Abstract is missing.
- Computer technology in the movie industrySuzane Landa. 1-6 [doi]
- The System Architecture Evaluation Facility-An emulation facility at Rome Air Development CenterN. Bruce Clark, Michael A. Troutman. 7-12 [doi]
- Teaching and research experiences with an emulation laboratorySteven F. Sutphen. 13-18 [doi]
- Simulating the delay in logic networks for large, high-speed computersE. A. Wilson. 19-28 [doi]
- Languages for operating systems description, design and implementationPhilip H. Enslow Jr.. 29-38 [doi]
- The simulation language SIML/IM. H. MacDougall. 39-44 [doi]
- Mix-dependent job scheduling - An application of hybrid simulationSteve Tolopka, Herb Schwetman. 45-50 [doi]
- Parametric instabilities in computer system performance predictionLawrence W. Dowdy, Ashok K. Agrawala. 51-56 [doi]
- Aids to the development of network simulatorsImrich Chlamtac, William R. Franta. 57-66 [doi]
- A stochastic state space model for prediction of product demandWilliam C. Cave, Evelyn Rosenkranz. 67-72 [doi]
- The Bus Link - A microprogrammed development tool for the CMOS/SOS processor systemAvner Ben-Dor, Paul Baker, Jon Selden. 73-82 [doi]
- A computer analysis tool for structural decomposition using entropy metricsAaron N. Silver. 83-88 [doi]
- Interactive modeling systems for managers - Semantic models should underlie quantitative modelsRand B. Krumland. 89-94 [doi]
- Modeling regular, process - structured networksBruce W. Arden, Hikyu Lee. 95-102 [doi]
- The City of New York's integrated financial management system - From mandate to working system in 18 monthsSally J. Rupert. 103-106 [doi]
- Recurrent dilemmas of computer use in complex organizationsRob Kling, Walt Scacchi. 107-116 [doi]
- Project management through the Accomplishment Value Procedure (AVP)Donald J. Aharonian. 117-124 [doi]
- Textfax - Principle for new tools in the office of the futureWolfgang Horak, Walter Woborschil. 125-134 [doi]
- Microcomputer programming skillsC. Wrandle Barth. 135-138 [doi]
- Program conversion - One successful paradigmCharles Lynn, Jean Risley, Robert Wells. 139-146 [doi]
- A generalized zooming technique for pictorial database systemsS. K. Chang, B. S. Lin, R. Walser. 147-156 [doi]
- An approach to real-time scan conversionFranklin C. Crow. 157-164 [doi]
- The evolution and architecture of a high-speed workstation for interactive graphicsWilliam L. Paisner. 165-174 [doi]
- A mathematical model for distributed free spaceY. H. Chin, S. H. Yu. 175-184 [doi]
- Forecasting computer resource utilization using key volume indicatorsDavid E. Y. Sarna. 185-192 [doi]
- Workflow - A technique for analyzing JES systemsH. Pat Artis. 193-198 [doi]
- MMPS - A reconfigurable multi-microprocessor simulator systemDaniel Klein. 199-204 [doi]
- A (31, 15) Reed-Solomon code for large memory systemsRaymond S. Lim. 205-208 [doi]
- English dictionary searching with little extra spaceDouglas Comer. 209-216 [doi]
- New indices for bibliographic data and their applicationsYahiko Kambayashi, Shuzo Yajima, Osamu Konishi, Takaki Hayashi. 217-226 [doi]
- Visual inspection of metal surfacesJ. L. Mundy. 227-232 [doi]
- Monitoring the earth's resources from space-Can you really identify crops by satellite?David Landgrebe. 233-242 [doi]
- Digital image shape detectionR. Michael Hord. 243-254 [doi]
- 4 - A reconfigurable multiprocessor system for pattern recognition and image processingFaye A. Briggs, King-sun Fu, Kai Hwang 0001, Janak H. Patel. 255-266 [doi]
- Transportable image-processing softwareR. G. Hamlet, A. Rosenfeld. 267-272 [doi]
- A data-handling mechanics of on-line text editing system with efficient secondary storage accessSakti Pramanik, Edgar T. Irons. 273-278 [doi]
- How do we best control the flow of electronic information across sovereign borders?Peter Safirstein. 279-282 [doi]
- Privacy and security in transnational data processing systemsRein Turn. 283-292 [doi]
- A modular approach to computer security risk managementRobert P. Campbell, Gerald A. Sands. 293-304 [doi]
- The design and operation of public-key cryptosystemsEric H. Michelman. 305-312 [doi]
- Safeguarding cryptographic keysG. R. Blakley. 313-318 [doi]
- Applications for multilevel secure operating systemsJohn P. L. Woodward. 319-328 [doi]
- The foundations of a provably secure operating system (PSOS)Richard J. Feiertag, Peter G. Neumann. 329-334 [doi]
- A security retrofit of VM/370Barry D. Gold, Richard R. Linde, R. J. Peeler, Marvin Schaefer, John F. Scheid, P. D. Ward. 335-344 [doi]
- KSOS - The design of a secure operating systemE. J. McCauley, P. J. Drongowski. 345-354 [doi]
- UCLA Secure UnixGerald J. Popek, Mark Kampe, Charles S. Kline, Allen Stoughton, Michael Urban, Evelyn Walton. 355-364 [doi]
