157 results
Search Results
2. Extending the Information Theory Approach to Converting Limited-Entry Decision Tables to Computer Programs.
- Author
-
Manacher, G. and Shwayder, Keith
- Subjects
COMPUTER software ,COMPUTER algorithms ,PROGRAMMING languages ,DECISION logic tables ,FLOW charts ,COMPUTER programming - Abstract
This paper modifies an earlier algorithm for converting decision tables into flowcharts which minimize subsequent execution time when compiled into a computer program. The algorithms considered in this paper perform limited search and, accordingly, do not necessarily result in globally optimal solutions. However, the greater search effort needed to obtain a globally optimal solution for complex decision tables is usually not justified by sufficient savings in execution time. There is an analogy between the problem of converting decision tables into efficient flowcharts and the well-understood problem in information theory of noiseless coding. The results of the noiseless coding literature are used to explore the limitations of algorithms used to solve the decision table problem. The analogy between the two problems is also used to develop improvements to the information algorithm in extending the depth of search under certain conditions and in proposing additional conditions to be added to the decision table. Finally, the information algorithm is compared with an algorithm proposed in a recent paper by Verhelst. [ABSTRACT FROM AUTHOR]
- Published
- 1974
3. professional activities.
- Subjects
ASSOCIATIONS, institutions, etc. ,CONFERENCES & conventions ,COMPUTER programming ,COMPUTER algorithms ,COMPUTER science - Abstract
The article presents information on professional activities within the Association for Computing Machines (ACM). ACM Southeastern Regional Meeting will be conducted on April 18-20, the ACM Southeastern Region will hold a meeting at the Sheraton-Nashville Hotel in Nashville, Tennessee. The Association for Computing Machinery will sponsor the Sixth International Users Conference on May 14-17 at the Sheraton-Anaheim Hotel in Anaheim California. Coast Community. The Boy Scouts of America (BSA) recently published a booklet for use in its merit badge program on Computing. BSA is now looking for computer professionals to help Scouts attain the required skilk for this badge interested persons should contact their local Boy Scout offices.
- Published
- 1974
4. Numerical Properties of the Ritz-Trefftz Algorithm for Optimal Control.
- Author
-
Bosarge, Jr., W. E., Johnson, O. G., and Timlake, W. P.
- Subjects
COMPUTER algorithms ,REAL-time computing ,NUMERICAL analysis ,MATHEMATICAL models ,RICCATI equation ,DIFFERENTIAL equations - Abstract
In this paper the Ritz-Trefftz algorithm is applied to the computer solution of the state regulator problem. The algorithm represents a modification of the Ritz direct method and is designed to improve the speed of solution and the storage requirements to the point where real-time implementation becomes feasible. The modification is shown to be more stable computationally than the traditional Ritz approach. The first concern of the paper is to describe the algorithm and establish its properties as a valid and useful numerical technique. In particular such useful properties as definiteness and reasonableness of condition are established for the method. The second part of the paper is devoted to a comparison of the new techniques with the standard procedure of numerically integrating a matrix Riccati equation to determine a feedback matrix. The new technique is shown to be significantly faster for comparable accuracy. [ABSTRACT FROM AUTHOR]
- Published
- 1971
- Full Text
- View/download PDF
5. The Mobile Programming System: STAGE2.
- Author
-
Waite, W. M. and Morris, R.
- Subjects
MACRO processors ,MACROPROGRAMMING ,COMPUTERS ,COMPUTER algorithms ,ELECTRONIC data processing ,MATHEMATICAL models - Abstract
STAGE2 is the second level of a bootstrap sequence which is easily implemented on any computer. It is a flexible, powerful macro processor designed specifically as a tool for constructing machine-independent software. In this paper the features provided by STAGE2 are summarized, and the implementation techniques which have made it possible to have STAGE2 running on a new machine with less than one man-week of effort are discussed. The approach has been successful on over 15 machines of widely varying characteristics. [ABSTRACT FROM AUTHOR]
- Published
- 1970
- Full Text
- View/download PDF
6. Variable-Precision Exponentiation.
- Author
-
Richman, P. L. and Timlake, W. P.
- Subjects
COMPUTER algorithms ,COMPUTER programming ,ARTIFICIAL intelligence ,PROGRAMMING languages ,ELECTRONIC data processing ,COMPUTER science - Abstract
A previous paper presented an efficient algorithm, called the Recomputation Algorithm, for evaluating a rational expression to within any desired tolerance on a computer which performs variable-precision arithmetic operations. The Recomputation Algorithm can be applied to expressions involving any variable-precision operations having O(10
-... + Σ ∣ε∣) error bounds, where p denotes the operation's precision and ε, denotes the error in the operation's with argument. This paper presents an efficient variable-precision exponential operation with an error bound of the above order. Other operations, such as log, sin, and cos, which have simple series expansions, can be handled similarly. [ABSTRACT FROM AUTHOR]- Published
- 1973
- Full Text
- View/download PDF
7. Register Allocation Via Usage Counts.
- Author
-
Freiburghouse, R. A. and Manacher, G.
- Subjects
COMPUTER algorithms ,REGISTERS (Computers) ,COMPUTER storage devices ,COMPUTER programming ,COMPUTER simulation ,OPERATIONS research - Abstract
This paper introduces the notion of usage counts, shows how usage counts can be developed by algorithms that eliminate redundant computations, and describes how usage counts can provide the basis for register allocation. The paper compares register allocation based on usage counts to other commonly used register allocation techniques, and presents evidence which shows that the usage count technique is significantly better than these other techniques. [ABSTRACT FROM AUTHOR]
- Published
- 1974
- Full Text
- View/download PDF
8. Scheduling Independent Tasks To Reduce Mean Finishing Time.
- Author
-
Bruno, J., Coffman, Jr., E. G., and Sethi, R.
