A Nyssa slit loam soil was bedded for potatoes. Furrow irrigation for 11 hours at four gallons per minute on a 2.5 percent slope resulted in 17.7 tons of soil lost per acre. Soil loss was reduced to 2.8 tons per acre by the use of 790 lbs/acre of wheat...
This report includes information concerning experimental use of unregistered pesticides or unregistered uses of pesticides. Experimental results should not be interpreted as recommendations for use. Use of unregistered materials or use of any registered pesticides inconsistent with its label is against both Federal Law and State Law.
Information derived from a Landsat Multispectral Scanner CMSS) scene can be used to assign individual pixels, each representing about one acre on the Earth's surface, to natural resource classes, A lineprinter can be used to generate a 1:24,000 scale map of the scene in which each symbol corresponds to a...
Performance of a reliable storage subsystem for a centralized database system was studied by simulation. The reliable storage subsystem studied consists of three redundant disk units that are updated one at a time from a consistent database state to another consistent database state, Thus, even if a central processor and/or...
Exploratory Data Analysis (EDA) is a lesser known field which has outgrown the bounds of statistics. It differs from ordinary, or “confirmatory”, data analysis. Originated by John Tukey, EDA aspires toward an open-ended meta-goal: to discover “all interesting” [nontrivial, normal form, valid] hypotheses about a domain that is represented by...
This study examined the UNIX command abbreviation schemes preferred by expert and novice UNIX programmers. The two parts of the conducted experiment were: subjective rating of UNIX command abbreviations for each of the six abbreviation categories (acronym, combination, contraction, identity, synonym, and truncation); subjects suggested descriptive command names for UNDC...
The "style metric" of Berry and Meekings is purported to quantify the lucidity of software written in the C programming language. We used a modification of this metric to try and identify error-prone software. Our results indicate that this metric seems to bear little relationship to the density of errors...
Information is often incomplete in databases, and nulls are required to represent missing or unknown data; however, many difficulties occur with nulls. In his 1983 text, C. J . Date rejected outer join of relations with nulls mainly due to a perceived problem with functional dependencies (FDs): when nulls are...
A method for implementing parameterized types is given. Two simplifying restrictions are assumed: types are only parameterized with other types, and assignment is like that of SNOBOL, CLU, and Smalltalk. An algorithm for type checking that handles parameterized types and overloading is presented .
The design of an experimental object-based programming language is discussed. The language is intended for investigating techniques for organization of programs.