Scheduled System Maintenance
On Tuesday, September 26, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

Computer

Issue 6 • June 1977

Filter Results

Displaying Results 1 - 25 of 33
  • Computer

    Publication Year: 1977, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1633 KB)
    Freely Available from IEEE
  • New from North-Holland [advertisement]

    Publication Year: 1977, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (224 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 1977, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (938 KB)
    Freely Available from IEEE
  • Special Messages

    Publication Year: 1977, Page(s):2 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (2984 KB)
    Freely Available from IEEE
  • Letters to the Editor

    Publication Year: 1977, Page(s):5 - 7
    Request permission for commercial reuse | PDF file iconPDF (1824 KB)
    Freely Available from IEEE
  • The Poly 88 Microcomputer System [advertisement]

    Publication Year: 1977, Page(s): 6
    Request permission for commercial reuse | PDF file iconPDF (941 KB)
    Freely Available from IEEE
  • Update: information for the computer systems design professional

    Publication Year: 1977, Page(s):8 - 131
    Request permission for commercial reuse | PDF file iconPDF (5019 KB)
    Freely Available from IEEE
  • Hardware Description Language Applications: An Introdiction and Prognosis

    Publication Year: 1977, Page(s):10 - 13
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3652 KB)

    Just as Software designers use high-level languages like Algol, Fortran, PL/I, and Snobol to express algorithms in terms of language statements, so digital hardware designers use hardware description languages to describe the digital systems they want to design. But whereas compilers for many high-level programming languages have been developed and implemented, the process of transforming a high-l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hardware Description Languages: Voices from the Tower of Babel*

    Publication Year: 1977, Page(s):14 - 17
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2503 KB)

    A hardware description language can be used to describe the logic gates, the sequential machines, and the functional modules, along with their interconnection and their control, in a digital system. In a general sense, Boolean equations, logic diagrams, programrning languages, and Petri nets are hardware description languages: they can be used to describe some aspect of hardware and they have defi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Logal: a CHDL for Logic Design and Synthesis of Computers

    Publication Year: 1977, Page(s):18 - 26
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3141 KB)

    A computer hardware description language can be a practical and economical tool for driving a comprehensive automated design facility for a large-scale computer environment. The logic designer must optimize many conflicting requirements, including the following: View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for Papers Computer Technology: Status, Limits, Alternatives

    Publication Year: 1977, Page(s): 27
    Request permission for commercial reuse | PDF file iconPDF (1415 KB)
    Freely Available from IEEE
  • A Design Language Based Approach to Test Sequence Generation

    Publication Year: 1977, Page(s):28 - 33
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2654 KB)

    There are two important advantages inherent in test sequence generation based on a design language description: View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Design [advertisement]

    Publication Year: 1977, Page(s): 34
    Request permission for commercial reuse | PDF file iconPDF (279 KB)
    Freely Available from IEEE
  • An Interactive Computer Graphics Language for the Design and Simulation of Digital Systems

    Publication Year: 1977, Page(s):35 - 41
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2492 KB)

    Many computer hardware description languages have been introduced to describe and model digital networks at the register transfer level.1-3Most CHDL's, however, like common programming languages, are "text oriented" and employ textual statements in the specification of a digital system. The process of converting a word statement problem into a description written in a design language is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ACM is ...

    Publication Year: 1977, Page(s): 42
    Request permission for commercial reuse | PDF file iconPDF (1670 KB)
    Freely Available from IEEE
  • The Assignment Statement in Hardware Description Languages

    Publication Year: 1977, Page(s):43 - 49
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2497 KB)

    The basic character of a programming language or a hardware design language is determined by the data types on which it operates and how changes in their values are made. Few of the papers on specific hardware design languages have included a discussion of this basic part, of the languages' semantics. Often a heuristic discussion based on examples is taken as the most rapid way of conveying the fl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Special Feature The Total Computer Security Problem: an Oveview

    Publication Year: 1977, Page(s):50 - 73
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7004 KB)

    As society becomes more dependent on computers, computer crime is becoming not only more disastrous in its potential impact, but also more attractive to the criminal.1-3However, with adequate protection techniques, data theft can be prevented. This paper analyzes the total computer system security problem, using six major factors to sort out the issues involved. The entire problem is vi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advance Program

    Publication Year: 1977, Page(s):63 - 70
    Request permission for commercial reuse | PDF file iconPDF (5949 KB)
    Freely Available from IEEE
  • Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard

    Publication Year: 1977, Page(s):74 - 84
    Cited by:  Papers (121)  |  Patents (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4943 KB)

    For centuries, cryptography has been a valuable asset of the military and diplomatic communities. Indeed, it is so valuable that its practice has usually been shrouded in secrecy and mystery. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Special Feature Software Engineering Concepts and Computer Science Curricula

    Publication Year: 1977, Page(s):85 - 91
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4346 KB)

    The field of software engineering is beginning to emerge as an area of study dealing with the problems and methods involved in producing software systems. Within recent years, it has become apparent that programming is a much harder task than it was once thought to be, especially for large production-oriented systems involving a number of people. This concern has led to the need for educating soft... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Microsystems Minimal Storage Sorting and Searching Techniques for RAM Applications: a Tutorial

    Publication Year: 1977, Page(s):92 - 100
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4337 KB)

    A large number of sorting and searching techniques, covering a variety of applications, are dealt with in computer science literature. The classical problem associated with these methods has been determining which set of algorithms is most appropriate for a given application. With the recent advances in LSI technology and the assured proliferation of microprocessors and RAM memory, yet another app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Open Channel

    Publication Year: 1977, Page(s):101 - 102
    Request permission for commercial reuse | PDF file iconPDF (452 KB)
    Freely Available from IEEE
  • New Products

    Publication Year: 1977, Page(s):103 - 108
    Request permission for commercial reuse | PDF file iconPDF (8504 KB)
    Freely Available from IEEE
  • New Literature

    Publication Year: 1977, Page(s): 108
    Request permission for commercial reuse | PDF file iconPDF (1648 KB)
    Freely Available from IEEE
  • Recent IC Announcements

    Publication Year: 1977, Page(s): 109
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org