- KSOS - Development methodology for a secure operating systemT. A. Berson, G. L. Barksdale. 365-372 [doi]
- KSOS - Computer network applicationsM. A. Padlipsky, K. J. Biba, Richard B. Neely. 373-382 [doi]
- Considerations in the employment of blind computer professionalsJames A. Kutsch, Kimberly B. Kutsch. 383-384 [doi]
- Hiring a deaf computer professionalKaren K. Anderson, Philip W. Bravin. 385-390 [doi]
- MIS effects on managers' task scope and satisfactionDaniel Robey. 391-396 [doi]
- Some neglected outcomes of organizational use of computing technology - And their implications for systems designersM. Lynne Markus. 397-402 [doi]
- An academic meets industry - Rethinking computer-based education and personalized systems of instructionKenneth L. Modesitt. 403-406 [doi]
- Recent developments in computers and society research and educationRichard H. Austing, Gerald L. Engel. 407-410 [doi]
- Interactive monitoring of computer-based group communicationKathleen Spangler, Hubert Lipinski, Robert Plummer. 411-414 [doi]
- The status of women in health science computingLynn L. Peterson. 415-418 [doi]
- Women and minorities in the computer professionsHelen M. Wood. 419-424 [doi]
- Computers in judicial administrationCharles L. Aird, Barbara H. Todd. 425-442 [doi]
- Police and computer technology - The expectations and the resultsKent W. Colton. 443-454 [doi]
- Distributed algorithms for global structuringRaphael A. Finkel, Marvin H. Solomon, Michael L. Horowitz. 455-460 [doi]
- The tree-structured distributed network front-end processor architectureRobert M. Monroe, Ronald J. Srodawa, Franklin H. Westervelt. 461-468 [doi]
- Analysis of real-time control systems by the model of packet netsMohamed Gawdat Gouda. 469-480 [doi]
- Performance and economy of a fault-tolerant multiprocessorJaynarayan H. Lala, Charles J. Smith. 481-492 [doi]
- Serviceability features of the HP 300 small business computerCurtis R. Gowan. 493-498 [doi]
- Automatic tuning of computer architecturesKen Sakamura, Tatsushi Morokuma, Hideo Aiso, Hajime Iizuka. 499-512 [doi]
- The BTI 8000-Homogeneous, general-purpose multiprocessingGeorge R. Lewis, J. Shirley Henry, Brian P. McCune. 513-528 [doi]
- A survey of interconnection methods for reconfigurable parallel processing systemsHoward Jay Siegel, Robert J. McMillen, Philip T. Mueller Jr.. 529-542 [doi]
- Adaptation properties for dynamic architecturesSteven I. Kartashev, Svetlana P. Kartashev, C. V. Ramamoorthy. 543-556 [doi]
- Architectural considerations of the NEC mass data file subsystemAkira Sekino, Takuo Kitamura. 557-564 [doi]
- Error-oriented architecture testingLarry Kwok-Woon Lai. 565-576 [doi]
- A survey of methods for intermittent fault analysisYashwant K. Malaiya, Stephen Y. H. Su. 577-586 [doi]
- Architectural and design perspectives in a modular multi-microprocessor, the DPS-1Kells A. Elmquist. 587-594 [doi]
- Work flow view of a distributed applicationJ. R. Hamstra. 595-604 [doi]
- The use of self-inverse program primitives in system evaluationJohn E. MacDonald. 605-613 [doi]
- A loosely-coupled applicative multi-processing systemRobert M. Keller, Gary Lindstrom, Suhas Patil. 613-622 [doi]
- A prototype data flow computer with token labellingIan Watson, John R. Gurd. 623-628 [doi]
- A view of dataflowKim P. Gostelow, Robert E. Thomas. 629-636 [doi]
- A hardware-independent virtual architecture for PASCALViswanathan Santhanam. 637-648 [doi]
- Design of a high-level language machineG. J. Battarel, R. J. Chevance. 649-656 [doi]
- A programming language for high-level architectureYaohan Chu, Edward Ray Cannon. 657-666 [doi]
- Data management in distributed data basesC. V. Ramamoorthy, Benjamin W. Wah. 667-680 [doi]
- A unified architecture for data and message managementGeorges Gardarin. 681-688 [doi]
- Design of a prototype ANSI/SPARC three-schema data base systemEric K. Clemons. 689-696 [doi]
- On the implementation of a conceptual schema model within a three-level DBMS architectureShamkant B. Navathe, Johann Lemke. 697-708 [doi]
- The practice of data base administrationJay-Louise Weldon. 709-712 [doi]
- An approach to automatic maintenance of semantic integrity in large design data basesGilles M. E. Lafue. 713-716 [doi]
- On query-answering in relational data basesE. L. Lozinskii. 717-720 [doi]
- ASTROL - An associative structure-oriented languageJames F. Wirth. 721-726 [doi]
- An associative search language for data managementAmar Mukhopadhyay, Alireza Hurson. 727-732 [doi]
- Updating defined relationsI. M. Osman. 733-740 [doi]
- Performance enhancement for relational systems through query compilationRandy H. Katz. 741-748 [doi]
