Abstract is missing.
- Choosing the best storage technique for a main memory database systemLe Gruenwald, Margaret H. Eich. 1-10 [doi]
- File system design using large memoriesCarl Staelin, Hector Garcia-Molina. 11-21 [doi]
- An interleaved file system for a highly distributed MIMD architectureYaron Farber, Amnon Barak. 22-30 [doi]
- A simulation generator for multiprocessor systemsAmos Israeli, Theodor A. Nissim. 32-42 [doi]
- Xputers: very high throughput by innovative computing principlesReiner W. Hartenstein, Alexander G. Hirschbiel, M. Weber. 43-50 [doi]
- An efficient organization for large, network-based multicomputer systemsHelge Scheidig, M. F. Schneider, R. Spurk. 51-64 [doi]
- Programming the data structure acceleratorRichard Zippel. 65-75 [doi]
- The Supercomputer Toolkit and its applicationsHarold Abelson, Andrew A. Berlin, Jacob Katzenelson, William H. McAllister, Guillermo Juan Rozas, Gerald Jay Sussman. 76-81 [doi]
- A special distributed system in a general programming environmentAndrei Heilper, John Marberg. 82-88 [doi]
- Deadlock-avoidance in a page-parallel rasterizerYitzhak Birk. 89-98 [doi]
- Log-driven backups: A recovery scheme for large memory database systemsEliezer Levy, Abraham Silberschatz. 99-109 [doi]
- Mutual exclusion revisitedBoleslaw K. Szymanski. 110-117 [doi]
- Servers, processes and subprocesses: a critical evaluationYolande Berbers, Pierre Verbaeten. 118-125 [doi]
- Wasted resources in gang schedulingDror G. Feitelson, Larry Rudolph. 127-136 [doi]
- User authentication by cognitive passwords: an empirical assessmentMoshe Zviran, William J. Haga. 137-144 [doi]
- Interacting processes: a language for coordinated distributed programmingNissim Francez, Ira R. Forman. 146-161 [doi]
- Superposition and fairness in reactive system refinementRalph-Johan Back, Reino Kurki-Suonio. 162-172 [doi]
- Reasoning in CSP via the HOL theorem proverAlbert John Camilleri. 173-183 [doi]
- TAPIOCA: OCCAM rapid prototyping from Petri-netF. Breant. 184-190 [doi]
- Methods and tools for modelling the behaviour of information-transport ports in distributed software configurationsAlgirdas Pakstas. 191-194 [doi]
- Bergate-a system for interconnecting local area networks via broadband ISDNAnastassios Gavras, Berthold Butscher, Thomas Luckenbach, Xiangwen Xu. 195-205 [doi]
- Parallelism in transport oriented communication protocolsMartina Zitterbart. 206-213 [doi]
- Electronic data interchangeCoen M. A. Kreuwels. 214-224 [doi]
- Algorithms and optic implementation for reconfigurable networksAssaf Schuster, Yosi Ben-Asher. 225-235 [doi]
- Software uncertainty and the role of CASE in its minimisation and controlMeir M. Lehman. 236-246 [doi]
- Some simple models of CASE tool integrationG. R. Lewis. 247-250 [doi]
- Automated retrieval of consistent documentation from requirement analysis to program codes for software maintenanceShun-Tzu Tsai, Chien-Chiao Yang. 251-260 [doi]
- Knowledge support for information system designGeorges Grosz, Colette Rolland. 261-268 [doi]
- Location of checkpoints in fault-tolerant softwareFrancesca Saglietti. 270-277 [doi]
- Learning to recognize reusable software modules using an inductive classification systemJuan Carlos Esteva. 278-285 [doi]
- Software cost estimation modelsFred J. Heemstra. 286-297 [doi]
- Functional C: an extended functional programming languageMyuhng Joo Kim, Chu Shik Jhon. 298-302 [doi]
- A compumetrical approach to summarize benchmark resultsMagid Igbaria, Milton Silver. 303-314 [doi]
- Artificial intelligence and designSaul Amarel. 315-333 [doi]
- Translating telephone: problems and prospectsR. Reddy. 334-335 [doi]
- Logic programming with goal-directed searchJared L. Darlington. 336-344 [doi]
- Junior Researcher: a discovery system that can solve the N queens problems (N⩾4) on a constant computational complexityQ. S. Gao, S. J. Hou. 345-347 [doi]
- A general framework of constraint propagation for diagnostic systemsRyuji Tsuchiya, Takahiko Ogino. 348-352 [doi]
- Generating explanations from question pathsEfstratios Sarantinos, Peter Johnson. 353-363 [doi]
- A study on the recognition of the Korean monothongs using artificial neural net modelsKi Seok Kim, Inbum Kim, Heeyeung Hwang. 364-371 [doi]
- The computability of architectural designYehuda E. Kalay. 372-378 [doi]
- Deducing linguistic structure from the statistics of large corporaEric Brill, David M. Magerman, Mitchell Marcus, Beatrice Santorini. 380-389 [doi]
- What is an inference rule?Ronald Fagin, Joseph Y. Halpern, Moshe Y. Vardi. 391-401 [doi]