- Subjects
COMPUTER algorithms ,COMPUTER programming ,JOB shops ,TASK analysis ,PRODUCTION scheduling ,POLYNOMIALS - Abstract
Sequencing to minimize mean finishing time (or mean time in system) is not only desirable to the user, but it also tends to minimize at each point in time the storage required to hold incomplete tasks. In this paper a deterministic model of independent tasks is introduced and new results are derived which extend and generalize the algorithms known for minimizing mean finishing time. In addition to presenting and analyzing new algorithms it is shown that the most general mean-finishing-time problem for independent tasks is polynomial complete, and hence unlikely to admit of a non-enumerative solution. [ABSTRACT FROM AUTHOR]
- Published
- 1974
- Full Text
- View/download PDF
9. General Performance Analysis of Key-to-Address Transformation Methods Using an Abstract File...
- Author
-
Lum, V. Y. and Morgan, H.
- Subjects
COMPUTER algorithms ,PERFORMANCE evaluation ,MATHEMATICAL transformations ,ALGORITHMS ,COMPUTER files ,PROBABILITY theory - Abstract
This paper presents a new approach to the analysis of performance of the various key-to-address transformation methods. In this approach the keys in a file arc assumed to have been selected from the key space according to a certain probabilistic selection algorithm. All files with the same number of keys selected from this key space will be suitably weighted in accordance with the algorithm, and the average performance of the transformation methods on these files will be used as the potential of these methods. Using this analysis, methods with the same overall performance can be classified and key distributions partial to certain transformations can be identified. All this can be done analytically. The approach is applied to a group of transformation methods using files whose keys are selected randomly. [ABSTRACT FROM AUTHOR]
- Published
- 1973
- Full Text
- View/download PDF
10. On the Time Required for a Sequence of Matrix Products.
- Author
-
Muraoka, Yoichi, Kuck, David J., and Gries, D.
- Subjects
PARALLEL computers ,COMPUTER algorithms ,MATRICES software ,COMPUTERS ,COMPUTER programming ,COMPUTER science - Abstract
This paper discusses the multiplication of conformable sequences of row vectors, column vectors, and square matrices. The minimum time required to evaluate such products on ordinary serial computers as well as parallel computers is discussed. Algorithms are presented which properly parse suck matrix sequences subject to the constraints of the machine organization. [ABSTRACT FROM AUTHOR]
- Published
- 1973
- Full Text
- View/download PDF
11. Garbage Collection for Virtual Memory Computer Systems.
- Author
-
Randell, B. and Baecker, H. D.
- Subjects
GARBAGE collection (Computer science) ,COMPUTER programming ,COMPUTER memory management ,COMPUTER algorithms ,VIRTUAL storage (Computer science) ,LIST processing (Electronic computers) - Abstract
In list processing there is typically a growing demand for space during program execution. This paper examines the practical implications of this growth within a virtual memory computer system, proposes two new garbage collection techniques for virtual memory systems, and compares them with traditional methods by discussion and by simulation. [ABSTRACT FROM AUTHOR]
- Published
- 1972
12. Context-Sensitive Parsing.
- Author
-
Woods, William A. and Bobrow, D. G.
- Subjects
PARSING (Computer grammar) ,ALGORITHMS ,COMPUTATIONAL linguistics ,MULTILINGUAL computing ,COMPUTER algorithms ,LOOPS (Group theory) - Abstract
This paper presents a canonical form for context-sensitive derivations and a parsing algorithm which finds each context-sensitive analysis once and only once. The amount of memory required by the algorithm is essentially no more than that required to store a single complete derivation. In addition, a modified version of the basic algorithm is presented which blocks infinite analyses for grammars which contain loops. The algorithm is also compared with several previous parsers for context-sensitive grammars and general rewriting systems, and the difference between the two types of analyses is discussed. The algorithm appears to be complementary to an algorithm by S. Kuno in several respects, including the space-time trade-off and the degree of context dependence involved. [ABSTRACT FROM AUTHOR]
- Published
- 1970
- Full Text
- View/download PDF
13. AIgorithms.
- Author
-
Fosdick, LLoyd D.
- Subjects
COMPUTER algorithms ,FACTOR analysis ,ALGORITHMS ,ANALYSIS of variance ,STATISTICAL correlation ,MULTIVARIATE analysis - Abstract
The article presents comments on several algorithms. The algorithms offer information on factorial analysis of variance, shortest-path forest with topological ordering, permanent function of a square matrix I and II, generation of random permutations, complex error function, associated legendre functions of the first kind for real or imaginary arguments, computation of Fourier coefficients, generalized least squares fit by orthogonal polynomials and generation of permutations in pseudolexicographic order.
- Published
- 1969
14. OPTIMAL COUPON SCHEDULES FOR MUNICIPAL BONDS.
- Author
-
Cohen, Kalman J. and Hammer, Frederick S.
