December 1978 - Vol. 21 No. 12
Features
Using encryption for authentication in large networks of computers
Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated…
A linear sieve algorithm for finding prime numbers
A new algorithm is presented for finding all primes between 2 and n. The algorithm executes in time proportional to n (assuming that multiplication of integers not larger…
The selection of optimal tab settings
A new generation of computer terminals allows tab settings to be selected and set by the computer. This feature can be used to reduce the number of characters that are…
The findings of a study designed to address the pressing problems associated with the strategic planning of the computing effort in higher education are presented here. A…
Detection of logical errors in decision table programs
In this paper an algorithm to detect logical errors in a limited-entry decision table and in loop-free programs with embedded decision tables is developed. All the…
Optimizing decision trees through heuristically guided search
Optimal decision table conversion has been tackled in the literature using two approaches, dynamic programming and branch-and-bound. The former technique is quite…
Reverse path forwarding of broadcast packets
A broadcast packet is for delivery to all nodes of a network. Algorithms for accomplishing this delivery through a store-and-forward packet switching computer network…
Abstract data types and software validation
A data abstraction can be naturally specified using algebraic axioms. The virtue of these axioms is that they permit a representation-independent formal specification of…
An example of hierarchical design and proof
Hierarchical programming is being increasingly recognized as helpful in the construction of large programs. Users of hierarchical techniques claim or predict substantial…