Amsterdam, J. (1986). Safe Storage Allocation – How to avoid the dangers of allocating memory. Byte, , 123–132.
|
Anderson, J. R., & Reiser, B. J. (1985). The LISP Tutor. Byte, 10(4), 159–175.
|
Apiki, S., Diehl, S., & Eglowstein, H. (1990). Not Just for Numbers Anymore: Third-Generation Spreadsheets. Not Just for Numbers Anymore, 15(2), 148–166.
|
Clarkson, M. A. (1991). An Easier Interface. Byte, 16(2), 277–282.
Abstract: Ideas on how to make a better use of the screen using 3D rooms. Navigation is done by mouse having virtual joysticks. The information density gets increased by having 3D clues like shadows. Manipulation techniques include gesture (e.g., to prune and grow parts of trees).
|
Colmerauer, A. (1987). Opening the PrologIII Universe. Byte, August(8), 177–182.
Abstract: A new type of Prolog interpreter replacing the unification principle with constraint resolution concept.
|