Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleOctober 1976
Modularization in the pilot compiler and its effect on the length
ACM '76: Proceedings of the 1976 annual conferencePages 554–557https://doi.org/10.1145/800191.805665The length equation for programs, initially suggested by M.H. Halstead, has been studied and experimentally verified by several independent investigators. The sets of programs tested have ranged over a variety of programming languages and program sizes. ...
- ArticleOctober 1976
A simulator generator based on formal descriptions of architectural, load,and operating system models
ACM '76: Proceedings of the 1976 annual conferencePages 539–545https://doi.org/10.1145/800191.805661The time needed for designing a simulator often hampers or even eliminates its use for the evaluation of computer systems. In order to alleviate this design effort a simulator generator which is driven by formalized descriptions of the hardware, the ...
- ArticleOctober 1976
General interest (Paper Session)
- Frederick E. Petry,
- Alan W. Biermann,
- Monroe M. Newborn,
- Helmut Kerner,
- Werner Beyerle,
- Kathleen M. Shockley,
- Daniel P. Friedman
ACM '76: Proceedings of the 1976 annual conferencePage 529https://doi.org/10.1145/800191.805658This session contains papers appealing to diverse interests. It includes a simulator generator which models architecture, load, and operating systems in a modular fashion allowing recombination of components; and improved proof for a theorem on search ...
- ArticleOctober 1976
SIGSOFT tutorial on program verification (Tutorial Session)
ACM '76: Proceedings of the 1976 annual conferencePages 521–522https://doi.org/10.1145/800191.805655An introduction is given to the fundamental issues of proving properties of computer programs. No attempt is made to provide an exhaustive survey, but rather to convey enough of the basic concepts and techniques of proving programs so that the ...
- ArticleOctober 1976
Allegations as aids to static program testing
ACM '76: Proceedings of the 1976 annual conferencePages 479–482https://doi.org/10.1145/800191.805645In static program analysis, a program is examined without execution in an attempt to anticipate possible sources of error. Possible errors detected in this way can rarely be considered certain to occur because of the impossibility of infallibly ...
- ArticleOctober 1976
Error checking with pointer variables
ACM '76: Proceedings of the 1976 annual conferencePages 391–395https://doi.org/10.1145/800191.805623The use of pointer variables in a programming language often results in a difficult class of errors to detect. Pointers may point to storage that no longer is allocated, or storage may be allocated as one data type and accessed as another. This report ...
- ArticleOctober 1976
A high level computer control language
ACM '76: Proceedings of the 1976 annual conferencePages 381–386https://doi.org/10.1145/800191.805620A set of primitive operators is described for directing the progress of a computer job. These primitive operators form the core of a high level language, based on the ALGOL-60 syntax, intended to be used as a replacement for existing job control ...
- ArticleOctober 1976
A structure for interprocess communication in a data communications handler
ACM '76: Proceedings of the 1976 annual conferencePages 356–360https://doi.org/10.1145/800191.805615The use of an implementation which models a simple single server queuing system to control transfers between processes in a communications handler is described. Exchanges between processes are carried by three word elements, called LINKs, which are used ...
- ArticleOctober 1976
Characteristics and models of program behaviour
ACM '76: Proceedings of the 1976 annual conferencePages 344–350https://doi.org/10.1145/800191.805613By interpreting the execution of programs on a CII 10070 computer, data on the characteristics of program behaviour during their execution have been collected. The results concern the activity of programs in their address space and the time interval ...
- ArticleOctober 1976
Software implications on future architecture designs
ACM '76: Proceedings of the 1976 annual conferencePage 224https://doi.org/10.1145/800191.805583It has been suggested that architecture which suits the requirements of high-level languages will relieve the difficulties. High-level languages have developed out of the current milieu and possess their own share of primitiveness and inflexibility. ...
- ArticleOctober 1976
Unconventional architecture
ACM '76: Proceedings of the 1976 annual conferencePage 223https://doi.org/10.1145/800191.805582Just as one-way streets sometimes make it inconvenient to get from here to there, the primitiveness of computer operations and the procrustean inflexibility of systems and devices can make it difficult to get from having an information-processing ...
- ArticleOctober 1976
Evaluation of network services
ACM '76: Proceedings of the 1976 annual conferencePages 218–220https://doi.org/10.1145/800191.805578A major problem involved in network services is that of deciding upon criteria and timing for moving between one network and another. A particular case is that dealing with timesharing service facilities. The approach here is to isolate some of the ...
- ArticleOctober 1976
Measuring productive computational work
ACM '76: Proceedings of the 1976 annual conferencePages 213–217https://doi.org/10.1145/800191.805577The measurement of computational work in computer systems traditionally relied heavily on indicators of hardware. Unfortunately, these indicators have a low correlation to the user's perception of useful work. This paper defines computations in terms of ...
- ArticleOctober 1976
An approach to benchmarking terminal oriented systems
ACM '76: Proceedings of the 1976 annual conferencePages 208–212https://doi.org/10.1145/800191.805576From 1970 to 1975 the Air Force, together with the MITRE Corporation, designed and developed a Remote Terminal Emulator for the purpose of benchmarking large terminal oriented computer systems. This paper briefly describes the reasons for the ...
- ArticleOctober 1976
Computer Systems Planning - tools & techniques
ACM '76: Proceedings of the 1976 annual conferencePages 203–207https://doi.org/10.1145/800191.805575Computer Systems Planning for a large general purpose computer facility is discussed in this paper. An overview of the planning process is presented which emphasizes development of a workload forecast and setting planning objectives. Integrated use of ...
- ArticleOctober 1976
SIGMETRICS (Panel Session)
ACM '76: Proceedings of the 1976 annual conferencePage 202https://doi.org/10.1145/800191.805574Selection and evaluation of computer systems and services is becoming increasingly sophisticated and complex. Algorithms for decision-making are being developed and refined. Hardware and software tools are being developed. Following brief presentations ...
- ArticleOctober 1976
The assignment axiom and programming language design
ACM '76: Proceedings of the 1976 annual conferencePages 2–6https://doi.org/10.1145/800191.805513One way to approach software reliability is to design programming languages that satisfy criteria which ensure that undesirable semantic effects cannot occur. The effect of using the assignment rule of Hoare as such a criterion on the design of ...
- proceedingOctober 1976