BibTeX records: Gordon A. Manson

download as .bib file

@article{DBLP:journals/jnw/LuMB06,
  author       = {Gang Lu and
                  Gordon A. Manson and
                  Demetrios Belis},
  title        = {Mobility Modeling in Mobile Ad Hoc Networks with Environment-Aware},
  journal      = {J. Networks},
  volume       = {1},
  number       = {1},
  pages        = {54--63},
  year         = {2006},
  url          = {https://doi.org/10.4304/jnw.1.1.54-63},
  doi          = {10.4304/JNW.1.1.54-63},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LuMB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mswim/LuMB06,
  author       = {Gang Lu and
                  Gordon A. Manson and
                  Demetrios Belis},
  editor       = {Mohamed Ould{-}Khaoua and
                  Mar{\'{\i}}a Blanca Caminero},
  title        = {Enhancing routing performance for inter-vehicle communication in city
                  environment},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Performance Monitoring and
                  Measurement of Heterogeneous Wireless and Wired Networks, {PM2HW2N}
                  2006, Terromolinos, Spain, October 2, 2006},
  pages        = {82--89},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1163653.1163669},
  doi          = {10.1145/1163653.1163669},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mswim/LuMB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/is/MouratidisGM05,
  author       = {Haralambos Mouratidis and
                  Paolo Giorgini and
                  Gordon A. Manson},
  title        = {When security meets software engineering: a case of modelling secure
                  information systems},
  journal      = {Inf. Syst.},
  volume       = {30},
  number       = {8},
  pages        = {609--629},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.is.2004.06.002},
  doi          = {10.1016/J.IS.2004.06.002},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/is/MouratidisGM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/LuBM05,
  author       = {Gang Lu and
                  Demetrios Belis and
                  Gordon A. Manson},
  editor       = {Xiaohua Jia and
                  Jie Wu and
                  Yanxiang He},
  title        = {A Novel Environment-Aware Mobility Model for Mobile Ad Hoc Networks},
  booktitle    = {Mobile Ad-hoc and Sensor Networks, First International Conference,
                  {MSN} 2005, Wuhan, China, December 13-15, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3794},
  pages        = {654--665},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599463\_64},
  doi          = {10.1007/11599463\_64},
  timestamp    = {Wed, 11 Mar 2020 08:37:17 +0100},
  biburl       = {https://dblp.org/rec/conf/msn/LuBM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijde/AbouzakharM04,
  author       = {Nasser Salem Abouzakhar and
                  Gordon A. Manson},
  title        = {Evaluation of Intelligent Intrusion Detection Models},
  journal      = {Int. J. Digit. EVid.},
  volume       = {3},
  number       = {1},
  year         = {2004},
  url          = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B5CEAB-E87A-0E38-2D38CE3A3FB2F737.pdf},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijde/AbouzakharM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/MouratidisGM04,
  author       = {Haralambos Mouratidis and
                  Paolo Giorgini and
                  Gordon A. Manson},
  title        = {Using Security Attack Scenarios to Analyse Security During Information
                  Systems Design},
  booktitle    = {{ICEIS} 2004, Proceedings of the 6th International Conference on Enterprise
                  Information Systems, Porto, Portugal, April 14-17, 2004},
  pages        = {10--17},
  year         = {2004},
  timestamp    = {Thu, 02 Feb 2017 12:56:49 +0100},
  biburl       = {https://dblp.org/rec/conf/iceis/MouratidisGM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hij/MouratidisMP03,
  author       = {Haralambos Mouratidis and
                  Gordon A. Manson and
                  Ian R. Philp},
  title        = {Analysis and Design of the eSAP: An Integrated Health and Social Care
                  Information System},
  journal      = {Health Informatics J.},
  volume       = {9},
  number       = {2},
  pages        = {89--92},
  year         = {2003},
  url          = {https://doi.org/10.1177/1460458203009002003},
  doi          = {10.1177/1460458203009002003},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/hij/MouratidisMP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hij/MouratidisMP03a,
  author       = {Haralambos Mouratidis and
                  Gordon A. Manson and
                  Ian R. Philp},
  title        = {A Novel Agent-Based System to Support the Single Assessment Process
                  of Older People},
  journal      = {Health Informatics J.},
  volume       = {9},
  number       = {3},
  pages        = {149--162},
  year         = {2003},
  url          = {https://doi.org/10.1177/14604582030093003},
  doi          = {10.1177/14604582030093003},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/hij/MouratidisMP03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AbouzakharM03,
  author       = {Nasser Salem Abouzakhar and
                  Gordon A. Manson},
