


default search action
AFIPS NCC 1977: Dallas, Texas, USA
- American Federation of Information Processing Societies: 1977 National Computer Conference, June 13-16, 1977, Dallas, Texas, USA. AFIPS Conference Proceedings 46, AFIPS Press 1977, ISBN 978-1-4503-7914-4

Data base administration
- Jean-Paul De Blasis, Thomas H. Johnson:

Data base administration: classical pattern, some experiences and trends. 1-7 - Michael Ehrensberger:

Data dictionary: more on the impossible dream. 9-11
Computer systems architecture
- C. V. Ramamoorthy, Gary S. Ho, Yih-Wu Han:

Fault tree analysis of computer systems. 13-17 - Stephen Y. H. Su, Richard J. Spillman:

An overview of fault-tolerant digital system architecture. 19-26
Computer security techniques
- Helen M. Wood:

The use of passwords for controlling access to remote computer systems and services. 27-33 - John H. Carson, John K. Summers, James S. Welch Jr.:

A microprocessor selective encryption terminal for privacy protection. 35-38
Computer graphics
- J. R. Warner:

MIDAS: a compositional modeling system. 39-48 - Henry Fuchs, Joe Duran, Brian W. Johnson:

A system for automatic acquisition of three-dimensional data. 49-53
Clinical applications of the computer
- James H. Johnson, Thomas A. Williams, Ronald A. Giannetti, L. J. Schmidt:

Strategies for the successful introduction of computer technology in a mental health care setting: the problem of change. 55-58 - John M. Long, Joseph R. Brashear:

Database management for clinical trials. 59-62 - William L. Sibley, Marsha D. Hopwood, Gabriel F. Groner, William H. Josephs, Norman A. Palley:

Data management for clinical research. 63-68
Data models and their applications
- Charles W. Bachman:

Why restrict the modelling capability of CODASYL data structure sets? 69-75 - Peter P. Chen:

The entity-relationship model: a basis for the enterprise view of data. 77-84 - Edgar H. Sibley, Larry Kerschberg:

Data architecture and data model considerations. 85-96
Computer security risk assessment
- Robert H. Courtney Jr.:

Security risk assessment in electronic data processing systems. 97-104 - S. Glaseman, Rein Turn, R. S. Gaines:

Problem areas in computer security assessment. 105-112
Computer-based information systems for the small firm
- Frederick Francis Newpeck:

Computer based information systems for the small firm: Why? Cost? Caveats, functional needs, contracts. 113-117
Self-organizing/self-optimizing data bases
- Peter M. Stocker:

Storage utilization in a self-organizing data base. 119-122 - Michael Hammer:

Self-adaptive automatic data base design. 123-129
Selection methods for a family of computer architectures
- William E. Burr, Aaron H. Coleman, William R. Smith:

Overview of the military computer family architecture selection. 131-137 - Samuel H. Fuller, Harold S. Stone, William E. Burr:

Initial selection and screening of the CFA candidate computer architectures. 139-146 - Samuel H. Fuller, Paul Shaman, David Lamb, William E. Burr:

Evaluation of computer architectures via test programs. 147-160 - Mario Barbacci, Daniel P. Siewiorek, Robert J. Gordon, Rosemary Howbrigg, Susan Zuckerman:

An architectural research facility: ISP descriptions, simulation, data collection. 161-173 - James Wagner, Edward Lieblein, Jorge Rodriguez, Harold S. Stone:

Evaluation of the software bases of the candidate architectures for the military computer family. 175-183 - John J. Cornyn, William R. Smith, Aaron H. Coleman, William R. Svirsky:

Life cycle cost models for comparing computer family architectures. 185-199
Microprocessor architectures
- Thomas L. Boardman Jr.:

A microprocessor architecture for digital device implementation. 201-205 - Joseph P. Heid:

A hybrid computer interface for microprocessors. 207-215 - Mario Tokoro, Taisuke Watanabe, Katsura Kawakami, Jun Sugano, Katsuhiko Noda:

PM/II: multiprocessor oriented byte-sliced LSI processor modules. 217-225 - G. Jack Lipovski:

An organization for optical linkages between integrated circuits. 227-236 - H. Lycklama:

UNIX on a micro-processor. 237-242 - Thomas M. McWilliams, Samuel H. Fuller, W. H. Sherwood:

Using LSI processor bit-slices to build a PDP-11: a case study in microcomputer design. 243-253
Software management---planning for a new software development project
- Daniel P. Freedman, Donald C. Gause, Gerald M. Weinberg:

Organizing and training for a new software development project: that big first step. 255-259 - Edward Yourdon:

The choice of new software development methodologies for software development projects. 261-265 - Leon G. Stucki:

Software development tools: acquisition considerations---a position paper. 267-268 - Ray Caudill:

Understanding the developmental life cycle. 269-275 - H. Sam Woodgate:

Management of large scale computer program production. 277-283 - R. Dean Hartwick:

Test planning. 285-294
Computer systems in health care delivery and medical laboratories
- Shelley I. Saffer, David J. Mishelevich, Shirley J. Fox, Victor B. Summerour:

NODAS: the network-oriented data acquisition system for the medical environment. 295-299 - Randal L. Walser, Bruce H. McCormick:

A system for priming a clinical knowledge base. 301-307 - William Hyman, William Lively:

A proposed study to access the impact of microprocessors on health care delivery. 309-312
Advanced concepts in data base management
- Christine A. Montgomery:

Natural language knowledge processing. 313-316 - Peter G. W. Keen:

The intelligence cycle: a differentiated perspective on information processing. 317-320
Education for medical information science
- Allan H. Levy, Thomas T. Chen:

Plans for a program in medical information science. 321-325 - Roger H. Shannon, Marion J. Ball:

The health care computer user: "Where will we find the integrators?". 327-329
Computer hardware design
- J. S. Hebhardt, C. F. Groves, R. Bardas:

NAA: an approach to analyzing backpanel crosstalk. 331-340 - E. A. Wilson:

True liquid cooling of computers. 341-348
Output---results and rhetoric
- Roland R. Bonato, Kenneth C. Yang:

GO system: design and implementation of an output generator. 349-356 - James A. Kutsch Jr.:

A talking computer terminal. 357-362 - Irving L. Wieselman:

Hard-copy computer output and its future. 363-370
Data structures
- M. H. McKinney:

Variable-length hash area entries. 371-377 - W. C. Brantley Jr., Gary W. Leive, Daniel P. Siewiorek:

Decomposition of data flow graphs on multiprocessors. 379-388 - Mark B. Wells:

Implementation and application of a function data type. 389-395
Man-machine interface
- James L. Black:

A general purpose dialogue processor. 397-408 - Lawrence H. Miller:

A study in man-machine interaction. 409-421 - Myron W. Krueger:

Responsive environments. 423-433
Computer technology in the information/library field
- D. B. Baker, R. E. O'Dette:

Computer technology in data-base publishing. 435-441 - Henry L. Mayfield:

Improving corporate information services in an automated word-processing network. 443-448 - Charlene A. Woody, Michael P. Fitzgerald, Francis J. Scott, D. Lee Power:

A subject-content oriented retriever for processing information on-line (SCORPIO). 449-454
Applications of computer networks
- Sandra A. Mamrak, Stephen R. Kimbleton:

Comparing equivalent network services through dynamic processing time prediction. 455-460 - George W. Arnold, Stephen H. Unger:

A structured data base computer conferencing system. 461-467
Computer systems---a global view
- Roger M. Firestone:

An analytic model for parallel computation. 469-474 - Daniel G. Hays:

Dominance relations in computing systems. 475-480
Continuing education for the computer specialist
- Alexander P. Grant, Jack L. Stone:

Structured training: a common-sense approach to developing ADP skills for improved job performance. 481-486 - Lawrence F. Lunetta Jr.:

The role of a formal training program in attracting and developing computer professionals. 487-491
Personal computing---history and foreseeable future
- Jim Warren:

Personal computing: an overview for computer professionals. 493-498
Data base structure and organization
- Donald E. Swartwout, Mark Deppe, James P. Fry:

Operational software for restructuring network databases. 499-508 - Eivind Aurdal, Arne Sølvberg:

A multi-level procedure for design of file organizations. 509-521
Software validation
- John R. Rumsey, David W. Abmayr:

An effective method for measurement and analysis of system software performance. 523-527 - Patrick M. Hoyt:

The Navy Fortran validation system. 529-537 - Gruia-Catalin Roman:

A two-step approach to the validation of software engineering methodologies. 539-544
Communication and education
- Robert S. Hoberman:

Surveying the billion dollar chasm: how educational differences continue to force corporate and data processing executives apart. 545-560 - Kenneth L. Modesitt:

A community of individuals: cooperation and individualization in computer science education. 561-567 - Thomas I. M. Ho:

New perspectives for information systems education. 569-573
Data base applications
- Patricia A. Tracy:

Petroleum Data System: a network of energy information. 575-577 - Ron Ashany:

Applications of SPARCOM data base concepts to a crime combating environment. 579-593 - William A. Bayse, Dean P. Risseeuw, Charles S. Matheny:

Integrated data base concepts and structures for combat models. 595-602
International networks and packet-switching
- Joseph Rinde:

Routing and control in a centrally directed network. 603-608 - John Kopf:

TYMNET as a multiplexed packet network. 609-613 - Toshiharu Takatsuki, Jiro Iimura, Masato Chiba, Masayuki Abe:

Packet switched network in Japan. 615-621
Programming languages---high-level programming for low-level machines
- Shy-Ming Ju:

Modular programming conventions in assembly languages. 623-628 - J. Craig Cleaveland, C. D. Satten:

The design and implementation of a simple programming language for microcomputers. 629-635
Cm*---a multi-microprocessor computer system
- Richard J. Swan, Samuel H. Fuller, Daniel P. Siewiorek:

Cm*: a modular, multi-microprocessor. 637-644 - Richard J. Swan, Andreas von Bechtolsheim, Kwok-Woon Lai, John K. Ousterhout:

The implementation of the Cm* multi-microprocessor. 645-655 - Anita K. Jones, Robert J. Chansler Jr., Ivor Durham, Peter H. Feiler, Karsten Schwan:

Software management of Cm*: a distributed multiprocessor. 657-663
Programming language theory
- Arthur B. Pyster:

Using assertions to improve language translators. 665-668 - Abraham S. Ben David:

A parser analyzer of empirical design for question-answering. 669-678 - Noah S. Prywes:

Automatic generation of computer programs. 679-689
Architecture for data base management
- C. S. Lin:

Sorting with associative secondary storage devices. 691-695 - Lee A. Hollaar, William H. Stellhorn:

A specialized architecture for textual information retrieval. 697-702
Fault-tolerant computing---I
- T. R. N. Rao, Harry J. Reinheimer:

Fault-tolerant modularized arithmetic logic units. 703-710 - Danny C. C. Ko, Melvin A. Breuer:

The design of self-checking multi-output combinational circuits. 711-721
Remote terminal emulation
- Shirley Ward Watkins, Marshall D. Abrams:

Remote terminal emulation in the procurement of teleprocessing systems. 723-727 - E. J. McFaul:

Application of remote terminal emulation in the procurement process. 729-732 - C. T. Arthur:

Remote terminal emulator development and application criteria. 733-739
Software for users and managers
- I. St. J. Hugo:

A survey of structured programming practice. 741-752 - Robert C. Gammill, Herbert J. Shukiar:

An interactive system for aiding management decision making. 753-759
ADP acquisitions---contracting, financing, investing, third-party maintenance
- Howard D. Ponty:

An overview of independent, third-party computer maintenance. 761-764 - Stephen N. Hollman:

A perspective of standard form contracts in the data processing industry. 765-769 - George Kim Johnson:

Small computers and small investors. 771-774
Application of diverse technology and its relation to OCR systems
- David J. Bastyr:

Nondedicated interprocessor communications discipline. 775-777 - Viresh Seth:

An approach to address identification from degraded address data. 779-783 - David P. Himmel:

Signature and facial image compression by boundary encoding. 785-788
Text processing systems
- David A. Luther, Cristine Montgomery, Ronald M. Case:

An interactive text-editing system in support of Russian translation by machine. 789-790 - Charles A. Belov:

Computer generation of conference presentations. 791-794
Fault-tolerant computing II
- Ajoy K. Bose, Stephen A. Szygenda:

Design of a diagnosable and fault-tolerant input/output controller. 795-800 - Paulo T. de Sousa, Francis P. Mathur:

Modular redundancy without voters decreases complexity of restoring organ. 801-806 - Ömür Tasar, Vehbí Tasar:

A study of intermittent faults in digital computers. 807-811
Performance evaluation
- C. A. Rose:

A "calibration-prediction" technique for estimating computer performance. 813-818 - Peter Schneider:

CPU-utilization and secondary-storage performance: the demand for a new secondary-storage technology. 819-825
Discrete mathematical models
- Fred J. Maryanski, Kuang Chan Wu:

Nonlinear parameter estimation for probabilistic finite-state automata. 827-831 - Abraham Waksman:

A comparison between two paradigms of intelligent systems: an example. 833-836 - Serban D. Constantin, T. R. N. Rao:

Concatenated group theoretic codes for binary asymmetric channels. 837-842
Data base---extensions and applications
- James I. Cash, Andrew D. Bailey Jr., Andrew B. Whinston:

The TICOM model: a network data base approach to review and evaluation of internal control systems. 843-854 - Robert H. Bonczek, Clyde W. Holsapple, Andrew B. Whinston:

Design and implementation of an information base for decision makers. 855-863
Applications of computer systems
- Anthony A. Guido, James P. Considine:

Laboratory automation via a VM/370 teleprocessing virtual machine. 865-877 - Michael E. Lesk, Brian W. Kernighan:

Computer typesetting of technical journals on UNIX. 879-888 - P. E. Gober:

The computer in manufacturing: reduction of scrap by computer monitoring. 889-894
Information systems---performance oriented design and evaluation
- John S. Chandler, Thomas G. DeLutis:

A methodology for multi-criteria information system design. 895-905 - Alan F. Sweet, Arthur E. Oldehoeft:

Automated control of concurrency in multi-user hierarchical information systems. 907-916
Computer architecture design
- Kenneth J. Thurber:

Techniques for requirements-oriented design. 919-929 - Ryoichi Yoshikawa, Tatsuo Kimura, Yasuhiro Nara, Hideo Aiso:

A multi-microprocessor approach to a high-speed and low-cost continuous-system simulation. 931-936 - Harrison R. Burris:

Instrumented architectural level emulation technology. 937-946
Special memory architectures
- Tadao Ichikawa, Ken Sakamura, Hideo Aiso:

ARES: a memory, capable of associating stored information through relevancy estimation. 947-954 - Om P. Agrawal, Arthur V. Pohm:

Cache memory systems for multiprocessor architecture. 955-964
The computer in management and business
- Jeffrey Rothmeier:

Choosing a medical billing system. 965-968 - John M. Hemphill, Ronald L. Lancaster:

Designing software for the minicomputer business data processing environment: a case history. 969-972 - W. Harry Vickers:

What to look for in distributed (source) data processing. 973-975
Simulation methods
- Charles H. Sauer, Martin Reiser, Edward A. MacNair:

RESQ: a package for solution of generalized queueing networks. 977-986 - Joseph F. Clark, David M. Cohen:

An approach to simulation of multilevel production systems. 987-989
Personal computing systems
- Ralph Tenny:

Low cost data acquisition and control systems for the computer hobbyist. 991-994 - Wayne Sewell:

Diskomania: a small-system floppy disk operating system. 995-997
Trends in computer stores
- Paul Terrell:

Neighborhood computer stores: the answer to microcomputer marketing. 999-1004

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














