Michael G. Walker Note: Pages 1 thru 501 will be found in volume 1. managing reliable software. [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:502-506 [Conf]
Gregory A. Marks Computer-assisted telephone interviewing in the survey research process (Panel Discussion). [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:515- [Conf]
Alfred C. Weaver A real-time, multi-task programming language for microprocessor-based industrial process control. [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:522-525 [Conf]
Richard D. Hackathorn Research issues of personal computing within the corporate environment. [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:547-551 [Conf]
Norman Statland The impending impact of distributed information systems. [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:576-584 [Conf]
J. Russell Hogan A Correlation Echo Sounder Processor used to provide reliable bottom depth data for profiling. [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:617-621 [Conf]
Rob Kling Automated information systems as social resources in policy making. [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:666-674 [Conf]
Charles E. Donaghey CELLSIM: A digital simulation language for cell kinetic modelling. [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:684-697 [Conf]
Terry Miller The impact of government regulations and policy on the computer industry. [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:725- [Conf]
Lee Ohringer Computer security in the federal government: Where we are, how we got here, where we are going. [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:726- [Conf]
Stephen W. Smoliar A lexical analysis of Labanotation with an associated data structure. [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:727-730 [Conf]
Henry Fuchs, Zvi M. Kedem The "highly intelligent" tablet as an efficient pointing device for interactive graphics (Preliminary Report). [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:765-769 [Conf]
Philip Milliman Measurement and evaluation of modern programming practices. [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:779- [Conf]
Lorraine Duvall The Data and Analysis Center for Software(Presentation Abstract). [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:780- [Conf]
Alan Sukert Applications of error data in software error model validations(Presentation Abstract). [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:780- [Conf]
Marilyn S. Fujii Software verification and validation(Position Statement). [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:782- [Conf]
Leon G. Stucki Validation and verification vs. The software life cycle(Position Statement). [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:783- [Conf]
Sabina H. Saib Software verification and validation in practice and theory (Position Statement). [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:784-785 [Conf]
David C. Luckham A brief account: Implementation and applications of a Pascal program verifier (Position Statement). [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:786-792 [Conf]
Joyce Currie Little An overview of ACM guidelines and recommendations for a community and junior college career program in computer programming. [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:793-797 [Conf]
John T. Gorgone, John F. Schrage A design for the education of computer programmers at the associate level within a baccalaureate level institution. [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:807-811 [Conf]
Donald H. Beil The data processing Curriculum of the National Technical Institute for the Deaf: A suggested implementation for an AAS degree program in computer programming. [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:812-821 [Conf]
Philip A. Coates Directory-Assisted Abbreviated Name Entry: Telephone dialing by name. [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:827-833 [Conf]
Thomas C. Irby Minimizing the retrieval time of scatter storage techniques. [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:834-839 [Conf]
Jesse M. Heines The use of interactive, computer-managed instruction to control the quality of self-paced training without requiring the presence of an instructor. [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:849-854 [Conf]
Joe W. Duran Heuristics for program synthesis using loop invariants. [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:891-900 [Conf]
L. A. Cox Jr. Predicting concurrent computer system performance using Petri-Net models. [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:901-913 [Conf]
C. P. Huang An efficient algorithm for computing powers of triangular matrices. [Citation Graph (0, 0)][DBLP] ACM Annual Conference (2), 1978, pp:954-957 [Conf]