


default search action
AFIPS NCC 1976: New York, NY, USA
- American Federation of Information Processing Societies: 1976 National Computer Conference, 7-10 June 1976, New York, NY, USA. AFIPS Conference Proceedings 45, AFIPS Press 1976, ISBN 978-1-4503-7917-5

Introduction
- Stanley Winkler:

A view of the world of computing as seen at the 1976 National Computer Conference. 1-6 - Herbert R. J. Grosch:

Conference maketh a ready man Or, twenty-five years in the better joints. 7-13 - Heinz Zemanek:

Computer prehistory and history in central Europe. 15-20 - Richard Williams:

Early computers in Europe. 21-29
Computers and people: societal concerns
- Alexander S. Douglas:

The U.K. privacy white paper 1975. 33-38 - Jerry M. Rosenberg:

Human and organizational implications of computer privacy. 39-43 - John Salasin:

A control systems model of privacy. 45-51 - Peter S. Browne:

Computer security: a survey. 53-63 - Donn B. Parker:

Computer abuse perpetrators and vulnerabilities of computer systems. 65-73 - Norman R. Nielsen, Brian Ruder, David H. Brandin:

Effective safeguards for computer system integrity. 75-84 - Frank R. Heinrich, David J. Kaufman:

A centralized approach to computer network security. 85-90 - Harrison R. Burris:

Computer network cryptography engineering. 91-96 - Ehud Gudes, Harvey S. Koch, Fred A. Stahl:

The application of cryptography for data base security. 97-107 - Whitfield Diffie, Martin E. Hellman:

Multiuser cryptographic techniques. 109-112 - Herbert S. Bright, Richard L. Enison:

Cryptography using modular software elements. 113-123 - Ingemar Ingemarsson:

Analysis of secret functions with application to computer cryptography. 125-127 - D. Kaufman, K. Auerbach:

A secure, national system for electronic funds transfer. 129-138 - Joseph Mazzetti:

Design considerations for electronic funds transfer switch system development. 139-146 - Frank Backman:

Are computers ready for the checkless society? 147-156
Computers and people: The computer profession
- H. W. Bomzer:

Personware. 157-160 - Carolyn M. Dunning:

From data entry supervisor to data entry specialist. 161-164 - Roy F. Keller:

A modern beginning programming course. 165-170 - Charles J. Prenner, Alfred Z. Spector:

Instructional computer systems for higher education. 171-177 - Jack L. Stone, Alexander P. Grant:

ADP training systems: organization-wide training for increased productivity. 179-183 - Joseph Scala:

Teaching art through computer graphics. 185-189 - Patsy Scala:

Artists and computers. 191-194 - Thomas A. DeFanti:

The digital component of the circle graphics habitat. 195-203 - Monique Truquet:

Braille grade II translator program. 205-207 - Gerald A. Raitzer, Gregg C. Vanderheiden, Craig S. Holt:

Interfacing computers for the physically handicapped: a review of international approaches. 209-216 - Ching Y. Suen, Michael P. Beddoes, James C. Swail:

The spellex system of speech aids for the blind in computer applications. 217-220 - Robert E. Savoie, J. S. Brugler, James C. Bliss:

Development of a hand-held talking calculator for the blind. 221-225
Computers and people: issues in computing
- David H. Ahl:

Survey of public attitudes toward computers in society. 227-230 - Carol H. Kastner, William G. Underhill:

Survey of public access to computing. 231-233 - Stephen B. Gray:

Building your own computer. 235-239
Computers and people: applications serving people
- John C. Mazziotta, H. K. Huang:

THREAD (three-dimensional reconstruction and display) with biomedical applications in neuron ultrastructure and computerized tomography. 241-250 - David J. Mishelevich, Peter Stastny, R. Gail Ellis, Susan G. Mize:

Regional kidney transplant matching: the RENTRAN interactive approach. 251-260 - Margaret Oakley Dayhoff, Winona C. Barker, R. M. Schwartz, Bruce C. Orcutt, Lois T. Hunt:

Data base for protein sequences. 261-266 - Lynette Hirschman, Ralph Grishman, Naomi Sager:

From text to structured information: automatic processing of medical reports. 267-275 - Shi-Kuo Chang, M. O'Brien, J. Read, R. Borovec, W. H. Cheng, Jyh-Sheng Ke:

Design considerations of a database system in a clinical network environment. 277-286 - N. I. Moiseeva, M. Yu. Simonov, V. M. Sysuev:

Correct problem statements in biomedical data processing. 287-294 - Harold H. Shlevin:

An adaptable, modular data - collection system suitable for scientific experimentation: analog to digital transformation, short - term digital storage, formatted digital tape - recording, and computer entry of experimental data. 295-300 - Rein Turn:

Classification of personal information for privacy protection purposes. 301-307 - Irving J. Chasen:

Philadelphia justice information system. 309-314 - Genevieve Greenwald-Katz:

Computers in architecture. 315-320
Systems: computer systems
- Margaret K. Butler:

Prospective capabilities in hardware. 323-336 - Robert A. Koenig:

An evaluation of the East German RYAD 1040 system. 337-340 - Reg A. Kaenel:

MagicScore bowling scorer: a microprocessor application for fun and profit. 341-347 - Earl D. Sacerdoti, Richard E. Fikes, René Reboh, Daniel Sagalowicz, Richard J. Waldinger, B. Michael Wilber:

QLISP: a language for the interactive development of complex systems. 349-356 - Richard William Watson:

User interface design issues for a large interactive system. 357-364 - Carl E. Krebs, C. Bumgardner, T. Northwood:

Terminal transparent display language (TTDL). 365-371 - Peter Schneider:

Working set restoration: a method to increase the performance of multilevel storage hierarchies. 373-380 - Satish L. Rege:

Performance and power dissipation analysis for CCD memory systems. 381-391 - Murray Edelberg, L. Robert Schissler:

Intelligent memory. 393-400 - Algirdas Avizienis:

Approaches to computer reliability: then and now. 401-411 - K. H. (Kane) Kim, C. V. Ramamoorthy:

Failure-tolerant parallel programming and its supporting system architecture. 413-423
Systems: systems management
- Ephraim R. McLean, John V. Soden:

Strategic planning for MIS: a conceptual framework. 425-432 - David S. Alberts:

The economics of software quality assurance. 433-442 - Frank Tsui, Lew Priven:

Implementation of quality control in software development. 443-449 - Robert W. Otto, Mark Auerbach:

A computer performance prediction model. 451-455 - Alan Jay Smith:

A queueing network model for the effect of data compression on system efficiency. 457-465
Systems: networking
- Frank J. Martin Jr.:

The federal communications commission and major policy matters affecting computer communication. 467-476 - Antony Rybczynski, B. Wessler, R. Despres, J. Wedlake:

A new communication protocol for accessing data networks: the international packet-mode interface. 477-482 - Louis Pouzin:

Virtual circuits vs. datagrams: technical and political problems. 483-494 - Robert Rosenthal:

Network access techniques: a review. 495-500 - Robert H. Anderson, James J. Gillogly:

The RAND intelligent terminal agent (RITA) as a network access aid. 501-509 - Joe B. Wyatt, Vincent I. Polley:

Network interface systems: an evaluation by simulation. 511-521 - David L. Mills:

An overview of the distributed computer network. 523-531 - William F. Mann, Severo M. Ornstein, Michael F. Kraley:

A network-oriented multiprocessor front-end handling many hosts and hundreds of terminals. 533-540 - Dieu Huynh, Hisashi Kobayashi, Franklin F. Kuo:

Design issues for mixed media packet switching networks. 541-549 - Stephen R. Kimbleton, Richard L. Mandell:

A perspective on network operating systems. 551-559 - James E. White:

A high-level framework for network-based resource sharing. 561-570 - Carl A. Sunshine:

Factors in interprocess communication protocol efficiency for computer networks. 571-576 - Wesley W. Chu:

Performance of file directory systems for data bases in star and distributed networks. 577-587 - Fouad A. Tobagi, Stanley E. Lieberson, Leonard Kleinrock:

On measurement facilities in packet radio systems. 589-596 - Adrian V. Stokes, David L. Bates, Peter T. Kirstein:

Monitoring and access control of the London node of ARPANET. 597-603
Systems: business and industry systems
- Howard Lee Morgan:

Office automation project: a research perspective. 605-610 - James H. Carlisle:

Evaluating the impact of office automation on top management communication. 611-616 - J. Christopher Burns:

The evolving market for word processing and typesetting systems. 617-623 - William J. Hammond:

The computer as a tool in the processing of text for periodical publications. 625-626 - Dennis R. Neary, Terrence H. Coyle, Don M. Avedon:

The integration of microfilm and the computer. 627-637 - Arnold K. Griffith:

The AIDUS system: automated capture, update and republication of maintenance manuals. 639-642 - Daniel P. Siewiorek, Mario Barbacci:

The CMU RT-CAD system: an innovative approach to computer aided design. 643-655 - Richard B. Wise, Douglas J. Martin:

Some computer-related advancements for enhancing U. S. shipyard productivity. 657-669 - Donald Liu, Matias E. Wojnarowski:

Computer analysis and evaluation of marine structures. 671-682 - Howard R. McGlauflin:

Evolution of automation in terminal air traffic control. 683-688 - E. H. Reitan, Sabina H. Saib:

Computer graphics in an automatic aircraft landing system. 689-700 - Murray Turoff, Marion Spector:

Libraries and the implications of computer technology. 701-707 - Vivian S. Sessions:

The expanding role of on-line interactive searching. 709-712
Science and technology: computer and data base architecture
- Tomlinson Gene Rauscher, Ashok K. Agrawala:

Developing application oriented computer architectures on general purpose microprogrammable machines. 715-722 - Gérard G. Baille, Jean-Pierre Schoellkopf:

A pipeline polish string computer. 723-731 - Yaohan Chu:

Evolution of computer memory structure. 733-748 - Calvin K. Tang:

Cache system design in the tightly coupled multiprocessor system. 749-753 - Fernando C. Colon, Robert M. Glorioso, Walter H. Kohler, Dominic W. Li:

Coupling small computers for performance enhancement. 755-764 - Neil Wilhelm, David Pessel, Charles Merriam:

The CERF computer system. 765-768 - Gary J. Nutt:

A parallel processor for evaluation studies. 769-775 - H. Sechovsky, S. Jura:

Asynchronous speed-independent arbiter in a form of a hardware control module. 777-782 - Jagan P. Agrawal, V. Umapathi Reddy:

Log-sum multiplier. 783-787 - Grayce M. Booth:

Distributed information systems. 789-794 - Michael Hammer:

Error detection in data base systems. 795-801 - N. Phillip Ross, Meyer Katzper:

A framework for federal health data collection. 803-810 - Donald R. Anderson:

Data base processor technology. 811-818 - Eduardo B. Fernández

, Rita C. Summers:
Integrity aspects of a shared data base. 819-827 - Larry Clough, William D. Haseman, Yuk Ho So:

Designing optimal data structures. 829-837 - John D. Joyce, N. N. Oliver:

REGIS: a relational information system with graphics and statistics. 839-844 - Moshé M. Zloof:

Query-by-example: operations on hierarchical data bases. 845-853 - Stewart A. Schuster, Esen A. Ozkarahan, Kenneth C. Smith:

A virtual memory system for a relational associative processor. 855-862 - Jay-Louise Weldon:

Managing the census data base: data description, acquisition, and manipulation. 863-867 - Trevor John Bentley:

Defining management's information needs. 869-876 - Roy H. Igersheim:

Managerial response to an information system. 877-882 - Carl R. Gerami, T. Russell Shields, Richard J. Weiland:

Transaction queuing and cylinder logic access in the Time, Inc. magazine/book/record system. 883-888
Science and technology: software
- Edward W. Birss, James P. Fry:

Generalized software for translating data. 889-897 - William E. Howden:

Experiments with a symbolic evaluation system. 899-908 - Leon J. Osterweil, Lloyd D. Fosdick:

Some experience with DAVE: a Fortran program analyzer. 909-915 - Julius A. Archibald:

A dynamic (FORTRAN) programming system. 917-925 - Robert C. Gammill:

GPMX: a portable general purpose macro processor adapted for preprocessing FORTRAN. 927-933
Science and technology: computer science
- R. D. Gordon, Maurice H. Halstead:

An experiment comparing Fortran programming times with the software physics hypothesis. 935-937 - Harvey J. Greenberg, James E. Kalan:

Representations of networks. 939-943 - Fred W. Glover, Darwin Klingman:

A practitioner's guide to the state of large scale network and network-related problems. 945-950 - Behrooz Parhami:

Low-cost residue number systems for computer arithmetic. 951-956 - James R. Pinkert:

Very fast computation of polynomial remainder sequence coefficient signs. 957-961 - Thomas G. Windeknecht, Henry D'Angelo:

System theoretic implications of numerical methods applied to the solution of ordinary differential equations. 963-972 - Gruia-Catalin Roman, David Garfinkel, Carl B. Marbach:

Memory conserving efficient methods for solving large sets of stiff differential equations. 973-978 - Gordon J. Vanderbrug:

A geometric analysis of heuristic search. 979-986 - W. F. Smyth, Ilona Arany:

Another algorithm for reducing bandwidth and profile of a sparse matrix. 987-994 - John P. Dolan, James S. Ketchel:

Business opportunity analysis. 995-998 - Armen Nahapetian:

A "unique number" generator. 999-1000 - Akira Taneda, Hikaru Oku, Daiji Namba:

An on-line test program for peripheral devices. 1001-1006 - David L. Retz, Bruce W. Schafer:

Structure of the ELF operating system. 1007-1016 - Thomas H. Naylor:

Elements of a planning and modeling system. 1017-1026
Science and technology: applications of computer science
- Sally Yeates Sedelow:

Analysis of "natural" language discourse. 1027-1034 - Bruce Cornwell, Katharine Cornwell:

Computer animated film systems: a rat's nest of trade-offs. 1035-1038 - Stan Cohen:

Speakeasy: a window into a computer. 1039-1047 - Cynthia Jane Solomon, Seymour Papert:

A case study of a young child doing turtle graphics in LOGO. 1049-1056 - James C. Bezdek:

Feature selection for binary data: medical diagnosis with fuzzy sets. 1057-1068 - Richard A. LeFaivre:

Procedural representation in a fuzzy problem-solving system. 1069-1074 - Richard O. Duda, Peter E. Hart, Nils J. Nilsson:

Subjective bayesian methods for rule-based inference systems. 1075-1082

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














