By Topic

Computer

Issue 8 • Date Aug. 1979

Filter Results

Displaying Results 1 - 25 of 41
  • Computer

    Publication Year: 1979, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (848 KB)
    Freely Available from IEEE
  • Bit by Bit, the World is Coming to Bit Pad One

    Publication Year: 1979, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (1768 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 1979, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (1100 KB)
    Freely Available from IEEE
  • Special Messages

    Publication Year: 1979, Page(s):3 - 4
    Request permission for commercial reuse | PDF file iconPDF (1728 KB)
    Freely Available from IEEE
  • About the cover

    Publication Year: 1979, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (214 KB)
    Freely Available from IEEE
  • The Challenge of Intercomputer Networks

    Publication Year: 1979, Page(s): 6
    Request permission for commercial reuse | PDF file iconPDF (152 KB)
    Freely Available from IEEE
  • Software Quality Assurance

    Publication Year: 1979, Page(s):7 - 9
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3101 KB)

    Although long recognized as a serious problem, many of the issues encountered in assuring the quality of computer programs have only received the level of attention they deserve in the last decade. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Program Testing Techniques for Nuclear Reactor Protection Systems

    Publication Year: 1979, Page(s):10 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (12430 KB)

    The high-reliability software required for nuclear reactor protection systems cannot be validated by a single method. This approach combines several different but complementary techniques. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • C-1000 Computer Compatible Video Camera

    Publication Year: 1979, Page(s): 19
    Request permission for commercial reuse | PDF file iconPDF (1224 KB)
    Freely Available from IEEE
  • Certification Testing: A Procedure to Improve the Quality of Software Testing

    Publication Year: 1979, Page(s):20 - 24
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4571 KB)

    Here is a presently operational plan to improve the quality of program testing. After all programs are tested alone, an independent quality control staff uses automated tools to certify that minimum testing criteria have been met. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sixth Data Communications Symposium — 1979

    Publication Year: 1979, Page(s): 25
    Request permission for commercial reuse | PDF file iconPDF (156 KB)
    Freely Available from IEEE
  • Error Detection Using Path Testing and Static Analysis

    Publication Year: 1979, Page(s):26 - 31
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2383 KB)

    How many types of errors can be detected through static analysis and branch testing? How many man-hours and machine hours do these techniques require? Here are some empirically determined answers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • At the Forefront of Computer Science...

    Publication Year: 1979, Page(s): 32
    Request permission for commercial reuse | PDF file iconPDF (272 KB)
    Freely Available from IEEE
  • Experience with Automated Testing Analysis

    Publication Year: 1979, Page(s):33 - 36
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5938 KB)

    Automated testing analyzers are popular software test tools. Such an analyzer, using a branch testing strategy, provides a cost-effective way of increasing confidence in software behavior. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey of Standards and Proposed Metrics for Software Quality Testing

    Publication Year: 1979, Page(s):37 - 42
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3908 KB)

    Military standards now contain detailed requirements for software quality. The metrics and techniques described here are being used to evaluate readiness for acceptance testing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Standard for Software Quality Assurance Plans

    Publication Year: 1979, Page(s):43 - 50
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5057 KB)

    The increasing criticality of software mandates a standard for software quality assurance plans. Such a standard, developed by the Computer Society's Software Engineering Standards Subcommittee, appears here. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Announcing... The IEEE Computer Society's Tutorial Week79

    Publication Year: 1979, Page(s): 49
    Request permission for commercial reuse | PDF file iconPDF (1064 KB)
    Freely Available from IEEE
  • Why Puzzle Over Pieces?

    Publication Year: 1979, Page(s): 51
    Request permission for commercial reuse | PDF file iconPDF (1032 KB)
    Freely Available from IEEE
  • Interactive Computer Graphics: Flying High Part II

    Publication Year: 1979, Page(s):52 - 67
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (14232 KB)

    Here are further key developments: displays that look better to the eye, higher performance in vector displays, a box that gets full speed out of electrostatic plotters, and more. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High-Resolution

    Publication Year: 1979, Page(s): 61
    Request permission for commercial reuse | PDF file iconPDF (1168 KB)
    Freely Available from IEEE
  • The Image Array Processing System

    Publication Year: 1979, Page(s): 63
    Request permission for commercial reuse | PDF file iconPDF (1208 KB)
    Freely Available from IEEE
  • Special Feature Some Considerations in the Design of Mainframe Processors with Microprocessor Technology

    Publication Year: 1979, Page(s):68 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (8112 KB)

    Implementing mainframes with multimicroprocessors entails an extra cost for main memory. This often-overlooked phenomenon is analyzed here for several mainframe systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The 1st International Conference on Distributed Computing Systems

    Publication Year: 1979, Page(s):75 - 78
    Request permission for commercial reuse | PDF file iconPDF (881 KB)
    Freely Available from IEEE
  • NCC '79 Wrap-up The Social Implications of Computers

    Publication Year: 1979, Page(s):79 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (10701 KB)

    The remarkable growth of the computing industry in the past quarter century has been the result not only of capabilities in technology, development, manufacturing, and marketing, but also of the social setting in which these abilities were exercised. This year's NCC organizers chose to emphasize these social relationships in plenary sessions, panel discussions, and a few of the printed papers. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Public Concerned About Privacy

    Publication Year: 1979, Page(s):82 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4307 KB)

    Two out of three Americans are concerned about the threat to their personal privacy posed by computer-operated data banks in the hands of business and government. They want something done to give individuals practical rights of privacy, confidentiality, and access to records of themeselves. These are the key findings of a Louis Harris survey, as reported by Prof. Alan F. Westin of Columbia Univers... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com