- Subjects
MUNICIPAL bonds ,LINEAR programming ,MATHEMATICAL programming ,COMPUTER programming ,TENDER offers ,GOVERNMENT securities ,MUNICIPAL finance ,SYNDICATES (Finance) ,MATHEMATICAL optimization ,COMPUTER algorithms ,DECISION support systems ,DECISION making - Abstract
When an underwriting syndicate submits a bid for a new issue of municipal bonds, one of the important decisions that it must make involves the scheduling of interest coupons to be placed on the bonds. Given the bid specifications stated by the issuing municipality and some prior decisions of the underwriters, it is shown that the determination of the optimal coupon schedule can be expressed as a linear programming problem. Since this LP problem has a special structure, a simple computational algorithm requiring less computation than the simplex method is derived. This paper goes beyond previous contributions to the literature in three important ways. First, simple formulas for obtaining the dual evaluators are developed; the marginal effect of shifts in the yield curve is also presented. Second, it is shown that in the non-integer year case both the conclusions of previous writers and the conventional heuristics of the market may be erroneous, whereas the general solution techniques developed in this paper remain valid. Finally, a direct analogy between the coupon schedule problem and the microeconomic theory of the firm is used in obtaining the special computational algorithm for this LP problem. [ABSTRACT FROM AUTHOR]
- Published
- 1965
- Full Text
- View/download PDF
15. Algorithm 483 Masked Three-Dimensional Plot Program with Rotations [J6].
- Author
-
Fosdick, L. D., Cline, A. K., and Watkins, Steven L.
- Subjects
COMPUTER programming ,COMPUTER algorithms ,ELECTRONIC data processing ,THREE-dimensional imaging ,COMPUTER systems - Abstract
This article discusses various issues related to the three-dimensional plot programming and algorithm 483. PLOT3D will accept three-dimensional data in various forms, rotate it in three-space, and plot the projection of the resulting figure onto the x-y plane. Those lines or portions of lines that should be hidden by previous lines are masked. Each call to PLOT3D causes one line to be plotted. A line consists of a sequence of points in three-space that will be connected using linear interpolation between adjacent points. This sequence of points is specified by three sequences of real numbers, the x, y, and z components of each point. Each of these sequences of real numbers can be specified either as being equally spaced, and therefore denoted by an initial value and an increment, or as being contained in a real array. PLOT3D attempts to minimize plotter movement by beginning at the alternate end of successive lines. A more detailed description of the parameters is contained in the comments at the beginning of the program listing. This routine was developed at the Applied Research Laboratories on their Control Data Corp. 3200 computer system.
- Published
- 1974
16. Teaching "About Programming".
- Author
-
Rosin, Robert F. and Shaw, M.
- Subjects
COMPUTER programming ,PROGRAMMING languages ,GRADUATE education ,COMPUTER algorithms ,PROFESSIONAL employees - Abstract
This paper presents the goals and organization of a course about programming designed to provide entering students in a graduate program with a cultural enrichment in their professional lives. The students are expected to have taken at least two programming courses prior to this one and, therefore, to be familiar with at least two programming languages, both as students and users. Teaching someone how to program is similar to teaching him to play a musical instrument; neither skill can be taught—they must be learned. However, the teacher still serves several vital purposes: to present a set of rules for producing well-formed utterances; to offer numerous demonstrations of his own skill; and to function as an involved critic. Finally, the teacher is the source of information about the process in which the student is involved. [ABSTRACT FROM AUTHOR]
- Published
- 1973
- Full Text
- View/download PDF
17. Optimum Data Base Reorganization Points.
- Author
-
Shneiderman, Ben and Benjamin, R.
- Subjects
CORPORATE reorganizations ,DATABASES ,COMPUTER files ,PROGRAM transformation ,COMPUTER programming ,COMPUTER algorithms - Abstract
In certain data base organization schemes the cost per access may increase due to structural inefficiencies caused by updates. By reorganizing the data base the cost per access may be reduced. However, the high cost of a reorganization prohibits frequent reorganizations. This paper examines strategies for selecting the optimum reorganization points. [ABSTRACT FROM AUTHOR]
- Published
- 1973
- Full Text
- View/download PDF
18. Cellular Arrays for the Solution of Graph Problems.
- Author
-
Levitt, K. N., Kautz, W. H., and Ashenhurst, R. L.
- Subjects
GRAPH theory ,PARALLEL processing ,COMPUTER algorithms ,ELECTRONIC data processing ,MATRICES (Mathematics) ,COMPUTER science - Abstract
A cellular array is a two-dimensional, checkerboard type interconnection of identical modules (or cells), where each cell contains a few hits of memory and a small amount of combinational logic, and communicates mainly with its immediate neighbors In the array. The chief computational advantage offered by cellular arrays is the improvement in speed achieved by virtue of the possibilities for parallel processing. In this paper it is shown that cellular arrays are inherently well suited for the solution of many graph problems. For example, the adjacency matrix of a graph is easily mapped onto an array; each matrix element is stored in one cell of the array, and typical row and column operations are readily implemented by simple cell logic. A major challenge in the effective use of cellular arrays for the solution of graph problems is the determination of algorithms that exploit the possibilities for parallelism, especially for problems whose solutions appear to be inherently serial. In particular, several parallelized algorithms are presented for the solution of certain spanning tree, distance, and path problems, with direct applications to wire routing, PERT chart analysis, and the analysis of many types of networks. These algorithms exhibit a computation time that in many cases grows at a rate not exceeding log
2 , n, where n is the number of nodes in the graph. Straight. forward cellular implementations of the well-known serial algorithms for these problems require about n steps, and noncellular implementations require from n2 to n3 steps. [ABSTRACT FROM AUTHOR]- Published
