School of Computing
Collection home page
Collection's Items (Sorted by Submit Date in Descending order): 261 to 280 of 456
| Issue Date | Title | Author(s) |
| 1995 | Performance and reliability modelling of computing systems using spectral expansion | Chakka, Ram |
| 1983 | Computer architectures for functional and logic languages | Millichamp, Roger Charles |
| 2011 | Contextual governance for service oriented architecture composition | De Leusse, Pierre |
| 2009 | Qualitatively modelling genetic regulatory networks: Petri net techniques and tools | Banks, Richard A. |
| 2005 | Incorporating faults and fault-tolerance into real-time networks: a graph-transformational approach | Owen, Daniel James |
| 2005 | Using a loadtime metaobject protocol to enforce access control policies upon user-level compiled code | Welch, Ian Shawn |
| 1996 | Location and routing optimization protocols supporting internet host mobility | Cho, Gi Hwan |
| 1995 | A trade-off model between cost and reliability during the design phase of software development | Burnett, Robert Carlisle |
| 1979 | Computable error bounds for approximate solutions of ordinary differential equations | Gerrard, Clive |
| 1975 | On optimal and near-optimal algorithms for some computational graph problems | Szwarcfiter, Jayme Luiz |
| 1981 | Action-replay: a real-time debugging technique | Kanellopoulos, Nikos Gregory K. |
| 1997 | Performance modelling of replication protocols | Misra, Manoj |
| 2007 | Monitoring middleware for distributed applications | Parkin, Simon Edward |
| 2005 | Formal modelling and analysis of an asynchronous communication mechanism | Henderson, Neil |
| 2004 | The theory and practice of refinement-after-hiding | Burton, Jonathan |
| 2006 | Exploiting method semantics in client cache consistency protocols for object-oriented databases | Dwiartanto, Johannes |
| 2007 | System support for interactive applications in ad hoc networks | Lin, Nan |
| 2004 | Attack-class-based analysis of intrusion detection systems | Alessandri, Dominique |
| 1994 | Exploiting parallelism in n-D convex hull algorithms | Eyoh, edet Okon |
| 2006 | Resource allocation policies for service provisioning systems | Palmer, Jennie |
Collection's Items (Sorted by Submit Date in Descending order): 261 to 280 of 456