  title        = {Networks security measures using neuro-fuzzy agents},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {33--38},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310463713},
  doi          = {10.1108/09685220310463713},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AbouzakharM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aose/PoggiRTOMM03,
  author       = {Agostino Poggi and
                  Giovanni Rimassa and
                  Paola Turci and
                  James Odell and
                  Haralambos Mouratidis and
                  Gordon A. Manson},
  editor       = {Paolo Giorgini and
                  J{\"{o}}rg P. M{\"{u}}ller and
                  James Odell},
  title        = {Modeling Deployment and Mobility Issues in Multiagent Systems Using
                  {AUML}},
  booktitle    = {Agent-Oriented Software Engineering IV, 4th International Workshop,
                  {AOSE} 2003, Melbourne, Australia, July 15, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2935},
  pages        = {69--84},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24620-6\_5},
  doi          = {10.1007/978-3-540-24620-6\_5},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/aose/PoggiRTOMM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/MouratidisGM03,
  author       = {Haralambos Mouratidis and
                  Paolo Giorgini and
                  Gordon A. Manson},
  title        = {Modelling secure multiagent systems},
  booktitle    = {The Second International Joint Conference on Autonomous Agents {\&}
                  Multiagent Systems, {AAMAS} 2003, July 14-18, 2003, Melbourne, Victoria,
                  Australia, Proceedings},
  pages        = {859--866},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/860575.860713},
  doi          = {10.1145/860575.860713},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atal/MouratidisGM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/MouratidisGM03,
  author       = {Haralambos Mouratidis and
                  Paolo Giorgini and
                  Gordon A. Manson},
  editor       = {Johann Eder and
                  Michele Missikoff},
  title        = {Integrating Security and Systems Engineering: Towards the Modelling
                  of Secure Information Systems},
  booktitle    = {Advanced Information Systems Engineering, 15th International Conference,
                  CAiSE 2003, Klagenfurt, Austria, June 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2681},
  pages        = {63--78},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45017-3\_7},
  doi          = {10.1007/3-540-45017-3\_7},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/MouratidisGM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/MouratidisMGG03,
  author       = {Haralambos Mouratidis and
                  Gordon A. Manson and
                  Abdullah Gani and
                  Paolo Giorgini},
  title        = {Analysing Security Requirements of Information Systems Using Tropos},
  booktitle    = {{ICEIS} 2003, Proceedings of the 5th International Conference on Enterprise
                  Information Systems, Angers, France, April 22-26, 2003},
  pages        = {623--626},
  year         = {2003},
  timestamp    = {Thu, 02 Feb 2017 12:57:29 +0100},
  biburl       = {https://dblp.org/rec/conf/iceis/MouratidisMGG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ieaaie/GaniAM03,
  author       = {Abdullah Gani and
                  Nasser Salem Abouzakhar and
                  Gordon A. Manson},
  editor       = {Paul Wai Hing Chung and
                  Chris J. Hinde and
                  Moonis Ali},
  title        = {{UMAS} Learning Requirement for Controlling Network Resources},
  booktitle    = {Developments in Applied Artificial Intelligence, 16th International
                  Conference on Industrial and Engineering Applications of Artificial
                  Intelligence and Expert Systems, {IEA/AIE} 2003, Laughborough, UK,
                  June 23-26, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2718},
  pages        = {487--494},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45034-3\_49},
  doi          = {10.1007/3-540-45034-3\_49},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/ieaaie/GaniAM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kes/MouratidisGM03,
  author       = {Haralambos Mouratidis and
                  Paolo Giorgini and
                  Gordon A. Manson},
  editor       = {Vasile Palade and
                  Robert J. Howlett and
                  Lakhmi C. Jain},
  title        = {An Ontology for Modelling Security: The Tropos Approach},
  booktitle    = {Knowledge-Based Intelligent Information and Engineering Systems, 7th
                  International Conference, {KES} 2003, Oxford, UK, September 3-5, 2003,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2773},
  pages        = {1387--1394},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45224-9\_187},
  doi          = {10.1007/978-3-540-45224-9\_187},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/kes/MouratidisGM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/selmas/BrescianiGMM03,
  author       = {Paolo Bresciani and
                  Paolo Giorgini and
                  Haralambos Mouratidis and
                  Gordon A. Manson},
  editor       = {Carlos Jos{\'{e}} Pereira de Lucena and
                  Alessandro F. Garcia and
                  Alexander B. Romanovsky and
