January 1971 - Vol. 14 No. 1
Features
Signature simulation and certain cryptographic codes
Three cyphers allegedly authored by Thomas Jefferson Beale in 1822 have been the subject of intensive study for over 100 years. Generations of cryptanalysts have expended…
Pattern width at a given angle
That the pattern feature “width as a function of angle” possesses several possible interpretations is demonstrated in this paper, which is a review of the…
The reconstruction of binary patterns from their projections
Given the horizontal and vertical projections of a finite binary pattern f, can we reconstruct the original pattern f? In this paper we give a characterization of…
A language for treating geometric patterns in a two-dimensional space
In this paper CADEP, a problem-oriented language for positioning geometric patterns in a two-dimensional space, is presented.…
Construction of rational and negative powers of a formal series
Some methods are described for the generation of fractional and negative powers of any formal series, such as Poisson series or Chebyshev series. It is shown that, with…
Comments on prevention of system deadlocks
Habermann's method of deadlock prevention is discussed, where deadlock is defined as a system state from which resource allocations to certain processes are not possible.…
A proof is given of the correctness of the algorithm “Find.” First, an informal description is given of the purpose of the program and the method used. A…
Further evidence for the analysis of algorithms for the zero-one programming problem
The purpose of this note is to report computational experience additional to that recently summarized by Gue et al., with two algorithms for the zero-one linear…
Minit algorithm for linear programming
In his Certification of Algorithm 245 [1], Ralph L. London exhibits a common confusion between an algorithm, its representation, and its implementation on a…
Comment on London’s certification of algorithms 245
In his Certification of Algorithm 245 [1], Ralph L. London exhibits a common confusion between an algorithm, its representation, and its implementation on a…
Comment on the conversion of decision tables to computer programs
In their article [2] C. R. Muthukrishnan and V. Rajaraman have developed two excellent algorithms for conversion of limited entry and mixed entry decision tables to…