Rosalie Steier
Pages 1023-1025
Robert L. Ashenhurst
Pages 1025-1027
Rosalie Steier
Pages 1028-1029
The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations.
David Chaum
Pages 1030-1044
A systemic view of DSS can provide a concrete framework for effective design of DSS and can also serve as a basis for accumulating DSS research results.
Gad Ariav, Michael J. Ginzberg
Pages 1045-1052
Orthogonal Latin squares—a new method for testing compilers—yields the informational equivalent of exhaustive testing at a fraction of the cost. The method has been used successfully in designing some of the tests in the Ada
…
Robert Mandl
Pages 1054-1058
For hash tables in which a strict physical separation exists between primary storage and storage for overflow records, with bucket capacity at least three, a complete probability model is described. A measure of hash table efficiency …
R. M. Norton, D. P. Yeager
Pages 1068-1075
A heuristic algorithm is proposed for dynamic calculation of the median and other quantiles. The estimates are produced dynamically as the observations are generated. The observations are not stored; therefore, the algorithm
…
Raj Jain, Imrich Chlamtac
Pages 1076-1085
CORPORATE Tech Correspondence
Pages 1086-1087
The generation of an embedded microprogram controlling a video display unit demonstrates how Jackson Structured Programming can be used effectively for both systems programming and microprocessor applications.
Bo Sanden
Pages 1059-1067