Rosalie Steier
Pages 479-ff.
Paul Abrahams
Pages 480-481
Robert L. Ashenhurst
Pages 482-483
An astronomer-turned-sleuth traces a German trespasser on our military networks, who slipped through operating system security holes and browsed through sensitive databases. Was it espionage?
Clifford Stoll
Pages 484-497
Data surveillance is now supplanting conventional surveillance techniques. With this trend come new monitoring methods such as personal dataveillance and mass dataveillance that require more effective safeguards and a formal
…
Roger Clarke
Pages 498-512
The higraph, a general kind of diagramming object, forms a visual formalism of topological nature. Higraphs are suited for a wide array of applications to databases, knowledge representation, and, most notably, the behavioral …
David Harel
Pages 514-530
John L. Gustafson
Pages 532-533
Computer science technology in the 1990s will involve knowledge/expert systems. Fundamental issues of technology transfer, training, problem selection, staffing, corporate politics, and more, are explored.
James M. Cupello, David J. Mishelevich
Pages 534-550
The stages of growth and interconnectedness of the applications of end user computing are described in a model that is directed toward management and planning.
Sid L. Huff, Malcolm C. Munro, Barbara H. Martin
Pages 542-550
A two-phase study concerned with the factors of success associated with the development of computer applications by end users was conducted in 10 large organizations. During the first phase, in-depth interviews were used to refine …
Suzanne Rivard, Sid L. Huff
Pages 552-561
Recall, while an important topic in the study of learning and memory, has received relatively little attention as a dependent variable in studies that investigate alternative formats for presenting information. This paper describes …
Richard W. Schmell, Narayan S. Umanath
Pages 562-570
An efficient backtracking algorithm makes possible a very fast program to play the SCRABBLE® Brand Crossword Game. The efficiency is achieved by creating data structures before the backtracking search begins that serve both to …
Andrew W. Appel, Guy J. Jacobson
Pages 572-578
This paper presents an insertion algorithm for maintaining a binary search tree with minimal internal path length. The insertion algorithm maintains minimal internal path length by displacing keys when necessary, in an inorder …
Thomas E. Gerasch
Pages 579-585
MIS personnel historically have exhibited a disturbingly high rate of turnover, and the job of the MIS manager is increasingly oriented to personnel and staffing problems. The MIS careers literature consistently suggests that …
Michael J. Ginzberg, Jack J. Baroudi
Pages 586-594