Abstract is missing.
- A conversational decision support system for resource allocation without explicit objective functionFumihiko Mori, Hiroshi Tsuji, Takashi Sato. 1-6 [doi]
- Decision support systems: a practical application---branch office structureJohn R. Wetmiller. 7-11 [doi]
- On development tools for small systems: the challenge of economically automating a filing cabinetDavid D. Raber. 13-22 [doi]
- A structured information system design for a newspaper organization: a case studyMohan R. Tanniru. 23-31 [doi]
- SID: a system for interactive designTosiyasu L. Kunii, Minoru Harada. 33-40 [doi]
- An overview of a network design systemW. E. Bracker, Benn R. Konsynski. 41-47 [doi]
- Computers and entertainmentSuzanne Landa. 49 [doi]
- A minicomputer system for audio-animatronics show data generationPhilip C. Stover, R. David Snyder. 51-53 [doi]
- Computers and sports: a natural marriageThomas A. Eifler. 55-65 [doi]
- Computers helping dance notation help the dance: a visionStephen W. Smoliar. 67-71 [doi]
- Automatic camera effects system (ACES)Steven N. Crane, R. David Snyder. 73-81 [doi]
- Automated computer controlled editing sound system (ACCESS)William R. Deitrick. 83-85 [doi]
- The use of computer technology in Magicam slave camera systemsDan Slater, Rob King, John Gale. 87-90 [doi]
- TelecommunicationsKenneth J. Thurber. 91 [doi]
- Distributed network and multiprocessing minicomputer state-of-the-art capabilitiesDouglas J. Theis. 93-103 [doi]
- ARQ performance in SNA networksMartin A. Reed, Terence D. Smetanka. 105-112 [doi]
- Computer communication in NTT remote computing servicesMasatoshi Iwayama, Atsumu Fujiwara. 113-120 [doi]
- Local area data distributionThomas G. Albright, Robert J. Wallace. 121-126 [doi]
- Overview of the computer architecture areaWesley Chu. 127 [doi]
- The control data loosely coupled network lower level protocolsWilliam C. Hohn. 129-134 [doi]
- LCN: a loosely coupled network systemLowell H. Schiebe. 135-138 [doi]
- Derivation and use of a survivability criterion for DDP systemsRichard E. Merwin, Mohammed Mirhakak. 139-146 [doi]
- An operating system kernel mechanism for the poly-processor system PPS-RMakoto Amamiya, Naohisa Takahashi, Yutaka Ogawa, Kenji Koyama. 147-156 [doi]
- Measures for distributed processing network survivabilityGene Hilborn. 157-163 [doi]
- Architectures for supersystems of the 80sSvetlana P. Kartashev, Steven I. Kartashev. 165-180 [doi]
- The highly-parallel supercomputers: definitions, applications and predictionsHubert H. Love Jr.. 181-190 [doi]
- Database machines and some issues on DBMS standardsStanley Y. W. Su, Hsu Chang, George P. Copeland, Paul Fisher, Eugene I. Lowenthal, Stewart A. Schuster. 191-208 [doi]
- CONLAN: a formal construction method for hardware description languages: basic principlesRobert Piloty, Mario Barbacci, Dominique Borrione, Donald L. Dietmeyer, Fredrick J. Hill, Patrick Skelly. 209-217 [doi]
- CONLAN: a formal construction method for hardware description languages: language derivationRobert Piloty, Mario Barbacci, Dominique Borrione, Donald L. Dietmeyer, Fredrick J. Hill, Patrick Skelly. 219-227 [doi]
- CONLAN: a formal construction method for hardware description languages: language applicationRobert Piloty, Mario Barbacci, Dominique Borrione, Donald L. Dietmeyer, Fredrick J. Hill, Patrick Skelly. 229-236 [doi]
- Design decisions for the intelligent database machineRobert Epstein, Paula B. Hawthorn. 237-241 [doi]
- DIALOG: a distributed processor organization for database machineBenjamin W. Wah, S. Bing Yao. 243-253 [doi]
- Distributed data base processingAlyce Jackson. 255 [doi]
- System deadlocks resolutionKoji Nezu. 257-260 [doi]
- Database semantic integrity for a network data managerElizabeth N. Fong, Stephen R. Kimbleton. 261-268 [doi]
- Concurrency coordination in a locally distributed database systemGruia-Catalin Roman. 269-273 [doi]
- An introduction to computed chainingKuo-Chung Tai, Alan L. Tharp. 275-282 [doi]
- A federated architecture for database systemsDennis McLeod, Dennis Heimbigner. 283-289 [doi]
- Data base architecture and managementLinda Taylor. 291 [doi]
- Definition of database transactions by the casual userFred J. Maryanski, C. Steven Roush. 293-300 [doi]
- Programming with data frames for everyday data itemsDavid W. Embley. 301-305 [doi]
- Implementing data managementDaniel S. Appleton. 307-316 [doi]
