default search action
34th COMPCON 1989: San Francisco, California, USA
- Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage, COMPCON Spring 89, San Francisco, CA, USA, February 27 - March 3, 1989, Digest of Papers. IEEE Computer Society 1989, ISBN 0-8186-1909-0
- Steve McGeady:
A programmer's view of the 80960 architecture. 4-9 - David A. Schoebel:
80960 tool technology for embedded control. 10-12 - Glenn Hinton:
80960-next generation. 13-17 - Rich Goss:
Motorola's 88000: integration, performance and applications. 20-26 - Donald A. Lewine, James Guyer, Bill Baxter, Chris Moriondo:
An ECL implementation of the Motorola 88000. 27-31 - Alice Anderson, Michael W. Cruess, Edward Wiencek:
The binary compatibility standard. 32-37 - Kazuo Kajimoto, Fumiko Nakayama, Tomoyuki Nonomura, Yoshihiko Imai, Syuh-ichi Isoda, Yoshiaki Kushiki:
New-media document (NewDoc) and dynamic navigation on the BTRON specification. 40-42 - Hidechika Kishigami, Takashi Miyamori, Misao Miyata:
The effectiveness of TRONCHIP instructions in the TX1 system. 43-47 - Hiroshi Takeyama, Tsuyoshi Shimizu, Manabu Kobayakawa:
Design concept and implementation of µITRON specification for the H8/500 series. 48-53 - Duane B. Call, G. Scott Lloyd:
Transputer supernodes: models for communication. 58-60 - Charles Vollum:
The XTM parallel desktop supercomputer: transputers play host. 61-62 - Martin Bühler, Louis L. Whitcomb, Forrest W. Levin, Daniel E. Koditschek:
A new distributed real-time controller for robotics applications. 63-69 - Paul Woodbury, Andrew Wilson, Barry Shein, Ilya Gertner, Paul Y. Chen, J. Bartlett, Ziya Aral:
Shared memory multiprocessors: the right approach to parallel processing. 72-80 - Chris Thomson:
An instruction set architecture for the 1990s: parallel and retargetable. 81-83 - Marco Flagg:
Dataflow principles applied to real-time multiprocessing. 84-89 - David Klappholz, Xiangyun Kong:
CFTP (Cray Fortran/ANSI Fortran '77 prefine): a tool to aid in hand-parallelizing sequential code. 92-97 - Nicholas Carriero, David Gelernter:
Linda: some current work. 98-101 - David C. DiNucci, Robert G. Babb II:
Design and implementation of parallel programs with LGDF2. 102-107 - David A. Patterson, Peter M. Chen, Garth Gibson, Randy H. Katz:
Introduction to redundant arrays of inexpensive disks (RAID). 112-117 - Martin Schulze, Garth Gibson, Randy H. Katz, David A. Patterson:
How reliable is a RAID? 118-123 - Fred Douglis, John K. Ousterhout:
Log-structured file systems. 124-129 - Dina Bitton:
Arm scheduling in shadowed disks. 132-136 - Spencer Ng:
Some design issues of disk arrays. 137-142 - Wes E. Meador:
Disk array systems. 143-146 - R. Williams, James W. Adkisson:
Increasing diskette capacity with Floptical technology. 148-150 - Geoffrey Bate:
Alternative storage technologies. 151-157 - Donovan A. Schneider, David J. DeWitt, Shahram Ghandeharizadeh:
An overview of the Gamma Database Machine. 162-166 - Sadish Doshi, Gary Kelly, Frank Symonds, Goetz Graefe:
Parallel processing in database management systems. - Norbert Duppel:
Parallel SQL on Tandem's NonStop SQL. 168-173 - Richard F. Rashid, Daniel P. Julin, Douglas Orr, Richard Sanzi, Robert V. Baron, Alessandro Forin, David B. Golub, Michael B. Jones:
Mach: a system software kernel. 176-178 - David Stevenson:
Token-based consistency of replicated servers. 179-183 - David L. Black, Anoop Gupta, Wolf-Dietrich Weber:
Competitive management of distributed shared memory. 184-190 - B. S. Bacarisse, S. Bek Baydere:
A low cost file replication algorithm. 191-196 - Terry Winograd:
Groupware: the next wave or just another advertising slogan? 198-200 - Anatol W. Holt:
Organizing computer use in the context of networks. 201-207 - James H. Bair:
Supporting cooperative work with computers: addressing meeting mania. 208-217 - Michael R. Lowry:
Automating software design. 222-225 - Robert McCartney:
Program synthesis: an automationist's view. 226-231 - Walt Scacchi:
Engineering large-scale software systems: an organizational knowledge base approach. 235- - Warren Teitelman:
X11/NeWS design overview. - William Leler:
PIX, the latest NeWS. 239-242 - Scott McGregor:
Designing user interface tools for the X window system. 243-246 - K. G. Heisler, W. T. Tsai, P. A. Powell:
An object-oriented maintenance-oriented model for software. 248-253 - Spencer Rugaber:
Requirements for a hypertext software maintenance system. 254-256 - Mohammad A. Ketabchi, D. Lewis, Surapol Dasananda, T. Lim, R. Roudsari, K. Shih, J. Tan:
Object-oriented database management support for software maintenance and reverse engineering. 257-260 - Richard Kenner, Ronald Bianchini, Susan R. Dickey, Patricia J. Teller:
A compact design for a highly-parallel shared-memory MIMD computer. 264-269 - A. David Milton, David P. G. Schenkel, David Levy:
High-performance AM29000 microprocessor applications for communications. 270-274 - F. R. Belch, Dave J. Everitt:
Twin AMD 29000s provide 48 MIPS for super dynamic graphics. 275-280 - John Banning:
The XDOS binary code conversion system. 282-287 - Henry Nash:
