2451. Selfish Optimization in Computer Networks Yemini, Yechiam 1981 Reports Computer scienceMathematical optimization--Computer programsComputer network protocolsComputer algorithms
2452. Learning Meta-Rule Control of Production Systems from Execution Traces Harrison, Malcolm C.; Stolfo, Salvatore 1980 Reports Computer scienceExecution traces (Computer program testing)Explicit memoryImplicit memory
2453. A Hierarchical Associative Architecture for the Parallel Evaluation of Relational Algebraic Database Primitives Shaw, David Elliot 1979 Reports Computer storage devices--Mathematical modelsComputer scienceComputer science--MathematicsDatabase management--Mathematical models
2454. Any Iteration for Polynomial Equations Using Linear Information Has Infinite Complexity Wasilkowski, Grzegorz W. 1979 Reports Computer scienceLamé polynomialsIterative methods (Mathematics)
2455. A Relational Database Machine Architecture Shaw, David Elliot 1979 Reports Computer scienceAlgorithms--Mathematical models
2456. Learning Control of Production Systems Stolfo, Salvatore 1979 Reports Computer scienceArtificial intelligence
2457. The Strength of Nonstationary Iteration Wasilkowski, Grzegorz W. 1979 Reports Computer scienceIterative methods (Mathematics)Differential equations, Nonlinear--Numerical solutions
2458. Asymptotic behavior of vector recurrences with applications Feldstein, Alan; Traub, Joseph F. 1977 Articles Computer scienceVector analysis--Computer programsRecursive programmingIterative methods (Mathematics)Differential equations, Nonlinear--Asymptotic theory
2459. Application of three-dimensional interactive graphics in X-ray crystallographic analysis Stellman, Steven D. 1975 Articles BiochemistryComputer scienceGenetics
2460. Inferring LISP Programs from Examples Shaw, David Elliot; Swartout, William R.; Green, C. Cordell 1975 Reports Computer scienceLISP (Computer program language)High performance computing--Research