- Data base designVincent Y. Lum. 317 [doi]
- Properties of relationships and their representationRamez Elmasri, Gio Wiederhold. 319-326 [doi]
- Earth resourcesLeigh S. Rosenberg. 327 [doi]
- BALDR-1: a solar thermal system simulationJoseph G. Finegold, F. Ann Herlevich. 329-333 [doi]
- Overview of the alternative power system economic analysis modelRichard B. Davis, Jerome V. V. Kasper. 335-339 [doi]
- Computer simulation of the operations of utility grid connected photovoltaic power plantsChester S. Borden. 341-346 [doi]
- Computer simulation of solar electric generating plants in a utility gridS. Young, O. Merrill, R. Knowles, Y. Gupta. 347-353 [doi]
- Numerical methods for the 80sRoger M. Firestone. 355 [doi]
- Numerical algorithms for parallel computersDavid K. Stevenson. 357-361 [doi]
- Design of an interactive matrix calculatorCleve Moler. 363-368 [doi]
- Image processingAndrew Tescher. 369 [doi]
- Derivation of invariant scene characteristics from imagesBerthold K. P. Horn. 371-376 [doi]
- Image understanding architecturesGraham R. Nudd. 377-390 [doi]
- Map-guided interpretation of remotely-sensed imageryJay M. Tenenbaum, Harry G. Barrow, Robert C. Bolles, Martin A. Fischler, Helen C. Wolf. 391-408 [doi]
- CCITT standardization for digital facsimileT. L. McCullough. 409-413 [doi]
- The application of optical character recognition techniques to bandwidth compression of facsimile dataPatrice J. Capitant, Robert H. Wallis. 415-421 [doi]
- Facsimile image codingJoan L. Mitchell. 423-426 [doi]
- Description and evaluation of a system for high-speed, three-dimensional computed tomography of the body: the dynamic spatial reconstructorRichard A. Robb, Barry K. Gilbert. 427-436 [doi]
- 3-D Viewer for interpretation of multiple scan sectionsBrent Baxter. 437-440 [doi]
- Absolute limits on image processingDavid G. Brown, Robert F. Wagner, Mary P. Anderson. 441-443 [doi]
- Generalized methodology for the comparison of diagnostic imaging instrumentationLeon Kaufman, Dale Shosa. 445-451 [doi]
- Balancing processor shares of scheduling classes through controlled allocation of memoryK. V. Sastry. 453-456 [doi]
- Management in data processingJohn C. Biddle. 457 [doi]
- Applications of exemplary programmingWilliam S. Faught. 459-464 [doi]
- Microprocessor software engineering training: a case studyChristine L. Braun. 465-471 [doi]
- Development of a microprocessor support facility for large organizationsBruce E. Stock, Miguel A. Ulloa. 473-478 [doi]
- Future management concerns regarding office automationGary D. Beamer. 479-482 [doi]
- Office automationWalter E. Ulrich. 483 [doi]
- Introduction to electronic mailWalter E. Ulrich. 485-488 [doi]
- Implementation considerations in electronic mailWalter E. Ulrich. 489-492 [doi]
- Experiences of an electronic mail vendorJeffrey B. Holden. 493-497 [doi]
- Electronic message system as a function in the integrated electronic officeHarold E. O Kelley. 499-502 [doi]
- The growing use of electronic mail by airlinesJames C. Goodlett. 503-507 [doi]
- Metamorphosis: facsimile communications, electronic mail and office productivityJohn E. Cochran. 509-513 [doi]
- Texas instruments computer communication network and its support for the automated officeJohn W. White. 515-526 [doi]
- Implementing electronic mail in a telephone system: more than just talkGerald Tomanek. 527-531 [doi]
- An office form flow modelIvor Ladd, Dennis Tsichritzis. 533-539 [doi]
- Design principles of an office specification languageMichael Hammer, Jay S. Kunin. 541-547 [doi]
- Automated workflow control: a key to office productivityL. S. Baumann, R. D. Coop. 549-554 [doi]
- Streamlining office procedures: an analysis using the information control net modelCarolyn L. Cook. 555-565 [doi]
- Office automation in the executive suite: successes and strategiesJames H. Carlisle. 567 [doi]
- Provisions for flexibility in the Linköping office information system (LOIS)Erik Sandewall, Göran Hektor, Anders Ström, Claes Strömberg, Ola Strömfors, Henrik Sörensen, Jaak Urmi. 569-577 [doi]
- Security and privacy of data flowsRein Turn. 579 [doi]
- Privacy protection and transborder data flowsRein Turn. 581-586 [doi]
- Transborder data flow: legal persons in privacy protection legislationSusan H. Nycum, Susan Courtney-Saunders. 587-593 [doi]
- SimulationLance A. Leventhal. 595 [doi]
- Using preliminary Ada in a process control applicationM. E. Gordon, W. B. Robinson. 597-606 [doi]
