default search action
AFIPS NCC 1976: New York, NY, USA
- American Federation of Information Processing Societies: 1976 National Computer Conference, 7-10 June 1976, New York, NY, USA. AFIPS Conference Proceedings 45, AFIPS Press 1976, ISBN 978-1-4503-7917-5
Introduction
- Stanley Winkler:
A view of the world of computing as seen at the 1976 National Computer Conference. 1-6 - Herbert R. J. Grosch:
Conference maketh a ready man Or, twenty-five years in the better joints. 7-13 - Heinz Zemanek:
Computer prehistory and history in central Europe. 15-20 - Richard Williams:
Early computers in Europe. 21-29
Computers and people: societal concerns
- Alexander S. Douglas:
The U.K. privacy white paper 1975. 33-38 - Jerry M. Rosenberg:
Human and organizational implications of computer privacy. 39-43 - John Salasin:
A control systems model of privacy. 45-51 - Peter S. Browne:
Computer security: a survey. 53-63 - Donn B. Parker:
Computer abuse perpetrators and vulnerabilities of computer systems. 65-73 - Norman R. Nielsen, Brian Ruder, David H. Brandin:
Effective safeguards for computer system integrity. 75-84 - Frank R. Heinrich, David J. Kaufman:
A centralized approach to computer network security. 85-90 - Harrison R. Burris:
Computer network cryptography engineering. 91-96 - Ehud Gudes, Harvey S. Koch, Fred A. Stahl:
The application of cryptography for data base security. 97-107 - Whitfield Diffie, Martin E. Hellman:
Multiuser cryptographic techniques. 109-112 - Herbert S. Bright, Richard L. Enison:
Cryptography using modular software elements. 113-123 - Ingemar Ingemarsson:
Analysis of secret functions with application to computer cryptography. 125-127 - D. Kaufman, K. Auerbach:
A secure, national system for electronic funds transfer. 129-138 - Joseph Mazzetti:
Design considerations for electronic funds transfer switch system development. 139-146 - Frank Backman:
Are computers ready for the checkless society? 147-156
Computers and people: The computer profession
- H. W. Bomzer:
Personware. 157-160 - Carolyn M. Dunning:
From data entry supervisor to data entry specialist. 161-164 - Roy F. Keller:
A modern beginning programming course. 165-170 - Charles J. Prenner, Alfred Z. Spector:
Instructional computer systems for higher education. 171-177 - Jack L. Stone, Alexander P. Grant:
ADP training systems: organization-wide training for increased productivity. 179-183 - Joseph Scala:
Teaching art through computer graphics. 185-189 - Patsy Scala:
Artists and computers. 191-194 - Thomas A. DeFanti:
The digital component of the circle graphics habitat. 195-203 - Monique Truquet:
Braille grade II translator program. 205-207 - Gerald A. Raitzer, Gregg C. Vanderheiden, Craig S. Holt:
Interfacing computers for the physically handicapped: a review of international approaches. 209-216 - Ching Y. Suen, Michael P. Beddoes, James C. Swail:
The spellex system of speech aids for the blind in computer applications. 217-220 - Robert E. Savoie, J. S. Brugler, James C. Bliss:
Development of a hand-held talking calculator for the blind. 221-225
Computers and people: issues in computing
- David H. Ahl:
Survey of public attitudes toward computers in society. 227-230 - Carol H. Kastner, William G. Underhill:
Survey of public access to computing. 231-233 - Stephen B. Gray:
Building your own computer. 235-239
Computers and people: applications serving people
- John C. Mazziotta, H. K. Huang:
THREAD (three-dimensional reconstruction and display) with biomedical applications in neuron ultrastructure and computerized tomography. 241-250 - David J. Mishelevich, Peter Stastny, R. Gail Ellis, Susan G. Mize:
Regional kidney transplant matching: the RENTRAN interactive approach. 251-260 - Margaret Oakley Dayhoff, Winona C. Barker, R. M. Schwartz, Bruce C. Orcutt, Lois T. Hunt:
Data base for protein sequences. 261-266 - Lynette Hirschman, Ralph Grishman, Naomi Sager:
From text to structured information: automatic processing of medical reports. 267-275 - Shi-Kuo Chang, M. O'Brien, J. Read, R. Borovec, W. H. Cheng, Jyh-Sheng Ke:
Design considerations of a database system in a clinical network environment. 277-286 - N. I. Moiseeva, M. Yu. Simonov, V. M. Sysuev:
Correct problem statements in biomedical data processing. 287-294 - Harold H. Shlevin:
An adaptable, modular data - collection system suitable for scientific experimentation: analog to digital transformation, short - term digital storage, formatted digital tape - recording, and computer entry of experimental data. 295-300 - Rein Turn:
Classification of personal information for privacy protection purposes. 301-307 - Irving J. Chasen:
Philadelphia justice information system. 309-314 - Genevieve Greenwald-Katz:
Computers in architecture. 315-320
