default search action
AFIPS NCC 1977: Dallas, Texas, USA
- American Federation of Information Processing Societies: 1977 National Computer Conference, June 13-16, 1977, Dallas, Texas, USA. AFIPS Conference Proceedings 46, AFIPS Press 1977, ISBN 978-1-4503-7914-4
Data base administration
- Jean-Paul De Blasis, Thomas H. Johnson:
Data base administration: classical pattern, some experiences and trends. 1-7 - Michael Ehrensberger:
Data dictionary: more on the impossible dream. 9-11
Computer systems architecture
- C. V. Ramamoorthy, Gary S. Ho, Yih-Wu Han:
Fault tree analysis of computer systems. 13-17 - Stephen Y. H. Su, Richard J. Spillman:
An overview of fault-tolerant digital system architecture. 19-26
Computer security techniques
- Helen M. Wood:
The use of passwords for controlling access to remote computer systems and services. 27-33 - John H. Carson, John K. Summers, James S. Welch Jr.:
A microprocessor selective encryption terminal for privacy protection. 35-38
Computer graphics
- J. R. Warner:
MIDAS: a compositional modeling system. 39-48 - Henry Fuchs, Joe Duran, Brian W. Johnson:
A system for automatic acquisition of three-dimensional data. 49-53
Clinical applications of the computer
- James H. Johnson, Thomas A. Williams, Ronald A. Giannetti, L. J. Schmidt:
Strategies for the successful introduction of computer technology in a mental health care setting: the problem of change. 55-58 - John M. Long, Joseph R. Brashear:
Database management for clinical trials. 59-62 - William L. Sibley, Marsha D. Hopwood, Gabriel F. Groner, William H. Josephs, Norman A. Palley:
Data management for clinical research. 63-68
Data models and their applications
- Charles W. Bachman:
Why restrict the modelling capability of CODASYL data structure sets? 69-75 - Peter P. Chen:
The entity-relationship model: a basis for the enterprise view of data. 77-84 - Edgar H. Sibley, Larry Kerschberg:
Data architecture and data model considerations. 85-96
Computer security risk assessment
- Robert H. Courtney Jr.:
Security risk assessment in electronic data processing systems. 97-104 - S. Glaseman, Rein Turn, R. S. Gaines:
Problem areas in computer security assessment. 105-112
Computer-based information systems for the small firm
- Frederick Francis Newpeck:
Computer based information systems for the small firm: Why? Cost? Caveats, functional needs, contracts. 113-117
Self-organizing/self-optimizing data bases
- Peter M. Stocker:
Storage utilization in a self-organizing data base. 119-122 - Michael Hammer:
Self-adaptive automatic data base design. 123-129
Selection methods for a family of computer architectures
- William E. Burr, Aaron H. Coleman, William R. Smith:
Overview of the military computer family architecture selection. 131-137 - Samuel H. Fuller, Harold S. Stone, William E. Burr:
Initial selection and screening of the CFA candidate computer architectures. 139-146 - Samuel H. Fuller, Paul Shaman, David Lamb, William E. Burr:
Evaluation of computer architectures via test programs. 147-160 - Mario Barbacci, Daniel P. Siewiorek, Robert J. Gordon, Rosemary Howbrigg, Susan Zuckerman:
An architectural research facility: ISP descriptions, simulation, data collection. 161-173 - James Wagner, Edward Lieblein, Jorge Rodriguez, Harold S. Stone:
Evaluation of the software bases of the candidate architectures for the military computer family. 175-183 - John J. Cornyn, William R. Smith, Aaron H. Coleman, William R. Svirsky:
Life cycle cost models for comparing computer family architectures. 185-199
Microprocessor architectures
- Thomas L. Boardman Jr.:
A microprocessor architecture for digital device implementation. 201-205 - Joseph P. Heid:
A hybrid computer interface for microprocessors. 207-215 - Mario Tokoro, Taisuke Watanabe, Katsura Kawakami, Jun Sugano, Katsuhiko Noda:
PM/II: multiprocessor oriented byte-sliced LSI processor modules. 217-225 - G. Jack Lipovski:
An organization for optical linkages between integrated circuits. 227-236 - H. Lycklama:
UNIX on a micro-processor. 237-242 - Thomas M. McWilliams, Samuel H. Fuller, W. H. Sherwood:
Using LSI processor bit-slices to build a PDP-11: a case study in microcomputer design. 243-253
Software management---planning for a new software development project
- Daniel P. Freedman, Donald C. Gause, Gerald M. Weinberg:
Organizing and training for a new software development project: that big first step. 255-259 - Edward Yourdon:
The choice of new software development methodologies for software development projects. 261-265 - Leon G. Stucki:
Software development tools: acquisition considerations---a position paper. 267-268 - Ray Caudill:
Understanding the developmental life cycle. 269-275 - H. Sam Woodgate:
Management of large scale computer program production. 277-283 - R. Dean Hartwick:
Test planning. 285-294
Computer systems in health care delivery and medical laboratories
- Shelley I. Saffer, David J. Mishelevich, Shirley J. Fox, Victor B. Summerour:
NODAS: the network-oriented data acquisition system for the medical environment. 295-299 - Randal L. Walser, Bruce H. McCormick:
A system for priming a clinical knowledge base. 301-307 - William Hyman, William Lively:
A proposed study to access the impact of microprocessors on health care delivery. 309-312
Advanced concepts in data base management
- Christine A. Montgomery:
Natural language knowledge processing. 313-316 - Peter G. W. Keen:
The intelligence cycle: a differentiated perspective on information processing. 317-320
Education for medical information science
- Allan H. Levy, Thomas T. Chen:
Plans for a program in medical information science. 321-325 - Roger H. Shannon, Marion J. Ball:
The health care computer user: "Where will we find the integrators?". 327-329
Computer hardware design
- J. S. Hebhardt, C. F. Groves, R. Bardas:
NAA: an approach to analyzing backpanel crosstalk. 331-340 - E. A. Wilson:
True liquid cooling of computers. 341-348
Output---results and rhetoric
- Roland R. Bonato, Kenneth C. Yang:
GO system: design and implementation of an output generator. 349-356 - James A. Kutsch Jr.:
A talking computer terminal. 357-362 - Irving L. Wieselman:
Hard-copy computer output and its future. 363-370
Data structures
- M. H. McKinney:
Variable-length hash area entries. 371-377 - W. C. Brantley Jr., Gary W. Leive, Daniel P. Siewiorek:
Decomposition of data flow graphs on multiprocessors. 379-388 - Mark B. Wells:
Implementation and application of a function data type. 389-395
Man-machine interface
- James L. Black:
A general purpose dialogue processor. 397-408 - Lawrence H. Miller:
A study in man-machine interaction. 409-421 - Myron W. Krueger:
Responsive environments. 423-433
Computer technology in the information/library field
- D. B. Baker, R. E. O'Dette:
Computer technology in data-base publishing. 435-441 - Henry L. Mayfield:
Improving corporate information services in an automated word-processing network. 443-448 - Charlene A. Woody, Michael P. Fitzgerald, Francis J. Scott, D. Lee Power:
A subject-content oriented retriever for processing information on-line (SCORPIO). 449-454
Applications of computer networks
- Sandra A. Mamrak, Stephen R. Kimbleton:
Comparing equivalent network services through dynamic processing time prediction. 455-460 - George W. Arnold, Stephen H. Unger:
A structured data base computer conferencing system. 461-467
Computer systems---a global view
- Roger M. Firestone:
An analytic model for parallel computation. 469-474 - Daniel G. Hays:
Dominance relations in computing systems. 475-480
Continuing education for the computer specialist
- Alexander P. Grant, Jack L. Stone:
Structured training: a common-sense approach to developing ADP skills for improved job performance. 481-486 - Lawrence F. Lunetta Jr.:
The role of a formal training program in attracting and developing computer professionals. 487-491
Personal computing---history and foreseeable future
- Jim Warren:
Personal computing: an overview for computer professionals. 493-498
