The SCEAS System
Navigation Menu

Journals in DBLP

Comput. J.
2005, volume: 48, number: 4

  1. Fionn Murtagh
    Editorial. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2005, v:48, n:4, pp:381- [Journal]
  2. Fairouz Kamareddine
    Capsule Reviews. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2005, v:48, n:4, pp:382-384 [Journal]
  3. Jane Hillston
    Tuning Systems: From Composition to Performance (The Needham Lecture). [Citation Graph (0, 0)][DBLP]
    Comput. J., 2005, v:48, n:4, pp:385-400 [Journal]
  4. Mónica Pinto, Lidia Fuentes, José M. Troya
    A Dynamic Component and Aspect-Oriented Platform. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2005, v:48, n:4, pp:401-420 [Journal]
  5. Robert M. Hierons, Mark Harman, Chris Fox
    Branch-Coverage Testability Transformation for Unstructured Programs. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2005, v:48, n:4, pp:421-436 [Journal]
  6. Hyung-Kyu Choi, Yoo C. Chung, Soo-Mook Moon
    Java Memory Allocation with Lazy Worst Fit for Small Objects. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2005, v:48, n:4, pp:437-442 [Journal]
  7. Santanu Chattopadhyay
    Area Conscious State Assignment with Flip-Flop and Output Polarity Selection for Finite State Machine Synthesis?A Genetic Algorithm Approach. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2005, v:48, n:4, pp:443-450 [Journal]
  8. Lieven Eeckhout, Yue Luo, Koen De Bosschere, Lizy Kurian John
    BLRL: Accurate and Efficient Warmup for Sampled Processor Simulation. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2005, v:48, n:4, pp:451-459 [Journal]
  9. Nikolaj A. Kuznetsov
    The Science of Infocommunications (The Boole Lecture). [Citation Graph (0, 0)][DBLP]
    Comput. J., 2005, v:48, n:4, pp:460-465 [Journal]
  10. Paul O'Neill, Karl Fraser, Zidong Wang, Paul Kellam, Joost N. Kok, Xiaohui Liu
    Pyramidic Clustering of Large-Scale Microarray Images. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2005, v:48, n:4, pp:466-479 [Journal]
  11. Yuh-Min Tseng
    A Robust Multi-Party Key Agreement Protocol Resistant to Malicious Participants. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2005, v:48, n:4, pp:480-487 [Journal]
  12. James F. Korsh
    Generating T-ary Trees in Linked Representation. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2005, v:48, n:4, pp:488-497 [Journal]
  13. Yi Pan
    Review: Active Services: Concepts, Architecture and Implementation. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2005, v:48, n:4, pp:498-499 [Journal]
  14. Daniel O'Leary
    Review: Ontologies: A Silver Bullet for Knowledge Management and Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2005, v:48, n:4, pp:498- [Journal]
  15. J. Sethuraman
    Review: Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2005, v:48, n:4, pp:499-500 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002