Harry D. Huskey
Page 205
Kirk Sattley
Page 211
Historically there has been strong difference of opinion in the construction of 6-bit (64-character) data codes, based upon whether the code is to be used for communications or data processing. This paper reports on investigation …
R. W. Bemer, H. J. Smith, F. A. Williams
Pages 212-217
Methods for entering random-access files on the basis of one key are briefly surveyed. The widely used chaining method, based on a pseudo-random key transformation, is reviewed in more detail. An efficient generalization of the …
L. R. Johnson
Pages 218-222
Richard Bellman
Pages 222-223
Many statistical procedures require the cumulative area and ordinate of the normal function corresponding to a given deviate. The development of a computer program for the application of probit analysis [1] to bio-assay led to …
Frank B. Baker
Page 224
Two specific projects are in process as part of an advanced planning effort for the development of automated techniques for command and control.
Edward M. Bennett, Rollin P. Mayer, Philip R. Bagley
Pages 235-236
This project is engaged in (a) a program of research into the application of the concepts and techniques of modern data processing to the design of mechanical parts, and (b) the further development of automatic programming systems …
Douglas T. Ross
Page 235
F. M. Tonge
Page 236
E. H. Bareiss, M. A. Fisherkeller
Page 236
Donald Cohen
Page 236
William J. Alexander
Page 238
Russell W. Ranshaw
Page 238
George Mealy
Page 250
In preparation for the widespread use of automatic scanners which will read documents and transmit their contents to other machines for analysis, this report presents a new concept in automatic analysis: the relative-frequency …
H. P. Edmundson, R. E. Wyllys
Pages 226-234