Go home now Header Background Image
Submission Procedure
share: |
Follow us
Volume 3

Content of Issue 1
Managing Editor's Column H. Maurer 1
Bounds on Size of Decision Diagrams V. Dvořák 2
Generalizing BIAS Specifications E. D. Popova, C. P. Ullrich 23
Structured Parallel Computation in Structured Documents D. B. Skillicorn 42
Content of Issue 2
DOI: 10.3217/jucs-003-02
Managing Editor's Column H. Maurer 69
Symbol Ranking Text Compression with Shannon Recodings P. Fenwick 70
Prototyping on the PC with Programmable Hardware J. Omar, J. M. Noras 86
Type Compatibility for Extensible Module Types, Their Reference Parameters, and Their Pointer Types J. F. H. Winkler 120
Content of Issue 3
DOI: 10.3217/jucs-003-03
Managing Editor's Column H. Maurer 147
Linear Time Simulation of Invertible Non-Deterministic Stack Algorithms N. Andersen 148
Difference Splittings of Recursively Enumerable Sets A. Arslanov 172
On the Weaknesses of Gong's Collisionful Hash Function S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk 185
Polynomial-Time Multi-Selectivity L. A. Hemaspaandra, Z. Jiang, J. Rothe, O. Watanabe 197
Content of Issue 4
DOI: 10.3217/jucs-003-04
Ten Years of Gurevich's Abstract State Machines E. Börger 230
Recursive Abstract State Machines Y. Gurevich, M. Spielmann 233
The Linear Time Hierarchy Theorems for Abstract State Machines and RAMs A. Blass, Y. Gurevich 247
Gurevich Abstract State Machines and Schoenhage Storage Modification Machines S. Dexter, P. Doyle, Y. Gurevich 279
The Constrained Shortest Path Problem: A Case Study in Using ASMs K. Strötmann 304
Formalizing Database Recovery Y. Gurevich, N. Soparkar, C. Wallace 320
A Structured Presentation of a Closure-Based Compilation Method for a Scoping Notion in Logic Programming K. Kwon 341
Reasoning about Abstract State Machines: The WAM Case Study G. Schellhorn, W. Ahrendt 377
Content of Issue 5
DOI: 10.3217/jucs-003-05
J.UCS Special ASM Issue. Part II. E. Börger 414
Montages Specifications of Realistic Programming Languages P. W. Kutter, A. Pierantonio 416
The Formal Specification of Oberon P. W. Kutter, A. Pierantonio 443
On the Construction of Correct Compiler Back-Ends: An ASM-Approach W. Zimmermann, T. Gaul 504
Correctness Proof of a Distributed Implementation of Prolog by Means of Abstract State Machines L. Araujo 568
Integrating ASMs into the Software Development Life Cycle E. Börger, L. Mearelli 603
Refining an ASM Specification of the Production Cell to C++ Code L. Mearelli 666
Model Checking for Abstract State Machines K. Winter 689
Content of Issue 6
DOI: 10.3217/jucs-003-06
Managing Editor's Column H. Maurer 702
Free Space Modeling for Placing Rectangles without Overlapping M. Bernard, F. Jacquenet 703
Highly Nonlinear t-Resilient Functions K. Kurosawa, T. Satoh, K. Yamamoto 721
Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases A. Baraani-Dastjerdi, J. Pieprzyk, R. Safavi-Naini, J.R. Getta 730
Content of Issue 7
DOI: 10.3217/jucs-003-07
Managing Editor's Column H. Maurer 754
MONSTR II - Suspending Semantics and Independence R. Banach 756
Bounds on the Performance of Work-greedy Assignment Schemes S. Manoharan 803
Optimum Huffman Forests I. Tomescu 813
Stack Filter Design Using a Distributed Parallel Implementation of Genetic Algorithms P. E. Undrill, K. Delibasis, G. G. Cameron 821
Content of Issue 8
DOI: 10.3217/jucs-003-08
Information Technology for Knowledge Management U. M. Borghoff, R. Pareschi 835
