[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 27, Issue 10Oct 1984
Reflects downloads up to 05 Jan 2025Bibliometrics
Skip Table Of Content Section
article
Free
Editorial
article
Free
Forum: letters
article
Free
From Washington

Congress is paying careful attention to threats to U.S. high technology from two areas: trademark and patent infringement and proposed foreign violation of U.S. copyright laws.

Computer technology is becoming a major victim of the nearly $8 billion ...

article
Free
ADA:: past, present, future

Since the mid-1970s, the U.S. Department of Defense has been laying the groundwork for a major new computer language that may substantially displace FORTRAN and COBOL in the years ahead. With Ada just now starting to be used, Communications felt it ...

article
Free
article
Free
The first course in computer science needs a mathematics corequisite

First-year computer science students need to know and use a considerable amount of mathematics. A corequired course in discrete mathematics is a good solution.

article
Free
A conference on information law and ethics
article
Free
Optimization criteria for checkpoint placement

Mean response time and availability as optimization criteria for checkpoint placement are better replaced by workable formulas that calculate the ratio between the marginal gain accrued to users who experience system failure and the (presumably slight) ...

article
Free
Dhrystone: a synthetic systems programming benchmark

Reflecting current data on the use of programming language constructs in systems programming, a synthetic benchmark is constructed based on the distribution appearing in the data. The benchmark executes 100 Ada statements that are balanced in terms of ...

article
Free
Building a user-derived interface

Many human-computer interfaces are designed with the assumption that the user must adapt to the system, that users must be trained and their behavior altered to fit a given interface. The research presented here proceeds from the alternative assumption: ...

article
Free
An application of artificial intelligence to operations research

An extension of critical path scheduling to a case where there are alternate methods for completing a project is introduced. Three solution methods are presented including one based on the heuristic search algorithm used in artificial intelligence.

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.