Last update:
Thu May 2 08:53:56 MDT 2024
J. C. Simon and G. Guiho On algorithms preserving neighborhood, to file and retrieve information in a memory . . . . . . . . . . . . . . . . . 3--15 K. O. Biss and R. T. Chien and F. A. Stahl A data structure for cognitive information retrieval . . . . . . . . . 17--27 L. W. Hunter A data representation code for text processing systems . . . . . . . . . . . 29--42 J. T. Tou and R. C. Gonzalez Automatic recognition of handwritten characters via feature extraction and multi-level decision . . . . . . . . . . 43--65 M. Terrenoire and M. Simonet An evaluation of ALGOL 68 for interrogation process algorithms . . . . 67--73 T. Ibaraki and T. K. Liu and C. R. Baugh and S. Muroga An implicit enumeration program for zero-one integer programming . . . . . . 75--92
H. Katzan, Jr. An APL approach to the representation and manipulation of data structures . . 93--113 A. D. Inselberg and E. B. Altman 2-SLIDS: a two-stage linked storage structure with link-dependent data capabilities . . . . . . . . . . . . . . 115--133 K. S. Fu and T. Huang Stochastic grammars and languages . . . 135--170 C. Bohm and M. Dezani A CUCH-machine: the automatic treatment of bound variables . . . . . . . . . . . 171--191
M. B. Wells and J. B. Morris The unified data structure capability in Madcap VI . . . . . . . . . . . . . . . 193--208 D. S. Wile and C. M. Geschke An implementation base for efficient data structuring . . . . . . . . . . . . 209--224 M. V. Wilkes Associative tabular data structures . . 225--233 V. A. Busam A dictionary structure for a PL/1 compiler . . . . . . . . . . . . . . . . 235--253 K. Maruyama A procedure to determine intersections between polyhedral objects . . . . . . . 255--266 D. J. Mishelevich Computer-based semantic analyzers . . . 267--286
A. van Dam Some implementation issues relating to data structures for interactive graphics 287--314 M. V. Wilkes and W. D. Manville The associative language AL-1 . . . . . 315--327 G. J. Lipovski Data structures in content-addressed cellular memories . . . . . . . . . . . 329--353 C. E. Hughes Degrees of unsolvability associated with Markov algorithms . . . . . . . . . . . 355--365
K. Walk Modeling of storage properties of higher-level languages . . . . . . . . . 1--24 Y. Zalcstein On the semigroups of linear sequential machines . . . . . . . . . . . . . . . . 25--28 A. G. Ivakhnenko Problems of complex system modeling and applied mathematical statistics . . . . 49--60 E. Diday The dynamic clusters method in nonhierarchical clustering . . . . . . . 61--88
K. Brunnstein and J. W. Schmidt Structuring and retrieving information in computer-based learning . . . . . . . 89--101 C. Chitti Babu On the application of probabilistic distance measures for the extraction of features from imperfectly labeled patterns . . . . . . . . . . . . . . . . 103--114 J. Rickman and W. E. Walden Structures for an interactive on-line thesaurus . . . . . . . . . . . . . . . 115--127 R. V. Book On the structure of context-sensitive grammars . . . . . . . . . . . . . . . . 129--139 W. H. Payne Partial sorting: a large vector technique and its application . . . . . 141--156 C. Bohm and M. Dezani Notes on `A CUCH-machine: the automatic treatment of bound variables' . . . . . 157--160
N. V. Findler and D. Chen On the problems of time, retrieval of temporal relations, causality, and coexistence . . . . . . . . . . . . . . 161--185 J. M. Burke and J. T. Rickman Bitmaps and filters for attribute-oriented searches . . . . . . 187--200 M. J. Spier A model implementation for protective domains . . . . . . . . . . . . . . . . 201--229 V. K. Jain ECG waveform feature extraction and its application to automated prognosis . . . 231--247
L. L. Rose and M. H. Gotterer A theory of dynamic file management in a multilevel store . . . . . . . . . . . . 249--256 R. E. Osteen and J. T. Tou A clique-detection algorithm based on neighborhoods in graphs . . . . . . . . 257--268 J. L. Clark PATRICIA-II. Two-level overlaid indexes for large libraries . . . . . . . . . . 269--292 G. C. Ealer and N. F. Jensen and E. G. Monaco Data base organization and retrieval techniques for steam turbine engineering 293--309 G. Rozenberg Extension of tabled 0L-systems and languages . . . . . . . . . . . . . . . 311--336
J. Cohen and L. Trilling and P. Wegner A nucleus of a theorem-prover described in ALGOL-68 . . . . . . . . . . . . . . 1--31 E. K. Bowdon, Sr. and S. A. Mamrak and F. R. Salz A simulation tool for performance evaluation of the IBM 360/75 . . . . . . 33--57 J. P. Ignizio and R. M. Harnett Heuristically aided set-covering algorithms . . . . . . . . . . . . . . . 59--70 A. Bouckaert Computer diagnosis of goiters. IV. Optimal planning of physical observations . . . . . . . . . . . . . . 71--92 B. Shneiderman A model for optimizing indexed file structures . . . . . . . . . . . . . . . 93--103
J. Minker and J. R. McSkimin and D. H. Fishman MRPPS --- an interactive refutation proof procedure system for question answering . . . . . . . . . . . . . . . 105--122 S. Nishihara and H. Hagiwara A full table quadratic search method eliminating secondary clustering . . . . 123--128 A. Kandel Application of fuzzy logic to the detection of static hazards in combinational switching systems . . . . 129--139 E. S. Santos One-way acceptors and languages . . . . 141--151 C. A. Mateescu and I. O. Stamatescu On an information processing model applied to optical illusions and computer simulations . . . . . . . . . . 153--166 M. Stonebraker The choice of partial inversions and combined indices . . . . . . . . . . . . 167--188
J. Earley Syntax extension using a run time model 189--196 G. Lindstrom Algorithms for list structure condensation . . . . . . . . . . . . . . 197--216 J. Minker and G. J. VanderBrug Representations of the language recognition problem for a theorem prover 217--250 Hung Chi Lai and S. Muroga and T. Nakagawa Redundancy check technique for designing optimal networks by branch-and-bound method . . . . . . . . . . . . . . . . . 251--271
F. R. D. Velasco and C. De-Renna e.Souza Sequential syntactical decoding . . . . 273--287 S. A. Greibach Some restrictions on W-grammars . . . . 289--327 B. H. McCormick and S. N. Jayaramamurthy Time series model for texture synthesis 329--343 A. Bouckaert Computer diagnosis of goiters. The optimal size of optimal subsymptomatologies . . . . . . . . . . 345--362
B. H. McCormick and S. N. Jayaramamurthy A decision theory method for the analysis of texture . . . . . . . . . . 1--38 S. Treu On-line student debate: an experiment in communication using computer networks 39--51 D. Wood A note on Lindenmayer systems, Szilard languages, spectra, and equivalence . . 53--62 M. Dal Cin Fuzzy-state automata: their stability and fault tolerance . . . . . . . . . . 63--80 M. Dal Cin Modification tolerance of fuzzy-state automata . . . . . . . . . . . . . . . . 81--93 H. J. Shyr and G. Thierrin Left-noncounting languages . . . . . . . 95--102
C. A. R. Hoare Recursive data structures . . . . . . . 105--132 M. J. Spier A pragmatic proposal for the improvement of program modularity and reliability 133--149 S. K. Shrivastava Process synchronization in high-level languages . . . . . . . . . . . . . . . 151--169 Y. R. Wang On data retrieval from unambiguous bit matrices . . . . . . . . . . . . . . . . 171--187 A. L. Rosenberg On storing arbitrarily many extendible arrays of arbitrary dimensions . . . . . 189--196
L. L. Rose and M. H. Gotterer File evaluation in auxiliary storage . . 197--204 E. Persoon and K. S. Fu Sequential classification of strings generated by SCFG's . . . . . . . . . . 205--217 A. Ehrenfeucht and K. P. Lee and G. Rozenberg Subword complexities of various classes of deterministic developmental languages with interactions . . . . . . . . . . . 219--236 K. Hwang Some structural complexities of time-varying sequential machines . . . . 237--245 Hsi-Han Yeh Parameter optimization of stochastic automata operating in random environments . . . . . . . . . . . . . . 247--263 J. A. Moyne Relevance of computer science to linguistics and vice versa . . . . . . . 265--279
P. C. Yue and C. K. Wong Near-optimal heuristics for an assignment problem in mass storage . . . 281--294 H. Kameda The analysis of an adaptive workload balancing strategy in computing system resources management . . . . . . . . . . 295--306 P. C. Yue and C. K. Wong Storage cost considerations in secondary index selection . . . . . . . . . . . . 307--327 Beng-Tung Ang A heuristic-adaptive procedure for segmentation of time patterns . . . . . 329--348 P. C. Parks and A. G. Ivakhnenko and L. M. Boichuk and Svetalsky and B. K. A self-organizing model of the British economy for control with optimal prediction using the balance-of-variables criterion . . . . . 349--379
B. V. Dasarathy and A. L. Lakshminarasimhan Sequential learning employing unfamiliar teacher hypothesis (SLEUTH) with concurrent estimation of both the parameters and teacher characteristics 1--7 W. S. Bowie Applications of graph theory in computer systems . . . . . . . . . . . . . . . . 9--31 B. Shneiderman and S. C. Shapiro Toward a theory of encoded data structures and data translation . . . . 33--43 L. W. Fung and K. S. Fu An error-correcting syntactic decoder for computer networks . . . . . . . . . 45--58 J. W. White An off-line simulation system for development of real-time FORTRAN programs . . . . . . . . . . . . . . . . 59--79 M. G. Thomason and E. W. Page Boolean difference techniques in fault tree analysis . . . . . . . . . . . . . 81--88
A. L. Furtado Characterizing sets of data structures by the connectivity relation . . . . . . 89--109 A. J. Guttmann Programming recursively defined functions in FORTRAN . . . . . . . . . . 111--122 B. Shneiderman Exploratory experiments in programmer behavior . . . . . . . . . . . . . . . . 123--143 R. C. Gonzalez and J. J. Edwards and M. G. Thomason An algorithm for the inference of tree grammars . . . . . . . . . . . . . . . . 145--164 D. Dorrough Pattern classes: a technique for recovering their distributions . . . . . 165--199 J.-L. Lassez Circular codes and synchronization . . . 201--208
H. C. Johnston Cliques of a graph-variations on the Bron-Kerbosch algorithm . . . . . . . . 209--238 M. Maekawa Detection of parallelism between statements by decomposing into separate sequential processes . . . . . . . . . . 239--255 R. L. Cannon, Jr. An algebraic technique for context-sensitive parsing . . . . . . . 257--276 H. Hinomoto Observations of a firm's information processing with a data base management system . . . . . . . . . . . . . . . . . 277--302
W. Stallings An application of coroutines and backtracking in interactive systems . . 303--313 T. Ibaraki Theoretical comparisons of search strategies in branch-and-bound algorithms . . . . . . . . . . . . . . . 315--344 H. N. Gabow Using Euler partitions to edge color bipartite multigraphs . . . . . . . . . 345--355 R. V. Skavaril and O. R. Miller Binary input, output, and manipulation extensions of conversational programming with some biological applications . . . 357--373
H. Hellerman and R. Cavallo On the solution of multiattribute problems involving counting in intersecting sets . . . . . . . . . . . 1--7 S. R. Jordan A natural language understander based on a freely associated learned memory net 9--25 Hwang Kai On syntactic edge detection in noisy pictures . . . . . . . . . . . . . . . . 27--40 S. A. Starks and R. J. P. de Figueiredo and D. L. Van Rooy An algorithm for optimal single linear feature extraction from several Gaussian pattern classes . . . . . . . . . . . . 41--54 T. P. Neff and A. Kandel Simplification of fuzzy switching functions . . . . . . . . . . . . . . . 55--70 J. S. Hughes and A. Kandel Applications of fuzzy algebra to hazard detection in combinational switching circuits . . . . . . . . . . . . . . . . 71--82 K. Tanatsugu and S. Arikawa On characteristics sets and degrees of finite automata . . . . . . . . . . . . 83--93
H. P. Edmundson Statistical inference in mathematical and computational linguistics . . . . . 95--129 K. Maruyama and D. T. Tang and S. K. Chang A general packing algorithm for multidimensional resource requirements 131--149 J. C. Muzio A prefix operator for a switching algebra . . . . . . . . . . . . . . . . 151--163 S. Iscovici Field analysis: a mathematical method of analysis for information handling processes . . . . . . . . . . . . . . . 165--178
J. Minker A note on answer extraction in resolution-based systems . . . . . . . . 179--192 H. S. Koch Information system design for real-time multiprocessing systems . . . . . . . . 193--209 T. C. Ting Compacting homogeneous text for minimizing storage space . . . . . . . . 211--221 S. Aalto and E. Schuegraf Determination of the number of unambiguous bit matrices . . . . . . . . 223--235 A. Bouckaert Computer diagnosis of goiters. V. The input . . . . . . . . . . . . . . . . . 237--261
R. G. Hamlet Execution traces and programming-language semantics . . . . . 263--278 A. Thesen and T. Pinkerton Predicting the availability of contiguous memory . . . . . . . . . . . 279--287 F. R. Dias Velasco and C. de Renna e Souza An application of formal linguistics to scene recognition . . . . . . . . . . . 289--306 B. V. Dasarathy FEAST: feature evaluation and selection technique for deployment in unsupervised nonparametric environments . . . . . . . 307--315 H. M. Srivastava and H. B. Kekre and Y. N. Bapat G/M/1 queue study of buffer behavior in the decoding system of computer communication . . . . . . . . . . . . . 317--326 J. A. Moyne Simple-English for data base communication . . . . . . . . . . . . . 327--343
K. B. Salomon String and graph grammar characterizations of bounded regular languages . . . . . . . . . . . . . . . 1--10 D. M. Berry and L. M. Chirica and D. F. Martin and A. Sorkin and J. B. Johnson Time required for reference count management in retention block-structured languages. I . . . . . . . . . . . . . . 11--64 A. W. Biermann Automatic insertion of indexing instructions in program synthesis . . . 65--90
D. M. Berry and L. M. Chirica and D. F. Martin and A. Sorkin and J. B. Johnston On the time required for reference count management in retention block-structured languages. II . . . . . . . . . . . . . 91--119 M. Hofri A generating-function analysis of multiprogramming queues . . . . . . . . 121--155 N. Minsky An operation-control scheme for authorization in computer systems . . . 157--191 D. W. Hunter and G. S. Shedler Multivariate point process models for response times in multiprogrammed systems . . . . . . . . . . . . . . . . 193--217
Clarence A. Ellis Analysis of some abstract measures of protection in computer systems . . . . . 219--251 B. V. Dasarathy and K. P. Bharath Kumar CHITRA: cognitive handprinted input-trained recursively analyzing system for recognition of alphanumeric characters . . . . . . . . . . . . . . . 253--282 Shanker Singh and Vijendra Pal Singh A probabilistic approach for testing large-scale integrated circuits . . . . 283--294 T. C. Chen and K. P. Eswaran and V. Y. Lum and C. Tung Simplified odd-even sort using multiple shift-register loops . . . . . . . . . . 295--314
Toshihide Ibaraki Depth-$m$ search in branch-and-bound algorithms . . . . . . . . . . . . . . . 315--343 Robert W. Sebesta and Neil D. Jones Parsers for indexed grammars . . . . . . 345--359 D. M. Berry and A. Sorkin Time required for garbage collection in retention block-structured languages . . 361--404
J. T. Tou Zoom-thresholding technique for boundary determination . . . . . . . . . . . . . 3--8 H. I. Epstein and B. F. Caviness A structure theorem for the elementary functions and its application to the identity problem . . . . . . . . . . . . 9--37 C. C. Gotlieb and A. L. Furtado Data schemata based on directed graphs 39--73 B. V. Dasarathy and A. L. Lakshminarasimhan Learning under a VEDIC teacher (pattern recognition) . . . . . . . . . . . . . . 75--88
Fred J. Maryanski and Michael G. Thomason Properties of stochastic syntax-directed translation schemata . . . . . . . . . . 89--110 A. G. Ivakhnenko Development of models of optimal complexity using self-organization theory . . . . . . . . . . . . . . . . . 111--127 Arie P. Schinnar Generalized inverse solutions of multiattribute accounting problems . . . 129--139 Robert L. Cannon, Jr. Notes on canonical label languages . . . 141--148 Steven A. Vere Composition of relational productions for plans and programs . . . . . . . . . 149--179
H. P. Edmundson and Immanuel I. Tung The notion of a probabilistic cellular acceptor . . . . . . . . . . . . . . . . 181--208 A. Thayse Encoding of parallel program schemata by vector addition systems . . . . . . . . 209--218 B. Shneiderman and R. Mayer Syntactic/semantic interactions in programmer behavior: a model and experimental results . . . . . . . . . . 219--238 B. V. Sheela and B. V. Dasarathy OPAL: a new algorithm for optimal partitioning and learning in nonparametric unsupervised environments 239--253
A. V. Anisimov and D. E. Knuth Inhomogeneous sorting . . . . . . . . . 255--260 A. V. An\=\is\=\imov and D. E. Knuth Inhomogeneous sorting . . . . . . . . . 255--260 Ronald Alter and Johnson M. Hart Enumerating syntactical graphs and lattices of derivations . . . . . . . . 261--277 S. S. Al-Fedaghi and Y. H. Chin Algorithmic approach to the consecutive retrieval property . . . . . . . . . . . 279--301 S. Tangwongsan and K. S. Fu An application of learning to robotic planning . . . . . . . . . . . . . . . . 303--333 K. Culik, II and D. Wood Doubly deterministic tabled OL systems 335--347
Gyula A. Magó A network of microprocessors to execute reduction languages. I . . . . . . . . . 349--385 G. A. Mago A network of microprocessors to execute reduction languages. I . . . . . . . . . 349--385 Elaine J. Weyuker The applicability of program schema results to programs . . . . . . . . . . 387--403 Andrzej Proskurowski Minimum dominating cycles in $2$-trees 405--417 D. R. Stoutemyer Computer algebra for the calculus of variations, the maximum principle and automatic control . . . . . . . . . . . 419--434
G. A. Mago A network of microprocessors to execute reduction languages. II . . . . . . . . 435--471 Hikyoo Koh and Henry Y. H. Chuang Finding a minimal set of base paths of a program . . . . . . . . . . . . . . . . 473--488 Yves Kodratoff A class of functions synthesized from a finite number of examples and a LISP program scheme . . . . . . . . . . . . . 489--521 Gregor V. Bochmann Semantic equivalence of covering attribute grammars . . . . . . . . . . . 523--539 Julius T. Tou DYNOC---a dynamic optimal cluster-seeking technique . . . . . . . 541--547
J. T. Tou An approach to understanding geometrical configurations by computer . . . . . . . 1--13 C. J. Stephenson A method for constructing binary search trees by making insertions at the root 15--29 T. S. E. Maibaum and Carlos J. Lucena Higher order data types . . . . . . . . 31--53 Tsong Yueh Chen Formalization of correctness of recursive definitions . . . . . . . . . 55--61 J. M. Lemme and J. R. Rice Adaptive quadrature algorithms for the ILLIAC IV . . . . . . . . . . . . . . . 63--72
G. S. Shedler Response-time simulation of multivariate point process models for multiprogrammed jobstreams . . . . . . . . . . . . . . . 73--91 Judy A. Townley A pragmatic approach to resolution-based theorem proving . . . . . . . . . . . . 93--116 Chao Chih Yang and Charmane P. May Algorithms for finding directed graph isomorphisms by finite automata . . . . 117--140 M. Bernorio and M. Bertoni and A. Dabbene and M. Somalvico Querying databases with a domain-oriented natural language understanding system . . . . . . . . . . 141--159
P. R. F. Cunha and C. J. Lucena and T. S. E. Maibaum On the design and specification of message oriented programs . . . . . . . 161--191 J. Cohen and R. Stachel An interpreter for a nondeterministic language . . . . . . . . . . . . . . . . 193--217 D. T. Lee and B. J. Schachter Two algorithms for constructing a Delaunay triangulation . . . . . . . . . 219--242 D. M. Dhamdhere and J. R. Isaac A composite algorithm for strength reduction and code movement optimization 243--273
J. T. Tou Knowledge Engineering . . . . . . . . . 275--285 S. K. Arora and K. C. Smith WCRL: a data model independent language for database systems . . . . . . . . . . 287--305 Johnson M. Hart Fast recognition of Baxter permutations using syntactical and complete bipartite composite dag's . . . . . . . . . . . . 307--321 James C. Bezdek and Michael P. Windham and Robert Ehrlich Statistical parameters of cluster validity functionals . . . . . . . . . . 323--336 Robert B. Cutler and Saburo Muroga Useless prime implicants of incompletely specified multiple-output switching functions . . . . . . . . . . . . . . . 337--350
Anne Putkonen The order of merging operations for queries in inverted file systems . . . . 351--369 Paulo A. S. Veloso Characterizations for the regular prefix codes and related families . . . . . . . 371--382 M. Maekawa A classification of process coordination schemes in descriptive power . . . . . . 383--406 Peter A. Ng and Lun Tsai The design and implementation of a scheme for large ordered indices . . . . 407--434
J. J. Dujmovic Computer selection and criteria for computer performance evaluation . . . . 435--458 J. A. Moyne Language use: a performance model . . . 459--481 A. Charnes and W. W. Cooper and S. Duffuaa and M. Kress Complexity and computability of solutions to linear programming systems 483--506
Stephanie M. Boyles and Gerhard X. Ritter The encoding of arbitrary two-dimensional geometric configurations 1--25 C. H. Huang and F. J. Taylor A new technique for WFTA input/output reordering . . . . . . . . . . . . . . . 27--37 M. Di Santo and L. Nigro and W. Russo On the efficient implementation of retention block-structured languages . . 39--54 Arthur Farley and Stephen Hedetniemi and Andrzej Proskurowski Partitioning trees: matching, domination, and maximum diameter . . . . 55--61
I. Kobayashi Evaluation of queries based on the extended relational calculi . . . . . . 63--103 H. Jappinen Sense-controlled flexible robot behavior 105--125 Andrzej Proskurowski and Maciej M. Sys\lo Minimum dominating cycles in outerplanar graphs . . . . . . . . . . . . . . . . . 127--139 Ronald R. Yager Approximate reasoning and possibilistic models in classification . . . . . . . . 141--175
T. Leipala On the design of one-level indexed sequential files . . . . . . . . . . . . 177--186 Sudhir K. Arora and K. C. Smith A graphical interpretation of dependency structures in relational data bases . . 187--213 F. D. Lewis Stateless Turing machines and fixed points . . . . . . . . . . . . . . . . . 215--218
N. L. Sarda and J. R. Isaac Computer aided design of database internal schema . . . . . . . . . . . . 219--234 S. K. Arora and K. C. Smith Graphical normal forms based on root dependencies in relational data base systems . . . . . . . . . . . . . . . . 235--259 S. K. Arora and S. R. Dumpala Theta-join and normalization . . . . . . 261--281 G. Guida An effective preprocessor for structured FORTRAN: the HENTRAN system . . . . . . 283--297
C. S. dos Santos and T. S. E. Maibaum and A. L. Furtado Conceptual modeling of data base operations . . . . . . . . . . . . . . . 299--314 B. Bhargava and L. Lilien On optimal scheduling of integrity assertions in a transaction processing system . . . . . . . . . . . . . . . . . 315--330 H. Jürgensen and D. E. Matthews and D. Wood Cut point languages of Markov DTOL systems . . . . . . . . . . . . . . . . 331--340 H. Jurgensen and D. E. Matthews and D. Wood Cut point languages of Markov DTOL systems . . . . . . . . . . . . . . . . 331--340 M. Zaki Magnetic bubble memory structures for relational database management systems 341--358
B. Bhargava and C. Hua Cost analysis of recovery block scheme and its implementation issues . . . . . 359--382 A. S. Zaki and J. L. Baer Query costs in HB(1) trees versus $2$-$3$ trees . . . . . . . . . . . . . 383--395 M. N. Murty and G. Krishna A hybrid clustering procedure for concentric and chain-like clusters . . . 397--412 Marvin Shapiro A note on Lee and Schachter's algorithm for Delaunay triangulation . . . . . . . 413--418
J. W. Tai and K. S. Fu Inference of a class of CFPG by means of semantic rules . . . . . . . . . . . . . 1--23 W. K. Giloi and R. Gueth Concepts and realization of a high-performance data type architecture 25--54 Quentin F. Stout Searching and encoding for infinite ordered sets . . . . . . . . . . . . . . 55--72
M. G. Thomason Syntactic/semantic techniques in pattern recognition: a survey . . . . . . . . . 75--100 J. W. Hooper and K. D. Reilly Simulation strategies . . . . . . . . . 101--122 G. Alia and E. Martinelli On switching network functionalities and their relationships . . . . . . . . . . 123--138
J.-L. Rémy and P. A. S. Veloso Comparing data type specifications via their normal forms . . . . . . . . . . . 141--153 Th. Ottman and D. Wood A comparison of iterative and defined classes of search trees . . . . . . . . 155--178 Th. Ottmann and D. Wood A comparison of iterative and defined classes of search trees . . . . . . . . 155--178 John Grant and Jack Minker On optimizing the evaluation of a set of expressions . . . . . . . . . . . . . . 179--191 E. J. Brody A procedure for the unsupervised abduction of linguistic distributional classes in probabilistic languages . . . 193--210
Jian Hua Xu and Julius T. Tou Predictive searching for chain encoding by computers . . . . . . . . . . . . . . 213--229 David T. Barnard and Richard C. Holt Hierarchic syntax error repair for LR grammars . . . . . . . . . . . . . . . . 231--258 D. C. Voukalis Remarks concerning the optimization of matrix codes . . . . . . . . . . . . . . 259--273 Z. W. Ras An algebraic approach to information retrieval systems . . . . . . . . . . . 275--293 Zbigniew W. Ra\'s An algebraic approach to information retrieval systems . . . . . . . . . . . 275--293
P. A. S. Veloso Methodical specification of abstract data types via rewriting systems . . . . 295--323 Shi Kuo Chang and An Chi Liu File allocation in a distributed database . . . . . . . . . . . . . . . . 325--340 Zdzis\law Pawlak Rough sets . . . . . . . . . . . . . . . 341--356 J. V. Hassen and W. F. Messier, Jr. Expert systems for decision support in EDP auditing . . . . . . . . . . . . . . 357--379
Dalia Motzkin and Christina L. Hansen An efficient external sorting with minimal space requirement . . . . . . . 381--396 Ewa Or\lowska Representation of temporal information 397--408 E. Orlowska Representation of temporal information 397--408 Edward T. Lee An efficient algorithm for finding Kleene closure of regular expression matrices . . . . . . . . . . . . . . . . 409--415 Wei Chung Lin and King Sun Fu Conversion and parsing of tree transducers for syntactic pattern analysis . . . . . . . . . . . . . . . . 417--458
A. Barrero and M. G. Thomason and R. C. Gonzalez Regular-like tree expressions . . . . . 1--11 A. Barrero and M. G. Thomason and R. C. Gonzalez Regular-like tree expressions . . . . . 1--121 A. S. Zaki A comparative study of $2$-$3$ trees and AVL trees . . . . . . . . . . . . . . . 13--33 J. V. Hansen and W. F. Messier, Jr. Scheduling the monitoring of EDP controls in online systems . . . . . . . 35--46 P. K. Srimani and B. P. Sinha A simple way to near minimization of microprogram control memory . . . . . . 47--64
James Bradley Application of SQL/N to the attribute-relation associations implicit in functional dependencies . . . . . . . 65--86 J. Bradley Application of SQL/N to the attribute-relation associations implicit in functional dependencies . . . . . . . 65--86 D. T. Lee On finding the convex hull of a simple polygon . . . . . . . . . . . . . . . . 87--98 F. Badi'i and B. Peikari Approximation of multipath planar shapes in pattern analysis . . . . . . . . . . 99--110 J. W. Hooper and K. D. Reilly The GPSS-GASP combined (GGC) system . . 111--136
E. J. Brody A topological formulation of linguistic typology . . . . . . . . . . . . . . . . 137--150 Marco A. Casanova A theory of data dependencies over relational expressions . . . . . . . . . 151--191 A. Kostovetsky Time separation technique for large databases . . . . . . . . . . . . . . . 193--209
V. D. Gligor The verification of the protection mechanisms of high-level language machines . . . . . . . . . . . . . . . . 211--246 M. Gyssens and J. Paredaens Another view of functional and multivalued dependencies in the relational database model . . . . . . . 247--267 S. Jajodia and P. A. Ng and F. N. Springsteel Entity-relationship diagrams which are in BCNF . . . . . . . . . . . . . . . . 269--283 Sushil Jajodia and Peter A. Ng and Frederick N. Springsteel Entity-relationship diagrams which are in BCNF . . . . . . . . . . . . . . . . 269--283 A. G. Akritas and S. S. Iyengar and A. A. Rampuria Computationally efficient algorithms for a one-time pad scheme . . . . . . . . . 285--316
Tony T. Lee A state space approach to the finite automata . . . . . . . . . . . . . . . . 317--335 Subhash C. Kak Exponentiation modulo a polynomial for data security . . . . . . . . . . . . . 337--346 Godfried T. Toussaint Computing largest empty circles with location constraints . . . . . . . . . . 347--358 H. Jürgensen and G. Thierrin On $ \omega $-languages whose syntactic monoid is trivial . . . . . . . . . . . 359--365 H. Jurgensen and G. Thierrin On omega-languages whose syntactic monoid is trivial . . . . . . . . . . . 359--365
Dana S. Nau On game graph structure and its influence on pathology . . . . . . . . . 367--383 Timo Niemi Formal restructuring functions for hierarchical data bases . . . . . . . . 385--411 Timothy A. Budd Safety in grammatical protection systems 413--431 Lawrence A. Ankeney and Gerhard X. Ritter Cellular topology and its applications in image processing . . . . . . . . . . 433--456
D. Landskov Microcode compaction; extending the boundaries . . . . . . . . . . . . . . . 1--21 D. T. Lee An optimal time and minimal space algorithm for rectangle intersection problems . . . . . . . . . . . . . . . . 23--32 H. R. Lu and K. S. Fu Inferability of context-free programmed grammars . . . . . . . . . . . . . . . . 33--58 H. R. Lu and K. S. Fu Inferability of context-free programmed grammars . . . . . . . . . . . . . . . . 33--58 Chao Chih Yang and Hou Kuan Huang Algorithms for the inverse and a generalization of the state space approach to finite automata . . . . . . 59--76
Thomas Ottmann and Arnold L. Rosenberg and Hans-Werner Six and Derick Wood Binary search trees with binary comparison cost . . . . . . . . . . . . 77--101 S. C. Kak On the method of puzzles for key distribution . . . . . . . . . . . . . . 103--109 Ging-Shung Yu and S. Muroga Parallel multipliers with NOR gates based on G-minimum adders . . . . . . . 111--121 M. C. Er An iterative algorithm for the cyclic Towers of Hanoi problem . . . . . . . . 123--129
Nicola Santoro On the message complexity of distributed problems . . . . . . . . . . . . . . . . 131--147 L. Orman Familial model of data . . . . . . . . . 149--175 H. Fukuda and K. Kamata Inference of tree automata from sample sets of trees . . . . . . . . . . . . . 177--196 Godfried T. Toussaint Complexity, convexity, and unimodality 197--217 W. Richard Stark A glimpse into the paradise of combinatory algebra . . . . . . . . . . 219--236
A. Kostovetsky Frequency decomposition technique for large archivable databases . . . . . . . 237--249 Roy P. Pargas Parallel solution of recurrences on a tree machine . . . . . . . . . . . . . . 251--277 Mikhail J. Atallah Checking similarity of planar figures 279--290 Wei Dong Kou and Zheng Hu CH transform . . . . . . . . . . . . . . 291--307 D. C. Voukalis Further remarks for the matrix type-$ {B} $ codes . . . . . . . . . . . . . . 309--326
Camilla B. Schwind Embedding deductive capabilities in relational database systems . . . . . . 327--338 V. P. Srini and B. D. Shrivr A methodology for designing and modeling reconfigurable systems . . . . . . . . . 339--394 S. K. Chang and J. C. Dorng Concatenated hash code selection . . . . 395--412 Keisuke Tanatsugu A grammatical inference for harmonic linear languages . . . . . . . . . . . . 413--423
T. Niemi Specification of data restructuring software based on the attribute method 425--460 Subrata Dasgupta and Alan Wagner The use of Hoare logic in the verification of horizontal microprograms 461--490 A. R. Hurson A VLSI design for the parallel finite state automaton and its performance evaluation as a hardware scanner . . . . 491--508 Lena Chang and Arthur T. Poe Surjections and coverings . . . . . . . 509--520
N. Roussopoulos and L. Mark Schema manipulation in self-describing and self-documenting data models . . . . 1--28 A. Dutta Modeling of multiple copy update costs for file allocation in distributed databases . . . . . . . . . . . . . . . 29--34 H. Jürgensen and A. Salomaa Syntactic monoids in the construction of systolic tree automata . . . . . . . . . 35--49 H. Jurgensen and A. Salomaa Syntactic monoids in the construction of systolic tree automata . . . . . . . . . 35--49 P. Biswas Architectural support for variable addressing in Ada --- a design approach 51--72
S.-H. S. Huang Multidimensional extendible hashing for partial-match queries . . . . . . . . . 73--82 J. W. Hooper BPL: a set-based language for distributed system prototyping . . . . . 83--105 Howard E. Motteler and Carl H. Smith A complexity measure for data flow models . . . . . . . . . . . . . . . . . 107--122
J. T. Tou Knowledge engineering revisited . . . . 123--134 S. P. Dandamudi and P. G. Sorenson An empirical performance comparison of some variations of the $k$-$d$ tree and BD tree . . . . . . . . . . . . . . . . 135--159 P. A. D. de Maine and S. Leong and C. G. Davis A transportable programming language (TPL) system. I Overview . . . . . . . . 161--182 Joseph O'Rourke Finding minimal enclosing boxes . . . . 183--199
L. D. Mlodinow and I. O. Stamatescu An evolutionary procedure for machine learning . . . . . . . . . . . . . . . . 201--219 B. Chan and H. Meijer A note on the method of puzzles for key distribution . . . . . . . . . . . . . . 221--223 Jin Hua Chen LL(1) grammars and sub-LL(1) grammars 225--234 Jinhua Chen LL(1) grammar and Sub-LL(1) grammars . . 225--234 K. G. Subramanian A note on regular-controlled apical-growth filamentous systems . . . 235--242 K. G. Subramanian A note on regular-controlled apical-growth filamentous systems . . . 235--242
Y. Ishida and N. Adachi and H. Tokumaru An analysis of self-diagnosis model by conditional fault set . . . . . . . . . 243--259 Y. Ishida and N. Adachi and H. Tokumaru An analysis of self-diagnosis model by conditional fault set . . . . . . . . . 243--259 A. R. Hurson and B. Shirazi A class of systolic multiplier units for VLSI technology . . . . . . . . . . . . 261--275 V. K. Agrawal and L. M. Patnaik and P. S. Goel Towards formal specification of a distributed computing system . . . . . . 277--306 A. K. Elmagarmid and A. P. Sheth A partially distributed deadlock detection algorithm . . . . . . . . . . 307--330
Ming Huei Young and Saburo Muroga Minimal covering problem and PLA minimization . . . . . . . . . . . . . . 337--364 D. Brzakovic and J. T. Tou An approach to computer-aided document examination . . . . . . . . . . . . . . 365--385 J. A. Brzozowski and S. Muro On serializability . . . . . . . . . . . 387--403 R. M. Harnett and G. C. Kiel Optimal taxiway repair: a set-covering approach . . . . . . . . . . . . . . . . 405--419 Jia Rong Hong AE1: an extension matrix approximate method for the general covering problem 421--437 S. K. Chang and B. Luo and C. C. Yang and M. C. K. Yang Trace confirmation with given object position . . . . . . . . . . . . . . . . 439--453 S. S. Tseng and R. C. T. Lee A parallel sorting scheme whose basic operation sorts $N$ elements . . . . . . 455--467