Abstract is missing.
- The FHDL PLA toolsPeter M. Maurer, Craig D. Morency. 3-9 [doi]
- The FHDL macro processorPeter M. Maurer. 10-17 [doi]
- The FHDL ROM toolsPeter M. Maurer, Craig D. Morency. 18-24 [doi]
- GSPM models: sensitivity analysis and applicationsJogesh K. Muppala, Kishor S. Trivedi. 25-33 [doi]
- The first class of think time oriented CPU scheduling algorithmsRobert A. Allen. 34-39 [doi]
- Using the stuck-at fault model: how well does it work?A. A. Fennisi, Douglas S. Reeves. 40-46 [doi]
- AGENT: active logical objectsKrys Kochut. 47-53 [doi]
- Generation of graphical representations from Ada source codeJames H. Cross II, Kelly I. Morrison, Charles H. May Jr.. 54-62 [doi]
- Programming languages, OOP, and C++Roger E. Lessman. 63-69 [doi]
- Computer science: a philosophical primerGerald J. Johnson. 70-72 [doi]
- Some suggestions for implementing closed laboratories in CS1Ken R. Little. 73-79 [doi]
- Integration of a workstation laboratory into a computer science curriculumWilliam A. Ward Jr.. 80-88 [doi]
- Elements of a senior design projects courseStephen M. Jodis, Paul A. D. de Maine. 89-94 [doi]
- The development of a modula-2 validation suiteK. N. King, David A. Crick. 95-100 [doi]
- The role of literate programming in the software engineering life-cycleMarcus Brown, David Cordes. 101-107 [doi]
- Debugging program design documents: graphics vs text-based methodologiesF. Layne Wallace, Judy Solano. 108-110 [doi]
- A context sensitive tabular parsing algorithmFrank Hadlock. 111-117 [doi]
- A localized condition handling construct for a graphical dataflow languageDavid D. Langan. 118-124 [doi]
- The C preprocessor and Jensen s deviceDavid W. Boyd. 125-129 [doi]
- Handling uncertainty and exceptions with defeasible dependenciesW. D. Potter, A. D. Wright, A. M. Morton, W. C. Kessler. 130-136 [doi]
- Referential integrity: semantic glue for relational databaseYap Siong Chua, Behrooz K. Seyed-Abbassi. 137-142 [doi]
- Genetic algorithm solutions for the traveling salesman problemD Ann Fuquay, L. Darrell Whitley. 143-150 [doi]
- Three approaches to design fault tolerant programmable logic arraysSami A. Al-Arian, Hari P. Kunamneni. 151-158 [doi]
- Exploiting non-inherent parallelism in an internal mergesortSusan R. Wallace. 159-164 [doi]
- A parallel algorithmfor Steiner systemsRoger Eggen, Maurice Eggen. 165-168 [doi]
- Experiences vectorizing software for elliptic partial differential equationsW. A. Wand Jr., Y. Li. 169 [doi]
- Improving workplace literacy in Alabama-proposal for a telecommunications networkChetan S. Sankar, Charles Snyder, Paramjit Kahai. 181 [doi]
- Identifying students who may experience difficulty in an introductory computer science courseTed W. Goodman. 182 [doi]
- Delphi study of systems analysisClark B. Archer. 183 [doi]
- Improving the performance of the BDB system by changing the query processing temporary file structuresRobert P. Trueblood, Pao-Ing Lai. 184 [doi]
- Compromises and complexities associated with removal of MIS from the logical access authorization loopHarlan D. Webre. 185 [doi]
- A limited survey of the effects of single parametric variation on the GENEtic search implementation system (GENESIS) packageChito N. Lapena, Walter D. Potter. 186 [doi]
- Effect of grain size on the performance of systolic arrayRavi Varadaragan, Bhavai Ravichandran. 187 [doi]
- Incorporating software quality requirements into a development methodology for knowledge-based systemsR. T. Plant. 188 [doi]
- Systematic program development and proof: Dromey s method versus top-down refinementJames C. Pleasant. 189 [doi]
- A metric for the effectiveness of graphical language presentation in terms of competencyJohn W. Olson, Herbert E. Longenecker Jr.. 190 [doi]
- Statistical indices for software quality estimationAmos O. Olagunju, J. Turner, D. Richey, R. Jackson, S. Hanley, A. Williams, R. Howard. 191 [doi]
- Predicting execution time of real-time programs on contemporary machinesMarion G. Harmon. 192 [doi]
