David Brandin
Pages 3-4
Robert L. Ashenhurst
Pages 5-9
Congress has been taking an active interest in protecting information stored in computers. Congressional investigations and media reports have highlighted the vulnerability of computer systems to abuse and mis-use. Recent accounts …
Rosalie Steier
Pages 10-11
Jon L. Bentley
Pages 12-13
How easy is it to maintain a program? To a large extent, that depends on how difficult the program is to understand. A technique to measure program difficulty yields encouraging results.
Gerald M. Berns
Pages 14-23
Many of the country's brightest engineering students have been passing up graduate school for the challenge and high salaries of industry. This is drying up the supply of new Ph.D.s interested in teaching at a time when U.S.
…
John W. Geils
Pages 25-27
Robert I. Winner, Edward M. Carter
Pages 29-36
A Guide to the Selection and Specification of Ada Compilers was recently produced by the Portability Working Group of Ada-Europe. Most of the points addressed are applicable criteria for evaluation of any language compiler.
Peter J. L. Wallis, Brian A. Wichmann
Pages 37-41
An analysis of the distributions and relationships derived from the change data collected during development of a medium-scale software project produces some surprising insights into the factors influencing software development …
Victor R. Basili, Barry T. Perricone
Pages 42-52
Programs attributed to Wirth and Misra for generating the prime numbers up to a specified limit are investigated. It is shown that Wirth's program is incorrect according to three increasingly weak criteria, and a composite number …
Paul Pritchard
Pages 53-57
A theory of intraorganizational power is discussed and applied to the information services department. The results of a study of the power of five departments in 40 manufacturing plants is presented. Hypotheses about the levels …
Henry C. Lucas
Pages 58-65