- 4-reducible graphsRong Lin, Stephan Olariu. 402-413 [doi]
- How to keep a dynamic distributive directed graph acyclic and yet grant all requests of edge additionsShimon Even, Yachin Pnueli. 414-425 [doi]
- A parallel implementation of equational programmingNachum Dershowitz, Naomi Lindenstrauss. 426-435 [doi]
- One-page book embedding under vertex-neighborhood constraintsShlomo Moran, Yaron Wolfsthal. 436-446 [doi]
- On the expressive power of program schemes with setsAlexei P. Stolboushkin. 447-455 [doi]
- Evaluation and comparison of text-manipulation systemsC. S. Yovev. 456-466 [doi]
- Optimal evaluation of vector expression treesThomas Rauber. 467-473 [doi]
- Access control requirements for environmental information knowledge base systemsGerhard Steinke. 474-480 [doi]
- Mapping data schemas to MDBMS architecture layersMartin Dürr, Stefan M. Lang. 481-490 [doi]
- Overlapping B+trees for temporal dataYannis Manolopoulos, G. Kapetanakis. 491-498 [doi]
- New directions in database management systemsCatriel Beeri. 500-506 [doi]
- Multidatabase performance evaluationYuri Breitbart, Hector Morales, Avi Silberschatz, Glenn R. Thompson. 507-519 [doi]
- The hypernode model and its associated query languageMark Levene, Alexandra Poulovassilis. 520-530 [doi]
- Integration of different transaction models in federative distributed database systemsWolfgang Johannsen. 531-540 [doi]
- Heuristic-based semantic query optimizationEdward Sciore, Michael Siegel. 541-550 [doi]
- SQL query modification algorithmsD. Chou, Arie Segev. 551-559 [doi]
- Notes on real-time distributed database systems stabilityFabio A. Schreiber. 560-564 [doi]
- Evaluation and improvement of query processing methods in wide and local area networkZbyszko Królikowski. 565-575 [doi]
- Concurrency control in distributed databases through dummy locksUgur Halici, Asuman Dogac. 576-585 [doi]
- Using information technologyAmy Wohl. 586-587 [doi]
- Organizing for simplicity: the role of information technologyRobert M. Rubin. 589-592 [doi]
- Safety first [data security]R. E. Greene. 593-595 [doi]
- Positioning I/S to achieve world-class quality performanceHarvey Shrednick. 596-597 [doi]
- Ensuring usability: Aetna's experienceIrwin J. Sitkin, L. H. Mason. 598-599 [doi]
- The road to enterprise excellenceEdwin B. Shore. 600-601 [doi]
- Information technology risk managementMichael J. Ginzberg, Rolf T. Moulton. 602-608 [doi]
- Coordination: a new field of application for information technologyA. W. Holt. 609-616 [doi]
- The current status of copyright and patent protection for computer softwareJ. E. Brown, Anthony L. Clapes, E. H. Taylor. 617-629 [doi]
- COPYCAT: a system for the distribution of copyright cataloging informationP. A. Turner. 630-638 [doi]
- Desktop research-information management for the scholarVictor Rosenberg. 639-642 [doi]
- Trends in using computers in educationS. Charp. 644-646 [doi]
- Computer innovation in higher educationArthur Melmed. 647-649 [doi]
- Hardware and software compatibility issues [computers in education]William D. Gattis. 650-656 [doi]
- Integrating courseware with lessonware [computers in education]Luis Osin. 657-659 [doi]
- Computer assisted instruction and students' social orientationsYaacov J. Katz, Baruch Offir. 660-664 [doi]
- Experience using a dynamic adaptive hidden-surface removal algorithm for volume rendering within a MIMD architectureMartin R. Stytz, Ophir Frieder. 665-676 [doi]
- A benchmark to scale behaviorally object-oriented database systemsAlfons Kemper, Joachim Chriesten. 677-687 [doi]
- Televisualization: on the role of high-speed communication in the visualization of scienceDganit Amitai. 688-693 [doi]
- An overview of intelligent vehicle-highway systems (IVHS) activities in North AmericaKan Chen, Bernard A. Galler. 694-701 [doi]
- Road transport informatics in Europe-a summary of current developmentsIan Catling, Bob McQueen. 702-715 [doi]
- An interleaving model for real-timeThomas A. Henzinger, Zohar Manna, Amir Pnueli. 717-730 [doi]
- Reverse software engineering of concurrent programsXiang Ge, Noah S. Prywes. 731-742 [doi]
- Expert Design AdvisorSteven L. Howell, Phillip Q. Hwang, Cuong M. Nguyen. 743-756 [doi]
- A temporal proof methodology for reactive systemsZohar Manna, Amir Pnueli. 757-773 [doi]
- A combinatorial approach to temporal reasoningAlexander Belfer, Martin Charles Golumbic. 774-780 [doi]
- The ACL data collection initiativeMaik Y. Liberman. 781-786 [doi]
- The making of an information retrieval interfaceCharles T. Meadow. 787-795 [doi]