Robert A. Allen The first class of "think time oriented" CPU scheduling algorithms. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:34-39 [Conf]
Ken R. Little Some suggestions for implementing closed laboratories in CS1. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:73-79 [Conf]
William A. Ward Jr. Integration of a workstation laboratory into a computer science curriculum. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:80-88 [Conf]
Marcus Brown, David Cordes The role of literate programming in the software engineering life-cycle. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:101-107 [Conf]
Frank Hadlock A context sensitive tabular parsing algorithm. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:111-117 [Conf]
David D. Langan A localized condition handling construct for a graphical dataflow language. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:118-124 [Conf]
David W. Boyd The C preprocessor and Jensen's device. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:125-129 [Conf]
W. A. Wand Jr., Y. Li Experiences vectorizing software for elliptic partial differential equations. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:169- [Conf]
Ted W. Goodman Identifying students who may experience difficulty in an introductory computer science course. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:182- [Conf]
Robert P. Trueblood, Pao-Ing Lai Improving the performance of the BDB system by changing the query processing temporary file structures. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:184- [Conf]
Harlan D. Webre Compromises and complexities associated with removal of MIS from the logical access authorization loop. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:185- [Conf]
C. N. Lapena, Walter D. Potter A limited survey of the effects of single parametric variation on the GENEtic search implementation system (GENESIS) package. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:186- [Conf]
R. T. Plant Incorporating software quality requirements into a development methodology for knowledge-based systems. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:188- [Conf]
James C. Pleasant Systematic program development and proof: Dromey's method versus top-down refinement. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:189- [Conf]
Marion G. Harmon Predicting execution time of real-time programs on contemporary machines. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:192- [Conf]
Gary Croucher Multiprocessor computer system for distributing real-time Ada applications. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:193- [Conf]
Mark Pendergast A data exchange paradigm for microprocessor-based groupware applications. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:194- [Conf]
Amos O. Olagunju An investigation of a 3-Poisson model as a basis for automatic index term selection. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:197- [Conf]
Kimberly D. Bozeman Intelligent tutoring systems for teaching algebra: the handling of student misconceptions. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:208- [Conf]
Kelly I. Morrison On the feasibility of automatically generating data flow diagrams from Ada. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:210- [Conf]
Koushik Banerjee Optimizing the design of a hydrostatic thrust bearing by applying genetic algorithms. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:211- [Conf]
Steven A. Cover Developing a modular image processing system under UNIX. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:212- [Conf]
Seok-Joong Yoon An approach to a methodology which is easy to use and application domain independent. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:213- [Conf]
John M. Boyer Partition algorithms for the doubly linked list. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:234- [Conf]
Jeffrey L. Hieb Improving the Smalltalk Browser: a case study in Smalltalk development. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:242-247 [Conf]
Steve Bailey An overview of parallel processing languages. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:248-255 [Conf]
Joel B. Davis Investigation of a gambling approach to the subjective entropy test. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:256-260 [Conf]
Ambresh Khanna A distributed algorithm for generation of the Kth best spanning tree. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:261-266 [Conf]
John C. Orthoefer The design and implementation of the network backup control language. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:329-332 [Conf]
Manojit Sarkar Runtime debuggers for parallel and distributed systems: a uniform design approach. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:333-336 [Conf]
Milo Januska The design of a private key cryptosystem. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1990, pp:337-340 [Conf]