- 1972
- Full Text
- View/download PDF
19. The Reconstruction of Binary Patterns from Their Projections.
- Author
-
Shi-Kuo Chang
- Subjects
BINARY number system ,COMPUTER algorithms ,NUMBER systems ,COMPUTER arithmetic ,COMPUTER programming ,ALGORITHMS - Abstract
Given the horizontal and vertical projections of a finite binary pattern f, can we reconstruct the original pattern f? In this paper we give a characterization of patterns that ore reconstructable from their projections. Three algorithms ore developed to reconstruct both unambiguous and ambiguous patterns, it is shown that an unambiguous pattern can be perfectly reconstructed in time m × n and that a pattern similar to an ambiguous pattern can also be constructed in time m × n, where m, n are the dimensions of the pattern frame. [ABSTRACT FROM AUTHOR]
- Published
- 1971
- Full Text
- View/download PDF
20. Pattern Width at a Given Angle.
- Author
-
Klinger, Allen
- Subjects
PATTERN perception ,COMPUTER algorithms ,COMPUTER programming ,FORM perception ,MATHEMATICAL analysis ,CODING theory - Abstract
That the pattern feature "width as a function of angle" possesses several possible interpretations is demonstrated in this paper, which is a review of the width concept in pattern recognition and the geometrical concept itself. The object of the work is to clarify how the word description can be made precise so that computer algorithms for feature extraction may be obtained; the focus is on theoretical subject matter. The results consist of a set-theoretic definition of width-at-angle, a theorem relating it to the pattern boundary radius vector, and descriptions of alternate widths. All widths are calculated for an illustrative example; graphical and tabular comparisons are given. Substantial variation in width-at-angle magnitude is found. The principal conclusion is that the set-theoretic width-at-angle is a useful pattern feature when it can be easily computed. Further investigation of the information contained in only port of a width function is recommended for cases where computation of width-at-angle is difficult. [ABSTRACT FROM AUTHOR]
- Published
- 1971
- Full Text
- View/download PDF
21. ASP--A Ring Implemented Associative Structure Package.
- Author
-
McClure, R. M., Lang, C. A., and Gray, J. C.
- Subjects
DATA structures ,ELECTRONIC data processing ,ELECTRONIC file management ,COMPUTER programming ,COMPUTER algorithms ,COMPUTER simulation - Abstract
ASP is a general purpose Associative Data Structure Package in which an arbitrary number of data items and an arbitrary number of the relationships between these data items may be represented. A special picture language is described which has proved very useful for drawing ASP structures on paper. ASP structures are built and manipulated by means of a series of macro coils, which are outlined in the Appendix. Emphasis is on the philosophy of the system rather than a particular implementation, though sufficient information is included to enable the reader to produce his own implementation of ASP. [ABSTRACT FROM AUTHOR]
- Published
- 1968
22. Error-Free Methods for Statistical Computations.
- Author
-
Rodden, B. E.
- Subjects
ALGORITHMS ,ALGEBRA ,MATHEMATICS ,MATHEMATICAL statistics ,ERROR analysis in mathematics ,COMPUTER algorithms - Abstract
Neely has discussed computational error generated by some algorithms used to compute various statistics. In the present paper methods are described which are error-free, simple in concept, and usually less costly in machine time than those mentioned by Neely. [ABSTRACT FROM AUTHOR]
- Published
- 1967
- Full Text
- View/download PDF
23. COMING EVENTS.
- Subjects
COMPUTERS conferences ,CONFERENCES & conventions ,TECHNOLOGY & law ,COMPUTER programming ,COMPUTER algorithms ,ELECTRONIC data processing - Abstract
The article presents information on events related to computers and technology. The Association for Computing Machinery (ACM) Joint User Group (JUG) and Council to Advance Programming would hold a workshop on November 7, 1966 in the Garden Lounge of the Del Webb Town House, San Francisco. Major topics would be the purpose and effectiveness of user groups, inter-relationships between user groups, and their relationship to JUG. Scientists, engineers and law enforcement officials throughout the nation were being extended an open invitation to submit papers for presentation at a symposium to study application of science and technology to law enforcement scheduled for March 7-9, 1967. "Systems Approach to Biology" was the theme of the Third Systems Symposium sponsored by the National Science Foundation and Case Institute of Technology. It would be held at Case on October 20-21, 1966. The University of Pittsburgh would hold its second national conference on "Electronic Information Handling" on April 12-14, 1967.
- Published
- 1966
24. A NOTE ON PARAMETRIC NETWORK FLOWS.
- Author
-
Minieka, Edward
- Subjects
ALGORITHMS ,COMPUTER algorithms ,COMPUTER networks ,NETWORK PC (Computer) ,LINEAR programming ,DATA flow computing ,MODULES (Algebra) ,MATHEMATICAL programming ,COMPUTER programming ,SPANNING trees - Abstract
In their paper [1], Doulliez and Rao present algorithms that solve two flow problems for a single source, multi-terminal network. The first problem that they solve is the construction of a flow that maximizes the value of t, where the demand at each sink is a nondecreasing, linear function of t. Given such a flow, the second problem that they solve is the construction of a flow that maximizes the value of t when the capacity of an arc is reduced. This paper supplies a finiteness proof for the first algorithm and sketches a finiteness proof for the second algorithm. The proofs are based on the well-known fact that a network possesses only a finite number of different spanning trees. [ABSTRACT FROM AUTHOR]
- Published
- 1973
- Full Text
- View/download PDF
25. Covering the Computer Field.
- Author
-
Salton, G.