                  Jaelson Castro and
                  Paulo S. C. Alencar},
  title        = {Multi-agent Systems and Security Requirements Analysis},
  booktitle    = {Software Engineering for Multi-Agent Systems II, Research Issues and
                  Practical Applications [the book is a result of {SELMAS} 2003]},
  series       = {Lecture Notes in Computer Science},
  volume       = {2940},
  pages        = {35--48},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24625-1\_3},
  doi          = {10.1007/978-3-540-24625-1\_3},
  timestamp    = {Fri, 06 Nov 2020 10:10:09 +0100},
  biburl       = {https://dblp.org/rec/conf/selmas/BrescianiGMM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/LuoEM03,
  author       = {R. Luo and
                  R. M. Edwards and
                  Gordon A. Manson},
  title        = {Capacity assignment on asymmetric Bluetooth link},
  booktitle    = {2003 {IEEE} Wireless Communications and Networking, {WCNC} 2003, New
                  Orleans, LA, USA, 16-20 March, 2003},
  pages        = {1470--1474},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/WCNC.2003.1200603},
  doi          = {10.1109/WCNC.2003.1200603},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/LuoEM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AbouzakharM02,
  author       = {Nasser Salem Abouzakhar and
                  Gordon A. Manson},
  title        = {An intelligent approach to prevent distributed systems attacks},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {5},
  pages        = {203--209},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210447505},
  doi          = {10.1108/09685220210447505},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AbouzakharM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aois/MouratidisGPM02,
  author       = {Haralambos Mouratidis and
                  Paolo Giorgini and
                  Ian R. Philp and
                  Gordon A. Manson},
  editor       = {Paolo Giorgini and
                  Yves Lesp{\'{e}}rance and
                  Gerd Wagner and
                  Eric S. K. Yu},
  title        = {Using Tropos Methodology to Model an Integrated Health Assessment
                  System},
  booktitle    = {{AOIS} '02, Agent-Oriented Information Systems, Proceedings of the
                  Fourth International Bi-Conference Workshop on Agent-Oriented Information
                  Systems {(AOIS-2002} at CAiSE*02)},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {57},
  publisher    = {CEUR-WS.org},
  year         = {2002},
  url          = {https://ceur-ws.org/Vol-57/id-16.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:53 +0100},
  biburl       = {https://dblp.org/rec/conf/aois/MouratidisGPM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mwcn/LadasAMM02,
  author       = {Charalampos V. Ladas and
                  R. M. E. Amiee and
                  Mehdi Mahdavi and
                  Gordon A. Manson},
  title        = {Class based selective-ARQ scheme for high performance {TCP} and {UDP}
                  over wireless links},
  booktitle    = {Proceedings of The Fourth {IEEE} Conference on Mobile and Wireless
                  Communications Networks, {MWCN} 2002, September 9-11, 2002, Stockholm,
                  Sweden},
  pages        = {311--315},
  publisher    = {{IEEE}},
  year         = {2002},
  url          = {https://doi.org/10.1109/MWCN.2002.1045743},
  doi          = {10.1109/MWCN.2002.1045743},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mwcn/LadasAMM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mwcn/LuoBEM02,
  author       = {R. Luo and
                  Demetrios Belis and
                  R. M. Edwards and
                  Gordon A. Manson},
  title        = {A simulation design for link connection-oriented wireless mesh networks},
  booktitle    = {Proceedings of The Fourth {IEEE} Conference on Mobile and Wireless
                  Communications Networks, {MWCN} 2002, September 9-11, 2002, Stockholm,
                  Sweden},
  pages        = {665--669},
  publisher    = {{IEEE}},
  year         = {2002},
  url          = {https://doi.org/10.1109/MWCN.2002.1045849},
  doi          = {10.1109/MWCN.2002.1045849},
  timestamp    = {Fri, 02 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mwcn/LuoBEM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/MansonSE94,
  author       = {Gordon A. Manson and
                  Shahrin Sahib and
                  Chandran Elamvazuthi},
  title        = {Design and code derivation in the {PCSC} methodology},
  journal      = {Inf. Softw. Technol.},
  volume       = {36},
  number       = {7},
  pages        = {413--417},
  year         = {1994},
  url          = {https://doi.org/10.1016/0950-5849(94)90063-9},
  doi          = {10.1016/0950-5849(94)90063-9},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/infsof/MansonSE94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/RabhiM91,
  author       = {Fethi A. Rabhi and
                  Gordon A. Manson},
  title        = {Experiments with a transputer-based parallel graph reduction machine},
  journal      = {Concurr. Pract. Exp.},
  volume       = {3},
  number       = {4},
  pages        = {413--422},
  year         = {1991},
  url          = {https://doi.org/10.1002/cpe.4330030417},
