Skip navigation

Browse by Journal Title

Browse by Journal Title

Up a level
Export as [feed] RSS
Group by: Creators | Item Type | Uncontrolled Keywords | No Grouping
Jump to: Article
Number of items: 11.

Article

Agius, Harry, Angelides, Marios C. and Daylamani Zad, Damon (2013) MC2: A framework and service for MPEG-7 content-modelling communities. The Computer Journal, 56 (5). pp. 593-616. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxs101)

Dimakis, Nikolaos, Filippoupolitis, Avgoustinos and Gelenbe, Erol (2010) Distributed building evacuation simulator for smart emergency management. The Computer Journal, 53 (9). pp. 1384-1400. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxq012)

Filippoupolitis, Avgoustinos, Gorbil, Gokce and Gelenbe, Erol (2012) Spatial computers for emergency support. The Computer Journal, 56 (12). pp. 1399-1416. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxs063)

Ierotheou, C., Lai, C.-H. ORCID: 0000-0002-7558-6398 , Palansuriya, C.J. and Pericleous, K.A. ORCID: 0000-0002-7426-9999 (1998) Simulation of 2-D metal cutting by means of a distributed algorithm. The Computer Journal, 41 (1). pp. 57-63. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/41.1.57)

Lai, C.-H. ORCID: 0000-0002-7558-6398 , Ierotheou, C.S., Palansuriya, C.J. and Pericleous, K.A. ORCID: 0000-0002-7426-9999 (2001) Performance evaluation of a distributed algorithm for an inverse heat conduction problem. The Computer Journal, 44 (3). pp. 214-220. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/44.3.214)

Liu, Jinlu, Zhao, Bo, Qin, Jing, Zhang, Xi and Ma, Jixin (2021) Multi-keyword ranked searchable encryption with the wildcard keyword for data sharing in cloud computing. The Computer Journal:bxab153. pp. 1-13. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxab153)

Loukas, George ORCID: 0000-0003-3559-5182 and Öke, Gülay (2010) Protection against denial of service attacks: a survey. The Computer Journal, 53 (7). pp. 1020-1037. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxp078)

Ma, Jixin and Hayes, Pat (2006) Primitive intervals versus point-based intervals: rivals or allies? The Computer Journal, 49 (1). pp. 32-41. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxh151)

Ma, Jixin and Knight, Brian (2003) Representing the dividing instant. The Computer Journal, 46 (2). pp. 213-222. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/46.2.213)

Ma, Jixin and Knight, Brian (1996) A reified temporal logic. The Computer Journal, 39 (9). pp. 800-807. ISSN 0010-4620 (doi:https://doi.org/10.1093/comjnl/39.9.800)

Wang, Qing, Zhang, Xi, Qin, Jing, Ma, Jixin and Huang, Xinyi (2021) A verifiable symmetric searchable encryption scheme based on the AVL tree. The Computer Journal:bxab152. pp. 1-10. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxab152)

This list was generated on Thu Nov 21 09:39:38 2024 UTC.