- Subjects
PROGRAMMING languages ,COMPUTER algorithms - Abstract
The article presents the periodical's editorial policy of publishing articles related to programming language development, compiler management and construction, numerical methods, and computer algorithms.
- Published
- 1967
- Full Text
- View/download PDF
26. Minimax Logarithmic Error.
- Author
-
Dunham, Charles B.
- Subjects
COMPUTER algorithms ,LOGARITHMIC functions ,SQUARE root ,LOGARITHMS ,ALGORITHMS ,COMPUTER programming ,COMPUTER arithmetic - Abstract
The article discusses the computation of rational approximations using existing algorithms. In a recent paper it is shown that minimax logarithmic approximations are optimal for square root calculations, making the minimax logarithmic problem of practical interest. The authors point out how rational approximations which are best with respect to maximum logarithmic error can be computed by existing algorithms. Suppose one wishes to approximate a positive continuous function "f" by a positive rational function R, then the logarithmic error at a point x is log (f(x))-- log (R(x)). The approximation problem is thus equivalent to ordinary approximation of continuous function g = log (f) by log {R).
- Published
- 1969
- Full Text
- View/download PDF
27. A PROPOSED GENERALIZED HEURISTIC ALGORITHM FOR SCHEDULING WITH RESPECT TO n-INTERRELATED CRITERION FUNCTIONS.
- Author
-
Taf, Martin Israel and Reisman, Arnold
- Subjects
COMPUTER algorithms ,PRODUCTION (Economic theory) ,RESOURCE allocation ,ALGORITHMS ,PRODUCTION scheduling ,HEURISTIC ,BUDGET ,WAREHOUSE management - Abstract
This paper offers a heuristic algorithm for the allocation of resources both in physical space and in time. The algorithm, to be implemented by a computer, will seek out good, if not optimum, combinations of items, namely, schedules and arrangements with respect to more than one payoff function. The algorithm has application in such diverse fields as the time scheduling budget allocations, courses of study in training programs, transportation, interdependent projects, and allocation in two or three dimensional space of production, service and/or warehousing facilities. [ABSTRACT FROM AUTHOR]
- Published
- 1966
- Full Text
- View/download PDF
28. AUGMENTED THREADED INDEX METHOD FOR NETWORK OPTIMIZATION.
- Author
-
Glover, F., Klingman, D., and Stutz, J.
- Subjects
ALGORITHMS ,COMPUTER networks ,COMPUTER algorithms ,COMPUTER programming ,COMPUTER storage devices ,COMPUTER input-output equipment ,ELECTRONIC data processing ,INFORMATION networks ,DATA transmission systems - Abstract
Easily manipulated list structures for recording the basis tree for adjacent extreme point (“simplex type”) network algorithms are paramount to the development of computationally efficient network algorithms. This paper presents a new list structure which is shown to be computationally more efficient and to require one-third less computer memory to implement than all alternate list structures. [ABSTRACT FROM AUTHOR]
- Published
- 1974
- Full Text
- View/download PDF
29. IMPROVED MEMO FUNCTIONS WITH APPLICATIONS IN REAL TIME COMPUTING.
- Author
-
Sampson, Jeffrey R. and Tartar, John
- Subjects
COMPUTER algorithms ,MATHEMATICAL functions ,COMPUTER storage devices ,COMPUTER input-output equipment ,COMPUTER systems ,ELECTRONIC systems ,COMPUTERS - Abstract
Several major modifications to Michie's memo function proposal allow this technique to be effectively extended to the evaluation of functions of (single) real arguments on a small digital computer. This paper describes the new algorithm in some detail and reports the results of two series of experiments which demonstrate (1) notable increases in computation speed for repetitive evaluation of two functions on a PDP-9 computer, and (2) dynamic responses of the memo dictionary to argument populations with time varying parameters. Both types of results make the improved memo function algorithm particularly attractive for use in real time computing environments of the sort encountered in process control applications. In the concluding section, further extensions of the memo algorithm are considered and a comparison drawn between replacement of memo dictionary entries and page replacement algorithms in virtual memory systems. [ABSTRACT FROM AUTHOR]
- Published
- 1974
- Full Text
- View/download PDF
30. An Alogorithm for Generating Structural Surrogates of English Text.
- Author
-
Strong, Suzanne M.
- Subjects
COMPUTER algorithms ,ALGORITHMS ,SYNTAX (Grammar) ,GRAMMAR ,COMPUTER programming ,VOCABULARY - Abstract
This paper describes the development and application of an algorithm which generates non-linear representations of English text. The algorithm uses the results of a syntactic analysis system and a set of rules which prescribe linkages to generate a graph of a sentence. The shape of these graphs corresponds to the syntax of the sentence; the labels correspond to the vocabulary of the sentence and the edge types correspond to case grammar roles. The sentence graphs can then be interconnected at common nodes and analyzed according to common edges. Preliminary experimentation has yielded promising results. It appears that the algorithm produces a representation of English text which could be quite useful in automatic language processing. [ABSTRACT FROM AUTHOR]
- Published
- 1974
- Full Text
- View/download PDF
31. A New Integration Algorithm for Ordinary Differential Equations Based on Continued Fraction Approximations.
- Author
-
Willers, I. M. and Willoughby, R. A.
