default search action
15th ACM Southeast Regional Conference 1977: Hattiesburg, MS, USA
- Danny R. Carter:
Proceedings of the 15th annual Southeast regional conference, ACM-SE 1977, Hattiesburg, Mississippi, USA, April 18-20, 1977. ACM 1977, ISBN 978-1-4503-7302-9
Software design I
- Daniel Martin:
An emulator used to teach compiler design. 1-10 - Hal Pitts:
An experiment in the design of a basic interpreter. 11-29 - David W. Curbow:
A cross assembler for the Texas Instruments 960E mini computer. 30-35 - George T. Dupont:
Development of a minimal operating system for the ALTAIR 8800 microcomputer. 36-45
Simulation applications
- Ralph B. Bisland:
A computer assisted instruction simulation model for teaching play callers football strategy. 46-57 - S. E. Brown:
A time-sharing exercise in international relations. 58-61 - Sue Scott:
Simulation of southern corn rust damage in maize. 62-72
Programming theory I
- Mehdi Jazayeri:
Programmer productivity: program efficiency and improvement. 73-79 - John H. Crawford, Mehdi Jazayeri:
An algorithm for hoisting. 80-93
Computer systems architecture
- Jeffrey W. Graham, James G. Stringer:
Evaluation and experience with the IBM series/1 minicomputer. 94-101 - Edwin Adema:
A structural data acquisition system. 102-114 - Ricki B. Rovner, Gerald R. Kane:
A computer network implemented on a single multi-port timeshare facility. 115-125
Programming theory II
- Amauri A. Arroyo, Donald G. Childers:
Toward the automatic software exorciser. 126-139 - Ralph D. Jeffords, David B. Benson:
A vector encoding technique applicable to tabular parsing methods. 140-153 - Kuo-Chung Tai:
The recovery of parsing configurations for LR(1) parsers. 154-160
Medical applications I
- William Cunningham, Lloyd R. Smith, Steven E. Wixson, Sanford P. Bishop:
Top-down programming of an interactive cardiac pathology data system. 161-169 - Bonnie Pleasants Dumas:
An analytic system for the analysis of covariance a mini-computer application. 170-175 - Lindley C. Paxton:
Suggested computer applications in veterinary medicine. 176-181
Data base systems: design and testing I
- Wayne D. Dominick, Sharad K. Agarwal:
MADAM: multics approach to data access and management. 182-195 - Russell D. Farr, Deborah W. Hartsog, Richard A. Weller:
ALFORM: A Language FOr Record Maintenance. 196-207 - Lucille H. McHenry:
Test generation using the COBOL data base management system. 208-216 - Geraldine Chase, Nosratollah Khalili, Norman Eldridge:
Electronic funds transfer language. 217-222
University computing centers and educational applications
- Wallace E. Killcreas:
Billing for computer services in a university environment. 223-235 - Everett W. Crowley:
Computer video classes. 236-237 - Ralph G. Selfridge:
Fun and games, good and bad, with APL. 238-244 - Patsy Nichols:
The view from the bottom. 245-249
Software design II
- Russell Kegley:
Software extensibility and portability with macro processors. 250-263 - Barry M. Barlow:
Design and implementation of an interpretive dump analyzer. 264-274 - Mike Treat:
Implementation of a file management system using a sigma 9 simulator. 275-283
Data base applications and their social impact
- Walter M. Mathews, Shirley A. Hallblade, Kathleen Sullivan:
Public perceptions of the computer impact on society. 284-292 - James P. Golson:
The impact of technological change on organization management. 293-299 - Kay Thomas:
Implementation of a college selection system with SPITBOL. 300-307 - Patti Westmoreland:
KAOS-a user oriented information retrieval system. 308-314
Artificial intelligence applications
- Kevin D. Reilly:
Application of artificial intelligence methodology in the study of abnormal behavior. 315-327 - Robert M. Hyatt:
BLITZ V, a computer chess program. 328-342 - John S. George:
Digital modeling of biological circuitry and considerations of electroneural prosthesis or a computer scientist's look at the body's nervous system. 343-355
Data base systems: design and testing II
- Joseph E. Urban, Wayne D. Dominick:
Design and implementation considerations for monitoring and evaluating information systems. 356-369 - M. H. McKinney:
Multi-attribute inverted files implemented with hashing. 371-376 - Gautam Kar:
Construction of optimal indexes. 377-387
Scientific data acquisition
- John J. Crowe, Steven A. Von Edwins, M. Guyton Turner:
A data analysis system for processing landsat multispectral data. 388-394 - Martha Kull, T. F. Higginbotham:
Solar enery data collection, editing, and compression. 395-401
Programming theory III
- J. A. Winkler III, Edwin Towster:
A human factors study of structured programming techniques. 402-408 - Edward P. Katz, Edwin Towster:
A relational approach to a nonprocedural language. 409-413 - Joseph E. Urban, Edwin Towster:
Specifications of computer programs using Hoare tree formalism. 414-425
Programming theory IV
- Ward Douglas Maurer:
The modification index method of generating verification conditions. 426-440 - Edwin Towster:
An introduction to chunk structure. 441-450 - Earl J. Demaree:
An alternative to chaos or maintainable systems. 451-457 - Pentti A. Honkanen:
A fast minimal storage computational algorithm for determining a minimal spanning tree in a graph. 458-469
Software design III
- Mack W. Alford, Pei Hsia, Fred Petry:
Use of software engineering methodologies in a computer science curriculum. 470-482 - David R. Fashenpour:
The 8800 CHAR-MUX line concentrator. 483-497 - Susan T. Dean, Steven E. Wixson:
Compiler writing in FORTRAN on a small computer. 498-510
Medical applications II
- Alden W. Dudley Jr., Henry F. Winterfeldt:
The potential for compressed speech in medical education. 511-525 - Frank K. Nagurney, Harvey Wolfe, Larry J. Shuman:
Linear programming applications to the evaluation of the pre-hospital care phase of an emergency medical services system. 526
Technical papers
- Larry Pearson, Steve Teicher:
Systems design by levels of integration. 527 - J. Richard Dowell:
An overview of privacy and security requirements for data bases. 528-536
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.