{"title":"Extensions of variables and indexing conventions","authors":"R. Selfridge","doi":"10.1145/503643.503662","DOIUrl":"https://doi.org/10.1145/503643.503662","url":null,"abstract":"Data manipulation requires extreme flexibility of organization, but often at a price of rigid formats, either in working variables, or secondary storage, or both. In any computer language certain tasks are made easier by the richness of available operators, and the available primitives of APL are many and powerful. Additionally APL removes many of the 'memory allocation' rigidities of compiled languages; there are few questions of dimension and type to interfere with problem solution. It becomes natural under such circumstances to consider data manipulations in APL, which requires either additional syntax or drastic changes in approach.","PeriodicalId":166583,"journal":{"name":"Proceedings of the 16th annual Southeast regional conference","volume":"271 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1978-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122079160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An implementation technique for data base management systems","authors":"James R. Driscoll","doi":"10.1145/503643.503647","DOIUrl":"https://doi.org/10.1145/503643.503647","url":null,"abstract":"A relationship is a correspondence between the members of two sets of data values. In order to physically represent a relationship we must indicate the existence of connections between member occurrences of the two sets involved. The collection of connections is said to specify a link between the two sets. The purpose of this paper is to precisely describe the distinct forms of a link. It is shown that there are three forms; each form capturing distinct physical characteristics. The three forms precisely define what is meant by 1:1, 1:N and N:M links.","PeriodicalId":166583,"journal":{"name":"Proceedings of the 16th annual Southeast regional conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1978-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123914994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The need for achievement among data processing personnel: an empirical study","authors":"Charles K. Woodruff","doi":"10.1145/503643.503718","DOIUrl":"https://doi.org/10.1145/503643.503718","url":null,"abstract":"","PeriodicalId":166583,"journal":{"name":"Proceedings of the 16th annual Southeast regional conference","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1978-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117114009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of loading costs for various file organizations","authors":"D. Strickland, James D. Powell","doi":"10.1145/503643.503683","DOIUrl":"https://doi.org/10.1145/503643.503683","url":null,"abstract":"An algorithm is presented which determines the loading costs for the following file organizations: Sequential, Indexed Sequential, Direct, Multilist, and Inverted file structures. S. B. Yao has developed a hierarchical access model which provides a single model incorporating the above organizations. This model has been used for a dynamic reorganization algorithm, and performance evaluation of data base structures. This paper uses Yao's model as a basis for developing an algorithm to determine the loading costs for the above file organizations. The algorithm is illustrated through Multilist, Cellular, and Inverted file structures. Graphs are presented which illustrate the relationship between the loading costs for the various organizations and the size of the data base. These costs are important in determining the time to reorganize a file and to assist in determining the cost of moving from one organization to another.","PeriodicalId":166583,"journal":{"name":"Proceedings of the 16th annual Southeast regional conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1978-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125004440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data base development for evaluation of the selective law enforcement program in Alabama","authors":"J. Crow","doi":"10.1145/503643.503704","DOIUrl":"https://doi.org/10.1145/503643.503704","url":null,"abstract":"Selected data base problems for the evaluation of the Selective Law Enforcement Program in Alabama are considered as follows: 1. data selection, 2. data quality, 3. statistical test, 4. basis for evaluation, 5. results.","PeriodicalId":166583,"journal":{"name":"Proceedings of the 16th annual Southeast regional conference","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1978-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124192842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring program understanding","authors":"R. Zmud, Tricia W. Dudley","doi":"10.1145/503643.503719","DOIUrl":"https://doi.org/10.1145/503643.503719","url":null,"abstract":"A number of recent investigations have been concerned with the study of programming languages and practices from a human factors perspective (Green, 1977; Shneiderman, 1977; Sime et al, 1973). These research efforts have examined differences in programming languages, statement alternatives and programming aids in an attempt to increase programmer productivity by suggesting language designs and guidelines that should result in more efficient program development efforts. Four measures of programming ability have been suggested for use in the psychological study of programming languages and practices: composition, which reflects an ability to write a program; comprehension, which reflects a capability to understand an existing program; debugging, which reflects a capability to detect errors in an existing program; and modification, which reflects an ability to insert changes into an existing program (Shneiderman, 1976). Of the four measures, comprehension is believed the more basic and hence of the most interesting from a human factors viewpoint (Sime et al, 1973). Program comprehension, or understanding, occurs at two levels (Shneiderman and Mayer, 1976). The first is termed semantic understanding and refers to the realization of the purpose of a program or a program module. The second is termed syntactic understanding and refers to the knowledge of a language's grammar. Semantic understanding is considered a higher level of understanding as it is believed that programs are not comprehended in a line-byline fashion based on syntax but in terms of modules relating to semantics. Also, semantic understanding is of prime importance when modification, composition and non-syntax debugging activity are attempted. Three measurement techniques are suggested for ascertaining degree of program understanding: questionnaires, program memorization/ recall and program bracketing. Questionnaires can require subjects to indicate the results of a program or program module given certain conditions (\"tracing\") or to indicate which conditions need to be set to provide a given result (\"taxon identification\"). It is believed the second type of question better ascertains program understanding (Green, 1977). Memorization/ recall refers to observing how many lines of a program can be recalled by a subject. It is believed that semantic modules are memorized and are then converted back to the original program via syntactic knowledge (Shneiderman, 1976, 1977; Shneiderman and Mayer, 1976). Scoring can either be objective (perfect recall) or subjective (functionally correct recall). Finally, it is believed that the identification of semantic modules by bracketing logicallyrelated program segments also may indicate program understanding (Shneiderman and Mayer, 1976). Little work has been reported tha~ validates these measures of program understanding. The major intent of the two studies to be reported was to provide some information on the validity of memorization as a measure of","PeriodicalId":166583,"journal":{"name":"Proceedings of the 16th annual Southeast regional conference","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1978-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125140194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The institute for certification of computer professionals: a misnomer?","authors":"J. D. Longhill","doi":"10.1145/503643.503677","DOIUrl":"https://doi.org/10.1145/503643.503677","url":null,"abstract":"It probably goes without saying that most practitioners and teachers in the data-processing (computer) field think of themselves as \"professionals\". The Association for Computing Machinery (ACM) calls itself a \"professional society\", and the many other computer related associations -the Computer Society of the IEEE, DPMA, ACPA, and AFIPS, to name a few -would no doubt take exception to being referred to as anything other than \"professional societies.