Anthony Ralston
Pages 1-2
The results are presented of an analysis of a probabilistic model of a multiprogrammed computer system with a two-level storage system in which there is sequential dependency of accesses between the devices. Expressions are obtained …
G. S. Shedler
Pages 3-10
When the space allocation for a hash-coded table is altered, the table entries must be rescattered over the new space. A technique for accomplishing this rescattering is presented. The technique is independent of both the length …
Carter Bays
Pages 11-14
James H. Morris
Pages 15-21
Yoichi Muraoka, David J. Kuck
Pages 22-26
A method of analyzing statements in a programming language which can tolerate a considerable inaccuracy in their specification is proposed. This method involves principles at present mainly confined to studies in the area of
…
E. B. James, D. P. Partridge
Pages 27-37
A previous paper presented an efficient algorithm, called the Recomputation Algorithm, for evaluating a rational expression to within any desired tolerance on a computer which performs variable-precision arithmetic operations …
P. L. Richman
Pages 38-40
An algorithm is described for reducing the generalized eigenvalue problem
Ax = &lgr;
Bx to an ordinary problem, in case
A and
B are symmetric band matrices with
B positive definite. If
n is the order of the matrix and
m the bandwidth …
C. R. Crawford
Pages 41-44
This note supplements the paper by V.Y. Lum [2] and elaborates on Table II in McIlroy [3].
Carter Bays
Pages 46-47
The Elliott (I.C.L.) Algol 60 compiler contains a restriction on the sequence of declarations such that no identifier may be used before it is declared. This means that direct mutual recursion between procedures declared in the …
M. Stella Atkins
Pages 47-48
L. J. Gallaher
Pages 49-50
Robert E. Knop
Page 51
G. W. Hill, A. W. Davis
Pages 51-52
M. Stuart Lynn
Page 57
Sumner E. Blount, Louis Fein
Pages 45-46