Harry D. Huskey
Page 530
Saul Gorn
Pages 532-542
David K. Jefferson
Page 543
John R. Herndon
Page 544
D. B. MacMillan
Page 544
The paper introduces a new family of codes for detecting and correcting multiple errors in a binary-coded message. The message itself is arranged (conceptually) into a multidimensional rectangular array. The processes of encoding …
Morris Rubinoff
Pages 545-551
This note describes a method for utilizing geometric weight modulus 11 checking digits on a computer which does not have either multiplication or division. In addition some attempt has been made to show some limitations of this …
J. G. Wilson
Pages 551-552
A method is presented for the calculation on a machine of the moments of a probability distribution, necessitating little more than
n additions and
n references to memory for each moment, instead of the minimum of
n multiplication …
J. A. Lechner
Pages 553-554
In this note we attempt to point out why boolean functions are, in general, not applicable in information retrieval systems.
J. Verhoeff, W. Goffman, Jack Belzer
Pages 557-558
In the study of problems in chemical kinetics in ordinary solution, reactions which may be represented by chemical equations of the form
3 A +
B =
C +
D (1) are represented kinetically by the differential equations
d(
C)/
dt =
d …
David Garfinkel, Joseph D. Rutledge, Joseph J. Higgins
Pages 559-562
Donald Robbins
Pages 562-565
This article records observations on Soviet research and technology in cybernetics and computer science, made by the author during a visit to the Soviet Union as a delegate to the IFAC Congress on Automatic Control held in Moscow …
Edward A. Feigenbaum
Pages 566-579
A panel discussion on “What is Proprietary in Mathematical Programming?” was sponsored by the Special Interest Committee on Mathematical Programming of the ACM during a Hall of Discussion/on September 7th at the 16TH National …
L. Wheaton Smith
Page 542