Peter J. Denning
Pages 409-410
Several operating system services are examined with a view toward their applicability to support of database management functions. These services include buffer pool management; the file system; scheduling, process management …
Michael Stonebraker
Pages 412-418
Anthony Ralston
Pages 419-433
Peter J. Denning, David H. Brandin, Daniel C. Schwartz, George I. Davida
Pages 434-450
This paper describes a form of purposeful data perturbation in a linear programming model which pertains to uncertainties in the magnitudes of the matrix coefficients. A problem in value pool construction is described first,
…
Harvey J. Greenberg, Richard P. O'Neill
Pages 451-456
A simple but effective method for the manipulation of polynomials of several variables in APL is presented. The method is especially advantageous in situations where more sophisticated symbolic computing systems such as SAC-1 …
Brian Billard
Pages 457-465
Double encryption has been suggested to strengthen the Federal Data Encryption Standard (DES). A recent proposal suggests that using two 56-bit keys but enciphering 3 times (encrypt with a first key, decrypt with a second key …
Ralph C. Merkle, Martin E. Hellman
Pages 465-467
Glenn Ricart
Pages 468-469
Ernest Chang
Page 468
Pages 475-482