- Multiprocessor computer system for distributing real-time Ada applicationsGary Croucher. 193 [doi]
- A data exchange paradigm for microprocessor-based groupware applicationsMark Pendergast. 194 [doi]
- The inclusion of data frames illustrating data flow in control structure charts for novice studentsMichael V. Doran, Herbert E. Longenecker Jr.. 195 [doi]
- Condition handlers for dataflow proceduresDavid D. Langan. 196 [doi]
- An investigation of a 3-Poisson model as a basis for automatic index term selectionAmos O. Olagunju. 197 [doi]
- A knowledge-based approach to real-time systemsRagae Ghaly, Nagarajan Prabhakaran. 198 [doi]
- An object-oriented representation of semantic and graphic interrelationshipsJay Mookherje, Nagarajan Prabhakaran. 199 [doi]
- An analysis of Ill-formed input in natural language queriesCharlene W. Young, Caroline M. Eastman, Robert L. Oakman. 200 [doi]
- Experiments in natural language processingS. J. Murrell, R. T. Plant. 201 [doi]
- A double step algorithm for rendering parabolic curvesEuisuk Park, Larry F. Hodges. 202 [doi]
- On the maximum stable set of a permutation graphHaklin Kim. 203 [doi]
- Design of a simulation interface for a parallel computing environmentHira N. Narang, Ray E. Flanery Jr., John B. Drake. 204 [doi]
- An intermediate language for vector processorsAbbas S. Youssefi, D. E. Stevenson. 205 [doi]
- Towards the implementation of intelligent structures in intensive care monitoring: the advantages of the symbolic pre-processingVicente Moret-Bonillo, Amparo Alonso-Betanzos, John R. Searle. 206 [doi]
- A model for studying the spread of computer virusesJames K. Harris, Robert P. Trueblood. 207 [doi]
- Intelligent tutoring systems for teaching algebra: the handling of student misconceptionsKimberly D. Bozeman. 208 [doi]
- On the feasibility of automatically generating data flow diagrams from AdaKelly I. Morrison. 210 [doi]
- Optimizing the design of a hydrostatic thrust bearing by applying genetic algorithmsKoushik Banerjee. 211 [doi]
- Developing a modular image processing system under UNIXSteven A. Cover. 212 [doi]
- An approach to a methodology which is easy to use and application domain independentSeok-Joong Yoon. 213 [doi]
- Visualization of accident dataDonna Partridge, Raymond Erdey, Dennis Weldy. 214 [doi]
- Finding parents in a heapFred Heller. 217-222 [doi]
- The mirage problem in digital halftone resolutionVenkateshwar E. Rao. 223-233 [doi]
- Partition algorithms for the doubly linked listJohn M. Boyer. 234 [doi]
- Improving the Smalltalk Browser: a case study in Smalltalk developmentJeffrey L. Hieb. 242-247 [doi]
- An overview of parallel processing languagesSteve Bailey. 248-255 [doi]
- Investigation of a gambling approach to the subjective entropy testJoel B. Davis. 256-260 [doi]
- A distributed algorithm for generation of the Kth best spanning treeAmbresh Khanna. 261-266 [doi]
- A special purpose finite element architectureJeff Battelini, Sridhar Isukapalli. 267-273 [doi]
- Approaches to solving synchronization problems in parallel simulation of an apparel plantPrashant K. Khambekar, Satish K. Dharmaraj. 274-281 [doi]
- A neural network for sonar target recognitionMichael O Rourke, John Wood. 282-287 [doi]
- Speech through myoelectric signal recognition SMyLESDonna Partridge, Calvin Lee, Tod Pinniger, Warren Ogle. 288-295 [doi]
- Strategies for deductive databasesAli Keskin. 296-305 [doi]
- Computerizing a machine readable dictionaryJan G. Wilms. 306-313 [doi]
- Disk scheduling with future knowledgeDarrell Suggs. 314-318 [doi]
- A user interface system for automated guided vehiclesKrishnamachari Devarajan. 319-328 [doi]
- The design and implementation of the network backup control languageJohn C. Orthoefer. 329-332 [doi]
- Runtime debuggers for parallel and distributed systems: a uniform design approachManojit Sarkar. 333-336 [doi]
- The design of a private key cryptosystemMilo Januska. 337-340 [doi]
- Understanding chaosEric T. Bax. 341 [doi]