Journals in DBLP
Comput. J. 1985, volume: 28, number: 3
Ronald K. Stamper Information: Mystical Fluid or a Subject for Scientific Enquiry? [Citation Graph (0, 0)][DBLP ] Comput. J., 1985, v:28, n:3, pp:195-199 [Journal ] George Rzevski On Criteria For Assessing An Information Theory. [Citation Graph (0, 0)][DBLP ] Comput. J., 1985, v:28, n:3, pp:200-202 [Journal ] G. G. Scarrott Information, the Life Blood of Organisation. [Citation Graph (0, 0)][DBLP ] Comput. J., 1985, v:28, n:3, pp:203-205 [Journal ] Colin Tully Information, Human Activity and the Nature of Relevant Theories. [Citation Graph (0, 0)][DBLP ] Comput. J., 1985, v:28, n:3, pp:206-210 [Journal ] Frank Land Is an Information Theory Enough? [Citation Graph (0, 0)][DBLP ] Comput. J., 1985, v:28, n:3, pp:211-215 [Journal ] D. H. Marwick , C. R. G. B. Rinaldi The Tattoo on a Micro-Computer. [Citation Graph (0, 0)][DBLP ] Comput. J., 1985, v:28, n:3, pp:216-222 [Journal ] Guy Fitzgerald , N. Stokes , J. R. G. Wood Feature Analysis of Contemporary Information Systems Methodologies. [Citation Graph (0, 0)][DBLP ] Comput. J., 1985, v:28, n:3, pp:223-230 [Journal ] Roland N. Ibbett , David A. Edwards , T. P. Hopkins , C. K. Cadogan , D. A. Train Centrenet - A High Performance Local Area Network. [Citation Graph (0, 0)][DBLP ] Comput. J., 1985, v:28, n:3, pp:231-242 [Journal ] S. Muir , David Hutchison , Doug Shepherd Arca: A Local Network File Server. [Citation Graph (0, 0)][DBLP ] Comput. J., 1985, v:28, n:3, pp:243-249 [Journal ] M. Howard Williams Structuring Two-Level Grammar Specifications. [Citation Graph (0, 0)][DBLP ] Comput. J., 1985, v:28, n:3, pp:250-256 [Journal ] D. T. Goodwin The Computability of Stack Non-Underflow. [Citation Graph (0, 0)][DBLP ] Comput. J., 1985, v:28, n:3, pp:257-263 [Journal ] Sakti Pramanik , Chung-Ta King A Hardware Pattern Matching Algorithm on a Dataflow. [Citation Graph (0, 0)][DBLP ] Comput. J., 1985, v:28, n:3, pp:264-269 [Journal ] R. N. Maddison , A. J. Gawronski A Data Dictionary for Learning Data Analysis. [Citation Graph (0, 0)][DBLP ] Comput. J., 1985, v:28, n:3, pp:270-281 [Journal ] S. Misbah Deen , R. R. Amin , G. O. Ofori-Dwumfuo , Malcolm C. Taylor The Architecture of a Generalised Distributed Database System - PRECI. [Citation Graph (5, 0)][DBLP ] Comput. J., 1985, v:28, n:3, pp:282-290 [Journal ] S. Misbah Deen A Tuple Placement Technique For Databases. [Citation Graph (0, 0)][DBLP ] Comput. J., 1985, v:28, n:3, pp:291-297 [Journal ] T. D. Kimura , Will D. Gillett , Jerome R. Cox Jr. A Design of a Data Model Based on Abstraction of Symbols. [Citation Graph (0, 0)][DBLP ] Comput. J., 1985, v:28, n:3, pp:298-308 [Journal ] W. B. Samson , A. Bendell Rank Order Distributions and Secondary Key Indexing. [Citation Graph (3, 0)][DBLP ] Comput. J., 1985, v:28, n:3, pp:309-312 [Journal ] Gordon Lyon Achieving Hash Table Searches In One Or Two Bucket Probes. [Citation Graph (0, 0)][DBLP ] Comput. J., 1985, v:28, n:3, pp:313-318 [Journal ] Per-Åke Larson Performance Analysis of a Single-File Version of Linear Hashing. [Citation Graph (2, 0)][DBLP ] Comput. J., 1985, v:28, n:3, pp:319-329 [Journal ] James K. Mullin Spiral Storage: Efficient Dynamic Hashing with Constant Performance. [Citation Graph (2, 0)][DBLP ] Comput. J., 1985, v:28, n:3, pp:330-334 [Journal ] A. Oxley Surface Fitting By Triangulation. [Citation Graph (0, 0)][DBLP ] Comput. J., 1985, v:28, n:3, pp:335-339 [Journal ]