Peter J. Denning
Pages 979-983
Robert L. Ashenhurst
Pages 984-988
Congress is paying careful attention to threats to U.S. high technology from two areas: trademark and patent infringement and proposed foreign violation of U.S. copyright laws.
Computer technology is becoming a major victim of …
Rosalie Steier
Page 989
Since the mid-1970s, the U.S. Department of Defense has been laying the groundwork for a major new computer language that may substantially displace FORTRAN and COBOL in the years ahead. With Ada just now starting to be used, …
Jean Ichbiah
Pages 990-997
Elliot B. Koffman, Philip L. Miller, Caroline E. Wardle
Pages 998-1001
First-year computer science students need to know and use a considerable amount of mathematics. A corequired course in discrete mathematics is a good solution.
Anthony Ralston
Pages 1002-1005
Robert L. Ashenhurst
Pages 1006-1007
Mean response time and availability as optimization criteria for checkpoint placement are better replaced by workable formulas that calculate the ratio between the marginal gain accrued to users who experience system failure
…
C. M. Krishna, Yann-Hang Lee, Kang G. Shin
Pages 1008-1012
Reflecting current data on the use of programming language constructs in systems programming, a synthetic benchmark is constructed based on the distribution appearing in the data. The benchmark executes 100 Ada statements that …
Reinhold P. Weicker
Pages 1013-1030
Many human-computer interfaces are designed with the assumption that the user must adapt to the system, that users must be trained and their behavior altered to fit a given interface. The research presented here proceeds from …
Michael D. Good, John A. Whiteside, Dennis R. Wixon, Sandra J. Jones
Pages 1032-1043
An extension of critical path scheduling to a case where there are alternate methods for completing a project is introduced. Three solution methods are presented including one based on the heuristic search algorithm used in artificial …
Robert Marcus
Pages 1044-1047