Queen's University
School of Computing

Technical Report List (part K)

NOTE: Please read this copyright notice before viewing or retrieving files. This file describes authors whose names begin with K. Click on an author's name to find reports by that author.

Electronic copies of some reports are available in Adobe PDF and Postscript formats; click the appropriate link to download for display. Some postscript files may not display properly at your site, especially if they contain embedded font file descriptions.

Kam, Ben:

2008-550 available in PDF (630.289 Kbytes) and Postscript (22.127 Mbytes)
"Web Applications Testing", by Ben Kam, October 2008. 57 pages.

Karababa, Maria:

1987-204
"SGML-Based Markup for Literary Texts: Two Problems and Some Solutions", by David Barnard, Ron Hayer, Maria Karababa, George Logan and John McFadden. 18 pages.

Karaman, Ayse:

2004-483 available in PDF (289.079 Kbytes) and Postscript (1.472 Mbytes)
"Core-Selection Algorithms in Multicast Routing", by Ayse Karaman and Hossam Hassanein, May 2004. 30 pages.
2004-482 available in PDF (695.548 Kbytes) and Postscript (2.243 Mbytes)
"Extended Core-Based Framework for Delay-Constrained Group Communication", by Ayse Karaman and Hossam Hassanein, April 2004. 34 pages.
2004-481 available in PDF (251.339 Kbytes) and Postscript (889.557 Kbytes)
"Multi-Constrained Core Selection for Group Communications", by Ayse Karaman and Hossam Hassanein, April 2004. 7 pages.

Karimi, E.:

1997-414 available in PDF (326.577 Kbytes) and Postscript (1.175 Mbytes)
"An analytic model for ATM network performance and its application to BSP", by E. Karimi and D. B. Skillicorn, December 1997.

Kearney,:

1993-356
"", by Hayward, Kearney and H. Meijer.

Keila, P.S.:

2005-498 available in PDF (496.192 Kbytes) and Postscript (1.362 Mbytes)
"Detecting Unusual and Deceptive Communication in Email", by P.S. Keila and D.B. Skillicorn, June 2005. 12 pages.

Khan, Muhammad Umair Ahmed:

2009-562 available in PDF (156.348 Kbytes) and Postscript (107.947 Mbytes)
"A Survey on Requirements and Design Methods for Secure Software Development", by Muhammad Umair Ahmed Khan and Mohammad Zulkernine, August 2009. 26 pages.

Knight., Scott:

1997-405 available in PDF (258.453 Kbytes) and Postscript (396.401 Kbytes)
"Towards an Action-Based Logic of Causality, Knowledge, Permission and Obligation.", by Glenn MacEwen, Xiao Jun Chen and Scott Knight., May 1997. 35 pages.

Krantz, E.:

1987-203
"Holographic Imaging of S.E.M. Data", by J. Kulick, M.D. Ball, S.A. Benton, C. Gallerneault, E. Krantz, L. Wilson and S. Whitmarsh. 5 pages.

Kulick, Jeff:

1987-203
"Holographic Imaging of S.E.M. Data", by J. Kulick, M.D. Ball, S.A. Benton, C. Gallerneault, E. Krantz, L. Wilson and S. Whitmarsh. 5 pages.
1977-45
"Automatic Analysis of Local Tissue Textures in Intercostal Spaces of Chest Roentgenograms", by J.H. Kulick, January 1977. 9 pages. Published jointly as: Technical Note 21, Image Processing Laboratory with T.W. Challis, et al.
1976-42
"An Image Processing Laboratory for Automated Screening of Chest X-rays", by J.H. Kulick, April 1976. 46 pages.
1974-30
"A Distributed-Processor Computer Graphics System", by J.H. Kulick, October 1974. 35 pages.

Kwan, Po:

1988-220
"Evaluation Standards for Safety Critical Software", by D. Parnas, A. John van Schouewen and Po Kwan, May 1988. 25 pages. Kwan is from AECB.