Data base structure and organization
- Donald E. Swartwout, Mark Deppe, James P. Fry:
Operational software for restructuring network databases. 499-508 - Eivind Aurdal, Arne Sølvberg:
A multi-level procedure for design of file organizations. 509-521
Software validation
- John R. Rumsey, David W. Abmayr:
An effective method for measurement and analysis of system software performance. 523-527 - Patrick M. Hoyt:
The Navy Fortran validation system. 529-537 - Gruia-Catalin Roman:
A two-step approach to the validation of software engineering methodologies. 539-544
Communication and education
- Robert S. Hoberman:
Surveying the billion dollar chasm: how educational differences continue to force corporate and data processing executives apart. 545-560 - Kenneth L. Modesitt:
A community of individuals: cooperation and individualization in computer science education. 561-567 - Thomas I. M. Ho:
New perspectives for information systems education. 569-573
Data base applications
- Patricia A. Tracy:
Petroleum Data System: a network of energy information. 575-577 - Ron Ashany:
Applications of SPARCOM data base concepts to a crime combating environment. 579-593 - William A. Bayse, Dean P. Risseeuw, Charles S. Matheny:
Integrated data base concepts and structures for combat models. 595-602
International networks and packet-switching
- Joseph Rinde:
Routing and control in a centrally directed network. 603-608 - John Kopf:
TYMNET as a multiplexed packet network. 609-613 - Toshiharu Takatsuki, Jiro Iimura, Masato Chiba, Masayuki Abe:
Packet switched network in Japan. 615-621
Programming languages---high-level programming for low-level machines
- Shy-Ming Ju:
Modular programming conventions in assembly languages. 623-628 - J. Craig Cleaveland, C. D. Satten:
The design and implementation of a simple programming language for microcomputers. 629-635
Cm*---a multi-microprocessor computer system
- Richard J. Swan, Samuel H. Fuller, Daniel P. Siewiorek:
Cm*: a modular, multi-microprocessor. 637-644 - Richard J. Swan, Andreas von Bechtolsheim, Kwok-Woon Lai, John K. Ousterhout:
The implementation of the Cm* multi-microprocessor. 645-655 - Anita K. Jones, Robert J. Chansler Jr., Ivor Durham, Peter H. Feiler, Karsten Schwan:
Software management of Cm*: a distributed multiprocessor. 657-663
Programming language theory
- Arthur B. Pyster:
Using assertions to improve language translators. 665-668 - Abraham S. Ben David:
A parser analyzer of empirical design for question-answering. 669-678 - Noah S. Prywes:
Automatic generation of computer programs. 679-689
Architecture for data base management
- C. S. Lin:
Sorting with associative secondary storage devices. 691-695 - Lee A. Hollaar, William H. Stellhorn:
A specialized architecture for textual information retrieval. 697-702
Fault-tolerant computing---I
- T. R. N. Rao, Harry J. Reinheimer:
Fault-tolerant modularized arithmetic logic units. 703-710 - Danny C. C. Ko, Melvin A. Breuer:
The design of self-checking multi-output combinational circuits. 711-721
Remote terminal emulation
- Shirley Ward Watkins, Marshall D. Abrams:
Remote terminal emulation in the procurement of teleprocessing systems. 723-727 - E. J. McFaul:
Application of remote terminal emulation in the procurement process. 729-732 - C. T. Arthur:
Remote terminal emulator development and application criteria. 733-739
Software for users and managers
- I. St. J. Hugo:
A survey of structured programming practice. 741-752 - Robert C. Gammill, Herbert J. Shukiar:
An interactive system for aiding management decision making. 753-759
ADP acquisitions---contracting, financing, investing, third-party maintenance
- Howard D. Ponty:
An overview of independent, third-party computer maintenance. 761-764 - Stephen N. Hollman:
A perspective of standard form contracts in the data processing industry. 765-769 - George Kim Johnson:
Small computers and small investors. 771-774
Application of diverse technology and its relation to OCR systems
- David J. Bastyr:
Nondedicated interprocessor communications discipline. 775-777 - Viresh Seth:
An approach to address identification from degraded address data. 779-783 - David P. Himmel:
Signature and facial image compression by boundary encoding. 785-788
Text processing systems
- David A. Luther, Cristine Montgomery, Ronald M. Case:
An interactive text-editing system in support of Russian translation by machine. 789-790 - Charles A. Belov:
Computer generation of conference presentations. 791-794
Fault-tolerant computing II
- Ajoy K. Bose, Stephen A. Szygenda:
Design of a diagnosable and fault-tolerant input/output controller. 795-800 - Paulo T. de Sousa, Francis P. Mathur:
Modular redundancy without voters decreases complexity of restoring organ. 801-806 - Ömür Tasar, Vehbí Tasar:
A study of intermittent faults in digital computers. 807-811
Performance evaluation
- C. A. Rose:
A "calibration-prediction" technique for estimating computer performance. 813-818 - Peter Schneider:
CPU-utilization and secondary-storage performance: the demand for a new secondary-storage technology. 819-825
Discrete mathematical models
- Fred J. Maryanski, Kuang Chan Wu:
Nonlinear parameter estimation for probabilistic finite-state automata. 827-831 - Abraham Waksman:
A comparison between two paradigms of intelligent systems: an example. 833-836 - Serban D. Constantin, T. R. N. Rao:
Concatenated group theoretic codes for binary asymmetric channels. 837-842
Data base---extensions and applications
- James I. Cash, Andrew D. Bailey Jr., Andrew B. Whinston:
The TICOM model: a network data base approach to review and evaluation of internal control systems. 843-854 - Robert H. Bonczek, Clyde W. Holsapple, Andrew B. Whinston:
Design and implementation of an information base for decision makers. 855-863
Applications of computer systems
- Anthony A. Guido, James P. Considine:
Laboratory automation via a VM/370 teleprocessing virtual machine. 865-877 - Michael E. Lesk, Brian W. Kernighan:
Computer typesetting of technical journals on UNIX. 879-888 - P. E. Gober:
The computer in manufacturing: reduction of scrap by computer monitoring. 889-894
Information systems---performance oriented design and evaluation
- John S. Chandler, Thomas G. DeLutis:
A methodology for multi-criteria information system design. 895-905 - Alan F. Sweet, Arthur E. Oldehoeft:
Automated control of concurrency in multi-user hierarchical information systems. 907-916
Computer architecture design
- Kenneth J. Thurber:
Techniques for requirements-oriented design. 919-929 - Ryoichi Yoshikawa, Tatsuo Kimura, Yasuhiro Nara, Hideo Aiso:
A multi-microprocessor approach to a high-speed and low-cost continuous-system simulation. 931-936 - Harrison R. Burris:
Instrumented architectural level emulation technology. 937-946
Special memory architectures
- Tadao Ichikawa, Ken Sakamura, Hideo Aiso:
ARES: a memory, capable of associating stored information through relevancy estimation. 947-954 - Om P. Agrawal, Arthur V. Pohm:
Cache memory systems for multiprocessor architecture. 955-964
The computer in management and business
- Jeffrey Rothmeier:
Choosing a medical billing system. 965-968 - John M. Hemphill, Ronald L. Lancaster:
Designing software for the minicomputer business data processing environment: a case history. 969-972 - W. Harry Vickers:
What to look for in distributed (source) data processing. 973-975
Simulation methods
- Charles H. Sauer, Martin Reiser, Edward A. MacNair:
RESQ: a package for solution of generalized queueing networks. 977-986 - Joseph F. Clark, David M. Cohen:
An approach to simulation of multilevel production systems. 987-989
Personal computing systems
- Ralph Tenny:
Low cost data acquisition and control systems for the computer hobbyist. 991-994 - Wayne Sewell:
Diskomania: a small-system floppy disk operating system. 995-997
Trends in computer stores
- Paul Terrell:
Neighborhood computer stores: the answer to microcomputer marketing. 999-1004
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.