Abstract is missing.
- Data base administration: classical pattern, some experiences and trendsJean-Paul De Blasis, Thomas H. Johnson. 1-7 [doi]
- Data dictionary: more on the impossible dreamMichael Ehrensberger. 9-11 [doi]
- Fault tree analysis of computer systemsC. V. Ramamoorthy, Gary S. Ho, Yih-Wu Han. 13-17 [doi]
- An overview of fault-tolerant digital system architectureStephen Y. H. Su, Richard J. Spillman. 19-26 [doi]
- The use of passwords for controlling access to remote computer systems and servicesHelen M. Wood. 27-33 [doi]
- A microprocessor selective encryption terminal for privacy protectionJohn H. Carson, John K. Summers, James S. Welch Jr.. 35-38 [doi]
- MIDAS: a compositional modeling systemJ. R. Warner. 39-48 [doi]
- A system for automatic acquisition of three-dimensional dataHenry Fuchs, Joe Duran, Brian W. Johnson. 49-53 [doi]
- Strategies for the successful introduction of computer technology in a mental health care setting: the problem of changeJames H. Johnson, Thomas A. Williams, Ronald A. Giannetti, L. J. Schmidt. 55-58 [doi]
- Database management for clinical trialsJohn M. Long, Joseph R. Brashear. 59-62 [doi]
- Data management for clinical researchW. L. Sibley, M. D. Hopwood, G. F. Groner, W. H. Josephs, N. A. Palley. 63-68 [doi]
- Why restrict the modelling capability of CODASYL data structure sets?Charles W. Bachman. 69-75 [doi]
- The entity-relationship model: a basis for the enterprise view of dataPeter P. Chen. 77-84 [doi]
- Data architecture and data model considerationsEdgar H. Sibley, Larry Kerschberg. 85-96 [doi]
- Security risk assessment in electronic data processing systemsRobert H. Courtney Jr.. 97-104 [doi]
- Problem areas in computer security assessmentS. Glaseman, R. Turn, R. S. Gaines. 105-112 [doi]
- Computer based information systems for the small firm: Why? Cost? Caveats, functional needs, contractsFrederick Francis Newpeck. 113-117 [doi]
- Storage utilization in a self-organizing data basePeter M. Stocker. 119-122 [doi]
- Self-adaptive automatic data base designMichael Hammer. 123-129 [doi]
- Overview of the military computer family architecture selectionWilliam E. Burr, Aaron H. Coleman, William R. Smith. 131-137 [doi]
- Initial selection and screening of the CFA candidate computer architecturesSamuel H. Fuller, Harold S. Stone, William E. Burr. 139-146 [doi]
- Evaluation of computer architectures via test programsSamuel H. Fuller, Paul Shaman, David Lamb, William E. Burr. 147-160 [doi]
- An architectural research facility: ISP descriptions, simulation, data collectionMario Barbacci, Daniel P. Siewiorek, Robert Gordon, Rosemary Howbrigg, Susan Zuckerman. 161-173 [doi]
- Evaluation of the software bases of the candidate architectures for the military computer familyJames Wagner, Edward Lieblein, Jorge Rodriguez, Harold Stone. 175-183 [doi]
- Life cycle cost models for comparing computer family architecturesJohn J. Cornyn, William R. Smith, Aaron H. Coleman, William R. Svirsky. 185-199 [doi]
- A microprocessor architecture for digital device implementationThomas L. Boardman Jr.. 201-205 [doi]
- A hybrid computer interface for microprocessorsJoseph P. Heid. 207-215 [doi]
- PM/II: multiprocessor oriented byte-sliced LSI processor modulesMario Tokoro, Taisuke Watanabe, Katsura Kawakami, Jun Sugano, Katsuhiko Noda. 217-225 [doi]
- An organization for optical linkages between integrated circuitsG. Jack Lipovski. 227-236 [doi]
- UNIX on a micro-processorH. Lycklama. 237-242 [doi]
