Small:
The Implementation of the Exegesis System. 125-132 - M. Howard Williams, K. A. Nicholson:
An Approach to Handling Incomplete Information in Databases. 133-140 - James Bradley:
Polygon Join Dependencies, Closed Co-Relationship Chains and the Connection Trap in Relational Databases. 141-146 - Julian R. Ullmann:
Fast Implementation of Relational Operations Via Inverse Projections. 147-154 - Mehdi Owrang, Les L. Miller:
Query Translation Based on Hypergraph Models. 155-164 - Farokh B. Bastani, S. Sitharama Iyengar, I-Ling Yen:
Concurrent Maintenance of Data Structures in a Distributed Environment. 165-174 - S. Misbah Deen, Malcolm C. Taylor, P. A. Ingram, K. W. Rayner:
A Distributed Directory Database System for Telecommunications. 175-181 - Kathleen Spurr:
A Data Dictionary Approach to Teaching Information Systems Analysis. 182-189
Volume 31, Number 3, 1988
- Derrick Morris, Colin J. Theaker, P. B. Whitehead:
Structured Abstract Schematics. 193-200 - Fabrizio Lombardi:
Analysis of Comparison-Based Diagnosable Systems Using Temporal Criteria. 201-208 - M. Gopalakrishnan, Lalit M. Patnaik:
Medium Access Control Schemes for Local Area Networks with Multiple Priority Function. 209-219 - Ralph E. Griswold:
Programming with Generators. 220-228 - Peter G. Harrison, Hessam Khoshnevisan:
Algebraic Transformation Techniques for Functional Languages. 229-242 - F. Warren Burton:
Nondeterminism with Referential Transparency in Functional Programming Languages. 243-247 - Ronald E. Prather:
Comparison and Extension of Theories of Zipf and Halstead. 248-252 - David A. Bell, F. J. McErlean, P. M. Stewart, W. Arbuckle:
Clustering Related Tuples in Databases. 253-257 - Kathryn S. Dawson, Lorraine M. Purgailis Parker:
From Entity-Relationship Diagrams to Fourth Normal Form: A Pictorial Aid to Analysis. 258-268 - Theo P. van der Weide:
Iterative Tree Traversal Using Refinements and Pointer Rotation. 269-275 - D. Richards:
On the Worst-Possible Analysis of Weighted Comparison-Based Algorithms. 276-278 - S. Dvorák, Branislav Durian:
Unstable Linear Time O(1) Space Merging. 279-282 - M. C. Er:
A Fast Algorithm for Generating Set Partitions. 283-284
- Kazimierz Subieta, K. Anacki, Marek Missala:
Overlay Clusters for C Programs. 285-286
Volume 31, Number 4, 1988
- Jean-Michel Hélary, Noël Plouzeau, Michel Raynal:
A Distributed Algorithm for Mutual Exclusion in an Arbitrary Network. 289-295 - Gerard P. Parr:
Enhanced Address Resolution in a Multi-LAN Ethernet Communications System. 296-303 - Mohammed Zaki, M. M. Elboraey:
Analysis of Reliability Models for Interconnecting MIMD Systems. 304-312 - W. T. Roberts:
A Formal Specification of the QMC Message System: The Underlying Abstract Model. 313-324 - Zhixi Fang, Jitender S. Deogun:
Closure Properties of Certain Classes of Languages Under Generalized Morphic Replication. 325-329 - Paolo Sipala:
Efficient Implementation of Binary Trees in LISP Systems. 330-335 - Levent V. Orman:
Functional Database Constraints. 336-343 - Oluwole Charles Akinyokun:
The Experimental Study of CODASYL Database Administration at the Secondary Storage Level. 344-352 - C. Anedda, Leonardo Felician:
P-Compressed Quadtrees for Image Storing. 353-357 - R. Williams:
The Goblin Quadtree. 358-363 - Cormac Lucas, Gautam Mitra:
Computer-Assisted Mathematical Programming (Modelling) System: CAMPS. 364-375
