Abstract is missing.
- A view of the world of computing as seen at the 1976 National Computer ConferenceStanley Winkler. 1-6 [doi]
- Conference maketh a ready man Or, twenty-five years in the better jointsHerbert R. J. Grosch. 7-13 [doi]
- Computer prehistory and history in central EuropeHeinz Zemanek. 15-20 [doi]
- Early computers in EuropeRichard Williams. 21-29 [doi]
- The U.K. privacy white paper 1975A. S. Douglas. 33-38 [doi]
- Human and organizational implications of computer privacyJerry M. Rosenberg. 39-43 [doi]
- A control systems model of privacyJohn Salasin. 45-51 [doi]
- Computer security: a surveyPeter S. Browne. 53-63 [doi]
- Computer abuse perpetrators and vulnerabilities of computer systemsDonn B. Parker. 65-73 [doi]
- Effective safeguards for computer system integrityNorman R. Nielsen, Brian Ruder, David H. Brandin. 75-84 [doi]
- A centralized approach to computer network securityFrank R. Heinrich, David J. Kaufman. 85-90 [doi]
- Computer network cryptography engineeringHarrison R. Burris. 91-96 [doi]
- The application of cryptography for data base securityEhud Gudes, Harvey S. Koch, Fred A. Stahl. 97-107 [doi]
- Multiuser cryptographic techniquesWhitfield Diffie, Martin E. Hellman. 109-112 [doi]
- Cryptography using modular software elementsHerbert S. Bright, Richard L. Enison. 113-123 [doi]
- Analysis of secret functions with application to computer cryptographyIngemar Ingemarsson. 125-127 [doi]
- A secure, national system for electronic funds transferD. Kaufman, K. Auerbach. 129-138 [doi]
- Design considerations for electronic funds transfer switch system developmentJoseph Mazzetti. 139-146 [doi]
- Are computers ready for the checkless society?Frank Backman. 147-156 [doi]
- PersonwareH. W. Bomzer. 157-160 [doi]
- From data entry supervisor to data entry specialistCarolyn M. Dunning. 161-164 [doi]
- A modern beginning programming courseRoy F. Keller. 165-170 [doi]
- Instructional computer systems for higher educationCharles J. Prenner, Alfred Z. Spector. 171-177 [doi]
- ADP training systems: organization-wide training for increased productivityJack L. Stone, Alexander P. Grant. 179-183 [doi]
- Teaching art through computer graphicsJoseph Scala. 185-189 [doi]
- Artists and computersPatsy Scala. 191-194 [doi]
- The digital component of the circle graphics habitatThomas A. DeFanti. 195-203 [doi]
- Braille grade II translator programMonique Truquet. 205-207 [doi]
- Interfacing computers for the physically handicapped: a review of international approachesGerald A. Raitzer, Gregg C. Vanderheiden, Craig S. Holt. 209-216 [doi]
- The spellex system of speech aids for the blind in computer applicationsChing Y. Suen, Michael P. Beddoes, James C. Swail. 217-220 [doi]
- Development of a hand-held talking calculator for the blindR. E. Savoie, J. S. Brugler, J. C. Bliss. 221-225 [doi]
- Survey of public attitudes toward computers in societyDavid H. Ahl. 227-230 [doi]
- Survey of public access to computingCarol H. Kastner, William G. Underhill. 231-233 [doi]
- Building your own computerStephen B. Gray. 235-239 [doi]
- THREAD (three-dimensional reconstruction and display) with biomedical applications in neuron ultrastructure and computerized tomographyJohn C. Mazziotta, H. K. Huang. 241-250 [doi]
- Regional kidney transplant matching: the RENTRAN interactive approachDavid J. Mishelevich, Peter Stastny, R. Gail Ellis, Susan G. Mize. 251-260 [doi]
- Data base for protein sequencesM. O. Dayhoff, Winona C. Barker, R. M. Schwartz, Bruce C. Orcutt, Lois T. Hunt. 261-266 [doi]
- From text to structured information: automatic processing of medical reportsLynette Hirschman, Ralph Grishman, Naomi Sager. 267-275 [doi]
- Design considerations of a database system in a clinical network environmentShi-Kuo Chang, M. O Brien, J. Read, R. Borovec, W.-H. Cheng, Jyh-Sheng Ke. 277-286 [doi]
- Correct problem statements in biomedical data processingN. I. Moiseeva, M. Yu. Simonov, V. M. Sysuev. 287-294 [doi]
- An adaptable, modular data - collection system suitable for scientific experimentation: analog to digital transformation, short - term digital storage, formatted digital tape - recording, and computer entry of experimental dataHarold H. Shlevin. 295-300 [doi]
- Classification of personal information for privacy protection purposesRein Turn. 301-307 [doi]
- Philadelphia justice information systemIrving J. Chasen. 309-314 [doi]
- Computers in architectureGenevieve Greenwald-Katz. 315-320 [doi]
- Prospective capabilities in hardwareMargaret K. Butler. 323-336 [doi]
- An evaluation of the East German RYAD 1040 systemRobert A. Koenig. 337-340 [doi]