- Using LSI processor bit-slices to build a PDP-11: a case study in microcomputer designT. M. McWilliams, Samuel H. Fuller, W. H. Sherwood. 243-253 [doi]
- Organizing and training for a new software development project: that big first stepDaniel P. Freedman, Donald C. Gause, Gerald M. Weinberg. 255-259 [doi]
- The choice of new software development methodologies for software development projectsEdward Yourdon. 261-265 [doi]
- Software development tools: acquisition considerations---a position paperLeon G. Stucki. 267-268 [doi]
- Understanding the developmental life cycleRay Caudill. 269-275 [doi]
- Management of large scale computer program productionH. S. Woodgate. 277-283 [doi]
- Test planningR. Dean Hartwick. 285-294 [doi]
- NODAS: the network-oriented data acquisition system for the medical environmentShelley I. Saffer, David J. Mishelevich, Shirley J. Fox, Victor B. Summerour. 295-299 [doi]
- A system for priming a clinical knowledge baseRandal L. Walser, Bruce H. McCormick. 301-307 [doi]
- A proposed study to access the impact of microprocessors on health care deliveryWilliam Hyman, William Lively. 309-312 [doi]
- Natural language knowledge processingChristine A. Montgomery. 313-316 [doi]
- The intelligence cycle: a differentiated perspective on information processingPeter G. W. Keen. 317-320 [doi]
- Plans for a program in medical information scienceAllan H. Levy, Thomas T. Chen. 321-325 [doi]
- The health care computer user: Where will we find the integrators? Roger H. Shannon, Marion J. Ball. 327-329 [doi]
- NAA: an approach to analyzing backpanel crosstalkJ. S. Hebhardt, C. F. Groves, R. Bardas. 331-340 [doi]
- True liquid cooling of computersE. A. Wilson. 341-348 [doi]
- GO system: design and implementation of an output generatorRoland R. Bonato, Kenneth C. Yang. 349-356 [doi]
- A talking computer terminalJames A. Kutsch Jr.. 357-362 [doi]
- Hard-copy computer output and its futureIrving L. Wieselman. 363-370 [doi]
- Variable-length hash area entriesM. H. McKinney. 371-377 [doi]
- Decomposition of data flow graphs on multiprocessorsW. C. Brantley Jr., G. W. Leive, D. P. Siewiorek. 379-388 [doi]
- Implementation and application of a function data typeMark B. Wells. 389-395 [doi]
- A general purpose dialogue processorJames L. Black. 397-408 [doi]
- A study in man-machine interactionLawrence H. Miller. 409-421 [doi]
- Responsive environmentsMyron W. Krueger. 423-433 [doi]
- Computer technology in data-base publishingD. B. Baker, R. E. O Dette. 435-441 [doi]
- Improving corporate information services in an automated word-processing networkHenry L. Mayfield. 443-448 [doi]
- A subject-content oriented retriever for processing information on-line (SCORPIO)Charlene A. Woody, Michael P. Fitzgerald, Francis J. Scott, D. Lee Power. 449-454 [doi]
- Comparing equivalent network services through dynamic processing time predictionSandra A. Mamrak, Stephen R. Kimbleton. 455-460 [doi]
- A structured data base computer conferencing systemGeorge W. Arnold, Stephen H. Unger. 461-467 [doi]
- An analytic model for parallel computationRoger M. Firestone. 469-474 [doi]
- Dominance relations in computing systemsDaniel G. Hays. 475-480 [doi]
- Structured training: a common-sense approach to developing ADP skills for improved job performanceAlexander P. Grant, Jack L. Stone. 481-486 [doi]
- The role of a formal training program in attracting and developing computer professionalsLawrence F. Lunetta Jr.. 487-491 [doi]
- Personal computing: an overview for computer professionalsJim Warren. 493-498 [doi]
- Operational software for restructuring network databasesDonald E. Swartwout, Mark Deppe, James P. Fry. 499-508 [doi]
