Volume 72, Number 1, February 2006
: Sequential predictions based on algorithmic complexity.
Volume 72, Number 2, March 2006
JCSS FOCS 2003 Special Issue
Volume 72, Number 3, May 2006
Network Algorithms 2005
Volume 72, Number 4, June 2006
: Security of the design of time-stamped signatures.
, Li Layuan
: A distributed multiple dimensional QoS constrained resource scheduling optimization policy in computational grid.
Volume 72, Number 5, August 2006
Special Issue on FOCS 2001
: On the severity of Braess's Paradox: Designing networks for selfish users is hard.
Volume 72, Number 6, September 2006
, Her-Tyan Yeh
: Password-based authentication and key distribution protocols with perfect forward secrecy.
Volume 72, Number 7, November 2006
Performance modelling and evaluation of computer systems
: Performance modelling and evaluation of computer systems.
Inn Inn Er
, Winston Khoon Guan Seah
: Clustering overhead and convergence time analysis of the mobility-based multi-hop clustering algorithm for mobile ad hoc networks.
Volume 72, Number 8, December 2006
: A faster distributed protocol for constructing a minimum spanning tree.