- Subjects
COMPUTER algorithms ,DIFFERENTIAL equations ,INTEGER programming ,NUMERICAL integration ,BOUNDARY value problems ,COMPUTER science ,TAYLOR'S series - Abstract
A new integration algorithm is found, and an implementation is compared with other programmed algorithms. The new algorithm is a step-by-step procedure for solving the initial value problem in ordinary differential equations. It is designed to approximate poles of small integer order in the solutions of the differential equations by continued fractions obtained by manipulating the sums of truncated Taylor series expansions. The new method is compared with the Gragg-Bulirsch-Stoer, and the Taylor series method. The Taylor series method and the new method are shown to be superior in speed and accuracy, while the new method is shown to be most superior when the solution is required near a singularity. The new method can finally be seen to pass automatically through singularities where all the other methods which are discussed will have failed. [ABSTRACT FROM AUTHOR]
- Published
- 1974
- Full Text
- View/download PDF
32. AN INVERSE-BASIS METHOD FOR BEALE'S QUADRATIC PROGRAMMING ALGORITHM.
- Author
-
Land, A. H. and Morton, G.
- Subjects
QUADRATIC programming ,COMPUTER algorithms ,NONLINEAR programming ,MATHEMATICAL programming ,DYNAMIC programming ,ALGORITHMS ,INVERSE functions ,COMPUTER programming - Abstract
This paper presents a version of Beale's Quadratic Programming Algorithm [1], [2] for solving a problem of maximizing a quadratic function under linear constraints. The modification discussed here makes it possible to retain the "inverse basis" tableau which has to be augmented by additional constraints to be called "auxiliary." The algorithm has been successfully tested on a computer. [ABSTRACT FROM AUTHOR]
- Published
- 1973
- Full Text
- View/download PDF
33. A COMPUTER COMPARISON OF FOUR QUADRATIC PROGRAMMING ALGORITHMS.
- Author
-
Braitsch, Jr., Raymond J.
- Subjects
QUADRATIC programming ,ALGORITHMS ,PROBLEM solving ,ITERATIVE methods (Mathematics) ,MATHEMATICAL programming ,ACCELERATION of convergence in numerical analysis ,NONLINEAR programming ,COMPUTER algorithms ,SYSTEM analysis ,OPERATIONS research ,ELECTRONIC data processing - Abstract
This paper compares the computational performance of the quadratic programming algorithms of Dantzig, Beale, Wolfe and a modification of Wolfe's algorithm. Problems are generated and solved on the computer with iteration count serving as the principal method of comparison. The effect of certain problem parameters on rate of convergence is considered and computer time and storage requirements of the four algorithms are discussed. [ABSTRACT FROM AUTHOR]
- Published
- 1972
- Full Text
- View/download PDF
34. THE EFFICIENCY OF COMPUTER ALGORITHMS FOR PLANT LAYOUT.
- Author
-
Ritzman, Larry P.
- Subjects
PLANT layout ,COMPUTER algorithms ,ALGORITHMS ,COMPUTER software ,INDUSTRIAL engineering ,PRODUCTION engineering ,PRODUCTION (Economic theory) ,FACTORY design & construction ,FACILITY management ,LOCATION analysis ,MATHEMATICAL models ,PROBLEM solving - Abstract
This paper presents the results of comparing experimentally the performance of four of the more promising computer algorithms for the plant layout problem. CDC 3600 computer programs are tested with twenty-six test problems. The resulting solutions are evaluated in respect to both computer time requirements and objective function values. The experiment shows how these two performance measures vary with the algorithm used and various test problem characteristics. With the exception of two studies [4], [8], information on comparative performances of layout algorithms is very limited. [ABSTRACT FROM AUTHOR]
- Published
- 1972
- Full Text
- View/download PDF
35. THE EXTENSION OF THE CASCADE ALGORITHM TO LARGE GRAPHS.
- Author
-
Land, A. H. and Stairs, S. W.
- Subjects
FOUNDATIONS of arithmetic ,COMPUTER programming ,BRANCH & bound algorithms ,COMPUTER algorithms ,MATRICES (Mathematics) ,ALGORITHMS ,GRAPHIC methods ,GROUP extensions (Mathematics) ,MATHEMATICAL models ,EDUCATION - Abstract
Large graphs for which the calculation of the shortest distances between all vertices is required often consist of several parts with limited interconnections. This paper shows how this characteristic may be used to reduce computer storage for a matrix type calculation, to reduce calculational labour, and to provide results in a form which is particularly convenient if a subsequent assignment of commodity flow to shortest paths is needed. The technique presented here allows the partition to be arbitrary, save for a single, easily achieved, condition. [ABSTRACT FROM AUTHOR]
- Published
- 1967
- Full Text
- View/download PDF
36. AN ALGORITHM FOR THE CHEBYSHEV PROBLEM--WITH AN APPLICATION TO CONCAVE PROGRAMMING.
- Author
-
Zangwill, Willard I.
- Subjects
ALGORITHMS ,MATHEMATICAL programming ,CHEBYSHEV series ,CHEBYSHEV systems ,CHEBYSHEV approximation ,COMPUTER programming ,COMPUTER algorithms ,CONVEX programming ,CONCAVE functions ,EDUCATION - Abstract
The Chebyshev problem is to determine a point χ
α which solves maxα min i = 1, ···, N{gi (χ)}. By exploiting generalized inverses an algorithm is developed for determining χα . It is also shown that in a certain sense the Chebyshev problem is equivalent to the concave programming problem. Moreover, for the programming problem generated by the Chebyshev problem, the Kuhn-Tucker conditions are proven to be sufficient even though the feasible region may not be convex. [ABSTRACT FROM AUTHOR]- Published
- 1967
- Full Text
- View/download PDF
37. Computational Algorithms for Closed Queueing Networks with Exponential Servers.
- Author
-
Buzen, Jeffrey P.
