Roger M. Needham, Michael D. Schroeder
Pages 991-992
Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for …
Roger M. Needham, Michael D. Schroeder
Pages 993-999
A new algorithm is presented for finding all primes between 2 and
n. The algorithm executes in time proportional to
n (assuming that multiplication of integers not larger than
n can be performed in unit time). The method hasarithmetic …
David Gries, Jayadev Misra
Pages 999-1003
A new generation of computer terminals allows tab settings to be selected and set by the computer. This feature can be used to reduce the number of characters that are needed to represent a document for transmission and printing …
James L. Peterson, James R. Bitner, John H. Howard
Pages 1004-1007
The findings of a study designed to address the pressing problems associated with the strategic planning of the computing effort in higher education are presented here. A planning methodology was developed and tested through
…
James C. Wetherbe, V. Thomas Dock
Pages 1008-1015
In this paper an algorithm to detect logical errors in a limited-entry decision table and in loop-free programs with embedded decision tables is developed. All the conditions in the decision tables are assumed to be inequalities …
M. Ibramsha, V. Rajaraman
Pages 1016-1025
Optimal decision table conversion has been tackled in the literature using two approaches, dynamic programming and branch-and-bound. The former technique is quite effective, but its time and space requirements are independent …
Alberto Martelli, Ugo Montanari
Pages 1025-1039
A broadcast packet is for delivery to all nodes of a network. Algorithms for accomplishing this delivery through a store-and-forward packet switching computer network include (1) transmission of separately addressed packets,practical …
Yogen K. Dalal, Robert M. Metcalfe
Pages 1040-1048
A data abstraction can be naturally specified using algebraic axioms. The virtue of these axioms is that they permit a representation-independent formal specification of a data type. An example is given which shows how to employ …
John V. Guttag, Ellis Horowitz, David R. Musser
Pages 1048-1064
Hierarchical programming is being increasingly recognized as helpful in the construction of large programs. Users of hierarchical techniques claim or predict substantial increases in productivity and in the reliability of the …
Jay M. Spitzen, Karl N. Levitt, Lawrence Robinson
Pages 1064-1075