Daniel D. McCracken
Pages 1-2
The purpose of the study was to characterize the input traffic on the interactive terminal facility (ITF) at Jackson State University by mathematical distributions. Five traffic measures were extracted from a week's job accounting …
Paul O'Neill, Avis O'Neill
Pages 10-13
Over several years, a large number of students took the same introductory programming course. The students were drawn from all academic disciplines and academic experience levels. Low correlations were found between success in …
Lawrence J. Mazlack
Pages 14-17
A method is presented for computing machine independent, minimal perfect hash functions of the form: hash value ← key length + the associated value of the key's first character + the associated value of the key's last character …
Richard J. Cichelli
Pages 17-19
The need to transfer information between processing elements can be a major factor in determining the performance of a VLSI circuit. We show that communication considerations alone dictate that any VLSI design for computing the …
Harold Abelson, Peter Andreae
Pages 20-23
This paper presents three scan line methods for drawing pictures of parametrically defined surfaces. A scan line algorithm is characterized by the order in which it generates the picture elements of the image. These are generated …
Jeffrey M. Lane, Loren C. Carpenter, Turner Whitted, James F. Blinn
Pages 23-34
Stephen T. Kent, Doug Bates
Pages 35-40
Ronald Lemos
Page 40
Peter J. Denning
Pages 45-49
Ben Mittman, Monroe Newborn
Pages 51-54