Abstract is missing.
- Pass the car in front of you: a simulation of cognitive processes for understandingTeiji Furugori. 380-386 [doi]
- SPOT: a structured system development systemTateyuki Shimomura, Osamu Shigo, Touru Maejima. 387-394 [doi]
- Software debugging: the virtual machine approachS. W. Galley, Robert P. Goldberg. 395-401 [doi]
- A computer architecture for highly parallel signal processingJack B. Dennis, David P. Misunas. 402-409 [doi]
- Useful applications of international event analysisCharles A. McClelland. 410-415 [doi]
- Visible semantics for programming languagesJoseph Wilson Thomas, Elliott I. Organick. 416-421 [doi]
- Curriculum on design automation at the University of Southern CaliforniaMelvin A. Breuer. 422-425 [doi]
- Automatic content coding of English textPeter G. Tripodes, Sherman Greenstein, Peter Dolan, Maria Bodnaras, Gerald H. Shure. 426-427 [doi]
- The value of incremental information in an interactive group estimation taskN. Dalkey. 435-438 [doi]
- Modes of information presentation for the blind programmerM. A. Rahimi, John B. Eulenberg. 439-442 [doi]
- Language considerations for information management systemsD. T. Chai. 443-450 [doi]
- User-transparent automatic terminal speed selectionEdwin F. Hart. 451-457 [doi]
- Simulation of the hypothesis generation processDonald Gerwin. 458-464 [doi]
- HQL: a set-oriented transaction language for hierarchically-structured data basesPaul L. Fehder. 465-472 [doi]
- Data base design using a CODASYL systemRobert M. Curtice. 473-480 [doi]
- The foreign policy decision-maker simulationGeorge J. Nozicka, G. Matthew Bonham, Michael J. Shapiro. 481-490 [doi]
- Heuristic real time feature extraction of the electroencephalogram (EEG)Alan S. Gevins, Charles L. Yeager, Stephen L. Diamond. 491-497 [doi]
- A host computer system for software developmentPhilip N. Gray. 498-500 [doi]
- The efficient, scale-invariant determination of starting step sizes for high-order integratorsDavid C. Williams. 501-508 [doi]
- Communication and control in a cluster networkGregory L. Chesson. 509-514 [doi]
- Design approaches to adaptive control systems for arm prosthesesJohn Lyman. 515-519 [doi]
- A study of response times under various deadlock algorithms and job schedulersStephen W. Sherman, John H. Howard Jr., James C. Browne. 520-525 [doi]
- Language constructs for message handling in decentralized programsElaine P. Gord, Marsha D. Hopwood, Lawrence A. Rowe. 526-530 [doi]
- CONNECT: a user-oriented communications serviceDonald R. Oestreicher, John F. Heafner, Jeffrey G. Rothenberg. 531-538 [doi]
- Worst-case costs for dynamic data element security decisionsFranklin G. Woodward, Lance J. Hoffman. 539-544 [doi]
- A proposed non-procedural programming language for structured system developmentDavid M. Sherr. 545-553 [doi]
- Use of computerized symbolic integration in finite element developmentC. M. Andersen. 554-562 [doi]
- A computer-based system for input, storage, and photocomposition of graphical dataNick A. Farmer, Joseph C. Schehr. 563-570 [doi]
- SOPHIE: a pragmatic use of artificial intelligence in CAIJohn Seely Brown, Richard R. Burton. 571-579 [doi]
- CHECKR: an efficient table-driven facility for input record data validationSteve R. White, J. Gerry Purdy. 580-584 [doi]
- Symbolic computation in nonlinear plasma interactionsJohn Kulp. 585-594 [doi]
- A mini-computer network for support of real time researchWilliam J. Lennon. 595-604 [doi]
- A "graphics window" to a data base for electronic system designCharles Alaimo. 605-611 [doi]
- A look at characterizing the design of information systemsN. P. Edwards, H. Tellier. 612-621 [doi]
- Hierarchies and relations among data typesGiorgio P. Ingargiola. 622-634 [doi]