- MagicScore bowling scorer: a microprocessor application for fun and profitReg A. Kaenel. 341-347 [doi]
- QLISP: a language for the interactive development of complex systemsEarl D. Sacerdoti, Richard E. Fikes, René Reboh, Daniel Sagalowicz, Richard J. Waldinger, B. Michael Wilber. 349-356 [doi]
- User interface design issues for a large interactive systemRichard William Watson. 357-364 [doi]
- Terminal transparent display language (TTDL)Carl E. Krebs, C. Bumgardner, T. Northwood. 365-371 [doi]
- Working set restoration: a method to increase the performance of multilevel storage hierarchiesPeter Schneider. 373-380 [doi]
- Performance and power dissipation analysis for CCD memory systemsS. L. Rege. 381-391 [doi]
- Intelligent memoryMurray Edelberg, L. Robert Schissler. 393-400 [doi]
- Approaches to computer reliability: then and nowAlgirdas Avizienis. 401-411 [doi]
- Failure-tolerant parallel programming and its supporting system architectureK. H. (Kane) Kim, C. V. Ramamoorthy. 413-423 [doi]
- Strategic planning for MIS: a conceptual frameworkEphraim R. McLean, John V. Soden. 425-432 [doi]
- The economics of software quality assuranceDavid S. Alberts. 433-442 [doi]
- Implementation of quality control in software developmentFrank Tsui, Lew Priven. 443-449 [doi]
- A computer performance prediction modelRobert W. Otto, Mark Auerbach. 451-455 [doi]
- A queueing network model for the effect of data compression on system efficiencyAlan Jay Smith. 457-465 [doi]
- The federal communications commission and major policy matters affecting computer communicationFrank J. Martin Jr.. 467-476 [doi]
- A new communication protocol for accessing data networks: the international packet-mode interfaceA. Rybczynski, B. Wessler, R. Despres, J. Wedlake. 477-482 [doi]
- Virtual circuits vs. datagrams: technical and political problemsLouis Pouzin. 483-494 [doi]
- Network access techniques: a reviewRobert Rosenthal. 495-500 [doi]
- The RAND intelligent terminal agent (RITA) as a network access aidRobert H. Anderson, James J. Gillogly. 501-509 [doi]
- Network interface systems: an evaluation by simulationJoe B. Wyatt, Vincent I. Polley. 511-521 [doi]
- An overview of the distributed computer networkDavid L. Mills. 523-531 [doi]
- A network-oriented multiprocessor front-end handling many hosts and hundreds of terminalsW. F. Mann, S. M. Ornstein, M. F. Kraley. 533-540 [doi]
- Design issues for mixed media packet switching networksD. Huynh, H. Kobayashi, F. F. Kuo. 541-549 [doi]
- A perspective on network operating systemsStephen R. Kimbleton, Richard L. Mandell. 551-559 [doi]
- A high-level framework for network-based resource sharingJames E. White. 561-570 [doi]
- Factors in interprocess communication protocol efficiency for computer networksCarl A. Sunshine. 571-576 [doi]
- Performance of file directory systems for data bases in star and distributed networksWesley W. Chu. 577-587 [doi]
- On measurement facilities in packet radio systemsFouad A. Tobagi, Stanley E. Lieberson, Leonard Kleinrock. 589-596 [doi]
- Monitoring and access control of the London node of ARPANETAdrian V. Stokes, David L. Bates, Peter T. Kirstein. 597-603 [doi]
- Office automation project: a research perspectiveHoward Lee Morgan. 605-610 [doi]
- Evaluating the impact of office automation on top management communicationJames H. Carlisle. 611-616 [doi]
- The evolving market for word processing and typesetting systemsJ. Christopher Burns. 617-623 [doi]
- The computer as a tool in the processing of text for periodical publicationsWilliam J. Hammond. 625-626 [doi]
- The integration of microfilm and the computerDennis R. Neary, Terrence H. Coyle, Don M. Avedon. 627-637 [doi]
- The AIDUS system: automated capture, update and republication of maintenance manualsArnold K. Griffith. 639-642 [doi]
- The CMU RT-CAD system: an innovative approach to computer aided designDaniel P. Siewiorek, Mario Barbacci. 643-655 [doi]
- Some computer-related advancements for enhancing U. S. shipyard productivityRichard B. Wise, Douglas J. Martin. 657-669 [doi]
- Computer analysis and evaluation of marine structuresDonald Liu, Matias E. Wojnarowski. 671-682 [doi]
- Evolution of automation in terminal air traffic controlHoward R. McGlauflin. 683-688 [doi]
- Computer graphics in an automatic aircraft landing systemE. H. Reitan, S. H. Saib. 689-700 [doi]
- Libraries and the implications of computer technologyMurray Turoff, Marion Spector. 701-707 [doi]
- The expanding role of on-line interactive searchingVivian S. Sessions. 709-712 [doi]
- Developing application oriented computer architectures on general purpose microprogrammable machinesTomlinson Gene Rauscher, Ashok K. Agrawala. 715-722 [doi]