- John Mingers:
Comparing Conceptual Models and Data Flow Diagrams. 376-379 - David E. Avison, Guy Fitzgerald, A. T. Wood-Harper:
Information Systems Development: A Tool Kit is not Enough. 379-380
Volume 31, Number 5, 1988
- Niels Bjørn-Andersen:
Are 'Human Factors' Human? 386-390 - P. N. Le Quesne:
Individual and Organisational Factors and the Design of IPSEs. 391-397 - Rudy Hirschheim, Michael Newman:
Information Systems and User Resistance: Theory and Practice. 398-408 - A. P. Jagodzinski, D. D. Clarke:
A Multidimensional Approach to the Measurement of Human-Computer Performance. 409-419 - Susan Harker:
The Use of Prototyping and Simulation in the Development of Large-Scale Applications. 420-425 - Ken D. Eason, Susan Harker:
The Supplier's Role in the Design of Products for Organisations. 426-430 - D. A. Tyldesley:
Employing Usability Engineering in the Development of Office Products. 431-436 - Derrick Morris, Colin J. Theaker, R. Phillips, W. Love:
Human-Computer Interface Recording. 437-444 - Philip J. Barnard, Michael D. Wilson, Allan MacLean:
Approximate Modelling of Cognitive Activity with and Expert System: A Theory-Based Strategy for Developing an Interactive Design Tool. 445-456 - Andrew Dillon, Cliff McKnight, John Richardson:
Reading From Paper Versus Reading From Screen. 457-464 - David Benyon, Dianne Murray:
Experience with Adaptive Interfaces. 465-473
- Jan K. Pachl:
Two Livelock-Free Protocols for Slotted Rings. 474-476
Volume 31, Number 6, 1988
- Rik Maes, J. E. M. van Dijk:
On the Role of Ambiguity and Incompleteness in the Design of Decision Tables and Rule-Based Systems. 481-489 - Pankaj Goyal, T. S. Narayanan:
Dictionary Machine with Improved Performance. 490-495 - R. Cole, Clare Foxcroft:
An Experiment in Clock Synchronisation. 496-502 - Greg O'Shea:
Controlling the Dependency of User Access Control Mechanisms on Correctness of User Identification. 503-509 - P. F. Gibbins:
VDM: Axiomatising its Propositional Logic. 510-516 - Martin C. Henson:
Higher-Order Transformations and Type Simulations. 517-524 - John Kontos, John C. Cavouras:
Knowledge Acquisition from Technical Texts Using Attribute Grammars. 525-530 - Paul A. Bailes:
An Advanced Problem-Oriented Introduction to Imperative Programming with Modula-2. 531-539 - Alan Dearle, Alfred L. Brown:
Safe Browsing in a Strongly Typed Persistent Environment. 540-544 - Zbigniew J. Czech:
Efficient Implementation of Detection of Undefined Variables. 545-549 - Giorgio Guariso, Hannes Werthner:
A Software Base For Environmental Studies. 550-552 - S. Dvorák, Branislav Durian:
Merging by Decomposition Revisited. 553-556 - M. C. Er:
A Smooth Reshuffling Algorithm for Solving the Bulterman's Problem. 557-560 - Francis Suraweera, J. M. Al-Anzy:
Analysis of a Modified Address Calculation Sorting Algorithm. 561-563
- Jean Marcel Pallo:
Some Properties of the Rotation Lattice of Binary Trees. 564-565 - Chin-Chen Chang, C. Y. Chen:
A Recursive Performance Formula of the Disc Modulo Allocation Method for Binary Cartesian Product Files. 565-566 - Graham M. Megson, David J. Evans:
Improved Matrix Product Computation Using Double-Pipeline Systolic Arrays. 567-569 - M. H. Rennhackkamp, Sebastiaan H. von Solms:
On Using an Abstract Model of Distributed Database Concurrency Control Methods. 570-572
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.