Two Complementary Tools for the Cooperation in a Ministerial Environment W. Prinz, A. Syri 843
Ariadne: Supporting Coordination through a Flexible Use of the Knowledge on Work Processes C. Simone, M. Divitini 865
Negotiating the Construction and Reconstruction of Organisational Memories S. Buckingham Shum 899
Corporate Memories for Knowledge Management in Industrial Practice: Prospects and Challenges O. Kühn, A. Abecker 929
From Natural Language Documents to Sharable Product Knowledge: A Knowledge Engineering Approach D. Rösner, B. Grote, K. Hartmann, B. Höfling 955
Profiling with the INFOrmer Text Filtering Agent H. Sorensen, A. O'Riordan, C. O'Riordan 988
A Framework for Filtering News and Managing Distributed Data G. Amati, D. D'Aloisi, V. Giannini, F. Ubaldini 1007
Content of Issue 9
DOI: 10.3217/jucs-003-09
Managing Editor's Column H. Maurer 1022
Linear Multisecret-Sharing Schemes and Error-Correcting Codes C. Ding, T. Laihonen, A. Renvall 1023
MTAC - A Multithreaded VLIW Architecture for PRAM Simulation M. Forsell 1037
Genetic Trajectory Planner for a Manipulator with Acceleration Parametrization Y. Dae Lee, B. Hee Lee 1056
Why We Need an Explicit Forum for Negative Results L. Prechelt 1074
Content of Issue 10
DOI: 10.3217/jucs-003-10
Managing Editor's Column H. Maurer 1084
Optimal Description of Automatic Paperfolding Sequences A. Cerny 1085
Compression of Silhouette-like Images based on WFA K. Culik II., V. Valenta, J. Kari 1100
On N-Algebraic Parikh Slender Power Series J. Honkala 1114
A Note on Correctness Proofs for Overflow Detection Logic in Adders for d-th Complement Numbers B. Rederlechner, J. Keller 1121
On Two Aspects of Improving Web-Based Training H. Maurer 1126
Content of Issue 11
DOI: 10.3217/jucs-003-11
Logic in Computer Science D. S. Bridges, C.S. Calude, M. J. Dinneen, B. Khoussainov 1133
Persistency of Confluence T. Aoto, Y. Toyama 1134
Constructive Aspects of the Dirichlet Problem D. S. Bridges, W. Yuchuan 1148
Chaitin Ω Numbers and Strong Reducibilities C.S. Calude, A. Nies 1162
Optimum Extendible Prefix Codes C.S. Calude, I. Tomescu 1167
Minimal Deterministic Incomplete Automata E. Calude, M. Lipponen 1180
A Note on the Computability of Graph Minor Obstruction Sets for Monadic Second Order Ideals B. Courcelle, R. G. Downey, M. R. Fellows 1194
Too Many Minor Order Obstructions (For Parameterized Lower Ideals) M. J. Dinneen 1199
Representing Variable-Length Codes in Fixed-Length T-Depletion Format in Encoders and Decoders U. Günther, P. Hertling, R. Nicolescu, M. Titchener 1207
Surjective Functions on Computably Growing Cantor Sets P. Hertling 1226
Invariance Properties of Random Sequences P. Hertling, Y. Wang 1241
Sequential Continuity of Linear Mappings in Constructive Mathematics H. Ishihara 1250
Effectiveness of the Completeness Theorem for an Intermediate Logic H. Ishihara, B. Khoussainov 1255
Imperfect Information Flow of Agents Communication in Arrow Logic Y. Murakawa, S. Tojo 1266
Content of Issue 12
DOI: 10.3217/jucs-003-12
Managing Editor's Column H. Maurer 1282
MONSTR V - Transitive Coercing Semantics and the Church-Rosser Property R. Banach 1283
Formal Analysis of the Kerberos Authentication System G. Bella, E. Riccobene 1337
Abstract State Machine Semantics of SDL U. Glaesser, R. Karges 1382
An Asynchronous Calculus Based on the Absence of Actions P. Krishnan 1415