


default search action
15th ACM Southeast Regional Conference 1977: Hattiesburg, MS, USA
- Danny R. Carter:

Proceedings of the 15th annual Southeast regional conference, ACM-SE 1977, Hattiesburg, Mississippi, USA, April 18-20, 1977. ACM 1977, ISBN 978-1-4503-7302-9
Software design I
- Daniel Martin:

An emulator used to teach compiler design. 1-10 - Hal Pitts:

An experiment in the design of a basic interpreter. 11-29 - David W. Curbow:

A cross assembler for the Texas Instruments 960E mini computer. 30-35 - George T. Dupont:

Development of a minimal operating system for the ALTAIR 8800 microcomputer. 36-45
Simulation applications
- Ralph B. Bisland:

A computer assisted instruction simulation model for teaching play callers football strategy. 46-57 - S. E. Brown:

A time-sharing exercise in international relations. 58-61 - Sue Scott:

Simulation of southern corn rust damage in maize. 62-72
Programming theory I
- Mehdi Jazayeri:

Programmer productivity: program efficiency and improvement. 73-79 - John H. Crawford, Mehdi Jazayeri:

An algorithm for hoisting. 80-93
Computer systems architecture
- Jeffrey W. Graham, James G. Stringer:

Evaluation and experience with the IBM series/1 minicomputer. 94-101 - Edwin Adema:

A structural data acquisition system. 102-114 - Ricki B. Rovner, Gerald R. Kane:

A computer network implemented on a single multi-port timeshare facility. 115-125
Programming theory II
- Amauri A. Arroyo, Donald G. Childers:

Toward the automatic software exorciser. 126-139 - Ralph D. Jeffords, David B. Benson:

A vector encoding technique applicable to tabular parsing methods. 140-153 - Kuo-Chung Tai:

The recovery of parsing configurations for LR(1) parsers. 154-160
Medical applications I
- William Cunningham, Lloyd R. Smith, Steven E. Wixson, Sanford P. Bishop:

Top-down programming of an interactive cardiac pathology data system. 161-169 - Bonnie Pleasants Dumas:

An analytic system for the analysis of covariance a mini-computer application. 170-175 - Lindley C. Paxton:

Suggested computer applications in veterinary medicine. 176-181
Data base systems: design and testing I
- Wayne D. Dominick, Sharad K. Agarwal:

MADAM: multics approach to data access and management. 182-195 - Russell D. Farr, Deborah W. Hartsog, Richard A. Weller:

ALFORM: A Language FOr Record Maintenance. 196-207 - Lucille H. McHenry:

Test generation using the COBOL data base management system. 208-216 - Geraldine Chase, Nosratollah Khalili, Norman Eldridge:

Electronic funds transfer language. 217-222
University computing centers and educational applications
- Wallace E. Killcreas:

Billing for computer services in a university environment. 223-235 - Everett W. Crowley:

Computer video classes. 236-237 - Ralph G. Selfridge:

Fun and games, good and bad, with APL. 238-244 - Patsy Nichols:

The view from the bottom. 245-249
Software design II
- Russell Kegley:

Software extensibility and portability with macro processors. 250-263 - Barry M. Barlow:

Design and implementation of an interpretive dump analyzer. 264-274 - Mike Treat:

Implementation of a file management system using a sigma 9 simulator. 275-283
Data base applications and their social impact
- Walter M. Mathews, Shirley A. Hallblade, Kathleen Sullivan:

Public perceptions of the computer impact on society. 284-292 - James P. Golson:

The impact of technological change on organization management. 293-299 - Kay Thomas:

Implementation of a college selection system with SPITBOL. 300-307 - Patti Westmoreland:

KAOS-a user oriented information retrieval system. 308-314
Artificial intelligence applications
- Kevin D. Reilly:

Application of artificial intelligence methodology in the study of abnormal behavior. 315-327 - Robert M. Hyatt:

BLITZ V, a computer chess program. 328-342 - John S. George:

Digital modeling of biological circuitry and considerations of electroneural prosthesis or a computer scientist's look at the body's nervous system. 343-355
Data base systems: design and testing II
- Joseph E. Urban, Wayne D. Dominick:

Design and implementation considerations for monitoring and evaluating information systems. 356-369 - M. H. McKinney:

Multi-attribute inverted files implemented with hashing. 371-376 - Gautam Kar:

Construction of optimal indexes. 377-387
Scientific data acquisition
- John J. Crowe, Steven A. Von Edwins, M. Guyton Turner:

A data analysis system for processing landsat multispectral data. 388-394 - Martha Kull, T. F. Higginbotham:

Solar enery data collection, editing, and compression. 395-401
Programming theory III
- J. A. Winkler III, Edwin Towster:

A human factors study of structured programming techniques. 402-408 - Edward P. Katz, Edwin Towster:

A relational approach to a nonprocedural language. 409-413 - Joseph E. Urban, Edwin Towster:

Specifications of computer programs using Hoare tree formalism. 414-425
Programming theory IV
- Ward Douglas Maurer:

The modification index method of generating verification conditions. 426-440 - Edwin Towster:

An introduction to chunk structure. 441-450 - Earl J. Demaree:

An alternative to chaos or maintainable systems. 451-457 - Pentti A. Honkanen:

A fast minimal storage computational algorithm for determining a minimal spanning tree in a graph. 458-469
Software design III
- Mack W. Alford, Pei Hsia, Fred Petry:

Use of software engineering methodologies in a computer science curriculum. 470-482 - David R. Fashenpour:

The 8800 CHAR-MUX line concentrator. 483-497 - Susan T. Dean, Steven E. Wixson:

Compiler writing in FORTRAN on a small computer. 498-510
Medical applications II
- Alden W. Dudley Jr., Henry F. Winterfeldt:

The potential for compressed speech in medical education. 511-525 - Frank K. Nagurney, Harvey Wolfe, Larry J. Shuman:

Linear programming applications to the evaluation of the pre-hospital care phase of an emergency medical services system. 526
Technical papers
- Larry Pearson, Steve Teicher:

Systems design by levels of integration. 527 - J. Richard Dowell:

An overview of privacy and security requirements for data bases. 528-536

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