- Subjects
QUEUING theory ,COMPUTER algorithms ,ITERATIVE methods (Mathematics) - Abstract
Presents the methods for computing the equilibrium distribution of customers in closed queueing networks with exponential servers. Evaluation of expressions for various marginal distributions; Computational algorithms based on two-dimensional iterative techniques; Examination of the storage allocation strategies and order of evaluation.
- Published
- 1973
- Full Text
- View/download PDF
38. Reduction of a Band-Symmetric Generalized Eigenvalue Problem.
- Author
-
Crawford, C. R. and Timlake, w. P.
- Subjects
EIGENVALUES ,COMPUTER algorithms ,MATRICES software ,SYMMETRIC matrices ,DATA transmission systems ,COMPUTER programming - Abstract
An algorithm is described for reducing the generalized eigenvalue problem Ax = λBx to an ordinary problem, in case A and B are symmetric hand matrices with B positive definite. If n is the order of the matrix and m the bandwidth, the matrices A and B are partitioned into m-by-m blocks; and the algorithm is described in terms of these blocks. The algorithm reduces the generalized problem to an ordinary eigenvalue problem for a symmetric hand matrix C whose bandwidth is the same as A and B. The algorithm is similar to those of Rutishauser and Schwartz for the reduction of symmetric matrices to band form. The calculation of C requires order n²m operation. The round-off error in the calculation of C is of the same order as the sum of the errors at each of the n
2 m steps of the algorithm, the latter errors being largely determined by the condition of B with respect to inversion. [ABSTRACT FROM AUTHOR]- Published
- 1973
- Full Text
- View/download PDF
39. A Highly Parallel Algorithm for Approximating All Zeros of a Polynomial with Only Real Zeros.
- Author
-
Timlake, W. P. and Patrick, Merrell L.
- Subjects
COMPUTER algorithms ,POLYNOMIALS ,NEWTON-Raphson method ,STOCHASTIC convergence ,APPROXIMATION theory ,MATHEMATICAL functions - Abstract
An algorithm is described based on Newton's method I which simultaneously approximates all zeros of a polynomial with only real zeros. The algorithm, which is conceptually suitable for parallel computation, determines its own starting values so that convergence to the zeros is guaranteed. Multiple zeros and their multiplicity are readily determined. At no point in the method is polynomial deflation used. [ABSTRACT FROM AUTHOR]
- Published
- 1972
40. official acm.
- Subjects
MEETINGS ,BUDGET ,COMPUTER programming ,INFORMATION resources ,COMPUTER algorithms ,ELECTRONIC data processing - Abstract
This article presents information on the Association for Computing Machinery's (ACM) Council Meeting that was held on May 14, 15, and 19, 1972. The spring Council Meeting consisted of three sessions. The Sunday evening meeting on May 14 dealt exclusively with AFIPS business; the session on Monday, May 15, was devoted to a report of the ACM financial status, and a critique of the proposed FY73 budget presented by the chairman pro tem of the Finance Committee, Herbert R.J. Grosch. Action items were handled at the Friday, May 19, session. The Council passed a motion that it is the sense of the ACM Council that AFIPS should be a strong and effective society of societies representing the whole information community. A motion to instruct the ACM representatives to AFIPS to strive for an AFIPS constitutional change to provide for only one class of membership in AFIPS failed. The ACM Council instructed its representatives to AFIPS to vote against full membership of Society for Industrial and Applied Mathematics and Instrument Society of America in AFIPS.
- Published
- 1972
41. Numerical Mathematics and Computer Science.
- Author
-
Traub, J. F.
- Subjects
NUMERICAL analysis ,COMPUTER algorithms ,COMPUTATIONAL complexity ,COMPUTER training ,MATHEMATICAL programming ,MACHINE theory ,COMPUTER programming ,MATHEMATICAL optimization ,CYBERNETICS - Abstract
Numerical mathematics is viewed as the analysis of continuous algorithms. Four of the components of numerical mathematics are discussed. These are: foundations (finite precision number systems, computational complexity), synthesis and analysis of algorithms, analysis of error, programs and program libraries. [ABSTRACT FROM AUTHOR]
- Published
- 1972
- Full Text
- View/download PDF
42. A Case Study in Programming for Parallel-Processors.
- Author
-
Ashenurst, R. L. and Rosenfeld, Jack L.
- Subjects
PARALLEL processing ,ELECTRONIC data processing ,COMPUTER systems ,COMPUTER programming ,INFORMATION retrieval ,COMPUTER algorithms - Abstract
An affirmative partial answer is provided to the question of whether it is possible to program parallel-processor computing systems to efficiently decrease execution time for useful problems. Parallel-processor systems ore multiprocessor systems in which several of the processors con simultaneously execute separate tasks of o single job, thus cooperating to decrease the solution time of a computational problem. The processors have independent instruction counters, meaning that each processor executes its own task program relatively independently of the other processors. Communication between cooperating processors is by means of data in storage shared by oil processors. A program for the determination of the distribution of current in an electrical network was written for a parallel-processor computing system, and execution of this program was simulated. The data gathered from simulation runs demonstrate the efficient solution of this problem, typical of a large class of important problems. It is shown that, with proper programming, solution time when N
p processors are applied approaches 1/Np times the solution time for a single processor, while improper programming con actually lead to an increase of solution time with the number of processors. Storage interference and other measures of performance are discussed. Stability of the method of solution was also investigated. [ABSTRACT FROM AUTHOR]- Published
