Robert L. Ashenhurst
Congress has been taking an active interest in protecting information stored in computers. Congressional investigations and media reports have highlighted the vulnerability of computer systems to abuse and mis-use. Recent accounts …
Jon L. Bentley
How easy is it to maintain a program? To a large extent, that depends on how difficult the program is to understand. A technique to measure program difficulty yields encouraging results.
Gerald M. Berns
Many of the country's brightest engineering students have been passing up graduate school for the challenge and high salaries of industry. This is drying up the supply of new Ph.D.s interested in teaching at a time when U.S.
John W. Geils
Robert I. Winner, Edward M. Carter
A Guide to the Selection and Specification of Ada Compilers was recently produced by the Portability Working Group of Ada-Europe. Most of the points addressed are applicable criteria for evaluation of any language compiler.
Peter J. L. Wallis, Brian A. Wichmann
An analysis of the distributions and relationships derived from the change data collected during development of a medium-scale software project produces some surprising insights into the factors influencing software development …
Victor R. Basili, Barry T. Perricone
Programs attributed to Wirth and Misra for generating the prime numbers up to a specified limit are investigated. It is shown that Wirth's program is incorrect according to three increasingly weak criteria, and a composite number …
A theory of intraorganizational power is discussed and applied to the information services department. The results of a study of the power of five departments in 40 manufacturing plants is presented. Hypotheses about the levels …
Henry C. Lucas