Rosalie Steier
Page 259
Robert L. Ashenhurst
Pages 260-265
Rosalie Steier
Pages 266-ff.
What kinds of lessons does a classical engineering discipline like bridge design have for an emerging engineering discipline like computer systems design? Case-study editors Alfred Spector and David Gifford consider the insight …
Alfred Spector, David Gifford
Pages 267-283
Twentieth-century techniques such as computer-aided engineering and finite-element analysis were used to restore the nineteenth-century monument.
Karen A. Frenkel
Pages 284-296
A broad cross section of computer security experts, hackers, educators, journalists, and corporate executives examine hacking issues, problems, and possible solutions.
John A. Lee, Gerald Segal, Rosalie Steier
Pages 297-299
Execution times for a variety of priority-queue implementations are compared under the hold model, showing many to be faster than implicit heaps.
Douglas W. Jones
Pages 300-311
In many situations, embedded menus represent an attractive alternative to the more traditional explicit menus, particularly in touchtext, spelling checkers, language-based program editors, and graphics-based systems.
Larry Koved, Ben Scneiderman
Pages 312-318
A data compression scheme that exploits locality of reference, such as occurs when words are used frequently over short intervals and then fall into long periods of disuse, is described. The scheme is based on a simple heuristic …
Jon Louis Bentley, Daniel D. Sleator, Robert E. Tarjan, Victor K. Wei
Pages 320-330
CORPORATE Tech Correspondence
Pages 331-335