default search action
ACM Annual Conference 1974: San Diego, CA, USA
- Roger C. Brown, Donald E. Glaze:
Proceedings of the 1974 ACM Annual Conference, San Diego, California, USA, November 1974, Volume 1. ACM 1974, ISBN 978-1-4503-7482-8 - D. Neel, M. Amirchahy:
Semantic attributes and improvement of generated code. 1-10 - William B. Jones, W. J. Thron:
Rounding error in evaluating continued fraction expansions. 11-18 - Yaohan Chu:
Structure of a direct-execution high-level Chinese programming language processor. 19-27 - Nicholas V. Findler, Heinz Klein, R. Channing Johnson, Alexander Kowal, Zachary Levine, John Menig:
Heuristic programmers and their gambling machines. 28-37 - Jane W.-S. Liu, Ai-Tsung Yang:
Optimal scheduling of independent tasks on heterogeneous computing systems. 38-45 - M. K. Gordon, Lawrence F. Shampine:
Interpolating numerical solutions of ordinary differential equations. 46-53 - Jair M. Babad, V. Balachandran, Edward A. Stohr:
Cost evaluation of storage schemes. 54-60 - Charles J. Testa, Douglas B. Dearie:
Human factors design criteria in man-computer interaction. 61-65 - Edward D. Lazowska, Kenneth C. Sevcik:
Scheduling in systems with two scarce resources. 66-73 - Robert P. Blanc:
Assisting network users with a network access machine. 74-78 - Paul B. Schneck:
Semantic preprocessing. 79-81 - Donald J. Rose, Gregory F. Whitten:
Automatic nested dissection. 82-88 - Kenneth L. Modesitt:
An excellent mixture for PSI: Computer science, PLATO, knowledge levels. 89-94 - Aaron M. Tenenbaum:
Compile time type determination in SETL. 95-100 - Gary J. Nutt:
An overview of a multi associative processor study. 101-104 - Martin L. Griss:
The algebraic solution of large sparse systems of linear equations using REDUCE 2. 105-111 - Clifford R. Hollander:
Mechanical construction of type-checking predicates for extensible data types. 112-115 - Rudolph C. Mendelssohn:
The bureau of labor statistic's Table Producing Language (TPL). 116-122 - Walter Reitman, James Kerwin, Robert Nado, Judith Reitman, Bruce Wilcox:
Goals and plans in a program for playing Go. 123-127 - Dorothea A. Klip:
The variable cell length listprocessor VARLIST. 128-132 - Giuseppe Alia, Piero Maestrini:
An approach to optimal partitioning of hypergraphs. 133-139 - Norman L. Schryer:
An extrapolation step-size monitor for solving ordinary differential equations. 140-148 - S. C. Jacobsen, R. B. Jerard:
Computational requirements for control of the Utah arm. 149-155 - W. W. Chu, G. Ohlmacher:
Avoiding deadlock in distributed data bases. 156-160 - Dennis G. Kafura, Vincent Y. Shen:
Scheduling independent processors with different storage capacities. 161-166 - Patricia Griffiths:
SYNVER: A system for the automatic synthesis and verification of synchronization processes. 167-173 - Richard W. Conn, Richard H. Yamamoto:
A model highlighting the security of operating systems. 174-179 - Michael Stonebraker, Eugene Wong:
Access control in a relational data base management system by query modification. 180-186 - Laurent Siklóssy, M. A. Haecker:
Skeleton planning spaces for non-numeric heuristic optimization. 187-192 - Loren P. Meissner:
A method to expose the hidden structure of Fortran programs. 193-198 - Takahiro Sato:
A Classroom Information System for teachers; with focus on the instructional data collection and analysis. 199-206 - Necdet Bulut, Maurice H. Halstead, Rudolf Bayer:
Experimental validation of a structural property of Fortran algorithms. 207-211 - Peter B. Denes, Ira K. Gershkoff:
An interactive system for page layout design. 212-221 - R. A. Davenport:
Design of transaction-oriented systems employing a transaction monitor. 222-230 - Yeh-Hao Chin, Jun-Wun Jou, W. H. Peng, Chen-Chau Yang:
An automatic telephone directory inquiry service system. 231-238 - T. C. Ting, A. P. Jensen:
An on-line interactive audiographic learning system. 239-244 - Edouard J. Desautels, Stuart B. Soffer:
Touch-Tone input techniques: Data entry using a constrained keyboard. 245-253 - Barron C. Housel, Maurice H. Halstead:
A methodology for machine language decompilation. 254-260 - J. Egil Juliussen:
Some computer system implications of magnetic bubble memories. 261-264 - Ralph L. London, David R. Musser:
The application of a symbolic mathematical system to program verification. 265-273 - David B. Wortman:
Language directed computer performance evaluation. 274-278 - Thomas I. M. Ho:
Requirements statement language principles for automatic programming. 279-288 - Victor R. Basili:
Sets and graphs in GRAAL. 289-296 - Philip R. Cohen:
An integration of two language understanding methodologies. 297-305 - Robert C. Chen:
Deadlock prevention in message switched networks. 306-310 - Frederick C. Druseikis, John N. Doyle:
A procedural approach to pattern matching in SNOBOL4. 311-317 - James S. Ketchel, John P. Dolan:
Impact analysis. 318-325 - Robert E. Noonan:
Dynamic algebra. 326-334 - Woodie C. Flowers:
Use of an amputee-computer interactive facility in above-knee prosthesis research. 335-339 - Richard R. Reisman:
The scheduling of multiple disk drives. 340-346 - James G. Linders, William M. van Cleemput:
Design Automation in a computer science curriculum. 347-353 - Robert P. Plummer:
Sensorimotor learning in a simulated physical environment. 354-357 - William D. Tajibnapis:
The design of a topology information maintenance scheme for a distributed computer network. 358-364 - Robert J. Smith:
Design automation at Southern Methodist University. 365-367 - Arnold K. Griffith:
Handprint recognition on the GRAFIX I: : A commercial application of heuristic programming. 368-372 - Peter R. Bono:
Control of design data in the integrated ship design system. 373-379
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.