The design and development of a software emulator. 288-291 - L. Johnson, N. Colvin, B. Vandette, P. Heitman, S. Keller, D. Dice, Ross W. Goodell, M. Nahabedian:
Logical Compute Services-an architecture extensible application environment. 292-295 - Mathew A. Hahn, Donald R. Oestreicher, Robert J. Stevenson:
The Evans & Sutherland view of tomorrow's supercomputing. 300-303 - Howard W. Johnson:
Effective performance in high speed networking. 306-310 - D. Deel:
VectorNet (token-ring network). 311-313 - Don E. Tolmie:
The high-speed channel (HSC) standard. 314-317 - Craig J. Mundie:
Tools for scientific visualization. 320-321 - Craig Upson:
Scientific visualization environments for the computational sciences. 322-327 - Harold L. Baeverstad:
Engineering and scientific visualization using high-performance graphics workstations. 328-333 - Raymond M. Wong:
Issues in secure distributed operating system design. 338-341 - Dan M. Nessett:
Logon in distributed systems. 342-347 - Teresa F. Lunt:
Real-time intrusion detection. 353- - Alan J. Perlis:
Organithms: the dynamics of software evolution. - Ted Kaehler, Hadon Nash, Mark S. Miller:
Betting, bribery, and bankruptcy - A simulated economy that learns to predict. 361- - Bernardo A. Huberman:
The ecology of computation. - Ed Lee:
Some suggestions on a computer science undergraduate curriculum. - Laurence O. Masson:
Are software logic, structure and sequence protectable by copyright? 370-373 - Jack E. Brown:
Copyright protection of computer programs. 374-378 - Douglas K. Derwin:
Using clean room design procedures to reduce the legal risk involved in the creation of functionally compatible products. 379-385 - Haruki Ueno:
INTELLITUTOR: a knowledge based intelligent programming environment for novice programmers. 390-395 - Masahiro Tabuchi, Yoichi Muraoka:
MeSOD-the metric spatial object data model for a multimedia application: hyperbook. 396-401 - Hiroyuki Furuya, Fumio Hattori:
Knowledge acquisition system for hierarchical classification problems. 402-407 - Richard Atkins:
Tool attachment in EIS. 410-414 - Roger L. Clark:
Engineering data management directions. 415-420 - Denise J. Ecklund, Roy A. Smith:
Object oriented performance for electronic design automation tools. 421-424 - Ted Stout:
Integrating the open framework. 427- - Kate Rotzell:
Engineering information systems: modeling and management. - Sandra Heiler, Arnon Rosenthal:
Engineering databases, tools, and management: an integration framework. 431-437 - William Kent:
The many forms of a single fact. 438-443 - Gio Wiederhold, Marianne Winslett, Nicholas J. Naclerio:
Layering an engineering information system. 444-449 - Philip Gerskovich, Pete Wilson:
A scalar supercomputer. 454-455 - Peter S. Guilfoyle:
32 bit digital optical computer. 456-459 - Laurence H. Cooke:
Re-implementation synthesis. 462-468 - Howard A. Landman:
Logic synthesis at Sun. 469-472 - Jim Straus:
Synthesis from register-transfer level VHDL. 473-477 - Steven M. Eliscu:
Getting to market all-level ASIC functionality. 480-483 - Stephen Walters:
Reprogrammable hardware emulation for ASICs makes through design verification practical. 484-486 - Sam W. Beal:
Rapid design implementation with field-programmable gate arrays. 487-490 - Tim Riordan, G. P. Grewal, Simon Hsu, John Kinsel, Jeff Libby, Roger March, Marvin Mills, Paul Ries, Randy Scofield:
System design using the MIPS R3000/3010 RISC chipset. 494-498 - A. Thampy Thomas:
A single cycle VLSI CISC-based workstation: system overview and performance characteristics. 500-503 - David R. Stiles, Harold L. McFarland:
Pipeline control for a single cycle VLSI implementation of a complex instruction set computer. 504-508 - Atiq Raza:
Technology constraints on VLSI processor implementation. 509-512 - Bruce Schurmann, Lester M. Crudele:
The design environment for the Stellar GS1000. 516-522 - Barry Flahive:
Design methodology and environment for the Apollo DN10000. 523-528 - Glen S. Miranker, Jonathan J. Rubinstein, John Sanguinetti:
Getting it right the first time: the Ardent design methodology. 529-533 - David B. Gustavson:
Scalable coherent interface. 536-538 - David V. James:
Scalable I/O architecture for buses. 539-544 - Stephen A. Rogers, Leonard E. Schulwitz:
Reconfiguration architecture for distributed processing. 545-551 - Kenneth J. Omahen:
Practical strategies for configuring balanced transaction processing systems. 554-559 - Carolyn Turbyfill, Cyril U. Orji, Dina Bitton:
AS3AP-a comparative relational database benchmark. 564- - Peter B. Mark:
The Sequoia approach to high-performance fault-tolerant I/O. - Pentti Kanerva:
A cerebellar-model associative memory as a generalized random-access memory. 570-576 - James S. Albus:
The Marr and Albus theories of the cerebellum-two early models of associative memory. 577-582 - Egon E. Loebner:
Intelligent network management and functional cerebellum synthesis. 583-588 - Fred Schindler:
Video animation on the Macintosh factory floor. 590-591 - William A. Rosenthal:
Video animation: increasing the bandwidth of media for education. 592-593
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.