NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Bergart, Jeffrey G.; And Others – 1972
This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…
Descriptors: Annotated Bibliographies, Bibliographies, Computer Oriented Programs, Computer Science
Defense Documentation Center, Alexandria, VA. – 1968
This bibliography lists 162 unclassified - unlimited reports acquired by DDC, with their abstracts, grouped into five general subject areas: programing (computers), information retrieval, time sharing, graphics, and general applications. The topical arrangement is complemented by four indexes: corporate author/monitoring agency, personal author,…
Descriptors: Bibliographies, Computer Storage Devices, Computers, Display Systems
BREGZIS, RITVARS – 1966
THE PRINCIPAL GOAL OF THE PROJECT IS THE ACTIVATION OF A REAL- TIME MEDICAL LITERATURE SYSTEM, WITH THE CONCEPT FOR THE PROJECT BASED ON RECENT TECHNOLOGICAL INNOVATIONS AND AN APPRAISAL OF EXPECTED FUTURE INFORMATION SYSTEMS. DURING THE FIRST PHASE, A DATA FILE HAS BEEN CREATED WHICH, WITH SOME ADJUSTMENTS, CAN BE EMPLOYED FOR TIME-SHARED…
Descriptors: Automation, Bibliographies, Computer Programs, Computer Storage Devices
Nunamaker, J. F., Jr.; And Others – 1973
A methodology is described for an automatic design system initially defined in terms of logical processes or program modules. Processes and files are grouped and reorganized in such a way as to produce an optimal design with respect to a specific target machine. Performance criteria for the optimal design are defined in terms of transport volume…
Descriptors: Bibliographies, Computer Oriented Programs, Computer Storage Devices, Computers