  doi          = {10.1002/CPE.4330030417},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/RabhiM91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/epodd/CringeanEMW91,
  author       = {Janey K. Cringean and
                  Roger England and
                  Gordon A. Manson and
                  Peter Willett},
  title        = {Nearest-neighbour Searching in Files of Text Signatures Using Transputer
                  Networks},
  journal      = {Electron. Publ.},
  volume       = {4},
  number       = {4},
  pages        = {185--203},
  year         = {1991},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/epodd/CringeanEMW91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipm/CringeanEMW91,
  author       = {Janey K. Cringean and
                  Roger England and
                  Gordon A. Manson and
                  Peter Willett},
  title        = {Network design for the implementation of text searching using a multicomputer},
  journal      = {Inf. Process. Manag.},
  volume       = {27},
  number       = {4},
  pages        = {265--283},
  year         = {1991},
  url          = {https://doi.org/10.1016/0306-4573(91)90084-Y},
  doi          = {10.1016/0306-4573(91)90084-Y},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipm/CringeanEMW91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pc/RabhiM91,
  author       = {Fethi A. Rabhi and
                  Gordon A. Manson},
  title        = {Divide-and-conquer and parallel graph reduction},
  journal      = {Parallel Comput.},
  volume       = {17},
  number       = {2-3},
  pages        = {189--205},
  year         = {1991},
  url          = {https://doi.org/10.1016/S0167-8191(05)80105-X},
  doi          = {10.1016/S0167-8191(05)80105-X},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pc/RabhiM91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigir/CringeanEMW90,
  author       = {Janey K. Cringean and
                  Roger England and
                  Gordon A. Manson and
                  Peter Willett},
  editor       = {Jean{-}Luc Vidick},
  title        = {Parallel Text Searching in Serial Files Using a Processor Farm},
  booktitle    = {SIGIR'90, 13th International Conference on Research and Development
                  in Information Retrieval, Brussels, Belgium, 5-7 September 1990, Proceedings},
  pages        = {429--453},
  publisher    = {{ACM}},
  year         = {1990},
  url          = {https://doi.org/10.1145/96749.98249},
  doi          = {10.1145/96749.98249},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigir/CringeanEMW90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jis/CringeanM0W88,
  author       = {Janey K. Cringean and
                  Gordon A. Manson and
                  Peter Willett and
                  George A. Wilson},
  title        = {Efficiency of text scanning in bibliographic databases using microprocessor-based,
                  multiprocessor networks},
  journal      = {J. Inf. Sci.},
  volume       = {14},
  number       = {6},
  pages        = {335--345},
  year         = {1988},
  url          = {https://doi.org/10.1177/016555158801400604},
  doi          = {10.1177/016555158801400604},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jis/CringeanM0W88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pc/BrintGLWMW88,
  author       = {Andrew T. Brint and
                  Valerie J. Gillet and
                  Michael F. Lynch and
                  Peter Willett and
                  Gordon A. Manson and
                  George A. Wilson},
  title        = {Chemical graph matching using transputer networks},
  journal      = {Parallel Comput.},
  volume       = {8},
  number       = {1-3},
  pages        = {295--300},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-8191(88)90133-0},
  doi          = {10.1016/0167-8191(88)90133-0},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pc/BrintGLWMW88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/BrookesMT86,
  author       = {G. R. Brookes and
                  Gordon A. Manson and
                  Jon A. Thompson},
  title        = {Lattice and ring array topologies using transputers},
  journal      = {Comput. Commun.},
  volume       = {9},
  number       = {3},
  pages        = {121--125},
  year         = {1986},
  url          = {https://doi.org/10.1016/0140-3664(86)90015-0},
  doi          = {10.1016/0140-3664(86)90015-0},
  timestamp    = {Mon, 18 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/BrookesMT86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcisd/GilletWLWBDMT86,
  author       = {Valerie J. Gillet and
                  Stephen M. Welford and
                  Michael F. Lynch and
                  Peter Willett and
                  John M. Barnard and
                  Geoffrey M. Downs and
                  Gordon A. Manson and
                  J. Thompson},
  title        = {Computer storage and retrieval of generic chemical structures in patents.
                  7. Parallel simulation of a relaxation algorithm for chemical substructure
                  search},
  journal      = {J. Chem. Inf. Comput. Sci.},
  volume       = {26},
  number       = {3},
  pages        = {118--126},
  year         = {1986},
  url          = {https://doi.org/10.1021/ci00051a006},
  doi          = {10.1021/CI00051A006},
  timestamp    = {Thu, 14 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcisd/GilletWLWBDMT86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics