January 1984 - Vol. 27 No. 1
Features
Congress tackless computer abuse
Congress has been taking an active interest in protecting information stored in computers. Congressional investigations and media reports have highlighted the…
Assessing software maintainability
How easy is it to maintain a program? To a large extent, that depends on how difficult the program is to understand. A technique to measure program difficulty yields…
Why students reject engineering teaching careers
Many of the country's brightest engineering students have been passing up graduate school for the challenge and high salaries of industry. This is drying up the supply of…
Requirements analysis for Ada compilers
A Guide to the Selection and Specification of Ada Compilers was recently produced by the Portability Working Group of Ada-Europe. Most of the points addressed are…
Software errors and complexity: an empirical investigation0
An analysis of the distributions and relationships derived from the change data collected during development of a medium-scale software project produces some surprising…
Some negative results concerning prime number generators
Programs attributed to Wirth and Misra for generating the prime numbers up to a specified limit are investigated. It is shown that Wirth's program is incorrect according…
Organizational power and the information services department
A theory of intraorganizational power is discussed and applied to the information services department. The results of a study of the power of five departments in 40…