- A pipeline polish string computerGerard G. Baille, Jean P. Schoellkopf. 723-731 [doi]
- Evolution of computer memory structureYaohan Chu. 733-748 [doi]
- Cache system design in the tightly coupled multiprocessor systemC. K. Tang. 749-753 [doi]
- Coupling small computers for performance enhancementFernando C. Colon, Robert M. Glorioso, Walter H. Kohler, Dominic W. Li. 755-764 [doi]
- The CERF computer systemNeil Wilhelm, David Pessel, Charles Merriam. 765-768 [doi]
- A parallel processor for evaluation studiesGary J. Nutt. 769-775 [doi]
- Asynchronous speed-independent arbiter in a form of a hardware control moduleH. Sechovsky, S. Jura. 777-782 [doi]
- Log-sum multiplierJ. P. Agrawal, V. U. Reddy. 783-787 [doi]
- Distributed information systemsGrayce M. Booth. 789-794 [doi]
- Error detection in data base systemsMichael Hammer. 795-801 [doi]
- A framework for federal health data collectionN. Phillip Ross, Meyer Katzper. 803-810 [doi]
- Data base processor technologyDonald R. Anderson. 811-818 [doi]
- Integrity aspects of a shared data baseEduardo B. Fernández, Rita C. Summers. 819-827 [doi]
- Designing optimal data structuresLarry Clough, William D. Haseman, Yuk Ho So. 829-837 [doi]
- REGIS: a relational information system with graphics and statisticsJohn D. Joyce, N. N. Oliver. 839-844 [doi]
- Query-by-example: operations on hierarchical data basesMoshé M. Zloof. 845-853 [doi]
- A virtual memory system for a relational associative processorStewart A. Schuster, Esen A. Ozkarahan, Kenneth C. Smith. 855-862 [doi]
- Managing the census data base: data description, acquisition, and manipulationJay-Louise Weldon. 863-867 [doi]
- Defining management s information needsTrevor John Bentley. 869-876 [doi]
- Managerial response to an information systemRoy H. Igersheim. 877-882 [doi]
- Transaction queuing and cylinder logic access in the Time, Inc. magazine/book/record systemCarl R. Gerami, T. Russell Shields, Richard J. Weiland. 883-888 [doi]
- Generalized software for translating dataEdward W. Birss, James P. Fry. 889-897 [doi]
- Experiments with a symbolic evaluation systemWilliam E. Howden. 899-908 [doi]
- Some experience with DAVE: a Fortran program analyzerLeon J. Osterweil, Lloyd D. Fosdick. 909-915 [doi]
- A dynamic (FORTRAN) programming systemJulius A. Archibald Jr.. 917-925 [doi]
- GPMX: a portable general purpose macro processor adapted for preprocessing FORTRANRobert C. Gammill. 927-933 [doi]
- An experiment comparing Fortran programming times with the software physics hypothesisR. D. Gordon, Maurice H. Halstead. 935-937 [doi]
- Representations of networksHarvey J. Greenberg, James E. Kalan. 939-943 [doi]
- A practitioner s guide to the state of large scale network and network-related problemsFred Glover, Darwin Klingman. 945-950 [doi]
- Low-cost residue number systems for computer arithmeticBehrooz Parhami. 951-956 [doi]
- Very fast computation of polynomial remainder sequence coefficient signsJames R. Pinkert. 957-961 [doi]
- System theoretic implications of numerical methods applied to the solution of ordinary differential equationsT. G. Windeknecht, H. D angelo. 963-972 [doi]
- Memory conserving efficient methods for solving large sets of stiff differential equationsGruia-Catalin Roman, David Garfinkel, Carl B. Marbach. 973-978 [doi]
- A geometric analysis of heuristic searchGordon J. Vanderbrug. 979-986 [doi]
- Another algorithm for reducing bandwidth and profile of a sparse matrixW. F. Smyth, Ilona Arany. 987-994 [doi]
- Business opportunity analysisJohn P. Dolan, James S. Ketchel. 995-998 [doi]
- A unique number generatorArmen Nahapetian. 999-1000 [doi]
- An on-line test program for peripheral devicesAkira Taneda, Hikaru Oku, Daiji Namba. 1001-1006 [doi]
- Structure of the ELF operating systemDavid L. Retz, Bruce W. Schafer. 1007-1016 [doi]
- Elements of a planning and modeling systemThomas H. Naylor. 1017-1026 [doi]
- Analysis of natural language discourseSally Yeates Sedelow. 1027-1034 [doi]
- Computer animated film systems: a rat s nest of trade-offsBruce Cornwell, Katharine Cornwell. 1035-1038 [doi]
- Speakeasy: a window into a computerStan Cohen. 1039-1047 [doi]
- A case study of a young child doing turtle graphics in LOGOCynthia J. Solomon, Seymour Papert. 1049-1056 [doi]
- Feature selection for binary data: medical diagnosis with fuzzy setsJames C. Bezdek. 1057-1068 [doi]
- Procedural representation in a fuzzy problem-solving systemRichard A. LeFaivre. 1069-1074 [doi]
- Subjective bayesian methods for rule-based inference systemsRichard O. Duda, Peter E. Hart, Nils J. Nilsson. 1075-1082 [doi]