default search action
ACM Annual Conference 1977: Seattle, Washington, USA
- James S. Ketchel, Harvey Z. Kriloff, H. Blair Burner, Patricia E. Crockett, Robert G. Herriot, George B. Houston, Cathy S. Kitto:
Proceedings of the 1977 annual conference, ACM '77, Seattle, Washington, USA, October 16-19, 1977. ACM 1977, ISBN 978-1-4503-3921-6 - John M. Tyler, Chester M. Smith, Robert W. Drake, Melvin E. Black, Seth S. Cohen, Thomas J. Harris, John B. McLean, Kenneth Sperka, Wood Rehling:
A data base language for FORTRAN. 1-5 - Dan S. Dhaliwal, Benn R. Konsynski:
Data integrity considerations in computer based accounting systems. 6-10 - Tomás Lang, Eduardo B. Fernández, Rita C. Summers:
A system architecture for compile-time actions in databases. 11-15 - Y. E. Lien:
Design and implementation of a relational database on a minicomputer. 16-22 - Dennis P. Geller:
The national software works access to distributed files and tools. 39-43 - Robert E. Millstein:
The National Software Works: A distributed processing system. 44-52 - Ross A. Faneuf:
The National Software Works: Operational issues in a distributed processing system. 53-58 - James A. Senn:
Case studies on the implementation and use of database management systems. 59 - Seymour Sternberg:
Position paper on the implementation and use of database management systems. 60-61 - David Vincent:
The use of Entity Diagrams in data base systems implementation. 62-63 - Burton E. Squires:
Optimization of large sequential data files. 64-67 - Gary L. Hill:
The generative approach to software development. 68-73 - Donald L. Adolphson, Glenn N. Thomas:
Optimum ordered hash tables. 74-78 - Dave W. Wattenbarger, John A. Bailey, Samuel J. Martinez:
Interactive system for controlled vocabulary maintenance. 79-85 - M. H. McKinney:
Query using inferential processing implemented with inverted hashed files. 86-89 - R. J. Dubien, H. D. Covvey, Kenneth C. Sevcik, E. D. Wigle:
Diet: A data independent system for medical applications. 90-95 - Moshe Ben-Bassat, Edward H. Lipnick:
Diagnosis and treatment in MEDAS (medical emergency decisions and assistance system). 96 - Bruce I. Blum, Raymond E. Lenhard Jr.:
Design of an Oncology Clinical Information System. 101-107 - Charles R. Vick:
First generation software engineering system: The Ballistic Missile Defense Software Development System. 108-114 - Kenneth T. de Lavigne:
Basic program design - the Jackson way: An example. 115-124 - Melvin E. Dickover, Clement L. McGowan, Douglas T. Ross:
Software design using: SADT. 125-133 - Anthony I. Wasserman:
The evolution of specification techniques. 134-137 - Bill P. Buckles:
Formal module level specifications. 138-144 - Chin-Kuei Cho:
Structured data interfacing for software systems. 145-152 - Guy L. Steele Jr.:
Debunking the "expensive procedure call" myth or, procedure call implementations considered harmful or, LAMBDA: The Ultimate GOTO. 153-162 - Norman Loongsung Soong:
A program stability measure. 163-173 - Gregory R. Ruth:
Automatic programming: Automating the software system development process. 174-180 - Daniel Schutzer:
On the specification and quantification of software performance objectives. 181-188 - Lawrence Hunter, Jose C. Ingojo:
Conservation of software science parameters across modularization. 189-194 - James P. Skinner:
Automated software control. 195-201 - P. A. Bradford, L. R. Cottrell:
Factors influencing business data processors turnover - a comparative case history. 202-205 - Elias M. Awad:
Job satisfaction as a predictor of tenure. 206-210 - Theodore C. Willoughby:
Computing personnel turnover: A review of the literature. 211-214 - Jack M. Wolfe:
Personnel turnover rates. 215 - Kathryn M. Bartol:
Factors related to EDP personnel commitment to the organization. 216-219 - Mark L. Miller, Ira P. Goldstein:
Problem solving grammars as formal tools for intelligent CAI. 220-226 - Ira P. Goldstein, Brian Carr:
The computer as coach: As athletic paradigm for intellectual education. 227-233 - Keith T. Wescourt, Marian Beard, Laura Gould:
Knowledge-based adaptive curriculum sequencing for CAI: Application of a network representation. 234-240 - Lee Blaine, Robert L. Smith:
Intelligent CAI: The role of the curriculum in suggesting computational models of reasoning. 241-246 - John Seely Brown, Richard R. Burton, Kathy M. Larkin:
Representing and using procedural bugs for educational purposes. 247-255 - Albert L. Stevens, Allan Collins:
The goal structure of a socratic tutor. 256-263 - Fred C. Homeyer:
Why industry hires our graduates. 264-265 - Thomas R. Kohler:
Optical Videodisc technology. 266-270 - Alfred Bork:
The educational possibilities of intelligent videodiscs. 271-274 - Fred W. Glover, Claude McMillan, Darwin Klingman:
The NETFORM concept: A more effective model form and solution procedure for large scale nonlinear problems. 283-289 - Janusz S. Kowalik, E. R. Kamgnia, W. R. Boland:
A conjugate gradient method based on an exponential model. 290-293 - Samuel Kohn, Allan Gottlieb, Meryle Kohn:
A generating function approach to the Traveling Salesman Problem. 294-300 - E. Keppel, D. Kropp:
Interactive Programming by End-users. 301-307 - Richard Conway, Charles Moore Jr., Steven Worona:
An interactive version of the PL/C compiler. 308-314 - Mark Scott Johnson:
The design of a high-level, language-independent symbolic debugging system. 315-322 - Jerry R. Hobbs:
From English descriptions of algorithms into programs. 323-329 - Harvey Abramson:
REGULUS: A general purpose macro processor based on regular expressions part one. 330-335 - Kuo-Chung Tai:
Fault-tolerant string processing by pattern mapping. 336-342 - David K. Hsiao, Krishnamurthi Kannan, Douglas S. Kerr:
Structure memory designs for a database computer. 343-350 - Don M. Warner, Udo W. Pooch:
Model of a multiprogrammed computer system with a multilevel memory hierarchy. 351-357 - Kenneth J. Thurber, Glen R. Kregness:
The Microprogrammed Controller Concept. 358-364 - Kenneth J. Burkhardt, J. J. DeSanto:
The modular logic machine design system for loosely coupled systems. 365-371 - Richard J. Spillman:
A fail-safe redundant architecture for fault-tolerant computing. 372-376 - Patrick D. Goodrich:
Priority determination/discrimination networks: Alternatives to conventional design. 377-380 - Dennis G. Kafura:
Scheduling tasks with critical sections. 381-385 - David S. Burris, Udo W. Pooch:
The dynamic matrix model. 386-391 - John E. Jensen:
A graphical representation of tasks for multiprocessing. 392-398 - Kunio Fukunaga, Tamotsu Kasai:
The Efficient Use of Buffer Storage. 399-403 - Marvin Schaefer, Barry D. Gold, Richard R. Linde, John F. Scheid:
Program confinement in KVM/370. 404-410 - Barry D. Gold, Richard R. Linde, Marv Schaefer, John F. Scheid:
VM/370 security retrofit program. 411-418 - Stan Cohen:
Speakeasy linkules - plug compatible software. 419-424 - James M. Condie:
A SPEAKEASY language extension for economists. 425-427 - M. J. Bailey, D. C. Anderso:
Minicomputer speakeasy in a dynamic graphics environment. 428-433 - Frederic I. Parke, Frank R. Koperda:
Interactive design of visual aids. 434-439 - Franklin C. Crow:
A three-dimensional surface design system. 440-443 - Martin E. Newell, James F. Blinn:
The progression of realism in computer generated images. 444-448 - Henry Fuchs:
Distributing a visible surface algorithm over multiple processors. 449-451 - Marshall D. Abrams:
Techniques for evaluating the effectiveness of interactive computer service. 452-458 - Joel N. Williams:
The construction and use of a general purpose synthetic program for an interactive benchmark on demand paged systems. 459-465 - Selim G. Akl, Monroe M. Newborn:
The principal continuation and the killer heuristic. 466-473 - F. M. Valenti, Zvonko G. Vranesic:
Experiences with CHUTE. 474-478 - Emilio Luque Fadon, Lorenzo Moreno Ruiz, José F. Tirado Fernandez:
High level languages processor architecture. 479-483 - Patrick Shen-Pei Wang:
Recognition of two-dimensional patterns. 484-489 - Glen E. Newton, J. Denbigh Starkey:
Data abstraction in SESPOOL. 490-495 - Michael J. Lemon, Gary Lindstrom, Mary Lou Soffa:
Control Separation in programming languages. 496-501
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.