- A multi-level procedure for design of file organizationsEivind Aurdal, Arne Sølvberg. 509-521 [doi]
- An effective method for measurement and analysis of system software performanceJohn R. Rumsey, David W. Abmayr. 523-527 [doi]
- The Navy Fortran validation systemPatrick M. Hoyt. 529-537 [doi]
- A two-step approach to the validation of software engineering methodologiesGruia-Catalin Roman. 539-544 [doi]
- Surveying the billion dollar chasm: how educational differences continue to force corporate and data processing executives apartRobert S. Hoberman. 545-560 [doi]
- A community of individuals: cooperation and individualization in computer science educationKenneth L. Modesitt. 561-567 [doi]
- New perspectives for information systems educationThomas I. M. Ho. 569-573 [doi]
- Petroleum Data System: a network of energy informationPatricia A. Tracy. 575-577 [doi]
- Applications of SPARCOM data base concepts to a crime combating environmentRon Ashany. 579-593 [doi]
- Integrated data base concepts and structures for combat modelsWilliam A. Bayse, Dean P. Risseeuw, Charles S. Matheny. 595-602 [doi]
- Routing and control in a centrally directed networkJoseph Rinde. 603-608 [doi]
- TYMNET as a multiplexed packet networkJohn Kopf. 609-613 [doi]
- Packet switched network in JapanToshiharu Takatsuki, Jiro Iimura, Masato Chiba, Masayuki Abe. 615-621 [doi]
- Modular programming conventions in assembly languagesShy-Ming Ju. 623-628 [doi]
- The design and implementation of a simple programming language for microcomputersJ. C. Cleaveland, C. D. Satten. 629-635 [doi]
- Cm*: a modular, multi-microprocessorR. J. Swan, Samuel H. Fuller, Daniel P. Siewiorek. 637-644 [doi]
- The implementation of the Cm* multi-microprocessorRichard J. Swan, Andreas Bechtolsheim, Kwok-Woon Lai, John K. Ousterhout. 645-655 [doi]
- Software management of Cm*: a distributed multiprocessorAnita K. Jones, Robert J. Chansler Jr., Ivor Durham, Peter H. Feiler, Karsten Schwan. 657-663 [doi]
- Using assertions to improve language translatorsArthur B. Pyster. 665-668 [doi]
- A parser analyzer of empirical design for question-answeringAbraham S. Ben David. 669-678 [doi]
- Automatic generation of computer programsNoah S. Prywes. 679-689 [doi]
- Sorting with associative secondary storage devicesC. S. Lin. 691-695 [doi]
- A specialized architecture for textual information retrievalLee A. Hollaar, William H. Stellhorn. 697-702 [doi]
- Fault-tolerant modularized arithmetic logic unitsT. R. N. Rao, H. J. Reinheimer. 703-710 [doi]
- The design of self-checking multi-output combinational circuitsD. C. Ko, M. A. Breuer. 711-721 [doi]
- Remote terminal emulation in the procurement of teleprocessing systemsShirley Ward Watkins, Marshall D. Abrams. 723-727 [doi]
- Application of remote terminal emulation in the procurement processE. J. McFaul. 729-732 [doi]
- Remote terminal emulator development and application criteriaC. T. Arthur. 733-739 [doi]
- A survey of structured programming practiceI. St. J. Hugo. 741-752 [doi]
- An interactive system for aiding management decision makingRobert C. Gammill, Herbert J. Shukiar. 753-759 [doi]
- An overview of independent, third-party computer maintenanceHoward D. Ponty. 761-764 [doi]
- A perspective of standard form contracts in the data processing industryStephen N. Hollman. 765-769 [doi]
- Small computers and small investorsGeorge Kim Johnson. 771-774 [doi]
- Nondedicated interprocessor communications disciplineDavid J. Bastyr. 775-777 [doi]
