Abstract is missing.
- Semantic attributes and improvement of generated codeD. Neel, M. Amirchahy. 1-10 [doi]
- Rounding error in evaluating continued fraction expansionsWilliam B. Jones, W. J. Thron. 11-18 [doi]
- Structure of a direct-execution high-level Chinese programming language processorYaohan Chu. 19-27 [doi]
- Heuristic programmers and their gambling machinesNicholas V. Findler, Heinz Klein, R. Channing Johnson, Alexander Kowal, Zachary Levine, John Menig. 28-37 [doi]
- Optimal scheduling of independent tasks on heterogeneous computing systemsJane W.-S. Liu, Ai-Tsung Yang. 38-45 [doi]
- Interpolating numerical solutions of ordinary differential equationsM. K. Gordon, Lawrence F. Shampine. 46-53 [doi]
- Cost evaluation of storage schemesJair M. Babad, V. Balachandran, Edward A. Stohr. 54-60 [doi]
- Human factors design criteria in man-computer interactionCharles J. Testa, Douglas B. Dearie. 61-65 [doi]
- Scheduling in systems with two scarce resourcesEdward D. Lazowska, Kenneth C. Sevcik. 66-73 [doi]
- Assisting network users with a network access machineRobert P. Blanc. 74-78 [doi]
- Semantic preprocessingPaul B. Schneck. 79-81 [doi]
- Automatic nested dissectionDonald J. Rose, Gregory F. Whitten. 82-88 [doi]
- An excellent mixture for PSI: Computer science, PLATO, knowledge levelsKenneth L. Modesitt. 89-94 [doi]
- Compile time type determination in SETLAaron M. Tenenbaum. 95-100 [doi]
- An overview of a multi associative processor studyGary J. Nutt. 101-104 [doi]
- The algebraic solution of large sparse systems of linear equations using REDUCE 2Martin L. Griss. 105-111 [doi]
- Mechanical construction of type-checking predicates for extensible data typesClifford R. Hollander. 112-115 [doi]
- The bureau of labor statistic's Table Producing Language (TPL)Rudolph C. Mendelssohn. 116-122 [doi]
- Goals and plans in a program for playing GoWalter Reitman, James Kerwin, Robert Nado, Judith Reitman, Bruce Wilcox. 123-127 [doi]
- The variable cell length listprocessor VARLISTDorothea A. Klip. 128-132 [doi]
- An approach to optimal partitioning of hypergraphsGiuseppe Alia, Piero Maestrini. 133-139 [doi]
- An extrapolation step-size monitor for solving ordinary differential equationsNorman L. Schryer. 140-148 [doi]
- Computational requirements for control of the Utah armS. C. Jacobsen, R. B. Jerard. 149-155 [doi]
- Avoiding deadlock in distributed data basesW. W. Chu, G. Ohlmacher. 156-160 [doi]
- Scheduling independent processors with different storage capacitiesDennis G. Kafura, V. Y. Shen. 161-166 [doi]
- SYNVER: A system for the automatic synthesis and verification of synchronization processesPatricia Griffiths. 167-173 [doi]
- A model highlighting the security of operating systemsRichard W. Conn, Richard H. Yamamoto. 174-179 [doi]
- Access control in a relational data base management system by query modificationMichael Stonebraker, Eugene Wong. 180-186 [doi]
- Skeleton planning spaces for non-numeric heuristic optimizationLaurent Siklóssy, M. A. Haecker. 187-192 [doi]
- A method to expose the hidden structure of Fortran programsLoren P. Meissner. 193-198 [doi]
- A Classroom Information System for teachers; with focus on the instructional data collection and analysisTakahiro Sato. 199-206 [doi]
- Experimental validation of a structural property of Fortran algorithmsNecdet Bulut, Maurice H. Halstead, Rudolf Bayer. 207-211 [doi]
- An interactive system for page layout designPeter B. Denes, Ira K. Gershkoff. 212-221 [doi]
- Design of transaction-oriented systems employing a transaction monitorR. A. Davenport. 222-230 [doi]
- An automatic telephone directory inquiry service systemYeh-Hao Chin, Jun-Wun Jou, W.-H. Peng, Chen-Chau Yang. 231-238 [doi]
- An on-line interactive audiographic learning systemT. C. Ting, A. P. Jensen. 239-244 [doi]
- Touch-Tone input techniques: Data entry using a constrained keyboardEdouard J. Desautels, Stuart B. Soffer. 245-253 [doi]
- A methodology for machine language decompilationBarron C. Housel, Maurice H. Halstead. 254-260 [doi]
- Some computer system implications of magnetic bubble memoriesJ. Egil Juliussen. 261-264 [doi]
- The application of a symbolic mathematical system to program verificationRalph L. London, David R. Musser. 265-273 [doi]
- Language directed computer performance evaluationDavid B. Wortman. 274-278 [doi]
- Requirements statement language principles for automatic programmingThomas I. M. Ho. 279-288 [doi]
- Sets and graphs in GRAALVictor R. Basili. 289-296 [doi]
- An integration of two language understanding methodologiesPhilip R. Cohen. 297-305 [doi]
- Deadlock prevention in message switched networksRobert C. Chen. 306-310 [doi]
- A procedural approach to pattern matching in SNOBOL4Frederick C. Druseikis, John N. Doyle. 311-317 [doi]
- Impact analysisJames S. Ketchel, John P. Dolan. 318-325 [doi]
- Dynamic algebraRobert E. Noonan. 326-334 [doi]
- Use of an amputee-computer interactive facility in above-knee prosthesis researchWoodie C. Flowers. 335-339 [doi]
- The scheduling of multiple disk drivesRichard R. Reisman. 340-346 [doi]
- Design Automation in a computer science curriculumJ. G. Linders, W. M. vanCleemput. 347-353 [doi]
- Sensorimotor learning in a simulated physical environmentRobert P. Plummer. 354-357 [doi]
- The design of a topology information maintenance scheme for a distributed computer networkWilliam D. Tajibnapis. 358-364 [doi]
- Design automation at Southern Methodist UniversityRobert J. Smith. 365-367 [doi]
- Handprint recognition on the GRAFIX I: : A commercial application of heuristic programmingArnold K. Griffith. 368-372 [doi]
- Control of design data in the integrated ship design systemPeter R. Bono. 373-379 [doi]