- Computer aided heat penetration tests for the food canning industryPaul Sagues. 607-611 [doi]
- A cross-impact simulation forecast of the data processing industryPaul Herbert Rosenthal. 613-621 [doi]
- Organization of the TRAC processor-memory subsystemRajan N. Kapur, U. V. Premkumar, G. Jack Lipovski. 623-629 [doi]
- An overview of the Texas reconfigurable array computerMatthew C. Sejnowski, Edwin T. Upchurch, Rajan N. Kapur, Daniel P. S. Charlu, G. Jack Lipovski. 631-641 [doi]
- Design and implementation of the banyan interconnection network in TRACU. V. Premkumar, Rajan N. Kapur, Miroslaw Malek, G. Jack Lipovski, P. Horne. 643-653 [doi]
- The advent of trusted computer operating systemsStephen T. Walker. 655-665 [doi]
- Software managementDonald J. Reifer. 667 [doi]
- Software engineering technology transferLorraine Duvall. 669 [doi]
- An integrated support software network using NSW technologyRichard A. Robinson, Emily A. Krzysiak. 671-676 [doi]
- The role of an information analysis center in software engineering technology transferJon Martens, Lorraine Duvall. 677-682 [doi]
- Considerations in the transfer of software engineering technologyMichael J. McGill. 683-686 [doi]
- A technique for comparative assessment of software development management policiesBrendan D. L. Mulhall, Steven M. Jacobs. 687-693 [doi]
- Software reliabilityHerbert Hecht. 695 [doi]
- Standard error classification to support software reliability assessmentJohn B. Bowen. 697-705 [doi]
- What makes a reliable program: few bugs, or a small failure rate?Bev Littlewood. 707-713 [doi]
- Software reliability and advanced avionicsGerard E. Migneault. 715-720 [doi]
- LanguagesRussell J. Abbott. 721 [doi]
- A linguistic comparison of MUMPS and COBOLThomas Munnecke. 723-729 [doi]
- The design of PLAIN: support for systematic programmingAnthony I. Wasserman. 731-740 [doi]
- Some practical experiences with the Pascal languageG. G. Gustafson, T. A. Johnson, G. S. Key. 741-746 [doi]
- UCSD Pascal™: a portable software environment for small computersMark Overgaard. 747-754 [doi]
- Software qualityKurt F. Fischer. 755 [doi]
- Measuring program complexity in a COBOL environmentJean Cochrane Zolnowski, Dick B. Simmons. 757-766 [doi]
- The complexity of an individual programJohn L. McTap. 767-771 [doi]
- An information theory based complexity measureEli Berlinger. 773-779 [doi]
- Software engineering educationBarry W. Boehm. 781 [doi]
- Special topicsGene Smith. 783 [doi]
- Technology development, severed ventures, and other aspects of corporate venture capitalJean E. De Valpine. 785-789 [doi]
- Recommendations for increasing the availability of capitalRichard C. Pflager. 791-794 [doi]
- Corporate venture capital in the computer industryKenneth W. Rind, Gene I. Miller. 795-800 [doi]
- Structured procedure for comparison and selection of computer system designsAntonio Vallone. 801-806 [doi]
- Extracting unique rows of a bounded degree array using triesDouglas Comer. 807-809 [doi]
- A look at making the ADP procurement process more efficient: temporary regulation 46Roger J. Gorg, George N. Baird, Judith A. Parks. 811-815 [doi]
- An information base for procedure independent design of information systemsLevent Ormancioglu. 817-821 [doi]
- Comparing load & go and link/load compiler organizationsWilliam L. Wilder. 823-826 [doi]
- A link between polygon and grid representations of land resource information systemsDevon Nickerson. 827-830 [doi]
- Risk analysis in the 1980 sJerome Lobel. 831-836 [doi]
- A mathematical model of character string manipulationSakti Pramanik. 837-839 [doi]
- Policy, values and EFT research: anatomy of a research agendaKenneth L. Kraemer, Kent W. Colton. 841-853 [doi]
- A linear programming model for optimal computer network protocol designJohn F. Heafner, Frances H. Nielsen. 855-861 [doi]
- Extracting service features from protocol documentsJohn F. Heafner, Frances H. Nielsen, M. Wayne Shiveley. 863-870 [doi]
- Verification of information in a fileJainendra K. Navlakha. 871-876 [doi]
- Translating non-standard extensions to standard PascalViswanathan Santhanam. 877-882 [doi]
- The flexible console: FLEXICONDavid L. Steinberg. 883-886 [doi]
- The INTEL® 8087 numeric data processorJohn F. Palmer. 887-893 [doi]
- Home computing: a vision in search of a marketplace: areas of needed researchJohn E. Ruchinskas, Charles W. Steinfield, Lynne L. Svenning. 895-902 [doi]