- An approach to address identification from degraded address dataViresh Seth. 779-783 [doi]
- Signature and facial image compression by boundary encodingDavid P. Himmel. 785-788 [doi]
- An interactive text-editing system in support of Russian translation by machineDavid A. Luther, Cristine Montgomery, Ronald M. Case. 789-790 [doi]
- Computer generation of conference presentationsCharles A. Belov. 791-794 [doi]
- Design of a diagnosable and fault-tolerant input/output controllerA. K. Bose, S. A. Szygenda. 795-800 [doi]
- Modular redundancy without voters decreases complexity of restoring organP. T. DeSousa, F. P. Mathur. 801-806 [doi]
- A study of intermittent faults in digital computersÖmür Tasar, Vehbí Tasar. 807-811 [doi]
- A calibration-prediction technique for estimating computer performanceC. A. Rose. 813-818 [doi]
- CPU-utilization and secondary-storage performance: the demand for a new secondary-storage technologyPeter Schneider. 819-825 [doi]
- Nonlinear parameter estimation for probabilistic finite-state automataFred J. Maryanski, Kuang Chan Wu. 827-831 [doi]
- A comparison between two paradigms of intelligent systems: an exampleAbraham Waksman. 833-836 [doi]
- Concatenated group theoretic codes for binary asymmetric channelsSerban D. Constantin, T. R. N. Rao. 837-842 [doi]
- The TICOM model: a network data base approach to review and evaluation of internal control systemsJames I. Cash, Andrew D. Bailey Jr., Andrew B. Whinston. 843-854 [doi]
- Design and implementation of an information base for decision makersRobert H. Bonczek, Clyde W. Holsapple, Andrew B. Whinston. 855-863 [doi]
- Laboratory automation via a VM/370 teleprocessing virtual machineAnthony A. Guido, James P. Considine. 865-877 [doi]
- Computer typesetting of technical journals on UNIXMichael E. Lesk, Brian W. Kernighan. 879-888 [doi]
- The computer in manufacturing: reduction of scrap by computer monitoringP. E. Gober. 889-894 [doi]
- A methodology for multi-criteria information system designJohn S. Chandler, Thomas G. DeLutis. 895-905 [doi]
- Automated control of concurrency in multi-user hierarchical information systemsAlan F. Sweet, Arthur E. Oldehoeft. 907-916 [doi]
- Techniques for requirements-oriented designKenneth J. Thurber. 919-929 [doi]
- A multi-microprocessor approach to a high-speed and low-cost continuous-system simulationRyoichi Yoshikawa, Tatsuo Kimura, Yasuhiro Nara, Hideo Aiso. 931-936 [doi]
- Instrumented architectural level emulation technologyHarrison R. Burris. 937-946 [doi]
- ARES: a memory, capable of associating stored information through relevancy estimationTadao Ichikawa, Ken Sakamura, Hideo Aiso. 947-954 [doi]
- Cache memory systems for multiprocessor architectureO. P. Agrawal, A. V. Pohm. 955-964 [doi]
- Choosing a medical billing systemJeffrey Rothmeier. 965-968 [doi]
- Designing software for the minicomputer business data processing environment: a case historyJohn M. Hemphill, Ronald L. Lancaster. 969-972 [doi]
- What to look for in distributed (source) data processingW. Harry Vickers. 973-975 [doi]
- RESQ: a package for solution of generalized queueing networksCharles H. Sauer, M. Reiser, Edward A. MacNair. 977-986 [doi]
- An approach to simulation of multilevel production systemsJ. F. Clark, D. M. Cohen. 987-989 [doi]
- Low cost data acquisition and control systems for the computer hobbyistRalph Tenny. 991-994 [doi]
- Diskomania: a small-system floppy disk operating systemWayne Sewell. 995-997 [doi]
- Neighborhood computer stores: the answer to microcomputer marketingPaul Terrell. 999-1004 [doi]