- 1969
43. On the Implementation of AMBIT, A Language for Symbol Manipulation.
- Author
-
Christensen, Carlos
- Subjects
PROGRAMMING languages ,COMPUTER algorithms ,ALGORITHMS ,COMPUTER science ,DATA structures ,ELECTRONIC data processing - Abstract
A brief description is given of the implementation technique for the replacement rule of the AMBIT programming language. The algorithm for the "AMBIT scan" and an example of its application are given. The algorithm is applicable to other members of the family of string transformation languages of which AMBIT is a member, and it provides a rationale for the design of the AMBIT language. [ABSTRACT FROM AUTHOR]
- Published
- 1966
- Full Text
- View/download PDF
44. Algorithms.
- Subjects
COMPUTER algorithms ,NUMERICAL integration ,FOURIER series ,FOURIER analysis ,FOURIER integral operators ,COMPUTER programming - Abstract
The article focuses on an algorithm related to quadrature. FSER1 evaluates the integrals using the Filon quadrature algorithm. The user may request an evaluation of C only, S only, or both C and S. FSER1 contains an automatic error-control feature which selects an integration step size on the basis of an error parameter supplied by the user. The Filon quadrature formulas, truncation error, rounding error, and automatic error control are described in a companion paper by the authors. The calling parameters for this subroutine are defined as follows. F is the name of a FUNCTION subprogram F(X), supplied by the user, which evaluates F(X) appearing in the integrand, EPS is the name for "e" appearing in inequalities. It is used in the error control portion of the algorithm. The error in the computed values of C and S is related to "e" by the inequality. The user must assign a value to EPS before calling FSER1. MAX specifies the maximum number of halvings of the step size that are allowed.
- Published
- 1969
45. Letters to the Editor.
- Author
-
Iverson, Kenneth E., Gordon, R. M., Becker, Hal C., Longenecker, Jr., Herbert E., and Cusachs, L. Chopin
- Subjects
LETTERS to the editor ,COMPUTER software ,COMPUTER programming ,COMPUTER algorithms ,ELECTRONIC data processing ,MATHEMATICAL analysis - Abstract
Presents letters to the editor referencing issues published in previous issues of the periodical "Communications of the ACM." Remarks on Syntax specification in computer software; Views on technical meetings; Comments on molecular orbitals.
- Published
- 1965
- Full Text
- View/download PDF
46. Acm forum.
- Author
-
Rice, John R., Dewar, Robert B. K., Fosdick, Lloyd D., Charmonman, Srisakdi, Wagener, Jerrold L., Arbib, Michael A., Weizenbau, Joseph, and Rigo, Joseph T.
- Subjects
LETTERS to the editor ,COMPUTER science ,SCIENCE publishing ,COMPUTER algorithms ,COMPUTER software ,COMPUTER programming - Abstract
Presents several letters to the editor commenting on various topics related to the field of computer science. Arguments pertaining to the publication of computer programs; Publication of computer algorithm and programs; Discussion on structured computer programming; Discussion on the computer models of psychopathic behavior.
- Published
- 1974
47. Decomposition Programming: An Analysis of Matrix Substructure.
- Author
-
Bell, Earl J.
- Subjects
MATHEMATICAL decomposition ,COMPUTER algorithms ,COMPUTER programming - Abstract
Analyzes a petroleum blending problem to compare primal and primal-dual decomposition algorithms. Relevance of a substructure to the relative performance of the algorithms; Comparison of the absolute performance of the algorithms with a standard primal-Simplex solution without decomposition.
- Published
- 1967
- Full Text
- View/download PDF
48. Note on Triple-Precision Floating-Point Arithmetic with 132-Bit Numbers.
- Author
-
Ikebe, Yasuhiko
- Subjects
FLOATING-point arithmetic ,COMPUTER algorithms ,BINARY number system - Abstract
Describes a technique for triple-precision floating-point arithmetic. Machine with a word length of 48 bits; Derivation of the negative of each number with a bit-by-bit complementing of the binary representation; Description of the multiplication and division algorithms.
- Published
- 1965
- Full Text
- View/download PDF
49. Sorting.
- Author
-
Martin, William A.
- Subjects
- *
SORTING (Electronic computers) , *COMPUTER algorithms , *COMPUTER programming , *ELECTRONIC data processing , *ALGORITHMS - Abstract
The bibliography appearing at the end of this article lists 37 sorting algorithms and 100 books and papers on sorting published in the last 20 years. The basic ideas presented here have been abstracted from this body of work, and the best algorithms known are given as examples. As the algorithms are explained, references to related algorithms and mathematical or experimental analyses are given. Suggestions are then made for choosing the algorithm best suited to a given situation. [ABSTRACT FROM AUTHOR]
- Published
- 1971
- Full Text
- View/download PDF
50. On an Algorithm of Ghare and Taylor.
- Author
-
McLeavey, Dennis W.
- Subjects
COMPUTER algorithms ,COMPUTER programming ,ALGORITHMS ,ALGEBRA ,MATHEMATICS ,OPERATIONS research - Abstract
This note points out an example in which an algorithm reported by P. M. GHASS AND R. E. TAYLOR [Opns. Res. 17, 838–847 (1969)] for determining optimum redundancy in a series system does not produce an optimal solution. It presents the Ghare-Taylor solution along with a better feasible solution, and explains the necessary corrections to the Ghare-Taylor algorithm and the cause of the difficulty with it. The note thus questions the validity of the computer times reported by Ghare and Taylor and indicates a source yielding computer times for the corrected algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 1973
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.