Issue navigation
Volume 58, Issue 5, May 2015
Section A
Original Articles
PerTiMo: A Model of Spatial Migration with Safe Access Permissions
Gabriel Ciobanu and Maciej Koutny
The Computer Journal, Volume 58, Issue 5, May 2015, Pages 1041–1060, https://doi.org/10.1093/comjnl/bxu006
Circular Pattern Discovery
Jie Lin and others
The Computer Journal, Volume 58, Issue 5, May 2015, Pages 1061–1073, https://doi.org/10.1093/comjnl/bxu009
Constrained Longest Common Subsequences with Run-Length-Encoded Strings
Jia-Jie Liu and others
The Computer Journal, Volume 58, Issue 5, May 2015, Pages 1074–1084, https://doi.org/10.1093/comjnl/bxu012
Heuristics for the Maximum 2-Layer RAC Subgraph Problem
Emilio Di Giacomo and others
The Computer Journal, Volume 58, Issue 5, May 2015, Pages 1085–1098, https://doi.org/10.1093/comjnl/bxu017
Two Reflected Gray Code-Based Orders on Some Restricted Growth Sequences
Ahmad Sabri and Vincent Vajnovszki
The Computer Journal, Volume 58, Issue 5, May 2015, Pages 1099–1111, https://doi.org/10.1093/comjnl/bxu018
A Systematical and Parallel Approach to Solve Problems Involving Special Properties of Bit-Vectors
Chia Shin Ou and others
The Computer Journal, Volume 58, Issue 5, May 2015, Pages 1112–1121, https://doi.org/10.1093/comjnl/bxu025
Non-Functional Requirements Framework: A Mathematical Programming Approach
Amy Affleck and others
The Computer Journal, Volume 58, Issue 5, May 2015, Pages 1122–1139, https://doi.org/10.1093/comjnl/bxu027
Model Learning and Test Generation Using Cover Automata
Florentin Ipate and others
The Computer Journal, Volume 58, Issue 5, May 2015, Pages 1140–1159, https://doi.org/10.1093/comjnl/bxu032
Functional Dependencies with null Markers
Antonio Badia and Daniel Lemire
The Computer Journal, Volume 58, Issue 5, May 2015, Pages 1160–1168, https://doi.org/10.1093/comjnl/bxu039
Compression of a Set of Files with Natural Language Content
Petr Procházka and Jan Holub
The Computer Journal, Volume 58, Issue 5, May 2015, Pages 1169–1185, https://doi.org/10.1093/comjnl/bxu046
A Method to Find Functional Dependencies Through Refutations and Duality of Hypergraphs
Joel Fuentes and others
The Computer Journal, Volume 58, Issue 5, May 2015, Pages 1186–1198, https://doi.org/10.1093/comjnl/bxu047
Evaluating and Comparing Fault-Based Testing Strategies for General Boolean Specifications: A Series of Experiments
Chang-Ai Sun and others
The Computer Journal, Volume 58, Issue 5, May 2015, Pages 1199–1213, https://doi.org/10.1093/comjnl/bxu055
Digital Arithmetic in Nature: Continuous-Digit RNS
Behrooz Parhami
The Computer Journal, Volume 58, Issue 5, May 2015, Pages 1214–1223, https://doi.org/10.1093/comjnl/bxu060
Advertisement
Advertisement