- Towards a definition of structured programmingCarlos José Pereira de Lucena, Daniel M. Berry. 635-640 [doi]
- Data base system objectives as design constraintsMary E. Snuggs, Gerald J. Popek, Ronald J. Peterson. 641-647 [doi]
- Synthesis of a software security systemEdmund L. Burke. 648-658 [doi]
- On the need for a scientific programming languagePeter M. Neely. 659-665 [doi]
- Encapsulation: an approach to operating system securityRichard L. Bisbey II, Gerald J. Popek. 666-675 [doi]
- A programming aid for structured programmersDouglas E. Jones. 676-681 [doi]
- A display-optimized processorJohn Staudhammer, Jeffrey F. Eastman. 682-687 [doi]
- Myoelectric signal processing for control of prosthetic devicesDonald R. Taylor Jr., F. Ray Finley. 688-695 [doi]
- The multi-state information system: frontend processing and data securityWilliam A. Zeitz, Bruce Fairman, Baila Zeitz. 696-704 [doi]
- The computer analysis of chest radiographsP. P. Tsiang, Charles A. Harlow, G. S. Lodwick. 705-714 [doi]
- A generalized data acquisition system for minicomputersP. Arnold, J. A. Howell. 715-721 [doi]
- A mode analyzing algebraic manipulation programAnthony C. Hearn. 722-724 [doi]
- Dynamic memory allocation systems for minimizing internal fragmentationTed G. Lewis, Brian J. Smith, Marilyn Z. Smith. 725-728 [doi]
- Data entry, future tenseEvelyn McDonald. 729 [doi]
- Remote data entryHoward G. Merowit. 730 [doi]
- Data base machines used as rear-end processorsM. L. O'Connell. 731 [doi]
- High level aids for data management systems performanceAlfonso F. Cardenas. 732 [doi]
- Tuning the IMS data base management systemW. P. Grafton. 733-734 [doi]
- When are pointer arrays better than chainsRobert W. Taylor. 735 [doi]
- On the selection of secondary indexesVincent Y. Lum. 736 [doi]
- Artificial intelligence research in medicineElliott Levinthal. 737 [doi]
- Inference of molecular structureB. Buchanan. 738 [doi]
- Medical modeling and decision makingCasimir A. Kulikowski. 738 [doi]
- A rule-based computer program for advising physicians regarding antimicrobial therapy selectionEdward H. Shortliffe. 739 [doi]
- SUMEX: a resource for applications of artificial intelligence in medicineJoshua Lederberg, Edward A. Feigenbaum, Elliott Levinthal, Thomas C. Rindfleisch. 740 [doi]
- Social evaluation of computer-based conferencing: some methods and resultsRobert Johansen. 741-742 [doi]
- Computer based conferencing: a progress reportM. Granger Morgan. 741 [doi]
- Future applications of computerized conferencingMurray Turoff. 741 [doi]
- Results from a program of computer conference experiments: statistical observations of user behavior under the FORUM systemJacque Vallee. 741 [doi]
- Psychological factors in information system designAnthony I. Wasserman. 743 [doi]
- User needs and the design of user-oriented systemsRichard Venezky, Nathan Relles. 744 [doi]
- When are pivotal interchanges not necessary?William Kahan. 745 [doi]
- Error estimation and control in O.D.E. integrationC. William Gear. 746 [doi]
- Recent developments with implicit Runge-Kutta algorithmsDale G. Bettis. 746 [doi]
- A recent approach to the study of algorithmsStuart H. Zweben. 747-748 [doi]
- Analysis of algorithms implemented in software and hardwareDaniel L. Ostapko. 749 [doi]
- Computational workLeo Hellerman. 749 [doi]
- Inverse compilation feasibilityFrank L. Friedman. 750 [doi]
- A syntax-directed approach to inverse compilationClifford R. Hollander. 750 [doi]
- Inverse compiling for program documentationGregory L. Hopwood. 751 [doi]
- On inverse translation of machine languageBarron C. Housel. 752 [doi]
- A pragmatic look at decompilersMaria F. Weller. 753 [doi]