\" Indeed, one does not have to look far into the brochures and other literature promoting our associations to find that they are amply sprinkled with the words, \"profession\", \"professional\", and \"professionalism\" (DPMA, 1975; AFIPS, n.d.; Ralston, 1973). Despite the somewhat general assumption that those in the data-processing or computer business are professionals, there has been considerable literature published that would cause one to question this assumption (Wilensky, 1964; Rich, 1965; Canning, 1968; Wall, 1971; Stone, 1972; Skeen, 1974; Finerman, 1975 among others). Most of those who have looked deeply into the concept of professionalism agree that one of the prerequisites of a recognized profession (e.g., medicine, law, public aceounting, etc.) is a certification mechanism that separates those who possess certain agreed-upon \"professional\" credentials from those who do not. The dataprocessing field does not yet have this certification mechanism. This is so, despite the fact that the Data Processing Management Association (DPMA) b~gan a certification program as far back as 1962, with the initiation of the Certificate in Data Processing (CDP). For those who have forgotten or never heard about the CDP a few facts about this program might be in order.","PeriodicalId":166583,"journal":{"name":"Proceedings of the 16th annual Southeast regional conference","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1978-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115469183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generalized fice transformation program for a mini computer","authors":"N. Niccolai","doi":"10.1145/503643.503648","DOIUrl":"https://doi.org/10.1145/503643.503648","url":null,"abstract":"This paper describes a Basic-Plus program which enables a user to perform various file transformations in a conversational environment. Features include on-line field definitions, file linkage transformation, and data type transformation. The program is modularly expandable to allow for different or additional data type transformations to be included. Additionally, the program provides input verification enabling the user to correct errors before file transformation begins.","PeriodicalId":166583,"journal":{"name":"Proceedings of the 16th annual Southeast regional conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1978-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129754354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A computer application to education of communication majors: an interdisciplinary program","authors":"Ruth Ann Cade, R. Cade","doi":"10.1145/503643.503668","DOIUrl":"https://doi.org/10.1145/503643.503668","url":null,"abstract":"Most universities have both computer centers and campus radio stations. This article explains the general educational features of using a computer program to generate the daily station log. This program greatly increases the quality and efficiency of the radio station operation, while providing a broader education for those students in Communication who are required to update the data file from computer teminals.","PeriodicalId":166583,"journal":{"name":"Proceedings of the 16th annual Southeast regional conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1978-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127012309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The University of Alabama computer honors program","authors":"Jane Ann Pruett","doi":"10.1145/503643.503696","DOIUrl":"https://doi.org/10.1145/503643.503696","url":null,"abstract":"Most universities around the country design their curricula for the average student. They provide information to the student, develop his ability to perform techniques with accuracy and understanding and, at most they develop his power of analysis and ability to solve problems. The degree requirements of the umiversities create a lack of flexibility in the educational curricula. Because there is little opportunity for the creative student to exercise his imagination and work independently, many universities have now established honor programs which are designed to improve the quality of education for bright s t u d e n t s . I n 1968, Dr. Char les L. Seebeck e s t a b l i s h e d the University of Alabama Computer Based Honors Program for the creative and independent student. He realized through his work with students in the University Computer Center that the cam. purer would be an ideal tool for teaching bright students. It would allow students a greater c~pert,~-4ty to .he creative, to use their imaginations, and to work independently because not all of the answers in the field of computer science are known--particularly in the area of applications and systems work. With this in mind, Dr. Seebeck designed a proposal for a computer based honors program. His proposal resulted in the receiving of a grant from the National Science Foundation making the Computer Based Honors Program a reality. Dr. Seebeck directed the Program until he retired in 1976. Dr. Thomas F. Gatts then replaced him as director. The Cm~puter Honors Program is designed f~ students who are interested in acquiring an education i n g r e a t e r dep th t han i s no rma l ly a c cep ted by an undergraduate. Studen t s i n the program are permitted to select their major fields of study and the division of the University in which they wish to enroll. The participants in the program have been enrolled in mathematics, engineering, biology, and other areas of the University. As ready as 18 hours credit may be earned for participation in Computer Honors classes and seminars to apply toward degree requirements in any division of the University. Selecting students to participate in the Program is not an easy task. Each year letters are sent out to the students in the National Merit Finals informing them about Computer Based ~nors. Around SO0 responses are usually received, and after being evaluated by the Computer Advisory Board, these a re narrowed down to 20 a p p l i c a n t s . These a p p l i c a n t s are t h e n i n v i t e d t o v i s i t the campus of the U n i v e r s i t y f o r about two days f o r testing, evaluatlou and interviews. After this, the board meets and selects five finalists mad two alteraates to participate in the program. Each of the five finalists receive student support felIowshipe of $1000 for each year that they remaim in the Honors Program. The money for the fellows h i p s now comes from the P r e s i d e n t ' s O f f i c e . Other s t u d e n t s a re p ","PeriodicalId":166583,"journal":{"name":"Proceedings of the 16th annual Southeast regional conference","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1978-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126306745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}