The SCEAS System
Navigation Menu

Journals in DBLP

Comput. J.
1984, volume: 27, number: 1

  1. Maurice V. Wilkes
    Security Management and Protection - A Personal Approach. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1984, v:27, n:1, pp:3-7 [Journal]
  2. William A. Gale, Roger Koenker
    Pricing Interactive Computer Services. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1984, v:27, n:1, pp:8-17 [Journal]
  3. Ivor P. Page
    Analysis of a Cyclic Placement Scheme. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1984, v:27, n:1, pp:18-26 [Journal]
  4. Peter G. Harrison
    The Distribution of Cycle Times in Tree-Like Networks of Queues. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1984, v:27, n:1, pp:27-36 [Journal]
  5. D. H. J. Brown
    Transitions to Ada: An Incremental Approach. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1984, v:27, n:1, pp:37-41 [Journal]
  6. L. V. Atkinson
    Jumping About and Getting into a State. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1984, v:27, n:1, pp:42-46 [Journal]
  7. David M. Harland
    User-Defined Types in a Polymorphic Language. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1984, v:27, n:1, pp:47-56 [Journal]
  8. Adarsh K. Arora, C. Robert Carlson
    Normalization Could be Useful. [Citation Graph (1, 0)][DBLP]
    Comput. J., 1984, v:27, n:1, pp:57-61 [Journal]
  9. N. Parimala, Naveen Prakash, Narasimha Bolloju
    Concurrency Control in Admin. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1984, v:27, n:1, pp:62-66 [Journal]
  10. K. T. Fung
    A. Reorganization Model Based on the Database Entropy Concept. [Citation Graph (1, 0)][DBLP]
    Comput. J., 1984, v:27, n:1, pp:67-71 [Journal]
  11. C. M. Reeves
    Complexity Analyses of Event Set Algorithms. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1984, v:27, n:1, pp:72-79 [Journal]
  12. M. C. Er
    The Colour Towers of Hanoi: A Generalization. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1984, v:27, n:1, pp:80-82 [Journal]
  13. Chingmin Jim Lo
    Unifying Multiple Semantic Intentions for a Syntactic Construct. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1984, v:27, n:1, pp:83-84 [Journal]
  14. R. J. Macmillan, James H. Davenport
    Factoring Medium-Sized Integers. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1984, v:27, n:1, pp:84-85 [Journal]
  15. Gael N. Buckley, Abraham Silberschatz
    On the Heterogeneous Guard Locking Protocol. [Citation Graph (2, 0)][DBLP]
    Comput. J., 1984, v:27, n:1, pp:86-87 [Journal]
  16. Tamir Agmon, Israel Borovits
    Dynamic and Uncertainty Considerations in the Selection and the Acquisition of An Information System: An Adoption of A Break-Even Analysis to Investment Decisions. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1984, v:27, n:1, pp:87-89 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002