September 1981 - Vol. 24 No. 9
Features
The interface between a person and a computer can be looked at from either side. Programmers tend to view it from the inside; they consider it their job to defend the…
The Cornell program synthesizer: a syntax-directed programming environment
Programs are not text; they are hierarchical compositions of computational structures and should be edited, executed, and debugged in an environment that consistently…
An on-line algorithm for fitting straight lines between data ranges
Applications often require fitting straight lines to data that is input incrementally. The case where a data range [&agr;k, &ohgr;k] is received at each tk, t1 < t2…
Comparison of synonym handling and bucket organization methods
A theoretical description of the access times required in open addressing and external chaining is given. Values are calculated for different record and bucket sizes and…
On sharing secrets and Reed-Solomon codes
Shamir's scheme for sharing secrets is closely related to Reed-Solomon coding schemes. Decoding algorithms for Reed-Solomon codes provide extensions and generalizations…
Comments on price/performance patterns of U. S. computer systems
Several errors are noted in the formulation of econometric models describing computer price/performance patterns. An alternative model is presented which shows the…
Automatic extension of an ATN knowledge base
A computer program is described that acquires much of its knowledge from conversations among operators on Morse code radio networks. The system consists of a learning…
An abstract model of a processor is presented informally. The model can be used by itself to abstractly describe algorithms, or with a direct implementation to write and…
Shuffle languages, Petri nets, and context-sensitive grammars
Flow expressions have been proposed as an extension of the regular expressions designed to model concurrency. We examine a simplification of these flow expressions which…