David H. Brandin
Pages 597-598
The use of a differential file for a database update can yield integrity and performance benefits, but it can also present problems in providing current data to subsequent accessing transactions. A mechanism known as a Bloom
…
Lee L. Gremillion
Pages 600-604
The performance of most small computer systems is determined, to a large extent, by the characteristics of their mass storage devices. Data compression can expand the storage capacity of such devices and also slightly increase …
Michael Pechura
Pages 605-609
tive computer systems and studies of their users, we have become increasingly aware of the importance of system messages. Novice users are unimpressed with CPU speeds, disk storage capabilities, or elegant file structures. For …
Ben Shneiderman
Pages 610-611
The formulation of a balanced and effective export control policy for computer products and know-how has been an important and difficult task for both the U.S. Government and the computing community. External pressures force
…
S. E. Goodman
Pages 613-624
This paper describes the design and implementation of a
program testing assistant which aids a programmer in the definition, execution, and modification of test cases during incremental program development. The testing assistant …
David Chapman
Pages 625-634
The volume, moments of inertia, and similar properties of solids are defined by triple (volumetric) integrals over subsets of three-dimensional Euclidean space. The automatic computation of such integral properties for geometrically …
Yong Tsui Lee, Aristides A. G. Requicha
Pages 635-641
This paper discusses a family of algorithms for computing the volume, moments of inertia, and other integral properties of geometrically complex solids, e.g. typical mechanical parts. The algorithms produce approximate decompositions …
Yong Tsui Lee, Aristides A. G. Requicha
Pages 642-650
A protection model is presented for a general purpose computing system based on tags attached as
seals and
signatures to values exchanged among processes. A tag attached to a value as a seal does not prevent that value from being …
Lubomir Bic
Pages 650-658
We study parallel algorithms for a number of graph problems, using the Single Instruction Stream-Multiple Data Stream model. We assume that the processors have access to a common memory and that no memory or data alignment time …
Francis Y. Chin, John Lam, I-Ngo Chen
Pages 659-665
Robert L. Ashenhurst
Pages 676-678