Большая библиография 50 Years of Army Computing: From eniac to msrc


Kistermann F. W. Leo Wenzel Pollak (1888-1964): Czechoslovakian Pioneer in Scientific Data Processing // AHC, Vol. 21, № 4, October-December 1999. P. 62-68



бет6/11
Дата15.06.2016
өлшемі0.62 Mb.
#137972
1   2   3   4   5   6   7   8   9   10   11

Kistermann F. W. Leo Wenzel Pollak (1888-1964): Czechoslovakian Pioneer in Scientific Data Processing // AHC, Vol. 21, № 4, October-December 1999. P. 62-68.


Kistermann F. W. How to use the Schickard calculator // AHC, vol. 23, № 1, January-March 2001. P. 80-85.

Kistermann F. W. Hollerith Punched Card System Development (1905-1913) // AHC, vol. 27, № 1, January-March 2005. P. 56-66.

The author traces the development of the Hollerith tabulating machine, what is part of the Hollerith Punched Card system during the years 1905 until 1913, and describes the machine's applications of most interest to customers at that time. Hollerith added the plug-board for flexible wiring to his tabulating machine for different applications, as a result of customer demand.



Kita C. I. J. C. R. Lickliders Vision for the IPTO // AHC, Vol. 25, № 3, July-September, 2003. P.62-77.

Kleene S. C. Origins of Recursive Function Theory // AHC, Vol. 3, № 1, January-March 1981. P. 52-67.

Klimenko S. V. Computer Science in Russia: A Personal View // AHC, Vol. 21, №. 3, July-September 1999. P. 16-30.


Knapp, Hans Georg. Zahl als Zeichen  zur “technisierung” der arithmetik im mittelalter // Historia Mathematica, vol. 15, May 1988. P. 114-134.

This article deals with the impact of the concept of calculation on arithmetic during the Middle Ages. This intellectual process is presented in the context of the conception of a sign in the Middle Ages, and the beginnings of technical ways of thought set against the background of the way of life at that time.



Knorr W. Techniques of Fractions in Ancient Egypt and Greece // Historia Mathematica, vol. 9, May 1982. P. 133-171.

Knott C. G. Edward Sang and His Logarithmic Calculations / Napier Tercentenary Memorial Volume. London: Longmans, Green and Company, 1915. P. 261-268.

Knott, John V. Fowler & Company 1898-1988 // Journal of the Oughtred Society, vol. 4, № 2, October 1995. P. 16-17.

Makers of Fowler's circular slide rule.



Knuth D. E. Von Neumanns First Computer Program // Computer Surveys, vol. 2, № 4, December 1970. P. 247-260.

Охарактеризованы основные свойства архитектуры и система команд компьютера EDVAC, описанного Дж. фон Нейманом в отчете 1946 г., а также усовершенствования, предложенные им впоследствии на основе анализа эффективности работы программы сортировки, написанной фон Нейманом.



Knuth D. E. Ancient Babylonian algorithms // Communications of the ACM, vol. 15, 1972. P. 671-677.

Knuth D. E. The IBM 650: An Appreciation from the Field // AHC, Vol. 8, № 1, January-March 1986. P. 50-55.

Knuth D. E., Pardo L. T. Early Development of Programming Languages / Encyclopedia of Computer Science and Technology, Vol. 7. N.-Y.: Marcel Dekker, Inc., 1977. P. 419-493.

Könekamp R. William Stanley Jevons (1835-1882): Some Biographical Notes // Manchester School of Economics and Social Studies, vol. 30, № 3, 1962. P. 251-273.

Koss A. M. Programming on the Univac 1: A Womans Account // AHC, Vol. 25, № 1, January-March 2003. P. 48-59.

Koss A. M. Programming at Burroughs and Philco in the 1950s // AHC, Vol. 25, № 4 October-December 2003. P. 40-50.

Kowalski R. A. The early years of logic programming // Communications of the ACM, vol. 31, № 1, January 1988. P. 38-43.

Kozaczuk, Wladyslaw. Enigma: How the German Machine Cipher Was Broken and How It Was Read by the Allies in World War Two. Frederick: University Publications of America, 1984. 348 p.

This book tells how the Polish broke the code using mathematics (not a captured machine as is commonly thought) and details the methods used to decrypt messages when settings were changed. There is a lot of (Polish) patriotic pride in this book which occasionally gets in the way of the content, but it is an excellent book nonetheless. It includes an appendix in which the mathematician who originally broke Enigma explains exactly how he did it which is especially interesting.



Kranakis E. Early Computers in the Netherlands // CWI Quarterly, Vol. 1, № 4, December 1988. P. 61-84.

Krasner, Glen. Smalltalk-80: Bits of History, Words of Advice. Addison-Wesley, 1983. 344 p.

Kruh L. The Genesis of the Jefferson/Bazeries Cipher Device // Cryptologia, vol. 5, № 4, October 1981. P. 193-208.

Kruh L., Deavours C. The Commercial Enigma: Beginnings of Machine Cryptography // Cryptologia, Vol. XXVI, № 1, January 2002. P. 1-14.

Krull F. N. The Origin of Computer Graphics within General Motors // AHC, Vol. 16, № 3, Fall 1994. P. 40-56.

Kuester J. R., Moceyunas A. K. Patents for Software-Related Inventions // Iterations: An Interdisciplinary Journal of Software History, vol. 2, April 4, 2003. P. 1-14.

Land F. The First Business Computer: A Case Study in User-Driven Innovation // AHC, Vol. 22, № 3, July-September 2000. P. 16-26.

Larson E. Findings of facts, conclusions of law and order for judgment // U.S. Patent Quarterly 180. P. 673-773.

Текст решения судьи по делу о патенте ENIAC.



Lavington S. H. History of Manchester Computers. Manchester: NCC Publications, 1975.

Lavington S. H. Early British Computers: The Story of Vintage Computers and the Men Who Built Them. Manchester: Manchester University Press, 1980. 141 p.

Lavington S. H. Manchester Computer Architectures, 1948-1975 // AHC, Vol. 15, № 3, July-September 1993. P. 44-54.

Lavington S. H. The Pegasus Story: the History of a British Vintage Computer. London: Science Museum, 2000. 64 p.

Layer H. A. Microcomputer History and Prehistory  An Archaeological Beginning // AHC, Vol. 11, № 2, Summer 1989. P. 127-130.


Достарыңызбен бөлісу:
1   2   3   4   5   6   7   8   9   10   11




©dereksiz.org 2024
әкімшілігінің қараңыз

    Басты бет