Jean E. Sammet
Page 431
The widespread tendency toward storage of large programs and blocks of text has produced a need for efficient methods of compressing and storing data. This paper describes techniques that can, in most cases, decrease storage
…
Bruce Hahn
Pages 434-436
In many computer operating systems a user authenticates himself by entering a secret password known solely to himself and the system. The system compares this password with one recorded in a Password Table which is availableAll …
Arthur Evans, William Kantrowitz, Edwin Weiss
Pages 437-442
The protection of time sharing systems from unauthorized users is often achieved by the use of passwords. By using one-way ciphers to code the passwords, the risks involved with storing the passwords in the computer can be avoided …
George B. Purdy
Pages 442-445
Although encipherment has often been discussed as a means to protect computer data, its costs are not well established. Five experiments were conducted to measure the cpu time on a CDC 6400 required by additive ciphers programmed …
Theodore D. Friedman, Lance J. Hoffman
Pages 445-449
A necessary and sufficient condition is presented for the existence of a solution to the Gotlieb class-teacher timetable problem. Several relationships are established between the class-teacher timetable problem and graphs with …
G. A. Neufeld, J. Tartar
Pages 450-453
A simple solution to the mutual exclusion problem is presented which allows the system to continue to operate despite the failure of any individual component.
Leslie Lamport
Pages 453-455
The problems of converting programs to decision tables are investigated. Objectives of these conversions are mainly program debugging and optimization in practice. Extensions to the theory of computation and computability are …
John C. Cavouras
Pages 456-462
Tom Lyche, Larry L. Schumaker
Pages 463-467
Keith C. Crandall
Pages 467-469
John McKay, E. Regener
Pages 470-471
Let
R be an open, bounded, simply connected region in the (
x,y)-plane and let (
x*,
y*) be a point in
R. Assuming
R is starlike with respect to (
x*,
y*), we discuss a method for computing Gauss harmonic interpolation formulas for …
A. H. Stroud
Pages 471-475
Kenneth D. Shere
Page 471
Adhemar Bultheel
Page 471
A new interpolation function is introduced. It has infinitely many continuous derivatives and is a composition of ramp functions with smoothed bends called Rounded Ramp Functions. How the interpolation function can be extended …
Rolf O. Lagerlöf
Pages 476-479
CORPORATE CACM STAFF
Page 484
The class of functions defined by ∫
∞0[exp(-
cX)
dt/(1 +
Y) (√
t)
k] where
X and
Y are either
t or
t2 and
k is -1, 0, or 1 can be evaluated by recurrences for all but small values of the parameter
c. These recurrences, given here, …
Forman S. Acton
Pages 480-481