Robert L. Ashenhurst
An astronomer-turned-sleuth traces a German trespasser on our military networks, who slipped through operating system security holes and browsed through sensitive databases. Was it espionage?
Data surveillance is now supplanting conventional surveillance techniques. With this trend come new monitoring methods such as personal dataveillance and mass dataveillance that require more effective safeguards and a formal
The higraph, a general kind of diagramming object, forms a visual formalism of topological nature. Higraphs are suited for a wide array of applications to databases, knowledge representation, and, most notably, the behavioral …
John L. Gustafson
Computer science technology in the 1990s will involve knowledge/expert systems. Fundamental issues of technology transfer, training, problem selection, staffing, corporate politics, and more, are explored.
James M. Cupello, David J. Mishelevich
The stages of growth and interconnectedness of the applications of end user computing are described in a model that is directed toward management and planning.
Sid L. Huff, Malcolm C. Munro, Barbara H. Martin
A two-phase study concerned with the factors of success associated with the development of computer applications by end users was conducted in 10 large organizations. During the first phase, in-depth interviews were used to refine …
Suzanne Rivard, Sid L. Huff
Recall, while an important topic in the study of learning and memory, has received relatively little attention as a dependent variable in studies that investigate alternative formats for presenting information. This paper describes …
Richard W. Schmell, Narayan S. Umanath
An efficient backtracking algorithm makes possible a very fast program to play the SCRABBLE® Brand Crossword Game. The efficiency is achieved by creating data structures before the backtracking search begins that serve both to …
Andrew W. Appel, Guy J. Jacobson
This paper presents an insertion algorithm for maintaining a binary search tree with minimal internal path length. The insertion algorithm maintains minimal internal path length by displacing keys when necessary, in an inorder …
Thomas E. Gerasch
MIS personnel historically have exhibited a disturbingly high rate of turnover, and the job of the MIS manager is increasingly oriented to personnel and staffing problems. The MIS careers literature consistently suggests that …
Michael J. Ginzberg, Jack J. Baroudi