default search action
MARK 1979: New York, NY, USA
- 1979 International Workshop on Managing Requirements Knowledge, MARK 1979, New York, NY, USA, June 4-7, 1979. IEEE 1979, ISBN 978-1-5090-3181-8
- Suzane Landa:
Computer technology in the movie industry. 1-6 - N. Bruce Clark, Michael A. Troutman:
The System Architecture Evaluation Facility-An emulation facility at Rome Air Development Center. 7-12 - Steven F. Sutphen:
Teaching and research experiences with an emulation laboratory. 13-18 - E. A. Wilson:
Simulating the delay in logic networks for large, high-speed computers. 19-28 - Philip H. Enslow Jr.:
Languages for operating systems description, design and implementation. 29-38 - M. H. MacDougall:
The simulation language SIML/I. 39-44 - Steve Tolopka, Herb Schwetman:
Mix-dependent job scheduling - An application of hybrid simulation. 45-50 - Lawrence W. Dowdy, Ashok K. Agrawala:
Parametric instabilities in computer system performance prediction. 51-56 - Imrich Chlamtac, William R. Franta:
Aids to the development of network simulators. 57-66 - William C. Cave, Evelyn Rosenkranz:
A stochastic state space model for prediction of product demand. 67-72 - Avner Ben-Dor, Paul Baker, Jon Selden:
The Bus Link - A microprogrammed development tool for the CMOS/SOS processor system. 73-82 - Aaron N. Silver:
A computer analysis tool for structural decomposition using entropy metrics. 83-88 - Rand B. Krumland:
Interactive modeling systems for managers - Semantic models should underlie quantitative models. 89-94 - Bruce W. Arden, Hikyu Lee:
Modeling regular, process - structured networks. 95-102 - Sally J. Rupert:
The City of New York's integrated financial management system - From mandate to working system in 18 months. 103-106 - Rob Kling, Walt Scacchi:
Recurrent dilemmas of computer use in complex organizations. 107-116 - Donald J. Aharonian:
Project management through the Accomplishment Value Procedure (AVP). 117-124 - Wolfgang Horak, Walter Woborschil:
Textfax - Principle for new tools in the office of the future. 125-134 - C. Wrandle Barth:
Microcomputer programming skills. 135-138 - Charles Lynn, Jean Risley, Robert Wells:
Program conversion - One successful paradigm. 139-146 - S. K. Chang, B. S. Lin, R. Walser:
A generalized zooming technique for pictorial database systems. 147-156 - Franklin C. Crow:
An approach to real-time scan conversion. 157-164 - William L. Paisner:
The evolution and architecture of a high-speed workstation for interactive graphics. 165-174 - Y. H. Chin, S. H. Yu:
A mathematical model for distributed free space. 175-184 - David E. Y. Sarna:
Forecasting computer resource utilization using key volume indicators. 185-192 - H. Pat Artis:
Workflow - A technique for analyzing JES systems. 193-198 - Daniel Klein:
MMPS - A reconfigurable multi-microprocessor simulator system. 199-204 - Raymond S. Lim:
A (31, 15) Reed-Solomon code for large memory systems. 205-208 - Douglas Comer:
English dictionary searching with little extra space. 209-216 - Yahiko Kambayashi, Shuzo Yajima, Osamu Konishi, Takaki Hayashi:
New indices for bibliographic data and their applications. 217-226 - J. L. Mundy:
Visual inspection of metal surfaces. 227-232 - David Landgrebe:
Monitoring the earth's resources from space-Can you really identify crops by satellite? 233-242 - R. Michael Hord:
Digital image shape detection. 243-254 - Faye A. Briggs, King-Sun Fu, Kai Hwang, Janak H. Patel:
PM4 - A reconfigurable multiprocessor system for pattern recognition and image processing. 255-266 - Richard G. Hamlet, Azriel Rosenfeld:
Transportable image-processing software. 267-272 - Sakti Pramanik, Edgar T. Irons:
A data-handling mechanics of on-line text editing system with efficient secondary storage access. 273-278 - Peter Safirstein:
How do we best control the flow of electronic information across sovereign borders? 279-282 - Rein Turn:
Privacy and security in transnational data processing systems. 283-292 - Robert P. Campbell, Gerald A. Sands:
A modular approach to computer security risk management. 293-304 - Eric H. Michelman:
The design and operation of public-key cryptosystems. 305-312 - G. R. Blakley:
Safeguarding cryptographic keys. 313-318 - John P. L. Woodward:
Applications for multilevel secure operating systems. 319-328 - Richard J. Feiertag, Peter G. Neumann:
The foundations of a provably secure operating system (PSOS). 329-334 - Barry D. Gold, Richard R. Linde, R. J. Peeler, Marvin Schaefer, John F. Scheid, P. D. Ward:
A security retrofit of VM/370. 335-344 - E. J. McCauley, P. J. Drongowski:
KSOS - The design of a secure operating system. 345-354 - Gerald J. Popek, Mark Kampe, Charles S. Kline, Allen Stoughton, Michael Urban, Evelyn Walton:
UCLA Secure Unix. 355-364 - T. A. Berson, G. L. Barksdale:
KSOS - Development methodology for a secure operating system. 365-372 - M. A. Padlipsky, K. J. Biba, Richard B. Neely:
KSOS - Computer network applications. 373-382 - James A. Kutsch, Kimberly B. Kutsch:
Considerations in the employment of blind computer professionals. 383-384 - Karen K. Anderson, Philip W. Bravin:
Hiring a deaf computer professional. 385-390 - Daniel Robey:
MIS effects on managers' task scope and satisfaction. 391-396 - M. Lynne Markus:
Some neglected outcomes of organizational use of computing technology - And their implications for systems designers. 397-402 - Kenneth L. Modesitt:
An academic meets industry - Rethinking computer-based education and personalized systems of instruction. 403-406 - Richard H. Austing, Gerald L. Engel:
Recent developments in computers and society research and education. 407-410 - Kathleen Spangler, Hubert Lipinski, Robert Plummer:
Interactive monitoring of computer-based group communication. 411-414 - Lynn L. Peterson:
The status of women in health science computing. 415-418 - Helen M. Wood:
Women and minorities in the computer professions. 419-424 - Charles L. Aird, Barbara H. Todd:
Computers in judicial administration. 425-442 - Kent W. Colton:
Police and computer technology - The expectations and the results. 443-454 - Raphael A. Finkel, Marvin H. Solomon, Michael L. Horowitz:
Distributed algorithms for global structuring. 455-460 - Robert M. Monroe, Ronald J. Srodawa, Franklin H. Westervelt:
The tree-structured distributed network front-end processor architecture. 461-468 - Mohamed Gawdat Gouda:
Analysis of real-time control systems by the model of packet nets. 469-480 - Jaynarayan H. Lala, Charles J. Smith:
Performance and economy of a fault-tolerant multiprocessor. 481-492 - Curtis R. Gowan:
Serviceability features of the HP 300 small business computer. 493-498 - Ken Sakamura, Tatsushi Morokuma, Hideo Aiso, Hajime Iizuka:
Automatic tuning of computer architectures. 499-512 - George R. Lewis, J. Shirley Henry, Brian P. McCune:
The BTI 8000-Homogeneous, general-purpose multiprocessing. 513-528 - Howard Jay Siegel, Robert J. McMillen, Philip T. Mueller Jr.:
A survey of interconnection methods for reconfigurable parallel processing systems. 529-542 - Steven I. Kartashev, Svetlana P. Kartashev, C. V. Ramamoorthy:
Adaptation properties for dynamic architectures. 543-556 - Akira Sekino, Takuo Kitamura:
Architectural considerations of the NEC mass data file subsystem. 557-564 - Larry Kwok-Woon Lai:
Error-oriented architecture testing. 565-576 - Yashwant K. Malaiya, Stephen Y. H. Su:
A survey of methods for intermittent fault analysis. 577-586 - Kells A. Elmquist:
Architectural and design perspectives in a modular multi-microprocessor, the DPS-1. 587-594 - J. R. Hamstra:
Work flow view of a distributed application. 595-604 - John E. MacDonald:
The use of self-inverse program primitives in system evaluation. 605-613 - Robert M. Keller, Gary Lindstrom, Suhas Patil:
A loosely-coupled applicative multi-processing system. 613-622 - Ian Watson, John R. Gurd:
A prototype data flow computer with token labelling. 623-628 - Kim P. Gostelow, Robert E. Thomas:
A view of dataflow. 629-636 - Viswanathan Santhanam:
A hardware-independent virtual architecture for PASCAL. 637-648 - G. J. Battarel, R. J. Chevance:
Design of a high-level language machine. 649-656 - Yaohan Chu, Edward Ray Cannon:
A programming language for high-level architecture. 657-666 - C. V. Ramamoorthy, Benjamin W. Wah:
Data management in distributed data bases. 667-680 - Georges Gardarin:
A unified architecture for data and message management. 681-688 - Eric K. Clemons:
Design of a prototype ANSI/SPARC three-schema data base system. 689-696 - Jay-Louise Weldon:
The practice of data base administration. 709-712 - Gilles M. E. Lafue:
An approach to automatic maintenance of semantic integrity in large design data bases. 713-716 - E. L. Lozinskii:
On query-answering in relational data bases. 717-720 - James F. Wirth:
ASTROL - An associative structure-oriented language. 721-726 - Amar Mukhopadhyay, Alireza Hurson:
An associative search language for data management. 727-732 - I. M. Osman:
Updating defined relations. 733-740 - Randy H. Katz:
Performance enhancement for relational systems through query compilation. 741-748 - E. J. McBride, A. B. Tonik, G. R. Finnin:
System considerations for predicting mass storage subsystem behavior. 749-760 - Thomas J. Walsh:
A software reliability study using a complexity measure. 761-768 - Amrit L. Goel, Kazu Okumoto:
A Markovian model for reliability and other performance measures of software systems. 769-774 - Vasu S. Alagar, C. Soockan:
Partial match retrieval for non-uniform query distributions. 775-780 - Sandra A. Mamrak, Paul D. Amer:
Comparing interactive computer services - Theoretical, technical and economic feasibility. 781-788 - Domenico Ferrari:
Characterizing a workload for the comparison of interactive services. 789-796 - Beverly O'Neal, Ronald Segal:
Control of computing funds and resources in a networking environment. 797-804 - Norman R. Nielsen:
The economic impact of network affiliation upon institutions of higher learning. 805-812 - Philip A. Bernstein, Nathan Goodman:
Approaches to concurrency control in distributed data base systems. 813-820 - Helen M. Wood, Stephen R. Kimbleton:
Access control mechanisms for a network operating system. 821-830 - Charles S. Kline, Gerald J. Popek:
Public key vs. conventional key encryption. 831-838 - Robert Stotz, Ronald Tugender, David Wilczynski, Donald Oestreicher:
SIGMA - An interactive message service for the Military Message Experiment. 839-846 - David Wilczynski, Ronald Tugender, Donald Obstreicher:
The SIGMA experience - A study in the evolutionary design of a large software system. 847-854 - Robert Stotz, Paul Raveling, Jeff Rothenberg:
The terminal for the Military Message Experiment. 855-862 - Jeff Rothenberg:
On-line tutorials and documentation for the SIGMA message service. 863-868 - Ronald Tugender:
Maintaining order and consistency in multi-access data. 869-874 - Daniel Minoli:
Exact solution for the initialization time of packet radio networks with two station buffers. 875-886 - Robert J. T. Morris:
Fixing timeout intervals for lost packet detection in computer communication networks. 887-892 - G. Pujolle:
Comparison of some end-to-end flow control policies in a packet-switching network. 893-904 - Richard J. Chung, A. M. Rybczynski:
Alternatives for providing highly reliable access to X.25 networks. 905-916 - Jane W.-S. Liu, Izumi Suwa, Robert E. Stepp, Sergio M. Hinojosa, Tsutoma Utsuqi:
A fail-safe distributed local network for data communication. 917-926 - Daniel Schutzer:
An analysis of a distributed switching network with integrated voice and data in support of command and control. 927-934 - Daniel J. Paulish:
The exploratory system control model multi-loop network. 935-940 - John D. Musa:
Software reliability measures applied to system engineering. 941-946 - Gruia-Catalin Roman:
Verification procedures supporting software systems development. 947-956 - Ronald L. Price:
A language for distributed processing. 957-968 - Walid A. Abu-Sufah, David J. Kuck, Duncan H. Lawrie:
Automatic program transformations for virtual memory computers. 969-974 - Wilson Vicente Ruggiero, Gerald Estrin, Robert S. Fenchel, Rami R. Razouk, D. Schwabe, Mary K. Vernon:
Analysis of data flow models using the SARA graph model of behavior. 975-988 - Norman F. Schneidewind:
Software metrics for aiding program development and debugging. 989-994 - Ned Chapin:
A measure of software complexity. 995-1002 - Alan R. Feuer, E. B. Fowlkes:
Relating computer program maintainability to software measures. 1003-1012 - Jayashree Ramanathan, Meera Blattner:
Program forms and program form analysers for high-level structured design. 1013-1020 - Sylvia B. Sheppard, Bill Curtis, Phil Milliman, M. A. Borst, Tom Love:
First-year results from a research program on human factors in software engineering. 1021-1028 - D. J. Pearson:
The use and abuse of a software engineering system. 1029-1036 - Jean-Paul Renault:
The integrated control/distributed power software development shop. 1037-1042 - Norman K. Sondheimer:
On the fate of software enhancements. 1043-1050 - Paul Oliver:
Experiences in building and using compiler validation systems. 1051-1058 - Joe W. Duran:
Automatic program synthesis via synthesis of loop-free segments. 1059-1062 - Lynn L. Peterson:
Semantic similarity analysis - A computer-based study of meaning in noun phrases. 1063-1070 - Christina L. Jette:
Heuristic control of design-directed program transformations. 1071-1078 - A. L. Davis:
A data flow evaluation system based on the concept of recursive locality. 1079-1086 - William B. Ackerman:
Data flow languages. 1087-1095
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.