- System considerations for predicting mass storage subsystem behaviorE. J. McBride, A. B. Tonik, G. R. Finnin. 749-760 [doi]
- A software reliability study using a complexity measureThomas J. Walsh. 761-768 [doi]
- A Markovian model for reliability and other performance measures of software systemsAmrit L. Goel, Kazu Okumoto 0001. 769-774 [doi]
- Partial match retrieval for non-uniform query distributionsVasu S. Alagar, C. Soockan. 775-780 [doi]
- Comparing interactive computer services - Theoretical, technical and economic feasibilitySandra A. Mamrak, Paul D. Amer. 781-788 [doi]
- Characterizing a workload for the comparison of interactive servicesDomenico Ferrari. 789-796 [doi]
- Control of computing funds and resources in a networking environmentBeverly O'Neal, Ronald Segal. 797-804 [doi]
- The economic impact of network affiliation upon institutions of higher learningNorman R. Nielsen. 805-812 [doi]
- Approaches to concurrency control in distributed data base systemsPhilip A. Bernstein, Nathan Goodman. 813-820 [doi]
- Access control mechanisms for a network operating systemHelen M. Wood, Stephen R. Kimbleton. 821-830 [doi]
- Public key vs. conventional key encryptionCharles S. Kline, Gerald J. Popek. 831-838 [doi]
- SIGMA - An interactive message service for the Military Message ExperimentRobert Stotz, Ronald Tugender, David Wilczynski, Donald Oestreicher. 839-846 [doi]
- The SIGMA experience - A study in the evolutionary design of a large software systemDavid Wilczynski, Ronald Tugender, Donald Obstreicher. 847-854 [doi]
- The terminal for the Military Message ExperimentRobert Stotz, Paul Raveling, Jeff Rothenberg. 855-862 [doi]
- On-line tutorials and documentation for the SIGMA message serviceJeff Rothenberg. 863-868 [doi]
- Maintaining order and consistency in multi-access dataRonald Tugender. 869-874 [doi]
- Exact solution for the initialization time of packet radio networks with two station buffersDaniel Minoli. 875-886 [doi]
- Fixing timeout intervals for lost packet detection in computer communication networksRobert J. T. Morris. 887-892 [doi]
- Comparison of some end-to-end flow control policies in a packet-switching networkG. Pujolle. 893-904 [doi]
- Alternatives for providing highly reliable access to X.25 networksRichard J. Chung, A. M. Rybczynski. 905-916 [doi]
- A fail-safe distributed local network for data communicationJane W.-S. Liu, Izumi Suwa, Robert Stepp, Sergio M. Hinojosa, Tsutoma Utsuqi. 917-926 [doi]
- An analysis of a distributed switching network with integrated voice and data in support of command and controlDaniel Schutzer. 927-934 [doi]
- The exploratory system control model multi-loop networkDaniel J. Paulish. 935-940 [doi]
- Software reliability measures applied to system engineeringJohn D. Musa. 941-946 [doi]
- Verification procedures supporting software systems developmentGruia-Catalin Roman. 947-956 [doi]
- A language for distributed processingRonald L. Price. 957-968 [doi]
- Automatic program transformations for virtual memory computersWalid A. Abu-Sufah, David J. Kuck, Duncan H. Lawrie. 969-974 [doi]
- Analysis of data flow models using the SARA graph model of behaviorW. Ruggiero, Gerald Estrin, Robert S. Fenchel, Rami R. Razouk, D. Schwabe, Mary K. Vernon. 975-988 [doi]
- Software metrics for aiding program development and debuggingNorman F. Schneidewind. 989-994 [doi]
- A measure of software complexityNed Chapin. 995-1002 [doi]
- Relating computer program maintainability to software measuresAlan R. Feuer, E. B. Fowlkes. 1003-1012 [doi]
- Program forms and program form analysers for high-level structured designJayashree Ramanathan, Meera Blattner. 1013-1020 [doi]
- First-year results from a research program on human factors in software engineeringSylvia B. Sheppard, Bill Curtis, Phil Milliman, M. A. Borst, Tom Love. 1021-1028 [doi]
- The use and abuse of a software engineering systemD. J. Pearson. 1029-1036 [doi]
- The integrated control/distributed power software development shopJean-Paul Renault. 1037-1042 [doi]
- On the fate of software enhancementsNorman K. Sondheimer. 1043-1050 [doi]
- Experiences in building and using compiler validation systemsPaul Oliver. 1051-1058 [doi]
- Automatic program synthesis via synthesis of loop-free segmentsJoe W. Duran. 1059-1062 [doi]
- Semantic similarity analysis - A computer-based study of meaning in noun phrasesLynn L. Peterson. 1063-1070 [doi]
- Heuristic control of design-directed program transformationsChristina L. Jette. 1071-1078 [doi]
- A data flow evaluation system based on the concept of recursive localityA. L. Davis. 1079-1086 [doi]
- Data flow languagesWilliam B. Ackerman. 1087-1095 [doi]