Systems: computer systems
- Margaret K. Butler:
Prospective capabilities in hardware. 323-336 - Robert A. Koenig:
An evaluation of the East German RYAD 1040 system. 337-340 - Reg A. Kaenel:
MagicScore bowling scorer: a microprocessor application for fun and profit. 341-347 - Earl D. Sacerdoti, Richard E. Fikes, René Reboh, Daniel Sagalowicz, Richard J. Waldinger, B. Michael Wilber:
QLISP: a language for the interactive development of complex systems. 349-356 - Richard William Watson:
User interface design issues for a large interactive system. 357-364 - Carl E. Krebs, C. Bumgardner, T. Northwood:
Terminal transparent display language (TTDL). 365-371 - Peter Schneider:
Working set restoration: a method to increase the performance of multilevel storage hierarchies. 373-380 - Satish L. Rege:
Performance and power dissipation analysis for CCD memory systems. 381-391 - Murray Edelberg, L. Robert Schissler:
Intelligent memory. 393-400 - Algirdas Avizienis:
Approaches to computer reliability: then and now. 401-411 - K. H. (Kane) Kim, C. V. Ramamoorthy:
Failure-tolerant parallel programming and its supporting system architecture. 413-423
Systems: systems management
- Ephraim R. McLean, John V. Soden:
Strategic planning for MIS: a conceptual framework. 425-432 - David S. Alberts:
The economics of software quality assurance. 433-442 - Frank Tsui, Lew Priven:
Implementation of quality control in software development. 443-449 - Robert W. Otto, Mark Auerbach:
A computer performance prediction model. 451-455 - Alan Jay Smith:
A queueing network model for the effect of data compression on system efficiency. 457-465
Systems: networking
- Frank J. Martin Jr.:
The federal communications commission and major policy matters affecting computer communication. 467-476 - Antony Rybczynski, B. Wessler, R. Despres, J. Wedlake:
A new communication protocol for accessing data networks: the international packet-mode interface. 477-482 - Louis Pouzin:
Virtual circuits vs. datagrams: technical and political problems. 483-494 - Robert Rosenthal:
Network access techniques: a review. 495-500 - Robert H. Anderson, James J. Gillogly:
The RAND intelligent terminal agent (RITA) as a network access aid. 501-509 - Joe B. Wyatt, Vincent I. Polley:
Network interface systems: an evaluation by simulation. 511-521 - David L. Mills:
An overview of the distributed computer network. 523-531 - William F. Mann, Severo M. Ornstein, Michael F. Kraley:
A network-oriented multiprocessor front-end handling many hosts and hundreds of terminals. 533-540 - Dieu Huynh, Hisashi Kobayashi, Franklin F. Kuo:
Design issues for mixed media packet switching networks. 541-549 - Stephen R. Kimbleton, Richard L. Mandell:
A perspective on network operating systems. 551-559 - James E. White:
A high-level framework for network-based resource sharing. 561-570 - Carl A. Sunshine:
Factors in interprocess communication protocol efficiency for computer networks. 571-576 - Wesley W. Chu:
Performance of file directory systems for data bases in star and distributed networks. 577-587 - Fouad A. Tobagi, Stanley E. Lieberson, Leonard Kleinrock:
On measurement facilities in packet radio systems. 589-596 - Adrian V. Stokes, David L. Bates, Peter T. Kirstein:
Monitoring and access control of the London node of ARPANET. 597-603
Systems: business and industry systems
- Howard Lee Morgan:
Office automation project: a research perspective. 605-610 - James H. Carlisle:
Evaluating the impact of office automation on top management communication. 611-616 - J. Christopher Burns:
The evolving market for word processing and typesetting systems. 617-623 - William J. Hammond:
The computer as a tool in the processing of text for periodical publications. 625-626 - Dennis R. Neary, Terrence H. Coyle, Don M. Avedon:
The integration of microfilm and the computer. 627-637 - Arnold K. Griffith:
The AIDUS system: automated capture, update and republication of maintenance manuals. 639-642 - Daniel P. Siewiorek, Mario Barbacci:
The CMU RT-CAD system: an innovative approach to computer aided design. 643-655 - Richard B. Wise, Douglas J. Martin:
Some computer-related advancements for enhancing U. S. shipyard productivity. 657-669 - Donald Liu, Matias E. Wojnarowski:
Computer analysis and evaluation of marine structures. 671-682 - Howard R. McGlauflin:
Evolution of automation in terminal air traffic control. 683-688 - E. H. Reitan, Sabina H. Saib:
Computer graphics in an automatic aircraft landing system. 689-700 - Murray Turoff, Marion Spector:
Libraries and the implications of computer technology. 701-707 - Vivian S. Sessions:
The expanding role of on-line interactive searching. 709-712
Science and technology: computer and data base architecture
- Tomlinson Gene Rauscher, Ashok K. Agrawala:
Developing application oriented computer architectures on general purpose microprogrammable machines. 715-722 - Gérard G. Baille, Jean-Pierre Schoellkopf:
A pipeline polish string computer. 723-731 - Yaohan Chu:
Evolution of computer memory structure. 733-748 - Calvin K. Tang:
Cache system design in the tightly coupled multiprocessor system. 749-753 - Fernando C. Colon, Robert M. Glorioso, Walter H. Kohler, Dominic W. Li:
Coupling small computers for performance enhancement. 755-764 - Neil Wilhelm, David Pessel, Charles Merriam:
The CERF computer system. 765-768 - Gary J. Nutt:
A parallel processor for evaluation studies. 769-775 - H. Sechovsky, S. Jura:
Asynchronous speed-independent arbiter in a form of a hardware control module. 777-782 - Jagan P. Agrawal, V. Umapathi Reddy:
Log-sum multiplier. 783-787 - Grayce M. Booth:
Distributed information systems. 789-794 - Michael Hammer:
Error detection in data base systems. 795-801 - N. Phillip Ross, Meyer Katzper:
A framework for federal health data collection. 803-810 - Donald R. Anderson:
Data base processor technology. 811-818 - Eduardo B. Fernández, Rita C. Summers:
Integrity aspects of a shared data base. 819-827 - Larry Clough, William D. Haseman, Yuk Ho So:
Designing optimal data structures. 829-837 - John D. Joyce, N. N. Oliver:
REGIS: a relational information system with graphics and statistics. 839-844 - Moshé M. Zloof:
Query-by-example: operations on hierarchical data bases. 845-853 - Stewart A. Schuster, Esen A. Ozkarahan, Kenneth C. Smith:
A virtual memory system for a relational associative processor. 855-862 - Jay-Louise Weldon:
Managing the census data base: data description, acquisition, and manipulation. 863-867 - Trevor John Bentley:
Defining management's information needs. 869-876 - Roy H. Igersheim:
Managerial response to an information system. 877-882 - Carl R. Gerami, T. Russell Shields, Richard J. Weiland:
Transaction queuing and cylinder logic access in the Time, Inc. magazine/book/record system. 883-888
Science and technology: software
- Edward W. Birss, James P. Fry:
Generalized software for translating data. 889-897 - William E. Howden:
Experiments with a symbolic evaluation system. 899-908 - Leon J. Osterweil, Lloyd D. Fosdick:
Some experience with DAVE: a Fortran program analyzer. 909-915 - Julius A. Archibald:
A dynamic (FORTRAN) programming system. 917-925 - Robert C. Gammill:
GPMX: a portable general purpose macro processor adapted for preprocessing FORTRAN. 927-933
Science and technology: computer science
- R. D. Gordon, Maurice H. Halstead:
An experiment comparing Fortran programming times with the software physics hypothesis. 935-937 - Harvey J. Greenberg, James E. Kalan:
Representations of networks. 939-943 - Fred W. Glover, Darwin Klingman:
A practitioner's guide to the state of large scale network and network-related problems. 945-950 - Behrooz Parhami:
Low-cost residue number systems for computer arithmetic. 951-956 - James R. Pinkert:
Very fast computation of polynomial remainder sequence coefficient signs. 957-961 - Thomas G. Windeknecht, Henry D'Angelo:
System theoretic implications of numerical methods applied to the solution of ordinary differential equations. 963-972 - Gruia-Catalin Roman, David Garfinkel, Carl B. Marbach:
Memory conserving efficient methods for solving large sets of stiff differential equations. 973-978 - Gordon J. Vanderbrug:
A geometric analysis of heuristic search. 979-986 - W. F. Smyth, Ilona Arany:
Another algorithm for reducing bandwidth and profile of a sparse matrix. 987-994 - John P. Dolan, James S. Ketchel:
Business opportunity analysis. 995-998 - Armen Nahapetian:
A "unique number" generator. 999-1000 - Akira Taneda, Hikaru Oku, Daiji Namba:
An on-line test program for peripheral devices. 1001-1006 - David L. Retz, Bruce W. Schafer:
Structure of the ELF operating system. 1007-1016 - Thomas H. Naylor:
Elements of a planning and modeling system. 1017-1026
Science and technology: applications of computer science
- Sally Yeates Sedelow:
Analysis of "natural" language discourse. 1027-1034 - Bruce Cornwell, Katharine Cornwell:
Computer animated film systems: a rat's nest of trade-offs. 1035-1038 - Stan Cohen:
Speakeasy: a window into a computer. 1039-1047 - Cynthia Jane Solomon, Seymour Papert:
A case study of a young child doing turtle graphics in LOGO. 1049-1056 - James C. Bezdek:
Feature selection for binary data: medical diagnosis with fuzzy sets. 1057-1068 - Richard A. LeFaivre:
Procedural representation in a fuzzy problem-solving system. 1069-1074 - Richard O. Duda, Peter E. Hart, Nils J. Nilsson:
Subjective bayesian methods for rule-based inference systems. 1075-1082
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.